SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
1
1
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Real World Data Governance
Using Data Governance
to Protect Sensitive Data
Monthly Webinar Series Hosted by DATAVERSITY
Robert S. Seiner – KIK Consulting / TDAN.com
May 17, 2018 – 11:00 a.m. PT / 2:00 p.m. ET
2
2
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Real-World Data Governance
Introduction
• Real-World Data Governance – Monthly Webinar Series
June 21, 2018 – Using Data Governance to Improve Data Understanding
July 18, 2018 – Improving Data Analytics with Data Governance
Third Thurs @ 2pm EST – Register at TDAN.com, KIKconsulting.com, DATAVERSITY.net
• Non-Invasive Data Governance Book
ISBN 9781935504856 / Technics Publishing / Amazon.com
• Speaking @ Dataversity Events
Data Governance & Information Quality (DGIQ) Conference – San Diego – June 11-15, 2018
Data Architecture Summit – Chicago – October 8-11, 2018
• Online Learning Plan
Non-Invasive Data Governance - DATAVERSITY Training Center
Seven Online Courses with Evaluations
• The Data Administration Newsletter (TDAN.com)
Twice Monthly – Data Articles, Columns, Blogs and Features
Produced by DATAVERSITY – Subscribe for emails
• KIK Consulting & Educational Services
KIKConsulting.com
Home of Non-Invasive Data Governance™
3
3
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• In this webinar we will discuss:
– Tips and techniques for classifying data and defining data handling rules
– Delivering roles appropriate for protecting sensitive data
– Selecting appropriate data sharing processes to govern
– Incremental implementation to protect the entire organization
– Measuring protection to demonstrate governance performance
Using Data Governance to Protect Sensitive Data
Agenda for Today’s Webinar
4
4
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Governance
– Data Governance is the Execution and Enforcement of Authority
Over the Protection of Sensitive Data and Data-Related Resources.
• Data Stewardship
– Data Stewardship is the Formalization of Accountability
Over the Protection of Sensitive Data and Data-Related Resources.
Using Data Governance to Protect Sensitive Data
Defining Data Governance
5
5
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Non-Invasive Data Governance™
– The practice of:
• applying formal accountability & behavior
• through non-invasive roles & responsibilities
• to existing and / or new processes
• to assure that the definition, production & usage of data
• assures regulatory compliance, security, privacy, protection & quality.
– Non-Invasive describes how governance is applied to assure
non-threatening management of valuable data assets.
Using Data Governance to Protect Sensitive Data
Defining Data Governance
• The goal is to be:
 Transparent.
 Supportive.
 Collaborative.
6
6
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Definition of Data Classification
– The act of putting data into a category.
• Definition of Data Handling Rules
– The way data should be controlled according to it’s classification.
Using Data Governance to Protect Sensitive Data
Tips / Techniques for Classifying Data, Defining Data Handling Rules
7
7
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Classification
Significantly improve
Information Lifecycle Management (ILM) processes.
Provide ability to
systemically apply governance in the form of
compliance and risk management.
Using Data Governance to Protect Sensitive Data
Data Classification
8
8
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
– Data Production
– Data Usage
Using Data Governance to Protect Sensitive Data
Data Classification
9
9
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
• Data requirements gathering
• Data definition and associated rules
• Data documentation and metadata
– Data Production
– Data Usage
Using Data Governance to Protect Sensitive Data
Data Classification
10
10
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
– Data Production
• Data sourcing
• Data certification
• Data retention and elimination
– Data Usage
Using Data Governance to Protect Sensitive Data
Data Classification
11
11
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
– Data Production
– Data Usage
• Data privacy
• Data regulations
• Data understanding
• Data sharing
Using Data Governance to Protect Sensitive Data
Data Classification
12
12
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Explicit Access Required
– Highly Sensitive
– Sensitive
– Internal Use Only
– Public
• The examples listed on the next few pages are only intended as rough guides.
Specific assets may require a higher or lower classification if they involve
particularly high-risk or low-risk matters.
Using Data Governance to Protect Sensitive Data
Data Classification
13
13
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Explicit Access Required
• This category is reserved for information requiring the highest level of
security. Primarily this is information for which the Company has
contractually agreed to protect from exposure. Information in this
category if exposed would almost certainly lead to significant monetary
and/or reputational loss.
– Examples include:
• Combined sales figures or key metrics such as sales percentages
• Legal actions or pending litigation material
Using Data Governance to Protect Sensitive Data
Data Classification
14
14
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Highly Sensitive
• Information that provides the organization with a very significant
competitive edge or is of such a nature that unauthorized disclosure
would expose the Company to the highest level of risk.
– Examples include:
• Nonpublic customer identifiable information
• Nonpublic personally identifiable employee information such as medical
or bank account information
• Nonpublic information regarding key strategic initiatives and business
plans
• Information including notations, documentation and pricing structure
• Nonpublic financial information about the company
Using Data Governance to Protect Sensitive Data
Data Classification
15
15
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Sensitive
• Nonpublic Company information that if disclosed would pose moderate
risk to the Company.
– Examples include:
• Aggregate customer information or financial information that could be
used to reach conclusions pertaining to company performance.
• Key technical information (diagrams) of systems such as POS, store
systems, etc.
• Product or marketing plans, forecasts
• Intellectual property or internal business practices
• Confidential information received from third parties
• Contracts and contract terms
Using Data Governance to Protect Sensitive Data
Data Classification
16
16
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Internal Use Only
