SlideShare une entreprise Scribd logo
1  sur  180
Welcome!
         TITLE




                 How Safe is Your Data?
           Data Security Management Webinar


              Date:                                                  May 15, 2012
              Time:                                                  2:00 PM ET
              Presenter:                                             Dr. Peter Aiken
              Twitter:                                               #dataed




         PRODUCED BY                                                                      CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                         EDUCATION        5/15/2012           1
© Copyright this and previous years by Data Blueprint - all rights reserved!
New Feature: Live Twitter Feed
         TITLE




                                                         Join the conversation on Twitter!
                                    Follow us @datablueprint and @paiken
                                 Ask questions and submit your comments:
                                                 #dataed
         PRODUCED BY                                                                CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                   EDUCATION        5/15/2012           2
© Copyright this and previous years by Data Blueprint - all rights reserved!
New Feature: LIKE US on Facebook
         TITLE




                                                  www.facebook.com/datablueprint
                                                               Post questions and comments
                                               Find industry news, insightful content
                                                                               and event updates
         PRODUCED BY                                                                               CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                  EDUCATION        5/15/2012           3
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Meet Your Presenter: Dr. Peter Aiken
                                                                               •   Internationally recognized thought-leader in
                                                                                   the data management field with more than 30
                                                                                   years of experience
                                                                               •   Recipient of the 2010 International Stevens
                                                                                   Award
                                                                               •   Founding Director of Data Blueprint
                                                                                   (http://datablueprint.com)
                                                                               •   Associate Professor of Information Systems
                                                                                   at Virginia Commonwealth University
                                                                                   (http://vcu.edu)

         •          President of DAMA International (http://dama.org)
         •          DoD Computer Scientist, Reverse Engineering Program Manager/
                    Office of the Chief Information Officer
         •          Visiting Scientist, Software Engineering Institute/Carnegie Mellon
                    University
         •          7 books and dozens of articles
         •          Experienced w/ 500+ data management practices in 20 countries
                                                                                                                                        #dataed
         PRODUCED BY                                                                                            CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                               EDUCATION        5/15/2012           4
© Copyright this and previous years by Data Blueprint - all rights reserved!
How Safe Is Your
                                                                           Data?




          Dr. Peter Aiken: Data Security Management Webinar
DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060   EDUCATION   4/10/2012
How Safe Is Your
                                                                           Data?




          Dr. Peter Aiken: Data Security Management Webinar
DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060   EDUCATION   4/10/2012
How Safe Is Your
                                                                           Data?




          Dr. Peter Aiken: Data Security Management Webinar
DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060   EDUCATION   4/10/2012
How Safe Is Your
                                                                           Data?




          Dr. Peter Aiken: Data Security Management Webinar
DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060   EDUCATION   4/10/2012
How Safe Is Your
                                                                           Data?




          Dr. Peter Aiken: Data Security Management Webinar
DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060   EDUCATION   4/10/2012
TITLE
                     Outline




                                                                                    Tweeting now:
                                                                                      #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview




                                                                                    Tweeting now:
                                                                                      #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?




                                                                                    Tweeting now:
                                                                                      #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches




                                                                                    Tweeting now:
                                                                                      #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks




                                                                                    Tweeting now:
                                                                                      #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples


                                                                                    Tweeting now:
                                                                                      #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
                                                                                      #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           6
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge




                             Data Management Functions
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           7
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge
         Published by DAMA
         International




                             Data Management Functions
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           7
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge
         Published by DAMA
         International
         •          The professional
                    association for Data
                    Managers (40
                    chapters worldwide)




                             Data Management Functions
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           7
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge
         Published by DAMA
         International
         •          The professional
                    association for Data
                    Managers (40
                    chapters worldwide)
         DMBoK organized
         around




                             Data Management Functions
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           7
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge
         Published by DAMA
         International
         •          The professional
                    association for Data
                    Managers (40
                    chapters worldwide)
         DMBoK organized
         around
         •          Primary data
                    management
                    functions focused
                    around data delivery
                    to the organization




                             Data Management Functions
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           7
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge
         Published by DAMA
         International
         •          The professional
                    association for Data
                    Managers (40
                    chapters worldwide)
         DMBoK organized
         around
         •          Primary data
                    management
                    functions focused
                    around data delivery
                    to the organization
         •          Organized around
                    several
                    environmental
                    elements


                             Data Management Functions
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           7
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge
         Published by DAMA
         International
         •          The professional
                    association for Data
                    Managers (40
                    chapters worldwide)
         DMBoK organized
         around
         •          Primary data
                    management
                    functions focused
                    around data delivery
                    to the organization
         •          Organized around
                    several
                    environmental
                    elements


                             Data Management Functions
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           7
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge




         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           8
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge




                                                                               Environmental Elements
         PRODUCED BY                                                                 CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                    EDUCATION        5/15/2012           8
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
         The DAMA Guide to the Data Management Body of Knowledge

                                                                                             Amazon:
                                                                                              http://
                                                                                              www.amazon.com/
                                                                                              DAMA-Guide-
                                                                                              Management-
                                                                                              Knowledge-DAMA-
                                                                                              DMBOK/dp/
                                                                                              0977140083
                                                                                              Or enter the terms
                                                                                              "dama dm bok" at the
                                                                                              Amazon search
                                                                                              engine




                                                                               Environmental Elements
         PRODUCED BY                                                                 CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                    EDUCATION        5/15/2012           8
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     What is the CDMP?
            • Certified Data Management
              Professional
            • DAMA International and ICCP
            • Membership in a distinct group made
              up of your fellow professionals
            • Recognition for your specialized
              knowledge in a choice of 17 specialty
              areas
            • Series of 3 exams
            • For more information, please visit:
                         – http://www.dama.org/i4a/pages/
                           index.cfm?pageid=3399
                         – http://iccp.org/certification/
                           designations/cdmp
                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           9
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                                                                               Data Management




                                                                                                                    #dataed
         PRODUCED BY                                                                        CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                           EDUCATION        5/15/2012           10
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                                                                               Data Management

                       Data Program
                       Coordination


                                                                          Organizational
                                                                          Data Integration




                                                                                     Data Stewardship                    Data Development




                                                                                                        Data Support
                                                                                                         Operations




                                                                                                                                               #dataed
         PRODUCED BY                                                                                                   CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                      EDUCATION        5/15/2012           11
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                                                                               Data Management
                                               Manage data coherently.

                       Data Program
                       Coordination


                                                                          Organizational
                                                                          Data Integration




                                                                                     Data Stewardship                    Data Development




                                                                                                        Data Support
                                                                                                         Operations




                                                                                                                                               #dataed
         PRODUCED BY                                                                                                   CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                      EDUCATION        5/15/2012           11
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                                                                               Data Management
                                               Manage data coherently.

                       Data Program
                       Coordination
                                                                                                        Share data across boundaries.
                                                                          Organizational
                                                                          Data Integration




                                                                                     Data Stewardship                      Data Development




                                                                                                          Data Support
                                                                                                           Operations




                                                                                                                                                 #dataed
         PRODUCED BY                                                                                                     CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                        EDUCATION        5/15/2012           11
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                                                                               Data Management
                                               Manage data coherently.

                       Data Program
                       Coordination
                                                                                                        Share data across boundaries.
                                                                          Organizational
                                                                          Data Integration




                                                                                     Data Stewardship                      Data Development



               Assign responsibilities for data.



                                                                                                          Data Support
                                                                                                           Operations




                                                                                                                                                 #dataed
         PRODUCED BY                                                                                                     CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                        EDUCATION        5/15/2012           11
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                                                                               Data Management
                                               Manage data coherently.

                       Data Program
                       Coordination
                                                                                                        Share data across boundaries.
                                                                          Organizational
                                                                          Data Integration




                                                                                     Data Stewardship                      Data Development



               Assign responsibilities for data.
                                                                                                           Engineer data delivery systems.


                                                                                                          Data Support
                                                                                                           Operations




                                                                                                                                                 #dataed
         PRODUCED BY                                                                                                     CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                        EDUCATION        5/15/2012           11
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                                                                               Data Management
                                               Manage data coherently.

                       Data Program
                       Coordination
                                                                                                        Share data across boundaries.
                                                                          Organizational
                                                                          Data Integration




                                                                                     Data Stewardship                      Data Development



               Assign responsibilities for data.
                                                                                                           Engineer data delivery systems.


                                                                                                          Data Support
                                                                                                           Operations

                                           Maintain data availability.

                                                                                                                                                 #dataed
         PRODUCED BY                                                                                                     CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                        EDUCATION        5/15/2012           11
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           12
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           12
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Summary: Data Security Management




              #dataed                                                          from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                   CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012             13
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Definition: Data Security Management
            Planning, development and execution of security policies
            and procedures to provide proper authentication,
            authorization, access and auditing of data and information
            assets.




