SlideShare a Scribd company logo
1 of 59
Download to read offline
Automated Data
Governance 101
Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt
Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt
© 2019 IMMUTA
What is data governance?
Automated Data Governance 101
Privacy ComplianceSecurity
Why is data governance so difficult?
© 2019 IMMUTA
Privacy ComplianceSecurity
The Privacy Problem:
Too Much Data
© 2019 IMMUTA
Judd & Leslie Are Living Happy Lives
© 2019 IMMUTA
▪ Chris Wong perusing Twitter in March 2014
▪ Sees a Taxi & Limousine Commission chart
on traffic patterns
▪ Makes a freedom of information request for
12 months of data
▪ Receives 50 gigabytes of data
A New York City Researcher Gets Curious...
© 2019 IMMUTA
▪ Data was released containing taxi pickups,
dropoffs, location, time, amount, and tip
amount, among others
▪ This seems pretty harmless, right?
The New York Taxi & Limousine Commission
© 2019 IMMUTA
▪ This photo was geotagged (with time), so
by simply querying by medallion and time,
we know how much Judd and Leslie tip!
Well, Judd and Leslie May Not Think It’s Harmless...
© 2019 IMMUTA
This is an Example of a “Link Attack”
Medallion & Photo Time Medallion & Pickup Time
New York
Taxi Data
© 2019 IMMUTA
Same Attack on Other Celebrities
© 2019 IMMUTA
Same Attack on Other Celebrities
© 2019 IMMUTA
Same Attack on Other Celebrities
© 2019 IMMUTA
“... the dates and locations of four
purchases are enough to identify 90
percent of the people in a data set
recording three months’ worth of credit
card transactions by 1.1 million users ...
someone with copies of just three of your
recent receipts - or one receipt, one
Instagram photo, and one tweet about
the phone you just bought - would have
a 94 percent chance of extracting your
credit card records from those of a
million other people.”
In Fact...
© 2019 IMMUTA
▪ The volume of data we generate has
undermined privacy as we know it
▪ Instead of focusing on how and when our data is
gathered…
▪ Privacy is best served in limiting how our data
is being used - or how the data consumers
within our organizations are using this data
▪ The privacy problem begets another challenge
for enterprises: how do you balance data
privacy with utility?
The End of Privacy (As We Know It)
Data can either
be useful or
perfectly
anonymous,
but never both.
Paul Ohm
Broken Promises of Privacy
57 UCLA Law Review 1701 (2010)
© 2019 IMMUTA
▪ To preserve privacy, organizations have to
make the data less closely resemble the
raw data (or full data).
▪ Moving along this curve, data becomes
more robust against certain types of privacy
risks.
▪ The actual trade-off is highly coupled with
analytical context.
In Practice, Privacy is a Continuum
© 2019 IMMUTA
Privacy ComplianceSecurity
The Security Problem:
Too Much Complexity
© 2019 IMMUTA
Traditionally defined as a “triad”:
● Confidentiality only the right people can view the right data . . .
● Integrity . . . in the right form . . .
● Availability . . . at the right time.
Information Security
© 2019 IMMUTA
Today’s IT Landscape
▪ 2.5 quintillion bytes of data created each day
▪ 90 percent of the data in the world was generated in the
last 2 years
▪ Estimated 50 billion connected devices by next year - over
six per person on the planet
▪ Average of 40,000 searches conducted on Google per
second
▪ Web browsing, email, cell tower pings, image and video,
audio, and more
▪ Average business uses ~500 custom software
applications, only 40 percent of which are known to IT
▪ Number of known vulnerabilities is increasing (significantly)
over time
▪ Complexity of software systems and IT environments also
appears to be increasing
▪ Adoption of AI tools and techniques is exacerbating these
trends
The Data We Generate (And Collect) The Software We Use
Complexity Is the Enemy of Security
The only
computer that’s
completely secure
is a computer that
no one can use.
Willis Ware
Cybersecurity Pioneer
© 2019 IMMUTA
Privacy ComplianceSecurity
The Compliance Problem:
Not Enough Time
The number and complexity of regulations on data is
increasing drastically.
150+ Privacy Laws
Proposed in 25 States
250+ Information Security Laws
Proposed in 45 States
Could Cost Organizations Up to $122B Per Year
In 2019 in the U.S. alone…
© 2019 IMMUTA
GDPR
▪ EU’s General Data Protection
Regulation
▪ Came into force May 2018 as the first
and most stringent law in a new wave
of global privacy regulations
▪ Fines up to four percent of global
revenue
▪ Driven many global companies to
rethink how they collect and reuse
their data
A Few Examples
CCPA
▪ California Consumer Privacy Act
▪ Passed in 2018 and goes into effect
January 2020
▪ State legislators implemented some
of the strictest standards on
consumer data in the nation
▪ Potentially affects any business that
collects the data of California
residents
Cybersecurity Law
▪ Enacted by the Chinese government
in 2017
▪ Increased penalties on the misuse of
data collected or stored in the world’s
second largest economy
© 2019 IMMUTA
Noncompliance Has Serious Consequences
© 2019 IMMUTA
▪ Involves lots of analytical work
▪ “Meetings and memos” approach
▪ Increasing number of stakeholders and
regulatory environments are now involved
▪ Not simple, and not fast!
Compliance Takes Time
How are we addressing these
problems today?
Passively.
© 2019 IMMUTA
❏ Time-Consuming Meetings
❏ Long Policy Memos
❏ Custom Permissions
❏ Varying Policies Per Database
❏ Creation of New Copies of Data to Satisfy Compliance or Privacy Concerns
Traditional Signs of Passive Data Governance
© 2019 IMMUTA
How long does it take between
1) when your organization collects data, and
2) when that data can be accessed and used?