• Information that is not intended to be published externally, but could
cause minor risk to the Company if released to unauthorized people or
entities. Access is limited to employees or other authorized individuals.
– Examples include:
• Corporate policies
• Organization charts
• Access content
• Meeting minutes and agenda
Using Data Governance to Protect Sensitive Data
Data Classification
17
17
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Public
• Information that is safe for external posting and is meant for general
information.
– Examples include:
• Public web site information
• Published reports such as corporate earnings
• Annual reports
• Regulatory required communications
Using Data Governance to Protect Sensitive Data
Data Classification
18
18
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
– Clearly state when they can handle the data
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
19
19
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
• Rules associated with how the data can be printed
• Rules associated with how the data can be displayed
• Rules associated with how the data can be transmitted / transferred
• Rules associated with how the data can be discussed
– Clearly state who can handle the data
– Clearly state when they can handle the data
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
20
20
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
• Rules associated with granting permission to receive data
• Rules associated with access to data
• Rules associated with sharing handling rules with receiver
– Clearly state when they can handle the data
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
21
21
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
– Clearly state when they can handle the data
• Rules associated with when the data will be made available
• Rules associated with when the access to the data will be given
• Rules associated with when the access will be taken away
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
22
22
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
– Clearly state when they can handle the data
– Clearly state what data can be shared
• Rules associated with how the data is classified
• Rules associated with who will classify the data
• Rules associated with how the rules will be communicated
Using Data Governance to Protect Sensitive Data
Data Handling
23
23
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules for data classified as:
– Highly Sensitive
– Sensitive
– Internal Use
– Public
Using Data Governance to Protect Sensitive Data
Data Handling
• Handling Rules should include:
– Printing
– Electronic Distribution
– Physical Distribution
– Displaying
– Discussing
24
24
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Highly Sensitive data
• The data should be marked as “HIGHLY SENSITIVE”.
• Access is given based on need-to-know and requires an ID, with quarterly
validation by Data Owners.
• Copying and printing should be minimized. Data must be encrypted when being
stored or transmitted (i.e. emailed, mailed, etc.).
• Data should not be stored or transmitted outside internal facilities/networks
without documented Executive approval.
• Physical copies should be printed only when necessary and stored at internal
locations in locked facilities at all times when not in use.
• VP approval is required for redistribution. Printed copies should be transported by
authorized employees only, and receipt must be confirmed and logged.
• Discussion should occur only on company premises with authorized personnel. This
data should not be discussed over the phone.
Using Data Governance to Protect Sensitive Data
Data Handling
25
25
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Sensitive data
• The data should be marked as “SENSITIVE”.
• Access is given on a need-to-know and requires an ID along with biannual
validation by Data Owners.
• Data must be encrypted when stored or transmitted.
• Physical copies should be printed only when necessary at internal facilities, stored
only at internal locations in locked containers, and shared in private on a need-to-
know basis.
• Physical media should be sent through an accountable commercial delivery service
and the receipt must be confirmed and logged.
• Discussion of the data should be limited to employees, customers, or partners on a
need-to-know basis, only in private outside public hearing.
Using Data Governance to Protect Sensitive Data
Data Handling
26
26
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Internal Use data
• The data should be marked as “INTERNAL USE”.
• System access is granted based on need-to-know and requires an ID.
• The data should be stored only on internal networks/systems or sanctioned cloud
systems.
• Physical copies of the data should be printed only when necessary, stored securely,
and shared on a need-to-know basis.
• Physical media should be sent through an accountable commercial delivery service.
• Discussion of the data should be limited to employees, customers, or partners on a
need-to-know basis.
Using Data Governance to Protect Sensitive Data
Data Handling
27
27
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Public data
• When handling public data, mark it as “PUBLIC”.
• There are no other data handling requirements.
Using Data Governance to Protect Sensitive Data
Data Handling
28
28
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Don’t forget to govern the …
… Definition of Data Classification and Data Handling Rules
… Production of Data Classification and Data Handling Rules
… Usage of Data Classification and Data Handling Rules
Using Data Governance to Protect Sensitive Data
Data Classification and Data Handling
29
29
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Role Levels for Data Governance
– Executive – Steering Committee
– Strategic – Data Governance Council
– Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators
– Operational – Operational Data Stewards (Definers, Producers, Users)
– Support – Data Governance Office (Team), IT, PMO, Legal, Communications …
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
30
30
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK
Endorse
Processes
Resolution
Processes
EXECUTIVE
STRATEGIC
TACTICAL
OPERATIONAL
SUPPORT
Domain
Processes
Daily
Processes
Enforce
Processes
Metric
Approval
Act
Metric
Acceptance
Domain
Metrics
Daily
Measurements
Collect
Report
Metrics
Policy
Directive
Best Practice
Guidelines
Standards
Requirements
Workflow
Glossary
Dictionary
Metadata
KIK Artifacts
(Common Data
Activity Matrices)
Support
Sponsor
Understand
Meetings
Status
Subject
Project
Orientation
On Boarding
Ongoing
Plan
Develop
Deliver
Steering
Committee
(Delegate)
Council
(Decision)
Domain
Stewards
Owners
(Subject)
Data
Stewards
(Daily)
DG Lead
Work Groups
Partners
