Data Governance Customer Hub. Data As An Enterprise - Corporate - Asset Data Should be accepted as an enterprise asset Data Quality should be part of.

Slides:



Advertisements
Similar presentations
Effective Contract Management Planning
Advertisements

Should You Establish a Project Management Office (PMO)?
Global Congress Global Leadership Vision for Project Management.
Course: e-Governance Project Lifecycle Day 1
NCES Forum Tech Committee July 2010 Presented by: Kathy Gosa Kansas State Department of Education.
EIM Framework EIM Vision & Strategy EIM Governance EIM Core Processes
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Monday, June 01, 2015 Aligning Business Strategy with IT Architecture Board & Governance- Key to Running IT as Business.
Oncor’s EIM Program.
Adopt & Adapt Tips on Enterprise Data Management Annette Pence September 10, 2009 MITRE.
IT Governance and Management
Change is a Process Organizational Stages Individual Stages (ADKAR) Business Need Concept and Design Implementation Post-Implementation Awareness Desire.
First Practice - Information Security Management System Implementation and ISO Certification.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Certified Business Process Professional (CBPP®)
project management office(PMO)
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
Measuring Competencies as Way to Increase Your Productivity Suzanne Simpson, Ph.D. President Human Resource Systems Group Ltd. IMAC ’99 Conference.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Patch Management Strategy
Information Technology Audit
Agile Approach to Information Strategy and Data Governance.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
What is Business Analysis Planning & Monitoring?
The Evergreen, Background, Methodology and IT Service Management Model
OPR100: Overview of Enterprise Project Management & Project Management Maturity Models Melinda Curtis Product Manager, Microsoft Office Project.
The GPAA RFP to implement Enterprise Data Management 1 GPAA15/2015.
Continual Service Improvement Process
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Policies Jim Stracka The Problem Today.
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
- 1 - Roadmap to Re-aligning the Customer Master with Oracle's TCA Northern California OAUG March 7, 2005.
The Challenge of IT-Business Alignment
1 Bonham, chapter 8 Knowledge Management. 2  8.1 Success Levels  8.2 Externally Focused KM  8.3 Internally Focused KM  8.4 PMO-Supported KM
Roles and Responsibilities
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
Information Governance, Security & Metadata Terry Campbell Robert S. Fox John Gatto.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Practical Investment Assurance Framework PIAF Copyright © 2009 Group Joy Pty. Ltd. All rights reserved. Recommended for C- Level Executives.
Today’s Agenda Agree on recurring meeting secretary
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 Click to edit Master title style What is Business Analysis Body of Knowledge?
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Establishing (or Enhancing) PMO Effectiveness Nicolle Goldman, PMP March 28, 2007.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Establish and Identify Processes  Identify and establish current state:  Roles and responsibilities  Processes and procedures  Operational performance.
ASSET MANAGEMENT CONFERENCE Nasumba Kizito Kwatukha
Data Architecture World Class Operations - Impact Workshop.
Identify the Risk of Not Doing BA
Vendor Management and Software Asset Management
By Jeff Burklo, Director
Data Management Capability Assessment Model
Data Governance & Management Skills and Experience
EA Framework TOGAF is a framework - a detailed method and a set of supporting tools - for developing an enterprise architecture.
Presentation transcript:

Data Governance Customer Hub

Data As An Enterprise - Corporate - Asset Data Should be accepted as an enterprise asset Data Quality should be part of everyone’s job description Data Quality should be a parameter of performance evaluations and incentive packages Employees should be assigned responsibility of data Stewardship responsibility including Establishing and forcing the policies Defining data quality parameters and standards Data classifications and processing Address the major reasons for the failure to fill this role Data is not recognized as an asset Political or cultural consideration (e.g. who should be responsible for customer data) The difficulty involved and other priorities Data should be modeled like other assets Data should be modeled via business or enterprise data model Compromise between accuracy and availability of data

Data Governance Data Governance The formal orchestration of people, process, and technology to enable an organization to leverage data as an enterprise asset. CH Data governance Model is a set of processes, policies, standards and technologies required to manage and ensure the availability, accessibility, quality, consistency, auditability, and security of data within the organization Processes People Technology

Why Data Governance Do you have in mind any of the following questions What policies are in place, who writes them, and how they get approved and changed Which data should be prioritized, the location and value of the data What vulnerabilities exist, how risks are classified and which risks to accept, mitigate or transfer What controls are in place, who pays for the controls and their location How progress is measured, audit results and who receives this information What the governance process looks like and who is responsible for governing Having one or more of these questions means you need Data Governance

