SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Keeping Your Data Clean
Reduced Risk Through Data Integrity
Stephen W. Di Rito
Sr. Manager
Enterprise Security Programs
Contents
©2018 Discover Financial Services 2
Keeping Your Data Clean
Background: Challenges for Discover 3
What is Data Integrity 6
Records Systems and Customization 7
Internal Procedures 17
Oversight through Metrics 22
External Data Visualization 27
Some Background…
©2018 Discover Financial Services 3
Keeping Your Data Clean
• The Terrorist Watchlist (TSDB)
–Multiple databases created by
different vendors
–Requires accurate information which
balances between privacy and
protecting the nation
• Bomb Technician Response Notifications
- Internally developed FBI mobile application linked to a custom database
- Required flexibility to quickly change as developed new information sharing protocols
Initial Assessment of Discover’s Incident Tracking
©2018 Discover Financial Services 4
Keeping Your Data Clean
• Used Perspective over many years
• Database hosted on internal server vs. cloud
• Little customization other than adding new
incident categories
• No custom queries/No custom reports
• No oversight or formal incident review process
• DFS previously focused on medical response
Insert ES
Officer
photo
How Do We Get Better?
©2018 Discover Financial Services 5
Keeping Your Data Clean
• Discover is merging incident tracking and
investigations data into Perspective. Why?
⎯ Ability to connect individuals between workgroups
⎯ Ability to isolate Internal Investigation records
⎯ Ability to customize w/o vendor cost
⎯ Advanced customization through Resolver for fee
⎯ Consolidation into single GSOC aided by Dispatch
⎯ Modest price point compared to other solutions
What is Data Integrity?
©2018 Discover Financial Services 6
Keeping Your Data Clean
25%
Records
System
50%
Internal
Procedures
25%
Oversight
Combination of Several Factors
The Category (CCST) Challenge
©2018 Discover Financial Services 7
Keeping Your Data Clean – Records System
• Collect accurate incident information
⎯ Provides meaningful metrics
⎯ Ability to analyze data
⎯ Ability to identify officer training needs
• Choose your categories carefully
⎯ Use limited number of categories & expand modestly in Sub-Category/Type
⎯ Incidents should not fit multiple categories
Class
Category
Sub-Category
Type
Which Category to Choose?
©2018 Discover Financial Services 8
Put yourself in the GSOC operator’s role
Keeping Your Data Clean – Records System
Security Kidnapping Employee Criminal
Security Kidnapping Employee Terrorist
Security Intellectual Property Competitive Intelligence
Security Intellectual Property Compromise
Security Intellectual Property Counter Intelligence
Security Intellectual Property Electronic Eavesdropping
Security Intellectual Property Patent Infringement
Security Intellectual Property Theft of Information
Security Intellectual Property Trademark Infringement
How to Decide??
Criminal or Terrorist? Does it
matter?
Do my security officers know the
difference between these?
If you use categories like this,
make sure they are well defined
Example: 1041 Medical categories
• Types of injuries only limited by imagination
–Abrasions, Animal bite, Bug bite, Crushing, Cuts,
Heart attack, Stroke, etc., etc., etc.
–Most sub-categorized by the part of body affected
• Security should not be diagnosing medical events
• No consistency in how an event is categorized
–Facility, Life Safety, Medical, Safety, Travel Security,
Work Related Injury, Work Related Illness
• Now only one medical category with three sub-
categories (escorted to health services, treated at
scene, and transported off site)
©2018 Discover Financial Services 9
Keeping Your Data Clean – Records System
WORK RELATED INJURYAbrasion Caught Between Back
WORK RELATED INJURYAbrasion Caught Between Face
WORK RELATED INJURYAbrasion Caught Between Groin
WORK RELATED INJURYAbrasion Caught Between Left Ankle
WORK RELATED INJURYAbrasion Caught Between Left Arm
WORK RELATED INJURYAbrasion Caught Between Left Elbow
WORK RELATED INJURYAbrasion Caught Between Left Eye
WORK RELATED INJURYAbrasion Caught Between Left Fingers
WORK RELATED INJURYAbrasion Caught Between Left Foot
WORK RELATED INJURYAbrasion Caught Between Left Hand
WORK RELATED INJURYAbrasion Caught Between Left Knee
WORK RELATED INJURYAbrasion Caught Between Left Lower Leg
WORK RELATED INJURYAbrasion Caught Between Left Shoulder
WORK RELATED INJURYAbrasion Caught Between Left Upper Leg
WORK RELATED INJURYAbrasion Caught Between Left Wrist
WORK RELATED INJURYAbrasion Caught Between Right Ankle
WORK RELATED INJURYAbrasion Caught Between Right Arm
WORK RELATED INJURYAbrasion Caught Between Right Elbow
WORK RELATED INJURYAbrasion Caught Between Right Eye
WORK RELATED INJURYAbrasion Caught Between Right Fingers
WORK RELATED INJURYAbrasion Caught Between Right Foot
WORK RELATED INJURYAbrasion Caught Between Right Hand
WORK RELATED INJURYAbrasion Caught Between Right Knee
WORK RELATED INJURYAbrasion Caught Between Right Lower Leg