(Function)
Copyright © 2017 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
LEVEL
EXECUTIVE – SENIOR LEADERSHIP TEAM
STRATEGIC – BUSINESS & TECHNOLOGY
TACTICAL – SUBJECT MATTER EXPERTISE
OPERATIONAL – DAILY JOB FUNCTION
SUPPORT – FUNCTIONAL MANAGEMENT
LEVELS
EXECUTIVE – SENIOR LEADERSHIP TEAM
STRATEGIC – BUSINESS & TECHNOLOGY MGMT
TACTICAL – SUBJECT MATTER EXPERTISE
OPERATIONAL – DAILY JOB FUNCTION
SUPPORT – FUNCTIONAL MANAGEMENT
COMPONENTS
ROLES (AUTHORITY) – FORMAL RESPONSIBILITY
PROCESSES – APPLICATION and ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED & DEVELOPED
Levels
Components
ROLES(AUTHORITY)
COMMUNICATIONS
TOOLS
METRICS
PROCESSES
31
31
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
32
32
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
33
33
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Executive – Steering Committee
– Mandate at a high level
– View Data Governance as playing an integral role
– Oversee enforcement of the rules associated with classification and handling
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
34
34
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Strategic – Data Governance Council
– Oversee the protection of sensitive data
– Approve the classification and handling rules
– Support ample communications about protecting sensitive data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
35
35
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators
– Define the rules associated with protecting data
– Communicate the rules associated with protecting data
– Enforce the rules associated with protecting data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
36
36
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Operational – Operational Data Stewards (Definers, Producers, Users)
– Learn the rules associated with protecting sensitive data
– Follow the rules associated with protecting sensitive data
– Share the rules associated with protecting sensitive data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
37
37
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Support – Data Governance Office (Team), IT, PMO, Legal, Communications …
– Guide the efforts to protect sensitive data
– Define the rules associated with protecting sensitive data
– Enforce the rules associated with protecting sensitive data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
38
38
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• When does Data Sharing take place?
– Hard-copy Reports
– Electronic Reports
– Ad-Hoc Queries
– File Transmissions
– Inter-Office Mail
– Files Acquired
– Data Display
– Conversation
Using Data Governance to Protect Sensitive Data
Selecting Appropriate Data Sharing Processes to Govern
39
39
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• What are Data Sharing processes?
– Defining, validating and approving (D-V-A) rules associated with data sharing
– D-V-A rules for determining who the data can be shared with
– D-V-A rules for determining when the data can be shared
– D-V-A rules for how the data can be physically sharing the data
– D-V-A rules for sharing the rules associated with sharing data
Using Data Governance to Protect Sensitive Data
Selecting Appropriate Data Sharing Processes to Govern
40
40
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
– Learn from your experience
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
41
41
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
• Start with a focused group
• Expand across business function
• Expand across locations and markets
– Identify an appropriate place to start
– Learn from your experience
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
42
42
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
• Depends on the data you are protecting (PII, PHI, IP, …)
• Depends on the level of support for the protecting sensitive data
• Depends on who is sponsoring the effort
– Learn from your experience
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
43
43
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
– Learn from your experience
• Audit your processes and learn from experience
• Measure the time-per-step to see inefficiencies and ineffectiveness
• Recognize people for their participation
• Relate governance efforts to calls for Continuous Improvement
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
44
44
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
– Learn from your experience
– Over-communicate whenever possible
• Place reminders of appropriate behavior in appropriate places
• Communicate through existing means
• Create new ways to communicate
– Newsletters
– Bulletin Boards
– Lunch and Learns
– Town Halls
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
45
45
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
– Education by Group, Function, Location, People
– Data Protection Communication Outlets
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
46
46
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
• Classification Rules Defined, Validated and Approved
• Data Handling Rules Defined, Validated and Approved
• Data Protection Communications Plan
• Data Protection Enforcement Plan
– Education by Group, Function, Location, People
– Data Protection Communication Outlets
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
47
47
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
– Education by Group, Function, Location, People
• Number of Groups, Functions, Locations, People Onboarded
• Percentage of the Organization Onboarded
• Updates to Data Protection Education Materials
– Data Protection Communication Outlets
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
48
48
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
– Education by Group, Function, Location, People
– Data Protection Communication Outlets
• Count of Available Outlets
• Number of Outlets Utilized
• Data Protection Communication Effectiveness
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
49
49
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• In this webinar we discussed:
– Tips and techniques for classifying data and defining data handling rules
– Delivering roles appropriate for protecting sensitive data
– Selecting appropriate data sharing processes to govern
– Incremental implementation to protect the entire organization
– Measuring protection to demonstrate governance performance
Using Data Governance to Protect Sensitive Data
Today’s Webinar
50
50
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Robert S. Seiner
KIK Consulting & Educational Services – KIKconsulting.com
The Data Administration Newsletter – TDAN.com
Post Office Box 112571, Upper St. Clair, Pennsylvania 15241
412.220.9643,
rseiner@tdan.com
@RSeiner @TDAN_com
Using Data Governance to Protect Sensitive Data
Contact Information

