Master Data Management, Risk and Governance



Similar documents
Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

building a business case for governance, risk and compliance

Aligning Compliance Program Priorities with Business Objectives

Agile Master Data Management A Better Approach than Trial and Error

Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View

Secure Data Transmission Solutions for the Management and Control of Big Data

EIM Strategy & Data Governance

Managing Risk at Bank of America Corporation. Overview

TOP QUESTIONS ABOUT MICROSOFT AUDITS

Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer

Domain 5 Information Security Governance and Risk Management

Enterprise Data Governance

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Data Governance for Master Data Management and Beyond

State of Montana Strategic Plan for Information Technology 2014

Real World Strategies for Migrating and Decommissioning Legacy Applications

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

What Should IS Majors Know About Regulatory Compliance?

Design of Database Security Policy In Enterprise Systems

How To Manage Information Security At A University

Governance Is an Essential Building Block for Enterprise Information Management

Strategies for assessing cloud security

Qualities of a High Perf o r m a n c e Finance Executive: An Aggregation of Skills. John Trakselis, Principal M. Wood Company

Getting Started with Data Governance. Philip Russom TDWI Research Director, Data Management June 14, 2012

Leveraging Information For Smarter Business Outcomes With IBM Information Management Software

What to Look for When Selecting a Master Data Management Solution

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Top Ten Technology Risks Facing Colleges and Universities

Estimating Cloud Computing Costs: Practical Questions for Programs

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

The Value of Vulnerability Management*

Don t Get Left in the Dust: How to Evolve from CISO to CIRO

Capital Requirements Directive Pillar 3 Disclosure. December 2015

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

How To Integrate Hr

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

OCC 98-3 OCC BULLETIN

Vermont Enterprise Architecture Framework (VEAF) Master Data Management (MDM) Abridged Strategy Level 0

Security Information Lifecycle

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

The Total Economic Impact Of IBM Information Integration And Governance Solutions

Governance, Risk, and Compliance (GRC) White Paper

Information Governance

Why is Master Data Management getting both Business and IT Attention in Today s Challenging Economic Environment?

The IBM data governance blueprint: Leveraging best practices and proven technologies

Essentials to Building a Winning Business Case for Tax Technology

Touch Points Touch Points Step 1 Spend Areas Step 2 Creating and Developing a Sourcing Team Executive Sponsorship

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

Implementing HIPAA into a Compliance Program

BUSINESS MANAGEMENT FINANCIAL MANAGEMENT BM FM WSQ. A Singapore Workforce Skills Qualifications Programme PROSPECTUS

Enterprise Risk Management

Compliance in the Corporate World

Sample Financial institution Risk Management Policy 2011

Why CRM implementations fail and what to do about it.

The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

Addressing Cyber Security in Oracle Utilities Applications

CIOs: How to Become the CEO s Business Partner

Better Data is Everyone s Job! Using Data Governance to Accelerate the Data Driven Organization

IT Governance Charter

DATA QUALITY MATURITY

SharePoint Governance & Security: Where to Start

Delivering Customer Value Faster With Big Data Analytics

Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO

Tactics v. Strategy: From Records & Information Management to Information Governance

Emptoris Contract Management Solution for Healthcare Providers

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by

Transcription:

Master Data Management, Risk and Governance Look for more expanded versions of this and more material in EIM for Business Managing Information as an Asset, in May 2010 by Morgan Kaufman Publishing, Elsevier Inc. 0

Problem Statement What types of risks can we identify that will urge the organization towards managing information more effectively, specifically via MDM? How does risk management fit into MDM delivery? 1

Key Terms Enterprise Information Management - EIM is the program that manages enterprise information asset to support the business and improve value. EIM manages the plans, policies, principles, frameworks, technologies, organizations, people and processes in an enterprise towards the goal of maximizing the investment in data and content MDM - Authoritative, reliable foundation for data used across many applications & constituencies with goal to provide single view of truth no matter where it lies DG - Data governance is the organization and implementation of policies, procedures, structure, roles, and responsibilities which outline and enforce rules of engagement, decision rights, and accountabilities for the effective management of information assets 2

Agenda Understanding the risks and benefits you may be overlooking Identifying and classifying risk areas within MDM Leveraging governance and compliance within MDM 3

Understanding the risks and benefits you may be overlooking 4

* Top 5 Drivers for MDM Initiatives Customer cross sell Item / Product management Compliance & regulatory reporting Legacy system integration & augmentation Mergers and acquisitions * Source: MDM Institute, 2009 Risk management? 5

The nature of EIM Business cases Managed, Actionable Enterprise Information And Knowledge 6 Benefits from Risk Avoidance (e.g. Sarbanes-Oxley Act, information privacy, data quality, etc. )

