SlideShare a Scribd company logo
1 of 70
Download to read offline
The Value from Big Data Analytics
Vint 2012
A Boeing 747 generates 30 TB of data in 1 flight
Vint 2012
EIU 2012
16
www.isaca.org
Big Data—Characteristics
Very large, distributed aggregations of loosely
structured data – often incomplete & inaccessible:
• Petabytes/Exabytes of data,
• Millions/billions/trillions of records,
• Loosely-structured, distributed data,
• Flat schemas with complex interrelationships,
• Coming from diverse sources,
• Social networks,
• Sensor networks,
• Servers (files, logs, chats, video),
• etc.,
• Often involving time-stamped events,
• Applications (Transactional or Analytical)
Big Data—Characteristics
Fourth ‘v’: Validity = data quality & integration connected to
collaborate data governance.
Fifth ‘v’: Veracity = data integrity & the ability for an organization to
trust the data and be able to confidently use it to make crucial
decisions
Big Data—Characteristics
Vint 2012
Big Data top requirements
Big Data project challenges
Big Data project difficulties
The dark side of Big Data
The dark side of Big Data
Big Data a priority??
Main management
questions on big data:
1. Where should we store our
data?
2. How are we going to protect
our data?
3. How are we going to use our
data safely & lawfully?
Core element on big data:
The full life cycle
of information
needs to be
considered!
Big data perception issue:
Addressing 

big data risk & concerns 

can NOT be seen
exclusively 

as an IT exercise!
Key elements to take into
account with Big Data
1. Data Quality: shift from “quest for perfect data” to
“fit for use data”
●Add practicality
●Reduce time, cost and effort
2. Data Volume: shift from “shiny object syndrome”
to “managed analytics”
3. Project Budgets: shift from “business
determining needs” to “business & IT working
together”
4. User Proficiency & Knowledge Transfer: shift
from “specialist expert analytics know best” to 

