SlideShare a Scribd company logo
1 of 33
Download to read offline
Dennis Waldron
rghogg@us.ibm.com
Richard Hogg , CITP ERMp
Are you Ready?
May 25,
2018
GDPR – What is it?
4%Or
€20M
Potential
Penalty
Per Incident
Global
Impact
5 Key General Data Protection Regulation Obligations
Rights of EU
Data Subjects
Security of
Personal Data
Consent Accountability of
Compliance
Data Protection by
Design and by Default
Concern Toxicity potential in unstructured data.
Need Approach to ID, tag and delete toxic data.
Solution
Storage management tool that
allows metadata tagging.
Result
53% of data identified as dormant for > 5
years with a big portion possibly toxic.
Next steps
Work with data owners to choose
to delete or otherwise address flagged data.
53%of unstructured data flagged
“any information relating to an identified or identifiable natural person” (Art. 2(a))
Direct identifier – E.g. name, passport number, phone number
Indirect identifier – E.g. IBM Global GDPR Evangelist
Personal Data?
*2016 survey of NA Financial Services
GDPR Client Observations
“We understand what
needs to be done and
we’ll make the
necessary incremental
changes.”
A European bank
“Where do we begin, the
regulations are so confusing,
what solutions does IBM
provide?”
Multinational transportation org
Multinational logistics org
“We have heard of GDPR, but
we are going to take a wait and
see approach until an
enforcement action.”
Multinational airline
Multinational pharma org
The Hare The Tortoise The Ostrich
GDPR Takes More Than Just Technology
There are five key areas that need to be addressed
Governance People &
Communication
Processes Data Security
•  Conduct GDPR risk &
privacy assessments
across governance,
people, processes,
data, security
•  Develop GDPR
Readiness Roadmap
•  Identify & Map
personal data
Assess
Assessments and
roadmap
Identify GDPR impact
and plan Technical and
Organisational Measures
(TOM)
•  Design governance,
training,
communication, and
process standards
•  Design privacy, data
management and
security management
standards
Design
Defined
implementation
plan
Includes Data Protection
controls, processes and
solutions to be
implemented
•  Develop and embed
procedures,
processes and tools
•  Deliver GDPR training
•  Develop & embed
standards & policies
using Privacy by
Design, Security by
Design
•  Detailed Data
Discovery
Transform
Process
enhancements
completed
TOMs in place: Personal
Data discovery,
classification and
governance in place
•  Execute all relevant
business processes
•  Monitor security and
privacy using TOMs
•  Manage Consent &
data subject access
rights
Operate
Operational
framework in
place
Begin the new GDPR
ready way of working
•  Monitor, assess,
audit, report and
evaluate adherence
to GDPR standards
Conform
Ongoing
monitoring and
reporting
Monitor TOMs execution;
deliver compliance
evidence to internal and
external stakeholders
ActivityOutcomePhase
IBM’s Overall GDPR Framework: 5 Phases to Readiness
Program and Data Governance
goals • policies • rules • compliance • vendor management • terminology • people
Data Lifecycle
identification • classification • masking • archiving
Data Catalog
metadata mgmt. • IT objects • impact analysis
Data Subject Services
enquiry • correction • erasure • portability •
notification
Data Protection
privacy program design • risk assessment • access management
identity governance • monitoring & audit • incident response
Orchestration
Processes
Rules
Consent
Personal Data
structured
unstructured
physical info
assets
printed
documents
…
Data
Subjects
Data
Privacy
Officer
Data
Steward
InfoGov Capabilities Needed for GDPR
IBM	Commitment	to	GDPR	Readiness	Statement
Trust	in	Data	
Data	and	its	protec9on	are	becoming	increasingly	important	to	individuals	and	society.		Enterprises	must	earn	the	public’s	
trust	in	their	ability	to	steward	informa9on.	As	IBM’s	long	history	of	security	and	privacy	leadership	demonstrates,	IBM	
understands	that	protec9ng	privacy	is	essen9al	to	gaining	trust.		IBM	was	one	of	the	first	companies	to	appoint	a	
Chief	Privacy	Officer,	to	develop	and	publish	a	gene9cs	privacy	policy,	to	be	cer9fied	under	
the	APEC	Cross	Borders	Privacy	Rules	system,	and	to	sign	the	
EU	Data	Protec9on	Code	of	Conduct	for	Cloud	Service	Providers.	Now,	IBM	is	con9nuing	its	long-standing	leadership	in	the	
area	of	data	privacy	by	responding	proac9vely	to	the	General	Data	Protec9on	Regula9on	(GDPR).	
	