Example where is the risk here? Industry Std, New Industry Std New Industry Std Industry Std,, ACCT NO ACCT NO Client ID Apply Approve Disapprove Marketing Interim License Services Client Service Bill Settle Clear Authorize Industry Std Client Information Touch points Notify Final Approval Maintain License Terminate License Maintain Relationships (Parent Child) Industry and really really old system Industry and really really old system and Client ID Industry Std again ACCT NO, Industry and really really old system Client Id 7

Compelling scenarios Clay layers You start coding, and (fill in the blank) 8

Clay layers CIO saw MDM as needed technology Applications area spent high 7 figures on tool and consolidating known customer data Results Passive resistance Direct resistance Counter projects Loss of market share for product line that did use MDM application MDM product and project terminated 9

You start coding, and. MDM recommended as approach to mitigate failed DW project (customer data was awful) Vendor consultants turned product into an enterprise event hub The new and old applications MDM was to support ignored attempts to gather requirements After one year, technology seemed ineffective, and resistance levels insurmountable Part of recovery effort was risk based business case, based on market share recovery and regulatory short falls 10

Identifying and classifying risk areas within MDM 11

Business Value MDM candidates for EIM prioritizing High Notional View - Balancing Risk and reward by information content type Product Customer Promotion Finance Employee Employee Supplier Transac'n Dist. Channel Agreements 12 Low Low Risk High

Review Basic Business Case Steps Understand business benefits Isolate information usage enablers Identify business benefits that are possible Describe specific benefits, costs and/or at risk quantifiers Define relevant EIM benefit categories - Risk, business, project, regulatory Identify potential cash flows 13

Origins of Risk Benefits for EIM 14

Identify Touch Points 15 Processes where information can be used to improve a process, accomplish a goal, change a strategy, manage risk Opportunities where data and information affect outcomes Data quality Consistent usage Timely action Avoid penalty Reduce exposure

Example: Touch point risks for MDM element 16

Summary for the EIM Risk-based Business Case Look for scenarios where: using data or information directly supports an aforementioned goal or objective increases the value of some component of the balance sheet Decreases the reserve, contingency or cost being accounted for Requires formal analysis - not all of your business objectives will lend themselves to EIM inspired governance There must be some exercise similar to this before the MDM function is established Data that is not used has no value. If usage is not monitored, you have no idea of its value. If not used, why are you messing with it? Remember, EIM (MDM and DG) exists to ensure information assets add value 17

Leveraging Governance and Compliance MDM Governance Compliance 18

MDM and Data Governance 19 MDM champions Data Governance and vice versa Data Governance is mandatory for MDM Interaction with Data Governance area needs to be constant and consistent Observed issues Business user education Metrics Risk-related efforts make Data Governance mandatory

20 Data Governance and Risk Management Privacy Legal penalties (tip of the iceberg) Civil actions Fines Credibility Lower stock price, valuations Fraud Lost credibility Lower stock price, valuations Credit Risk / Exposure Transparency R O I Lower stock price, valuations Poor business decisions NO business decisions

Compliance Role in MDM Define where line of authority sits Mechanism to report problems Support to implement scans and audits within MDM processing Policy-based interaction with data quality areas 21

Compliance Regulatory Risks HIPAA Regulation Gramm-Leach-Bliley Act SEC Rule 17A-4 Impact on EIM Forces encryption, rigid rules on individual record keeping Requires accurate name. address, and opt-out processes Forces policies for structured and unstructured data Sarbanes-Oxley Section 302 Section 404 Section 409 Pressures company s chief financial officer and chief executive to ensure data is correct, and no one can "game the system" via reporting Forces controls for data movement and traceability of usage Forces greater awareness of business status and lowers latency of reporting FISMA BASEL II Justification for government bodies to improve information management Forced reporting and accuracy standards on large banks 22

DG Organizations - Playing with others Data Governance Oversight Body Legal IT Compliance DG Councils Legal Compliance IT Governance Data Governance Separate area Standardized processes, policies, rules, usage, models Enterprise content and processes 23

MDM features based on Governance Tactics Assess data quality with an eye to errors impacts Document existing controls Define performance metrics for key processes at risk Monitor the content of all unstructured data by key words Monitor direct and indirect interactions of individuals that access documents, dialogues or e-mails in a systematic manner Develop dashboard reports that monitor audit data on all data and content Develop data and content retention guidelines and archival processes Define Federalist information governance road map Localized Info. Elements C2 C4 M1 M4 D2 Global information Elements C1 C3 M2 M5 D3 24

Summary Risk Management is an integral part of a business case MDM can be reinforced by examining all Risk areas A Risk-based MDM effort is also a keystone EIM effort MDM and Data Governance must deploy together, but Compliance makes that easier Regulators already have a content management mindset, while companies. 25

Building Value Through Information Asset Management jladley@imcue.com 314-422-9076 26