              #dataed                                                          from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                   CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012             14
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           15
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           15
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Top Data Security Concerns




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           16
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Top Data Security Concerns
            1. Confidentiality
                         – Making sure that data is supposed to be restricted to
                           the company




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           16
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Top Data Security Concerns
            1. Confidentiality
                         – Making sure that data is supposed to be restricted to
                           the company
            2. Integrity
                         – Ensure that the are no changes to data except those
                           intentional ones




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           16
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Top Data Security Concerns
            1. Confidentiality
                         – Making sure that data is supposed to be restricted to
                           the company
            2. Integrity
                         – Ensure that the are no changes to data except those
                           intentional ones
            3. Availability
                         – Ability to get data when it is needed




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           16
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Top Data Security Concerns
            1. Confidentiality
                         – Making sure that data is supposed to be restricted to
                           the company
            2. Integrity
                         – Ensure that the are no changes to data except those
                           intentional ones
            3. Availability
                         – Ability to get data when it is needed
            4. Non-repudiation
                         – Ability to prove what was sent, when, who sent it as
                           well as what was delivered, when it was delivered and
                           who received it
                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           16
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE

                     Data Security Requirements
                     Requirements and the procedures to meet them are
                     categorized into 4 basic groups (the 4 As):




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           17
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE

                     Data Security Requirements
                     Requirements and the procedures to meet them are
                     categorized into 4 basic groups (the 4 As):
                     1. Authentication
                                 Validate users are who they say they are




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           17
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE

                     Data Security Requirements
                     Requirements and the procedures to meet them are
                     categorized into 4 basic groups (the 4 As):
                     1. Authentication
                                 Validate users are who they say they are
                     2. Authorization
                                 Identify the right individuals and grant them
                                 the right privileges to specific, appropriate
                                 views of data




                                                                                                         #dataed
         PRODUCED BY                                                             CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                EDUCATION        5/15/2012           17
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE

                     Data Security Requirements
                     Requirements and the procedures to meet them are
                     categorized into 4 basic groups (the 4 As):
                     1. Authentication
                                 Validate users are who they say they are
                     2. Authorization
                                 Identify the right individuals and grant them
                                 the right privileges to specific, appropriate
                                 views of data
                     3. Access
                                 Enable these individuals and their privileges
                                 in a timely manner




                                                                                                         #dataed
         PRODUCED BY                                                             CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                EDUCATION        5/15/2012           17
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE

                     Data Security Requirements
                     Requirements and the procedures to meet them are
                     categorized into 4 basic groups (the 4 As):
                     1. Authentication
                                 Validate users are who they say they are
                     2. Authorization
                                 Identify the right individuals and grant them
                                 the right privileges to specific, appropriate
                                 views of data
                     3. Access
                                 Enable these individuals and their privileges
                                 in a timely manner
                     4. Audit
                                 Review security actions and user activity to
                                 ensure compliance with regulations and
                                 conformance with policy and standards
                                                                                                         #dataed
         PRODUCED BY                                                             CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                EDUCATION        5/15/2012           17
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security in the News
            6 Worst Data Breaches of 2011
            1. Sony
                         – Attacks compromised Sony PlayStation Network, Sony Online
                           Entertainment, and Sony Pictures
                         – Failure to protect 100+ user records
                         – On-going customer relations fallout and class-action
                           lawsuits
                         – Recovery costs: $2+ million


            2. Epsilon
                         – Cloud-based email service provider fell victim to spear-
                           phishing attack
                         – Breach affected data from 75 clients who trusted Epsilon
                           with their customers’ data
                         – 60 million customer email addresses were breached
                           (conservative estimate)
                         – Largest security breach ever
                                                                               Source: http://www.informationweek.com/news/security/attacks/232301079?itc=edit_in_body_cross
         PRODUCED BY                                                                                                       CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                          EDUCATION               5/15/2012               18
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security in the News, cont’d
            6 Worst Data Breaches of 2011
            3. RSA
                         –        Didn’t involve consumer information but one of the world’s most-used
                                  2-factor authentication system
                         –        Failure to detail exactly what had been stolen by low-tech spear
                                  phishing attack
                         –        Result of this attack: Many companies retooled security and training
                                  processes to help prevent these low-cost, easy-to-execute social-
                                  engineering attacks



            4. Sutter Physician Services
                         –        Thief stole desktop containing 2.2 million patients’ medical details
                         –        Security lapse on 2 levels:
                                       •      (1)Data (unencrypted)
                                       •      (2)Physical location (unsecured)
                         –        Failure to alert affected patients in timely manner
                         –        Class action lawsuit

                                                                               Source: http://www.informationweek.com/news/security/attacks/232301079?itc=edit_in_body_cross
         PRODUCED BY                                                                                                       CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                          EDUCATION               5/15/2012               19
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security in the News, cont’d
            6 Worst Data Breaches of 2011
            5. Tricare and SAIC
                         – Backup tapes containing unencrypted data were stolen from an
                           employee’s personal car
                         – 5.1 million people affected: Current and retired members of
                           armed services and their families
                         – Significant because victims are at risk of medical identify
                           theft AND financial identity theft
                         – $4.9 billion lawsuit



            6. Nasdaq
                         – Attack on Directors Desk, a cloud-based Nasdaq system
                           designed to facilitate boardroom-level communications for
                           10,000 senior executives and company directors
                         – Possible access to inside information that might have been
                           sold to competitors or used to make beneficial stock market

                                                                               Source: http://www.informationweek.com/news/security/attacks/232301079?itc=edit_in_body_cross
         PRODUCED BY                                                                                                       CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                          EDUCATION               5/15/2012               20
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                Cost of NOT having Accurate Security: Other Examples

            • 2008: Heartland Payment                                          • 2006: Department of VA
              Systems                                                             – Stolen laptop exposed records
                         – 130 million credit card numbers                          on 26.5 million veterans,
                                                                                    including SSNs
                         – $140 million recovery costs
                                                                                  – $14 million recovery costs

            • 2008: Hannaford Bros.
                         – 4.2 million credit and debit card
                                                                               • 2005: Card Systems
                           numbers                                               Solutions
                         – Class action lawsuit                                   – 40 million credit and debit card
                                                                                    accounts

            • 2007: TJ X Co.
                         – 45 + million credit and debit card
                           numbers stolen
                         – $250+ million recovery cost


              #dataed
         PRODUCED BY                                                                        CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                           EDUCATION        5/15/2012           21
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Polling Question #1
            What is the cost of data security? Estimated cost
            per individual breach:

                                                   1.              $194
                                                   2.              $467
                                                   3.              $855
                                                   4.              $1026




         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           22
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               23
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
            •         Cost of individual data breach is decreasing for the first time in 7
                      years




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               23
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
            •         Cost of individual data breach is decreasing for the first time in 7
                      years
            •         Cost of individual data breach:
                         – $5.5 million (2011) vs. $7.2 million (2010)




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               23
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
            •         Cost of individual data breach is decreasing for the first time in 7
                      years
            •         Cost of individual data breach:
                         – $5.5 million (2011) vs. $7.2 million (2010)
            •         Cost per compromised record:
                         – $194 (2011) from $215 (2010)
                         – Exception: Breach as a result of malicious attacks average $222 per record
                           (higher because companies need to do more after the fact)




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               23
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
            •         Cost of individual data breach is decreasing for the first time in 7
                      years
            •         Cost of individual data breach:
                         – $5.5 million (2011) vs. $7.2 million (2010)
            •         Cost per compromised record:
                         – $194 (2011) from $215 (2010)
                         – Exception: Breach as a result of malicious attacks average $222 per record
                           (higher because companies need to do more after the fact)
            •         Costs are generally lower if organizations have Chief Information
                      Security Officer (CISO)




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               23
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
            •         Cost of individual data breach is decreasing for the first time in 7
                      years
            •         Cost of individual data breach:
                         – $5.5 million (2011) vs. $7.2 million (2010)
            •         Cost per compromised record:
                         – $194 (2011) from $215 (2010)
                         – Exception: Breach as a result of malicious attacks average $222 per record
                           (higher because companies need to do more after the fact)
            •         Costs are generally lower if organizations have Chief Information
                      Security Officer (CISO)
            •         Other declines in 2011:
                         – Average size of data breaches declined by 16%
                         – Abnormal customer churn decreased by 18%




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               23
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
            •         Cost of individual data breach is decreasing for the first time in 7
                      years
            •         Cost of individual data breach:
                         – $5.5 million (2011) vs. $7.2 million (2010)
            •         Cost per compromised record:
                         – $194 (2011) from $215 (2010)
                         – Exception: Breach as a result of malicious attacks average $222 per record
                           (higher because companies need to do more after the fact)
            •         Costs are generally lower if organizations have Chief Information
                      Security Officer (CISO)
            •         Other declines in 2011:
                         – Average size of data breaches declined by 16%
                         – Abnormal customer churn decreased by 18%
            •         Interesting fact: in 2011 39% of data breaches were caused by
                      negligent insiders and 24% by system glitches
                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               23
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               24
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
                •          Breaches caused by malicious attacks increased: 37% (2011) from
                           31% (2010)
                              –        50% malware
                              –        33% malicious insiders
                              –        28% device theft
                              –        28% SQL injection
                              –        22% phishing attacks
                              –        17% social engineering attacks




