SlideShare a Scribd company logo
July 15, 2021
Closing the Governance Gap:
Enabling Governed Self-Service Analytics
David Loshin
President, Knowledge Integrity
Program Director, Master of Information Management, University of Maryland
Sponsor
2
DAVID LOSHIN
President, Knowledge Integrity, Inc.
Program Director, Master of Information
Management, University of Maryland
Data Sensitivity
• Growing recognition of risks of exposing
individuals’ personal and private
information
– Emerging indignance over corporations using
and selling what is believed to be personal or
private information
– Increasing number and volume of data
breaches
– Expanding interest of governmental
intervention and protection
• A growing inventory of global regulations
address the need to secure and protect
individuals’ personal and private data
• Growing awareness of the general
concepts of protection of “sensitive” data
On-Premises
Multicloud
Challenges of the Evolving Data Landscape
Variance in Definitions and Semantics
“Personal information” means information that identifies, relates to,
describes, is reasonably capable of being associated with, or could
reasonably be linked, directly or indirectly, with a particular consumer
or household. Personal information includes, but is not limited to, the
following if it identifies, relates to, describes, is reasonably capable of
being associated with, or could be reasonably linked, directly or
indirectly, with a particular consumer or household
Name
Alias
Postal address
Account name
SSN
Email address
IP address
Driver’s license
Passport number
Other personal identifiers
Products or services considered
Products or services purchased
Products or services obtained
Purchasing histories
Personal property records
Consuming history
Biometric information
Geolocation information
Education information
Employment information
Interaction with an internet website
Search history
Browsing history
Electronic data
Audio data
Visual data
Thermal data
Olfactory data
"Sensitive data" means a category of personal data that includes:
1. Personal data revealing racial or ethnic origin, religious beliefs, mental or
physical health diagnosis, sexual orientation, or citizenship or immigration
status;
2. The processing of genetic or biometric data for the purpose of uniquely
identifying a natural person;
3. The personal data collected from a known child; or
4. Precise geolocation data.
"Personal data" means any information that is linked or
reasonably linkable to an identified or identifiable natural
person.
Interpreting Policies and Assessing Governance Impact
GDPR’s
Right
to
Erasure
At what point do you determine that personal data
are no longer necessary for the purposes for which
they were collected?
How does your organization
“manage consent”?
What does it mean to “erase” data?
Is the default to erase data that are no
longer necessary?
How do you keep track of the
controllers? How do you notify
them?
How do you locate all links,
copies, replications within your
own organization?
How do you convey obligations
to other controllers?
Protection of
consumer sensitive
data is mandated, yet
is excepted in certain
scenarios in which
there is lawful use of
the data!
Legal Complexities
“Policies” and Data Policies
• Laws, regulations, standards are
examples of “Policies” that direct
organizational behavior
• “Policies” impose policies on the
management and use of information via
data policies
• Data policies are defined to govern the
use of information within the context(s) of
the array of “Policies”
• Data policies must provide assurance
that data consumers are able to access
the data they need under the appropriate
circumstances and usage scenarios
Data Sensitivity Assessment & Classification
• Assessment
– Data discovery to
determine if the asset
contains potentially
