SlideShare a Scribd company logo
1 of 25
Testing Governance and Data Management The lie of the land: results of a survey conducted in May 2008 Jon Collins Freeform Dynamics Ltd +44 1285 771 433 [email_address] www.freeformdynamics.com
Agenda ,[object Object],[object Object],[object Object]
Thinking of your IT systems, how much does your organisation make use of the following? There’s plenty of custom application development going on
If you are using live data (e.g. from application databases), is this for any of the following reasons? Live data is a necessary part of the equation for a number of good reasons. The question is, though, how well is it controlled?
Is live data used during development or testing? (Those who knew) We are told by those that know, that live data is used in development and/or testing in almost three out of four organisations.
Knowledge of whether test data is used during the development or test cycle  “ Those that know”: Many of those in the business responsible for risk and compliance are unaware of how live data is used in IT
Sanitisation of data for use in development/testing  (Those who knew) About of third of organisations use data straight out of live systems, though many sanitise or anonymise data before use.
Who has primary responsibility for security policy in relation to application development and testing? The IT function is largely left to figure out and implement its own security policies in relation to application development and testing. The last bastion of the technical?
Security and the development cycle
How are your IT systems teams resourced? To begin with, we must understand who is involved, and it is clear that in the majority of cases, we need to consider external as well as internal staff.
Where does the majority of systems development and testing take place?  The physical location and distribution of development and testing activity adds another interesting dimension to the consideration of lifecycle security.
Considering implementing new systems or significant upgrades to existing systems, how usual is it for you to set up development, test and live environments in the following ways? Then there is the question of how much development, test and live environments are separated during the lifecycle.
Some of the risks we know about... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What priority do you give to improving the following aspects of your testing?  The top two areas of improvement are both directly relevant to the use of live data. Policy is unclear from a business perspective and poor data test data management indicates a big potential risk.
What priority do you give to improving test data management?  Ironically, those with more to lose (i.e. those using live data) are the ones who highlight the need for most improvement. This is no doubt in part due to a heightened awareness of the issues.
Where can we look for improvements? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Do policies exist to deal with the way in which information is used and accessed? A mix of policy is the best bet for organisations using sanitised data.
Is your organisation subject to a lot of regulation with regard to record keeping?  Note how “specific regulation” leads to higher use of sanitised data than more general regulation.
Is your organisation subject to a lot of regulation with regard to record keeping? (Priority given to improving test data management) Plus, more regulated organisations recognise the need to improve how they manage their test data.
How much do you agree or disagree with the following: ‘We have a single set of testing processes that we apply stringently to all of our testing’? Stringent application of testing process is more applicable in environments where data is sanitised
Turning specifically to software development and testing, which of the following statements fits your organisation? (Priority given to improving test data management) We can also see how important it is for business involvement to lead to test data management improvements.
What specific technical capabilities do you feel would make the most difference? Gaps in tooling that are consistent with the need for improvements in test data management and sanitisation of live data are clear.
What specific technical capabilities do you feel would make the most difference? Two thirds of those who use live data during test and development highlight the need for better tools to sanitise extracts.
Conclusions ,[object Object],[object Object],[object Object]
Thank You Jon Collins, Service Director Freeform Dynamics Ltd [email_address] © 2008 www.freeformdynamics.com

More Related Content

What's hot

Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Synopsys Software Integrity Group
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryCompTIA
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2Justin Chinkolenji
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper Meridian
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310John Reno
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity PerspectiveEMMAIntl
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulationAssignment Studio
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryCompTIA
 
Preparing for GDPR
Preparing for GDPRPreparing for GDPR
Preparing for GDPRGenRocket
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldNIIT Technologies
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapIAEME Publication
 
Uop hsa-520-midterm-part-2-new
Uop hsa-520-midterm-part-2-newUop hsa-520-midterm-part-2-new
Uop hsa-520-midterm-part-2-newshyaminfo8
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015clarkems
 
Observations, Issues, Benefits: Mobility in Life Sciences
Observations, Issues, Benefits: Mobility in Life SciencesObservations, Issues, Benefits: Mobility in Life Sciences
Observations, Issues, Benefits: Mobility in Life SciencesSandeep Bhat
 

What's hot (20)

Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulation
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
Preparing for GDPR
Preparing for GDPRPreparing for GDPR
Preparing for GDPR
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road map
 
Uop hsa-520-midterm-part-2-new
Uop hsa-520-midterm-part-2-newUop hsa-520-midterm-part-2-new
Uop hsa-520-midterm-part-2-new
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Results deck pc refresh
Results deck pc refreshResults deck pc refresh
Results deck pc refresh
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015
 
Observations, Issues, Benefits: Mobility in Life Sciences
Observations, Issues, Benefits: Mobility in Life SciencesObservations, Issues, Benefits: Mobility in Life Sciences
Observations, Issues, Benefits: Mobility in Life Sciences
 

Viewers also liked

Governance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabsGovernance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabsVIJAYA BHASKARA VARMA YARAKARAJU
 
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...Global Human Ecodynamics Alliance
 