“business using tools & experts”
Data Quality Sub-dimensions
WEF 2012
Key risk with Big Data:
privacy & security
Privacy-related laws must be considered for Big Data
projects. Responsibility for applying data privacy & security
techniques falls on the individual capturing, using data &
performing analysis: determine & document how data privacy
& security issues will be addressed prior to a Big Data project.
1. What is the goal of the Big Data project?
2. How will this data be used? Anyone who will access & hold this data
during analysis must adhere to appropriate data governance standards.
3. Who will be able to access, review and analyze this data? Which roles &
responsibilities of users within organization will have access to personal
& sensitive information.
4. How will this data be secured to prevent unauthorized access?
5. How will this data be updated?
Source: COBIT® 5, figure 15. © 2012 ISACA® All rights reserved.
Principles, policies &
Information
Processes
Corporate governance : ERM = COSO
Organisational structure
Services, Infrastructure,
Culture, Ethics,
Behaviour
People, Skills, Competencie
Big data control
categories:
1. Approach &
Understanding
2. Quality & Integrity
3. Confidentiality & privacy
4. Availability
Top 10 types of Big Data
Analytical Usage
Role of Internal Audit in
Managing Big Data
Check the extent of data assets and deep dive into what all is available. Data that is redundant or
unimportant may be identified and reduced.
To manage data holdings effectively, an organization must first be aware of the location, condition and
value of its research assets. Conducting a data audit provides this information, raising awareness of
collection strengths and identifying weaknesses in data policies and management procedures.
The benefits of conducting an audit for managing big data
effectively are:
Monitor holdings and avoid big data leaks. Data hacking, social engineering and data leaks are all
concepts that plague a company – an audit can help a company identify areas where there is a
possibility of leakage.
Manage risks associated with big data loss and irretrievability. Data which is not structured and is
lying untouched may never be retrieved; an audit can help identify such cases.
Develop a big data strategy and implement robust big data policies. Big data requires robust
management and proper structurization.
Improve workflows and benefit from efficiency savings. Check where there are complex and time-
consuming workflows and where there is a scope of improving efficiencies.
Realize the value of big data through improved access and reuse to check if there are areas that
have not been used in a while.
Source: http://www.data-audit.eu/docs/DAF_briefing_paper.pdf
Complex Big Data
Big Data Security
Big Data
Accessibility
Big Data
Quality
Big Data
Understanding
Managing Big Data
through Internal Audit
Most companies collect large volumes of data but they do not have comprehensive
approaches for centralizing the information. Internal audit can help companies
manage big data by streamlining and collating data effectively.
Issues of big data that internal audit can help mitigate:
Maintaining effective data security is increasingly recognized as a critical risk area for
organizations. Loss of control over data security can have severe ramifications for an
organization, including regulatory penalties, loss of reputation, and damage to
business operations and profitability. Auditing can help organizations secure and
control data collected.
Giving access to big data to the right person at the right time is another challenge
organizations face. Segregation of Duties (SoD) is an important aspect that can be
checked by an IA.
The more data one accumulates, the harder it is to keep everything consistent and
correct. Internal audit can check the quality of big data.
Understanding and interpretation of big data remains one of the primary concerns for
many organizations. Auditors can effectively simplify an organization’s data
effectively.
Source: http://www.acl.com/pdfs/wp_AA_Best_Practices.pdf, http://
smartdatacollective.com/brett-stupakevich/48184/4-biggest-problems-big-data
Conclusions
Big Data
! Big data = valuable asset & powerful tool with
far reaching impacts. Big data initiatives need to
have visibility at board level & executive level
sponsors.
! Success of enterprises will depend on how they
meet & deal with big data challenges & impacts.
! To harness value & deliver resilient and faster
analytic solutions, enterprises must implement
big data solutions using repeatable frameworks
& processes coupled with good governance &
risk management framework.
Any organization’s data = one of most valuable assets.
Without a way to obtain, cleanse, organize and evaluate its
data, an organization is left with a vast, chaotic pool of 0 & 1.
Big Data results can be used to:
◦ improve business efficiencies;
◦ verify process effectiveness;
◦ identify areas of key risk, fraud, errors or misuse;
◦ influence business decisions.
Maximum benefits from Big Data can be achieved for any
organization if:
◦ the approach is aligned to the business,
◦ the (privacy & security) risks are managed,
◦ the process is effectively planned, designed, implemented,
tested and governed.
Big Data
“Even with infinite knowledge of past behaviour,
we often won’t have enough information to make
meaningful predictions about the future. 

In fact, the more data we have, the more false
confidence we will have… 

The important part is to understand what our
limits are and to use the best possible science to
fill in the gaps. All the data in the world will never
achieve that goal for us.”
Peter Fader, co-director of the Wharton Customer
Analytics Initiative at the University of Pennsylvania
and Professor Marketing at Penn’s Wharton School
of Business in MIT’s Technology Review, May 2012
http://www.technologyreview.com/news/427786/is-there-big-money-in-big-data/
Marc Vael

President
ISACA
http://www.isaca.be/
For more information…
marc@vael.net
http://www.linkedin.com/in/marcvael
@marcvael
www.isaca.org/knowledgecenter
61
Big Data Governance questions
1. What principles, policies and frameworks are we
going to establish to support the achievement of
business strategy through big data?
2. Can we trust our sources of big data?
3. What structures and skills do we have to govern and
manage IT?
4. What structures and skills do we have to govern big
data privacy?
5. Do we have the right tools to meet our big data
privacy requirements?
Big Data Governance questions
6. How do we verify the authenticity of the data?
7. Can we verify how the information will be used?
8. What decision options do we have regarding big data
privacy?
9. What is the context for each decision?
10. Can we simulate the decisions and understand the
consequences?
11. Will we record the consequences and use that
information to improve our big data information gathering,
context, analysis and decision-making processes?
Big Data Governance questions
12. How will we protect our sources, our processes and
our decisions from theft and corruption?
13. Are we exploiting the insights we get from big data?
14. What information are we collecting without exposing
the enterprise to legal and regulatory battles?
15. What actions are we taking that create trends that
can be exploited by our rivals?
16. What policies are in place to ensure that employees
keep stakeholder information confidential during and
after employment?
Big Data Governance potential answers
! Senior management buy-in and evidence of continuous
commitment
! Data anonymization/sanitization or de-identification
! Adequate, relevant, useful and current big data privacy
policies, processes, procedures and supporting structures
! Appropriate data destruction, comprehensive data
management policy, clearly defined disposal ownership and
accountability
! Compliance with legal and regulatory data requirements
! Continuous education and training of big data policies,
processes and procedures
Big data control category: 