sensitive data
• Classification
– Within the context of
defined policies, assign
one or more sensitivity
classifications to the data
asset by data attribute
Confidential data
Controlled unclassified data
Export-controlled data
IT security data
Government classified data
Sensitive corporate data
Chain of custody data
Personal data
Defining Data Policies
 Policy: Within the context, the actor’s privilege is limited via the constraint in accessing the asset at the level
of granularity during the duration.
 Example: Within the provider lookup process, the Fraud Analyst’s ability to view data is limited in viewing
the Provider Enrollment table records when there is an active fraud investigation for two weeks after the
investigation is launched
Actor: the user, role, and/or group that is subject to the policy
Granularity: the subset or component of the asset subject to the policy
Privilege: the permissions associated with accessing or using the asset
Constraint: the restriction imposed by the policy
Context: the circumstances under which the constraint is effective
Duration: the time frame within which the policy is in effect
Asset: the data object that requires a protection policy
You know it is true…
Translating, documenting,
defining, implementing,
ensuring compliance with,
and governing data policies
is hard.
Governance Gap
?
“Policy” owners understand how business
directives impact data policies but are
unfamiliar with the data and with the tools
to implement those policies
Data consumers are willing to abide by data
policies but are not aware of how those
policies are defined or implemented
IT developers manage data policy tools but
are unaware of data sensitivity and how
business directives are translated into data
policies
Due to the disparity between how policy owners interpret data policies and how they are actually implemented, no
single persona has the policy knowledge, technical expertise, and data awareness to deploy data policies
Closing the Governance Gap
• Employ tools that provide a
simplified mechanism for
granting privileges to data
consumers for controlled
access to the data they need
• Institute processes and
practices for defining data
policies using a defined
taxonomic categorization
• Map categories to data
domains and consumer
personas
• Use a semantic view to
logically express data
policies in a manageable
and scalable way
Semantic Approaches for Self-Service Governed Access
Data Owners
Data to be shared
Classifications
PHI
PII
FINANCIAL_DATA
…
Roles
Claims_Processor
Fraud_Analyst
Finance_Analyst
…
Assess sensitivity
Define classifications
Specify roles
Determine privileges
Define conceptual data
policies
Conceptual Policies
Claims_Processor may access FINANCIAL_DATA
Fraud_Analyst may access PII
…
Translate conceptual data
policies to target systems
1
2
3
Automate Policy Compliance and Auditing
Data
Consumer
Data
Consumer
Data
Consumer
Data
Consumer
Centralized
Policy
Portal
Enterprise Identity
Access Management
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Row-level & column-level data protection
Considerations: Governed Self-Service Access
• Centralized data governance team composed of data
policy drivers, data owners, data consumers, and
technicians
• Logical frameworks for policy specification
• Enforcement is delegated to business unit
• Data policy stewards
– Support the definition and translation of data policies
– Monitor policy compliance through tool interface
– Enforce policies according to line of business requirements
• Data owners
– Classify data according to categories of sensitivity
– Enable access for data sharing
– Register data assets in a data catalog
• Data consumers
– Browse data catalog
– Request access
– Access is automatically configured
• Data policy definition can be
automated using tools
