SlideShare a Scribd company logo
1 of 26
Download to read offline
Capgemini Week of
Innovation Networks 2017
Customer Insights Prozess
28. September 2017
Der Customer Insights Prozess ist eng mit der Customer
Journey verzahnt
Copyright © Capgemini 2017. All Rights Reserved
2CWIN17-Customer Insights Prozess.pptx
Customer
Insights
Customer
Journey
Der Customer Insights Prozess im Überblick
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 3
Ansätze zur Unterstützung des Customer Insights
Prozesses
 Data Ingestion
 Streaming / Event-
Processing
 Drittanbieterdaten
 Open Data
 Anonymisierung,
Pseudonymisierung
 Berichtsprozesse
für Regularien
 Big Data
 NoSQL
 Anomalie-
erkennung
 Stammdaten-
Mgmt.
 Daten-
virtualisierung
 Predictive Analytics
 Machine Learning
 Artificial Intelligence
 Business Process Integration
 Customer Relationship Mgmt.
 User Experience
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 4
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
Datenbeschaffung
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 5
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
 Data Ingestion
 Streaming / Event-
Processing
 Drittanbieterdaten
 Open Data
6Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess
Conceptual perspective on reference architecture for Insights&Data
Manage
Process
Analyze
Act
Information
Source
data
Insight
Value
Explorative
Data Exploration
Descriptive
Reporting
Diagnostic
Ad-hoc Querying
Predictive
Data Mining,
Machine Learning
Prescriptive
Next Best Action
Search
Retrieval
 Data governance
and security
 Data privacy
 Compliance
 Collaboration
 Value generation
 Program delivery
 Data-driven culture
 Information strategy
 Skill development
 Master data mgmt
 Metadata mgmt
 Data quality mgmt
 Operations, SLA’s
 Orchestration
Stream
Structured data
 IT managed applications (ERP, SCM, CRM)
 Master and reference data
 Business owned informal data
 Third party data
Unstructured Data
 Social
 Documents, mail, images, voice,
video
Semistructured data
 Internet
 Internet of Things (machine, sensor)
 Server logs
 B2B
Business ApplicationsBusiness ProcessesDecision makers
Data at rest Data in motion
Data Warehouse Data Asset
Catalog
Load
Extract
Transform
Manage Quality
Aggregate
Historize
Data Lake
Business rules Predictive modelsBusiness results Alerts Signals
Catalog
Mask
Store
Ingest
1) Load ‘as-
is’
2) Distill on
demand
Prepare
Blend
Lifecycle
Refine
3) Operationalize
Planning
Forecast,
Simulation
ETL
7Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess
Lambda, Kappa, Streaming Architecture
Objectives
 Process infinite data sets
 Reduce time-to-insight for those
 Flexibility in consumption of this data
 Historize data
 Recoverable from (logical) errors
 “Beat the CAP theorem”
• Low latency
• High availability
  Buzz word alert : Near Real Time
system
Foundation
 Event sourcing
 Making use of immutable events
 Compose all business logic out of them
What is it good for?
8Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess
Lambda architecture (2011) – What does it look like?
https://www.mapr.com/developercentral/lambda-architecture
https://www.oreilly.com/ideas/questioning-the-lambda-architecture
Datenschutz
 Anonymisierung,
Pseudonymisierung
 Berichtsprozesse
für Regularien
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 9
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
EU General Data Protection Regulation (GDPR) in a
nutshell, enforced at end of May 2018
Objectives
• harmonize data
protection across
Europe
• strengthen data
protection for EU
Citizens
Scope
• EU citizen’s data
• Entities from all
countries processing
EU citizen’s data
Sensitive Data
• racial, ethnic origin
• political opinions
• philosophical,
religious beliefs
• health or sex life
• sexual orientation
• genetic, biometric
Data Breach
• third party gains
unauthorised access to
personal data
• must be reported
without undue delay
Responsibilities
• data protection officer
• Data protection impact assessment
• workforce privacy awareness training