Approach & Understanding
! “Right tone at the top”.
! Data policy.
! Inventory of all data sources
! Identify vulnerabilities in the data flow including internal &
external data sources, automated & manual processes.
! Data deficiency governance process for analysis of impact
and probability, escalation to senior management where
necessary, and a strategic or tactical resolution.
! Each vulnerability needs a data owner.
! Materiality criteria to identify most relevant data sets.
! Escalation path for data deficiency management.
Big data control category: 

Confidentiality / Privacy
! Through the data risk management process, all sensitive data
should be identified and appropriate controls put in place.
Rules & regulations govern how sensitive data should be
secured in storage & transit.
! Logical & physical access security controls are needed to
prevent unauthorized access to sensitive data. This includes
classic IT General Controls (password settings, masking or partially
masking sensitive data, periodic user access review, firewalls, server room door
security, server access logs, administrative access privileges and screen saver
lockout.)
! Encryption technologies must be used to store & transfer
highly sensitive information within + outside the enterprise.
Big data control category: 

Quality
! Assess data against accuracy, reliability, completeness and
timeliness criteria defined in the data policy & associated
standards.
! Data sourced from third party: contractually bound process to
gain confidence over data quality through an independent
validation of data quality controls at the third party or through
independent checks on any material data received.
! Ownership & responsibilities associated with each material
data set should be assigned. Appropriate training should be
rolled out to all relevant personnel to make them aware of their
data-related responsibilities.
Big data control category: 

Availability
! Reliable (tested) disaster recovery arrangements should be
in place to ensure that data are available in accordance with
◦ data recovery point objective (RPO) criteria and
◦ recovery time objective (RTO) criteria
defined in a business impact analysis (BIA).
Assurance considerations with Big Data
By using the same risk-based approach used to determine
the audit schedule, potential target areas may be identified in
following areas:
1. Determine operational effectiveness of the current control
environment.
2. Determine effectiveness of anti-fraud procedures &
controls.
3. Identify business process errors.
4. Identify business process improvements & inefficiencies in
the control environment.
5. Identify exceptions or unusual business rules.
6. Identify fraud.
7. Identify areas where poor data quality exists.

More Related Content

What's hot

Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Capgemini
 
Evtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2hEvtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2h
Nadia Smith
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
Doreen Christian
 

What's hot (19)

Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
The Five Pillars of Data Governance 2.0 Success
The Five Pillars of Data Governance 2.0 SuccessThe Five Pillars of Data Governance 2.0 Success
The Five Pillars of Data Governance 2.0 Success
 
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyHow to Integrate Data and Protect Privacy
How to Integrate Data and Protect Privacy
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
Starting data governance
Starting data governance Starting data governance
Starting data governance
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Evtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2hEvtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2h
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareEnterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for Healthcare
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and Compliance
 
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation Readiness
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 

Similar to The value of big data analytics

Group 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptxGroup 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptx
NATASHABANO
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidence
IBM Software India
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
stilliegeorgiana
 
Big Data - Bridging Technology and Humans
Big Data - Bridging Technology and HumansBig Data - Bridging Technology and Humans
Big Data - Bridging Technology and Humans
Mark Laurance
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
Vishal Bamba
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
Roman Chanclor
 