IBM	Commits	to	GDPR	Readiness	
IBM	currently	complies	with	privacy	laws	around	the	world.		IBM	is	also	preparing	to	comply	with	the	European	Union’s	new	
General	Data	Protec9on	Regula9on	(GDPR)	which	will	go	into	effect	in	May	2018.		IBM	has	established	a	global	project	to	
prepare	for	GDPR,	both	for	our	internal	processes	and	for	our	commercial	offerings.	IBM	recognises	that	our	customers	will	
rely	on	IBM’s	offerings	and	technical	assistance	to	achieve	GDPR	compliance	within	their	own	organisa9ons	and	IBM	is	well-
posi9oned	to	meet	this	cri9cal	need.	
As	part	of	its	GDPR	project,	IBM	is	enhancing	its	ongoing	commitment	to	privacy	by	design.	IBM	is	working	to	embed	data	
protec9on	principles	even	more	deeply	into	its	business	processes,	with	the	objec9ve	that	technical	and	organisa9onal	
security	measures	limit,	by	default,	the	amount	and	use	of	personal	data	to	what	is	specifically	required.	This	work	will	also	
strengthen	controls	already	in	place	to	limit	access	to	personal	data,	including	with	respect	to	mobile	applica9ons	that	rely	
on	sensible	default	seWngs	to	prevent	personal	data	from	being	inadvertently	shared	with	others.	
IBM	is	committed	to	providing	our	clients	and	partners	with	innova9ve	data	privacy,	security	and	governance	solu9ons	to	
assist	them	on	their	journey	to	GDPR	compliance.	
Learn	more	about	IBM's	own	GDPR	readiness	journey	and	our	GDPR	capabili9es	and	offerings	to	support	your	compliance	
journey	here.
Most Personal Data not
discoverable via Patterns
New IBM GDPR Accelerators
Improved insight with the ability to load contracts for
Watson to analyze & consider the key language, clauses
or paragraphs driving the need for further analysis or
change.
Compare & Comply
IBM Regulatory Compliance Analytics,
with IBM Watson Digest GDPR and identity
Controls & Obligations.
Cognitive Insights
Plug-in Extensive unstructured
personal data discovery rules using
Both RegEx and Machine Learning.
GDPR CartridgesStructured personal data discovery
& classification. Personal data
access & data subject rights audit
trails; GDPR reports; GDPR data
risk dashboard.
Data Protection
GDPR Supportive Content taxonomy
with Predefined terms, data model
elements, Against each Article.
GDPR Industry Model
GDPR program preparatory guide,
GDPR incident simulation,&
GDPR-enhanced Privacy module.
Incident Response
Discover and register data sources and the Personal
Data they contain. Golden record identification with
Workflows for all citizen SAR requests.
Subject 360 Access
Consent Service available enterprise wide, linking
Data to usage and specific per-citizen consent.
Purposeful Consent By Design
Security
Regulations
& Contracts
Personal
Data
Find
Personal
Data
Unified
Catalog
9	Billion	
4%	
Of	the	
only	
breached	since	2013	
were	encrypted	3	
records	
$4M	
Average	cost	of	a	data	
breach	in	2016	2	
Likelihood	of	an	organiza9on	
having	a	data	breach	in	the	
next	24	months	1	
26%	“It’s no longer
a matter of if,
but when …”
Health	Insurance	
Portability	and	
Accountability		
Act	(HIPAA)	
European	Union	General	
Data	Protec9on	
Regula9on	(GDPR)		
Payment	Card	Industry	Data	
Security	Standard	(PCI-DSS)	
1, 2 Source: 2016 Ponemon Cost of Data Breach Study: Global Analysis -- http://www.ibm.com/security/data-breach/
3 Source: Breach Level Index -- http://breachlevelindex.com/
Data protection and compliance are
business imperatives
100	Days	Over	
On	average	to	discover	
the	breach
What does information governance mean and
why is it critical
Informa(on	Governance	is	the	process	by	which	an	organiza>on	will	behave	or	act	to	ensure	the	
appropriate	execu>on	of	its	mandate,	and	typically,	protect	and	maximize	the	benefits	inherent	in	
its	data	assets	
83%	of	organiza>ons	suffer	problems	
caused	by	poor	master	data,	with	the	top	
three	problems	being	inaccurate	repor9ng	
(81%),	arguments	over	which	data	is	
appropriate	(78%),	and	bad	decisions	based	
on	incorrect	defini9ons	(54%)	
$3	Trillion	is	the	total	annual	impact	
of	poor	data	quality		
Informa9on	Governance	Organiza9on	
ensures	sustainable	business	value	of	data	
over	9me.		Standalone	cleanups	no	macer	
how	heroic	have	diminished	values	over	
9me.	
A	Strong	DG	Func(on	Is	Essen(al	To	Delivering	Reliable	And	
Usable	Business	Informa(on	
35%	of	customer	informa>on	in	
enterprise	systems	may	be	inaccurate,	and	
up	to	30%	duplicated	due	to	lack	of	proper	
data	governance	policies	and	procedures	
Source: IBM Institute for Business Value 2015 Analytics research survey. Administered by
the Economist Intelligence Unit.
© 2015 IBM Institute for Business Value. www.ibm.biz/2015analytics
•  Uniform	communica9ons	
•  Common	understanding	
•  Rapid	cross	business	
Implementa9on	
•  Single	defini9on	
•  Quality	data	
•  Cross	business	data	usage	
•  Efficient	Investments	
Process	
People	
Policies	
Tools	
With	Data	Governance	
•  Complex	
•  Silo	driven	
•  Slow	to	market	
•  Inconsistent	defini9on	
•  Poor	data	accuracy	
•  LOB	focused	data	
•  Re-solve	problems	for	each	
LOB	
Without	Data	Governance	
30-40%	of	the	IT	budget	is	allocated	to	execu9on	of	data	transforma9on	
programs	within	IT	led	Financial	Services	companies	
	