Is your approach to data governance passive? Ask yourself...
A. Days
B. Weeks
C. Months
How can we move away
from a passive approach
to data governance?
Automated Data Governance.
© 2019 IMMUTA
Automated data governance is the process
of proactively applying rules on data
to ensure compliance and drive data analytics.
What Is Automated Data Governance?
5 Pillars of Automated
Data Governance
© 2019 IMMUTA
1. Any Tool
2. Any Data
3. No Copies
4. Any Level of Expertise
5. One Policy, In One Place
5 Pillars of Effective Automated Data Governance
Pillar 1
Any Tool
© 2019 IMMUTA
Pillar 1: Any Tool
▪ Automated data governance must support
any tool a data scientist or analyst uses, now
or in the future
▪ Enables data science and analytics teams to
use their tool of choice to access the data
they need
▪ Avoids tool “lock in” for governance reasons
▪ Incentivizes governance for the long-term
Pillar 2
Any Data
© 2019 IMMUTA
Pillar 2: Any Data
▪ Must enable the use of ALL data, regardless
of where it’s stored or the underlying storage
technology
▪ Otherwise, leaves insights undiscovered or
incentivizes non-compliance
▪ Flexibility is key to long-term governance
efforts
Pillar 3
No Copies
© 2019 IMMUTA
Pillar 3: No Copies
▪ A passive approach frequently relies on
creating new copies of data, usually with
sensitive identifiers removed or obscured -
this can’t scale!
▪ Automated data governance requires direct
access to the same live data across the
organization
▪ Data must never be copied for governance
purposes
Pillar 4
Any Level of Expertise
© 2019 IMMUTA
Pillar 4: Any Level of Expertise
▪ Requires that anyone, with any level of
expertise, can understand what rules are
being applied to enterprise data
▪ Must empower both those with technical skill
sets and those with privacy and compliance
knowledge, so all teams can play a
meaningful role controlling how data is used
Pillar 5
One Policy, In One Place
© 2019 IMMUTA
Pillar 5: One Policy, In One Place
▪ Requires that data policies live in one central
location, so they can be easily tracked,
monitored
▪ Allows for standardization - and updates over
time
▪ Key to long-term governance efforts
Your Roadmap for
Automating Data Governance
© 2019 IMMUTA
1. What process governs how an analyst receives new data?
2. Where do your policies come from? What rules do you most care about adhering to?
3. Where is your data, and who’s responsible for it?
4. How is your data used, and how is it catalogued and tagged?
5. What technology stack do you rely on to share data faster, and control data more
effectively?
How You Can Automate Data Governance
52
Download
WHITE PAPER
Automated Data Governance 101
go.immuta.com/ADG-101
Automated Data Governance
In Practice
© 2019 IMMUTA
Data Access and Governance
▪ AI-based digital diagnostics and personalized therapies.
▪ Self-service data for data scientists for exploration, experimentation,
and analytics.
▪ Run any queries they want without taking additional steps to ensure
HIPAA compliance.
▪ Data privacy and security concerns are paramount.
▪ Data is stored in Amazon Aurora and analyzed in Databricks and
Tableau.
▪ Create different views of the same data for different parties with
varying functional responsibilities.
▪ Removing ePHI and HIPAA sensitive information for model building
was extremely time and labor intensive.
Cognoa:
Digital Behavioral
Health Company
© 2019 IMMUTA
GDPR Compliant Analytics
▪ Data collection from vehicles requires complex controls.
▪ Different use cases require different levels of anonymization.
▪ Differential privacy is a key enabler.
▪ A model to allow for individual-related insights and/or use cases
without violating privacy protection.
▪ Re-identification required: predictive maintenance on a vehicle; they
need to unmask the owner in order to provide maintenance
(purpose-based views).
▪ Analyzing the most-listened-to radio stations. This does not require
identifying an individual, and thus only requires aggregate questions.
Multinational
Automobile
Corporation
© 2019 IMMUTA
Accelerated Time to Insight from
Highly Sensitive Government Data
▪ Built an integrated data analytics platform for the Office of the
Secretary of Defense.
▪ Maintenance and Availability Data Warehouse (MADW) contains
availability, cost, inventory, and transactional data on nearly every
Department of Defense weapons system and readiness reportable
piece of equipment.
▪ More than one billion maintenance records from 46 authoritative data
systems.
▪ Integration of availability, cost, inventory, maintenance, and supply
data makes numerous analyses available to leaders across the DoD
enterprise.
LMI:
Consultancy Dedicated to
Improving the Business of
Government
© 2019 IMMUTA
Built a Self-Service Environment for Easy
Access to Operational Data
▪ Scalable, no-code self-service data access for business intelligence
operations.
▪ Provide a single interface for legal teams to implement global policy
enforcement on controlled metadata vs one-by-one policy creation.
▪ Automate reporting for credit and loan decisions.
▪ Set project-, purpose-, and role-based restrictions that ensure users
can only see the data they are entitled to see.
▪ Controlling access to all data in Data Lake, providing automated
reports on the purpose of all data usage (a core GDPR requirement)
▪ Exposed over 8000 data sources, abstracted policy enforcement and
instantaneously allowed non-technical users to gain access to the
data for the first time, e.g. HR and Marketing.
Global Financial
Institution
58
Download
WHITE PAPER
Automated Data Governance 101
go.immuta.com/ADG-101
Q&A
Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt
Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt

More Related Content

What's hot

Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationHistoric Environment Scotland
 
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...DATAVERSITY
 
Strategic imperative the enterprise data model
Strategic imperative the enterprise data modelStrategic imperative the enterprise data model
Strategic imperative the enterprise data modelDATAVERSITY
 
Real-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsReal-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsDATAVERSITY
 
RWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyRWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyDATAVERSITY
 
Real-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsReal-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsDATAVERSITY
 
Data-Ed: Show Me the Money: The Business Value of Data and ROI
Data-Ed: Show Me the Money: The Business Value of Data and ROIData-Ed: Show Me the Money: The Business Value of Data and ROI
Data-Ed: Show Me the Money: The Business Value of Data and ROIData Blueprint
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Leon Kappelman
 
DataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDATAVERSITY
 
How Can Everybody Be a Data Steward?
How Can Everybody Be a Data Steward?How Can Everybody Be a Data Steward?
How Can Everybody Be a Data Steward?DATAVERSITY
 
Becoming a Data-Driven Organization - Aligning Business & Data Strategy
Becoming a Data-Driven Organization - Aligning Business & Data StrategyBecoming a Data-Driven Organization - Aligning Business & Data Strategy
Becoming a Data-Driven Organization - Aligning Business & Data StrategyDATAVERSITY
 
Data governance, Information security strategy
Data governance, Information security strategyData governance, Information security strategy
Data governance, Information security strategyvasanthi4ever
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Mike2.0 Information Governance Overview
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overviewsean.mcclowry
 
TeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch ToolTeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch ToolDataStreams
 
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...DATAVERSITY
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataDATAVERSITY
 
RWDG Slides: Data and Metadata Will Not Govern Themselves
RWDG Slides: Data and Metadata Will Not Govern ThemselvesRWDG Slides: Data and Metadata Will Not Govern Themselves
RWDG Slides: Data and Metadata Will Not Govern ThemselvesDATAVERSITY
 

What's hot (20)

Data Governance
Data GovernanceData Governance
Data Governance
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
 
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
 
Big data Readiness white paper
Big data  Readiness white paperBig data  Readiness white paper
Big data Readiness white paper
 
Strategic imperative the enterprise data model
Strategic imperative the enterprise data modelStrategic imperative the enterprise data model
Strategic imperative the enterprise data model
 
Real-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsReal-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business Expectations
 
RWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyRWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance Policy
 
Real-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsReal-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance Tools
 
Data-Ed: Show Me the Money: The Business Value of Data and ROI
Data-Ed: Show Me the Money: The Business Value of Data and ROIData-Ed: Show Me the Money: The Business Value of Data and ROI
Data-Ed: Show Me the Money: The Business Value of Data and ROI
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
 
DataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data Sins
 
How Can Everybody Be a Data Steward?
How Can Everybody Be a Data Steward?How Can Everybody Be a Data Steward?
How Can Everybody Be a Data Steward?
 
