SlideShare a Scribd company logo
1 of 40
How to Select the Appropriate Approach
to Data Governance
Robert S. Seiner – KIK Consulting / TDAN.com
December 1, 2020 – 12:00 noon EST
Agenda for Today’s Webinar
• In this webinar, I will discuss:
– Three Approaches to Implementing a Data Governance Program
– Core Components That Must Be Addressed
– A Tool to Select the Most Appropriate Approach to Data Governance
– Why the Selection of Approach is a Critical Decision
– How to Select the Best Approach for Your Organization
Definitions
• Data Governance
– Data Governance is the Execution and Enforcement of Authority
Over the Management of Data and Data-Related Resources.
• Data Stewardship
– Data Stewardship is the Formalization of Accountability
Over the Management of Data and Data-Related Resources.
• Metadata
– Information Stored in IT Tools that Improves the Business and Technical
Understanding of Data and Data-Related Resources.
Using a Framework to Compare Approaches
• Method to Complete Comparison
– Share Data Governance Framework
– Define and Validate the Core Components
– Define Organizational Levels
– Define Distinct Approaches
– Comparing Components by Approach
Using a Framework to Compare Approaches
EXECUTIVE
STRATEGIC
TACTICAL
OPERATIONAL
SUPPORT
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
Levels
Components
ROLES
COMMUNICATIONS
TOOLS
METRICS
PROCESSES
NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK
DATA
LEVELS
EXECUTIVE – SENIOR LEADERSHIP TEAM
STRATEGIC – BUSINESS & TECHNOLOGY MGMT
TACTICAL – SUBJECT MATTER EXPERTISE
OPERATIONAL – DAILY JOB FUNCTION
SUPPORT – FUNCTIONAL MANAGEMENT
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Using a Framework to Compare Approaches
Endorse
Enforce
Authorize
Direct
Approve
Prioritize
Resolve
EXECUTIVE
STRATEGIC
TACTICAL
OPERATIONAL
SUPPORT
Facilitate
Mediate
Promote
Operate
Manage
Handle
Formalize
Adhere
Enforce
Approve
Act
Acceptance
Participation
Performance
Subject
Quality
Metrics
Accountability
Efficiency
Effectiveness
Collect
Report
Policy
Directive
Audit
Charter
Best Practices
Guidelines
Roadmap
Standards
Requirements
Workflows
Glossary
Dictionary
Catalog
Repository
DG Tools
Metadata Tools
KIK Artifacts
Support
Sponsor
Understand
Status
Evaluate
Commend
Standards
Subject Area
Project
Orientation
Onboard
Ongoing
Plan
Develop
Deliver
Leadership
Steering
Committee
Preside
DG Program
DG Council
Domain Stewards
Data Owners
SMEs
Operational
Data Stewards
Users
Prog Mgmt
Admin
Work Groups
Partners
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
Levels
Components
ROLES
COMMUNICATIONS
TOOLS
METRICS
PROCESSES
NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK
Leadership
Dashboard
KPIs
Enterprise
Performance
Subject Area
X-Business Unit
Business Unit
Function
Accountability
Inventory
Metadata
DATA
LEVELS
EXECUTIVE – SENIOR LEADERSHIP TEAM
STRATEGIC – BUSINESS & TECHNOLOGY MGMT
TACTICAL – SUBJECT MATTER EXPERTISE
OPERATIONAL – DAILY JOB FUNCTION
SUPPORT – FUNCTIONAL MANAGEMENT
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
• Command and Control Approach
• Assign people to be Data Stewards
• Typical assignments are as Data Owners
• Select Number of People
• Told “You will do this.”
• Most invasive approach to stewardship.
Three Approaches to Implementing a Data Governance
• Questions about the Command-and-Control Approach
• How will people accept being assigned as Data Stewards?
• How will you define the role of the Data Owner?
• Will we cover the entire organization with a select number of people?
• How will people respond to being told “You will do this”?
• Do we consider this approach to be “over and above”?
Three Approaches to Implementing a Data Governance
• Traditional Approach
• Identify people to be Data Stewards
• Typical stewards are identified as Data Owners
• Still a Select Number of People
• Told “You need to do this.”
• Less invasive approach to stewardship / still invasive.
Three Approaches to Implementing a Data Governance
• Questions about the Traditional Approach
• How will people accept being identified as Data Stewards?
• How will you define the role of the Data Owner?
• Will we cover the entire organization with a select number of people?
• How will people respond to being told “You need to do this”?
• Is this approach still “over and above”?
Three Approaches to Implementing a Data Governance
• Non-Invasive Approach
• Recognize people to be Data Stewards
• Typical stewards are recognized by their relationship to data.
• Everybody is a Data Steward / Complete Organizational Coverage
• Told “You are already doing this.”
• Least invasive approach to stewardship / non-invasive.