WORK RELATED INJURYAbrasion Caught Between Right Shoulder
WORK RELATED INJURYAbrasion Caught Between Right Upper Leg
WORK RELATED INJURYAbrasion Caught Between Right Wrist
How does Discover add medical detail?
• Occupational Health analyst reviews all medical incidents, gathers additional
details and updates record
–One person with medical training provides consistency and better accuracy
–Use Involvements/Persons sub-tab
©2018 Discover Financial Services 10
Keeping Your Data Clean – Records System
©2018 Discover Financial Services 11
Keeping Your Data Clean – Records System
How does Discover add medical detail?
Select to Add Injury Detail
©2018 Discover Financial Services 12
Keeping Your Data Clean – Records System
Allows entry of multiple injuries
Injury Cause
Severity
Use Flags to aid in gathering statistical data
• Flags only visible/Accessible to
OHS analyst
• Analyst determines custom flag
names
• Build count queries based on Flags
• Build detail reports based on Flags
©2018 Discover Financial Services 13
Keeping Your Data Clean – Records System
Flags and User Defined Fields
• Workplace Violence related
incidents or Investigations
–Single person making decisions
–Exclude visibility to others
• Ability to track special cases
–Aids in metrics reporting
• YOU decide what is important to
your company
©2018 Discover Financial Services 14
Keeping Your Data Clean – Records System
©2018 Discover Financial Services 15
Keeping Your Data Clean – Records System
• OLD
⎯ 106 Activities
⎯ 1267 Incidents
• NEW
⎯ 15 Activities
⎯ 16 Incidents
1373 Categories Reduced to 31
Count of Incident Number Column Labels
Row Labels Greenwood Houston Lake Park New Albany New Castle Phoenix Pittsford Riverwoods UPC (blank) Grand Total
Security - NEW 2 2 29 40 15 57 3 15 13 56 232
Access Control Violation 2 1 15 18
Battery 2 1 3
Damage/Vandalism of Property 1 1 2 2 6
Drug/Alcohol 1 1 2
Facility 1 1 2 1 2 7
Medical 2 9 9 1 10 4 3 38
Public Disturbance 1 1 2
Service Rendered -Emergency (non-medical) 1 1
Suspicious Incident 3 7 7 3 4 4 28
System Outage 1 1 2 5 9
Theft 1 3 2 1 7
Threat - including self-harm 7 13 9 19 1 49 98
Vehicle Accident 4 2 1 5 1 13
April 2018
Are There Fields You Do Not Use? Hide Them
©2018 Discover Financial Services 16
Default Modified
Keeping Your Data Clean – Records System
©2018 Discover Financial Services 17
Keeping Your Data Clean – Internal Procedures
Internal Review -
Start with a Flowchart
• Who reviews incidents?
–Includes multiple reviews
–Identifies pathway for correcting
reports
–Accompanied by instructions for
assigning record to next person
in the flowchart
–Requires separate query to
identify records not assigned
How Does Incident Record Get Reviewed?
©2018 Discover Financial Services 18
Keeping Your Data Clean – Internal Procedures
• Each individual in the flowchart completes review
⎯ Reassigns record back to originator for correction OR
⎯ Assigns record to next person in the flowchart
• If followed, each record is reviewed at least two times
• HQ review % of some incidents such as Threats, Battery, etc.
• Use the Controls Tab, Assignments sub-tab
1. Go to Controls Tab
2. Choose Assignments Sub-Tab
3. Select Add New
4. Choose Assignment Type
(note types are customized)
5. Select Ok and Save
Adding an Assignment
©2018 Discover Financial Services 19
Keeping Your Data Clean – Internal Procedures
What happens when I add an assignment?
©2018 Discover Financial Services 20
Keeping Your Data Clean – Internal Procedures
Assignment
shows up in
both receiver
and sender’s
dashboard
Controls to Identify Unassigned Records
©2018 Discover Financial Services 21
Keeping Your Data Clean – Internal Procedures
• Identify incidents created in last xx days not assigned to supervisor
⎯ Can build custom queries; Assigned to = null
⎯ Can export data to Excel and run multiple calculations externally
©2018 Discover Financial Services 22
Keeping Your Data Clean – Oversight
Activities & Incidents: 2017 – Q1 2018
2,411 2,279 2,430 2,605 2,739 2,499
1,734
2,301 2,411
4,157
3,576
4,460
6,239
5,801
6,834
276 241
372
501
922 1,493
1,260
1,338 1,253
1,194
1,047
756
907
1,077
1,114
-
1,000
2,000
3,000
4,000
5,000
6,000
7,000
8,000
9,000
JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC JAN FEB MAR
2017 2018
Enterprise Securities Activities and Incidents
Activity Incident
©2018 Discover Financial Services 23
Keeping Your Data Clean – Oversight
Top Security Activities: 2017 – Q1 2018
©2018 Discover Financial Services 24
Keeping Your Data Clean – Oversight
Top 8 Security Incidents: 2017 – Q1 2018
Business Unit Name or Logo
Export for Detailed Analysis – Example Tableau
©2018 Discover Financial Services 25
Keeping Your Data Clean – External Data Visualization
Business Unit Name or Logo
26
Keeping Your Data Clean – External Data Visualization
Questions?
Stephen Di Rito
stevedirito@discover.com
(224) 405-7895
Tableau Live Demo on Public space
https://public.tableau.com/profile/albert.chung#!/vizhome/SecurityDemo/Dashboard1

