SlideShare a Scribd company logo
Keeping Your Data Clean
Reduced Risk Through Data Integrity
Stephen W. Di Rito
Sr. Manager
Enterprise Security Programs
Contents
©2018 Discover Financial Services 2
Keeping Your Data Clean
Background: Challenges for Discover 3
What is Data Integrity 6
Records Systems and Customization 7
Internal Procedures 17
Oversight through Metrics 22
External Data Visualization 27
Some Background…
©2018 Discover Financial Services 3
Keeping Your Data Clean
• The Terrorist Watchlist (TSDB)
–Multiple databases created by
different vendors
–Requires accurate information which
balances between privacy and
protecting the nation
• Bomb Technician Response Notifications
- Internally developed FBI mobile application linked to a custom database
- Required flexibility to quickly change as developed new information sharing protocols
Initial Assessment of Discover’s Incident Tracking
©2018 Discover Financial Services 4
Keeping Your Data Clean
• Used Perspective over many years
• Database hosted on internal server vs. cloud
• Little customization other than adding new
incident categories
• No custom queries/No custom reports
• No oversight or formal incident review process
• DFS previously focused on medical response
Insert ES
Officer
photo
How Do We Get Better?
©2018 Discover Financial Services 5
Keeping Your Data Clean
• Discover is merging incident tracking and
investigations data into Perspective. Why?
⎯ Ability to connect individuals between workgroups
⎯ Ability to isolate Internal Investigation records
⎯ Ability to customize w/o vendor cost
⎯ Advanced customization through Resolver for fee
⎯ Consolidation into single GSOC aided by Dispatch
⎯ Modest price point compared to other solutions
What is Data Integrity?
©2018 Discover Financial Services 6
Keeping Your Data Clean
25%
Records
System
50%
Internal
Procedures
25%
Oversight
Combination of Several Factors
The Category (CCST) Challenge
©2018 Discover Financial Services 7
Keeping Your Data Clean – Records System
• Collect accurate incident information
⎯ Provides meaningful metrics
⎯ Ability to analyze data
⎯ Ability to identify officer training needs
• Choose your categories carefully
⎯ Use limited number of categories & expand modestly in Sub-Category/Type
⎯ Incidents should not fit multiple categories
Class
Category
Sub-Category
Type
Which Category to Choose?
©2018 Discover Financial Services 8
Put yourself in the GSOC operator’s role
Keeping Your Data Clean – Records System
Security Kidnapping Employee Criminal
Security Kidnapping Employee Terrorist
Security Intellectual Property Competitive Intelligence
Security Intellectual Property Compromise
Security Intellectual Property Counter Intelligence
Security Intellectual Property Electronic Eavesdropping
Security Intellectual Property Patent Infringement
Security Intellectual Property Theft of Information
Security Intellectual Property Trademark Infringement
How to Decide??
Criminal or Terrorist? Does it
matter?
Do my security officers know the
difference between these?
If you use categories like this,
make sure they are well defined
Example: 1041 Medical categories
• Types of injuries only limited by imagination
–Abrasions, Animal bite, Bug bite, Crushing, Cuts,
Heart attack, Stroke, etc., etc., etc.
–Most sub-categorized by the part of body affected
• Security should not be diagnosing medical events
• No consistency in how an event is categorized
–Facility, Life Safety, Medical, Safety, Travel Security,
Work Related Injury, Work Related Illness
• Now only one medical category with three sub-
categories (escorted to health services, treated at
scene, and transported off site)
©2018 Discover Financial Services 9
Keeping Your Data Clean – Records System
WORK RELATED INJURYAbrasion Caught Between Back
WORK RELATED INJURYAbrasion Caught Between Face
WORK RELATED INJURYAbrasion Caught Between Groin
WORK RELATED INJURYAbrasion Caught Between Left Ankle
WORK RELATED INJURYAbrasion Caught Between Left Arm
WORK RELATED INJURYAbrasion Caught Between Left Elbow
WORK RELATED INJURYAbrasion Caught Between Left Eye
WORK RELATED INJURYAbrasion Caught Between Left Fingers
WORK RELATED INJURYAbrasion Caught Between Left Foot
WORK RELATED INJURYAbrasion Caught Between Left Hand
WORK RELATED INJURYAbrasion Caught Between Left Knee
WORK RELATED INJURYAbrasion Caught Between Left Lower Leg
WORK RELATED INJURYAbrasion Caught Between Left Shoulder
WORK RELATED INJURYAbrasion Caught Between Left Upper Leg
WORK RELATED INJURYAbrasion Caught Between Left Wrist
WORK RELATED INJURYAbrasion Caught Between Right Ankle
WORK RELATED INJURYAbrasion Caught Between Right Arm
WORK RELATED INJURYAbrasion Caught Between Right Elbow
WORK RELATED INJURYAbrasion Caught Between Right Eye
WORK RELATED INJURYAbrasion Caught Between Right Fingers
WORK RELATED INJURYAbrasion Caught Between Right Foot
WORK RELATED INJURYAbrasion Caught Between Right Hand
WORK RELATED INJURYAbrasion Caught Between Right Knee
WORK RELATED INJURYAbrasion Caught Between Right Lower Leg
