SlideShare a Scribd company logo
Steve Weissman 
Holly Group 
5 Keys to Managing 
Information as an 
Asset 
The Ultimate Governance Challenge 
The Info Gov Guy!
What’s Information?
What’s Information? 
 Customer lists 
 Financial reports 
 Contracts 
 Payables/receivables 
 Emails + attachments 
 Correspondence 
 Market intelligence 
 Staff experiences
What’s Information? 
 Customer lists 
 Financial reports 
 Contracts 
 Payables/receivables 
 Emails + attachments 
 Correspondence 
 Market intelligence 
 Staff experiences
What’s an Asset?
What’s an Asset? 
 Computers and cubicles 
 Office desks and chairs 
 Bank accounts 
 Intellectual property 
 Best practices 
Image: www.brandyoubrilliant.com
What is ‘Information as an Asset’? 
 Knowledge or facts that are valuable to and owned by you
What is ‘Information as an Asset’? 
 Knowledge or facts that are valuable to and owned by you 
Image: www.icmc2008.net
Elements of 
Information Value 
© Holly Group 
All Rights Reserved.
Elements of 
Information Value 
© Holly Group 
All Rights Reserved.
Elements of 
Information Value 
 Missing or poor data? 
- No utility. 
© Holly Group 
All Rights Reserved.
Elements of 
Information Value 
 Missing or poor data? 
- No utility. 
 Missing or wrong context? 
- Not meaningful 
© Holly Group 
All Rights Reserved.
Elements of 
Information Value 
 Missing or poor data? 
- No utility. 
 Missing or wrong context? 
- Not meaningful 
 Mismatched formats? 
- Not shareable. 
© Holly Group 
All Rights Reserved.
Elements of 
Information Value 
 Missing or poor data? 
- No utility. 
 Missing or wrong context? 
- Not meaningful 
© Holly Group 
All Rights Reserved. 
 Mismatched formats? 
- Not shareable. 
 Improper medium? 
- Not receivable
Elements of 
Information Value 
 Decisions regarding one 
strand affect all the 
others. 
© Holly Group 
All Rights Reserved.
Elements of 
Information Value 
 Decisions regarding one 
strand affect all the 
others. 
 They all therefore 
must be continually well 
orchestrated in order 
to maximize value! 
© Holly Group 
All Rights Reserved.
To Know ≠ To Do 
 The doing is the hard part!
Action Plan 
1. Make a commitment 
2. Be holistic 
3. Assess risks 
4. Contemplate metrics 
5. Develop policies 
Image: www.kent.ac.uk
1. Make a Commitment 
 From the boardroom to the 
mailroom
1. Make a Commitment 
 From the boardroom to the 
mailroom 
 Easier said than done
2. Be Holistic 
 Inventory everything
2. Be Holistic 
 Inventory everything – including 
your processes
2. Be Holistic 
 Include hard and soft copy 
information
2. Be Holistic 
 Encompass data, documents, 
infrastructure, and humans!
3. Assess Risks 
 Missed opportunities as well as 
FUD* 
* Fear, Uncertainty, and Doubt
3. Assess Risks 
 Opportunity to derive 
Maximum Total Value® 
© Holly Group 
All Rights Reserved.
3. Assess Risks 
 Opportunity to address 
vulnerabilities
4. Contemplate Metrics 
 “You can’t improve what you 
don’t measure”
4. Contemplate Metrics 
 Instances of unauthorized 
access: attempts and successes 
 Number of exceptions to be 
handled 
 Time spent finding needed 
information 
 Incomplete/overly long search 
results
4. Contemplate Metrics 
 Be practical when setting goals 
 10 seconds to return meaningful search 
results may be OK if it’s 25 seconds (or 
impossible!) today
5. Develop Policies 
 Don’t have one? Get one!
5. Develop Policies 
 Be inclusive in their 
development
5. Develop Policies 
 Be sure to encompass: 
 Information security, ownership, and 
usage 
 Procedures for propagating concept of 
information as an asset 
 Processes for enforcing compliance
In Other Words: It’s Governance!
In Other Words: It’s Governance!
Thank You! 
Yours free for attending today: 
Governance Guide to 
Information as an Asset 
http://bit.ly/infoasset
Steve Weissman 
Minister of Process & Information Betterment 
Holly Group 
––––– 
617-383-4655 
@steveweissman 
sweissman@hollygroup.com 
www.hollygroup.com 
The Info Gov Guy! 
Member, AIIM Company of Fellows 
President, AIIM New England Chapter 
Governance Guide to Information as an Asset 
- http://bit.ly/infoasset - 
CERTIFIED 
INFORMATION 
PROFESSIONAL