GSIBs	will	increase	spend	on	new	data	and	analy9cs	ini9a9ves	by	10%	in	2017
§  How to easily find relevant
information ~ books, authors ?
§  How to go about archiving
important content – Micro Film?
§  How to go about Life Cycle
Management of books ?
§  How to restrict access to
important content (Policy Mgmt.) ?
CATALOGARCHIVEDISPOSEACCESS
Library Analogy
GOVERNANCE FOR
COMPLIANCE
Discover, classify and manage
information in ways that meet the
obligations enforced by both regulatory
and corporate mandates
Regulations (e.g. GDPR)
Privacy & Protection
eDiscovery
Records & Retention
Archiving
Audit Readiness
GOVERNANCE FOR INSIGHTS
Provide safe access to trusted, high
quality, fit-for-purpose data while
facilitating effective collaboration
among team members
Self-Service Access to Data &
Analytics
Governed Enterprise Information
Repositories (such as Data Lakes)
Use Cases Driving a Unified
Governance Strategy
High Quality, Timely information for All
Empowered Data Scientists
Uncovering Unique Insights
Empowered Organization
Better Business Outcomes
•  Leverage the value of your data unlocking insight
driving competitive advantage every single time you
access data.
•  Capitalize on the data and derive revenue based on
solid information governance foundation making
data simplified and actionable.
Make Data Make Money
GOVERNANCE FOR COMPLIANCE
Helps
ensure data privacy and
facilitate compliance with
regulations such as the
GDPR
50%
faster creation of test
datasets helps to accelerate
development cycles
Cuts
storage costs by
significantly reducing the
size of test datasets
View case study: Link
Eases
compliance with data-
retention regulations
94.2%
reduction in amount of data
unnecessarily stored cuts
costs and risk
Takes
the headache out of audits
by providing a clear track
record and reporting
View case study: Link
GOVERNANCE FOR INSIGHTS
Enables
a smoother user
experience for shoppers
across channels and
brands
10 times
faster response times for
the 1-800-Flowers.com
mobile app
Improves
the quality of customer data
and enables deeper insight
View case study: Link
Empowers
IT and business users to
collaborate in establishing
and using common
terminology
Supports
business intelligence and
confident decision-making
Accelerates
analytics for faster insight
View video: Link
What our customers are saying
Strategic vision for metadata to support regulatory issues
•  NT Metadata Registry
•  Benefits
•  Approach
•  Timeline
•  Metadata Strategy
•  Data Models, Standards, & Policies
•  NT ISO Initiative
EXECUTIVE SUMMARY
NT METADATA REGISTRY BENEFITS
What’s in it for me?
•  Increased understanding of NT’s data.
•  Create a searchable catalog of Northern Trust’s data assets.
•  Provide transparency into the location, definition and usage of
NT’s data assets.
•  Promote the standardization of NT’s data designs, shared
definition and asset reuse.
Why do we care?
•  Increase collaboration.
•  Expose data lineage through all layers (e.g. CCAR, EDP,AML)
•  Reduce project delivery time and scope creep.
•  Reduce Risk
•  Reduce Development Time
What I need your help on?
•  Granting connections to system catalog(s) and to reverse engineer
physical schema for IIS lineage
•  We are not looking at the transactional data
•  SME help for SOR, BPM, inflow and outflows
High Level Design
NT METADATA REGISTRY - APPROACH
NT METADATA FOUNDATION & STRATEGY
NT METADATA REGISTRY
Metadata Registry
o  Central location in an organization where metadata definitions are
stored.
Metadata Management
o  End to end process and governance framework for the creation,
controlling, enhancing, attributing, defining and management of
structured and unstructured data.
Design Metadata
o  Information about the structure, description, relationship and
administration of assets.
Operational Metadata
o  Point of view metadata on runtime variables, statistical processes,
matrix operations that explain how data was created and/or
transformed.
METADATA LIFECYCLE
DATA MODELS, STANDARDS, & POLICIES
Rolled out in Q1- 2017
NT ISO Model Management Process
The process for creating, maintaining, and publish a complete and
consistent “single version of the truth” for the NT ISO data model
Standards & Policies Library
A repository for data policies and standards across all pillars of
enterprise data services
Enterprise Data Services VISA
An EPMO vehicle to govern and provide clear requirements to
project teams to achieve data standards and existing processes
