Data Governance at a glance…

Slides:



Advertisements
Similar presentations
ESRI Dev Meetup Lightning Talk
Advertisements

Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
Business Intelligence Technology and Career Options Paul Boal Mercy Health March 23, 2011.
ISS IT Assessment Framework
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Eleonora Babayants Galaxy Consulting. Information Governance  It is the set of policies, procedures, processes, roles, metrics, and controls implemented.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
DATA GOVERNANCE: Managing Access Jeremy Singer Suneetha Vaitheswaran.
Indranil Bardhan, UT Dallas Kirk Kirksey, UTSW Medical Center.
Lee Kinsman (soon to be) Consultant, Chamonix IT Consulting
© 2012 IBM Corporation Symposium on Digital Curation 0 The Future Workforce Steven Miller IBM.
Chapter 1 Course Orientation. Outline Definition of data source management Definition of data source management Importance data source management to organization.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
IT Pro Day Auditing in SQL Server 2012 Charley Hanania Principal Consultant, QS2 AG – Quality Software Solutions
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
SharePoint Governance: Why do we need it Adis Jugo managing consultant.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Module 2: Creating a Plan for Network Security. Overview Introduction to Security Policies Designing Security by Using a Framework Creating a Security.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Career Model Framework
Progress OpenEdge Analytics360 Predicting The Future Of Your Business Michael Marriage Senior Principal Product Manager
Do It Strategically with Microsoft Business Intelligence! Bojan Ciric Strategic Consultant
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 Click to edit Master title style What is Business Analysis Body of Knowledge?
University of Nevada, Reno Organizational Data Design Architecture 1 Agenda for Class: 02/06/2014  Recap current status. Explain structure of assignments.
OBA304 PerformancePoint 2007 Planning Ryan Jamieson Director IS Partners.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
This document and the information contained herein is confidential and proprietary to Allegient LLC and shall not be duplicated, used or disclosed in whole.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Managing Enterprise Architecture
Digital Asset Management & Storage Program Program Summary
Open Governance Platform
Once Upon a Time: The Story of a Successful BI Implementation
EI Architecture Overview/Current Assessment/Technical Architecture
Getting Down to Business
Intro to BI Architecture| Warren Sifre
Data Architecture World Class Operations - Impact Workshop.
Integrated Management System and Certification
AUDIT AND RISK INDABA JUNE 2017.
Introduction to Big Data
Process Based Management Department Communication Cascade Oct-2007
Azure Streaming Analytics
Presented by: Warren Sifre
Introduction to Azure Streaming Analytics
A Framework for Control
Making Information Security Manageable with GRC
IT Development Initiative: Status and Next Steps
Agenda Workforce Development Coaching Mentoring
Making Information Security Actionable with GRC
The Dirty Business of Auditing
Proposal to Create IAM Working Group
UNLV Data Governance Executive Sponsors Meeting
IS4550 Security Policies and Implementation
Introduction to Big Data
Enterprise Program Management Office
Introduction to Big Data
What is this and how can I use it?
What is this and how can I use it?
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Data Governance & Management Skills and Experience
Security Policies and Implementation Issues
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Introduction to Data Lakes
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Introduction to Azure Streaming Analytics
Business Intelligence
Security Policies and Implementation Issues
Implementing a Distributed Enterprise Architecture to Deliver BI
Introduction to Big Data
Presentation transcript:

Data Governance at a glance… Presented by: Warren Sifre

Warren Sifre Presenter… Principal Consultant / Technical Lead Moser Consultant Email: warren.sifre@moserit.com Twitter: @WAS_SQL LinkedIn: www.linkedin.com/in/wsifre

Who is Warren??? Data Professional for over 20 years… OCR/Spartan/Savage Racer and American Ninja Warrior in Training!!! Interests in SQL Server, MongoDB, Hadoop, PowerShell, and Information Security Indy BI PASS User Group Founder and Chapter Leader / Indy Power BI User Group Chapter Leader Frequent national and international presenter for PASS SQL Saturday, PASS Local/Virtual User Groups, and other non-PASS related Conferences / User Groups MSCE: Data Platforms/Business Intelligence, Hortonworks HCA, Teradata 14 CTP and many more…

Agenda Do you need Data Governance? What is Data Governance? Data Governance Objectives Data Governance Roles Data Classification Additional Elements to Data Governance Keys to Successful Implementation

Do you need Data Governance? Are there compliance requirements? Are there security responsibilities? Are users leveraging data in ways unbeknownst to the business? Are users’ taxonomy confusing to other business units? Are there challenges in data management, growth, and manageability?

What is Data Governance? Defined by The Data Governance Institute as “A system of decision rights and accountabilities for information-related processes, executed according to agreed-upon models which describe who can take what actions with what information, and when, under what circumstances, using what methods.”  In Short… A way to ensure the quality, availability, integrity, security, auditability, and usability of data within an organization.

Data Governance Objectives The Framework Quality Integrity Availability Security Usability Auditability

Data Governance Roles Data Trustee Data Steward Data Custodians Planning and Policy Level responsibilities Data Steward Manage datasets and work with Data Custodians in implementation Data Custodians System and Database Admins Data Users Everyday Users who consume the data in the enterprise

Data Classification Levels Public Controlled Restricted

Data Classification Execution Source System Risk Competitor Controlled Compliance Restricted Employee Sensitive Client Perception No Risk Everyone Public

Additional Elements to Data Governance Database Design Conventions Modeling Style Guidelines Data Name Conventions Report Design Guidelines Metadata Definitions Reusable Assets such as Frameworks and Components

Reason why Dev Teams go rogue Don’t know that it exists Don’t know they should work with them Too difficult to work with Too slow to work with Offers little value

Keys to Successful Implementation Easy to adopt and provide value to devs Adapt the process to changing needs Build Compliance into your processes Flexible Architectures and Frameworks Ensure Data Gov is aligned with IT Gov Evangelize the process and value it provides