SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Data and information governance: Getting this right to
support an information security programme
Ruth Robertson, Cardiff University
1/11/2016
Data and information governance:
Getting this right to support an
information security programme
Ruth Robertson
Deputy Director, Governance Team
Data & Information Governance Programme Manager
Cardiff University
The journey
Information security framework
Data & information management framework
Information Security
Framework Vision
The University will operate in a
manner where security of
information is balanced with
appropriate accessibility of
that information….
…providing the optimum level of
risk management to support the
University’s strategic goal of
being a world leading institution.
Policies
Roles and
ownership
Processes
Defined
terms
Tools
Training &
awareness
Procedures
Information Security
Framework – protect
information assets
from threats to
confidentiality,
integrity and
availability
Data
management -
control, protect,
deliver and
enhance the value
of data and
information
assets
Governance
Data Management Model
Data Governance Data Management
Data Architecture Business Intelligence
Defined
accountability
framework, strategy,
roles,
responsibilities,
policies and
procedures
Consistent view of
data landscape:
definitions,
standards, principles
and models
Data
Management
Principles
Information lifecycle
management, Shared
Data management,
measuring and
improving data quality,
Data management
problem resolution
Capability to use
data to inform
operations and
strategy and to
optimise
performance
Data Management Principles
Data is a valuable shared resource
• Data is a University asset, shared across University
functions and organisations for multiple purposes and
managed appropriately throughout its lifetime
Rationale
• Data is a key strategic resource supporting all of the
University functions and must be managed in a fashion
that creates most value for the University as a whole
• Subject to legal and regulatory commitments, data is of
most value when it is shared and reused. Protection of
the University's data against loss, leakage and tampering
is of critical importance.
Changes to roles and
responsibilities
• Information assets > data domains (plus)
• Information asset owners > Data Leads (plus)
• Data stewards > System Owners (Business)
• Data custodians > System Owners (Technical)
Data & information
governance goals
• To define, approve and communicate data
management and information security strategies,
policies, standards, architecture, procedures and
metrics
• To manage information security risk and resolve data
management issues
• To understand and promote the value of data and
information assets
• To oversee conformance with the above and provide
a mechanism to manage necessary exceptions
Governance bodies
Data & Information Management
Oversight Group
Senior Information
Risk Owner
Senior System Owners, University
Data Steward & Data Leads
Head of IT
Architecture Data Architecture Group
IT Technical Design
Authority
University
Data Steward
Membership
Categories &
Entitlements
Group
Senior Systems
Owner (Technical)
Management of
information assets
Data Domains Information
systems
End user
devices
People
Responsible
owners
Data Leads Senior System
Owners
(Technical &
Business)
Colleges/
Schools/Depts
Individual
members of
staff
Human
Resources
Line managers
Types of
security
controls
applied
Classification;
data use
principles;
permitted use
policy,
processes and
procedures
Technical
design and
configurations;
access control
policy,
processes and
procedures
Technical
configurations;
acceptable use
policy,
processes and
procedures
Vetting;
training and
awareness
raising;
behavioural
policy,
processes and
procedures
Current state
• Data & Information Management Oversight –
wide scope
• Getting to grips with roles and applying checks
and balances – digital workplace system
business owner
• Developing data model and classifying data as
we go
Questions?

Contenu connexe

Tendances

RDAP14: Data on a dime, building data services at James Madison University
RDAP14: Data on a dime, building data services at James Madison University RDAP14: Data on a dime, building data services at James Madison University
RDAP14: Data on a dime, building data services at James Madison University ASIS&T
 
EC Open Access Co-ordination workshop - 4th May 2011
EC Open Access Co-ordination workshop - 4th May 2011EC Open Access Co-ordination workshop - 4th May 2011
EC Open Access Co-ordination workshop - 4th May 2011Jisc
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Jisc
 
Mike Mertens Directions for RDM day one summary
Mike Mertens Directions for RDM day one summaryMike Mertens Directions for RDM day one summary
Mike Mertens Directions for RDM day one summaryJisc
 
RDM programme @ Edinburgh an institutional approach
RDM programme @ Edinburgh an institutional approachRDM programme @ Edinburgh an institutional approach
RDM programme @ Edinburgh an institutional approachJisc
 
Grampian safe haven, research data network
Grampian safe haven, research data networkGrampian safe haven, research data network
Grampian safe haven, research data networkJisc RDM
 
RDAP14 Poster: The DCC’s institutional engagement program: changing approache...
RDAP14 Poster: The DCC’s institutional engagement program: changing approache...RDAP14 Poster: The DCC’s institutional engagement program: changing approache...
RDAP14 Poster: The DCC’s institutional engagement program: changing approache...ASIS&T
 