•  Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union
General Data Protection Regulation. Clients are solely responsibility for obtaining advice of competent legal counsel as to the
identification and interpretation of any relevant laws and regulations that may affect the clients’ business and any actions the
clients may need to take to comply with such laws and regulations. The products, services, and other capabilities described herein
are not suitable for all client situations and may have restricted availability. IBM does not provide legal, accounting or auditing
advice or represent or warrant that its services or products will ensure that clients are in compliance with any law or regulation.
•  IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.
•  Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a
purchasing decision.
•  The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code
or functionality. Information about potential future products may not be incorporated into any contract.
•  The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.
•  Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput
or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of
multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no
assurance can be given that an individual user will achieve results similar to those stated here.
None of the statements contained herein constitutes legal advice – it is process advice only.
Disclaimer
Appendix
WHAT IS ENTERPRISE DATAARCHITECTURE
AND WHAT IS THE VALUE?
The purpose of Enterprise Data Architecture is to define data tools strategy, modeling
standards, and conceptual/logical models for Northern Trust enterprise data.
ü  U9lizes	enterprise	tools	that	support	trusted,	relevant,	and	governed	
informa9on	
ü  Enables	Northern	Trust	to	meet	or	exceed	client	and	regulator	expecta>ons	
and	obliga>ons	through	data	lineage	visualiza9on	from	source	to	
consump9on	
ü  Reuses	architectural	design	paQerns	and	u9lizes	a	centralized	metadata	
repository	and	informa9on	governance	catalogue	to	reduce	development	
>me		
ü  Provides	standard	informa>on	models	that	enhance	messaging	formats	and	
drive	down	risk	
ü  Builds	a	culture	within	the	organiza9on	to	treat	data	as	a	Northern	Trust	
asset	
ü  Capitalizes	on	current	design	pacerns	to	speed	development	and	data	
consump9on	
What it is
The value
The	processes	and	prac9ces	
that	leverage	informa9on	
assets,	rules,	policies,	
standards,	models,	and	tools	to	
support	metadata	
management	and	informa9on	
architecture,	for	successful	
integra9on	and	with	enterprise	
programs.
DATA TOOLS REFERENCE ARCHITECTUREData	Tools	Reference	Architecture
Operational
Data	Sources
Services	Tier
Flat	Files
Oracle
Client	Tier
Web	
Clients
Desktop
Clients
Engine	Tier
XML
DB2
DataStage
Quality	Stage
Connectors
Packs
Service	Agents
Quality	Stage	
Services
Information	Analyzer	
Services
Information	Services	
Director	Services
DataStage	Services
Workbench	Services
Connector	Access	
Services
Common	Services
Metadata	Exchange
Metadata	Services
Data	ManagementDesign
ER	StudioData	Architect
Rational	
Architect
Repository	Tier
IA	Repository
Metadata	Repository
Engine	Tier
DataStage
Quality	StageInformation	Analyzer
Information	Services	
Director
Metadata	
Workbench
Repository	Tier
MDM	AE	Repository
MDM	AE
MDM	Services
MDM	CE
MDM	Services
MDM	RDM
MDM	Services
MDM	CE	Repository
MDM	RDM	
Repository
MSSQL
NoSQL
Hadoop
Blueprint Blueworks
ER	Studio	
Repository
Data	Architect	
Repository
RA	Repository
Blueprint	
Repository
Blueworks	
Repository
Composite
Hive
NTRS	Application
SQL,TSQL,	BTEQ,	JCL
Load	Utilities,	Stored	
Procedures,	
Functions
Iteraplan
Iteraplan	
Repository
Composite
Messages
Sybase
DATA TOOLS CONCEPTUAL ARCHITECTUREData	Tools	Conceptual	Architecture
Data	Modeling
Logical/Physical	
Modeling	Tool
Operational	
Repository
Data	Integration
Data	Governance
Data	Profiling
Data	Rules
Reference	
Repository
Data	Lineage
Business	
Glossary
Information	
Modeling
Information	
Modeling	Tool
Operational	
Repository
Asset	
Management
Asset	
Management	
Tool
Operational	
Repository
SDLC
Version	Control	
Repository
Discovery
Analysis	
Repository
Data	
Management
Semi	Relational
Non-Relational
Relational
BusinessProcess	
Modeling
BPM	Tool
Operational	
Repository
BI
Analytics	Tool
Operational	
Repository
Knowledge	Center
Thin	Clients
Thick	Clients
ETL/ELT
Data	Replication
Data	Services
Operational	
Repository
Virtualization/
Federation
Publish
Exchange
Store
Browse
Implemented
Capable
2017
Implementation