Three Approaches to Implementing a Data Governance
• Questions about the Non-Invasive Approach
• How will people accept being recognized as Data Stewards?
• How will you define the role of the Steward, Domain Steward?
• Will we cover the entire organization by following this approach?
• How will people respond to being told “You are already doing this”?
• Is this approach suited to fit the culture of your organization?
Three Approaches to Implementing a Data Governance
• Core Components
– Data
– Roles (Authority)
– Processes
– Communications
– Metrics
– Tools
Core Components That Must Be Addressed
• Core Components
– Data
– Roles (Authority)
– Processes
– Communications
– Metrics
– Tools
Core Components That Must Be Addressed
• Levels to Consider
– Executive
– Strategic
– Tactical
– Operational
– Support
– Administrative (?)
• Data
– This component focuses on the scope of the resources that are being governed.
– It is important to differentiate between data, information, records and knowledge.
– The way the resource is governed is similar across all categories of “data”.
– This includes the “execution and enforcement of authority”.
– This includes the “formalization of accountability”.
Core Components That Must Be Addressed
• Roles (Authority)
– Second and perhaps most important foundational component.
– The way roles are defined is a predictor of the effort required to govern.
– Roles are represented through an Operating Model of Roles & Responsibilities.
– The pyramid diagram is represented in the second column of the Framework.
– The Operating Model includes a detailed description of formalized responsibilities,
escalation and decision paths, how roles are formally engaged in processes, and
communications that are shared with each level.
Core Components That Must Be Addressed
Core Components That Must Be Addressed
• Processes
– It is a core component to consider the way the Roles are applied to business.
– The notion of the “Data Governance process” misrepresents the fact that processes
are a primary component of Data Governance success.
– There is not a single process that is governed, rather there are a series of processes to
which Data Governance will be applied.
– Data Governance programs typically provide repeatable processes that reflect the
appropriate level of formal accountability throughout the process.
– Data Governance focuses on getting the “right” person involved in the “right” step of
the process to deliver the “right” result regardless of the process focus – issue
resolution, protection, quality, project-focused;
– Data Governance becomes the application of formal governance to process.
Core Components That Must Be Addressed
• Communications
– Communication is a critical component of successful DG programs.
– Raising the data awareness of every person that defines, produces, and uses data is
critical to achieving program success.
– Education must focus on policies, handling rules, best practices, standards, processes,
and role-based governance activities.
– Communications play a role in every aspect of program definition and delivery.
– Communications must be thorough and measurable.
– Communications must focus on formalizing accountability for the processes
mentioned above: issue resolution, protection, quality, project-focused, or any other
application of authority to how data is managed.
Core Components That Must Be Addressed
• Metrics
– DG programs must be able to measure their impact on the organization.
– Responsibility of the Support role often called the Data Governance Lead and Team.
– The impact/value may be financially quantifiable, but this may not always be the case.
– Measuring efficiency and effectiveness improvements require benchmarks of present
state and the governed activity of measuring and reporting results.
– Organizations measure improvements in governance through collecting and reporting
the number of issues recorded and addressed
– These organization also quantifying the value of issue resolution, quantifying
education, awareness and certification of handling rules and incidents that are
formally addressed.
Core Components That Must Be Addressed
• Tools
– Tools of DG enable the program to deliver value to the organization.
– Organizations use tools they develop internally as well as tools that they’ve purchased
to fill specific needs of their programs.
– The tools that are developed or purchased are based on practicality, ease-of-use, and
the specific goals of the Data Governance program.
– Tools are used to formalize accountability for the management of data and improve