Contenu connexe

Tendances

Tendances (20)

How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special Teams
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 

Similaire à Keeping Your Data Clean

Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Rachel Hamilton
 

Similaire à Keeping Your Data Clean (20)

Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
 
Cyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance MarketsCyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance Markets
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
A Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessA Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for Business
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Equifax
Equifax Equifax
Equifax
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 

Plus de Resolver Inc.

Plus de Resolver Inc. (20)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Risk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New RiskRisk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New Risk
 
How to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with ExecutivesHow to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with Executives
 

Dernier

CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
amitlee9823
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
amitlee9823
 
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
amitlee9823
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
amitlee9823
 

Dernier (20)

CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 

Keeping Your Data Clean

  • 1. Keeping Your Data Clean Reduced Risk Through Data Integrity Stephen W. Di Rito Sr. Manager Enterprise Security Programs
  • 2. Contents ©2018 Discover Financial Services 2 Keeping Your Data Clean Background: Challenges for Discover 3 What is Data Integrity 6 Records Systems and Customization 7 Internal Procedures 17 Oversight through Metrics 22 External Data Visualization 27
  • 3. Some Background… ©2018 Discover Financial Services 3 Keeping Your Data Clean • The Terrorist Watchlist (TSDB) –Multiple databases created by different vendors –Requires accurate information which balances between privacy and protecting the nation • Bomb Technician Response Notifications - Internally developed FBI mobile application linked to a custom database - Required flexibility to quickly change as developed new information sharing protocols
  • 4. Initial Assessment of Discover’s Incident Tracking ©2018 Discover Financial Services 4 Keeping Your Data Clean • Used Perspective over many years • Database hosted on internal server vs. cloud • Little customization other than adding new incident categories • No custom queries/No custom reports • No oversight or formal incident review process • DFS previously focused on medical response Insert ES Officer photo
  • 5. How Do We Get Better? ©2018 Discover Financial Services 5 Keeping Your Data Clean • Discover is merging incident tracking and investigations data into Perspective. Why? ⎯ Ability to connect individuals between workgroups ⎯ Ability to isolate Internal Investigation records ⎯ Ability to customize w/o vendor cost ⎯ Advanced customization through Resolver for fee ⎯ Consolidation into single GSOC aided by Dispatch ⎯ Modest price point compared to other solutions
  • 6. What is Data Integrity? ©2018 Discover Financial Services 6 Keeping Your Data Clean 25% Records System 50% Internal Procedures 25% Oversight Combination of Several Factors
  • 7. The Category (CCST) Challenge ©2018 Discover Financial Services 7 Keeping Your Data Clean – Records System • Collect accurate incident information ⎯ Provides meaningful metrics ⎯ Ability to analyze data ⎯ Ability to identify officer training needs • Choose your categories carefully ⎯ Use limited number of categories & expand modestly in Sub-Category/Type ⎯ Incidents should not fit multiple categories Class Category Sub-Category Type