WORK RELATED INJURYAbrasion Caught Between Right Shoulder
WORK RELATED INJURYAbrasion Caught Between Right Upper Leg
WORK RELATED INJURYAbrasion Caught Between Right Wrist
How does Discover add medical detail?
• Occupational Health analyst reviews all medical incidents, gathers additional
details and updates record
–One person with medical training provides consistency and better accuracy
–Use Involvements/Persons sub-tab
©2018 Discover Financial Services 10
Keeping Your Data Clean – Records System
©2018 Discover Financial Services 11
Keeping Your Data Clean – Records System
How does Discover add medical detail?
Select to Add Injury Detail
©2018 Discover Financial Services 12
Keeping Your Data Clean – Records System
Allows entry of multiple injuries
Injury Cause
Severity
Use Flags to aid in gathering statistical data
• Flags only visible/Accessible to
OHS analyst
• Analyst determines custom flag
names
• Build count queries based on Flags
• Build detail reports based on Flags
©2018 Discover Financial Services 13
Keeping Your Data Clean – Records System
Flags and User Defined Fields
• Workplace Violence related
incidents or Investigations
–Single person making decisions
–Exclude visibility to others
• Ability to track special cases
–Aids in metrics reporting
• YOU decide what is important to
your company
©2018 Discover Financial Services 14
Keeping Your Data Clean – Records System
©2018 Discover Financial Services 15
Keeping Your Data Clean – Records System
• OLD
⎯ 106 Activities
⎯ 1267 Incidents
• NEW
⎯ 15 Activities
⎯ 16 Incidents
1373 Categories Reduced to 31
Count of Incident Number Column Labels
Row Labels Greenwood Houston Lake Park New Albany New Castle Phoenix Pittsford Riverwoods UPC (blank) Grand Total
Security - NEW 2 2 29 40 15 57 3 15 13 56 232
Access Control Violation 2 1 15 18
Battery 2 1 3
Damage/Vandalism of Property 1 1 2 2 6
Drug/Alcohol 1 1 2
Facility 1 1 2 1 2 7
Medical 2 9 9 1 10 4 3 38
Public Disturbance 1 1 2
Service Rendered -Emergency (non-medical) 1 1
Suspicious Incident 3 7 7 3 4 4 28
System Outage 1 1 2 5 9
Theft 1 3 2 1 7
Threat - including self-harm 7 13 9 19 1 49 98
Vehicle Accident 4 2 1 5 1 13
April 2018
Are There Fields You Do Not Use? Hide Them
©2018 Discover Financial Services 16
Default Modified
Keeping Your Data Clean – Records System
©2018 Discover Financial Services 17
Keeping Your Data Clean – Internal Procedures
Internal Review -
Start with a Flowchart
• Who reviews incidents?
–Includes multiple reviews
–Identifies pathway for correcting
reports
–Accompanied by instructions for
assigning record to next person
in the flowchart
–Requires separate query to
identify records not assigned
How Does Incident Record Get Reviewed?
©2018 Discover Financial Services 18
Keeping Your Data Clean – Internal Procedures
• Each individual in the flowchart completes review
⎯ Reassigns record back to originator for correction OR
⎯ Assigns record to next person in the flowchart
• If followed, each record is reviewed at least two times
• HQ review % of some incidents such as Threats, Battery, etc.
• Use the Controls Tab, Assignments sub-tab
1. Go to Controls Tab
2. Choose Assignments Sub-Tab
3. Select Add New
4. Choose Assignment Type
(note types are customized)
5. Select Ok and Save
Adding an Assignment
©2018 Discover Financial Services 19
Keeping Your Data Clean – Internal Procedures
What happens when I add an assignment?
©2018 Discover Financial Services 20
Keeping Your Data Clean – Internal Procedures
Assignment
shows up in
both receiver
and sender’s
dashboard
Controls to Identify Unassigned Records
©2018 Discover Financial Services 21
Keeping Your Data Clean – Internal Procedures
• Identify incidents created in last xx days not assigned to supervisor
⎯ Can build custom queries; Assigned to = null
⎯ Can export data to Excel and run multiple calculations externally
©2018 Discover Financial Services 22
Keeping Your Data Clean – Oversight
Activities & Incidents: 2017 – Q1 2018
2,411 2,279 2,430 2,605 2,739 2,499
1,734
2,301 2,411
4,157
3,576
4,460
6,239
5,801
6,834
276 241
372
501
922 1,493
1,260
1,338 1,253
1,194
1,047
756
907
1,077
1,114
-
1,000
2,000
3,000
4,000
5,000
6,000
7,000
8,000
9,000
JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC JAN FEB MAR
2017 2018
Enterprise Securities Activities and Incidents
Activity Incident
©2018 Discover Financial Services 23
Keeping Your Data Clean – Oversight
Top Security Activities: 2017 – Q1 2018
©2018 Discover Financial Services 24
Keeping Your Data Clean – Oversight
Top 8 Security Incidents: 2017 – Q1 2018
Business Unit Name or Logo
Export for Detailed Analysis – Example Tableau
©2018 Discover Financial Services 25
Keeping Your Data Clean – External Data Visualization
Business Unit Name or Logo
26
Keeping Your Data Clean – External Data Visualization
Questions?
Stephen Di Rito
stevedirito@discover.com
(224) 405-7895
Tableau Live Demo on Public space
https://public.tableau.com/profile/albert.chung#!/vizhome/SecurityDemo/Dashboard1