DAF Survey Results, research data network
DAF Survey Results, research data networkDAF Survey Results, research data network
DAF Survey Results, research data networkJisc RDM
 
Jisc visions: research
Jisc visions: researchJisc visions: research
Jisc visions: researchJisc
 
Researcher needs - a researchers perspective
Researcher needs - a researchers perspectiveResearcher needs - a researchers perspective
Researcher needs - a researchers perspectiveJisc
 
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...OAbooks
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Jisc
 
Exploring learning analytics
 Exploring learning analytics Exploring learning analytics
Exploring learning analyticsJisc
 
UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...Jisc
 
RDAP14: DataONE: Data Observation Network for Earth
RDAP14: DataONE: Data Observation Network for EarthRDAP14: DataONE: Data Observation Network for Earth
RDAP14: DataONE: Data Observation Network for EarthASIS&T
 
Veronica Howe - Research Data Management
Veronica Howe - Research Data ManagementVeronica Howe - Research Data Management
Veronica Howe - Research Data Managementkclcompbio
 
Standardising research data policies, research data network
Standardising research data policies, research data networkStandardising research data policies, research data network
Standardising research data policies, research data networkJisc RDM
 
The case for learning analytics - Jisc Digifest 2016
The case for learning analytics - Jisc Digifest 2016The case for learning analytics - Jisc Digifest 2016
The case for learning analytics - Jisc Digifest 2016Jisc
 
From Data Sharing to Data Stewardship
From Data Sharing to Data StewardshipFrom Data Sharing to Data Stewardship
From Data Sharing to Data StewardshipICPSR
 
RDAP14: It’s a Real World: Developing Preservation Policy for Dryad
RDAP14: It’s a Real World: Developing Preservation Policy for DryadRDAP14: It’s a Real World: Developing Preservation Policy for Dryad
RDAP14: It’s a Real World: Developing Preservation Policy for DryadASIS&T
 

Tendances (20)

RDAP14: Data on a dime, building data services at James Madison University
RDAP14: Data on a dime, building data services at James Madison University RDAP14: Data on a dime, building data services at James Madison University
RDAP14: Data on a dime, building data services at James Madison University
 
EC Open Access Co-ordination workshop - 4th May 2011
EC Open Access Co-ordination workshop - 4th May 2011EC Open Access Co-ordination workshop - 4th May 2011
EC Open Access Co-ordination workshop - 4th May 2011
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...
 
Mike Mertens Directions for RDM day one summary
Mike Mertens Directions for RDM day one summaryMike Mertens Directions for RDM day one summary
Mike Mertens Directions for RDM day one summary
 
RDM programme @ Edinburgh an institutional approach
RDM programme @ Edinburgh an institutional approachRDM programme @ Edinburgh an institutional approach
RDM programme @ Edinburgh an institutional approach
 
Grampian safe haven, research data network
Grampian safe haven, research data networkGrampian safe haven, research data network
Grampian safe haven, research data network
 
RDAP14 Poster: The DCC’s institutional engagement program: changing approache...
RDAP14 Poster: The DCC’s institutional engagement program: changing approache...RDAP14 Poster: The DCC’s institutional engagement program: changing approache...
RDAP14 Poster: The DCC’s institutional engagement program: changing approache...
 
DAF Survey Results, research data network
DAF Survey Results, research data networkDAF Survey Results, research data network
DAF Survey Results, research data network
 
Jisc visions: research
Jisc visions: researchJisc visions: research
Jisc visions: research
 
Researcher needs - a researchers perspective
Researcher needs - a researchers perspectiveResearcher needs - a researchers perspective
Researcher needs - a researchers perspective
 
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...
 
Exploring learning analytics
 Exploring learning analytics Exploring learning analytics
Exploring learning analytics
 
UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...
 
RDAP14: DataONE: Data Observation Network for Earth
RDAP14: DataONE: Data Observation Network for EarthRDAP14: DataONE: Data Observation Network for Earth
RDAP14: DataONE: Data Observation Network for Earth
 
Veronica Howe - Research Data Management
Veronica Howe - Research Data ManagementVeronica Howe - Research Data Management
Veronica Howe - Research Data Management
 
Standardising research data policies, research data network
Standardising research data policies, research data networkStandardising research data policies, research data network
Standardising research data policies, research data network
 
The case for learning analytics - Jisc Digifest 2016
The case for learning analytics - Jisc Digifest 2016The case for learning analytics - Jisc Digifest 2016
The case for learning analytics - Jisc Digifest 2016
 