Contenu connexe

Tendances

Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...DATAVERSITY
 
Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!DATAVERSITY
 
Human Factors in Data Governance
Human Factors in Data GovernanceHuman Factors in Data Governance
Human Factors in Data GovernanceDATAVERSITY
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best PracticesDATAVERSITY
 
DI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics LeaderDI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics LeaderDATAVERSITY
 
Successful Data Governance Models and Frameworks
Successful Data Governance Models and FrameworksSuccessful Data Governance Models and Frameworks
Successful Data Governance Models and FrameworksDATAVERSITY
 
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management PurgatoryData-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management PurgatoryDATAVERSITY
 
Understanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyUnderstanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyDATAVERSITY
 
Lessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply ChainLessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply ChainDATAVERSITY
 
RWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data GovernanceRWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data GovernanceDATAVERSITY
 
Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesDATAVERSITY
 
Metadata Strategies - Data Squared
Metadata Strategies - Data SquaredMetadata Strategies - Data Squared
Metadata Strategies - Data SquaredDATAVERSITY
 
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful SwanData-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful SwanDATAVERSITY
 
The Value of Metadata
The Value of MetadataThe Value of Metadata
The Value of MetadataDATAVERSITY
 
RWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance PolicyRWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance PolicyDATAVERSITY
 
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of ThingsGoverning Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of ThingsDATAVERSITY
 
Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!DATAVERSITY
 
Data archiving, Data Management,
Data archiving, Data Management,Data archiving, Data Management,
Data archiving, Data Management,jobsref
 
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DATAVERSITY
 
Guidance on Data Management Plans
Guidance on Data Management PlansGuidance on Data Management Plans
Guidance on Data Management PlansICPSR
 

Tendances (20)

Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...
 
Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!
 
Human Factors in Data Governance
Human Factors in Data GovernanceHuman Factors in Data Governance
Human Factors in Data Governance
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
DI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics LeaderDI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics Leader
 
Successful Data Governance Models and Frameworks
Successful Data Governance Models and FrameworksSuccessful Data Governance Models and Frameworks
Successful Data Governance Models and Frameworks
 
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management PurgatoryData-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
 
Understanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyUnderstanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance Strategy
 
Lessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply ChainLessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply Chain
 
RWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data GovernanceRWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data Governance
 
Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance Strategies
 
Metadata Strategies - Data Squared
Metadata Strategies - Data SquaredMetadata Strategies - Data Squared
Metadata Strategies - Data Squared
 
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful SwanData-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
 
The Value of Metadata
The Value of MetadataThe Value of Metadata
The Value of Metadata
 
RWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance PolicyRWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance Policy
 
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of ThingsGoverning Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
 
Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!
 
