10
The Association of Indonesia Chief Information Officers Strengthening the Foundation, Embracing Security and Privacy Agus Wicaksono Chairman iCIO 27 Apr 2017 Data Governance

Data Governance: Strengthening the Foundation, Embracing Security and Privacy

Embed Size (px)

Citation preview

Page 1: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

The Association of Indonesia Chief Information Officers

Strengthening the Foundation, Embracing Security and Privacy

Agus Wicaksono Chairman iCIO

27 Apr 2017

Data Governance

Page 2: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

The Explosion of Data Growth Demand to Analyze, Need to Protect

http://www.signiant.com/articles/file-transfer/the-historical-growth-of-data-why-we-need-a-faster-transfer-solution-for-large-data-sets/

~ 2.5 Exabyte per day : 1.6T books, 10M blue-ray disc, 4x Eiffel Tower

Driven by information, automation, sensors – Internet of Things

Unstructured information is dominating, posing a new challenge

Continual connectivity: Volume, Velocity, Variety

Data is the New Oil

https://www.scientificamerican.com/article/will-democracy-survive-big-data-and-artificial-intelligence/

Page 3: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

Big Data Common View of Analytics Analytics

Levels Analytics Maturity Stages

Analytics

Approaches

Distinctive: Analytics provides a competitive advantage

- Distinctive intelligence tools - Correlating internal/external data

Focused: Analytics used for core business - Valuable intelligence tools - Focus on quality data - Relating internal data

Aspirational: Pursuing several opportunities

- Some intelligence tools - Some central data - Understand isolated data

Uncoordinated: Pockets of analytics activity - Basic reporting - Localized data - Spreadsheets

Impaired: Lacking analytics capabilities

- Poor data quality - Missing data - Lacking skills

What is the best action or

outcome ?

What could happen ?

What happened ?

Pre

scri

pti

ve

An

alyt

ics

Pre

dic

tive

A

nal

ytic

s D

esc

rip

tive

A

nal

ytic

s

Optimization

Tuning Decision Strategies

Applying Analytics

Predictive Models Forecasting/Extrapolation

Statistical Analysis Alerts

Historical Analysis

Metrics, KPIs, Thresholds

Reporting (Historical, Summary, Operations)

Counts and Lists

Search and Lookup

Best Guess

Trial and Error Gut Decisions

Benefits

Data

Needs

High

Low

Page 4: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

Good Data Managing Foundational Ecosystem

Framework Expectations & Maturity Management System

Data Governance

Skills Standards

Integration

• Vision & Objective • Assessment • Planning • Implementation • Review

1

2

3 4

5

Generate information into business insights

Process Disciplines : CIA assessment, periodic review, access control, quality measures, digital debris, IPR-IP, forensic scan …

Organization: Information Stewards, Data Privacy Champion, Business Intelligence, Data Scientists ..

Ready for high-Volume, -Velocity, -Variety

Page 5: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

Data Capture Awareness on Privacy Rights

Other challenges in Big Data: comply with privacy policy –

Source: A Global Survey of Big Data Professionals, Dimensional Research, June 2016.

60% 3% 40%

Barriers in adopting Big Data Analytics

Deloitte: Privacy Issues

Gartner: Risk & Governance

The right to be forgotten ?

Transfer of personal data over phone to unverified callers

Financial records 123-456-ddmmyy-789-0 Jessica Case

Page 7: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

Black Markets Underground Networks Set the Value of Information

Source: * Verizon 2014 Data Breach Investigation Report ** Oracle-Verizon 2015, Securing Information in the New Digital Economy

14%

18%

27% 29%

34%

Ban

k

Secr

ets

Inte

rnal

Pay

me

nt

Variety of at risk data within insider misuse*

Fresh credit card data $ 20-25

Stale credit card data $ 2-7

Medical record $ 50

Hijacked email account $ 10-100

Bank account credentials $ 10-1,000

Pricelist for stolen information**

Page 9: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

Key Takeaway

Accessible real-time information, and good analytics of high-quality big data: accelerate business growth and national development

Governance and information protection need to be in place

Data theft is a rampant and growing area of crime

Awareness on Data Privacy is weak

Instill Trust : clear laws and regulations

Inefficient Government Bureaucracy

Corruption

Inadequate Supply of Infrastructure

Page 10: Data Governance: Strengthening the Foundation, Embracing Security and Privacy

There are only two types of companies: those that have been hacked, and those that will be. Robert Mueller FBI Director, 2012

Thank You

@aguswicaksono Agus Wicaksono [email protected] http://aguswicaksono.blogspot.com