the knowledge of the data, rules, processes required to govern data.
– Tools are used to record and make available metadata in order to improve the
understanding and quality of data across the Enterprise.
Core Components That Must Be Addressed
• Steps to Select the Most Appropriate Approach
– Determine the Core Components Necessary for Your Organization
– Define the Appropriate Levels for Your Organization
– Simple Matrix to Cross-Reference Components by Approach
– Complete Narrative for How Each Component/Approach Differs
– Drum roll please ………………. Here is the tool!
Tool to Select the Most Appropriate Approach
Tool to Select the Most Appropriate Approach
Recognize
Formalize
Roles
Apply to
Process
ROLES
PROCESS
COMMUNICATIONS
METRICS
TOOLS
You Already
Do This
Measure
Advancement
Leverage
Build
Purchase
Identify
Roles
Single
Process
You Should
Do This
Measure
Data
Leverage
Existing
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
APPROACHES
COMMAND and CONTROL – LIMITED COVERAGE
TRADITIONAL – RESPONSIVE COVERAGE
NON-INVASIVE – COMPLETE COVERAGE
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Components
Governance Approaches
TRADITIONAL
NON-INVASIVE
DATA GOVERNANCE FRAMEWORK COMPARISON
Assign
Roles
New
Process
You Will
Do This
Measure
Value
Purchase
First
COMMANDandCONTROL
Data
Information
Records
Knowledge
DATA
Data
Information
Data
• Data
• Command-and-Control Approach
• Singular focus on database resources
• Focus on structured data … and if successful, other data
– Traditional Approach
• Focused on structured and unstructured data
• Call it DG, IG, RG, MDG, BDG … maybe multiple programs
– Non-Invasive Approach
• Focused on data, information, records and knowledge
• Singular program and approach to all governance
Recognize
Formalize
Roles
Apply to
Process
ROLES
PROCESS
COMMUNICATIONS
METRICS
TOOLS
You Already
Do This
Measure
Advancement
Leverage
Build
Purchase
Identify
Roles
Single
Process
You Should
Do This
Measure
Data
Leverage
Existing
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
APPROACHES
COMMAND and CONTROL – LIMITED COVERAGE
TRADITIONAL – RESPONSIVE COVERAGE
NON-INVASIVE – COMPLETE COVERAGE
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Components
Governance Approaches
TRADITIONAL
NON-INVASIVE
DATA GOVERNANCE FRAMEWORK COMPARISON
Assign
Roles
New
Process
You Will
Do This
Measure
Value
Purchase
First
COMMANDandCONTROL
Data
Information
Records
Knowledge
DATA
Data
Information
Data
Tool to Select the Most Appropriate Approach
• Roles (Authority)
• Command-and-Control Approach
• People are assigned new roles
• People are given new levels of authority
– Traditional Approach
• People are told they also have a new role
• People are given new levels of authority
– Non-Invasive Approach
• People are recognized for their relationship to the data
• People levels of authority are formalized
Recognize
Formalize
Roles
Apply to
Process
ROLES
PROCESS
COMMUNICATIONS
METRICS
TOOLS
You Already
Do This
Measure
Advancement
Leverage
Build
Purchase
Identify
Roles
Single
Process
You Should
Do This
Measure
Data
Leverage
Existing
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
APPROACHES
COMMAND and CONTROL – LIMITED COVERAGE
TRADITIONAL – RESPONSIVE COVERAGE
NON-INVASIVE – COMPLETE COVERAGE
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Components
Governance Approaches
TRADITIONAL
NON-INVASIVE
DATA GOVERNANCE FRAMEWORK COMPARISON
Assign
Roles
New
Process
You Will
Do This
Measure
Value
Purchase
First
COMMANDandCONTROL
Data
Information
Records
Knowledge
DATA
Data
Information
Data
Tool to Select the Most Appropriate Approach
• Processes
• Command-and-Control Approach
• New Processes
• All Processes will be Governed
• Traditional Approach
• Single Data Governance Process
• The Data Governance Process
• Non-Invasive Approach
• Governance Applied to Process
• Appropriate Processes are Governed
Recognize
Formalize
Roles
Apply to
Process
ROLES
PROCESS
COMMUNICATIONS
METRICS
TOOLS
You Already
Do This
Measure
Advancement
Leverage
Build
Purchase
Identify
Roles
Single
Process
You Should
Do This
Measure
Data
Leverage
Existing
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
APPROACHES
COMMAND and CONTROL – LIMITED COVERAGE
TRADITIONAL – RESPONSIVE COVERAGE
NON-INVASIVE – COMPLETE COVERAGE
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Components
Governance Approaches
TRADITIONAL
NON-INVASIVE
DATA GOVERNANCE FRAMEWORK COMPARISON
Assign
Roles
New
Process
You Will
Do This
Measure
Value
Purchase
First
COMMANDandCONTROL
Data
Information
Records
Knowledge
DATA
Data
Information
Data
Tool to Select the Most Appropriate Approach