• Data assets can be securely
shared
• Automated monitoring provides
an audit for compliance
• Data consumers are confident in
trustworthiness of the data
RAJIV DHOLAKIA
SVP Products
Privacera
Governed Self-Service
Analytics- A New Paradigm
Rajiv Dholakia, SVP Products
Date: July 2021
Enabling responsible use of data
Powered by Apache Ranger
Complying With Privacy Regulations Has Slowed
Down Cloud Migration And Analytics Initiatives
Do we have
any PII data in
the cloud?
How to enable
fine-grained
access control?
How to comply
with new regulations?
%
70%
said cloud migration
and analytics have
been made more
complex due to
compliance with
privacy regulations
* Survey conducted by 3rd party agency
in
100 interviews with execs from Fortune
500 companies
Balancing the Dual Mandate of Regulation
Compliance
and Data Sharing Presents More Challenges for IT
%
58%
report conflict
between data
scientists and data
security & compliance
teams due to access
restrictions
* Survey conducted by 3rd party agency
in
100 interviews with execs from Fortune
500 companies
BY 2025, EVERY BUSINESS IS GOING TO BE A
DATA DRIVEN BUSINESS
(OR START TO GO OUT OF BUSINESS)
WHAT IS HARD ABOUT A DATA DRIVEN BUSINESS?
DATA SOURCES & STORAGE COMPUTE CONSUME
DATA SOURCES & STORAGE COMPUTE CONSUME
DATA ACCESS GOVERNANCE CONTROL PLANE
IDENTITY & SECURITY
CONTROL PLANE
BUSINESS GOVERNANCE
CONTROL PLANE
ACCESS GOVERNANCE PLATFORM
DATA SOURCES & STORAGE COMPUTE CONSUME
DATA GOVERNANCE CONTROL PLANE
IDENTITY & SECURITY
CONTROL PLANE
BUSINESS GOVERNANCE
CONTROL PLANE
UNIVERSAL DATA ACCESS GOVERNANCE
PLATFORM
DISCOVER
ACCESS
POLICY
ENCRYPT
& SECURE
AUDIT
& REPORT
The Future of Governance
2024-2026
ACCESS
POLICY CREATION &
AUTOMATION
(Policy Sync & Governing
Data Sets)
2021-2023
2018-2020
ACCESS
POLICY
ENFORCEMEN
T
(Plugins & Policy in
Code, Ease of
Creation)
ASSISTED AUTOMATED INTELLIGENT
INTELLIGENT
DATA
GOVERNANCE
PLATFORM
A Peek at the Future…
Enabling responsible use of data
Powered by Apache Ranger
Teams/Roles
Check and Balances
Data Sets
Requirement
Configure
Data
Users
Access Data
Privacy and
Compliance Team
Requirement
Monitor
Governance
Team
Governance
Team
Requirement Security
Team
Configure
Data
Stewards
Data Sharing and Usage: Rethinking the Process
Data
Sources
Data
Assets
IT
Sales Data
Customers Data
Marketing Data
HR Data
Finance Data
Data Sharing and Usage: Putting it in Action
Data
Sources
Data
Assets
Data
Sharing
IT Owner
Sales Data
Customers Data
Marketing Data
HR Data
Finance Data
Sales Team
Support Team
Marketing Team
HR Team
Finance Team
Data Sharing and Usage: Governed Data Sharing
Data
Sources
Data
Assets
Data
Sharing
Projects
IT Owner Lead
Sales Data
Customers Data
Marketing Data
HR Data
Finance Data
Sales Team
Support Team
Marketing Team
HR Team
Finance Team
BI - Usage
Dashboards
(Customer Data)
Data Science –
Email
Campaigns
(Sales + Customer Data)
BI - Revenue
Projections
(Sales + Customer +
Finance Data)
Attributes of Governed Self-Service Analytics
Platform
•Centralized Visibility - Get visibility into all user activity and
proactively address any compliance violations
•Delegated Policy Administration - Central and local teams should
be able to build policies, not just with a better UI but in an automated
way
•Native Enforcement - Enforcement of policies should be done
closer to data and natively within the application
Visualize
Data
Governance
Let's stay in touch.
FOLLOW US ONLINE
@privacera
linkedin.com/company/privacera
Thank you!
EMAIL
rajiv.dholakia@privacera.com
VISIT OUR WEBSITE
http://www.privacera.com/solutions/governed-data-
sharing
Questions and Answers
David Loshin
President, Knowledge Integrity, Inc
loshin@knowledge-integrity.com
Rajiv Dholakia
SVP Products, Privacera
rajiv.dholakia@privacera.com, @dholakia
Thanks to Our Sponsor
36

