Upload
agus-wicaksono
View
56
Download
3
Embed Size (px)
Citation preview
The Association of Indonesia Chief Information Officers
Strengthening the Foundation, Embracing Security and Privacy
Agus Wicaksono Chairman iCIO
27 Apr 2017
Data Governance
The Explosion of Data Growth Demand to Analyze, Need to Protect
http://www.signiant.com/articles/file-transfer/the-historical-growth-of-data-why-we-need-a-faster-transfer-solution-for-large-data-sets/
~ 2.5 Exabyte per day : 1.6T books, 10M blue-ray disc, 4x Eiffel Tower
Driven by information, automation, sensors – Internet of Things
Unstructured information is dominating, posing a new challenge
Continual connectivity: Volume, Velocity, Variety
Data is the New Oil
https://www.scientificamerican.com/article/will-democracy-survive-big-data-and-artificial-intelligence/
Big Data Common View of Analytics Analytics
Levels Analytics Maturity Stages
Analytics
Approaches
Distinctive: Analytics provides a competitive advantage
- Distinctive intelligence tools - Correlating internal/external data
Focused: Analytics used for core business - Valuable intelligence tools - Focus on quality data - Relating internal data
Aspirational: Pursuing several opportunities
- Some intelligence tools - Some central data - Understand isolated data
Uncoordinated: Pockets of analytics activity - Basic reporting - Localized data - Spreadsheets
Impaired: Lacking analytics capabilities
- Poor data quality - Missing data - Lacking skills
What is the best action or
outcome ?
What could happen ?
What happened ?
Pre
scri
pti
ve
An
alyt
ics
Pre
dic
tive
A
nal
ytic
s D
esc
rip
tive
A
nal
ytic
s
Optimization
Tuning Decision Strategies
Applying Analytics
Predictive Models Forecasting/Extrapolation
Statistical Analysis Alerts
Historical Analysis
Metrics, KPIs, Thresholds
Reporting (Historical, Summary, Operations)
Counts and Lists
Search and Lookup
Best Guess
Trial and Error Gut Decisions
Benefits
Data
Needs
High
Low
Good Data Managing Foundational Ecosystem
Framework Expectations & Maturity Management System
Data Governance
Skills Standards
Integration
• Vision & Objective • Assessment • Planning • Implementation • Review
1
2
3 4
5
Generate information into business insights
Process Disciplines : CIA assessment, periodic review, access control, quality measures, digital debris, IPR-IP, forensic scan …
Organization: Information Stewards, Data Privacy Champion, Business Intelligence, Data Scientists ..
Ready for high-Volume, -Velocity, -Variety
Data Capture Awareness on Privacy Rights
Other challenges in Big Data: comply with privacy policy –
Source: A Global Survey of Big Data Professionals, Dimensional Research, June 2016.
60% 3% 40%
Barriers in adopting Big Data Analytics
Deloitte: Privacy Issues
Gartner: Risk & Governance
The right to be forgotten ?
Transfer of personal data over phone to unverified callers
Financial records 123-456-ddmmyy-789-0 Jessica Case
2013 2014
Natanz
2010
2011
2016
2015
2012
2015
Ukraine
The Threat is Real Global Live Attack
http://map.ipviking.com/
2017
Black Markets Underground Networks Set the Value of Information
Source: * Verizon 2014 Data Breach Investigation Report ** Oracle-Verizon 2015, Securing Information in the New Digital Economy
14%
18%
27% 29%
34%
Ban
k
Secr
ets
Inte
rnal
Pay
me
nt
Variety of at risk data within insider misuse*
Fresh credit card data $ 20-25
Stale credit card data $ 2-7
Medical record $ 50
Hijacked email account $ 10-100
Bank account credentials $ 10-1,000
Pricelist for stolen information**
Public vs Privacy Personally Identifiable Information
Any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing anonymous data.
http://www.onlinewebsitesecurity.com/how-to-protect-your-pii/
Key Takeaway
Accessible real-time information, and good analytics of high-quality big data: accelerate business growth and national development
Governance and information protection need to be in place
Data theft is a rampant and growing area of crime
Awareness on Data Privacy is weak
Instill Trust : clear laws and regulations
Inefficient Government Bureaucracy
Corruption
Inadequate Supply of Infrastructure
There are only two types of companies: those that have been hacked, and those that will be. Robert Mueller FBI Director, 2012
Thank You
@aguswicaksono Agus Wicaksono [email protected] http://aguswicaksono.blogspot.com