• Communications
– Command-and-Control Approach
• Governance is Mandatory
• You will do this.
– Traditional Approach
• Governance is Important
• You should do this.
– Non-Invasive Approach
• Governance based on Data Relations.
• You already do this.
Recognize
Formalize
Roles
Apply to
Process
ROLES
PROCESS
COMMUNICATIONS
METRICS
TOOLS
You Already
Do This
Measure
Advancement
Leverage
Build
Purchase
Identify
Roles
Single
Process
You Should
Do This
Measure
Data
Leverage
Existing
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
APPROACHES
COMMAND and CONTROL – LIMITED COVERAGE
TRADITIONAL – RESPONSIVE COVERAGE
NON-INVASIVE – COMPLETE COVERAGE
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Components
Governance Approaches
TRADITIONAL
NON-INVASIVE
DATA GOVERNANCE FRAMEWORK COMPARISON
Assign
Roles
New
Process
You Will
Do This
Measure
Value
Purchase
First
COMMANDandCONTROL
Data
Information
Records
Knowledge
DATA
Data
Information
Data
Tool to Select the Most Appropriate Approach
• Metrics
– Command-and-Control Approach
• Measure Value of Governing Data
• Terms of ROI
– Traditional Approach
• Measure Data Itself
• Terms of Data Discipline
– Non-Invasive Approach
• Measure Advancements
• Terms of Awareness / Following Rules
Recognize
Formalize
Roles
Apply to
Process
ROLES
PROCESS
COMMUNICATIONS
METRICS
TOOLS
You Already
Do This
Measure
Advancement
Leverage
Build
Purchase
Identify
Roles
Single
Process
You Should
Do This
Measure
Data
Leverage
Existing
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
APPROACHES
COMMAND and CONTROL – LIMITED COVERAGE
TRADITIONAL – RESPONSIVE COVERAGE
NON-INVASIVE – COMPLETE COVERAGE
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Components
Governance Approaches
TRADITIONAL
NON-INVASIVE
DATA GOVERNANCE FRAMEWORK COMPARISON
Assign
Roles
New
Process
You Will
Do This
Measure
Value
Purchase
First
COMMANDandCONTROL
Data
Information
Records
Knowledge
DATA
Data
Information
Data
Tool to Select the Most Appropriate Approach
• Tools
– Command-and-Control Approach
• Purchase Tool First
• Tool a Large Part of Solution
– Traditional Approach
• Leverage Existing Tools First
• Tool Drives the Solution
– Non-Invasive Approach
• Leverage and Build Toolkit
• Tool Enables Solution
Recognize
Formalize
Roles
Apply to
Process
ROLES
PROCESS
COMMUNICATIONS
METRICS
TOOLS
You Already
Do This
Measure
Advancement
Leverage
Build
Purchase
Identify
Roles
Single
Process
You Should
Do This
Measure
Data
Leverage
Existing
Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
APPROACHES
COMMAND and CONTROL – LIMITED COVERAGE
TRADITIONAL – RESPONSIVE COVERAGE
NON-INVASIVE – COMPLETE COVERAGE
COMPONENTS
DATA – ASSETS BEING GOVERNED
ROLES – FORMAL ACCOUNTABILITY
PROCESSES – APPLICATION / ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED / DEVELOPED
Components
Governance Approaches
TRADITIONAL
NON-INVASIVE
DATA GOVERNANCE FRAMEWORK COMPARISON
Assign
Roles
New
Process
You Will
Do This
Measure
Value
Purchase
First
COMMANDandCONTROL
Data
Information
Records
Knowledge
DATA
Data
Information
Data
Tool to Select the Most Appropriate Approach
• The approach may impact how the program is perceived / accepted.
Why the Selection of Approach is a Critical Decision
• People have day jobs and may push back on “more work”.
Why the Selection of Approach is a Critical Decision
• “Non-invasive” may be misunderstood, … so explain it well.
Why the Selection of Approach is a Critical Decision
• “Everybody is a data steward” may be misunderstood, … so explain it well.
Why the Selection of Approach is a Critical Decision
• Understand what will be acceptable to your organization.
How to Select the Best Approach for Your Organization
• Consider putting significant effort toward messaging.
How to Select the Best Approach for Your Organization
• Consider what has worked / has not worked in the past.
How to Select the Best Approach for Your Organization
• Disruption (or being viewed this way) will be a risky proposition.
How to Select the Best Approach for Your Organization
• In this webinar I discussed:
– Three Approaches to Implementing a Data Governance Program
– Core Components That Must Be Addressed
– A Tool to Select the Most Appropriate Approach to Data Governance
– Why the Selection of Approach is a Critical Decision
– How to Select the Best Approach for Your Organization
Summary
Questions and Answers
• Robert S. Seiner
• KIK Consulting & Educational Services – KIKconsulting.com
• The Data Administration Newsletter – TDAN.com
• Post Office Box 112571, Upper St. Clair, Pennsylvania 15241
• 412.220.9643
• rseiner@tdan.com
• @RSeiner @TDAN_com
Contact Information