More Related Content

What's hot

How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
EnergySec
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
InfinIT - Innovationsnetværket for it
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
Priyanka Aash
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
Doug Copley
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
Rahul Neel Mani
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
Pranav Shah
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
EnergySec
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
OCTF Industry Engagement
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Phil Agcaoili
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
centralohioissa
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
CGTI
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special Teams
Resilient Systems
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
F-Secure Corporation
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
Priyanka Aash
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
TicTac Data Recovery
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
Doug Copley
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
John D. Johnson
 

What's hot (20)

How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special Teams
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 

Similar to Keeping Your Data Clean

Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
Forcepoint LLC
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
illustro
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
Don Caeiro
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
IAB Bulgaria
 
Cyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance MarketsCyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance Markets
Jay Kesan
 
Spo2 t17
Spo2 t17Spo2 t17
A Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessA Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for Business
Parsons Behle & Latimer
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
Glenn E. Davis
 
Equifax
Equifax Equifax
Equifax
nsjsj4
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
Synopsys Software Integrity Group
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Rachel Hamilton
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
Lawley Insurance
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEKMarketing
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
Mohsin Termezy
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
Cameron Forbes Over
 

Similar to Keeping Your Data Clean (20)

Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
 
Cyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance MarketsCyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance Markets
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
A Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessA Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for Business
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Equifax
Equifax Equifax
Equifax
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 

More from Resolver Inc.