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               24
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
                •          Breaches caused by malicious attacks increased: 37% (2011) from
                           31% (2010)
                              –        50% malware
                              –        33% malicious insiders
                              –        28% device theft
                              –        28% SQL injection
                              –        22% phishing attacks
                              –        17% social engineering attacks
                •          Businesses’ detection costs decreased by 6%: $428,330 (2011)
                           from $455,670 (2010)
                              – Companies are more efficient in investigating breaches and organizing around
                                response plans




                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               24
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Statistics (2011)
                •          Breaches caused by malicious attacks increased: 37% (2011) from
                           31% (2010)
                              –        50% malware
                              –        33% malicious insiders
                              –        28% device theft
                              –        28% SQL injection
                              –        22% phishing attacks
                              –        17% social engineering attacks
                •          Businesses’ detection costs decreased by 6%: $428,330 (2011)
                           from $455,670 (2010)
                              – Companies are more efficient in investigating breaches and organizing around
                                response plans
                •          Notification costs increased by 10% $561,495 (2011)
                              – Failure to accurately determine # of individuals affected can result in notifying
                                more people than necessary, which leads to higher churn and other cost-
                                increasing factors
                              – Balance of being timely and accurate at the same time

                                                                               Source: http://www.informationweek.com/news/security/attacks/232602891
         PRODUCED BY                                                                              CLASSIFICATION         DATE             SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012               24
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Costs Related to Data Security Breaches




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           25
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Costs Related to Data Security Breaches
            • Customer churn (replacing lost customers with new ones)




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           25
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Costs Related to Data Security Breaches
            • Customer churn (replacing lost customers with new ones)

            • Value of stolen data




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           25
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Costs Related to Data Security Breaches
            • Customer churn (replacing lost customers with new ones)

            • Value of stolen data

            • Cost of protecting
              affected victims




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           25
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Costs Related to Data Security Breaches
            • Customer churn (replacing lost customers with new ones)

            • Value of stolen data

            • Cost of protecting
              affected victims

            • Cost of remedial
              security measures




                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           25
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Costs Related to Data Security Breaches
            • Customer churn (replacing lost customers with new ones)

            • Value of stolen data

            • Cost of protecting
              affected victims

            • Cost of remedial
              security measures

            • Fines/Lawsuits


                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           25
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Costs Related to Data Security Breaches
            • Customer churn (replacing lost customers with new ones)

            • Value of stolen data

            • Cost of protecting
              affected victims

            • Cost of remedial
              security measures

            • Fines/Lawsuits

            • Loss of good will and reputation
                                                                                                       #dataed
         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           25
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Examples of Security Breaches
                                           Organization                               Type of Security Breach
                                                                               Medical Records thrown in trash
              Boulder Hospital                                                 exposing 14 patients
                                                                               1,000 patients radiology studies data
              Griffin Hospital
                                                                               stolen
                                                                               Stolen backup tapes expose unknown
              Proxima Alfa Investments                                         number of clients’ names, addresses,
              LLC                                                              SSNs, bank and tax numbers and copies
                                                                               of passports
                                                                               Data of 3,300,000 names, addresses,
              Educational Credit
                                                                               DoB and SSNs exposed on stolen
              Management Corporation                                           portable media device

              Northwestern Memorial                                            250 patients’ files stolen from unlocked
              Hospital                                                         cabinets by cleaning crew

                                                                                                   Source: http://dataloss.db.org/; David Schlesinger
         PRODUCED BY                                                                              CLASSIFICATION         DATE               SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION               5/15/2012                 26
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Other Examples, cont’d
                                           Organization                              Type of Security Breach
              Evergreen, Vancouver,                                            5,000 employee’s information, including
              Washington Schools                                               back account information, SSNs and
              Information Cooperative                                          birth dates are compromised
                                           Names, addresses and SSNs of 11,000
              Connecticut Office of Policy
                                           rebate applications are stolen
              and Management
                                                                               Stolen laptop exposes 9,500 clients’
              Thrivent Financial for
                                                                               names, addresses, SSNs and health
              Lutherans                                                        information
                                                                               Data of 100 million gamers exposed
                                                                               when hackers broke into PC games
              Sony Online Entertainment                                        network, including names, addresses,
                                                                               user names, passwords, credit card
                                                                               information

                                                                                                  Source: http://dataloss.db.org/; David Schlesinger
         PRODUCED BY                                                                             CLASSIFICATION         DATE               SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                EDUCATION               5/15/2012                 27
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Polling Question #2
            How much time should be committed to data
            security?
                                                                               1.   1 day per week
                                                                               2.   Ongoing activity
                                                                               3.   1 hour per day
                                                                               4.   1 hour per month




         PRODUCED BY                                                                              CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                 EDUCATION        5/15/2012           28
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     And in this corner we have Dave!




         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           29
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           30
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Outline
            1. Data Management Overview
            2. What is data security management?
            3. Why is data security important?
                        (1) Top Data Security Concerns & Requirements
                        (2) The Cost of Not Having Accurate Security
                        (3) Data Security Statistics & Examples of Security
                            Breaches
            4. Data Security Management Building
               Blocks
            5. Passwords & Policy Examples
            6. Data Security Standards & Guiding
               Principles
                                                                                    Tweeting now:
            7. Take Aways, References & Q&A                                           #dataed

         PRODUCED BY                                                           CLASSIFICATION   DATE        SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060              EDUCATION        5/15/2012           30
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Management Overview


                                                                                                                                                                              
                                                                                                                                                                              
                                                                                                                                                                              
                                                                                                                                                                              




             #dataed                                                              Illustration from The DAMA Guide to the Data Management Body of Knowledge p. 37 © 2009 by DAMA International
        PRODUCED BY                                                                                                                             CLASSIFICATION         DATE             SLIDE
        DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                                                EDUCATION               5/15/2012                31
©36
 Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Management Overview


                                                                                                                                                                              
                                                                                                                                                                              
                                                                                                                                                                              
                                                                                                                                                                              




             #dataed                                                              Illustration from The DAMA Guide to the Data Management Body of Knowledge p. 37 © 2009 by DAMA International
        PRODUCED BY                                                                                                                             CLASSIFICATION         DATE             SLIDE
        DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                                                EDUCATION               5/15/2012                31
©36
 Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Goals and Principles




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               32
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Goals and Principles
            1. Enable appropriate, and
               prevent inappropriate
               access and change to data
               assets




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               32
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Goals and Principles
            1. Enable appropriate, and
               prevent inappropriate
               access and change to data
               assets

            2. Meet regulatory
               requirements for privacy
               and confidentiality




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               32
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Goals and Principles
            1. Enable appropriate, and
               prevent inappropriate
               access and change to data
               assets

            2. Meet regulatory
               requirements for privacy
               and confidentiality

            3. Endure the privacy and
               confidentiality needs of all
               stakeholders are met
                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               32
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Potentially Competing Concerns




              #dataed                                                          from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               33
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Potentially Competing Concerns
            1. Stakeholder Concerns
                        •              Clients, patients, students, citizens, suppliers,
                                       partners




              #dataed                                                          from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               33
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Potentially Competing Concerns
            1. Stakeholder Concerns
                        •              Clients, patients, students, citizens, suppliers,
                                       partners
            2. Government Regulations
                        •              Restricting access to information
                        •              Openness, transparency and accountability




              #dataed                                                          from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               33
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Potentially Competing Concerns
            1. Stakeholder Concerns
                        •              Clients, patients, students, citizens, suppliers,
                                       partners
            2. Government Regulations
                        •              Restricting access to information
                        •              Openness, transparency and accountability
            3. Proprietary Business
               Concerns
                        •              Competitive advantage, IP,
                                       intimate knowledge of
                                       customer needs/relationships


              #dataed                                                          from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               33
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Potentially Competing Concerns
            1. Stakeholder Concerns
                        •              Clients, patients, students, citizens, suppliers,
                                       partners
            2. Government Regulations
                        •              Restricting access to information
                        •              Openness, transparency and accountability
            3. Proprietary Business
               Concerns
                        •              Competitive advantage, IP,
                                       intimate knowledge of
                                       customer needs/relationships
            4. Legitimate Access Needs
                        •              Strategy, rules, processes
              #dataed                                                          from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               33
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Activities




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               34
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Activities
                   • Understand Data Security Needs and
                     Regulatory Requirements




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               34
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Activities
                   • Understand Data Security Needs and
                     Regulatory Requirements
                                – Business requirements




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               34
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Activities
                   • Understand Data Security Needs and
                     Regulatory Requirements
                                – Business requirements
                                – Regulatory requirements




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               34
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Activities
                   • Understand Data Security Needs and
                     Regulatory Requirements
                                – Business requirements
                                – Regulatory requirements
                   • Define Data Security Policy




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               34
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Activities
                   • Understand Data Security Needs and
                     Regulatory Requirements
                                – Business requirements
                                – Regulatory requirements
                   • Define Data Security Policy
                   • Define Data Security Standards