More Related Content

What's hot

Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enBalázs Antók
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Graham Mann
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkUlf Mattsson
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management FrameworkJoseph Wynn
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big dataUlf Mattsson
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksIT Masterclasses
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 

What's hot (20)

Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at Brighttalk
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 

Similar to Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & Privacy For GDPR

CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-smIBM Sverige
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.Richard Kranendonk
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationJake DiMare
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?DATUM LLC
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR prioritiesAlberto Canadè
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance ImpactQA
 

Similar to Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & Privacy For GDPR (20)

CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational Measures
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
 

More from ARMA International

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)ARMA International
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other DocumentsARMA International
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA International
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherARMA International
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...ARMA International
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...ARMA International
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...ARMA International
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackARMA International
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)ARMA International
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryARMA International
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsARMA International
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...ARMA International
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceARMA International
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...ARMA International
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesARMA International
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseARMA International
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyARMA International
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceARMA International
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RIARMA International
 

More from ARMA International (20)

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines Together
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies Attack
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information Investments
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information Governance
 
Gene Stakhov - Taxonology
Gene Stakhov - TaxonologyGene Stakhov - Taxonology
Gene Stakhov - Taxonology
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be Machines
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership Journey
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
 

Recently uploaded

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 

Recently uploaded (20)