Software test management overview for managers
Software test management overview for managersSoftware test management overview for managers
Software test management overview for managersTJamesLeDoux
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Accenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture Technology
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...Sonatype
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introductionOana Feidi
 
Agile Program and Portfolio Management
Agile Program and Portfolio ManagementAgile Program and Portfolio Management
Agile Program and Portfolio ManagementMike Cottmeyer
 
Accenture Technology Vision 2012
Accenture Technology Vision 2012Accenture Technology Vision 2012
Accenture Technology Vision 2012Lars Kamp
 
Introduction To Software Engineering
Introduction To Software EngineeringIntroduction To Software Engineering
Introduction To Software EngineeringLeyla Bonilla
 

Viewers also liked (15)

Governance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabsGovernance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabs
 
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
 
Test management
Test managementTest management
Test management
 
CMMi & IT Governance
CMMi & IT GovernanceCMMi & IT Governance
CMMi & IT Governance
 
The Art Of Testing Trading Platforms From AppLabs
The Art Of Testing Trading Platforms From AppLabsThe Art Of Testing Trading Platforms From AppLabs
The Art Of Testing Trading Platforms From AppLabs
 
Accenture: Bennet Harvey
Accenture: Bennet HarveyAccenture: Bennet Harvey
Accenture: Bennet Harvey
 
Software test management overview for managers
Software test management overview for managersSoftware test management overview for managers
Software test management overview for managers
 
Introduction to SIGMA
Introduction to SIGMAIntroduction to SIGMA
Introduction to SIGMA
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Accenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of business
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introduction
 
Agile Program and Portfolio Management
Agile Program and Portfolio ManagementAgile Program and Portfolio Management
Agile Program and Portfolio Management
 
Accenture Technology Vision 2012
Accenture Technology Vision 2012Accenture Technology Vision 2012
Accenture Technology Vision 2012
 
Introduction To Software Engineering
Introduction To Software EngineeringIntroduction To Software Engineering
Introduction To Software Engineering
 

Similar to Testing Governance And Data Management

MITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s NaMITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s NaEvonCanales257
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Testing Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - WhitepaperTesting Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - WhitepaperRyan Dowd
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPLuke Arrington
 
Multidimensional Challenges and the Impact of Test Data Management
Multidimensional Challenges and the Impact of Test Data ManagementMultidimensional Challenges and the Impact of Test Data Management
Multidimensional Challenges and the Impact of Test Data ManagementCognizant
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)Partha_bappa
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STakishaPeck109
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a finalGene Kim
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docxjoellemurphey
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachGraydon McKee
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxmakdul
 
A Detailed Guide To Test Data Management.pdf
A Detailed Guide To Test Data Management.pdfA Detailed Guide To Test Data Management.pdf
A Detailed Guide To Test Data Management.pdfEnov8
 
Chap001
Chap001Chap001
Chap001rpvgb
 
Documentation seminar
Documentation seminarDocumentation seminar
Documentation seminarBekiTamirat
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docxDarkKnight367793
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptxOsamaRehman10
 
Responses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docxResponses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docxaudeleypearl
 
Turkey Software Qualıty Report
Turkey Software Qualıty ReportTurkey Software Qualıty Report
Turkey Software Qualıty ReportSerkan Cura
 

Similar to Testing Governance And Data Management (20)

MITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s NaMITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s Na
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Testing Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - WhitepaperTesting Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - Whitepaper
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 
Multidimensional Challenges and the Impact of Test Data Management
Multidimensional Challenges and the Impact of Test Data ManagementMultidimensional Challenges and the Impact of Test Data Management
Multidimensional Challenges and the Impact of Test Data Management
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a final
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
A Detailed Guide To Test Data Management.pdf
A Detailed Guide To Test Data Management.pdfA Detailed Guide To Test Data Management.pdf
A Detailed Guide To Test Data Management.pdf
 
Chap001
Chap001Chap001
Chap001
 
Documentation seminar
Documentation seminarDocumentation seminar
Documentation seminar
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptx
 
Responses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docxResponses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docx
 
Turkey Software Qualıty Report
Turkey Software Qualıty ReportTurkey Software Qualıty Report
Turkey Software Qualıty Report
 

More from Jon Collins

Boundaries of mobile
Boundaries of mobileBoundaries of mobile
Boundaries of mobileJon Collins
 
Securing the Un-securable?
Securing the Un-securable?Securing the Un-securable?
Securing the Un-securable?Jon Collins
 
It looking forward
It looking forwardIt looking forward
It looking forwardJon Collins
 
Driving value from IT
Driving value from ITDriving value from IT
Driving value from ITJon Collins
 
IT Support and workforce productivity
IT Support and workforce productivityIT Support and workforce productivity
IT Support and workforce productivityJon Collins
 
We’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOAWe’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOAJon Collins
 
Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009Jon Collins
 
Cloud Computing - from myth to reality
Cloud Computing - from myth to realityCloud Computing - from myth to reality
Cloud Computing - from myth to realityJon Collins
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentJon Collins
 
IT trends and their impact on software licensing
IT trends and their impact on software licensingIT trends and their impact on software licensing
IT trends and their impact on software licensingJon Collins
 
Content Management and Business Intelligence
Content Management and Business IntelligenceContent Management and Business Intelligence
Content Management and Business IntelligenceJon Collins
 
Threats And Countermeasures
Threats And CountermeasuresThreats And Countermeasures
Threats And CountermeasuresJon Collins
 
Six principles of The Technology Garden
Six principles of The Technology GardenSix principles of The Technology Garden
Six principles of The Technology GardenJon Collins
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0Jon Collins
 
Social And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsSocial And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsJon Collins
 

More from Jon Collins (15)

Boundaries of mobile
Boundaries of mobileBoundaries of mobile
Boundaries of mobile
 
Securing the Un-securable?
Securing the Un-securable?Securing the Un-securable?
Securing the Un-securable?
 