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               34
© Copyright this and previous years by Data Blueprint - all rights reserved!
TITLE
                     Data Security Activities
                   • Understand Data Security Needs and
                     Regulatory Requirements
                                – Business requirements
                                – Regulatory requirements
                   • Define Data Security Policy
                   • Define Data Security Standards
                   • Classify Information Confidentiality




                                                                               from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International
         PRODUCED BY                                                                                                    CLASSIFICATION        DATE            SLIDE
         DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060                                                       EDUCATION             5/15/2012               34
© Copyright this and previous years by Data Blueprint - all rights reserved!
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security Webinar

Contenu connexe

Tendances

DataEd Online: Let's Talk Metadata Strategies and Successes
DataEd Online: Let's Talk Metadata Strategies and SuccessesDataEd Online: Let's Talk Metadata Strategies and Successes
DataEd Online: Let's Talk Metadata Strategies and SuccessesDATAVERSITY
 
Real-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the CloudReal-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the CloudDATAVERSITY
 
Linked Data Approach for Integration of Human Health & Environmental Data
Linked Data Approach for Integration of Human Health & Environmental DataLinked Data Approach for Integration of Human Health & Environmental Data
Linked Data Approach for Integration of Human Health & Environmental Data3 Round Stones
 
Open Data Myths: busted!
Open Data Myths: busted!Open Data Myths: busted!
Open Data Myths: busted!Cofluence
 
What is data_science
What is data_scienceWhat is data_science
What is data_scienceidris2
 
Tech Titans
Tech TitansTech Titans
Tech TitansJESS3
 
Sentara Linked Data Workshop - Sept 10, 2012
Sentara Linked Data Workshop - Sept 10, 2012Sentara Linked Data Workshop - Sept 10, 2012
Sentara Linked Data Workshop - Sept 10, 20123 Round Stones
 
Government Linked Data Projects in the Wild
Government Linked Data Projects in the WildGovernment Linked Data Projects in the Wild
Government Linked Data Projects in the WildBernadette Hyland-Wood
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointImperva
 
DigitalDeath
DigitalDeathDigitalDeath
DigitalDeathchar74
 
KM Russia 2014 - John Girard
KM Russia 2014 - John GirardKM Russia 2014 - John Girard
KM Russia 2014 - John GirardJohn Girard
 
Galaxy Forum USA 2012 - Eleonora Babayants
Galaxy Forum USA 2012 - Eleonora BabayantsGalaxy Forum USA 2012 - Eleonora Babayants
Galaxy Forum USA 2012 - Eleonora BabayantsILOAHawaii
 
20111120 warsaw learning curve by b hyland notes
20111120 warsaw   learning curve by b hyland notes20111120 warsaw   learning curve by b hyland notes
20111120 warsaw learning curve by b hyland notesBernadette Hyland-Wood
 
Data Recovery Offline Solutions
Data Recovery Offline SolutionsData Recovery Offline Solutions
Data Recovery Offline Solutionsjustlinkitnow
 
Zen of metadata 09212010
Zen of metadata 09212010Zen of metadata 09212010
Zen of metadata 09212010ERwin Modeling
 
Rapid Semantic Web Application Development
Rapid Semantic Web Application DevelopmentRapid Semantic Web Application Development
Rapid Semantic Web Application DevelopmentBernadette Hyland-Wood
 
Big Data: Friend, Phantom or Foe?
Big Data: Friend, Phantom or Foe?Big Data: Friend, Phantom or Foe?
Big Data: Friend, Phantom or Foe?John Girard
 

Tendances (19)

DataEd Online: Let's Talk Metadata Strategies and Successes
DataEd Online: Let's Talk Metadata Strategies and SuccessesDataEd Online: Let's Talk Metadata Strategies and Successes
DataEd Online: Let's Talk Metadata Strategies and Successes
 
Real-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the CloudReal-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
 
Key Issues in eDiscovery
Key Issues in eDiscoveryKey Issues in eDiscovery
Key Issues in eDiscovery
 
Fall 2010 Jerry Sullivan
Fall 2010 Jerry SullivanFall 2010 Jerry Sullivan
Fall 2010 Jerry Sullivan
 
Linked Data Approach for Integration of Human Health & Environmental Data
Linked Data Approach for Integration of Human Health & Environmental DataLinked Data Approach for Integration of Human Health & Environmental Data
Linked Data Approach for Integration of Human Health & Environmental Data
 
Open Data Myths: busted!
Open Data Myths: busted!Open Data Myths: busted!
Open Data Myths: busted!
 
What is data_science
What is data_scienceWhat is data_science
What is data_science
 
Tech Titans
Tech TitansTech Titans
Tech Titans
 
Sentara Linked Data Workshop - Sept 10, 2012
Sentara Linked Data Workshop - Sept 10, 2012Sentara Linked Data Workshop - Sept 10, 2012
Sentara Linked Data Workshop - Sept 10, 2012
 
Government Linked Data Projects in the Wild
Government Linked Data Projects in the WildGovernment Linked Data Projects in the Wild
Government Linked Data Projects in the Wild
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePoint
 
DigitalDeath
DigitalDeathDigitalDeath
DigitalDeath
 
KM Russia 2014 - John Girard
KM Russia 2014 - John GirardKM Russia 2014 - John Girard
KM Russia 2014 - John Girard
 
Galaxy Forum USA 2012 - Eleonora Babayants
Galaxy Forum USA 2012 - Eleonora BabayantsGalaxy Forum USA 2012 - Eleonora Babayants
Galaxy Forum USA 2012 - Eleonora Babayants
 
20111120 warsaw learning curve by b hyland notes
20111120 warsaw   learning curve by b hyland notes20111120 warsaw   learning curve by b hyland notes
20111120 warsaw learning curve by b hyland notes
 
Data Recovery Offline Solutions
Data Recovery Offline SolutionsData Recovery Offline Solutions
Data Recovery Offline Solutions
 
Zen of metadata 09212010
Zen of metadata 09212010Zen of metadata 09212010
Zen of metadata 09212010
 
Rapid Semantic Web Application Development
Rapid Semantic Web Application DevelopmentRapid Semantic Web Application Development
Rapid Semantic Web Application Development
 
Big Data: Friend, Phantom or Foe?
Big Data: Friend, Phantom or Foe?Big Data: Friend, Phantom or Foe?
Big Data: Friend, Phantom or Foe?
 

En vedette

Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscapeVladimir Matviychuk
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Denning_Todd_Report
Denning_Todd_ReportDenning_Todd_Report
Denning_Todd_ReportTodd Denning
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Data security risks and the cost of business continuity (slideshare) tmcs q...
Data security risks and the cost of business continuity (slideshare)   tmcs q...Data security risks and the cost of business continuity (slideshare)   tmcs q...
Data security risks and the cost of business continuity (slideshare) tmcs q...tmcscs
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...Health IT Conference – iHT2
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
 
ciclo autonomico-short paper - Witfor 2016 paper_42
ciclo autonomico-short paper - Witfor 2016 paper_42ciclo autonomico-short paper - Witfor 2016 paper_42
ciclo autonomico-short paper - Witfor 2016 paper_42.. ..
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Affects of Media on the Mind
Affects of Media on the MindAffects of Media on the Mind
Affects of Media on the MindJanvi Pattni
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with HadoopCloudera, Inc.
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityBen Liu
 

En vedette (20)

Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscape
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Denning_Todd_Report
Denning_Todd_ReportDenning_Todd_Report
Denning_Todd_Report
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Data security risks and the cost of business continuity (slideshare) tmcs q...
Data security risks and the cost of business continuity (slideshare)   tmcs q...Data security risks and the cost of business continuity (slideshare)   tmcs q...
Data security risks and the cost of business continuity (slideshare) tmcs q...
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
ciclo autonomico-short paper - Witfor 2016 paper_42
ciclo autonomico-short paper - Witfor 2016 paper_42ciclo autonomico-short paper - Witfor 2016 paper_42
ciclo autonomico-short paper - Witfor 2016 paper_42
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Affects of Media on the Mind
Affects of Media on the MindAffects of Media on the Mind
Affects of Media on the Mind
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with Hadoop
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Similaire à Data-Ed Online: How Safe is Your Data? Data Security Webinar

Data-Ed: Get the Most Out of Your Tools: Data Management Technologies
Data-Ed: Get the Most Out of Your Tools: Data Management TechnologiesData-Ed: Get the Most Out of Your Tools: Data Management Technologies
Data-Ed: Get the Most Out of Your Tools: Data Management TechnologiesData Blueprint
 
Data-Ed Online: MDM: Quality is not an Option but a Requirement
Data-Ed Online: MDM: Quality is not an Option but a RequirementData-Ed Online: MDM: Quality is not an Option but a Requirement
Data-Ed Online: MDM: Quality is not an Option but a RequirementData Blueprint
 
DataEd Online: Show Me the Money - The Business Value of Data and ROI
DataEd Online: Show Me the Money - The Business Value of Data and ROIDataEd Online: Show Me the Money - The Business Value of Data and ROI
DataEd Online: Show Me the Money - The Business Value of Data and ROIDATAVERSITY
 