Big Data and Goverment Analytics
Big Data and Goverment AnalyticsBig Data and Goverment Analytics
Big Data and Goverment Analytics
Khaled Ghadban
 

Similar to The value of big data analytics (20)

Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Group 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptxGroup 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptx
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidence
 
big data.pptx
big data.pptxbig data.pptx
big data.pptx
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Introduction to visualizing Big Data
Introduction to visualizing Big DataIntroduction to visualizing Big Data
Introduction to visualizing Big Data
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptx
 
Big Data - Bridging Technology and Humans
Big Data - Bridging Technology and HumansBig Data - Bridging Technology and Humans
Big Data - Bridging Technology and Humans
 
What Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdfWhat Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdf
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business Environment
 
Data Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & ApproachesData Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & Approaches
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
 
ch02.pdf
ch02.pdfch02.pdf
ch02.pdf
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
Big data security
Big data securityBig data security
Big data security
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Big Data and Goverment Analytics
Big Data and Goverment AnalyticsBig Data and Goverment Analytics
Big Data and Goverment Analytics
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data Governance
 
Accenture big-data
Accenture big-dataAccenture big-data
Accenture big-data
 

More from Marc Vael

More from Marc Vael (20)

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 

Recently uploaded

Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
gajnagarg
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
gajnagarg
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
karishmasinghjnh
 

Recently uploaded (20)

Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
 

The value of big data analytics

  • 1. The Value from Big Data Analytics
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11. A Boeing 747 generates 30 TB of data in 1 flight
  • 12.
  • 13.
  • 17.
  • 18.
  • 19.
  • 20. Big Data—Characteristics Very large, distributed aggregations of loosely structured data – often incomplete & inaccessible: • Petabytes/Exabytes of data, • Millions/billions/trillions of records, • Loosely-structured, distributed data, • Flat schemas with complex interrelationships, • Coming from diverse sources, • Social networks, • Sensor networks, • Servers (files, logs, chats, video), • etc., • Often involving time-stamped events, • Applications (Transactional or Analytical)
  • 22. Fourth ‘v’: Validity = data quality & integration connected to collaborate data governance. Fifth ‘v’: Veracity = data integrity & the ability for an organization to trust the data and be able to confidently use it to make crucial decisions Big Data—Characteristics
  • 23.
  • 24.
  • 26.
  • 27. Big Data top requirements
  • 28. Big Data project challenges
  • 29. Big Data project difficulties
  • 30. The dark side of Big Data
  • 31. The dark side of Big Data
  • 32. Big Data a priority??
  • 33. Main management questions on big data: 1. Where should we store our data? 2. How are we going to protect our data? 3. How are we going to use our data safely & lawfully?
  • 34. Core element on big data: The full life cycle of information needs to be considered!
  • 35. Big data perception issue: Addressing 
 big data risk & concerns 
 can NOT be seen exclusively 
 as an IT exercise!
  • 36. Key elements to take into account with Big Data 1. Data Quality: shift from “quest for perfect data” to “fit for use data” ●Add practicality ●Reduce time, cost and effort 2. Data Volume: shift from “shiny object syndrome” to “managed analytics” 3. Project Budgets: shift from “business determining needs” to “business & IT working together” 4. User Proficiency & Knowledge Transfer: shift from “specialist expert analytics know best” to 
 “business using tools & experts”
  • 39. Key risk with Big Data: privacy & security Privacy-related laws must be considered for Big Data projects. Responsibility for applying data privacy & security techniques falls on the individual capturing, using data & performing analysis: determine & document how data privacy & security issues will be addressed prior to a Big Data project. 1. What is the goal of the Big Data project? 2. How will this data be used? Anyone who will access & hold this data during analysis must adhere to appropriate data governance standards. 3. Who will be able to access, review and analyze this data? Which roles & responsibilities of users within organization will have access to personal & sensitive information. 4. How will this data be secured to prevent unauthorized access? 5. How will this data be updated?
  • 40. Source: COBIT® 5, figure 15. © 2012 ISACA® All rights reserved.
  • 41.
  • 45. Corporate governance : ERM = COSO Organisational structure
  • 49.
  • 50. Big data control categories: 1. Approach & Understanding 2. Quality & Integrity 3. Confidentiality & privacy 4. Availability
  • 51. Top 10 types of Big Data Analytical Usage
  • 52. Role of Internal Audit in Managing Big Data Check the extent of data assets and deep dive into what all is available. Data that is redundant or unimportant may be identified and reduced. To manage data holdings effectively, an organization must first be aware of the location, condition and value of its research assets. Conducting a data audit provides this information, raising awareness of collection strengths and identifying weaknesses in data policies and management procedures. The benefits of conducting an audit for managing big data effectively are: Monitor holdings and avoid big data leaks. Data hacking, social engineering and data leaks are all concepts that plague a company – an audit can help a company identify areas where there is a possibility of leakage. Manage risks associated with big data loss and irretrievability. Data which is not structured and is lying untouched may never be retrieved; an audit can help identify such cases. Develop a big data strategy and implement robust big data policies. Big data requires robust management and proper structurization. Improve workflows and benefit from efficiency savings. Check where there are complex and time- consuming workflows and where there is a scope of improving efficiencies. Realize the value of big data through improved access and reuse to check if there are areas that have not been used in a while. Source: http://www.data-audit.eu/docs/DAF_briefing_paper.pdf
  • 53. Complex Big Data Big Data Security Big Data Accessibility Big Data Quality Big Data Understanding Managing Big Data through Internal Audit Most companies collect large volumes of data but they do not have comprehensive approaches for centralizing the information. Internal audit can help companies manage big data by streamlining and collating data effectively. Issues of big data that internal audit can help mitigate: Maintaining effective data security is increasingly recognized as a critical risk area for organizations. Loss of control over data security can have severe ramifications for an organization, including regulatory penalties, loss of reputation, and damage to business operations and profitability. Auditing can help organizations secure and control data collected. Giving access to big data to the right person at the right time is another challenge organizations face. Segregation of Duties (SoD) is an important aspect that can be checked by an IA. The more data one accumulates, the harder it is to keep everything consistent and correct. Internal audit can check the quality of big data. Understanding and interpretation of big data remains one of the primary concerns for many organizations. Auditors can effectively simplify an organization’s data effectively. Source: http://www.acl.com/pdfs/wp_AA_Best_Practices.pdf, http:// smartdatacollective.com/brett-stupakevich/48184/4-biggest-problems-big-data
  • 55. Big Data ! Big data = valuable asset & powerful tool with far reaching impacts. Big data initiatives need to have visibility at board level & executive level sponsors. ! Success of enterprises will depend on how they meet & deal with big data challenges & impacts. ! To harness value & deliver resilient and faster analytic solutions, enterprises must implement big data solutions using repeatable frameworks & processes coupled with good governance & risk management framework.