  • 8. Which Category to Choose? ©2018 Discover Financial Services 8 Put yourself in the GSOC operator’s role Keeping Your Data Clean – Records System Security Kidnapping Employee Criminal Security Kidnapping Employee Terrorist Security Intellectual Property Competitive Intelligence Security Intellectual Property Compromise Security Intellectual Property Counter Intelligence Security Intellectual Property Electronic Eavesdropping Security Intellectual Property Patent Infringement Security Intellectual Property Theft of Information Security Intellectual Property Trademark Infringement How to Decide?? Criminal or Terrorist? Does it matter? Do my security officers know the difference between these? If you use categories like this, make sure they are well defined
  • 9. Example: 1041 Medical categories • Types of injuries only limited by imagination –Abrasions, Animal bite, Bug bite, Crushing, Cuts, Heart attack, Stroke, etc., etc., etc. –Most sub-categorized by the part of body affected • Security should not be diagnosing medical events • No consistency in how an event is categorized –Facility, Life Safety, Medical, Safety, Travel Security, Work Related Injury, Work Related Illness • Now only one medical category with three sub- categories (escorted to health services, treated at scene, and transported off site) ©2018 Discover Financial Services 9 Keeping Your Data Clean – Records System WORK RELATED INJURYAbrasion Caught Between Back WORK RELATED INJURYAbrasion Caught Between Face WORK RELATED INJURYAbrasion Caught Between Groin WORK RELATED INJURYAbrasion Caught Between Left Ankle WORK RELATED INJURYAbrasion Caught Between Left Arm WORK RELATED INJURYAbrasion Caught Between Left Elbow WORK RELATED INJURYAbrasion Caught Between Left Eye WORK RELATED INJURYAbrasion Caught Between Left Fingers WORK RELATED INJURYAbrasion Caught Between Left Foot WORK RELATED INJURYAbrasion Caught Between Left Hand WORK RELATED INJURYAbrasion Caught Between Left Knee WORK RELATED INJURYAbrasion Caught Between Left Lower Leg WORK RELATED INJURYAbrasion Caught Between Left Shoulder WORK RELATED INJURYAbrasion Caught Between Left Upper Leg WORK RELATED INJURYAbrasion Caught Between Left Wrist WORK RELATED INJURYAbrasion Caught Between Right Ankle WORK RELATED INJURYAbrasion Caught Between Right Arm WORK RELATED INJURYAbrasion Caught Between Right Elbow WORK RELATED INJURYAbrasion Caught Between Right Eye WORK RELATED INJURYAbrasion Caught Between Right Fingers WORK RELATED INJURYAbrasion Caught Between Right Foot WORK RELATED INJURYAbrasion Caught Between Right Hand WORK RELATED INJURYAbrasion Caught Between Right Knee WORK RELATED INJURYAbrasion Caught Between Right Lower Leg WORK RELATED INJURYAbrasion Caught Between Right Shoulder WORK RELATED INJURYAbrasion Caught Between Right Upper Leg WORK RELATED INJURYAbrasion Caught Between Right Wrist
  • 10. How does Discover add medical detail? • Occupational Health analyst reviews all medical incidents, gathers additional details and updates record –One person with medical training provides consistency and better accuracy –Use Involvements/Persons sub-tab ©2018 Discover Financial Services 10 Keeping Your Data Clean – Records System
  • 11. ©2018 Discover Financial Services 11 Keeping Your Data Clean – Records System How does Discover add medical detail? Select to Add Injury Detail
  • 12. ©2018 Discover Financial Services 12 Keeping Your Data Clean – Records System Allows entry of multiple injuries Injury Cause Severity
  • 13. Use Flags to aid in gathering statistical data • Flags only visible/Accessible to OHS analyst • Analyst determines custom flag names • Build count queries based on Flags • Build detail reports based on Flags ©2018 Discover Financial Services 13 Keeping Your Data Clean – Records System