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...DATAVERSITY
 
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...DATAVERSITY
 
Data-Ed Online: Structuring Your Unstructured Data Document & Content Management
Data-Ed Online: Structuring Your Unstructured Data Document & Content ManagementData-Ed Online: Structuring Your Unstructured Data Document & Content Management
Data-Ed Online: Structuring Your Unstructured Data Document & Content ManagementDATAVERSITY
 
MDM and Data Quality: Not an Option but a Requirement
MDM and Data Quality: Not an Option but a RequirementMDM and Data Quality: Not an Option but a Requirement
MDM and Data Quality: Not an Option but a RequirementDATAVERSITY
 
Data-Ed Online: Data Operations Management: Turning your Challenges into Success
Data-Ed Online: Data Operations Management: Turning your Challenges into SuccessData-Ed Online: Data Operations Management: Turning your Challenges into Success
Data-Ed Online: Data Operations Management: Turning your Challenges into SuccessDATAVERSITY
 
Data-Ed Online: Practical Data Modeling
Data-Ed Online: Practical Data ModelingData-Ed Online: Practical Data Modeling
Data-Ed Online: Practical Data ModelingData Blueprint
 
Data-Ed Online: Let's Talk Metadata: Strategies and Successes
Data-Ed Online: Let's Talk Metadata: Strategies and Successes Data-Ed Online: Let's Talk Metadata: Strategies and Successes
Data-Ed Online: Let's Talk Metadata: Strategies and Successes Data Blueprint
 
Data-Ed Online: A Practical Approach to Data Modeling
Data-Ed Online: A Practical Approach to Data ModelingData-Ed Online: A Practical Approach to Data Modeling
Data-Ed Online: A Practical Approach to Data ModelingDATAVERSITY
 
Data-Ed Online: Building A Solid Foundation-Data/Information Architecture
Data-Ed Online: Building A Solid Foundation-Data/Information ArchitectureData-Ed Online: Building A Solid Foundation-Data/Information Architecture
Data-Ed Online: Building A Solid Foundation-Data/Information ArchitectureData Blueprint
 
Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...
Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...
Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...Data Blueprint
 
Data-Ed Online - Making the Case for Data Governance
Data-Ed Online - Making the Case for Data GovernanceData-Ed Online - Making the Case for Data Governance
Data-Ed Online - Making the Case for Data GovernanceData Blueprint
 
Data-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceData-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceDATAVERSITY
 
Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data
Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data  Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data
Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data Data Blueprint
 
DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...
DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...
DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...DATAVERSITY
 
Data-Ed: Unlocking business value through data modeling and data architecture...
Data-Ed: Unlocking business value through data modeling and data architecture...Data-Ed: Unlocking business value through data modeling and data architecture...
Data-Ed: Unlocking business value through data modeling and data architecture...Data Blueprint
 
Data-Ed: Building the Case for the Top Data Job
Data-Ed: Building the Case for the Top Data JobData-Ed: Building the Case for the Top Data Job
Data-Ed: Building the Case for the Top Data JobData Blueprint
 
How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...
How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...
How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...Edureka!
 

Similaire à Data-Ed Online: How Safe is Your Data? Data Security Webinar (20)

Data-Ed: Get the Most Out of Your Tools: Data Management Technologies
Data-Ed: Get the Most Out of Your Tools: Data Management TechnologiesData-Ed: Get the Most Out of Your Tools: Data Management Technologies
Data-Ed: Get the Most Out of Your Tools: Data Management Technologies
 
Data-Ed Online: MDM: Quality is not an Option but a Requirement
Data-Ed Online: MDM: Quality is not an Option but a RequirementData-Ed Online: MDM: Quality is not an Option but a Requirement
Data-Ed Online: MDM: Quality is not an Option but a Requirement
 
DataEd Online: Show Me the Money - The Business Value of Data and ROI
DataEd Online: Show Me the Money - The Business Value of Data and ROIDataEd Online: Show Me the Money - The Business Value of Data and ROI
DataEd Online: Show Me the Money - The Business Value of Data and ROI
 
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
 
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
 
Data-Ed Online: Structuring Your Unstructured Data Document & Content Management
Data-Ed Online: Structuring Your Unstructured Data Document & Content ManagementData-Ed Online: Structuring Your Unstructured Data Document & Content Management
Data-Ed Online: Structuring Your Unstructured Data Document & Content Management
 
MDM and Data Quality: Not an Option but a Requirement
MDM and Data Quality: Not an Option but a RequirementMDM and Data Quality: Not an Option but a Requirement
MDM and Data Quality: Not an Option but a Requirement
 
Data-Ed Online: Data Operations Management: Turning your Challenges into Success
Data-Ed Online: Data Operations Management: Turning your Challenges into SuccessData-Ed Online: Data Operations Management: Turning your Challenges into Success
Data-Ed Online: Data Operations Management: Turning your Challenges into Success
 
Data-Ed Online: Practical Data Modeling
Data-Ed Online: Practical Data ModelingData-Ed Online: Practical Data Modeling
Data-Ed Online: Practical Data Modeling
 
Data-Ed Online: Let's Talk Metadata: Strategies and Successes
Data-Ed Online: Let's Talk Metadata: Strategies and Successes Data-Ed Online: Let's Talk Metadata: Strategies and Successes
Data-Ed Online: Let's Talk Metadata: Strategies and Successes
 
Data-Ed Online: A Practical Approach to Data Modeling
Data-Ed Online: A Practical Approach to Data ModelingData-Ed Online: A Practical Approach to Data Modeling
Data-Ed Online: A Practical Approach to Data Modeling
 
Data-Ed Online: Building A Solid Foundation-Data/Information Architecture
Data-Ed Online: Building A Solid Foundation-Data/Information ArchitectureData-Ed Online: Building A Solid Foundation-Data/Information Architecture
Data-Ed Online: Building A Solid Foundation-Data/Information Architecture
 
Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...
Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...
Data-Ed: Unlocking Business Value through Data Modeling and Data Architecture...
 
Data-Ed Online - Making the Case for Data Governance
Data-Ed Online - Making the Case for Data GovernanceData-Ed Online - Making the Case for Data Governance
Data-Ed Online - Making the Case for Data Governance
 
Data-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceData-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data Governance
 
Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data
Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data  Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data
Data-Ed Online: Your Documents and Other Content: Managing Unstructured Data
 
DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...
DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...
DataEd Webinar: Unlocking Business Value Through Data Modeling and Data Archi...
 
Data-Ed: Unlocking business value through data modeling and data architecture...
Data-Ed: Unlocking business value through data modeling and data architecture...Data-Ed: Unlocking business value through data modeling and data architecture...
Data-Ed: Unlocking business value through data modeling and data architecture...
 
Data-Ed: Building the Case for the Top Data Job
Data-Ed: Building the Case for the Top Data JobData-Ed: Building the Case for the Top Data Job
Data-Ed: Building the Case for the Top Data Job
 
How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...
How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...
How to Become a Data Scientist | Data Scientist Skills | Data Science Trainin...
 

Plus de Data Blueprint

Data Ed: Best Practices with the DMM
Data Ed: Best Practices with the DMMData Ed: Best Practices with the DMM
Data Ed: Best Practices with the DMMData Blueprint
 
Data-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and HadoopData-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and HadoopData Blueprint
 
Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management  Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management Data Blueprint
 
Data-Ed: Data Governance Strategies
Data-Ed: Data Governance StrategiesData-Ed: Data Governance Strategies
Data-Ed: Data Governance StrategiesData Blueprint
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements  Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data Blueprint
 
Data-Ed: Business Value From MDM
Data-Ed: Business Value From MDM Data-Ed: Business Value From MDM
Data-Ed: Business Value From MDM Data Blueprint
 
Strategy and roadmap slides
Strategy and roadmap slidesStrategy and roadmap slides
Strategy and roadmap slidesData Blueprint
 
Data-Ed: Data Warehousing Strategies
Data-Ed: Data Warehousing StrategiesData-Ed: Data Warehousing Strategies
Data-Ed: Data Warehousing StrategiesData Blueprint
 
Data-Ed: Metadata Strategies
 Data-Ed: Metadata Strategies Data-Ed: Metadata Strategies
Data-Ed: Metadata StrategiesData Blueprint
 
Data-Ed: Trends in Data Modeling
Data-Ed: Trends in Data ModelingData-Ed: Trends in Data Modeling
Data-Ed: Trends in Data ModelingData Blueprint
 
Data-Ed: Data Governance Strategies
Data-Ed: Data Governance Strategies Data-Ed: Data Governance Strategies
Data-Ed: Data Governance Strategies Data Blueprint
 
Data-Ed: Best Practices with the Data Management Maturity Model
Data-Ed: Best Practices with the Data Management Maturity ModelData-Ed: Best Practices with the Data Management Maturity Model
Data-Ed: Best Practices with the Data Management Maturity ModelData Blueprint
 
Data-Ed: Design and Manage Data Structures
Data-Ed: Design and Manage Data Structures Data-Ed: Design and Manage Data Structures
Data-Ed: Design and Manage Data Structures Data Blueprint
 
Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management Data Blueprint
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data Blueprint
 
Data-Ed: Emerging Trends in Data Jobs
Data-Ed: Emerging Trends in Data JobsData-Ed: Emerging Trends in Data Jobs
Data-Ed: Emerging Trends in Data JobsData Blueprint
 
Data-Ed: Data-centric Strategy & Roadmap
Data-Ed: Data-centric Strategy & RoadmapData-Ed: Data-centric Strategy & Roadmap
Data-Ed: Data-centric Strategy & RoadmapData Blueprint
 
Data-Ed: Demystifying Big Data
Data-Ed: Demystifying Big Data Data-Ed: Demystifying Big Data
Data-Ed: Demystifying Big Data Data Blueprint
 
Data-Ed: Unlock Business Value through Document & Content Management
Data-Ed: Unlock Business Value through Document & Content ManagementData-Ed: Unlock Business Value through Document & Content Management
Data-Ed: Unlock Business Value through Document & Content ManagementData Blueprint
 

Plus de Data Blueprint (20)

Data Ed: Best Practices with the DMM
Data Ed: Best Practices with the DMMData Ed: Best Practices with the DMM
Data Ed: Best Practices with the DMM
 
Data-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and HadoopData-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and Hadoop
 
Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management  Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management
 
Data-Ed: Data Governance Strategies
Data-Ed: Data Governance StrategiesData-Ed: Data Governance Strategies
Data-Ed: Data Governance Strategies
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements  Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements
 
Data-Ed: Business Value From MDM
Data-Ed: Business Value From MDM Data-Ed: Business Value From MDM
Data-Ed: Business Value From MDM
 
Strategy and roadmap slides
Strategy and roadmap slidesStrategy and roadmap slides
Strategy and roadmap slides
 
Data-Ed: Data Warehousing Strategies
Data-Ed: Data Warehousing StrategiesData-Ed: Data Warehousing Strategies
Data-Ed: Data Warehousing Strategies
 
Data-Ed: Metadata Strategies
 Data-Ed: Metadata Strategies Data-Ed: Metadata Strategies
Data-Ed: Metadata Strategies
 
Data-Ed: Trends in Data Modeling
Data-Ed: Trends in Data ModelingData-Ed: Trends in Data Modeling
Data-Ed: Trends in Data Modeling
 
Data-Ed: Data Governance Strategies
Data-Ed: Data Governance Strategies Data-Ed: Data Governance Strategies
Data-Ed: Data Governance Strategies
 
Data-Ed: Best Practices with the Data Management Maturity Model
Data-Ed: Best Practices with the Data Management Maturity ModelData-Ed: Best Practices with the Data Management Maturity Model
Data-Ed: Best Practices with the Data Management Maturity Model
 
Data-Ed: Design and Manage Data Structures
Data-Ed: Design and Manage Data Structures Data-Ed: Design and Manage Data Structures
Data-Ed: Design and Manage Data Structures
 
Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management Data-Ed: Monetizing Data Management
Data-Ed: Monetizing Data Management
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements
 
2014 dqe handouts
2014 dqe handouts2014 dqe handouts
2014 dqe handouts
 
Data-Ed: Emerging Trends in Data Jobs
Data-Ed: Emerging Trends in Data JobsData-Ed: Emerging Trends in Data Jobs
Data-Ed: Emerging Trends in Data Jobs
 
Data-Ed: Data-centric Strategy & Roadmap
Data-Ed: Data-centric Strategy & RoadmapData-Ed: Data-centric Strategy & Roadmap
Data-Ed: Data-centric Strategy & Roadmap
 
Data-Ed: Demystifying Big Data
Data-Ed: Demystifying Big Data Data-Ed: Demystifying Big Data
Data-Ed: Demystifying Big Data
 
Data-Ed: Unlock Business Value through Document & Content Management
Data-Ed: Unlock Business Value through Document & Content ManagementData-Ed: Unlock Business Value through Document & Content Management
Data-Ed: Unlock Business Value through Document & Content Management
 

Dernier

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Data-Ed Online: How Safe is Your Data? Data Security Webinar

