• Tidak ada hasil yang ditemukan

Drive Business Value with Winning Data Governance and Compliance Strategies

N/A
N/A
Protected

Academic year: 2023

Membagikan "Drive Business Value with Winning Data Governance and Compliance Strategies"

Copied!
61
0
0

Teks penuh

(1)

Drive Business Value with Winning Data Governance and Compliance Strategies

Dux Raymond Sy, PMP

CTO – Public Sector

(2)

Identify data governance and compliance challenges

Showcase the value of a proper data governance framework

Impart winning & proven strategies to help you establish a relevant data governance framework

2

(3)

Everyone has

a Voice Access from

Anywhere Everyone is a

Contributor

(4)
(5)
(6)

What is this?

• Client records

• Employee records

• Previous project files

What you need to keep…

• Current project files

• Current reference docs

Dark Data

(7)

Privacy and Information Security are Top

Concerns

Mobile access to content a security risk

collaboration tools can expose data more easily

Data Governance Challenge

Accountability for regulated data

Audits for security and controls

(8)

Per Breached Record Per Breach Event

(9)

It allows you use your data as an asset without crashing and burning

DATA GOVERNANCE is like the brakes on a car

(10)

Plan for the future

Remove what’s unnecessary Keep what’s required

Protect what’s important Establish a way to identify it Find out what it really is

Reduce Cost.

Increase Productivity.

$

Users:

Relevant Information

IT Admins:

Easier Maintenance

Compliance Officers:

Lowered Risks

(11)
(12)

Discovery and Classification

1

(13)
(14)

Where is it?

File Share SharePoint Office 365 Databases

Who can access it?

Who owns it?

Who can read it?

Who can edit it?

What is it?

?

File Level Analysis

Content Level Analysis

• Redundant, outdated and trivial (ROT) data

• File types (Music, log files, etc..)

• Sensitive data

• Date Created

• Owner

(15)
(16)
(17)

Regulated Data

Data that requires retention / long-term archives ITAR / export controlled data

Gold copies or replication

Sensitive Data

“Controlled Unclassified Information” (CUI)

PII / PHI / PCI data that about employees / citizens

Classified Data

Operational security (OpSec) Intellectual Property

Classified documents

(18)

__(data)_ must be __(controlled)__ by __(role)___

Personnel Data must be encrypted by IT

OpSec Data must be secured by business users

Disaster Recovery Plans must be shared with only IT users (whitelist)

Healthcare Protected Data must not be shared with external users (blacklist)

If you can’t verbalize the control,

you shouldn’t try to govern it!

(19)
(20)

Tags

Ownership Purpose

Audience Sensitivity level

Classify

Is it a record? Is it high business impact?

Who should have access?

Where should it live?

(21)

Identify sensitivity level of the document

• Personally Identifiable Information (PII)

• Protected Health Information (PHI)

• Intellectual Property / Export Regulations

Identify retention schedule

• Required to keep

• Required to dispose

• Content that is no longer relevant to the business

Finish with managed keywords for search

• This will require interviews with the business

(22)

Define Data

Governance Policies

2

(23)

How do you know where to park?

(24)
(25)

Build “controls”

into containers Make sure no one messes with

your controls

Ensure the system

is used as intended

(26)

New Project Site

Site Configuration

External

Sharing Classification

of Content? Data Sovereignty?

Security

Permission

groups? Outside Vendors?

Ownership

Contacts /

Stewards?

(27)

Proactively Enforce Policies

3

(28)
(29)

Regional Farm

Regional Farm

Regional Farm

(30)
(31)
(32)
(33)
(34)
(35)

• It’s Friday 5pm and Mary needs to upload her daily documents into SharePoint

• She doesn’t have time to tag documents and wants to go home on time

• Company policy is that everything that goes into SharePoint MUST be tagged and Restricted

information must not be shared with Everyone.

(36)
(37)
(38)
(39)
(40)
(41)
(42)
(43)

Upload Get Link

Email

Example: File Sharing

(44)
(45)
(46)
(47)
(48)
(49)

How about external collaboration?

(50)
(51)
(52)
(53)
(54)

• Video 4

(55)

Report and Audit

4

(56)

“RECERTIFICATION”

“ATTESTATION”

“ANNUAL REVIEW”

Hey! take a look…

are the current settings still appropriate?

If no– make the changes.

If yes– sign off on it.

(57)

Data Ownership Who is responsible for

the stuff in here?

Are they still here and Access Permissions

Who can do what to the stuff in here?

Does Bob still need his

Classification

Tell me about the stuff that lives in here…

Is it sensitive?

(58)
(59)
(60)

IT’S NOT ALL OR

NOTHING.

On-Prem

Office 365 IaaS or

Private Cloud

“I need to maintain full control over my data and have specific data sovereignty requirements.”

“I’d like to cut cost and

facilitate

collaboration.”

“I’d like to minimize

hardware but maintain control.”

• Critical workloads

• Collaboration spaces

• Productivity apps

• Custom solutions

• Full control

• No hardware

• Sensitive workloads

• Data with location restrictions

• Legacy solutions and customizations

Full Control

(61)

Referensi

Dokumen terkait

https://doi.org/ 10.1017/jie.2019.13 Received: 17 September 2018 Revised: 17 October 2018 Accepted: 23 April 2019 First published online: 2 September 2019 Key words: Aboriginal

OCT examinaton at initial visit for case 3 showed increased thickness of superior and inferior retinal nerve fiber layer both eyes... Automated perimetry at initial visit for case 3