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 

Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & Privacy For GDPR

  • 1.
  • 5. May 25, 2018 GDPR – What is it? 4%Or €20M Potential Penalty Per Incident Global Impact 5 Key General Data Protection Regulation Obligations Rights of EU Data Subjects Security of Personal Data Consent Accountability of Compliance Data Protection by Design and by Default
  • 6. Concern Toxicity potential in unstructured data. Need Approach to ID, tag and delete toxic data. Solution Storage management tool that allows metadata tagging. Result 53% of data identified as dormant for > 5 years with a big portion possibly toxic. Next steps Work with data owners to choose to delete or otherwise address flagged data. 53%of unstructured data flagged “any information relating to an identified or identifiable natural person” (Art. 2(a)) Direct identifier – E.g. name, passport number, phone number Indirect identifier – E.g. IBM Global GDPR Evangelist Personal Data? *2016 survey of NA Financial Services
  • 7. GDPR Client Observations “We understand what needs to be done and we’ll make the necessary incremental changes.” A European bank “Where do we begin, the regulations are so confusing, what solutions does IBM provide?” Multinational transportation org Multinational logistics org “We have heard of GDPR, but we are going to take a wait and see approach until an enforcement action.” Multinational airline Multinational pharma org The Hare The Tortoise The Ostrich
  • 8. GDPR Takes More Than Just Technology There are five key areas that need to be addressed Governance People & Communication Processes Data Security
  • 9. •  Conduct GDPR risk & privacy assessments across governance, people, processes, data, security •  Develop GDPR Readiness Roadmap •  Identify & Map personal data Assess Assessments and roadmap Identify GDPR impact and plan Technical and Organisational Measures (TOM) •  Design governance, training, communication, and process standards •  Design privacy, data management and security management standards Design Defined implementation plan Includes Data Protection controls, processes and solutions to be implemented •  Develop and embed procedures, processes and tools •  Deliver GDPR training •  Develop & embed standards & policies using Privacy by Design, Security by Design •  Detailed Data Discovery Transform Process enhancements completed TOMs in place: Personal Data discovery, classification and governance in place •  Execute all relevant business processes •  Monitor security and privacy using TOMs •  Manage Consent & data subject access rights Operate Operational framework in place Begin the new GDPR ready way of working •  Monitor, assess, audit, report and evaluate adherence to GDPR standards Conform Ongoing monitoring and reporting Monitor TOMs execution; deliver compliance evidence to internal and external stakeholders ActivityOutcomePhase IBM’s Overall GDPR Framework: 5 Phases to Readiness
  • 10. Program and Data Governance goals • policies • rules • compliance • vendor management • terminology • people Data Lifecycle identification • classification • masking • archiving Data Catalog metadata mgmt. • IT objects • impact analysis Data Subject Services enquiry • correction • erasure • portability • notification Data Protection privacy program design • risk assessment • access management identity governance • monitoring & audit • incident response Orchestration Processes Rules Consent Personal Data structured unstructured physical info assets printed documents … Data Subjects Data Privacy Officer Data Steward InfoGov Capabilities Needed for GDPR
  • 11. IBM Commitment to GDPR Readiness Statement Trust in Data Data and its protec9on are becoming increasingly important to individuals and society. Enterprises must earn the public’s trust in their ability to steward informa9on. As IBM’s long history of security and privacy leadership demonstrates, IBM understands that protec9ng privacy is essen9al to gaining trust. IBM was one of the first companies to appoint a Chief Privacy Officer, to develop and publish a gene9cs privacy policy, to be cer9fied under the APEC Cross Borders Privacy Rules system, and to sign the EU Data Protec9on Code of Conduct for Cloud Service Providers. Now, IBM is con9nuing its long-standing leadership in the area of data privacy by responding proac9vely to the General Data Protec9on Regula9on (GDPR). IBM Commits to GDPR Readiness IBM currently complies with privacy laws around the world. IBM is also preparing to comply with the European Union’s new General Data Protec9on Regula9on (GDPR) which will go into effect in May 2018. IBM has established a global project to prepare for GDPR, both for our internal processes and for our commercial offerings. IBM recognises that our customers will rely on IBM’s offerings and technical assistance to achieve GDPR compliance within their own organisa9ons and IBM is well- posi9oned to meet this cri9cal need. As part of its GDPR project, IBM is enhancing its ongoing commitment to privacy by design. IBM is working to embed data protec9on principles even more deeply into its business processes, with the objec9ve that technical and organisa9onal security measures limit, by default, the amount and use of personal data to what is specifically required. This work will also strengthen controls already in place to limit access to personal data, including with respect to mobile applica9ons that rely on sensible default seWngs to prevent personal data from being inadvertently shared with others. IBM is committed to providing our clients and partners with innova9ve data privacy, security and governance solu9ons to assist them on their journey to GDPR compliance. Learn more about IBM's own GDPR readiness journey and our GDPR capabili9es and offerings to support your compliance journey here.
  • 12. Most Personal Data not discoverable via Patterns