• data protection policies
• Data protection by design
• Record of data processing activities
Penalties
for non-compliance
• up to 4% of worldwide
turnover or 20 million €
Rights
• Erase records
• Data portability
• Explain automated
decisions
• Dissent data profiling
Consent
• permits types of
processing
• to be provided explicitly
(opt-in)
• can be withdrawn
Principles
• Lawful, fair,
transparent
• Purpose limitation
• Data minimisation
• Accuracy
• Storage limitation
• Integrity, confidential
• Accountability
Data Processing
• Collecting, storing
• Altering , deleting
• Retrieving
• Transmitting
Data Subject
natural person
• Client
• employee
Supervisory authority
Identification
• name, id. number,
location or physical,
physiological,
genetic, mental,
economic, cultural or
social identity factors
Personal Data
• any information
relating to an identified
or identifiable natural
person
Data Controller Data Processor
• Service provider
Datenhaltung
 Big Data
 NoSQL
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 11
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
12Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess
Manage
Process
Analyze
Information
Source
data
Data ExplorationReporting
Ad-hoc
Querying
Search,
Retrieval
Structured data
 tables
Unstructured Data
 Text, speech, …
Semistructured data
 JSON, XML, …
Implementation perspective on reference architecture for Big Data
Analytics
Data Warehouse Data Asset
Catalog
 Index
 Tags
 Metadata
Data Lake
Analytical
Sandbox
NoSQL databases
Key value
store
Document
store
Column
store
Graph
store
NLP
SQL databases
Row
based
Column
based
Streaming,
Event
Processing
File
system
Analytics
Base
Tables
Data Mining,
Machine Learning
Next Best
Action
High level ingestion and data
preparation
Low level
ingestion
ETL/ELT
Adv. VisualizationSQL
SQL
Java
Scala
Python
R
Batch Processing
Data virtualization
Eventbased
MicroBatch
13Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess
Mapping components for data storage to the reference architecture for
Big Data Analytics
HDFS, MapR-FS,
IBM GPFS
HBase,
Cassandra,
Cloudera
Kudu,
Accumulo
JackRabbit Giraph
Google file
system
Google Big
Table,
MemSQL
MongoDB,
CouchDB,
MarkLogic,
IBM
Cloudant
Redis,
Voldemort,
BerkeleyDB,
Oracle
NoSQL,
MemcacheDB
Neo4J, OrientDB,
Titan, Virtuoso,
ArrangoDB,
Oracle Spatial,
Teradata Aster
Datensicherheit
 Anomalie-
erkennung
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 14
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
SIEM and GRC can not prevent any type of data breach -
we need a different approach
Anomalous Behavior
Traditional approaches need to be
complemented – SIEM, GRC are still needed
GRC says what is approved – the tasks you
can do, the gates you can go through.
Abnormal Behavior Detection says whether you
should have
Extend using Anomalous Behavior Detection:
This approach:
1. Learns what is normal [the difference between
approved and allowed]
2. Identifies what is anomalous and categorizes
the risk
3. Alerts so you can react before it becomes a
problem.
New Outcomes are Possible
It is an extension of current security
approaches that enables a reduction in GRC
and can identify threats that GRC cannot
 It shows where “allowed” is not “normal” and
the scope of the deviation from the norm.
 Detect social engineering attacks as well as
network level detections
 Minimize the exposure time and loss
 Potentially predict the leakage areas ahead of
the attack
 This can be applied to both GRC areas
(Snowden) and non-GRC areas (networks,
non-controlled information) to build up a
broader pattern of behavior.
Detection of Anomalous Behavior – from Insight to Action
Structured data Machine learning
defines “normal”
across user base
Inform management Adjust policies Lockdown
SIEM
AD
HR
Unstructured data
Images
Social
Email
Video
Automated response based on level of deviation and system criticality
Users accessing key systems within role as defined by GRC
Deviation
from norm
triggers
action
1
Out of policy
access