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
Resolver Inc.
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
Resolver Inc.
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
Resolver Inc.
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
Resolver Inc.
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
Resolver Inc.
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
Resolver Inc.
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
Resolver Inc.
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
Resolver Inc.
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
Resolver Inc.
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
Resolver Inc.
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
Resolver Inc.
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
Resolver Inc.
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
Resolver Inc.
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
Resolver Inc.
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Resolver Inc.
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
Resolver Inc.
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
Resolver Inc.
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
Resolver Inc.
 
Risk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New RiskRisk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New Risk
Resolver Inc.
 
How to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with ExecutivesHow to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with Executives
Resolver Inc.
 

More from Resolver Inc. (20)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Risk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New RiskRisk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New Risk
 
How to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with ExecutivesHow to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with Executives
 

Recently uploaded

一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 

Recently uploaded (20)

一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 

Keeping Your Data Clean

  • 1. Keeping Your Data Clean Reduced Risk Through Data Integrity Stephen W. Di Rito Sr. Manager Enterprise Security Programs
  • 2. Contents ©2018 Discover Financial Services 2 Keeping Your Data Clean Background: Challenges for Discover 3 What is Data Integrity 6 Records Systems and Customization 7 Internal Procedures 17 Oversight through Metrics 22 External Data Visualization 27
  • 3. Some Background… ©2018 Discover Financial Services 3 Keeping Your Data Clean • The Terrorist Watchlist (TSDB) –Multiple databases created by different vendors –Requires accurate information which balances between privacy and protecting the nation • Bomb Technician Response Notifications - Internally developed FBI mobile application linked to a custom database - Required flexibility to quickly change as developed new information sharing protocols
  • 4. Initial Assessment of Discover’s Incident Tracking ©2018 Discover Financial Services 4 Keeping Your Data Clean • Used Perspective over many years • Database hosted on internal server vs. cloud • Little customization other than adding new incident categories • No custom queries/No custom reports • No oversight or formal incident review process • DFS previously focused on medical response Insert ES Officer photo
  • 5. How Do We Get Better? ©2018 Discover Financial Services 5 Keeping Your Data Clean • Discover is merging incident tracking and investigations data into Perspective. Why? ⎯ Ability to connect individuals between workgroups ⎯ Ability to isolate Internal Investigation records ⎯ Ability to customize w/o vendor cost ⎯ Advanced customization through Resolver for fee ⎯ Consolidation into single GSOC aided by Dispatch ⎯ Modest price point compared to other solutions
  • 6. What is Data Integrity? ©2018 Discover Financial Services 6 Keeping Your Data Clean 25% Records System 50% Internal Procedures 25% Oversight Combination of Several Factors