Data archiving, Data Management,
Data archiving, Data Management,Data archiving, Data Management,
Data archiving, Data Management,
 
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
 
Guidance on Data Management Plans
Guidance on Data Management PlansGuidance on Data Management Plans
Guidance on Data Management Plans
 

Similaire à Using Data Governance to Protect Sensitive Data

RWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data UnderstandingRWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data UnderstandingDATAVERSITY
 
RWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data StewardsRWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data StewardsDATAVERSITY
 
How to Govern Your Master Data
How to Govern Your Master Data How to Govern Your Master Data
How to Govern Your Master Data DATAVERSITY
 
Formalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and ProceduresFormalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and ProceduresDATAVERSITY
 
RWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance PerformanceRWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance PerformanceDATAVERSITY
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceDATAVERSITY
 
RWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data StewardRWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data StewardDATAVERSITY
 
Real-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsReal-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsDATAVERSITY
 
RWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyRWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyDATAVERSITY
 
RWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data QualityRWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data QualityDATAVERSITY
 
RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata DATAVERSITY
 
RWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data GovernanceRWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data GovernanceDATAVERSITY
 
RWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information GovernanceRWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information GovernanceDATAVERSITY
 
RWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business ProcessesRWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business ProcessesDATAVERSITY
 
RWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data GovernanceRWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data GovernanceDATAVERSITY
 
Real-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsReal-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsDATAVERSITY
 
Data Governance & Data Steward Certification
Data Governance & Data Steward CertificationData Governance & Data Steward Certification
Data Governance & Data Steward CertificationDATAVERSITY
 
RWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data GovernanceRWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data GovernanceDATAVERSITY
 
RWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & ProceduresRWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & ProceduresDATAVERSITY
 
RWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart DataRWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart DataDATAVERSITY
 

Similaire à Using Data Governance to Protect Sensitive Data (20)

RWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data UnderstandingRWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data Understanding
 
RWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data StewardsRWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data Stewards
 
How to Govern Your Master Data
How to Govern Your Master Data How to Govern Your Master Data
How to Govern Your Master Data
 
Formalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and ProceduresFormalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and Procedures
 
RWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance PerformanceRWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance Performance
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and Compliance
 
RWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data StewardRWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data Steward
 
Real-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsReal-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance Tools
 
RWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyRWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance Policy
 
RWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data QualityRWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data Quality
 
RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata 
 
RWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data GovernanceRWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data Governance
 
RWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information GovernanceRWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information Governance
 
RWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business ProcessesRWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business Processes
 
RWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data GovernanceRWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data Governance
 
Real-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsReal-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework Components
 
Data Governance & Data Steward Certification
Data Governance & Data Steward CertificationData Governance & Data Steward Certification
Data Governance & Data Steward Certification
 
RWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data GovernanceRWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data Governance
 
RWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & ProceduresRWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & Procedures
 
RWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart DataRWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart Data
 

Plus de DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data LiteracyDATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for YouDATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling FundamentalsDATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectDATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsDATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best PracticesDATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageDATAVERSITY
 

Plus de DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Dernier

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 

Dernier (20)