It looking forward
It looking forwardIt looking forward
It looking forward
 
Driving value from IT
Driving value from ITDriving value from IT
Driving value from IT
 
IT Support and workforce productivity
IT Support and workforce productivityIT Support and workforce productivity
IT Support and workforce productivity
 
We’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOAWe’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOA
 
Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009
 
Cloud Computing - from myth to reality
Cloud Computing - from myth to realityCloud Computing - from myth to reality
Cloud Computing - from myth to reality
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the Environment
 
IT trends and their impact on software licensing
IT trends and their impact on software licensingIT trends and their impact on software licensing
IT trends and their impact on software licensing
 
Content Management and Business Intelligence
Content Management and Business IntelligenceContent Management and Business Intelligence
Content Management and Business Intelligence
 
Threats And Countermeasures
Threats And CountermeasuresThreats And Countermeasures
Threats And Countermeasures
 
Six principles of The Technology Garden
Six principles of The Technology GardenSix principles of The Technology Garden
Six principles of The Technology Garden
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Social And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsSocial And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual Worlds
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Testing Governance And Data Management

  • 1. Testing Governance and Data Management The lie of the land: results of a survey conducted in May 2008 Jon Collins Freeform Dynamics Ltd +44 1285 771 433 [email_address] www.freeformdynamics.com
  • 2.
  • 3. Thinking of your IT systems, how much does your organisation make use of the following? There’s plenty of custom application development going on
  • 4. If you are using live data (e.g. from application databases), is this for any of the following reasons? Live data is a necessary part of the equation for a number of good reasons. The question is, though, how well is it controlled?
  • 5. Is live data used during development or testing? (Those who knew) We are told by those that know, that live data is used in development and/or testing in almost three out of four organisations.
  • 6. Knowledge of whether test data is used during the development or test cycle “ Those that know”: Many of those in the business responsible for risk and compliance are unaware of how live data is used in IT
  • 7. Sanitisation of data for use in development/testing (Those who knew) About of third of organisations use data straight out of live systems, though many sanitise or anonymise data before use.
  • 8. Who has primary responsibility for security policy in relation to application development and testing? The IT function is largely left to figure out and implement its own security policies in relation to application development and testing. The last bastion of the technical?
  • 9. Security and the development cycle
  • 10. How are your IT systems teams resourced? To begin with, we must understand who is involved, and it is clear that in the majority of cases, we need to consider external as well as internal staff.
  • 11. Where does the majority of systems development and testing take place? The physical location and distribution of development and testing activity adds another interesting dimension to the consideration of lifecycle security.
  • 12. Considering implementing new systems or significant upgrades to existing systems, how usual is it for you to set up development, test and live environments in the following ways? Then there is the question of how much development, test and live environments are separated during the lifecycle.
  • 13.
  • 14. What priority do you give to improving the following aspects of your testing? The top two areas of improvement are both directly relevant to the use of live data. Policy is unclear from a business perspective and poor data test data management indicates a big potential risk.
  • 15. What priority do you give to improving test data management? Ironically, those with more to lose (i.e. those using live data) are the ones who highlight the need for most improvement. This is no doubt in part due to a heightened awareness of the issues.
  • 16.
  • 17. Do policies exist to deal with the way in which information is used and accessed? A mix of policy is the best bet for organisations using sanitised data.
  • 18. Is your organisation subject to a lot of regulation with regard to record keeping? Note how “specific regulation” leads to higher use of sanitised data than more general regulation.
  • 19. Is your organisation subject to a lot of regulation with regard to record keeping? (Priority given to improving test data management) Plus, more regulated organisations recognise the need to improve how they manage their test data.
  • 20. How much do you agree or disagree with the following: ‘We have a single set of testing processes that we apply stringently to all of our testing’? Stringent application of testing process is more applicable in environments where data is sanitised
  • 21. Turning specifically to software development and testing, which of the following statements fits your organisation? (Priority given to improving test data management) We can also see how important it is for business involvement to lead to test data management improvements.
  • 22. What specific technical capabilities do you feel would make the most difference? Gaps in tooling that are consistent with the need for improvements in test data management and sanitisation of live data are clear.
  • 23. What specific technical capabilities do you feel would make the most difference? Two thirds of those who use live data during test and development highlight the need for better tools to sanitise extracts.
  • 24.
  • 25. Thank You Jon Collins, Service Director Freeform Dynamics Ltd [email_address] © 2008 www.freeformdynamics.com