  • 13. New IBM GDPR Accelerators Improved insight with the ability to load contracts for Watson to analyze & consider the key language, clauses or paragraphs driving the need for further analysis or change. Compare & Comply IBM Regulatory Compliance Analytics, with IBM Watson Digest GDPR and identity Controls & Obligations. Cognitive Insights Plug-in Extensive unstructured personal data discovery rules using Both RegEx and Machine Learning. GDPR CartridgesStructured personal data discovery & classification. Personal data access & data subject rights audit trails; GDPR reports; GDPR data risk dashboard. Data Protection GDPR Supportive Content taxonomy with Predefined terms, data model elements, Against each Article. GDPR Industry Model GDPR program preparatory guide, GDPR incident simulation,& GDPR-enhanced Privacy module. Incident Response Discover and register data sources and the Personal Data they contain. Golden record identification with Workflows for all citizen SAR requests. Subject 360 Access Consent Service available enterprise wide, linking Data to usage and specific per-citizen consent. Purposeful Consent By Design Security Regulations & Contracts Personal Data Find Personal Data Unified Catalog
  • 14. 9 Billion 4% Of the only breached since 2013 were encrypted 3 records $4M Average cost of a data breach in 2016 2 Likelihood of an organiza9on having a data breach in the next 24 months 1 26% “It’s no longer a matter of if, but when …” Health Insurance Portability and Accountability Act (HIPAA) European Union General Data Protec9on Regula9on (GDPR) Payment Card Industry Data Security Standard (PCI-DSS) 1, 2 Source: 2016 Ponemon Cost of Data Breach Study: Global Analysis -- http://www.ibm.com/security/data-breach/ 3 Source: Breach Level Index -- http://breachlevelindex.com/ Data protection and compliance are business imperatives 100 Days Over On average to discover the breach
  • 15. What does information governance mean and why is it critical Informa(on Governance is the process by which an organiza>on will behave or act to ensure the appropriate execu>on of its mandate, and typically, protect and maximize the benefits inherent in its data assets 83% of organiza>ons suffer problems caused by poor master data, with the top three problems being inaccurate repor9ng (81%), arguments over which data is appropriate (78%), and bad decisions based on incorrect defini9ons (54%) $3 Trillion is the total annual impact of poor data quality Informa9on Governance Organiza9on ensures sustainable business value of data over 9me. Standalone cleanups no macer how heroic have diminished values over 9me. A Strong DG Func(on Is Essen(al To Delivering Reliable And Usable Business Informa(on 35% of customer informa>on in enterprise systems may be inaccurate, and up to 30% duplicated due to lack of proper data governance policies and procedures Source: IBM Institute for Business Value 2015 Analytics research survey. Administered by the Economist Intelligence Unit. © 2015 IBM Institute for Business Value. www.ibm.biz/2015analytics •  Uniform communica9ons •  Common understanding •  Rapid cross business Implementa9on •  Single defini9on •  Quality data •  Cross business data usage •  Efficient Investments Process People Policies Tools With Data Governance •  Complex •  Silo driven •  Slow to market •  Inconsistent defini9on •  Poor data accuracy •  LOB focused data •  Re-solve problems for each LOB Without Data Governance 30-40% of the IT budget is allocated to execu9on of data transforma9on programs within IT led Financial Services companies GSIBs will increase spend on new data and analy9cs ini9a9ves by 10% in 2017
  • 16. §  How to easily find relevant information ~ books, authors ? §  How to go about archiving important content – Micro Film? §  How to go about Life Cycle Management of books ? §  How to restrict access to important content (Policy Mgmt.) ? CATALOGARCHIVEDISPOSEACCESS Library Analogy
  • 17. GOVERNANCE FOR COMPLIANCE Discover, classify and manage information in ways that meet the obligations enforced by both regulatory and corporate mandates Regulations (e.g. GDPR) Privacy & Protection eDiscovery Records & Retention Archiving Audit Readiness GOVERNANCE FOR INSIGHTS Provide safe access to trusted, high quality, fit-for-purpose data while facilitating effective collaboration among team members Self-Service Access to Data & Analytics Governed Enterprise Information Repositories (such as Data Lakes) Use Cases Driving a Unified Governance Strategy
  • 18. High Quality, Timely information for All Empowered Data Scientists Uncovering Unique Insights Empowered Organization Better Business Outcomes •  Leverage the value of your data unlocking insight driving competitive advantage every single time you access data. •  Capitalize on the data and derive revenue based on solid information governance foundation making data simplified and actionable. Make Data Make Money
  • 19. GOVERNANCE FOR COMPLIANCE Helps ensure data privacy and facilitate compliance with regulations such as the GDPR 50% faster creation of test datasets helps to accelerate development cycles Cuts storage costs by significantly reducing the size of test datasets View case study: Link Eases compliance with data- retention regulations 94.2% reduction in amount of data unnecessarily stored cuts costs and risk Takes the headache out of audits by providing a clear track record and reporting View case study: Link GOVERNANCE FOR INSIGHTS Enables a smoother user experience for shoppers across channels and brands 10 times faster response times for the 1-800-Flowers.com mobile app Improves the quality of customer data and enables deeper insight View case study: Link Empowers IT and business users to collaborate in establishing and using common terminology Supports business intelligence and confident decision-making Accelerates analytics for faster insight View video: Link What our customers are saying
  • 20. Strategic vision for metadata to support regulatory issues •  NT Metadata Registry •  Benefits •  Approach •  Timeline •  Metadata Strategy •  Data Models, Standards, & Policies •  NT ISO Initiative EXECUTIVE SUMMARY