Becoming a Data-Driven Organization - Aligning Business & Data Strategy
Becoming a Data-Driven Organization - Aligning Business & Data StrategyBecoming a Data-Driven Organization - Aligning Business & Data Strategy
Becoming a Data-Driven Organization - Aligning Business & Data Strategy
 
Data governance, Information security strategy
Data governance, Information security strategyData governance, Information security strategy
Data governance, Information security strategy
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Mike2.0 Information Governance Overview
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overview
 
TeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch ToolTeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch Tool
 
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: Metadata
 
RWDG Slides: Data and Metadata Will Not Govern Themselves
RWDG Slides: Data and Metadata Will Not Govern ThemselvesRWDG Slides: Data and Metadata Will Not Govern Themselves
RWDG Slides: Data and Metadata Will Not Govern Themselves
 

Similar to Automated Data Governance 101 - A Guide to Proactively Addressing Your Privacy, Security, and Compliance Needs

2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy managementTrustArc
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategyTrustArc
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
What's the future for data orchestration
What's the future for data orchestrationWhat's the future for data orchestration
What's the future for data orchestrationIIHEvents
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...IDERA Software
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...confluent
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big dataJames Deiotte
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and SecurityAriantoMuditomo
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 

Similar to Automated Data Governance 101 - A Guide to Proactively Addressing Your Privacy, Security, and Compliance Needs (20)

2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
What's the future for data orchestration
What's the future for data orchestrationWhat's the future for data orchestration
What's the future for data orchestration
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 

More from DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data LiteracyDATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for YouDATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling FundamentalsDATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectDATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsDATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best PracticesDATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageDATAVERSITY
 

More from DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Recently uploaded

Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationBoston Institute of Analytics
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 

Recently uploaded (20)

Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 

Automated Data Governance 101 - A Guide to Proactively Addressing Your Privacy, Security, and Compliance Needs