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 

Using Data Governance to Protect Sensitive Data

  • 1. 1 1 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Real World Data Governance Using Data Governance to Protect Sensitive Data Monthly Webinar Series Hosted by DATAVERSITY Robert S. Seiner – KIK Consulting / TDAN.com May 17, 2018 – 11:00 a.m. PT / 2:00 p.m. ET
  • 2. 2 2 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Real-World Data Governance Introduction • Real-World Data Governance – Monthly Webinar Series June 21, 2018 – Using Data Governance to Improve Data Understanding July 18, 2018 – Improving Data Analytics with Data Governance Third Thurs @ 2pm EST – Register at TDAN.com, KIKconsulting.com, DATAVERSITY.net • Non-Invasive Data Governance Book ISBN 9781935504856 / Technics Publishing / Amazon.com • Speaking @ Dataversity Events Data Governance & Information Quality (DGIQ) Conference – San Diego – June 11-15, 2018 Data Architecture Summit – Chicago – October 8-11, 2018 • Online Learning Plan Non-Invasive Data Governance - DATAVERSITY Training Center Seven Online Courses with Evaluations • The Data Administration Newsletter (TDAN.com) Twice Monthly – Data Articles, Columns, Blogs and Features Produced by DATAVERSITY – Subscribe for emails • KIK Consulting & Educational Services KIKConsulting.com Home of Non-Invasive Data Governance™
  • 3. 3 3 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • In this webinar we will discuss: – Tips and techniques for classifying data and defining data handling rules – Delivering roles appropriate for protecting sensitive data – Selecting appropriate data sharing processes to govern – Incremental implementation to protect the entire organization – Measuring protection to demonstrate governance performance Using Data Governance to Protect Sensitive Data Agenda for Today’s Webinar
  • 4. 4 4 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Governance – Data Governance is the Execution and Enforcement of Authority Over the Protection of Sensitive Data and Data-Related Resources. • Data Stewardship – Data Stewardship is the Formalization of Accountability Over the Protection of Sensitive Data and Data-Related Resources. Using Data Governance to Protect Sensitive Data Defining Data Governance
  • 5. 5 5 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Non-Invasive Data Governance™ – The practice of: • applying formal accountability & behavior • through non-invasive roles & responsibilities • to existing and / or new processes • to assure that the definition, production & usage of data • assures regulatory compliance, security, privacy, protection & quality. – Non-Invasive describes how governance is applied to assure non-threatening management of valuable data assets. Using Data Governance to Protect Sensitive Data Defining Data Governance • The goal is to be:  Transparent.  Supportive.  Collaborative.
  • 6. 6 6 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Definition of Data Classification – The act of putting data into a category. • Definition of Data Handling Rules – The way data should be controlled according to it’s classification. Using Data Governance to Protect Sensitive Data Tips / Techniques for Classifying Data, Defining Data Handling Rules
  • 7. 7 7 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Classification Significantly improve Information Lifecycle Management (ILM) processes. Provide ability to systemically apply governance in the form of compliance and risk management. Using Data Governance to Protect Sensitive Data Data Classification
  • 8. 8 8 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition – Data Production – Data Usage Using Data Governance to Protect Sensitive Data Data Classification
  • 9. 9 9 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition • Data requirements gathering • Data definition and associated rules • Data documentation and metadata – Data Production – Data Usage Using Data Governance to Protect Sensitive Data Data Classification
  • 10. 10 10 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition – Data Production • Data sourcing • Data certification • Data retention and elimination – Data Usage Using Data Governance to Protect Sensitive Data Data Classification
  • 11. 11 11 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition – Data Production – Data Usage • Data privacy • Data regulations • Data understanding • Data sharing Using Data Governance to Protect Sensitive Data Data Classification
  • 12. 12 12 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Explicit Access Required – Highly Sensitive – Sensitive – Internal Use Only – Public • The examples listed on the next few pages are only intended as rough guides. Specific assets may require a higher or lower classification if they involve particularly high-risk or low-risk matters. Using Data Governance to Protect Sensitive Data Data Classification
  • 13. 13 13 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Explicit Access Required • This category is reserved for information requiring the highest level of security. Primarily this is information for which the Company has contractually agreed to protect from exposure. Information in this category if exposed would almost certainly lead to significant monetary and/or reputational loss. – Examples include: • Combined sales figures or key metrics such as sales percentages • Legal actions or pending litigation material Using Data Governance to Protect Sensitive Data Data Classification
  • 14. 14 14 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Highly Sensitive • Information that provides the organization with a very significant competitive edge or is of such a nature that unauthorized disclosure would expose the Company to the highest level of risk. – Examples include: • Nonpublic customer identifiable information • Nonpublic personally identifiable employee information such as medical or bank account information • Nonpublic information regarding key strategic initiatives and business plans • Information including notations, documentation and pricing structure • Nonpublic financial information about the company Using Data Governance to Protect Sensitive Data Data Classification
  • 15. 15 15 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Sensitive • Nonpublic Company information that if disclosed would pose moderate risk to the Company. – Examples include: • Aggregate customer information or financial information that could be used to reach conclusions pertaining to company performance. • Key technical information (diagrams) of systems such as POS, store systems, etc. • Product or marketing plans, forecasts • Intellectual property or internal business practices • Confidential information received from third parties • Contracts and contract terms Using Data Governance to Protect Sensitive Data Data Classification