From Data Sharing to Data Stewardship
From Data Sharing to Data StewardshipFrom Data Sharing to Data Stewardship
From Data Sharing to Data Stewardship
 
RDAP14: It’s a Real World: Developing Preservation Policy for Dryad
RDAP14: It’s a Real World: Developing Preservation Policy for DryadRDAP14: It’s a Real World: Developing Preservation Policy for Dryad
RDAP14: It’s a Real World: Developing Preservation Policy for Dryad
 

En vedette

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Jisc
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 
Role of the CISO in Higher Education
Role of the CISO in Higher EducationRole of the CISO in Higher Education
Role of the CISO in Higher EducationJisc
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Jisc
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT securityJisc
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts nowJisc
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001Jisc
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinJisc
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning JanetJisc
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performanceJisc
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Jisc
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMINJisc
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at ImperialJisc
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceJisc
 
Science DMZ
Science DMZScience DMZ
Science DMZJisc
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Jisc
 
The Science DMZ
The Science DMZThe Science DMZ
The Science DMZJisc
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ securityJisc
 
Mike2.0 Information Governance Overview
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overviewsean.mcclowry
 
Embracing local devolution - two college's intriguing insights into respondin...
Embracing local devolution - two college's intriguing insights into respondin...Embracing local devolution - two college's intriguing insights into respondin...
Embracing local devolution - two college's intriguing insights into respondin...Jisc
 

En vedette (20)

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
Role of the CISO in Higher Education
Role of the CISO in Higher EducationRole of the CISO in Higher Education
Role of the CISO in Higher Education
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT security
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager Weinstein
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning Janet
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performance
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMIN
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at Imperial
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light Source
 
Science DMZ
Science DMZScience DMZ
Science DMZ
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...
 
The Science DMZ
The Science DMZThe Science DMZ
The Science DMZ
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ security
 
Mike2.0 Information Governance Overview
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overview
 
Embracing local devolution - two college's intriguing insights into respondin...
Embracing local devolution - two college's intriguing insights into respondin...Embracing local devolution - two college's intriguing insights into respondin...
Embracing local devolution - two college's intriguing insights into respondin...
 

Similaire à Data and information governance: getting this right to support an information security programme

Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureAlan McSweeney
 
Chapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM PractChapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM PractWilheminaRossi174
 
Uel information strategy development implementation v2-ac
Uel information strategy development  implementation v2-acUel information strategy development  implementation v2-ac
Uel information strategy development implementation v2-acGurdish Sandhu
 
Data management: expose, preserve, protect
Data management: expose, preserve, protectData management: expose, preserve, protect
Data management: expose, preserve, protectILRI
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptxRodolfoIII2
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Martin Lawrence
 
Research Data Management for SOE
Research Data Management for SOEResearch Data Management for SOE
Research Data Management for SOELynda Kellam
 
SIAS Bio-IT Conference_FINAL
SIAS Bio-IT Conference_FINALSIAS Bio-IT Conference_FINAL
SIAS Bio-IT Conference_FINALJohn Koch
 
Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...
Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...
Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...ARDC
 
Planning for Research Data Management
Planning for Research Data ManagementPlanning for Research Data Management
Planning for Research Data Managementdancrane_open
 
Planning for Research Data Managment
Planning for Research Data ManagmentPlanning for Research Data Managment
Planning for Research Data ManagmentDaniel Crane
 
chapter1-220725121543-7c158b33.pdf
chapter1-220725121543-7c158b33.pdfchapter1-220725121543-7c158b33.pdf
chapter1-220725121543-7c158b33.pdfMahmoudSOLIMAN380726
 
Chapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsChapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsAhmed Alorage
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)Muhammed Kedir Hiko
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 

Similaire à Data and information governance: getting this right to support an information security programme (20)

Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation Architecture
 
Data Quality+Security
Data Quality+SecurityData Quality+Security
Data Quality+Security
 
Data Management
Data ManagementData Management
Data Management
 
Chapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM PractChapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM Pract
 
Uel information strategy development implementation v2-ac
Uel information strategy development  implementation v2-acUel information strategy development  implementation v2-ac
Uel information strategy development implementation v2-ac
 
Data management: expose, preserve, protect
Data management: expose, preserve, protectData management: expose, preserve, protect
Data management: expose, preserve, protect
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptx
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
Research Data Management for SOE
Research Data Management for SOEResearch Data Management for SOE
Research Data Management for SOE
 
RungananW-DA&DG 201701 V2.0
RungananW-DA&DG 201701 V2.0RungananW-DA&DG 201701 V2.0
RungananW-DA&DG 201701 V2.0
 
SIAS Bio-IT Conference_FINAL
SIAS Bio-IT Conference_FINALSIAS Bio-IT Conference_FINAL
SIAS Bio-IT Conference_FINAL
 
Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...
Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...
Ands ttt2 perth_accelerate your data skills training_ top tips for topics and...
 