More Related Content

More from IDERA Software

Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian FlugIdera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian Flug
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian FlugIDERA Software
 
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...IDERA Software
 
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021:  Managing Digital Transformation on a Budget by Bert ScalzoIdera live 2021:  Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Managing Digital Transformation on a Budget by Bert ScalzoIDERA Software
 
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...IDERA Software
 
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...IDERA Software
 
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...IDERA Software
 
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021:  Performance Tuning Azure SQL Database by Monica RathbunIdera live 2021:  Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021: Performance Tuning Azure SQL Database by Monica RathbunIDERA Software
 
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAGeek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAIDERA Software
 
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...IDERA Software
 
Benefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERABenefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERAIDERA Software
 
Achieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERAAchieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERAIDERA Software
 
Benefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERABenefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERAIDERA Software
 
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERABe Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERAIDERA Software
 
Advanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERAAdvanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERAIDERA Software
 
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent OzarGeek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent OzarIDERA Software
 
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...IDERA Software
 
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...IDERA Software
 
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent OzarGeek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent OzarIDERA Software
 
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERAGeek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERAIDERA Software
 
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...IDERA Software
 

More from IDERA Software (20)

Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian FlugIdera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian Flug
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
 
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
 
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021:  Managing Digital Transformation on a Budget by Bert ScalzoIdera live 2021:  Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
 
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
 
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
 
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
 
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021:  Performance Tuning Azure SQL Database by Monica RathbunIdera live 2021:  Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
 
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAGeek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
 
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
 
Benefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERABenefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERA
 
Achieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERAAchieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERA
 
Benefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERABenefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERA
 
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERABe Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
 
Advanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERAAdvanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERA
 
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent OzarGeek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
 
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
 
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
 
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent OzarGeek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
 
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERAGeek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
 
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Geek Sync | How to Select the Appropriate Approach to Data Governance