  • 16. 16 16 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Internal Use Only • Information that is not intended to be published externally, but could cause minor risk to the Company if released to unauthorized people or entities. Access is limited to employees or other authorized individuals. – Examples include: • Corporate policies • Organization charts • Access content • Meeting minutes and agenda Using Data Governance to Protect Sensitive Data Data Classification
  • 17. 17 17 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Public • Information that is safe for external posting and is meant for general information. – Examples include: • Public web site information • Published reports such as corporate earnings • Annual reports • Regulatory required communications Using Data Governance to Protect Sensitive Data Data Classification
  • 18. 18 18 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data – Clearly state when they can handle the data – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 19. 19 19 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled • Rules associated with how the data can be printed • Rules associated with how the data can be displayed • Rules associated with how the data can be transmitted / transferred • Rules associated with how the data can be discussed – Clearly state who can handle the data – Clearly state when they can handle the data – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 20. 20 20 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data • Rules associated with granting permission to receive data • Rules associated with access to data • Rules associated with sharing handling rules with receiver – Clearly state when they can handle the data – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 21. 21 21 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data – Clearly state when they can handle the data • Rules associated with when the data will be made available • Rules associated with when the access to the data will be given • Rules associated with when the access will be taken away – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 22. 22 22 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data – Clearly state when they can handle the data – Clearly state what data can be shared • Rules associated with how the data is classified • Rules associated with who will classify the data • Rules associated with how the rules will be communicated Using Data Governance to Protect Sensitive Data Data Handling
  • 23. 23 23 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules for data classified as: – Highly Sensitive – Sensitive – Internal Use – Public Using Data Governance to Protect Sensitive Data Data Handling • Handling Rules should include: – Printing – Electronic Distribution – Physical Distribution – Displaying – Discussing
  • 24. 24 24 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Highly Sensitive data • The data should be marked as “HIGHLY SENSITIVE”. • Access is given based on need-to-know and requires an ID, with quarterly validation by Data Owners. • Copying and printing should be minimized. Data must be encrypted when being stored or transmitted (i.e. emailed, mailed, etc.). • Data should not be stored or transmitted outside internal facilities/networks without documented Executive approval. • Physical copies should be printed only when necessary and stored at internal locations in locked facilities at all times when not in use. • VP approval is required for redistribution. Printed copies should be transported by authorized employees only, and receipt must be confirmed and logged. • Discussion should occur only on company premises with authorized personnel. This data should not be discussed over the phone. Using Data Governance to Protect Sensitive Data Data Handling
  • 25. 25 25 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Sensitive data • The data should be marked as “SENSITIVE”. • Access is given on a need-to-know and requires an ID along with biannual validation by Data Owners. • Data must be encrypted when stored or transmitted. • Physical copies should be printed only when necessary at internal facilities, stored only at internal locations in locked containers, and shared in private on a need-to- know basis. • Physical media should be sent through an accountable commercial delivery service and the receipt must be confirmed and logged. • Discussion of the data should be limited to employees, customers, or partners on a need-to-know basis, only in private outside public hearing. Using Data Governance to Protect Sensitive Data Data Handling
  • 26. 26 26 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Internal Use data • The data should be marked as “INTERNAL USE”. • System access is granted based on need-to-know and requires an ID. • The data should be stored only on internal networks/systems or sanctioned cloud systems. • Physical copies of the data should be printed only when necessary, stored securely, and shared on a need-to-know basis. • Physical media should be sent through an accountable commercial delivery service. • Discussion of the data should be limited to employees, customers, or partners on a need-to-know basis. Using Data Governance to Protect Sensitive Data Data Handling
  • 27. 27 27 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Public data • When handling public data, mark it as “PUBLIC”. • There are no other data handling requirements. Using Data Governance to Protect Sensitive Data Data Handling
  • 28. 28 28 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Don’t forget to govern the … … Definition of Data Classification and Data Handling Rules … Production of Data Classification and Data Handling Rules … Usage of Data Classification and Data Handling Rules Using Data Governance to Protect Sensitive Data Data Classification and Data Handling
  • 29. 29 29 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Role Levels for Data Governance – Executive – Steering Committee – Strategic – Data Governance Council – Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators – Operational – Operational Data Stewards (Definers, Producers, Users) – Support – Data Governance Office (Team), IT, PMO, Legal, Communications … Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 30. 30 30 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK Endorse Processes Resolution Processes EXECUTIVE STRATEGIC TACTICAL OPERATIONAL SUPPORT Domain Processes Daily Processes Enforce Processes Metric Approval Act Metric Acceptance Domain Metrics Daily Measurements Collect Report Metrics Policy Directive Best Practice Guidelines Standards Requirements Workflow Glossary Dictionary Metadata KIK Artifacts (Common Data Activity Matrices) Support Sponsor Understand Meetings Status Subject Project Orientation On Boarding Ongoing Plan Develop Deliver Steering Committee (Delegate) Council (Decision) Domain Stewards Owners (Subject) Data Stewards (Daily) DG Lead Work Groups Partners (Function) Copyright © 2017 – Robert S. Seiner and KIK Consulting & Educational Services, LLC LEVEL EXECUTIVE – SENIOR LEADERSHIP TEAM STRATEGIC – BUSINESS & TECHNOLOGY TACTICAL – SUBJECT MATTER EXPERTISE OPERATIONAL – DAILY JOB FUNCTION SUPPORT – FUNCTIONAL MANAGEMENT LEVELS EXECUTIVE – SENIOR LEADERSHIP TEAM STRATEGIC – BUSINESS & TECHNOLOGY MGMT TACTICAL – SUBJECT MATTER EXPERTISE OPERATIONAL – DAILY JOB FUNCTION SUPPORT – FUNCTIONAL MANAGEMENT COMPONENTS ROLES (AUTHORITY) – FORMAL RESPONSIBILITY PROCESSES – APPLICATION and ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED & DEVELOPED Levels Components ROLES(AUTHORITY) COMMUNICATIONS TOOLS METRICS PROCESSES