Planning for Research Data Management
Planning for Research Data ManagementPlanning for Research Data Management
Planning for Research Data Management
 
Planning for Research Data Managment
Planning for Research Data ManagmentPlanning for Research Data Managment
Planning for Research Data Managment
 
The SMART Way to Manage Research Data
The SMART Way to Manage Research DataThe SMART Way to Manage Research Data
The SMART Way to Manage Research Data
 
chapter1-220725121543-7c158b33.pdf
chapter1-220725121543-7c158b33.pdfchapter1-220725121543-7c158b33.pdf
chapter1-220725121543-7c158b33.pdf
 
Chapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsChapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data Assets
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 

Plus de Jisc

International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 
ExpertsknightOct23.pptx
ExpertsknightOct23.pptxExpertsknightOct23.pptx
ExpertsknightOct23.pptxJisc
 

Plus de Jisc (20)

International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 
ExpertsknightOct23.pptx
ExpertsknightOct23.pptxExpertsknightOct23.pptx
ExpertsknightOct23.pptx
 

Dernier

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Dernier (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Data and information governance: getting this right to support an information security programme

  • 1. Data and information governance: Getting this right to support an information security programme Ruth Robertson, Cardiff University 1/11/2016
  • 2. Data and information governance: Getting this right to support an information security programme Ruth Robertson Deputy Director, Governance Team Data & Information Governance Programme Manager Cardiff University
  • 3. The journey Information security framework Data & information management framework
  • 4.
  • 5. Information Security Framework Vision The University will operate in a manner where security of information is balanced with appropriate accessibility of that information…. …providing the optimum level of risk management to support the University’s strategic goal of being a world leading institution.
  • 6. Policies Roles and ownership Processes Defined terms Tools Training & awareness Procedures Information Security Framework – protect information assets from threats to confidentiality, integrity and availability Data management - control, protect, deliver and enhance the value of data and information assets Governance
  • 7. Data Management Model Data Governance Data Management Data Architecture Business Intelligence Defined accountability framework, strategy, roles, responsibilities, policies and procedures Consistent view of data landscape: definitions, standards, principles and models Data Management Principles Information lifecycle management, Shared Data management, measuring and improving data quality, Data management problem resolution Capability to use data to inform operations and strategy and to optimise performance
  • 8. Data Management Principles Data is a valuable shared resource • Data is a University asset, shared across University functions and organisations for multiple purposes and managed appropriately throughout its lifetime Rationale • Data is a key strategic resource supporting all of the University functions and must be managed in a fashion that creates most value for the University as a whole • Subject to legal and regulatory commitments, data is of most value when it is shared and reused. Protection of the University's data against loss, leakage and tampering is of critical importance.
  • 9. Changes to roles and responsibilities • Information assets > data domains (plus) • Information asset owners > Data Leads (plus) • Data stewards > System Owners (Business) • Data custodians > System Owners (Technical)
  • 10. Data & information governance goals • To define, approve and communicate data management and information security strategies, policies, standards, architecture, procedures and metrics • To manage information security risk and resolve data management issues • To understand and promote the value of data and information assets • To oversee conformance with the above and provide a mechanism to manage necessary exceptions
  • 11. Governance bodies Data & Information Management Oversight Group Senior Information Risk Owner Senior System Owners, University Data Steward & Data Leads Head of IT Architecture Data Architecture Group IT Technical Design Authority University Data Steward Membership Categories & Entitlements Group Senior Systems Owner (Technical)
  • 12. Management of information assets Data Domains Information systems End user devices People Responsible owners Data Leads Senior System Owners (Technical & Business) Colleges/ Schools/Depts Individual members of staff Human Resources Line managers Types of security controls applied Classification; data use principles; permitted use policy, processes and procedures Technical design and configurations; access control policy, processes and procedures Technical configurations; acceptable use policy, processes and procedures Vetting; training and awareness raising; behavioural policy, processes and procedures
  • 13. Current state • Data & Information Management Oversight – wide scope • Getting to grips with roles and applying checks and balances – digital workplace system business owner • Developing data model and classifying data as we go

Notes de l'éditeur

  1. Infosec and data management closely linked. Lots of work with the University’s Head of IT Architecture as data architecture and systems control underpin both. Data management principles at the core of this. Already working on these in a separate initiative fuelled by HESA and BI.