Information Governance, Security & Metadata Terry Campbell Robert S. Fox John Gatto.

Slides:



Advertisements
Similar presentations
Steven Adler IBM Information Governance Solutions
Advertisements

The Impact of Auditing on Records Management Risk and Compliance Susan B. Whitmire, CRM, FAI Manager, Enterprise Records and Information Management BlueCross.
An Internal Control Overview
Presentation by Priyanka Sawarkar
PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
Health Records Management Practitioner
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. trans for ma tion : a.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
EIM Framework EIM Vision & Strategy EIM Governance EIM Core Processes
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
By Eileen Clegg Digital Preservation at Columbia in the Old Days (2009)
TRAC / TDR ICPSR Trustworthy Digital Repositories.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Oncor’s EIM Program.
Security Controls – What Works
Information Security Policies and Standards
Copyright © 2008 Robert S. Seiner – KIK Consulting & Educational Services/TDAN.com Copyright © 2008 Robert S. Seiner – KIK Consulting & Educational Services/TDAN.com.
Data Governance Customer Hub. Data As An Enterprise - Corporate - Asset Data Should be accepted as an enterprise asset Data Quality should be part of.
Third-generation information architecture November 4, 2008.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
The Trusted Digital Repositories Checklist Government Records and Archives Aspects Dr Stephen Ellis Assistant Director – General Government.
The 10 Deadly Sins of Information Security Management
Author(s): David A. Wallace and Margaret Hedstrom, 2009 License: Unless otherwise noted, this material is made available under the terms of the Creative.
Information Systems Controls for System Reliability -Information Security-
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Information Security Management BS 7799 now ISO 17799:2000 Paul M Kane nic.AC wwTLD Meeting Argentina April 2005.
The Evergreen, Background, Methodology and IT Service Management Model
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
The Challenge of IT-Business Alignment
Security Policy Evaluation Using Balanced Scorecards Mohamad El Osta MBA 737 April 29, 2008.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
Introduction to IT Governance Support System (ITGSS)
Retention & Disposition in the Cloud: Mission Critical and/or Mission Impossible? Patricia C. Franks, PhD, CA, CRM, IGP Archives 2015 August 22, 2015 Tweet.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
ISO/IEC 27001:2013 Annex A.8 Asset management
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
OpenText EIM for SAP In a Nutshell. OpenText ©2013 All Rights Reserved. 2 An integrated portfolio designed for SAP best-run businesses harnessing market.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
UW-Madison Guidelines for Managing the Records of Departing Employees*
Defining a World-Class Finance Organization
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Data Architecture World Class Operations - Impact Workshop.
IS4680 Security Auditing for Compliance
Following Up on Internal Audit Reports Workshop on IIA Standard 2500
IS4680 Security Auditing for Compliance
Industry – Storage networking Industry Association
Chapter 27 Security Engineering
Cyber Risk & Cyber Insurance - Overview
IS4680 Security Auditing for Compliance
The General Data Protection Regulation: Are You Ready?
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Collaboration Oriented Architecture COA Position Paper An Overview
Data Governance & Management Skills and Experience
Presentation transcript:

Information Governance, Security & Metadata Terry Campbell Robert S. Fox John Gatto

2 Domain Definitions 2 DomainDescription 1Data Risk Management & Compliance The methodology by which risks are identified, qualified, quantified, avoided, accepted, mitigated or transferred out. 2Value CreationThe process by which data assets are qualified and quantified to enable the business to maximize the value created by data assets. 3Organizational Structures & Awareness Describes the level of mutual responsibility between business and IT, and recognition of the fiduciary responsibility to govern data at different levels of management 4PolicyPolicy is the written articulation of desired organizational behavior. 5StewardshipA quality control discipline designed to ensure custodial care of data for asset enhancement, risk management and organizational control 6Data Quality ManagementMethods to measure, improve, and certify the quality and integrity of production, test, and archival data. 7Information Lifecycle Management A systemic policy-based approach to information collection, use, retention and deletion. 8Information Security & PrivacyDescribes the policies, practices and controls used by an organization to mitigate risk and protect data assets. 9Data ArchitectureThe architectural design of structured and unstructured data systems and applications that enable data availability and distribution to appropriate users. 10Classification & MetadataThe methods and tools used to create common semantic definitions for business and IT terms, data models, types, and repositories. Metadata that bridge human and computer understanding. 11Audit Information, Logging & Reporting The organizational processes for monitoring and measuring the data value, risks, and efficacy of governance.

3 Information Governance Framework Alignment and Integration With Core and Supporting Disciplines

4