Tag "Data Integration"

BCBS 239 – What Are Banks Talking About?

I recently participated on an EDM Council panel on BCBS 239 earlier this month in London and New York. The panel consisted of Chief Risk Officers, Chief Data Officers, and information management experts from the financial industry. BCBS 239 set out 14 key principles requiring banks aggregate their risk data to allow banking regulators to avoid... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part II

To determine what is the appropriate sensitive data protection method to use, you should first answer the following questions regarding the requirements: Do you need to protect data at rest (in storage), during transmission, and/or when accessed? Do some privileged users still need the ability to view the original sensitive data or does sensitive data... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part I

I’m often asked to share my thoughts about protecting sensitive data. The questions that typically come up include: Which types of data should be protected? Which data should be classified as “sensitive?” Where is this sensitive data located? Which groups of users should have access to this data? Because these questions come up frequently, it... more

Integrating Structured Data Into the E-Discovery Process

This blog post initially initially appeared on Exterro and is reblogged here with their consent. As data volumes increase and become more complex, having an integrated e-discovery environment where systems and data sources are automatically synching information and exchanging data with e-discovery applications has become critical for organizations. This is true of unstructured and semi-structured data sources,... more

Business Agility Depends on Data Integration Agility and Your Skills

Over the last 40 years, data has become increasingly distributed.  It used to all sit on storage connected to a mainframe.  It used to be that the application of computing power to solve business problems was limited by the availability of CPU, memory, network and disk.  Those limitations are no longer big inhibitors.  Data fragmentation... more

Data Governance Apply Processes Operationalize Human and Machine Roles

As mentioned in my post describing the major business processes that comprise a data governance function, the Apply processes aim to operationalize and ensure compliance with all the data governance policies, business rules, stewardship processes, workflows, and cross-functional roles and responsibilities captured through the Discover and Define process stages.