  • 1. Welcome! TITLE How Safe is Your Data? Data Security Management Webinar Date: May 15, 2012 Time: 2:00 PM ET Presenter: Dr. Peter Aiken Twitter: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 1 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 2. New Feature: Live Twitter Feed TITLE Join the conversation on Twitter! Follow us @datablueprint and @paiken Ask questions and submit your comments: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 2 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 3. New Feature: LIKE US on Facebook TITLE www.facebook.com/datablueprint Post questions and comments Find industry news, insightful content and event updates PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 3 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 4. TITLE Meet Your Presenter: Dr. Peter Aiken • Internationally recognized thought-leader in the data management field with more than 30 years of experience • Recipient of the 2010 International Stevens Award • Founding Director of Data Blueprint (http://datablueprint.com) • Associate Professor of Information Systems at Virginia Commonwealth University (http://vcu.edu) • President of DAMA International (http://dama.org) • DoD Computer Scientist, Reverse Engineering Program Manager/ Office of the Chief Information Officer • Visiting Scientist, Software Engineering Institute/Carnegie Mellon University • 7 books and dozens of articles • Experienced w/ 500+ data management practices in 20 countries #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 4 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 5. How Safe Is Your Data? Dr. Peter Aiken: Data Security Management Webinar DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 4/10/2012
  • 6. How Safe Is Your Data? Dr. Peter Aiken: Data Security Management Webinar DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 4/10/2012
  • 7. How Safe Is Your Data? Dr. Peter Aiken: Data Security Management Webinar DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 4/10/2012
  • 8. How Safe Is Your Data? Dr. Peter Aiken: Data Security Management Webinar DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 4/10/2012
  • 9. How Safe Is Your Data? Dr. Peter Aiken: Data Security Management Webinar DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 4/10/2012
  • 10. TITLE Outline Tweeting now: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 11. TITLE Outline 1. Data Management Overview Tweeting now: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 12. TITLE Outline 1. Data Management Overview 2. What is data security management? Tweeting now: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 13. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches Tweeting now: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 14. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks Tweeting now: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 15. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples Tweeting now: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 16. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 17. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 18. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 6 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 19. TITLE The DAMA Guide to the Data Management Body of Knowledge Data Management Functions PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 7 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 20. TITLE The DAMA Guide to the Data Management Body of Knowledge Published by DAMA International Data Management Functions PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 7 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 21. TITLE The DAMA Guide to the Data Management Body of Knowledge Published by DAMA International • The professional association for Data Managers (40 chapters worldwide) Data Management Functions PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 7 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 22. TITLE The DAMA Guide to the Data Management Body of Knowledge Published by DAMA International • The professional association for Data Managers (40 chapters worldwide) DMBoK organized around Data Management Functions PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 7 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 23. TITLE The DAMA Guide to the Data Management Body of Knowledge Published by DAMA International • The professional association for Data Managers (40 chapters worldwide) DMBoK organized around • Primary data management functions focused around data delivery to the organization Data Management Functions PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 7 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 24. TITLE The DAMA Guide to the Data Management Body of Knowledge Published by DAMA International • The professional association for Data Managers (40 chapters worldwide) DMBoK organized around • Primary data management functions focused around data delivery to the organization • Organized around several environmental elements Data Management Functions PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 7 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 25. TITLE The DAMA Guide to the Data Management Body of Knowledge Published by DAMA International • The professional association for Data Managers (40 chapters worldwide) DMBoK organized around • Primary data management functions focused around data delivery to the organization • Organized around several environmental elements Data Management Functions PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 7 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 26. TITLE The DAMA Guide to the Data Management Body of Knowledge PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 8 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 27. TITLE The DAMA Guide to the Data Management Body of Knowledge Environmental Elements PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 8 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 28. TITLE The DAMA Guide to the Data Management Body of Knowledge Amazon: http:// www.amazon.com/ DAMA-Guide- Management- Knowledge-DAMA- DMBOK/dp/ 0977140083 Or enter the terms "dama dm bok" at the Amazon search engine Environmental Elements PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 8 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 29. TITLE What is the CDMP? • Certified Data Management Professional • DAMA International and ICCP • Membership in a distinct group made up of your fellow professionals • Recognition for your specialized knowledge in a choice of 17 specialty areas • Series of 3 exams • For more information, please visit: – http://www.dama.org/i4a/pages/ index.cfm?pageid=3399 – http://iccp.org/certification/ designations/cdmp #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 9 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 30. TITLE Data Management #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 10 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 31. TITLE Data Management Data Program Coordination Organizational Data Integration Data Stewardship Data Development Data Support Operations #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 11 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 32. TITLE Data Management Manage data coherently. Data Program Coordination Organizational Data Integration Data Stewardship Data Development Data Support Operations #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 11 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 33. TITLE Data Management Manage data coherently. Data Program Coordination Share data across boundaries. Organizational Data Integration Data Stewardship Data Development Data Support Operations #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 11 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 34. TITLE Data Management Manage data coherently. Data Program Coordination Share data across boundaries. Organizational Data Integration Data Stewardship Data Development Assign responsibilities for data. Data Support Operations #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 11 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 35. TITLE Data Management Manage data coherently. Data Program Coordination Share data across boundaries. Organizational Data Integration Data Stewardship Data Development Assign responsibilities for data. Engineer data delivery systems. Data Support Operations #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 11 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 36. TITLE Data Management Manage data coherently. Data Program Coordination Share data across boundaries. Organizational Data Integration Data Stewardship Data Development Assign responsibilities for data. Engineer data delivery systems. Data Support Operations Maintain data availability. #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 11 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 37. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 12 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 38. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 12 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 39. TITLE Summary: Data Security Management #dataed from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 13 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 40. TITLE Definition: Data Security Management Planning, development and execution of security policies and procedures to provide proper authentication, authorization, access and auditing of data and information assets. #dataed from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 14 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 41. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 15 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 42. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 15 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 43. TITLE Top Data Security Concerns #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 16 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 44. TITLE Top Data Security Concerns 1. Confidentiality – Making sure that data is supposed to be restricted to the company #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 16 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 45. TITLE Top Data Security Concerns 1. Confidentiality – Making sure that data is supposed to be restricted to the company 2. Integrity – Ensure that the are no changes to data except those intentional ones #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 16 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 46. TITLE Top Data Security Concerns 1. Confidentiality – Making sure that data is supposed to be restricted to the company 2. Integrity – Ensure that the are no changes to data except those intentional ones 3. Availability – Ability to get data when it is needed #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 16 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 47. TITLE Top Data Security Concerns 1. Confidentiality – Making sure that data is supposed to be restricted to the company 2. Integrity – Ensure that the are no changes to data except those intentional ones 3. Availability – Ability to get data when it is needed 4. Non-repudiation – Ability to prove what was sent, when, who sent it as well as what was delivered, when it was delivered and who received it #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 16 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 48. TITLE Data Security Requirements Requirements and the procedures to meet them are categorized into 4 basic groups (the 4 As): #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 17 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 49. TITLE Data Security Requirements Requirements and the procedures to meet them are categorized into 4 basic groups (the 4 As): 1. Authentication Validate users are who they say they are #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 17 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 50. TITLE Data Security Requirements Requirements and the procedures to meet them are categorized into 4 basic groups (the 4 As): 1. Authentication Validate users are who they say they are 2. Authorization Identify the right individuals and grant them the right privileges to specific, appropriate views of data #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 17 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 51. TITLE Data Security Requirements Requirements and the procedures to meet them are categorized into 4 basic groups (the 4 As): 1. Authentication Validate users are who they say they are 2. Authorization Identify the right individuals and grant them the right privileges to specific, appropriate views of data 3. Access Enable these individuals and their privileges in a timely manner #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 17 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 52. TITLE Data Security Requirements Requirements and the procedures to meet them are categorized into 4 basic groups (the 4 As): 1. Authentication Validate users are who they say they are 2. Authorization Identify the right individuals and grant them the right privileges to specific, appropriate views of data 3. Access Enable these individuals and their privileges in a timely manner 4. Audit Review security actions and user activity to ensure compliance with regulations and conformance with policy and standards #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 17 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 53. TITLE Data Security in the News 6 Worst Data Breaches of 2011 1. Sony – Attacks compromised Sony PlayStation Network, Sony Online Entertainment, and Sony Pictures – Failure to protect 100+ user records – On-going customer relations fallout and class-action lawsuits – Recovery costs: $2+ million 2. Epsilon – Cloud-based email service provider fell victim to spear- phishing attack – Breach affected data from 75 clients who trusted Epsilon with their customers’ data – 60 million customer email addresses were breached (conservative estimate) – Largest security breach ever Source: http://www.informationweek.com/news/security/attacks/232301079?itc=edit_in_body_cross PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 18 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 54. TITLE Data Security in the News, cont’d 6 Worst Data Breaches of 2011 3. RSA – Didn’t involve consumer information but one of the world’s most-used 2-factor authentication system – Failure to detail exactly what had been stolen by low-tech spear phishing attack – Result of this attack: Many companies retooled security and training processes to help prevent these low-cost, easy-to-execute social- engineering attacks 4. Sutter Physician Services – Thief stole desktop containing 2.2 million patients’ medical details – Security lapse on 2 levels: • (1)Data (unencrypted) • (2)Physical location (unsecured) – Failure to alert affected patients in timely manner – Class action lawsuit Source: http://www.informationweek.com/news/security/attacks/232301079?itc=edit_in_body_cross PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 19 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 55. TITLE Data Security in the News, cont’d 6 Worst Data Breaches of 2011 5. Tricare and SAIC – Backup tapes containing unencrypted data were stolen from an employee’s personal car – 5.1 million people affected: Current and retired members of armed services and their families – Significant because victims are at risk of medical identify theft AND financial identity theft – $4.9 billion lawsuit 6. Nasdaq – Attack on Directors Desk, a cloud-based Nasdaq system designed to facilitate boardroom-level communications for 10,000 senior executives and company directors – Possible access to inside information that might have been sold to competitors or used to make beneficial stock market Source: http://www.informationweek.com/news/security/attacks/232301079?itc=edit_in_body_cross PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 20 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 56. TITLE Cost of NOT having Accurate Security: Other Examples • 2008: Heartland Payment • 2006: Department of VA Systems – Stolen laptop exposed records – 130 million credit card numbers on 26.5 million veterans, including SSNs – $140 million recovery costs – $14 million recovery costs • 2008: Hannaford Bros. – 4.2 million credit and debit card • 2005: Card Systems numbers Solutions – Class action lawsuit – 40 million credit and debit card accounts • 2007: TJ X Co. – 45 + million credit and debit card numbers stolen – $250+ million recovery cost #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 21 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 57. TITLE Polling Question #1 What is the cost of data security? Estimated cost per individual breach: 1. $194 2. $467 3. $855 4. $1026 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 22 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 58. TITLE Data Security Statistics (2011) Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 23 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 59. TITLE Data Security Statistics (2011) • Cost of individual data breach is decreasing for the first time in 7 years Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 23 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 60. TITLE Data Security Statistics (2011) • Cost of individual data breach is decreasing for the first time in 7 years • Cost of individual data breach: – $5.5 million (2011) vs. $7.2 million (2010) Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 23 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 61. TITLE Data Security Statistics (2011) • Cost of individual data breach is decreasing for the first time in 7 years • Cost of individual data breach: – $5.5 million (2011) vs. $7.2 million (2010) • Cost per compromised record: – $194 (2011) from $215 (2010) – Exception: Breach as a result of malicious attacks average $222 per record (higher because companies need to do more after the fact) Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 23 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 62. TITLE Data Security Statistics (2011) • Cost of individual data breach is decreasing for the first time in 7 years • Cost of individual data breach: – $5.5 million (2011) vs. $7.2 million (2010) • Cost per compromised record: – $194 (2011) from $215 (2010) – Exception: Breach as a result of malicious attacks average $222 per record (higher because companies need to do more after the fact) • Costs are generally lower if organizations have Chief Information Security Officer (CISO) Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 23 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 63. TITLE Data Security Statistics (2011) • Cost of individual data breach is decreasing for the first time in 7 years • Cost of individual data breach: – $5.5 million (2011) vs. $7.2 million (2010) • Cost per compromised record: – $194 (2011) from $215 (2010) – Exception: Breach as a result of malicious attacks average $222 per record (higher because companies need to do more after the fact) • Costs are generally lower if organizations have Chief Information Security Officer (CISO) • Other declines in 2011: – Average size of data breaches declined by 16% – Abnormal customer churn decreased by 18% Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 23 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 64. TITLE Data Security Statistics (2011) • Cost of individual data breach is decreasing for the first time in 7 years • Cost of individual data breach: – $5.5 million (2011) vs. $7.2 million (2010) • Cost per compromised record: – $194 (2011) from $215 (2010) – Exception: Breach as a result of malicious attacks average $222 per record (higher because companies need to do more after the fact) • Costs are generally lower if organizations have Chief Information Security Officer (CISO) • Other declines in 2011: – Average size of data breaches declined by 16% – Abnormal customer churn decreased by 18% • Interesting fact: in 2011 39% of data breaches were caused by negligent insiders and 24% by system glitches Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 23 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 65. TITLE Data Security Statistics (2011) Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 24 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 66. TITLE Data Security Statistics (2011) • Breaches caused by malicious attacks increased: 37% (2011) from 31% (2010) – 50% malware – 33% malicious insiders – 28% device theft – 28% SQL injection – 22% phishing attacks – 17% social engineering attacks Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 24 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 67. TITLE Data Security Statistics (2011) • Breaches caused by malicious attacks increased: 37% (2011) from 31% (2010) – 50% malware – 33% malicious insiders – 28% device theft – 28% SQL injection – 22% phishing attacks – 17% social engineering attacks • Businesses’ detection costs decreased by 6%: $428,330 (2011) from $455,670 (2010) – Companies are more efficient in investigating breaches and organizing around response plans Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 24 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 68. TITLE Data Security Statistics (2011) • Breaches caused by malicious attacks increased: 37% (2011) from 31% (2010) – 50% malware – 33% malicious insiders – 28% device theft – 28% SQL injection – 22% phishing attacks – 17% social engineering attacks • Businesses’ detection costs decreased by 6%: $428,330 (2011) from $455,670 (2010) – Companies are more efficient in investigating breaches and organizing around response plans • Notification costs increased by 10% $561,495 (2011) – Failure to accurately determine # of individuals affected can result in notifying more people than necessary, which leads to higher churn and other cost- increasing factors – Balance of being timely and accurate at the same time Source: http://www.informationweek.com/news/security/attacks/232602891 PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 24 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 69. TITLE Other Costs Related to Data Security Breaches #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 25 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 70. TITLE Other Costs Related to Data Security Breaches • Customer churn (replacing lost customers with new ones) #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 25 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 71. TITLE Other Costs Related to Data Security Breaches • Customer churn (replacing lost customers with new ones) • Value of stolen data #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 25 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 72. TITLE Other Costs Related to Data Security Breaches • Customer churn (replacing lost customers with new ones) • Value of stolen data • Cost of protecting affected victims #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 25 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 73. TITLE Other Costs Related to Data Security Breaches • Customer churn (replacing lost customers with new ones) • Value of stolen data • Cost of protecting affected victims • Cost of remedial security measures #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 25 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 74. TITLE Other Costs Related to Data Security Breaches • Customer churn (replacing lost customers with new ones) • Value of stolen data • Cost of protecting affected victims • Cost of remedial security measures • Fines/Lawsuits #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 25 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 75. TITLE Other Costs Related to Data Security Breaches • Customer churn (replacing lost customers with new ones) • Value of stolen data • Cost of protecting affected victims • Cost of remedial security measures • Fines/Lawsuits • Loss of good will and reputation #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 25 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 76. TITLE Other Examples of Security Breaches Organization Type of Security Breach Medical Records thrown in trash Boulder Hospital exposing 14 patients 1,000 patients radiology studies data Griffin Hospital stolen Stolen backup tapes expose unknown Proxima Alfa Investments number of clients’ names, addresses, LLC SSNs, bank and tax numbers and copies of passports Data of 3,300,000 names, addresses, Educational Credit DoB and SSNs exposed on stolen Management Corporation portable media device Northwestern Memorial 250 patients’ files stolen from unlocked Hospital cabinets by cleaning crew Source: http://dataloss.db.org/; David Schlesinger PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 26 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 77. TITLE Other Examples, cont’d Organization Type of Security Breach Evergreen, Vancouver, 5,000 employee’s information, including Washington Schools back account information, SSNs and Information Cooperative birth dates are compromised Names, addresses and SSNs of 11,000 Connecticut Office of Policy rebate applications are stolen and Management Stolen laptop exposes 9,500 clients’ Thrivent Financial for names, addresses, SSNs and health Lutherans information Data of 100 million gamers exposed when hackers broke into PC games Sony Online Entertainment network, including names, addresses, user names, passwords, credit card information Source: http://dataloss.db.org/; David Schlesinger PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 27 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 78. TITLE Polling Question #2 How much time should be committed to data security? 1. 1 day per week 2. Ongoing activity 3. 1 hour per day 4. 1 hour per month PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 28 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 79. TITLE And in this corner we have Dave! PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 29 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 80. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 30 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 81. TITLE Outline 1. Data Management Overview 2. What is data security management? 3. Why is data security important? (1) Top Data Security Concerns & Requirements (2) The Cost of Not Having Accurate Security (3) Data Security Statistics & Examples of Security Breaches 4. Data Security Management Building Blocks 5. Passwords & Policy Examples 6. Data Security Standards & Guiding Principles Tweeting now: 7. Take Aways, References & Q&A #dataed PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 30 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 82. TITLE Data Security Management Overview                             #dataed Illustration from The DAMA Guide to the Data Management Body of Knowledge p. 37 © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 31 ©36 Copyright this and previous years by Data Blueprint - all rights reserved!
  • 83. TITLE Data Security Management Overview                             #dataed Illustration from The DAMA Guide to the Data Management Body of Knowledge p. 37 © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 31 ©36 Copyright this and previous years by Data Blueprint - all rights reserved!
  • 84. TITLE Goals and Principles from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 32 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 85. TITLE Goals and Principles 1. Enable appropriate, and prevent inappropriate access and change to data assets from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 32 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 86. TITLE Goals and Principles 1. Enable appropriate, and prevent inappropriate access and change to data assets 2. Meet regulatory requirements for privacy and confidentiality from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 32 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 87. TITLE Goals and Principles 1. Enable appropriate, and prevent inappropriate access and change to data assets 2. Meet regulatory requirements for privacy and confidentiality 3. Endure the privacy and confidentiality needs of all stakeholders are met from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 32 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 88. TITLE Potentially Competing Concerns #dataed from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 33 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 89. TITLE Potentially Competing Concerns 1. Stakeholder Concerns • Clients, patients, students, citizens, suppliers, partners #dataed from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 33 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 90. TITLE Potentially Competing Concerns 1. Stakeholder Concerns • Clients, patients, students, citizens, suppliers, partners 2. Government Regulations • Restricting access to information • Openness, transparency and accountability #dataed from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 33 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 91. TITLE Potentially Competing Concerns 1. Stakeholder Concerns • Clients, patients, students, citizens, suppliers, partners 2. Government Regulations • Restricting access to information • Openness, transparency and accountability 3. Proprietary Business Concerns • Competitive advantage, IP, intimate knowledge of customer needs/relationships #dataed from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 33 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 92. TITLE Potentially Competing Concerns 1. Stakeholder Concerns • Clients, patients, students, citizens, suppliers, partners 2. Government Regulations • Restricting access to information • Openness, transparency and accountability 3. Proprietary Business Concerns • Competitive advantage, IP, intimate knowledge of customer needs/relationships 4. Legitimate Access Needs • Strategy, rules, processes #dataed from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 33 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 93. TITLE Data Security Activities from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 34 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 94. TITLE Data Security Activities • Understand Data Security Needs and Regulatory Requirements from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 34 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 95. TITLE Data Security Activities • Understand Data Security Needs and Regulatory Requirements – Business requirements from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 34 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 96. TITLE Data Security Activities • Understand Data Security Needs and Regulatory Requirements – Business requirements – Regulatory requirements from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 34 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 97. TITLE Data Security Activities • Understand Data Security Needs and Regulatory Requirements – Business requirements – Regulatory requirements • Define Data Security Policy from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 34 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 98. TITLE Data Security Activities • Understand Data Security Needs and Regulatory Requirements – Business requirements – Regulatory requirements • Define Data Security Policy • Define Data Security Standards from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 34 © Copyright this and previous years by Data Blueprint - all rights reserved!
  • 99. TITLE Data Security Activities • Understand Data Security Needs and Regulatory Requirements – Business requirements – Regulatory requirements • Define Data Security Policy • Define Data Security Standards • Classify Information Confidentiality from The DAMA Guide to the Data Management Body of Knowledge © 2009 by DAMA International PRODUCED BY CLASSIFICATION DATE SLIDE DATA BLUEPRINT 10124-C W. BROAD ST, GLEN ALLEN, VA 23060 EDUCATION 5/15/2012 34 © Copyright this and previous years by Data Blueprint - all rights reserved!