More Related Content

What's hot

Applying Data Quality Best Practices at Big Data Scale
Applying Data Quality Best Practices at Big Data ScaleApplying Data Quality Best Practices at Big Data Scale
Applying Data Quality Best Practices at Big Data Scale
Precisely
 
Business Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and StewardshipBusiness Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and Stewardship
Pieter De Leenheer
 
Data Governance in a big data era
Data Governance in a big data eraData Governance in a big data era
Data Governance in a big data era
Pieter De Leenheer
 
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
Denodo
 
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
Pieter De Leenheer
 
Slides: Data Governance Reality Check
Slides: Data Governance Reality CheckSlides: Data Governance Reality Check
Slides: Data Governance Reality Check
DATAVERSITY
 
Enacting the data subjects access rights for gdpr with data services and data...
Enacting the data subjects access rights for gdpr with data services and data...Enacting the data subjects access rights for gdpr with data services and data...
Enacting the data subjects access rights for gdpr with data services and data...
Jean-Michel Franco
 
The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?
DATUM LLC
 
Change management success for data governance
Change management success for data governanceChange management success for data governance
Change management success for data governance
Reid Elliott
 
2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight
Vanessa Pulgarín Auquilla
 
Data Quality
Data QualityData Quality
Data Quality
Michael Collins
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareEnterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for Healthcare
DATA360US
 
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
DATAVERSITY
 
Data Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data IntelligenceData Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data Intelligence
Alation
 
Revolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experienceRevolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experience
Paul Dyksterhouse
 
Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality
DATAVERSITY
 
Enterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
Enterprise Data World Webinar: Mastering & Referencing Data for the EnterpriseEnterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
Enterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
DATAVERSITY
 
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
DATAVERSITY
 
Data Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data QualityData Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data Quality
Precisely
 
Data Strategy Flywheel
Data Strategy FlywheelData Strategy Flywheel
Data Strategy Flywheel
Alexander Mann
 

What's hot (20)

Applying Data Quality Best Practices at Big Data Scale
Applying Data Quality Best Practices at Big Data ScaleApplying Data Quality Best Practices at Big Data Scale
Applying Data Quality Best Practices at Big Data Scale
 
Business Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and StewardshipBusiness Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and Stewardship
 
Data Governance in a big data era
Data Governance in a big data eraData Governance in a big data era
Data Governance in a big data era
 
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
 
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
 
Slides: Data Governance Reality Check
Slides: Data Governance Reality CheckSlides: Data Governance Reality Check
Slides: Data Governance Reality Check
 
Enacting the data subjects access rights for gdpr with data services and data...
Enacting the data subjects access rights for gdpr with data services and data...Enacting the data subjects access rights for gdpr with data services and data...
Enacting the data subjects access rights for gdpr with data services and data...
 
The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?
 
Change management success for data governance
Change management success for data governanceChange management success for data governance
Change management success for data governance
 
2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight
 
Data Quality
Data QualityData Quality
Data Quality
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareEnterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for Healthcare
 
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
 
Data Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data IntelligenceData Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data Intelligence
 
Revolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experienceRevolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experience
 
Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality
 
Enterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
Enterprise Data World Webinar: Mastering & Referencing Data for the EnterpriseEnterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
Enterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
 
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
 
Data Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data QualityData Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data Quality
 
Data Strategy Flywheel
Data Strategy FlywheelData Strategy Flywheel
Data Strategy Flywheel
 

Similar to Closing the Governance Gap - Enabling Governed Self-Service Analytics

DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
CIOWomenMagazine
 
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATADATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
Uncodemy
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
Precisely
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
DATAVERSITY
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
Marc Vael
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Soumodeep Nanee Kundu
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management Strategy
Privacera
 
BRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEBBRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEB
Margaret (Peggy) Daley
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
elvinchan
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home Era
Neo4j
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
DATAVERSITY
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analytics
priyanka rajput
 

Similar to Closing the Governance Gap - Enabling Governed Self-Service Analytics (20)

DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATADATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management Strategy
 
BRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEBBRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEB
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home Era
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analytics
 

More from Privacera

Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance  Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance
Privacera
 
Fortifying Data Access and Security Controls to Accelerate Cloud Migration
Fortifying Data Access and Security Controls to Accelerate Cloud MigrationFortifying Data Access and Security Controls to Accelerate Cloud Migration
Fortifying Data Access and Security Controls to Accelerate Cloud Migration
Privacera
 
Data & the Machine Sofa Summit
Data & the Machine Sofa Summit Data & the Machine Sofa Summit
Data & the Machine Sofa Summit
Privacera
 
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera and Northwestern Mutual  - Scaling Privacy in a Spark EcosystemPrivacera and Northwestern Mutual  - Scaling Privacy in a Spark Ecosystem
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera
 
Why enterprise data privacy and security matters more than ever before
Why enterprise data privacy and security matters more than ever beforeWhy enterprise data privacy and security matters more than ever before
Why enterprise data privacy and security matters more than ever before
Privacera
 
History of Privacera
History of PrivaceraHistory of Privacera
History of Privacera
Privacera
 
How to streamline data governance and security across on-prem and cloud?
How to streamline data governance and security across on-prem and cloud?How to streamline data governance and security across on-prem and cloud?
How to streamline data governance and security across on-prem and cloud?
Privacera
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
Privacera
 
Privacera Product Overview: Secure Data Sharing Across Cloud Services
Privacera Product Overview: Secure Data Sharing Across Cloud ServicesPrivacera Product Overview: Secure Data Sharing Across Cloud Services
Privacera Product Overview: Secure Data Sharing Across Cloud Services
Privacera
 

More from Privacera (9)

Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance  Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance
 
Fortifying Data Access and Security Controls to Accelerate Cloud Migration
Fortifying Data Access and Security Controls to Accelerate Cloud MigrationFortifying Data Access and Security Controls to Accelerate Cloud Migration
Fortifying Data Access and Security Controls to Accelerate Cloud Migration
 
Data & the Machine Sofa Summit
Data & the Machine Sofa Summit Data & the Machine Sofa Summit
Data & the Machine Sofa Summit
 
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera and Northwestern Mutual  - Scaling Privacy in a Spark EcosystemPrivacera and Northwestern Mutual  - Scaling Privacy in a Spark Ecosystem
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
 
Why enterprise data privacy and security matters more than ever before
Why enterprise data privacy and security matters more than ever beforeWhy enterprise data privacy and security matters more than ever before
Why enterprise data privacy and security matters more than ever before
 
History of Privacera
History of PrivaceraHistory of Privacera
History of Privacera
 
How to streamline data governance and security across on-prem and cloud?
How to streamline data governance and security across on-prem and cloud?How to streamline data governance and security across on-prem and cloud?
How to streamline data governance and security across on-prem and cloud?
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
Privacera Product Overview: Secure Data Sharing Across Cloud Services
Privacera Product Overview: Secure Data Sharing Across Cloud ServicesPrivacera Product Overview: Secure Data Sharing Across Cloud Services
Privacera Product Overview: Secure Data Sharing Across Cloud Services
 

Recently uploaded

一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
74nqk8xf
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
fkyes25
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 

Recently uploaded (20)

一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 

Closing the Governance Gap - Enabling Governed Self-Service Analytics

  • 1. July 15, 2021 Closing the Governance Gap: Enabling Governed Self-Service Analytics David Loshin President, Knowledge Integrity Program Director, Master of Information Management, University of Maryland
  • 3. DAVID LOSHIN President, Knowledge Integrity, Inc. Program Director, Master of Information Management, University of Maryland
  • 4. Data Sensitivity • Growing recognition of risks of exposing individuals’ personal and private information – Emerging indignance over corporations using and selling what is believed to be personal or private information – Increasing number and volume of data breaches – Expanding interest of governmental intervention and protection • A growing inventory of global regulations address the need to secure and protect individuals’ personal and private data • Growing awareness of the general concepts of protection of “sensitive” data
  • 6. Variance in Definitions and Semantics “Personal information” means information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household. Personal information includes, but is not limited to, the following if it identifies, relates to, describes, is reasonably capable of being associated with, or could be reasonably linked, directly or indirectly, with a particular consumer or household Name Alias Postal address Account name SSN Email address IP address Driver’s license Passport number Other personal identifiers Products or services considered Products or services purchased Products or services obtained Purchasing histories Personal property records Consuming history Biometric information Geolocation information Education information Employment information Interaction with an internet website Search history Browsing history Electronic data Audio data Visual data Thermal data Olfactory data "Sensitive data" means a category of personal data that includes: 1. Personal data revealing racial or ethnic origin, religious beliefs, mental or physical health diagnosis, sexual orientation, or citizenship or immigration status; 2. The processing of genetic or biometric data for the purpose of uniquely identifying a natural person; 3. The personal data collected from a known child; or 4. Precise geolocation data. "Personal data" means any information that is linked or reasonably linkable to an identified or identifiable natural person.
  • 7. Interpreting Policies and Assessing Governance Impact GDPR’s Right to Erasure At what point do you determine that personal data are no longer necessary for the purposes for which they were collected? How does your organization “manage consent”? What does it mean to “erase” data? Is the default to erase data that are no longer necessary? How do you keep track of the controllers? How do you notify them? How do you locate all links, copies, replications within your own organization? How do you convey obligations to other controllers?
  • 8. Protection of consumer sensitive data is mandated, yet is excepted in certain scenarios in which there is lawful use of the data! Legal Complexities
  • 9. “Policies” and Data Policies • Laws, regulations, standards are examples of “Policies” that direct organizational behavior • “Policies” impose policies on the management and use of information via data policies • Data policies are defined to govern the use of information within the context(s) of the array of “Policies” • Data policies must provide assurance that data consumers are able to access the data they need under the appropriate circumstances and usage scenarios
  • 10. Data Sensitivity Assessment & Classification • Assessment – Data discovery to determine if the asset contains potentially sensitive data • Classification – Within the context of defined policies, assign one or more sensitivity classifications to the data asset by data attribute Confidential data Controlled unclassified data Export-controlled data IT security data Government classified data Sensitive corporate data Chain of custody data Personal data
  • 11. Defining Data Policies  Policy: Within the context, the actor’s privilege is limited via the constraint in accessing the asset at the level of granularity during the duration.  Example: Within the provider lookup process, the Fraud Analyst’s ability to view data is limited in viewing the Provider Enrollment table records when there is an active fraud investigation for two weeks after the investigation is launched Actor: the user, role, and/or group that is subject to the policy Granularity: the subset or component of the asset subject to the policy Privilege: the permissions associated with accessing or using the asset Constraint: the restriction imposed by the policy Context: the circumstances under which the constraint is effective Duration: the time frame within which the policy is in effect Asset: the data object that requires a protection policy
  • 12. You know it is true… Translating, documenting, defining, implementing, ensuring compliance with, and governing data policies is hard.
  • 13. Governance Gap ? “Policy” owners understand how business directives impact data policies but are unfamiliar with the data and with the tools to implement those policies Data consumers are willing to abide by data policies but are not aware of how those policies are defined or implemented IT developers manage data policy tools but are unaware of data sensitivity and how business directives are translated into data policies Due to the disparity between how policy owners interpret data policies and how they are actually implemented, no single persona has the policy knowledge, technical expertise, and data awareness to deploy data policies