  • 31. 31 31 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 32. 32 32 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 33. 33 33 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Executive – Steering Committee – Mandate at a high level – View Data Governance as playing an integral role – Oversee enforcement of the rules associated with classification and handling Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 34. 34 34 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Strategic – Data Governance Council – Oversee the protection of sensitive data – Approve the classification and handling rules – Support ample communications about protecting sensitive data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 35. 35 35 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators – Define the rules associated with protecting data – Communicate the rules associated with protecting data – Enforce the rules associated with protecting data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 36. 36 36 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Operational – Operational Data Stewards (Definers, Producers, Users) – Learn the rules associated with protecting sensitive data – Follow the rules associated with protecting sensitive data – Share the rules associated with protecting sensitive data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 37. 37 37 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Support – Data Governance Office (Team), IT, PMO, Legal, Communications … – Guide the efforts to protect sensitive data – Define the rules associated with protecting sensitive data – Enforce the rules associated with protecting sensitive data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 38. 38 38 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • When does Data Sharing take place? – Hard-copy Reports – Electronic Reports – Ad-Hoc Queries – File Transmissions – Inter-Office Mail – Files Acquired – Data Display – Conversation Using Data Governance to Protect Sensitive Data Selecting Appropriate Data Sharing Processes to Govern
  • 39. 39 39 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • What are Data Sharing processes? – Defining, validating and approving (D-V-A) rules associated with data sharing – D-V-A rules for determining who the data can be shared with – D-V-A rules for determining when the data can be shared – D-V-A rules for how the data can be physically sharing the data – D-V-A rules for sharing the rules associated with sharing data Using Data Governance to Protect Sensitive Data Selecting Appropriate Data Sharing Processes to Govern
  • 40. 40 40 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start – Learn from your experience – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 41. 41 41 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data • Start with a focused group • Expand across business function • Expand across locations and markets – Identify an appropriate place to start – Learn from your experience – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 42. 42 42 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start • Depends on the data you are protecting (PII, PHI, IP, …) • Depends on the level of support for the protecting sensitive data • Depends on who is sponsoring the effort – Learn from your experience – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 43. 43 43 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start – Learn from your experience • Audit your processes and learn from experience • Measure the time-per-step to see inefficiencies and ineffectiveness • Recognize people for their participation • Relate governance efforts to calls for Continuous Improvement – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 44. 44 44 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start – Learn from your experience – Over-communicate whenever possible • Place reminders of appropriate behavior in appropriate places • Communicate through existing means • Create new ways to communicate – Newsletters – Bulletin Boards – Lunch and Learns – Town Halls Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 45. 45 45 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection – Education by Group, Function, Location, People – Data Protection Communication Outlets Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 46. 46 46 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection • Classification Rules Defined, Validated and Approved • Data Handling Rules Defined, Validated and Approved • Data Protection Communications Plan • Data Protection Enforcement Plan – Education by Group, Function, Location, People – Data Protection Communication Outlets Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 47. 47 47 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection – Education by Group, Function, Location, People • Number of Groups, Functions, Locations, People Onboarded • Percentage of the Organization Onboarded • Updates to Data Protection Education Materials – Data Protection Communication Outlets Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 48. 48 48 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection – Education by Group, Function, Location, People – Data Protection Communication Outlets • Count of Available Outlets • Number of Outlets Utilized • Data Protection Communication Effectiveness Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 49. 49 49 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • In this webinar we discussed: – Tips and techniques for classifying data and defining data handling rules – Delivering roles appropriate for protecting sensitive data – Selecting appropriate data sharing processes to govern – Incremental implementation to protect the entire organization – Measuring protection to demonstrate governance performance Using Data Governance to Protect Sensitive Data Today’s Webinar
  • 50. 50 50 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Robert S. Seiner KIK Consulting & Educational Services – KIKconsulting.com The Data Administration Newsletter – TDAN.com Post Office Box 112571, Upper St. Clair, Pennsylvania 15241 412.220.9643, rseiner@tdan.com @RSeiner @TDAN_com Using Data Governance to Protect Sensitive Data Contact Information