Notes de l'éditeur

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n
  70. \n
  71. \n
  72. \n
  73. \n
  74. \n
  75. \n
  76. \n
  77. \n
  78. \n
  79. \n
  80. \n
  81. \n
  82. \n
  83. \n
  84. \n
  85. \n
  86. \n
  87. \n
  88. \n
  89. \n
  90. \n
  91. \n
  92. \n
  93. \n
  94. \n
  95. \n
  96. \n
  97. \n
  98. \n
  99. \n
  100. \n
  101. \n
  102. \n
  103. \n
  104. \n
  105. \n
  106. \n
  107. \n
  108. \n
  109. \n
  110. \n
  111. \n
  112. \n
  113. \n
  114. \n
  115. \n
  116. \n
  117. \n
  118. \n
  119. \n
  120. \n
  121. \n
  122. \n
  123. \n
  124. \n
  125. \n
  126. \n
  127. \n
  128. \n
  129. \n
  130. \n
  131. \n
  132. \n
  133. \n
  134. \n
  135. \n
  136. \n
  137. \n
  138. \n
  139. \n
  140. \n
  141. \n
  142. \n
  143. \n
  144. \n
  145. \n
  146. \n
  147. \n
  148. \n
  149. \n
  150. \n
  151. \n
  152. \n
  153. \n
  154. \n
  155. \n
  156. \n
  157. \n
  158. \n
  159. \n
  160. \n
  161. \n
  162. \n
  163. \n
  164. \n
  165. \n
  166. \n
  167. \n
  168. \n
  169. \n
  170. \n
  171. \n
  172. \n
  173. \n
  174. \n
  175. \n
  176. \n
  177. \n
  178. \n
  179. \n
  180. \n