More Related Content

What's hot

Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...
David Terrar
 
Communities of Practice - Challenges, Curiosity and Dragons
Communities of Practice - Challenges, Curiosity and Dragons Communities of Practice - Challenges, Curiosity and Dragons
Communities of Practice - Challenges, Curiosity and Dragons
SIKM
 
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Deanna Kosaraju
 
WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Broadband
 
HWZ-Darden Konferenz: The Curatorial Challenge of Leaders
HWZ-Darden Konferenz: The Curatorial Challenge of LeadersHWZ-Darden Konferenz: The Curatorial Challenge of Leaders
HWZ-Darden Konferenz: The Curatorial Challenge of Leaders
HWZ Hochschule für Wirtschaft
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Adrian Wright
 
Content Curation for Learning – Beyond the Basics
Content Curation for Learning – Beyond the BasicsContent Curation for Learning – Beyond the Basics
Content Curation for Learning – Beyond the Basics
LearningCafe
 
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Kenneth de Brucq
 
Defining Future Capabilities – Beyond Guesswork
Defining Future Capabilities – Beyond GuessworkDefining Future Capabilities – Beyond Guesswork
Defining Future Capabilities – Beyond Guesswork
LearningCafe
 

What's hot (9)

Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...
 
Communities of Practice - Challenges, Curiosity and Dragons
Communities of Practice - Challenges, Curiosity and Dragons Communities of Practice - Challenges, Curiosity and Dragons
Communities of Practice - Challenges, Curiosity and Dragons
 
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
Panel: Cracking the Glass Ceiling: Growing Female Technology Professionals - ...
 
WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15
 
HWZ-Darden Konferenz: The Curatorial Challenge of Leaders
HWZ-Darden Konferenz: The Curatorial Challenge of LeadersHWZ-Darden Konferenz: The Curatorial Challenge of Leaders
HWZ-Darden Konferenz: The Curatorial Challenge of Leaders
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
Content Curation for Learning – Beyond the Basics
Content Curation for Learning – Beyond the BasicsContent Curation for Learning – Beyond the Basics
Content Curation for Learning – Beyond the Basics
 
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
 
Defining Future Capabilities – Beyond Guesswork
Defining Future Capabilities – Beyond GuessworkDefining Future Capabilities – Beyond Guesswork
Defining Future Capabilities – Beyond Guesswork
 

Similar to 5 Keys to Managing Information as an Asset: The Ultimate Governance Challenge

Steve Weissman - 5 Keys to Managing Information as an Asset
Steve Weissman - 5 Keys to Managing Information as an Asset�Steve Weissman - 5 Keys to Managing Information as an Asset�
Steve Weissman - 5 Keys to Managing Information as an Asset
ARMA International
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
AIIM International
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
Marc Vael
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
CGTI
 
The Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data ManagementThe Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data Management
DATAVERSITY
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
CBIZ, Inc.
 
Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015
John Hudson
 
Principles of Holistic Information Governance
Principles of Holistic Information GovernancePrinciples of Holistic Information Governance
Principles of Holistic Information Governance
PHIGs Information Management Consulting Inc.
 
