Toxic Content and Data Governance



Similar documents
How To Govern Data Effectively

How To Manage Data

The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance

Information Governance as a Holistic Approach to Managing and Leveraging Information

Information Governance as a Holistic Approach to Managing and Leveraging Information

Enterprise Data Management

Getting Started with Data Governance. Philip Russom TDWI Research Director, Data Management June 14, 2012

IBM Information Governance


A Governance Framework for Building Secure IT Systems *

DATA GOVERNANCE AT UPMC. A Summary of UPMC s Data Governance Program Foundation, Roles, and Services

Business Glossary. Data Governance; Yet there is a ton of Technology. Aspen Information Solutions, Inc Castle Rock

Ten Steps to Quality Data and Trusted Information

InfoSphere Governance Solutions Maximizing your Information Supply Chain

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Credit Markets Symposium 2009 Speaker Bios

Big Data and Big Data Governance

Six easy steps for smart governance

Data Governance: proven steps to transform Information into an Asset

The Key Components of a Data Governance Program. John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc

Data Governance With a Focus on Information Quality

DISCIPLINE DATA GOVERNANCE GOVERN PLAN IMPLEMENT

FANNIE MAE CORPORATE GOVERNANCE GUIDELINES

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Business Data Authority: A data organization for strategic advantage

RIGHT FROM THE START: RESPONSIBILITIES of DIRECTORS of N0T-FOR-PROFIT CORPORATIONS

Developing Leaders Who Deliver Results

Washington State s Use of the IBM Data Governance Unified Process Best Practices

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

EUROPEAN CONFEDERATION OF INSTITUTES OF INTERNAL AUDITING (IVZW)

Industry Models and Information Server

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.

IDENTITY THEFT AND DATA BREACH CONFERENCE 2016

Implementing and Executing Data Governance & Quality Strategy at Northern Trust

GOVERNANCE DEFINED. Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Guy Tozer, Doriq Associates DG Conference Europe 2009

AN OVERVIEW OF THE SALLIE MAE DATA GOVERNANCE PROGRAM

Expanding Data Governance Into EIM Governance The Data Governance Institute page 1

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

A Flexible and Comprehensive Approach to a Cloud Compliance Program

BIG DATA. John A. Eisenhauer Chair, Data Governance Society Rick Young - Managing Director 3Sage Consulting

Coach, Inc. Corporate Governance Principles

The IIA's 2016 International Conference July 17 20, at the Jacob Javits Center in New York, NY

Information Security Specialist Training on the Basis of ISO/IEC 27002

Robert P. Bianchi 5502 Chestermill Court Fairfax, VA (571) FAX (703)

Applying IBM Security solutions to the NIST Cybersecurity Framework

Ron Sheffield, Ed.D Robins Way Williamsburg, Virginia (757)

STATEMENT OF CORPORATE GOVERNANCE GUIDELINES

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

WETHERBY ASSET MANAGEMENT

ACCESS MIDSTREAM PARTNERS, L.P. (ACCESS MIDSTREAM PARTNERS GP, L.L.C.) CORPORATE GOVERNANCE GUIDELINES

Cyber security in education in Greece

Security Controls What Works. Southside Virginia Community College: Security Awareness

Plenary: Compliance and Legal Trends Tuesday, May 24 4:15 p.m. 5:15 p.m.

How To Protect Yourself From A Hacker Attack

International Conference THE EU AND CHINA: REFORM AND GOVERNANCE PROGRAMME

Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO

US & India Aerospace, Defense and Security Advisory. A hybrid US/India focused investment advisory, consulting, and private equity fund

The following is a summary of the items that Replicator does and does not replicate, with regards to Managed Metadata:

Why do Identity and Access Management Projects Fail? With FishNet Security IAM Services Group January 26, 2012

CIBC INVESTOR DAY SPEAKER BIOGRAPHIES. Victor G. Dodig. President and Chief Executive Officer, CIBC

CHEVRON CORPORATION AUDIT COMMITTEE CHARTER

FIN 683 Financial Institutions Management Bank Risk: An Overview

The IBM data governance blueprint: Leveraging best practices and proven technologies

December 6, Dear Mr. Speaker and Honorable Members of the Standing Committee:

INTEGRATING THE TWO WORLDS OF PHYSICAL AND LOGICAL SECURITY

Department of Defense INSTRUCTION

Master of Public Administration. A Fast Track to Attaining a Prestigious US MPA Qualification