  • 1. How to Select the Appropriate Approach to Data Governance Robert S. Seiner – KIK Consulting / TDAN.com December 1, 2020 – 12:00 noon EST
  • 2. Agenda for Today’s Webinar • In this webinar, I will discuss: – Three Approaches to Implementing a Data Governance Program – Core Components That Must Be Addressed – A Tool to Select the Most Appropriate Approach to Data Governance – Why the Selection of Approach is a Critical Decision – How to Select the Best Approach for Your Organization
  • 3. Definitions • Data Governance – Data Governance is the Execution and Enforcement of Authority Over the Management of Data and Data-Related Resources. • Data Stewardship – Data Stewardship is the Formalization of Accountability Over the Management of Data and Data-Related Resources. • Metadata – Information Stored in IT Tools that Improves the Business and Technical Understanding of Data and Data-Related Resources.
  • 4. Using a Framework to Compare Approaches • Method to Complete Comparison – Share Data Governance Framework – Define and Validate the Core Components – Define Organizational Levels – Define Distinct Approaches – Comparing Components by Approach
  • 5. Using a Framework to Compare Approaches EXECUTIVE STRATEGIC TACTICAL OPERATIONAL SUPPORT Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC Levels Components ROLES COMMUNICATIONS TOOLS METRICS PROCESSES NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK DATA LEVELS EXECUTIVE – SENIOR LEADERSHIP TEAM STRATEGIC – BUSINESS & TECHNOLOGY MGMT TACTICAL – SUBJECT MATTER EXPERTISE OPERATIONAL – DAILY JOB FUNCTION SUPPORT – FUNCTIONAL MANAGEMENT COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED
  • 6. Using a Framework to Compare Approaches Endorse Enforce Authorize Direct Approve Prioritize Resolve EXECUTIVE STRATEGIC TACTICAL OPERATIONAL SUPPORT Facilitate Mediate Promote Operate Manage Handle Formalize Adhere Enforce Approve Act Acceptance Participation Performance Subject Quality Metrics Accountability Efficiency Effectiveness Collect Report Policy Directive Audit Charter Best Practices Guidelines Roadmap Standards Requirements Workflows Glossary Dictionary Catalog Repository DG Tools Metadata Tools KIK Artifacts Support Sponsor Understand Status Evaluate Commend Standards Subject Area Project Orientation Onboard Ongoing Plan Develop Deliver Leadership Steering Committee Preside DG Program DG Council Domain Stewards Data Owners SMEs Operational Data Stewards Users Prog Mgmt Admin Work Groups Partners Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC Levels Components ROLES COMMUNICATIONS TOOLS METRICS PROCESSES NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK Leadership Dashboard KPIs Enterprise Performance Subject Area X-Business Unit Business Unit Function Accountability Inventory Metadata DATA LEVELS EXECUTIVE – SENIOR LEADERSHIP TEAM STRATEGIC – BUSINESS & TECHNOLOGY MGMT TACTICAL – SUBJECT MATTER EXPERTISE OPERATIONAL – DAILY JOB FUNCTION SUPPORT – FUNCTIONAL MANAGEMENT COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED
  • 7. • Command and Control Approach • Assign people to be Data Stewards • Typical assignments are as Data Owners • Select Number of People • Told “You will do this.” • Most invasive approach to stewardship. Three Approaches to Implementing a Data Governance
  • 8. • Questions about the Command-and-Control Approach • How will people accept being assigned as Data Stewards? • How will you define the role of the Data Owner? • Will we cover the entire organization with a select number of people? • How will people respond to being told “You will do this”? • Do we consider this approach to be “over and above”? Three Approaches to Implementing a Data Governance
  • 9. • Traditional Approach • Identify people to be Data Stewards • Typical stewards are identified as Data Owners • Still a Select Number of People • Told “You need to do this.” • Less invasive approach to stewardship / still invasive. Three Approaches to Implementing a Data Governance
  • 10. • Questions about the Traditional Approach • How will people accept being identified as Data Stewards? • How will you define the role of the Data Owner? • Will we cover the entire organization with a select number of people? • How will people respond to being told “You need to do this”? • Is this approach still “over and above”? Three Approaches to Implementing a Data Governance
  • 11. • Non-Invasive Approach • Recognize people to be Data Stewards • Typical stewards are recognized by their relationship to data. • Everybody is a Data Steward / Complete Organizational Coverage • Told “You are already doing this.” • Least invasive approach to stewardship / non-invasive. Three Approaches to Implementing a Data Governance
  • 12. • Questions about the Non-Invasive Approach • How will people accept being recognized as Data Stewards? • How will you define the role of the Steward, Domain Steward? • Will we cover the entire organization by following this approach? • How will people respond to being told “You are already doing this”? • Is this approach suited to fit the culture of your organization? Three Approaches to Implementing a Data Governance
  • 13. • Core Components – Data – Roles (Authority) – Processes – Communications – Metrics – Tools Core Components That Must Be Addressed
  • 14. • Core Components – Data – Roles (Authority) – Processes – Communications – Metrics – Tools Core Components That Must Be Addressed • Levels to Consider – Executive – Strategic – Tactical – Operational – Support – Administrative (?)
  • 15. • Data – This component focuses on the scope of the resources that are being governed. – It is important to differentiate between data, information, records and knowledge. – The way the resource is governed is similar across all categories of “data”. – This includes the “execution and enforcement of authority”. – This includes the “formalization of accountability”. Core Components That Must Be Addressed
  • 16. • Roles (Authority) – Second and perhaps most important foundational component. – The way roles are defined is a predictor of the effort required to govern. – Roles are represented through an Operating Model of Roles & Responsibilities. – The pyramid diagram is represented in the second column of the Framework. – The Operating Model includes a detailed description of formalized responsibilities, escalation and decision paths, how roles are formally engaged in processes, and communications that are shared with each level. Core Components That Must Be Addressed