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
PHIGs Information Management Consulting Inc.
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
Daniel Ayala
 
Organisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James PriceOrganisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James Price
Edwin Roman
 
Transform Unstructured Data Into Relevant Data with IBM StoredIQ
Transform Unstructured Data Into Relevant Data with IBM StoredIQTransform Unstructured Data Into Relevant Data with IBM StoredIQ
Transform Unstructured Data Into Relevant Data with IBM StoredIQ
Perficient, Inc.
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
FLUZO
 
CH 01 AIS-part 1.ppt
CH 01 AIS-part 1.pptCH 01 AIS-part 1.ppt
CH 01 AIS-part 1.ppt
ssuser81be21
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
Evan Francen
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
EIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdf
EIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdfEIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdf
EIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdf
Earley Information Science
 
DataEd Slides: Approaching Data Governance Strategically
DataEd Slides: Approaching Data Governance StrategicallyDataEd Slides: Approaching Data Governance Strategically
DataEd Slides: Approaching Data Governance Strategically
DATAVERSITY
 

Similar to 5 Keys to Managing Information as an Asset: The Ultimate Governance Challenge (20)

Steve Weissman - 5 Keys to Managing Information as an Asset
Steve Weissman - 5 Keys to Managing Information as an Asset�Steve Weissman - 5 Keys to Managing Information as an Asset�
Steve Weissman - 5 Keys to Managing Information as an Asset
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
The Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data ManagementThe Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data Management
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015
 
Principles of Holistic Information Governance
Principles of Holistic Information GovernancePrinciples of Holistic Information Governance
Principles of Holistic Information Governance
 
Information Governance Outcomes and Benefits
Information Governance Outcomes and BenefitsInformation Governance Outcomes and Benefits
Information Governance Outcomes and Benefits
 
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Organisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James PriceOrganisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James Price
 
Transform Unstructured Data Into Relevant Data with IBM StoredIQ
Transform Unstructured Data Into Relevant Data with IBM StoredIQTransform Unstructured Data Into Relevant Data with IBM StoredIQ
Transform Unstructured Data Into Relevant Data with IBM StoredIQ
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
CH 01 AIS-part 1.ppt
CH 01 AIS-part 1.pptCH 01 AIS-part 1.ppt
CH 01 AIS-part 1.ppt
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
EIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdf
EIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdfEIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdf
EIS-Webinar-Info-Governance-Age-AI-2024-02-27-for-distr.pdf
 
DataEd Slides: Approaching Data Governance Strategically
DataEd Slides: Approaching Data Governance StrategicallyDataEd Slides: Approaching Data Governance Strategically
DataEd Slides: Approaching Data Governance Strategically
 

Recently uploaded

falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
Allensmith572606
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 

Recently uploaded (20)

falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 

5 Keys to Managing Information as an Asset: The Ultimate Governance Challenge

  • 1. Steve Weissman Holly Group 5 Keys to Managing Information as an Asset The Ultimate Governance Challenge The Info Gov Guy!
  • 3. What’s Information?  Customer lists  Financial reports  Contracts  Payables/receivables  Emails + attachments  Correspondence  Market intelligence  Staff experiences
  • 4. What’s Information?  Customer lists  Financial reports  Contracts  Payables/receivables  Emails + attachments  Correspondence  Market intelligence  Staff experiences
  • 6. What’s an Asset?  Computers and cubicles  Office desks and chairs  Bank accounts  Intellectual property  Best practices Image: www.brandyoubrilliant.com
  • 7. What is ‘Information as an Asset’?  Knowledge or facts that are valuable to and owned by you
  • 8. What is ‘Information as an Asset’?  Knowledge or facts that are valuable to and owned by you Image: www.icmc2008.net
  • 9. Elements of Information Value © Holly Group All Rights Reserved.
  • 10. Elements of Information Value © Holly Group All Rights Reserved.
  • 11. Elements of Information Value  Missing or poor data? - No utility. © Holly Group All Rights Reserved.
  • 12. Elements of Information Value  Missing or poor data? - No utility.  Missing or wrong context? - Not meaningful © Holly Group All Rights Reserved.
  • 13. Elements of Information Value  Missing or poor data? - No utility.  Missing or wrong context? - Not meaningful  Mismatched formats? - Not shareable. © Holly Group All Rights Reserved.
  • 14. Elements of Information Value  Missing or poor data? - No utility.  Missing or wrong context? - Not meaningful © Holly Group All Rights Reserved.  Mismatched formats? - Not shareable.  Improper medium? - Not receivable
  • 15. Elements of Information Value  Decisions regarding one strand affect all the others. © Holly Group All Rights Reserved.
  • 16. Elements of Information Value  Decisions regarding one strand affect all the others.  They all therefore must be continually well orchestrated in order to maximize value! © Holly Group All Rights Reserved.
  • 17. To Know ≠ To Do  The doing is the hard part!
  • 18. Action Plan 1. Make a commitment 2. Be holistic 3. Assess risks 4. Contemplate metrics 5. Develop policies Image: www.kent.ac.uk
  • 19. 1. Make a Commitment  From the boardroom to the mailroom
  • 20. 1. Make a Commitment  From the boardroom to the mailroom  Easier said than done
  • 21. 2. Be Holistic  Inventory everything
  • 22. 2. Be Holistic  Inventory everything – including your processes
  • 23. 2. Be Holistic  Include hard and soft copy information
  • 24. 2. Be Holistic  Encompass data, documents, infrastructure, and humans!
  • 25. 3. Assess Risks  Missed opportunities as well as FUD* * Fear, Uncertainty, and Doubt
  • 26. 3. Assess Risks  Opportunity to derive Maximum Total Value® © Holly Group All Rights Reserved.
  • 27. 3. Assess Risks  Opportunity to address vulnerabilities
  • 28. 4. Contemplate Metrics  “You can’t improve what you don’t measure”
  • 29. 4. Contemplate Metrics  Instances of unauthorized access: attempts and successes  Number of exceptions to be handled  Time spent finding needed information  Incomplete/overly long search results
  • 30. 4. Contemplate Metrics  Be practical when setting goals  10 seconds to return meaningful search results may be OK if it’s 25 seconds (or impossible!) today
  • 31. 5. Develop Policies  Don’t have one? Get one!
  • 32. 5. Develop Policies  Be inclusive in their development
  • 33. 5. Develop Policies  Be sure to encompass:  Information security, ownership, and usage  Procedures for propagating concept of information as an asset  Processes for enforcing compliance
  • 34. In Other Words: It’s Governance!
  • 35. In Other Words: It’s Governance!
  • 36. Thank You! Yours free for attending today: Governance Guide to Information as an Asset http://bit.ly/infoasset
  • 37. Steve Weissman Minister of Process & Information Betterment Holly Group ––––– 617-383-4655 @steveweissman sweissman@hollygroup.com www.hollygroup.com The Info Gov Guy! Member, AIIM Company of Fellows President, AIIM New England Chapter Governance Guide to Information as an Asset - http://bit.ly/infoasset - CERTIFIED INFORMATION PROFESSIONAL