  • 21. NT METADATA REGISTRY BENEFITS What’s in it for me? •  Increased understanding of NT’s data. •  Create a searchable catalog of Northern Trust’s data assets. •  Provide transparency into the location, definition and usage of NT’s data assets. •  Promote the standardization of NT’s data designs, shared definition and asset reuse. Why do we care? •  Increase collaboration. •  Expose data lineage through all layers (e.g. CCAR, EDP,AML) •  Reduce project delivery time and scope creep. •  Reduce Risk •  Reduce Development Time What I need your help on? •  Granting connections to system catalog(s) and to reverse engineer physical schema for IIS lineage •  We are not looking at the transactional data •  SME help for SOR, BPM, inflow and outflows
  • 22. High Level Design NT METADATA REGISTRY - APPROACH
  • 24. NT METADATA REGISTRY Metadata Registry o  Central location in an organization where metadata definitions are stored. Metadata Management o  End to end process and governance framework for the creation, controlling, enhancing, attributing, defining and management of structured and unstructured data. Design Metadata o  Information about the structure, description, relationship and administration of assets. Operational Metadata o  Point of view metadata on runtime variables, statistical processes, matrix operations that explain how data was created and/or transformed.
  • 26. DATA MODELS, STANDARDS, & POLICIES Rolled out in Q1- 2017 NT ISO Model Management Process The process for creating, maintaining, and publish a complete and consistent “single version of the truth” for the NT ISO data model Standards & Policies Library A repository for data policies and standards across all pillars of enterprise data services Enterprise Data Services VISA An EPMO vehicle to govern and provide clear requirements to project teams to achieve data standards and existing processes
  • 27.
  • 28.
  • 29. •  Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data Protection Regulation. Clients are solely responsibility for obtaining advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulations that may affect the clients’ business and any actions the clients may need to take to comply with such laws and regulations. The products, services, and other capabilities described herein are not suitable for all client situations and may have restricted availability. IBM does not provide legal, accounting or auditing advice or represent or warrant that its services or products will ensure that clients are in compliance with any law or regulation. •  IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. •  Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. •  The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. •  The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. •  Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. None of the statements contained herein constitutes legal advice – it is process advice only. Disclaimer
  • 31. WHAT IS ENTERPRISE DATAARCHITECTURE AND WHAT IS THE VALUE? The purpose of Enterprise Data Architecture is to define data tools strategy, modeling standards, and conceptual/logical models for Northern Trust enterprise data. ü  U9lizes enterprise tools that support trusted, relevant, and governed informa9on ü  Enables Northern Trust to meet or exceed client and regulator expecta>ons and obliga>ons through data lineage visualiza9on from source to consump9on ü  Reuses architectural design paQerns and u9lizes a centralized metadata repository and informa9on governance catalogue to reduce development >me ü  Provides standard informa>on models that enhance messaging formats and drive down risk ü  Builds a culture within the organiza9on to treat data as a Northern Trust asset ü  Capitalizes on current design pacerns to speed development and data consump9on What it is The value The processes and prac9ces that leverage informa9on assets, rules, policies, standards, models, and tools to support metadata management and informa9on architecture, for successful integra9on and with enterprise programs.
  • 32. DATA TOOLS REFERENCE ARCHITECTUREData Tools Reference Architecture Operational Data Sources Services Tier Flat Files Oracle Client Tier Web Clients Desktop Clients Engine Tier XML DB2 DataStage Quality Stage Connectors Packs Service Agents Quality Stage Services Information Analyzer Services Information Services Director Services DataStage Services Workbench Services Connector Access Services Common Services Metadata Exchange Metadata Services Data ManagementDesign ER StudioData Architect Rational Architect Repository Tier IA Repository Metadata Repository Engine Tier DataStage Quality StageInformation Analyzer Information Services Director Metadata Workbench Repository Tier MDM AE Repository MDM AE MDM Services MDM CE MDM Services MDM RDM MDM Services MDM CE Repository MDM RDM Repository MSSQL NoSQL Hadoop Blueprint Blueworks ER Studio Repository Data Architect Repository RA Repository Blueprint Repository Blueworks Repository Composite Hive NTRS Application SQL,TSQL, BTEQ, JCL Load Utilities, Stored Procedures, Functions Iteraplan Iteraplan Repository Composite Messages Sybase
  • 33. DATA TOOLS CONCEPTUAL ARCHITECTUREData Tools Conceptual Architecture Data Modeling Logical/Physical Modeling Tool Operational Repository Data Integration Data Governance Data Profiling Data Rules Reference Repository Data Lineage Business Glossary Information Modeling Information Modeling Tool Operational Repository Asset Management Asset Management Tool Operational Repository SDLC Version Control Repository Discovery Analysis Repository Data Management Semi Relational Non-Relational Relational BusinessProcess Modeling BPM Tool Operational Repository BI Analytics Tool Operational Repository Knowledge Center Thin Clients Thick Clients ETL/ELT Data Replication Data Services Operational Repository Virtualization/ Federation Publish Exchange Store Browse Implemented Capable 2017 Implementation