  • 7. The Category (CCST) Challenge ©2018 Discover Financial Services 7 Keeping Your Data Clean – Records System • Collect accurate incident information ⎯ Provides meaningful metrics ⎯ Ability to analyze data ⎯ Ability to identify officer training needs • Choose your categories carefully ⎯ Use limited number of categories & expand modestly in Sub-Category/Type ⎯ Incidents should not fit multiple categories Class Category Sub-Category Type
  • 8. Which Category to Choose? ©2018 Discover Financial Services 8 Put yourself in the GSOC operator’s role Keeping Your Data Clean – Records System Security Kidnapping Employee Criminal Security Kidnapping Employee Terrorist Security Intellectual Property Competitive Intelligence Security Intellectual Property Compromise Security Intellectual Property Counter Intelligence Security Intellectual Property Electronic Eavesdropping Security Intellectual Property Patent Infringement Security Intellectual Property Theft of Information Security Intellectual Property Trademark Infringement How to Decide?? Criminal or Terrorist? Does it matter? Do my security officers know the difference between these? If you use categories like this, make sure they are well defined
  • 9. Example: 1041 Medical categories • Types of injuries only limited by imagination –Abrasions, Animal bite, Bug bite, Crushing, Cuts, Heart attack, Stroke, etc., etc., etc. –Most sub-categorized by the part of body affected • Security should not be diagnosing medical events • No consistency in how an event is categorized –Facility, Life Safety, Medical, Safety, Travel Security, Work Related Injury, Work Related Illness • Now only one medical category with three sub- categories (escorted to health services, treated at scene, and transported off site) ©2018 Discover Financial Services 9 Keeping Your Data Clean – Records System WORK RELATED INJURYAbrasion Caught Between Back WORK RELATED INJURYAbrasion Caught Between Face WORK RELATED INJURYAbrasion Caught Between Groin WORK RELATED INJURYAbrasion Caught Between Left Ankle WORK RELATED INJURYAbrasion Caught Between Left Arm WORK RELATED INJURYAbrasion Caught Between Left Elbow WORK RELATED INJURYAbrasion Caught Between Left Eye WORK RELATED INJURYAbrasion Caught Between Left Fingers WORK RELATED INJURYAbrasion Caught Between Left Foot WORK RELATED INJURYAbrasion Caught Between Left Hand WORK RELATED INJURYAbrasion Caught Between Left Knee WORK RELATED INJURYAbrasion Caught Between Left Lower Leg WORK RELATED INJURYAbrasion Caught Between Left Shoulder WORK RELATED INJURYAbrasion Caught Between Left Upper Leg WORK RELATED INJURYAbrasion Caught Between Left Wrist WORK RELATED INJURYAbrasion Caught Between Right Ankle WORK RELATED INJURYAbrasion Caught Between Right Arm WORK RELATED INJURYAbrasion Caught Between Right Elbow WORK RELATED INJURYAbrasion Caught Between Right Eye WORK RELATED INJURYAbrasion Caught Between Right Fingers WORK RELATED INJURYAbrasion Caught Between Right Foot WORK RELATED INJURYAbrasion Caught Between Right Hand WORK RELATED INJURYAbrasion Caught Between Right Knee WORK RELATED INJURYAbrasion Caught Between Right Lower Leg WORK RELATED INJURYAbrasion Caught Between Right Shoulder WORK RELATED INJURYAbrasion Caught Between Right Upper Leg WORK RELATED INJURYAbrasion Caught Between Right Wrist
  • 10. How does Discover add medical detail? • Occupational Health analyst reviews all medical incidents, gathers additional details and updates record –One person with medical training provides consistency and better accuracy –Use Involvements/Persons sub-tab ©2018 Discover Financial Services 10 Keeping Your Data Clean – Records System
  • 11. ©2018 Discover Financial Services 11 Keeping Your Data Clean – Records System How does Discover add medical detail? Select to Add Injury Detail
  • 12. ©2018 Discover Financial Services 12 Keeping Your Data Clean – Records System Allows entry of multiple injuries Injury Cause Severity
  • 13. Use Flags to aid in gathering statistical data • Flags only visible/Accessible to OHS analyst • Analyst determines custom flag names • Build count queries based on Flags • Build detail reports based on Flags ©2018 Discover Financial Services 13 Keeping Your Data Clean – Records System
