University of Nevada, Reno Data-Driven Organization Governance 1 Governing a data-driven organization (4/24/2014)  Define governance within organizations.

Slides:



Advertisements
Similar presentations
TACTICAL/OPERATIONAL PLANNING
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
Control and Accounting Information Systems
Agency Risk Management and Internal Control Standards Presentation to the Board of Visitors November 14, 2014.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Certified Business Process Professional (CBPP®) Study Session Part 4 Sept. 15, 2010.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Oncor’s EIM Program.
Security Controls – What Works
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
The Australian/New Zealand Standard on Risk Management
CMMI Overview Quality Frameworks.
Certified Business Process Professional (CBPP®)
High-Level Assessment Month Year
Remedy, a BMC Software company Change Management Maximize Speed and Minimize Risk in the Change Process.
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
Fraud Prevention and Risk Management
Capability Maturity Model
Competency Models Impact on Talent Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Integrated Capability Maturity Model (CMMI)
N By: Md Rezaul Huda Reza n
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
Performance Measurement and Analysis for Health Organizations
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
IT Governance
The Challenge of IT-Business Alignment
Software Engineering Lecture # 17
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
Building Capability.  In order to successfully operate an architecture function within an enterprise, it is necessary to put in place appropriate organization.
SECTION 1 THE PROJECT MANAGEMENT FRAMEWORK
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Holistic Approach to Security
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
LECTURE IV. o Project HRM include the processes that organize, manage and lead the project team. o The project team is comprised of the people with assigned.
@2002 Copyright, Itreya Technologies CMMI kick off July 2005.
Software Engineering - I
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
System Administration for the Enterprise W.L. Garner and L.J. Hawk North American Performance Group, Inc.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Michael Campe U.S. Army Aviation and Missile Command NDIA TID Technical Information Division Symposium Royal Sonesta Hotel, New Orleans, LA August 2003.
Chapter 9: Introduction to Internal Control Systems
PMI is a registered trademark of the Project Management Institute Knowledge Exchange Forum October 28, 2003 Assessing Project Management in Your Organization.
Kathy Corbiere Service Delivery and Performance Commission
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
University of Nevada, Reno Organizational Data Design Architecture 1 Agenda for Class: 02/06/2014  Recap current status. Explain structure of assignments.
"In the name of Allah, The Most Gracious & Most Merciful"Most GraciousMost Merciful.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Certification: CMMI Emerson Murphy-Hill. Capability Maturity Model Integration (CMMI) Creation of the Software Engineering Institute (SEI) at Carnegie.
Service Design.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Building Business Transformation Capabilities Our perspective on the building blocks, structure and critical success factors to impact change Gillian.
Thoughts on IT Enterprise Architecture Maturity Models for the
CMMI – Staged Representation
Asset Governance – Integrated Strategic Asset Management
The Organizational Context
Information Security Risk Management
Cybersecurity ATD technical
Bridging the ITSM Information Gap
Presentation transcript:

University of Nevada, Reno Data-Driven Organization Governance 1 Governing a data-driven organization (4/24/2014)  Define governance within organizations.  Understand the general activities of governance.  Define relative levels of governance “maturity”.  Identify key aspects of data governance  Discuss how an organization governs data. 1

Data-driven decision making is relative  Organizations are in various stages of using data to support organizational decision making. Spans from standard accounting reports to competing on analytics.  Organizations vary in data availability. Internal silos to integrated data. Internal only to integrated external and internal.  Organizations vary in data understanding. We have data??? to Data is an asset.  Organizations vary in analytical capability. 2

What does it mean “to govern”?  gov·ern v. gov·erned, gov·ern·ing, gov·erns To make and administer public policy and affairs To exercise sovereign authority To control the speed or magnitude To regulate To control actions or behavior To keep under control; to restrain To exercise a deciding or determining influence To exercise political authority To have or exercise a determining influence 3

4 Corporate Governance IT Governance Data Governance

University of Nevada, Reno Data-Driven Organization Governance 5 Governance Activities  What are the key activities in corporate governance?  What are the key activities in IT governance? 5

Governance Artifacts 6 Policy Policy defines “what” the organization must do or not do. They are the principles/rules of an organization. Standards A standard sets a requirement and/or creates a baseline Guidelines A guideline describes a preferred approach with practical directions. What do we need policies about? What is the goal of a given policy? What level of standards are necessary? How detailed should a standard be? What guidelines would be helpful? Drives

7 IT Governance Data Internal, external, structured, unstructured, purchased, free Process Ongoing work Project Short term goals People Staff skills Technology DBMS, multimedia Applications ERP, app software Facilities Network, servers

University of Nevada, Reno Data-Driven Organization Governance 8 IT Governance Frameworks  Information Technology Infrastructure Library (ITIL)  Control Objectives for Information and Related Technology (COBIT).  Commonalities: Align IT objectives with business goals. Provide list of general processes that must be accomplished by IT organizations. Provide metrics to evaluate efficacy of processes. Use maturity models to evaluate relative formality of processes. 8

University of Nevada, Reno Data-Driven Organization Governance 9 Evaluating governance based on maturity level  “Maturity” evaluates the degree of formality and optimization of a policy/standard/guideline structure.  A maturity model: Defines high and low levels of maturity. Categorizes degree of maturity based on key characteristics. Describes steps that move an organization from one level of maturity to another. 9

Why use a maturity model? 10 Maturity Model Assessment Describe the overall environment. Evaluate current state of capabilities. Consistently compare evaluations over time. Compare organization to other organizations. Improvement Define and create a path for progression. Direct the potential next steps. Target priorities and resources necessary for action.

Capability Maturity Model Integration (Carnegie Mellon Software Engineering Institute) 11

12

What are the key aspects of data governance?  Protect and Control: Improve data quality. Protect and safeguard data. Assign ownership. Understand the value of data and impact of loss. Control change.  Make Useful : Define data across the organization. Integrate data from a variety of different sources. Ensure data availability. Enhance data accessibility.  Adapt and Change: Encourage data use. Facilitate ongoing data evolution and acquisition. 13

14 Data Governance InitialManagedDefinedQuantitative Management Optimized Protect and Control Manually maintain trusted sources. Inconsistent encryption and usage standards. Undefined ownership. Individual projects with formal security standards. ETL processes managed by project. Definition of organization security standards. Definition of ETL processes. KPIs are set and tracked. Security is centralized service Monitor risks across apps and dept structures. KPIs are compared against others. Proactive inquiry into potential threats. Experimentation Make Useful Inconsistent silo structures. No overall data definition. Data definition for internal data. Some integration. Data definition & integration across apps. KPIs are set and tracked. Eliminate bad usage. Research usage outside of org. Adapt best practices. Adapt and Change No formal usage policy. Data identified for future purchase by chance/luck. Chaotic. Tacit agreement on ongoing use of data for decision making. Individual project management. Explicit agreement on use of data. Data identification and acquisition processes. KPIs are set and tracked. Understand trends in data usage. Encourage innovation and experimental usage of data.

How to govern data?  Governance artifacts: Policies, standards, guidelines.  IT is all about the people. Organizational structure issues: Who is responsible for data governance? Who will establish the policies, standards, guidelines? Who will encourage the policies, standards, guidelines? Who will enforce the policies, standards, guidelines? How should data be managed across the enterprise? Should “protect and control”, “make useful”, “adapt and change” activities be handled separately? 15

16