In policy but
extremely
abnormal access
3
2
In policy but
abnormal access
Examples – SIEM, GRC and Detection of Anomalous
Behavior
User tries to access what
they shouldn’t
GRC says “no”,
notifies SIEM
SIEM collates, alerts, may
reduce privileges via GRC/IAM
User accesses single item out of
norm but in policy
GRC says
“yes”
AB ‘but that isn’t normal’,
alert to SIEM
SIEM collates, alerts, may
reduce privileges via GRC/IAM
User accesses multiple areas
out of ordinary but in policy
GRC says
“yes”
AB ‘this is the ONLY person
EVER to do this!’ alert to SIEM
Shutdown of user
access + manager alerts
360 Grad Sicht
 Stammdaten-
Mgmt.
 Daten-
virtualisierung
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 18
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
Alternative Architekturansätze zur Bildung einer 360 Grad
Sicht
Copyright © Capgemini 2017. All Rights Reserved
19CWIN17-Customer Insights Prozess.pptx
Master Data
Management
Data
Virtualization
Big Data /
Data Lake
Erkenntnisse durch Analytics
 Predictive Analytics
 Machine Learning
 Artificial Intelligence
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 20
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
The terms “AI”, “Machine Learning” and “Deep Learning”
form an abstraction hierarchy
Artificial Intelligence
Machine Learning
Neural Networks
Deep Learning
Artificial Intelligence
General term
Machine Learning
Sub-field of research
Neural Networks
Computational
model building approach
Deep Learning
Class of algorithms for
specific kinds of NNs
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 21
Cognition
Deep
learning
Image
analysis
Knowledge
engineering
Natural
language
generation
Machine
learning
Robotics
Sensory
perception
Natural
language
processing
Think
Act
Sense
Speech
recognition
Artificial Intelligence has different technological building
blocks working together to form a learning cycle
Copyright © Capgemini 2017. All Rights Reserved
22CWIN17-Customer Insights Prozess.pptx
Ethische Aspekte der Nutzung von Daten und abgeleiteten
Erkenntnissen
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 23
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
Bei der Nutzung von Erkenntnissen aus Big Data Analytics müssen
ethische Aspekte geprüft werden
Copyright © Capgemini 2017. All Rights Reserved
24
Mit Daten sollte sparsam
umgegangen werden
Die Big Data Anwendung
muss transparent gemacht
werden
Pauschalisierung darf
Einzelpersonen nicht
benachteiligen
Betroffenen sollte Mitsprache
bezüglich der eigenen Daten
ermöglicht werden
Die Anwendung muss Nutzen
für Betroffene, Kunden oder
Gesellschaft stiften
Daten der Betroffenen müssen
vor Missbrauch geschützt
werden
Gesetzestreue ist Grund-
voraussetzung für ethisch
korrektes Verhalten
Nutzen
Individuelle Prüfung
Ethisch korrekte
Anwendung von
Big Data
Transparenz
Chancen-
gleichheit
Datensparsamkeit
Mitbe-
stimmung
Gesetz
Daten-
sicherheit
Nutzen
Der Customer Insights Prozess im Überblick
Touch-
point
Daten-
beschaffung
Daten-
schutz
Daten-
haltung
Daten-
sicherheit
360 Grad Sicht
Erkenntnis
Ethik
Erkenntnis-
verwendung
Copyright © Capgemini 2017. All Rights Reserved
CWIN17-Customer Insights Prozess.pptx 25
Über Capgemini
Mit mehr als 140.000 Mitarbeitern in über 40 Ländern ist
Capgemini einer der weltweit führenden Anbieter von
Management- und IT-Beratung, Technologie-Services sowie
Outsourcing-Dienstleistungen. Im Jahr 2013 betrug der Umsatz
der Capgemini-Gruppe 10,1 Milliarden Euro.
Gemeinsam mit seinen Kunden erstellt Capgemini Geschäfts- wie
auch Technologielösungen, die passgenau auf die individuellen
Anforderungen zugeschnitten sind. Auf der Grundlage seines
weltweiten Liefermodells Rightshore® zeichnet sich Capgemini
als multinationale Organisation durch seine besondere Art der
Zusammenarbeit aus – die Collaborative Business ExperienceTM.
Rightshore® ist eine eingetragene Marke von Capgemini
Die in der Präsentation enthaltenen Informationen sind Eigentum.
Copyright © 2016 Capgemini. Alle Rechte vorbehalten.
www.de.capgemini.com