  • 1. Automated Data Governance 101 Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt
  • 2. © 2019 IMMUTA What is data governance? Automated Data Governance 101 Privacy ComplianceSecurity
  • 3. Why is data governance so difficult?
  • 4. © 2019 IMMUTA Privacy ComplianceSecurity
  • 6. © 2019 IMMUTA Judd & Leslie Are Living Happy Lives
  • 7. © 2019 IMMUTA ▪ Chris Wong perusing Twitter in March 2014 ▪ Sees a Taxi & Limousine Commission chart on traffic patterns ▪ Makes a freedom of information request for 12 months of data ▪ Receives 50 gigabytes of data A New York City Researcher Gets Curious...
  • 8. © 2019 IMMUTA ▪ Data was released containing taxi pickups, dropoffs, location, time, amount, and tip amount, among others ▪ This seems pretty harmless, right? The New York Taxi & Limousine Commission
  • 9. © 2019 IMMUTA ▪ This photo was geotagged (with time), so by simply querying by medallion and time, we know how much Judd and Leslie tip! Well, Judd and Leslie May Not Think It’s Harmless...
  • 10. © 2019 IMMUTA This is an Example of a “Link Attack” Medallion & Photo Time Medallion & Pickup Time New York Taxi Data
  • 11. © 2019 IMMUTA Same Attack on Other Celebrities
  • 12. © 2019 IMMUTA Same Attack on Other Celebrities
  • 13. © 2019 IMMUTA Same Attack on Other Celebrities
  • 14. © 2019 IMMUTA “... the dates and locations of four purchases are enough to identify 90 percent of the people in a data set recording three months’ worth of credit card transactions by 1.1 million users ... someone with copies of just three of your recent receipts - or one receipt, one Instagram photo, and one tweet about the phone you just bought - would have a 94 percent chance of extracting your credit card records from those of a million other people.” In Fact...
  • 15. © 2019 IMMUTA ▪ The volume of data we generate has undermined privacy as we know it ▪ Instead of focusing on how and when our data is gathered… ▪ Privacy is best served in limiting how our data is being used - or how the data consumers within our organizations are using this data ▪ The privacy problem begets another challenge for enterprises: how do you balance data privacy with utility? The End of Privacy (As We Know It)
  • 16. Data can either be useful or perfectly anonymous, but never both. Paul Ohm Broken Promises of Privacy 57 UCLA Law Review 1701 (2010)
  • 17. © 2019 IMMUTA ▪ To preserve privacy, organizations have to make the data less closely resemble the raw data (or full data). ▪ Moving along this curve, data becomes more robust against certain types of privacy risks. ▪ The actual trade-off is highly coupled with analytical context. In Practice, Privacy is a Continuum
  • 18. © 2019 IMMUTA Privacy ComplianceSecurity
  • 19. The Security Problem: Too Much Complexity
  • 20. © 2019 IMMUTA Traditionally defined as a “triad”: ● Confidentiality only the right people can view the right data . . . ● Integrity . . . in the right form . . . ● Availability . . . at the right time. Information Security
  • 21. © 2019 IMMUTA Today’s IT Landscape ▪ 2.5 quintillion bytes of data created each day ▪ 90 percent of the data in the world was generated in the last 2 years ▪ Estimated 50 billion connected devices by next year - over six per person on the planet ▪ Average of 40,000 searches conducted on Google per second ▪ Web browsing, email, cell tower pings, image and video, audio, and more ▪ Average business uses ~500 custom software applications, only 40 percent of which are known to IT ▪ Number of known vulnerabilities is increasing (significantly) over time ▪ Complexity of software systems and IT environments also appears to be increasing ▪ Adoption of AI tools and techniques is exacerbating these trends The Data We Generate (And Collect) The Software We Use
  • 22. Complexity Is the Enemy of Security
  • 23. The only computer that’s completely secure is a computer that no one can use. Willis Ware Cybersecurity Pioneer
  • 24. © 2019 IMMUTA Privacy ComplianceSecurity
  • 26. The number and complexity of regulations on data is increasing drastically.
  • 27. 150+ Privacy Laws Proposed in 25 States 250+ Information Security Laws Proposed in 45 States Could Cost Organizations Up to $122B Per Year In 2019 in the U.S. alone…
  • 28. © 2019 IMMUTA GDPR ▪ EU’s General Data Protection Regulation ▪ Came into force May 2018 as the first and most stringent law in a new wave of global privacy regulations ▪ Fines up to four percent of global revenue ▪ Driven many global companies to rethink how they collect and reuse their data A Few Examples CCPA ▪ California Consumer Privacy Act ▪ Passed in 2018 and goes into effect January 2020 ▪ State legislators implemented some of the strictest standards on consumer data in the nation ▪ Potentially affects any business that collects the data of California residents Cybersecurity Law ▪ Enacted by the Chinese government in 2017 ▪ Increased penalties on the misuse of data collected or stored in the world’s second largest economy
  • 29. © 2019 IMMUTA Noncompliance Has Serious Consequences
  • 30. © 2019 IMMUTA ▪ Involves lots of analytical work ▪ “Meetings and memos” approach ▪ Increasing number of stakeholders and regulatory environments are now involved ▪ Not simple, and not fast! Compliance Takes Time
  • 31. How are we addressing these problems today?
  • 33. © 2019 IMMUTA ❏ Time-Consuming Meetings ❏ Long Policy Memos ❏ Custom Permissions ❏ Varying Policies Per Database ❏ Creation of New Copies of Data to Satisfy Compliance or Privacy Concerns Traditional Signs of Passive Data Governance
  • 34. © 2019 IMMUTA How long does it take between 1) when your organization collects data, and 2) when that data can be accessed and used? Is your approach to data governance passive? Ask yourself... A. Days B. Weeks C. Months