Editor's Notes

  1. Image: http://www.brandyoubrilliant.com/wp-content/uploads/2013/05/Icon_Asset_Inventory_Management.jpg
  2. Image: http://www.icmc2008.net/wp-content/uploads/2014/06/bring-value.jpg
  3. Having all this knowledge now is but the first step – next, you must get your organization to actually behave accordingly! This is no easy task, in no small part because a great many managers and senior executives still don’t realize they have to handle their information at least as protectively as they do their wallets. And for sure, most end users don’t think about it much at all.
  4. Image: http://www.kent.ac.uk/careers/sk/skillsactionplanning.htm
  5. To maximize the likelihood of success, the process must begin with the doubling-down by senior management on the belief that the company’s information is as vital to its performance as its other assets (people, money, infrastructure, etc.). While others in the organization may share this belief, the notion won’t propagate unless and until the higher-ups get behind it in a meaningful way – such as by making public, forceful, and continual statements of support and seriousness so everybody knows that the days of disorderly shared foldering, casual filesharing, ad hoc retention, etc. are over.
  6. The challenge here is that we use information every day and usually don’t give it a second thought. Ironically, it is this very pervasiveness that makes it invisible – much as water is to a fish. But this invisibility doesn’t make it any less vital to the day to day, and taking it for granted can be dangerous because of how vulnerable we are to issues affecting access, quality, and business continuity. Most users don’t stop to consider the broader ramifications of a more casual approach to managing information – it is, after all, how they are used to working, and they don’t think twice when they have to track stuff down, or check it for accuracy, or otherwise spend time working around it before they can do something with it. So a big part of this involves the discipline known as Change Management, which I’ve found surfaces earlier and earlier in each project I work on.
  7. The first tactical job on the list is to identify and classify just what information you have, who uses it and under what circumstances (internally and externally), what policies and regulations – internal, industry, and legislative – its handling needs to comply with, etc. The result of this activity suggests a hierarchy of importance that can be used when developing your action plan and determining the levels of protection, control, and ultimate value you apply.
  8. A companion step involves taking a similar inventory of your business processes, especially those that are central to your core business (like accounts payable, for example, and not employee vacation requests). The reason to do this is to get a fix on the information that is being shared via these processes, and thus are central to your operations.
  9. As your inventory progresses, always remember that hard-copy and electronic information have organizational value in equal measure. The trick is to cultivate a culture in which the distinction between the two formats disappears, and that the focus is placed and maintained on the information itself, not the medium on which it exists. This way you can put together a complete picture of what you’re dealing with, rather than individual pieces.
  10. For the same reason, be sure you don’t distinguish among databases, document repositories, and human beings when it comes to elevating the place information has in your organization. The tools necessary to maximize the value of the content that exists in each place clearly are different, but your asset-oriented thinking must embrace each one because they all contain relevant and valuable information.
  11. Negative factors are scariest and often drive strategy. But it is critical to also present the positives, for there are compelling reasons to adopt an asset-minded philosophy that relate to enhancing and not merely protecting the business.
  12. For instance, you undoubtedly have multiple opportunities to derive Maximum Total Value® from your information solutions by looking beyond just the money and considering ways to help people work better (process change) and work better together (collaboration). This in many ways is enabled by the intelligent care and feeding of your information: i.e., by properly using taxonomy and metadata to perpetuate its quality, structure, and credibility – characteristics that might be equated with a diamond’s Clarity, Color, Cut, and Confidence, which of course are four of the Five C’s used when appraising a given stone. These core determinants of value support sound business intelligence-gathering and decision-making, and your possession and curation of high-quality information boost your organizational value.
  13. The other side of the coin contains plenty of FUD, for sure, but also many real-world vulnerabilities, such as when you discover that certain people are seeing information that they oughtn’t be, or critical but improperly tagged information doesn’t surface when searches are conducted, or time is spent (and lost) because people have to verify the accuracy of the information they are using before they actually use it. But perhaps even more important is understanding and articulating just what kind of damage these vulnerabilities could lead to – and quantifying the extent of the potential damage. For example, unauthorized access could lead to privacy violations, missing information to bad business decisions, and poor information quality to competitive disadvantage. But just what could each of these problems cost in terms of fines, profits, or time? Appraisal is a critical component of asset protection, so metrics must be part of the equation.
  14. Remember at the beginning when we talked about Commitment? Well, policies are where that commitment comes home to roost for without them, all you have are empty words. My lawyer friends tell me that when they’re prosecuting cases, they’ll go after policies first – especially if the defendant doesn’t have any that address the issue at hand. So if you don’t have one, your first job is to get one! Image: http://blog.equens.com/wp-content/uploads/2012/09/rulebook-300x300.jpg
  15. Because every department relies on information to get its work done, they all must be included in the discussion so their various perspectives can be considered when the time comes to determining how to treat information as an asset. This is generally accomplished by establishing a cross-departmental steering committee that will develop the new modi operandi and enforce their adoption.
  16. Typical topics of coverage include information security, ownership, and usage, as well as procedures for making clear to everyone in the organization not only why treating information as an asset is a good thing but what the consequences are of failing to do so.
  17. Veterans of the information management wars will recognize in this the base elements of governance, and indeed, the dynamics are very much the same. If there’s a difference, it’s a cultural one in that “governance” is often perceived as a compliance chore while “assetization” should be viewed as a business investment.