  • 17. Core Components That Must Be Addressed
  • 18. • Processes – It is a core component to consider the way the Roles are applied to business. – The notion of the “Data Governance process” misrepresents the fact that processes are a primary component of Data Governance success. – There is not a single process that is governed, rather there are a series of processes to which Data Governance will be applied. – Data Governance programs typically provide repeatable processes that reflect the appropriate level of formal accountability throughout the process. – Data Governance focuses on getting the “right” person involved in the “right” step of the process to deliver the “right” result regardless of the process focus – issue resolution, protection, quality, project-focused; – Data Governance becomes the application of formal governance to process. Core Components That Must Be Addressed
  • 19. • Communications – Communication is a critical component of successful DG programs. – Raising the data awareness of every person that defines, produces, and uses data is critical to achieving program success. – Education must focus on policies, handling rules, best practices, standards, processes, and role-based governance activities. – Communications play a role in every aspect of program definition and delivery. – Communications must be thorough and measurable. – Communications must focus on formalizing accountability for the processes mentioned above: issue resolution, protection, quality, project-focused, or any other application of authority to how data is managed. Core Components That Must Be Addressed
  • 20. • Metrics – DG programs must be able to measure their impact on the organization. – Responsibility of the Support role often called the Data Governance Lead and Team. – The impact/value may be financially quantifiable, but this may not always be the case. – Measuring efficiency and effectiveness improvements require benchmarks of present state and the governed activity of measuring and reporting results. – Organizations measure improvements in governance through collecting and reporting the number of issues recorded and addressed – These organization also quantifying the value of issue resolution, quantifying education, awareness and certification of handling rules and incidents that are formally addressed. Core Components That Must Be Addressed
  • 21. • Tools – Tools of DG enable the program to deliver value to the organization. – Organizations use tools they develop internally as well as tools that they’ve purchased to fill specific needs of their programs. – The tools that are developed or purchased are based on practicality, ease-of-use, and the specific goals of the Data Governance program. – Tools are used to formalize accountability for the management of data and improve the knowledge of the data, rules, processes required to govern data. – Tools are used to record and make available metadata in order to improve the understanding and quality of data across the Enterprise. Core Components That Must Be Addressed
  • 22. • Steps to Select the Most Appropriate Approach – Determine the Core Components Necessary for Your Organization – Define the Appropriate Levels for Your Organization – Simple Matrix to Cross-Reference Components by Approach – Complete Narrative for How Each Component/Approach Differs – Drum roll please ………………. Here is the tool! Tool to Select the Most Appropriate Approach
  • 23. Tool to Select the Most Appropriate Approach Recognize Formalize Roles Apply to Process ROLES PROCESS COMMUNICATIONS METRICS TOOLS You Already Do This Measure Advancement Leverage Build Purchase Identify Roles Single Process You Should Do This Measure Data Leverage Existing Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC APPROACHES COMMAND and CONTROL – LIMITED COVERAGE TRADITIONAL – RESPONSIVE COVERAGE NON-INVASIVE – COMPLETE COVERAGE COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED Components Governance Approaches TRADITIONAL NON-INVASIVE DATA GOVERNANCE FRAMEWORK COMPARISON Assign Roles New Process You Will Do This Measure Value Purchase First COMMANDandCONTROL Data Information Records Knowledge DATA Data Information Data
  • 24. • Data • Command-and-Control Approach • Singular focus on database resources • Focus on structured data … and if successful, other data – Traditional Approach • Focused on structured and unstructured data • Call it DG, IG, RG, MDG, BDG … maybe multiple programs – Non-Invasive Approach • Focused on data, information, records and knowledge • Singular program and approach to all governance Recognize Formalize Roles Apply to Process ROLES PROCESS COMMUNICATIONS METRICS TOOLS You Already Do This Measure Advancement Leverage Build Purchase Identify Roles Single Process You Should Do This Measure Data Leverage Existing Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC APPROACHES COMMAND and CONTROL – LIMITED COVERAGE TRADITIONAL – RESPONSIVE COVERAGE NON-INVASIVE – COMPLETE COVERAGE COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED Components Governance Approaches TRADITIONAL NON-INVASIVE DATA GOVERNANCE FRAMEWORK COMPARISON Assign Roles New Process You Will Do This Measure Value Purchase First COMMANDandCONTROL Data Information Records Knowledge DATA Data Information Data Tool to Select the Most Appropriate Approach
  • 25. • Roles (Authority) • Command-and-Control Approach • People are assigned new roles • People are given new levels of authority – Traditional Approach • People are told they also have a new role • People are given new levels of authority – Non-Invasive Approach • People are recognized for their relationship to the data • People levels of authority are formalized Recognize Formalize Roles Apply to Process ROLES PROCESS COMMUNICATIONS METRICS TOOLS You Already Do This Measure Advancement Leverage Build Purchase Identify Roles Single Process You Should Do This Measure Data Leverage Existing Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC APPROACHES COMMAND and CONTROL – LIMITED COVERAGE TRADITIONAL – RESPONSIVE COVERAGE NON-INVASIVE – COMPLETE COVERAGE COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED Components Governance Approaches TRADITIONAL NON-INVASIVE DATA GOVERNANCE FRAMEWORK COMPARISON Assign Roles New Process You Will Do This Measure Value Purchase First COMMANDandCONTROL Data Information Records Knowledge DATA Data Information Data Tool to Select the Most Appropriate Approach