  • 14. Flags and User Defined Fields • Workplace Violence related incidents or Investigations –Single person making decisions –Exclude visibility to others • Ability to track special cases –Aids in metrics reporting • YOU decide what is important to your company ©2018 Discover Financial Services 14 Keeping Your Data Clean – Records System
  • 15. ©2018 Discover Financial Services 15 Keeping Your Data Clean – Records System • OLD ⎯ 106 Activities ⎯ 1267 Incidents • NEW ⎯ 15 Activities ⎯ 16 Incidents 1373 Categories Reduced to 31 Count of Incident Number Column Labels Row Labels Greenwood Houston Lake Park New Albany New Castle Phoenix Pittsford Riverwoods UPC (blank) Grand Total Security - NEW 2 2 29 40 15 57 3 15 13 56 232 Access Control Violation 2 1 15 18 Battery 2 1 3 Damage/Vandalism of Property 1 1 2 2 6 Drug/Alcohol 1 1 2 Facility 1 1 2 1 2 7 Medical 2 9 9 1 10 4 3 38 Public Disturbance 1 1 2 Service Rendered -Emergency (non-medical) 1 1 Suspicious Incident 3 7 7 3 4 4 28 System Outage 1 1 2 5 9 Theft 1 3 2 1 7 Threat - including self-harm 7 13 9 19 1 49 98 Vehicle Accident 4 2 1 5 1 13 April 2018
  • 16. Are There Fields You Do Not Use? Hide Them ©2018 Discover Financial Services 16 Default Modified Keeping Your Data Clean – Records System
  • 17. ©2018 Discover Financial Services 17 Keeping Your Data Clean – Internal Procedures Internal Review - Start with a Flowchart • Who reviews incidents? –Includes multiple reviews –Identifies pathway for correcting reports –Accompanied by instructions for assigning record to next person in the flowchart –Requires separate query to identify records not assigned
  • 18. How Does Incident Record Get Reviewed? ©2018 Discover Financial Services 18 Keeping Your Data Clean – Internal Procedures • Each individual in the flowchart completes review ⎯ Reassigns record back to originator for correction OR ⎯ Assigns record to next person in the flowchart • If followed, each record is reviewed at least two times • HQ review % of some incidents such as Threats, Battery, etc. • Use the Controls Tab, Assignments sub-tab
  • 19. 1. Go to Controls Tab 2. Choose Assignments Sub-Tab 3. Select Add New 4. Choose Assignment Type (note types are customized) 5. Select Ok and Save Adding an Assignment ©2018 Discover Financial Services 19 Keeping Your Data Clean – Internal Procedures
  • 20. What happens when I add an assignment? ©2018 Discover Financial Services 20 Keeping Your Data Clean – Internal Procedures Assignment shows up in both receiver and sender’s dashboard
  • 21. Controls to Identify Unassigned Records ©2018 Discover Financial Services 21 Keeping Your Data Clean – Internal Procedures • Identify incidents created in last xx days not assigned to supervisor ⎯ Can build custom queries; Assigned to = null ⎯ Can export data to Excel and run multiple calculations externally
  • 22. ©2018 Discover Financial Services 22 Keeping Your Data Clean – Oversight Activities & Incidents: 2017 – Q1 2018 2,411 2,279 2,430 2,605 2,739 2,499 1,734 2,301 2,411 4,157 3,576 4,460 6,239 5,801 6,834 276 241 372 501 922 1,493 1,260 1,338 1,253 1,194 1,047 756 907 1,077 1,114 - 1,000 2,000 3,000 4,000 5,000 6,000 7,000 8,000 9,000 JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC JAN FEB MAR 2017 2018 Enterprise Securities Activities and Incidents Activity Incident
  • 23. ©2018 Discover Financial Services 23 Keeping Your Data Clean – Oversight Top Security Activities: 2017 – Q1 2018
  • 24. ©2018 Discover Financial Services 24 Keeping Your Data Clean – Oversight Top 8 Security Incidents: 2017 – Q1 2018
  • 25. Business Unit Name or Logo Export for Detailed Analysis – Example Tableau ©2018 Discover Financial Services 25 Keeping Your Data Clean – External Data Visualization
  • 26. Business Unit Name or Logo 26 Keeping Your Data Clean – External Data Visualization
  • 28. Tableau Live Demo on Public space https://public.tableau.com/profile/albert.chung#!/vizhome/SecurityDemo/Dashboard1