Info-Tech Research Group. Media Kit

Governance, Risk, and Compliance (GRC) White Paper

Data Privacy, Security, and Risk Management in the Cloud

Implementing an Information Governance Program CIGP Installment 2: Building Your IG Roadmap by Rick Wilson, Sherpa Software

CIO Global Cloud Computing Adoption Survey Results Summary Slides January VMware Inc. All rights reserved

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Master of Financial Management: Faculty Bios

Transcription:

IBM Data Software Governance Group Council Toxic Content and Data Governance Steven Adler IBM Data Governance Solutions adler1@us.ibm.com http://www.ibm.com/itsolutions/datagovernance 2007 IBM Corporation

The Dreadful Details, by Eric Baudelaire 2007 IBM Corporation 2

A lot of time you really can't trust what you see... 2007 IBM Corporation 3

To the public, these men are members of a familiar fraternity, presented tens of thousands of times on television and radio as military analysts whose long service has equipped them to give authoritative and unfettered judgments about the most pressing issues of the post-sept. 11 world. Hidden behind that appearance of objectivity, though, is a Pentagon information apparatus that has used those analysts in a campaign to generate favorable news coverage of the administration s wartime performance, an examination by The New York Times has found. The effort, which began with the buildup to the Iraq war and continues to this day, has sought to exploit ideological and military allegiances, and also a powerful financial dynamic: Most of the analysts have ties to military contractors vested in the very war policies they are asked to assess on air. - NY Times, April 20, 2008 2007 IBM Corporation 4

The Credit Crisis has its own victims of Toxic Content 2007 IBM Corporation 5

The Loan Origination Process 2007 IBM Corporation 6

IBM Data Governance Council, Founded in 2004 Customers Business Partners Abbott Kasikornbank Application Security American Express Key Bank Axentis Bank of America MasterCard Continuity Software Bank of Montreal Merrill Lynch Guardium Bank of Tokyo/Mitsubishi Novartis Intellinx Bell Canada Nordea Bank Involv Citigroup PFG Micropole-Univers Chevron RFG OpenPages Danske Bank TIAA-CREF Paisley Deutsche Bank TeliaSonera Perficient Discover Financial VP Securities Services RiskWatch Equifax Washington Mutual SecNap Fannie Mae Wachovia Tizor FSTC The World Bank Veronis 2007 IBM Corporation 7

Data Governance Council Maturity Model Requires Data Risk Management & Compliance Outcomes Value Creation Enablers Organizational Structures & Awareness Enhance Stewardship Policy Core Disciplines Data Quality Management Information Life-Cycle Management Information Security and Privacy Supporting Disciplines Supports Data Architecture Classification & Metadata Audit, Logging & Reporting 2007 IBM Corporation 8

The Maturity Model Identifies Current and Desired States of DG Maturity 2007 IBM Corporation 9

IBM has developed a DG Scorecard 2007 IBM Corporation 10

XBRL for Risk Reporting New standards are needed in Risk Measurement and Capitalization Reporting to regulatory authorities is the leading edge of that need IBM Data Governance Council is initiating standards consultations with: Customers Partners US Regulatory Authorities European Regulatory Authorities Asian Regulatory Authorities XBRL standards organizations We see the need for a widespread dialog We invite other interested parties to participate in this dialog as we consider appropriate standards in Risk Measurement, Capitalization, and Reporting 2007 IBM Corporation 11

Speakers Today IBM Data Governance Council CHAIR / MODERATOR 1. Steven Adler, Director IBM Data Governance Solutions, USA "Toxic Content and The Need for Data Governance"? SPEAKERS 2. Bent Poulsen, Chief Auditor VP, Denmark 3. Renaud Finaz de Villaine, Directeur Marketingt Micropole-Univers, France 4. Michael Dziekan, Office of Strategy - Director of Research & Solutions Strategy, Cognos an IBM Company, USA 5. Jacques Bus, Head of Security Unit, DG INFOSO & Media, European Commission 6. Sokratis Katsikas, Professor Dept. of Technology Education & Digital Systems, University of Piraeus & member of the Board of the 7. Paris Kokorotsikos, Chairman & CEO Euroconsultants SA, Greece 8. Zahid Jamil, Barrister-at-law, Jamil & Jamil, Pakistan 9. Jean-Marc Suchier VP, Director European Programs, Sagem Securité 10. Thomas Myrup Kristensen, EU Policy Director, Microsoft EMEA, Denmark 11. Thomas Hart, Regulatory Expert EU-China Information Society Project, China 2007 IBM Corporation 12

IBM Data Software Governance Group Council Thank You 2007 IBM Corporation