  • 26. • Processes • Command-and-Control Approach • New Processes • All Processes will be Governed • Traditional Approach • Single Data Governance Process • The Data Governance Process • Non-Invasive Approach • Governance Applied to Process • Appropriate Processes are Governed Recognize Formalize Roles Apply to Process ROLES PROCESS COMMUNICATIONS METRICS TOOLS You Already Do This Measure Advancement Leverage Build Purchase Identify Roles Single Process You Should Do This Measure Data Leverage Existing Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC APPROACHES COMMAND and CONTROL – LIMITED COVERAGE TRADITIONAL – RESPONSIVE COVERAGE NON-INVASIVE – COMPLETE COVERAGE COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED Components Governance Approaches TRADITIONAL NON-INVASIVE DATA GOVERNANCE FRAMEWORK COMPARISON Assign Roles New Process You Will Do This Measure Value Purchase First COMMANDandCONTROL Data Information Records Knowledge DATA Data Information Data Tool to Select the Most Appropriate Approach
  • 27. • Communications – Command-and-Control Approach • Governance is Mandatory • You will do this. – Traditional Approach • Governance is Important • You should do this. – Non-Invasive Approach • Governance based on Data Relations. • You already do this. Recognize Formalize Roles Apply to Process ROLES PROCESS COMMUNICATIONS METRICS TOOLS You Already Do This Measure Advancement Leverage Build Purchase Identify Roles Single Process You Should Do This Measure Data Leverage Existing Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC APPROACHES COMMAND and CONTROL – LIMITED COVERAGE TRADITIONAL – RESPONSIVE COVERAGE NON-INVASIVE – COMPLETE COVERAGE COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED Components Governance Approaches TRADITIONAL NON-INVASIVE DATA GOVERNANCE FRAMEWORK COMPARISON Assign Roles New Process You Will Do This Measure Value Purchase First COMMANDandCONTROL Data Information Records Knowledge DATA Data Information Data Tool to Select the Most Appropriate Approach
  • 28. • Metrics – Command-and-Control Approach • Measure Value of Governing Data • Terms of ROI – Traditional Approach • Measure Data Itself • Terms of Data Discipline – Non-Invasive Approach • Measure Advancements • Terms of Awareness / Following Rules Recognize Formalize Roles Apply to Process ROLES PROCESS COMMUNICATIONS METRICS TOOLS You Already Do This Measure Advancement Leverage Build Purchase Identify Roles Single Process You Should Do This Measure Data Leverage Existing Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC APPROACHES COMMAND and CONTROL – LIMITED COVERAGE TRADITIONAL – RESPONSIVE COVERAGE NON-INVASIVE – COMPLETE COVERAGE COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED Components Governance Approaches TRADITIONAL NON-INVASIVE DATA GOVERNANCE FRAMEWORK COMPARISON Assign Roles New Process You Will Do This Measure Value Purchase First COMMANDandCONTROL Data Information Records Knowledge DATA Data Information Data Tool to Select the Most Appropriate Approach
  • 29. • Tools – Command-and-Control Approach • Purchase Tool First • Tool a Large Part of Solution – Traditional Approach • Leverage Existing Tools First • Tool Drives the Solution – Non-Invasive Approach • Leverage and Build Toolkit • Tool Enables Solution Recognize Formalize Roles Apply to Process ROLES PROCESS COMMUNICATIONS METRICS TOOLS You Already Do This Measure Advancement Leverage Build Purchase Identify Roles Single Process You Should Do This Measure Data Leverage Existing Copyright © 2020 – Robert S. Seiner and KIK Consulting & Educational Services, LLC APPROACHES COMMAND and CONTROL – LIMITED COVERAGE TRADITIONAL – RESPONSIVE COVERAGE NON-INVASIVE – COMPLETE COVERAGE COMPONENTS DATA – ASSETS BEING GOVERNED ROLES – FORMAL ACCOUNTABILITY PROCESSES – APPLICATION / ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED / DEVELOPED Components Governance Approaches TRADITIONAL NON-INVASIVE DATA GOVERNANCE FRAMEWORK COMPARISON Assign Roles New Process You Will Do This Measure Value Purchase First COMMANDandCONTROL Data Information Records Knowledge DATA Data Information Data Tool to Select the Most Appropriate Approach
  • 30. • The approach may impact how the program is perceived / accepted. Why the Selection of Approach is a Critical Decision
  • 31. • People have day jobs and may push back on “more work”. Why the Selection of Approach is a Critical Decision
  • 32. • “Non-invasive” may be misunderstood, … so explain it well. Why the Selection of Approach is a Critical Decision
  • 33. • “Everybody is a data steward” may be misunderstood, … so explain it well. Why the Selection of Approach is a Critical Decision
  • 34. • Understand what will be acceptable to your organization. How to Select the Best Approach for Your Organization
  • 35. • Consider putting significant effort toward messaging. How to Select the Best Approach for Your Organization
  • 36. • Consider what has worked / has not worked in the past. How to Select the Best Approach for Your Organization
  • 37. • Disruption (or being viewed this way) will be a risky proposition. How to Select the Best Approach for Your Organization
  • 38. • In this webinar I discussed: – Three Approaches to Implementing a Data Governance Program – Core Components That Must Be Addressed – A Tool to Select the Most Appropriate Approach to Data Governance – Why the Selection of Approach is a Critical Decision – How to Select the Best Approach for Your Organization Summary
  • 40. • Robert S. Seiner • KIK Consulting & Educational Services – KIKconsulting.com • The Data Administration Newsletter – TDAN.com • Post Office Box 112571, Upper St. Clair, Pennsylvania 15241 • 412.220.9643 • rseiner@tdan.com • @RSeiner @TDAN_com Contact Information