Data Governance Challenges Cultural barriers Lack of senior-level sponsorship Underestimating the amount of work involved Long on structure and policies, short on action Lack of business commitment Lack of understanding that business definitions vary Trying to move very fast from no-data-governance to enterprise- wide- data governance A lack of cross-organizational data governance structures, policy- making, risk calculation or data asset appreciation, causing a disconnect between business goals and IT programs. Governance policies are not linked to structured requirements gathering, forecasting and reporting. Risks are not addressed from a lifecycle perspective with common data repositories, policies, standards and calculation processes. Metadata and business glossaries are not used as to track data quality, bridge semantic differences and demonstrate the business value of data. Few technologies exist today to assess data values, calculate risk and support the human process of governing data usage in an enterprise. Controls, compliance and architecture are deployed before long- term consequences are modeled.

 Identify Target Source Systems  Identify Current Registration Processes  Document the current Data Lifecycle  Perform proper Data Profiling  Governance Mission Strategy, metrics and success measurements  Compliance Compliance to internal standards, polices and guidelines based on contracts, SLAs and Data definitions  Governance Office Data Stewards, stakeholders Monitor and Measure  Sponsorship  Strategic Direction  Funding  Advocacy  Oversight Data Governance Process  Identify Data cleansing Rules  Identify Rules of duplications  Identify Critical data changes

Data Governance Maturity Model CategoryDescription 1Organizational Structures & Awareness Describes the level of mutual responsibility between business and IT, and recognition of the fiduciary responsibility to govern data at different levels of management. 2StewardshipStewardship is a quality control discipline designed to ensure custodial care of data for asset enhancement, risk mitigation, and organizational control. 3PolicyPolicy is the written articulation of desired organizational behavior. 4Value CreationThe process by which data assets are qualified and quantified to enable the business to maximize the value created by data assets. 5Data Risk Management & Compliance The methodology by which risks are identified, qualified, quantified, avoided, accepted, mitigated, or transferred out. 6Information Security & Privacy Describes the policies, practices and controls used by an organization to mitigate risk and protect data assets.

Data Governance Maturity Model Cont. CategoryDescription 7Data ArchitectureThe architectural design of structured and unstructured data systems and applications that enable data availability and distribution to appropriate users. 8Data Quality Management Methods to measure, improve, and certify the quality and integrity of production, test, and archival data. 9Classification & Metadata The methods and tools used to create common semantic definitions for business and IT terms, data models, types, and repositories. Metadata that bridge human and computer understanding. 10Information Lifecycle Management Management A systemic policy-based approach to information collection, use, retention, and deletion. 11Audit Information, Logging & Reporting The organizational processes for monitoring and measuring the data value, risks, and efficacy of governance.

Short Term Plan – Collaborative Pattern Create Data Governance project Analyst leads from BUs to be the main members Modify the JDs and KPIs to reflect the data governance responsibilities Discuss and realize the Data governance mission statements, for example Data quality has to be within 90-to-95% Duplicates to be eliminated completely License Numbers to be validated and corrected … etc Identify the changes required at the source systems level BUs to modify their source systems to conform the data governance rules Get the right permissions to access PRD data Identify the key parameters for data profiling Dedicated resources for data profiling and data cleansing Plan for multiple iterations each of 2 weeks duration time Rebuild the data hub every 2 iterations Get the feed back from the consolidated view Repeat the same for maximum 6 months and close the project after documenting the as-is situation Data Governance Process Gain Executive support Determine Value of Data Monitor Efficiency Assess The As-Is Plan For Risk Define The To-Be

Long Term Plan – Operational Pattern Establish the data governance committee Create workgroup of techno-function members Modify the JDs and KPIs to reflect the data governance responsibilities Identify the master data domains (Customer, Product, ….etc) Identify the CLDM Standardize the reference data and lookup entities Streamline the maintenance and registration process (UMRP) Initiate an implementation project Go for Agile methodology having multiple iterations, assuring the backward compatibly Deploy components separately and monitor the situation Rebuild the data hub every 2 iterations Revise the mission statement, scope and technology Stabilize and finalize the process Identify the main integration points and realize them in a loosely coupled fashion as a separate integration layer

Roles To be involved 1.Domain Expert – Function consultant 2.Information architect 3.Data steward 4.Data Analyst 5.Business Analyst

Thanks You