  • 14. Flags and User Defined Fields • Workplace Violence related incidents or Investigations –Single person making decisions –Exclude visibility to others • Ability to track special cases –Aids in metrics reporting • YOU decide what is important to your company ©2018 Discover Financial Services 14 Keeping Your Data Clean – Records System
  • 15. ©2018 Discover Financial Services 15 Keeping Your Data Clean – Records System • OLD ⎯ 106 Activities ⎯ 1267 Incidents • NEW ⎯ 15 Activities ⎯ 16 Incidents 1373 Categories Reduced to 31 Count of Incident Number Column Labels Row Labels Greenwood Houston Lake Park New Albany New Castle Phoenix Pittsford Riverwoods UPC (blank) Grand Total Security - NEW 2 2 29 40 15 57 3 15 13 56 232 Access Control Violation 2 1 15 18 Battery 2 1 3 Damage/Vandalism of Property 1 1 2 2 6 Drug/Alcohol 1 1 2 Facility 1 1 2 1 2 7 Medical 2 9 9 1 10 4 3 38 Public Disturbance 1 1 2 Service Rendered -Emergency (non-medical) 1 1 Suspicious Incident 3 7 7 3 4 4 28 System Outage 1 1 2 5 9 Theft 1 3 2 1 7 Threat - including self-harm 7 13 9 19 1 49 98 Vehicle Accident 4 2 1 5 1 13 April 2018
  • 16. Are There Fields You Do Not Use? Hide Them ©2018 Discover Financial Services 16 Default Modified Keeping Your Data Clean – Records System
  • 17. ©2018 Discover Financial Services 17 Keeping Your Data Clean – Internal Procedures Internal Review - Start with a Flowchart • Who reviews incidents? –Includes multiple reviews –Identifies pathway for correcting reports –Accompanied by instructions for assigning record to next person in the flowchart –Requires separate query to identify records not assigned
  • 18. How Does Incident Record Get Reviewed? ©2018 Discover Financial Services 18 Keeping Your Data Clean – Internal Procedures • Each individual in the flowchart completes review ⎯ Reassigns record back to originator for correction OR ⎯ Assigns record to next person in the flowchart • If followed, each record is reviewed at least two times • HQ review % of some incidents such as Threats, Battery, etc. • Use the Controls Tab, Assignments sub-tab
  • 19. 1. Go to Controls Tab 2. Choose Assignments Sub-Tab 3. Select Add New 4. Choose Assignment Type (note types are customized) 5. Select Ok and Save Adding an Assignment ©2018 Discover Financial Services 19 Keeping Your Data Clean – Internal Procedures
  • 20. What happens when I add an assignment? ©2018 Discover Financial Services 20 Keeping Your Data Clean – Internal Procedures Assignment shows up in both receiver and sender’s dashboard
  • 21. Controls to Identify Unassigned Records ©2018 Discover Financial Services 21 Keeping Your Data Clean – Internal Procedures • Identify incidents created in last xx days not assigned to supervisor ⎯ Can build custom queries; Assigned to = null ⎯ Can export data to Excel and run multiple calculations externally
  • 22. ©2018 Discover Financial Services 22 Keeping Your Data Clean – Oversight Activities & Incidents: 2017 – Q1 2018 2,411 2,279 2,430 2,605 2,739 2,499 1,734 2,301 2,411 4,157 3,576 4,460 6,239 5,801 6,834 276 241 372 501 922 1,493 1,260 1,338 1,253 1,194 1,047 756 907 1,077 1,114 - 1,000 2,000 3,000 4,000 5,000 6,000 7,000 8,000 9,000 JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC JAN FEB MAR 2017 2018 Enterprise Securities Activities and Incidents Activity Incident
  • 23. ©2018 Discover Financial Services 23 Keeping Your Data Clean – Oversight Top Security Activities: 2017 – Q1 2018
  • 24. ©2018 Discover Financial Services 24 Keeping Your Data Clean – Oversight Top 8 Security Incidents: 2017 – Q1 2018
  • 25. Business Unit Name or Logo Export for Detailed Analysis – Example Tableau ©2018 Discover Financial Services 25 Keeping Your Data Clean – External Data Visualization
  • 26. Business Unit Name or Logo 26 Keeping Your Data Clean – External Data Visualization
  • 28. Tableau Live Demo on Public space https://public.tableau.com/profile/albert.chung#!/vizhome/SecurityDemo/Dashboard1