  • 56. Any organization’s data = one of most valuable assets. Without a way to obtain, cleanse, organize and evaluate its data, an organization is left with a vast, chaotic pool of 0 & 1. Big Data results can be used to: ◦ improve business efficiencies; ◦ verify process effectiveness; ◦ identify areas of key risk, fraud, errors or misuse; ◦ influence business decisions. Maximum benefits from Big Data can be achieved for any organization if: ◦ the approach is aligned to the business, ◦ the (privacy & security) risks are managed, ◦ the process is effectively planned, designed, implemented, tested and governed. Big Data
  • 57. “Even with infinite knowledge of past behaviour, we often won’t have enough information to make meaningful predictions about the future. 
 In fact, the more data we have, the more false confidence we will have… 
 The important part is to understand what our limits are and to use the best possible science to fill in the gaps. All the data in the world will never achieve that goal for us.” Peter Fader, co-director of the Wharton Customer Analytics Initiative at the University of Pennsylvania and Professor Marketing at Penn’s Wharton School of Business in MIT’s Technology Review, May 2012 http://www.technologyreview.com/news/427786/is-there-big-money-in-big-data/
  • 58.
  • 59. Marc Vael
 President ISACA http://www.isaca.be/ For more information… marc@vael.net http://www.linkedin.com/in/marcvael @marcvael
  • 61. 61
  • 62. Big Data Governance questions 1. What principles, policies and frameworks are we going to establish to support the achievement of business strategy through big data? 2. Can we trust our sources of big data? 3. What structures and skills do we have to govern and manage IT? 4. What structures and skills do we have to govern big data privacy? 5. Do we have the right tools to meet our big data privacy requirements?
  • 63. Big Data Governance questions 6. How do we verify the authenticity of the data? 7. Can we verify how the information will be used? 8. What decision options do we have regarding big data privacy? 9. What is the context for each decision? 10. Can we simulate the decisions and understand the consequences? 11. Will we record the consequences and use that information to improve our big data information gathering, context, analysis and decision-making processes?
  • 64. Big Data Governance questions 12. How will we protect our sources, our processes and our decisions from theft and corruption? 13. Are we exploiting the insights we get from big data? 14. What information are we collecting without exposing the enterprise to legal and regulatory battles? 15. What actions are we taking that create trends that can be exploited by our rivals? 16. What policies are in place to ensure that employees keep stakeholder information confidential during and after employment?
  • 65. Big Data Governance potential answers ! Senior management buy-in and evidence of continuous commitment ! Data anonymization/sanitization or de-identification ! Adequate, relevant, useful and current big data privacy policies, processes, procedures and supporting structures ! Appropriate data destruction, comprehensive data management policy, clearly defined disposal ownership and accountability ! Compliance with legal and regulatory data requirements ! Continuous education and training of big data policies, processes and procedures
  • 66. Big data control category: 
 Approach & Understanding ! “Right tone at the top”. ! Data policy. ! Inventory of all data sources ! Identify vulnerabilities in the data flow including internal & external data sources, automated & manual processes. ! Data deficiency governance process for analysis of impact and probability, escalation to senior management where necessary, and a strategic or tactical resolution. ! Each vulnerability needs a data owner. ! Materiality criteria to identify most relevant data sets. ! Escalation path for data deficiency management.
  • 67. Big data control category: 
 Confidentiality / Privacy ! Through the data risk management process, all sensitive data should be identified and appropriate controls put in place. Rules & regulations govern how sensitive data should be secured in storage & transit. ! Logical & physical access security controls are needed to prevent unauthorized access to sensitive data. This includes classic IT General Controls (password settings, masking or partially masking sensitive data, periodic user access review, firewalls, server room door security, server access logs, administrative access privileges and screen saver lockout.) ! Encryption technologies must be used to store & transfer highly sensitive information within + outside the enterprise.
  • 68. Big data control category: 
 Quality ! Assess data against accuracy, reliability, completeness and timeliness criteria defined in the data policy & associated standards. ! Data sourced from third party: contractually bound process to gain confidence over data quality through an independent validation of data quality controls at the third party or through independent checks on any material data received. ! Ownership & responsibilities associated with each material data set should be assigned. Appropriate training should be rolled out to all relevant personnel to make them aware of their data-related responsibilities.
  • 69. Big data control category: 
 Availability ! Reliable (tested) disaster recovery arrangements should be in place to ensure that data are available in accordance with ◦ data recovery point objective (RPO) criteria and ◦ recovery time objective (RTO) criteria defined in a business impact analysis (BIA).
  • 70. Assurance considerations with Big Data By using the same risk-based approach used to determine the audit schedule, potential target areas may be identified in following areas: 1. Determine operational effectiveness of the current control environment. 2. Determine effectiveness of anti-fraud procedures & controls. 3. Identify business process errors. 4. Identify business process improvements & inefficiencies in the control environment. 5. Identify exceptions or unusual business rules. 6. Identify fraud. 7. Identify areas where poor data quality exists.