  • 35. How can we move away from a passive approach to data governance?
  • 37. © 2019 IMMUTA Automated data governance is the process of proactively applying rules on data to ensure compliance and drive data analytics. What Is Automated Data Governance?
  • 38. 5 Pillars of Automated Data Governance
  • 39. © 2019 IMMUTA 1. Any Tool 2. Any Data 3. No Copies 4. Any Level of Expertise 5. One Policy, In One Place 5 Pillars of Effective Automated Data Governance
  • 41. © 2019 IMMUTA Pillar 1: Any Tool ▪ Automated data governance must support any tool a data scientist or analyst uses, now or in the future ▪ Enables data science and analytics teams to use their tool of choice to access the data they need ▪ Avoids tool “lock in” for governance reasons ▪ Incentivizes governance for the long-term
  • 43. © 2019 IMMUTA Pillar 2: Any Data ▪ Must enable the use of ALL data, regardless of where it’s stored or the underlying storage technology ▪ Otherwise, leaves insights undiscovered or incentivizes non-compliance ▪ Flexibility is key to long-term governance efforts
  • 45. © 2019 IMMUTA Pillar 3: No Copies ▪ A passive approach frequently relies on creating new copies of data, usually with sensitive identifiers removed or obscured - this can’t scale! ▪ Automated data governance requires direct access to the same live data across the organization ▪ Data must never be copied for governance purposes
  • 46. Pillar 4 Any Level of Expertise
  • 47. © 2019 IMMUTA Pillar 4: Any Level of Expertise ▪ Requires that anyone, with any level of expertise, can understand what rules are being applied to enterprise data ▪ Must empower both those with technical skill sets and those with privacy and compliance knowledge, so all teams can play a meaningful role controlling how data is used
  • 48. Pillar 5 One Policy, In One Place
  • 49. © 2019 IMMUTA Pillar 5: One Policy, In One Place ▪ Requires that data policies live in one central location, so they can be easily tracked, monitored ▪ Allows for standardization - and updates over time ▪ Key to long-term governance efforts
  • 50. Your Roadmap for Automating Data Governance
  • 51. © 2019 IMMUTA 1. What process governs how an analyst receives new data? 2. Where do your policies come from? What rules do you most care about adhering to? 3. Where is your data, and who’s responsible for it? 4. How is your data used, and how is it catalogued and tagged? 5. What technology stack do you rely on to share data faster, and control data more effectively? How You Can Automate Data Governance
  • 52. 52 Download WHITE PAPER Automated Data Governance 101 go.immuta.com/ADG-101
  • 54. © 2019 IMMUTA Data Access and Governance ▪ AI-based digital diagnostics and personalized therapies. ▪ Self-service data for data scientists for exploration, experimentation, and analytics. ▪ Run any queries they want without taking additional steps to ensure HIPAA compliance. ▪ Data privacy and security concerns are paramount. ▪ Data is stored in Amazon Aurora and analyzed in Databricks and Tableau. ▪ Create different views of the same data for different parties with varying functional responsibilities. ▪ Removing ePHI and HIPAA sensitive information for model building was extremely time and labor intensive. Cognoa: Digital Behavioral Health Company
  • 55. © 2019 IMMUTA GDPR Compliant Analytics ▪ Data collection from vehicles requires complex controls. ▪ Different use cases require different levels of anonymization. ▪ Differential privacy is a key enabler. ▪ A model to allow for individual-related insights and/or use cases without violating privacy protection. ▪ Re-identification required: predictive maintenance on a vehicle; they need to unmask the owner in order to provide maintenance (purpose-based views). ▪ Analyzing the most-listened-to radio stations. This does not require identifying an individual, and thus only requires aggregate questions. Multinational Automobile Corporation
  • 56. © 2019 IMMUTA Accelerated Time to Insight from Highly Sensitive Government Data ▪ Built an integrated data analytics platform for the Office of the Secretary of Defense. ▪ Maintenance and Availability Data Warehouse (MADW) contains availability, cost, inventory, and transactional data on nearly every Department of Defense weapons system and readiness reportable piece of equipment. ▪ More than one billion maintenance records from 46 authoritative data systems. ▪ Integration of availability, cost, inventory, maintenance, and supply data makes numerous analyses available to leaders across the DoD enterprise. LMI: Consultancy Dedicated to Improving the Business of Government
  • 57. © 2019 IMMUTA Built a Self-Service Environment for Easy Access to Operational Data ▪ Scalable, no-code self-service data access for business intelligence operations. ▪ Provide a single interface for legal teams to implement global policy enforcement on controlled metadata vs one-by-one policy creation. ▪ Automate reporting for credit and loan decisions. ▪ Set project-, purpose-, and role-based restrictions that ensure users can only see the data they are entitled to see. ▪ Controlling access to all data in Data Lake, providing automated reports on the purpose of all data usage (a core GDPR requirement) ▪ Exposed over 8000 data sources, abstracted policy enforcement and instantaneously allowed non-technical users to gain access to the data for the first time, e.g. HR and Marketing. Global Financial Institution
  • 58. 58 Download WHITE PAPER Automated Data Governance 101 go.immuta.com/ADG-101
  • 59. Q&A Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt