SlideShare a Scribd company logo
Maturing the Data Management Practice
A comprehensive analysis of process and organizational structure for delivering trusted, quality Business Intelligence
May, 2012
A Business Analysis CASE STUDY By David Ladd, Axis Business Strategist
A top-five Property and Casualty Insurance Carrier needed to improve the breadth and
accuracy of its Business Intelligence. The current platform was inflexible and limited
the carrier’s ability to respond to a dynamic business environment. The company
needed to perform comprehensive on-demand analysis to enable development of
quick yet thorough response strategies.
Maturing the Data Management Practice A Business Analysis CASE STUDY
The Client had been aggressively growing
its book of business over the past several
years. The objective of each new
acquisition was to integrate as efficiently as
possible, thereby accelerating the realization
of benefits from the merger. This lead to
systems and organizations that were stove-
piped and disjointed.
The goal of the assessment was to examine
how data is managed for systems and
organizations across the stove-piped
boundaries. This began with a high-level
inventory of current Data Management
practices and processes, as well as a
comparison to industry best practices.
The assessment process engaged key
subject matter experts to identify needed
business capabilities and describe the data
management roadblocks.
Based on the organization’s prioritized
needs, an initiative roadmap identified the
critical path items that would most benefit
the business.

A scoring system to establish
priorities and a Roadmap of
initiatives to show dependencies
and the critical path for delivery.
Although the client had an existing Data Management Practice, they wanted to meld industry
best practices into their organization to improve the ability of that Practice to serve the
business’ needs. This required thorough analysis of the current Data Management Practice
and an understanding of both the short-term pragmatic needs of the business as well as the
longer-term strategic needs. Subsequently, process and operational controls were required to
ensure that the business received data certified to meet tolerances for timeliness, accuracy,
and quality.
Introduction
Data Management Assessment
Maturing the Data Management Practice
A Business Analysis CASE STUDY By David Ladd, Axis Business Strategist
Maturing the Data Management Practice A Business Analysis CASE STUDY

The System Development Life Cycle was extended to
deliver Data Quality Controls, Profiling, Data Architecture,
Security, and Metadata Capture.
Program Delivery
Job-Aid: MI Information Classifications
MI Data Elements are classified at two levels, Major and Minor. The Major
classifications tend to be business oriented and communicated in business terms.
They are expressed independent of technology and implementation. The Minor
classifications are based on existing technologies and implementation details.
Major Elements
Major elements are defined according to the following business-oriented
classifications:
 Measure
 Metric
 Dimension.
These are defined as follows:
Measure – The elements of information that managers use to monitor their
business. Measures are what business managers use to find new trends,
look for innovation opportunities, or quantify the success or failure of the
organization.
Example:
 Closure Rate – The % of Claims with a net incurred amount that
are closed.
Metric – A target or benchmark associated with a measure. Different
business units may use different metrics.
Examples:
 Business Unit 1 objective is 90% Closure Rate
 Business Unit 2 objective is 80% Closure Rate
Dimension – Dimensions are elements used to describe and add meaning
to measures. For example, dimensions can qualify measurements by
product, market, time, period, etc. When the dimensions are combined
with measures end users are empowered to answer specific business
questions.
Examples:
 by Region
 by Month
 by Product
Major Element Summary
Combining Measures, Metrics, and Dimensions will yield the basis for
management information that supports business analysis.
Example:
 The Number of Claims with a net incurred amount that closed
within the 90% threshold by region.
Minor Elements
Job-Aid: MI Information Classifications
MI Data Elements are classified at two levels, Major and Minor. The Major
classifications tend to be business oriented and communicated in business terms.
They are expressed independent of technology and implementation. The Minor
classifications are based on existing technologies and implementation details.
Major Elements
Major elements are defined according to the following business-oriented
classifications:
 Measure
 Metric
 Dimension.
These are defined as follows:
Measure – The elements of information that managers use to monitor their
business. Measures are what business managers use to find new trends,
look for innovation opportunities, or quantify the success or failure of the
organization.
Example:
 Closure Rate – The % of Claims with a net incurred amount that
are closed.
Metric – A target or benchmark associated with a measure. Different
business units may use different metrics.
Examples:
 Business Unit 1 objective is 90% Closure Rate
 Business Unit 2 objective is 80% Closure Rate
Dimension – Dimensions are elements used to describe and add meaning
to measures. For example, dimensions can qualify measurements by
product, market, time, period, etc. When the dimensions are combined
with measures end users are empowered to answer specific business
questions.
Examples:
 by Region
 by Month
 by Product
Major Element Summary
Combining Measures, Metrics, and Dimensions will yield the basis for
management information that supports business analysis.
Example:
 The Number of Claims with a net incurred amount that closed
within the 90% threshold by region.
Minor Elements
The Data Management initiatives ensured
development of programs that would
integrate across the “6 pillars” of Data
Management, Data Governance being at
the center.
Data Management was integrated into the
delivery lifecycle. This ensured that the
business needs for timeliness, accuracy,
and quality were captured in the
requirements phase, implemented in the
development phase, and then verified and
approved in the testing phase.
Additionally, operational controls
established periodic Quality Audits
to pro-actively identify data quality
problems and their root causes
before the business could be
negatively impacted. The activity
lowered the incidents of reporting
delays due to data correction and
reloading.
The metadata repository provided
a common lexicon bridging the
business and technical
interpretations of business
intelligence. The result was
improved information consistency,
reduced redundancy, and
enhanced reusability.
Maturing the Data Management Practice
A Business Analysis CASE STUDY By David Ladd, Axis Business Strategist
Maturing the Data Management Practice A Business Analysis CASE STUDY
The solution for maturing a Data Management Practice cannot use a “one size fits all”
approach. The current maturity level must be compared against the unique needs of the
organization to develop a roadmap of initiatives. The key is to understand the prioritized
needs of the business as a foundation for developing a strategy to mature the Data
Management Practice.
In Closing
The Knowledge Transfer Phase
ensured that all impacted parties
understood their roles and tasks
within the new process.
 Knowledge Transfer and Communication Plan
The Communication Plan explained
to all constituents what the
improved Data Management
Program would deliver and what it
meant to them. It delivered
periodic updates in the form of
performance metrics that monitor
progress over time.

More Related Content

What's hot

Effective master data management
Effective master data managementEffective master data management
Effective master data management
Ismail Vurel
 
About pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessmentsAbout pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessments
Element22
 
About Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of DataAbout Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of Data
Element22
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance Program
Bohdiman
 
Information systems
Information systemsInformation systems
Information systems
mzedan
 
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Element22
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
Kannan Subbiah
 
EIM Presentation 2016
EIM Presentation 2016EIM Presentation 2016
EIM Presentation 2016
John Bao Vuu
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
Precisely
 
Building an Effective & Extensible Data & Analytics Operating Model
Building an Effective & Extensible Data & Analytics Operating ModelBuilding an Effective & Extensible Data & Analytics Operating Model
Building an Effective & Extensible Data & Analytics Operating Model
Cognizant
 
Enterprise Performance Management
Enterprise Performance ManagementEnterprise Performance Management
Enterprise Performance Management
Sundarrajan Mungunthan
 
2013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 3
2013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 32013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 3
2013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 3
Taldor Group
 
7 principles of data quality management
7 principles of data quality management7 principles of data quality management
7 principles of data quality management
MileyJames
 
Data Governance for Enterprises
Data Governance for EnterprisesData Governance for Enterprises
Data Governance for Enterprises
Chaitanya Avasarala
 
MDM Mistakes & How to Avoid Them!
MDM Mistakes & How to Avoid Them!MDM Mistakes & How to Avoid Them!
MDM Mistakes & How to Avoid Them!
Alan Lee White
 
EVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance Posture
EVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance PostureEVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance Posture
EVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance Posture
Michele Collu
 
Business Performance Management - Business Intelligence for Managers
Business Performance Management - Business Intelligence for ManagersBusiness Performance Management - Business Intelligence for Managers
Business Performance Management - Business Intelligence for Managers
João Gretzitz
 
Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap
Info-Tech Research Group
 
How accurate are your company data
How accurate are your company dataHow accurate are your company data
How accurate are your company data
CLT Valuebased Services
 
Strategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI AffectStrategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI Affect
Farooq Omar
 

What's hot (20)

Effective master data management
Effective master data managementEffective master data management
Effective master data management
 
About pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessmentsAbout pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessments
 
About Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of DataAbout Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of Data
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance Program
 
Information systems
Information systemsInformation systems
Information systems
 
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
 
EIM Presentation 2016
EIM Presentation 2016EIM Presentation 2016
EIM Presentation 2016
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
 
Building an Effective & Extensible Data & Analytics Operating Model
Building an Effective & Extensible Data & Analytics Operating ModelBuilding an Effective & Extensible Data & Analytics Operating Model
Building an Effective & Extensible Data & Analytics Operating Model
 
Enterprise Performance Management
Enterprise Performance ManagementEnterprise Performance Management
Enterprise Performance Management
 
2013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 3
2013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 32013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 3
2013 04 irm mdmdg - jon asprey 4 most asked dg questions v 1 3
 
7 principles of data quality management
7 principles of data quality management7 principles of data quality management
7 principles of data quality management
 
Data Governance for Enterprises
Data Governance for EnterprisesData Governance for Enterprises
Data Governance for Enterprises
 
MDM Mistakes & How to Avoid Them!
MDM Mistakes & How to Avoid Them!MDM Mistakes & How to Avoid Them!
MDM Mistakes & How to Avoid Them!
 
EVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance Posture
EVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance PostureEVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance Posture
EVERFI/SEI Webinar: Implementing a Competitive GDPR Compliance Posture
 
Business Performance Management - Business Intelligence for Managers
Business Performance Management - Business Intelligence for ManagersBusiness Performance Management - Business Intelligence for Managers
Business Performance Management - Business Intelligence for Managers
 
Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap
 
How accurate are your company data
How accurate are your company dataHow accurate are your company data
How accurate are your company data
 
Strategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI AffectStrategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI Affect
 

Similar to Data Management Strategy

Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approach
Sam Thomsett
 
Strategic Supply Chain Management (English Version)
Strategic Supply Chain Management (English Version)Strategic Supply Chain Management (English Version)
Strategic Supply Chain Management (English Version)
YogaIrsyadillahNusan
 
Strategic Supply Chain Management
Strategic Supply Chain Management Strategic Supply Chain Management
Strategic Supply Chain Management
YogaIrsyadillahNusan
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
Gaffri Johnson
 
189 .docx
189                                                       .docx189                                                       .docx
189 .docx
drennanmicah
 
Infographic: Data Governance Best Practices
Infographic: Data Governance Best Practices Infographic: Data Governance Best Practices
Infographic: Data Governance Best Practices
Enterprise Management Associates
 
Business Performance Management Assessment Tools
Business Performance Management Assessment ToolsBusiness Performance Management Assessment Tools
Business Performance Management Assessment Tools
Rachel Phillips
 
Managing and Using Information Systems A Strategic Approach –.docx
Managing and Using Information Systems A Strategic Approach –.docxManaging and Using Information Systems A Strategic Approach –.docx
Managing and Using Information Systems A Strategic Approach –.docx
tienboileau
 
Mastering Master Data Management
Mastering Master Data ManagementMastering Master Data Management
Mastering Master Data Management
ITC Infotech
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurement
lleuciuc1
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Capgemini
 
Enterprise-Level Preparation for Master Data Management.pdf
Enterprise-Level Preparation for Master Data Management.pdfEnterprise-Level Preparation for Master Data Management.pdf
Enterprise-Level Preparation for Master Data Management.pdf
AmeliaWong21
 
Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk
Rolta
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management Agent
Jerald Burget
 
Data Management for Business Intelligence
Data Management for Business IntelligenceData Management for Business Intelligence
Data Management for Business Intelligence
FindWhitePapers
 
DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts
Angela Boyd
 
Best Practices of Data Governance.pptx
Best Practices of Data Governance.pptxBest Practices of Data Governance.pptx
Best Practices of Data Governance.pptx
preludesyscloudmigra
 
Mi0036 business intelligence tools
Mi0036  business intelligence toolsMi0036  business intelligence tools
Mi0036 business intelligence tools
smumbahelp
 
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
DATAVERSITY
 
Leading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomesLeading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomes
Guy Pearce
 

Similar to Data Management Strategy (20)

Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approach
 
Strategic Supply Chain Management (English Version)
Strategic Supply Chain Management (English Version)Strategic Supply Chain Management (English Version)
Strategic Supply Chain Management (English Version)
 
Strategic Supply Chain Management
Strategic Supply Chain Management Strategic Supply Chain Management
Strategic Supply Chain Management
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
189 .docx
189                                                       .docx189                                                       .docx
189 .docx
 
Infographic: Data Governance Best Practices
Infographic: Data Governance Best Practices Infographic: Data Governance Best Practices
Infographic: Data Governance Best Practices
 
Business Performance Management Assessment Tools
Business Performance Management Assessment ToolsBusiness Performance Management Assessment Tools
Business Performance Management Assessment Tools
 
Managing and Using Information Systems A Strategic Approach –.docx
Managing and Using Information Systems A Strategic Approach –.docxManaging and Using Information Systems A Strategic Approach –.docx
Managing and Using Information Systems A Strategic Approach –.docx
 
Mastering Master Data Management
Mastering Master Data ManagementMastering Master Data Management
Mastering Master Data Management
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurement
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
Enterprise-Level Preparation for Master Data Management.pdf
Enterprise-Level Preparation for Master Data Management.pdfEnterprise-Level Preparation for Master Data Management.pdf
Enterprise-Level Preparation for Master Data Management.pdf
 
Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management Agent
 
Data Management for Business Intelligence
Data Management for Business IntelligenceData Management for Business Intelligence
Data Management for Business Intelligence
 
DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts
 
Best Practices of Data Governance.pptx
Best Practices of Data Governance.pptxBest Practices of Data Governance.pptx
Best Practices of Data Governance.pptx
 
Mi0036 business intelligence tools
Mi0036  business intelligence toolsMi0036  business intelligence tools
Mi0036 business intelligence tools
 
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
 
Leading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomesLeading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomes
 

More from Axis Technology, LLC

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
Axis Technology, LLC
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White Paper
Axis Technology, LLC
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White Paper
Axis Technology, LLC
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection Brochure
Axis Technology, LLC
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
Axis Technology, LLC
 
eGRC Strategy Brochure
eGRC Strategy BrochureeGRC Strategy Brochure
eGRC Strategy Brochure
Axis Technology, LLC
 
Entitlement Management Brochure
Entitlement Management Brochure Entitlement Management Brochure
Entitlement Management Brochure
Axis Technology, LLC
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy Brochure
Axis Technology, LLC
 
Data Governance Brochure
Data Governance BrochureData Governance Brochure
Data Governance Brochure
Axis Technology, LLC
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
Axis Technology, LLC
 
Client Connections
Client Connections Client Connections
Client Connections
Axis Technology, LLC
 
Brokerage Executive Dashboard
Brokerage Executive DashboardBrokerage Executive Dashboard
Brokerage Executive Dashboard
Axis Technology, LLC
 
Wealth Management
Wealth ManagementWealth Management
Wealth Management
Axis Technology, LLC
 
IRA Simplification Project
IRA Simplification ProjectIRA Simplification Project
IRA Simplification Project
Axis Technology, LLC
 
Joint Analysis Design
Joint Analysis DesignJoint Analysis Design
Joint Analysis Design
Axis Technology, LLC
 
Enterprise Data Architecture
Enterprise Data Architecture Enterprise Data Architecture
Enterprise Data Architecture
Axis Technology, LLC
 
Reference Data Management
Reference Data Management Reference Data Management
Reference Data Management
Axis Technology, LLC
 
Axis Consulting Case Studies
Axis Consulting Case StudiesAxis Consulting Case Studies
Axis Consulting Case Studies
Axis Technology, LLC
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting Overview
Axis Technology, LLC
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
Axis Technology, LLC
 

More from Axis Technology, LLC (20)

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White Paper
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White Paper
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection Brochure
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
 
eGRC Strategy Brochure
eGRC Strategy BrochureeGRC Strategy Brochure
eGRC Strategy Brochure
 
Entitlement Management Brochure
Entitlement Management Brochure Entitlement Management Brochure
Entitlement Management Brochure
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy Brochure
 
Data Governance Brochure
Data Governance BrochureData Governance Brochure
Data Governance Brochure
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Client Connections
Client Connections Client Connections
Client Connections
 
Brokerage Executive Dashboard
Brokerage Executive DashboardBrokerage Executive Dashboard
Brokerage Executive Dashboard
 
Wealth Management
Wealth ManagementWealth Management
Wealth Management
 
IRA Simplification Project
IRA Simplification ProjectIRA Simplification Project
IRA Simplification Project
 
Joint Analysis Design
Joint Analysis DesignJoint Analysis Design
Joint Analysis Design
 
Enterprise Data Architecture
Enterprise Data Architecture Enterprise Data Architecture
Enterprise Data Architecture
 
Reference Data Management
Reference Data Management Reference Data Management
Reference Data Management
 
Axis Consulting Case Studies
Axis Consulting Case StudiesAxis Consulting Case Studies
Axis Consulting Case Studies
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting Overview
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Data Management Strategy

  • 1. Maturing the Data Management Practice A comprehensive analysis of process and organizational structure for delivering trusted, quality Business Intelligence May, 2012 A Business Analysis CASE STUDY By David Ladd, Axis Business Strategist A top-five Property and Casualty Insurance Carrier needed to improve the breadth and accuracy of its Business Intelligence. The current platform was inflexible and limited the carrier’s ability to respond to a dynamic business environment. The company needed to perform comprehensive on-demand analysis to enable development of quick yet thorough response strategies. Maturing the Data Management Practice A Business Analysis CASE STUDY The Client had been aggressively growing its book of business over the past several years. The objective of each new acquisition was to integrate as efficiently as possible, thereby accelerating the realization of benefits from the merger. This lead to systems and organizations that were stove- piped and disjointed. The goal of the assessment was to examine how data is managed for systems and organizations across the stove-piped boundaries. This began with a high-level inventory of current Data Management practices and processes, as well as a comparison to industry best practices. The assessment process engaged key subject matter experts to identify needed business capabilities and describe the data management roadblocks. Based on the organization’s prioritized needs, an initiative roadmap identified the critical path items that would most benefit the business.  A scoring system to establish priorities and a Roadmap of initiatives to show dependencies and the critical path for delivery. Although the client had an existing Data Management Practice, they wanted to meld industry best practices into their organization to improve the ability of that Practice to serve the business’ needs. This required thorough analysis of the current Data Management Practice and an understanding of both the short-term pragmatic needs of the business as well as the longer-term strategic needs. Subsequently, process and operational controls were required to ensure that the business received data certified to meet tolerances for timeliness, accuracy, and quality. Introduction Data Management Assessment
  • 2. Maturing the Data Management Practice A Business Analysis CASE STUDY By David Ladd, Axis Business Strategist Maturing the Data Management Practice A Business Analysis CASE STUDY  The System Development Life Cycle was extended to deliver Data Quality Controls, Profiling, Data Architecture, Security, and Metadata Capture. Program Delivery Job-Aid: MI Information Classifications MI Data Elements are classified at two levels, Major and Minor. The Major classifications tend to be business oriented and communicated in business terms. They are expressed independent of technology and implementation. The Minor classifications are based on existing technologies and implementation details. Major Elements Major elements are defined according to the following business-oriented classifications:  Measure  Metric  Dimension. These are defined as follows: Measure – The elements of information that managers use to monitor their business. Measures are what business managers use to find new trends, look for innovation opportunities, or quantify the success or failure of the organization. Example:  Closure Rate – The % of Claims with a net incurred amount that are closed. Metric – A target or benchmark associated with a measure. Different business units may use different metrics. Examples:  Business Unit 1 objective is 90% Closure Rate  Business Unit 2 objective is 80% Closure Rate Dimension – Dimensions are elements used to describe and add meaning to measures. For example, dimensions can qualify measurements by product, market, time, period, etc. When the dimensions are combined with measures end users are empowered to answer specific business questions. Examples:  by Region  by Month  by Product Major Element Summary Combining Measures, Metrics, and Dimensions will yield the basis for management information that supports business analysis. Example:  The Number of Claims with a net incurred amount that closed within the 90% threshold by region. Minor Elements Job-Aid: MI Information Classifications MI Data Elements are classified at two levels, Major and Minor. The Major classifications tend to be business oriented and communicated in business terms. They are expressed independent of technology and implementation. The Minor classifications are based on existing technologies and implementation details. Major Elements Major elements are defined according to the following business-oriented classifications:  Measure  Metric  Dimension. These are defined as follows: Measure – The elements of information that managers use to monitor their business. Measures are what business managers use to find new trends, look for innovation opportunities, or quantify the success or failure of the organization. Example:  Closure Rate – The % of Claims with a net incurred amount that are closed. Metric – A target or benchmark associated with a measure. Different business units may use different metrics. Examples:  Business Unit 1 objective is 90% Closure Rate  Business Unit 2 objective is 80% Closure Rate Dimension – Dimensions are elements used to describe and add meaning to measures. For example, dimensions can qualify measurements by product, market, time, period, etc. When the dimensions are combined with measures end users are empowered to answer specific business questions. Examples:  by Region  by Month  by Product Major Element Summary Combining Measures, Metrics, and Dimensions will yield the basis for management information that supports business analysis. Example:  The Number of Claims with a net incurred amount that closed within the 90% threshold by region. Minor Elements The Data Management initiatives ensured development of programs that would integrate across the “6 pillars” of Data Management, Data Governance being at the center. Data Management was integrated into the delivery lifecycle. This ensured that the business needs for timeliness, accuracy, and quality were captured in the requirements phase, implemented in the development phase, and then verified and approved in the testing phase. Additionally, operational controls established periodic Quality Audits to pro-actively identify data quality problems and their root causes before the business could be negatively impacted. The activity lowered the incidents of reporting delays due to data correction and reloading. The metadata repository provided a common lexicon bridging the business and technical interpretations of business intelligence. The result was improved information consistency, reduced redundancy, and enhanced reusability.
  • 3. Maturing the Data Management Practice A Business Analysis CASE STUDY By David Ladd, Axis Business Strategist Maturing the Data Management Practice A Business Analysis CASE STUDY The solution for maturing a Data Management Practice cannot use a “one size fits all” approach. The current maturity level must be compared against the unique needs of the organization to develop a roadmap of initiatives. The key is to understand the prioritized needs of the business as a foundation for developing a strategy to mature the Data Management Practice. In Closing The Knowledge Transfer Phase ensured that all impacted parties understood their roles and tasks within the new process.  Knowledge Transfer and Communication Plan The Communication Plan explained to all constituents what the improved Data Management Program would deliver and what it meant to them. It delivered periodic updates in the form of performance metrics that monitor progress over time.