  • 14. Closing the Governance Gap • Employ tools that provide a simplified mechanism for granting privileges to data consumers for controlled access to the data they need • Institute processes and practices for defining data policies using a defined taxonomic categorization • Map categories to data domains and consumer personas • Use a semantic view to logically express data policies in a manageable and scalable way
  • 15. Semantic Approaches for Self-Service Governed Access Data Owners Data to be shared Classifications PHI PII FINANCIAL_DATA … Roles Claims_Processor Fraud_Analyst Finance_Analyst … Assess sensitivity Define classifications Specify roles Determine privileges Define conceptual data policies Conceptual Policies Claims_Processor may access FINANCIAL_DATA Fraud_Analyst may access PII … Translate conceptual data policies to target systems 1 2 3
  • 16. Automate Policy Compliance and Auditing Data Consumer Data Consumer Data Consumer Data Consumer Centralized Policy Portal Enterprise Identity Access Management Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Row-level & column-level data protection
  • 17. Considerations: Governed Self-Service Access • Centralized data governance team composed of data policy drivers, data owners, data consumers, and technicians • Logical frameworks for policy specification • Enforcement is delegated to business unit • Data policy stewards – Support the definition and translation of data policies – Monitor policy compliance through tool interface – Enforce policies according to line of business requirements • Data owners – Classify data according to categories of sensitivity – Enable access for data sharing – Register data assets in a data catalog • Data consumers – Browse data catalog – Request access – Access is automatically configured • Data policy definition can be automated using tools • Data assets can be securely shared • Automated monitoring provides an audit for compliance • Data consumers are confident in trustworthiness of the data
  • 19. Governed Self-Service Analytics- A New Paradigm Rajiv Dholakia, SVP Products Date: July 2021 Enabling responsible use of data Powered by Apache Ranger
  • 20. Complying With Privacy Regulations Has Slowed Down Cloud Migration And Analytics Initiatives Do we have any PII data in the cloud? How to enable fine-grained access control? How to comply with new regulations? % 70% said cloud migration and analytics have been made more complex due to compliance with privacy regulations * Survey conducted by 3rd party agency in 100 interviews with execs from Fortune 500 companies
  • 21. Balancing the Dual Mandate of Regulation Compliance and Data Sharing Presents More Challenges for IT % 58% report conflict between data scientists and data security & compliance teams due to access restrictions * Survey conducted by 3rd party agency in 100 interviews with execs from Fortune 500 companies
  • 22. BY 2025, EVERY BUSINESS IS GOING TO BE A DATA DRIVEN BUSINESS (OR START TO GO OUT OF BUSINESS)
  • 23. WHAT IS HARD ABOUT A DATA DRIVEN BUSINESS? DATA SOURCES & STORAGE COMPUTE CONSUME
  • 24. DATA SOURCES & STORAGE COMPUTE CONSUME DATA ACCESS GOVERNANCE CONTROL PLANE IDENTITY & SECURITY CONTROL PLANE BUSINESS GOVERNANCE CONTROL PLANE ACCESS GOVERNANCE PLATFORM
  • 25. DATA SOURCES & STORAGE COMPUTE CONSUME DATA GOVERNANCE CONTROL PLANE IDENTITY & SECURITY CONTROL PLANE BUSINESS GOVERNANCE CONTROL PLANE UNIVERSAL DATA ACCESS GOVERNANCE PLATFORM DISCOVER ACCESS POLICY ENCRYPT & SECURE AUDIT & REPORT
  • 26. The Future of Governance 2024-2026 ACCESS POLICY CREATION & AUTOMATION (Policy Sync & Governing Data Sets) 2021-2023 2018-2020 ACCESS POLICY ENFORCEMEN T (Plugins & Policy in Code, Ease of Creation) ASSISTED AUTOMATED INTELLIGENT INTELLIGENT DATA GOVERNANCE PLATFORM
  • 27. A Peek at the Future… Enabling responsible use of data Powered by Apache Ranger
  • 28. Teams/Roles Check and Balances Data Sets Requirement Configure Data Users Access Data Privacy and Compliance Team Requirement Monitor Governance Team Governance Team Requirement Security Team Configure Data Stewards
  • 29. Data Sharing and Usage: Rethinking the Process Data Sources Data Assets IT Sales Data Customers Data Marketing Data HR Data Finance Data
  • 30. Data Sharing and Usage: Putting it in Action Data Sources Data Assets Data Sharing IT Owner Sales Data Customers Data Marketing Data HR Data Finance Data Sales Team Support Team Marketing Team HR Team Finance Team
  • 31. Data Sharing and Usage: Governed Data Sharing Data Sources Data Assets Data Sharing Projects IT Owner Lead Sales Data Customers Data Marketing Data HR Data Finance Data Sales Team Support Team Marketing Team HR Team Finance Team BI - Usage Dashboards (Customer Data) Data Science – Email Campaigns (Sales + Customer Data) BI - Revenue Projections (Sales + Customer + Finance Data)
  • 32. Attributes of Governed Self-Service Analytics Platform •Centralized Visibility - Get visibility into all user activity and proactively address any compliance violations •Delegated Policy Administration - Central and local teams should be able to build policies, not just with a better UI but in an automated way •Native Enforcement - Enforcement of policies should be done closer to data and natively within the application
  • 34. Let's stay in touch. FOLLOW US ONLINE @privacera linkedin.com/company/privacera Thank you! EMAIL rajiv.dholakia@privacera.com VISIT OUR WEBSITE http://www.privacera.com/solutions/governed-data- sharing
  • 35. Questions and Answers David Loshin President, Knowledge Integrity, Inc loshin@knowledge-integrity.com Rajiv Dholakia SVP Products, Privacera rajiv.dholakia@privacera.com, @dholakia
  • 36. Thanks to Our Sponsor 36