More Related Content

What's hot

BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!
BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!
BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!Fujitsu Central Europe
 
Engineering Continuous Security and Compliance
Engineering Continuous Security and ComplianceEngineering Continuous Security and Compliance
Engineering Continuous Security and ComplianceQAware GmbH
 
Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917
Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917
Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917Peter Seeberg
 
Arvizio MR Studio Overview
Arvizio MR Studio OverviewArvizio MR Studio Overview
Arvizio MR Studio OverviewJonathan Reeves
 
FIWARE Global Summit - Pixel: A Port IoT Solution for Environmental Leverage
FIWARE Global Summit - Pixel: A Port IoT Solution for Environmental LeverageFIWARE Global Summit - Pixel: A Port IoT Solution for Environmental Leverage
FIWARE Global Summit - Pixel: A Port IoT Solution for Environmental LeverageFIWARE
 
FIWARE Global Summit - What Are We Doing in FIWARE Brazil?
FIWARE Global Summit - What Are We Doing in FIWARE Brazil?FIWARE Global Summit - What Are We Doing in FIWARE Brazil?
FIWARE Global Summit - What Are We Doing in FIWARE Brazil?FIWARE
 
Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924
Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924
Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924Peter Seeberg
 
Agile dd for investors 4mn
Agile dd for investors   4mnAgile dd for investors   4mn
Agile dd for investors 4mnHenri Blondelle
 
SDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der Plattform
SDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der PlattformSDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der Plattform
SDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der PlattformSmart Data Innovation Lab
 
IoT meetup september 2017
IoT meetup september 2017IoT meetup september 2017
IoT meetup september 2017IoT Academy
 
Industrial Internet of Things by 5ME (IIoT)
Industrial Internet of Things by 5ME (IIoT)Industrial Internet of Things by 5ME (IIoT)
Industrial Internet of Things by 5ME (IIoT)Cincy IoT
 
Grow faster in the incubator
Grow faster in the incubatorGrow faster in the incubator
Grow faster in the incubatorCapgemini
 
Seven Ways to Boost Artificial Intelligence Research
Seven Ways to Boost Artificial Intelligence ResearchSeven Ways to Boost Artificial Intelligence Research
Seven Ways to Boost Artificial Intelligence ResearchNVIDIA
 

What's hot (17)

BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!
BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!
BOS - Flexible Arbeitsplätze der Zukunft- aber sicher!
 
Engineering Continuous Security and Compliance
Engineering Continuous Security and ComplianceEngineering Continuous Security and Compliance
Engineering Continuous Security and Compliance
 
Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917
Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917
Maschinenbaugipfel 2018 peter seeberg_maschinelles lernen_build or buy_180917
 
Arvizio MR Studio Overview
Arvizio MR Studio OverviewArvizio MR Studio Overview
Arvizio MR Studio Overview
 
FIWARE Global Summit - Pixel: A Port IoT Solution for Environmental Leverage
FIWARE Global Summit - Pixel: A Port IoT Solution for Environmental LeverageFIWARE Global Summit - Pixel: A Port IoT Solution for Environmental Leverage
FIWARE Global Summit - Pixel: A Port IoT Solution for Environmental Leverage
 
Perth PUXX Slides - June 2017
Perth PUXX Slides - June 2017Perth PUXX Slides - June 2017
Perth PUXX Slides - June 2017
 
Brisbane PUXX Slides - June 2017
Brisbane PUXX Slides - June 2017Brisbane PUXX Slides - June 2017
Brisbane PUXX Slides - June 2017
 
Sydney PUXX Slides - June 2017
Sydney PUXX Slides - June 2017Sydney PUXX Slides - June 2017
Sydney PUXX Slides - June 2017
 
FIWARE Global Summit - What Are We Doing in FIWARE Brazil?
FIWARE Global Summit - What Are We Doing in FIWARE Brazil?FIWARE Global Summit - What Are We Doing in FIWARE Brazil?
FIWARE Global Summit - What Are We Doing in FIWARE Brazil?
 
Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924
Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924
Fraunhofer IVV - Industrie 4.0 - Revolution durch maschinelles lernen - 180924
 
Agile dd for investors 4mn
Agile dd for investors   4mnAgile dd for investors   4mn
Agile dd for investors 4mn
 
SDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der Plattform
SDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der PlattformSDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der Plattform
SDIC'16 - Betrieb des Smart Data Innovation Labs - Vorstellung der Plattform
 
IoT meetup september 2017
IoT meetup september 2017IoT meetup september 2017
IoT meetup september 2017
 
Industrial Internet of Things by 5ME (IIoT)
Industrial Internet of Things by 5ME (IIoT)Industrial Internet of Things by 5ME (IIoT)
Industrial Internet of Things by 5ME (IIoT)
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 
Grow faster in the incubator
Grow faster in the incubatorGrow faster in the incubator
Grow faster in the incubator
 
Seven Ways to Boost Artificial Intelligence Research
Seven Ways to Boost Artificial Intelligence ResearchSeven Ways to Boost Artificial Intelligence Research
Seven Ways to Boost Artificial Intelligence Research
 

Similar to Customer Insights Prozess

Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous BehaviorCapgemini
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous BehaviorCapgemini
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Overview - IBM Big Data Platform
Overview - IBM Big Data PlatformOverview - IBM Big Data Platform
Overview - IBM Big Data PlatformVikas Manoria
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
Data lake benefits
Data lake benefitsData lake benefits
Data lake benefitsRicky Barron
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data SnapLogic
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a ServiceDenodo
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalHarvinder Atwal
 
Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...
Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...
Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...Denodo
 
Generating actionable consumer insights from analytics
Generating actionable consumer insights from analyticsGenerating actionable consumer insights from analytics
Generating actionable consumer insights from analyticsMohammad Shazri Shahrir
 
Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Capgemini
 
Big datacamp june14_alex_liu
Big datacamp june14_alex_liuBig datacamp june14_alex_liu
Big datacamp june14_alex_liuData Con LA
 
Big Data Paris - A Modern Enterprise Architecture
Big Data Paris - A Modern Enterprise ArchitectureBig Data Paris - A Modern Enterprise Architecture
Big Data Paris - A Modern Enterprise ArchitectureMongoDB
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Matt Stubbs
 
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...Capgemini
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 

Similar to Customer Insights Prozess (20)

Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous Behavior
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous Behavior
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Overview - IBM Big Data Platform
Overview - IBM Big Data PlatformOverview - IBM Big Data Platform
Overview - IBM Big Data Platform
 
Machine Data Analytics
Machine Data AnalyticsMachine Data Analytics
Machine Data Analytics
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Data lake benefits
Data lake benefitsData lake benefits
Data lake benefits
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
 
Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...
Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...
Denodo DataFest 2016: Data Science: Operationalizing Analytical Models in Rea...
 
Generating actionable consumer insights from analytics
Generating actionable consumer insights from analyticsGenerating actionable consumer insights from analytics
Generating actionable consumer insights from analytics
 
Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry
 
Big datacamp june14_alex_liu
Big datacamp june14_alex_liuBig datacamp june14_alex_liu
Big datacamp june14_alex_liu
 
Big Data Paris - A Modern Enterprise Architecture
Big Data Paris - A Modern Enterprise ArchitectureBig Data Paris - A Modern Enterprise Architecture
Big Data Paris - A Modern Enterprise Architecture
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
 
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 

More from Capgemini

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022Capgemini
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Capgemini
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Capgemini
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022Capgemini
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Capgemini
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022Capgemini
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Capgemini
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですCapgemini
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Capgemini
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Capgemini
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Capgemini
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Capgemini
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021Capgemini
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Capgemini
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Capgemini
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Capgemini
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Capgemini
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Capgemini
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020Capgemini
 

More from Capgemini (20)

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020
 

Recently uploaded

4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Recently uploaded (20)

4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

Customer Insights Prozess

  • 1. Capgemini Week of Innovation Networks 2017 Customer Insights Prozess 28. September 2017
  • 2. Der Customer Insights Prozess ist eng mit der Customer Journey verzahnt Copyright © Capgemini 2017. All Rights Reserved 2CWIN17-Customer Insights Prozess.pptx Customer Insights Customer Journey
  • 3. Der Customer Insights Prozess im Überblick Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 3
  • 4. Ansätze zur Unterstützung des Customer Insights Prozesses  Data Ingestion  Streaming / Event- Processing  Drittanbieterdaten  Open Data  Anonymisierung, Pseudonymisierung  Berichtsprozesse für Regularien  Big Data  NoSQL  Anomalie- erkennung  Stammdaten- Mgmt.  Daten- virtualisierung  Predictive Analytics  Machine Learning  Artificial Intelligence  Business Process Integration  Customer Relationship Mgmt.  User Experience Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 4 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung
  • 5. Datenbeschaffung Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 5 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung  Data Ingestion  Streaming / Event- Processing  Drittanbieterdaten  Open Data
  • 6. 6Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess Conceptual perspective on reference architecture for Insights&Data Manage Process Analyze Act Information Source data Insight Value Explorative Data Exploration Descriptive Reporting Diagnostic Ad-hoc Querying Predictive Data Mining, Machine Learning Prescriptive Next Best Action Search Retrieval  Data governance and security  Data privacy  Compliance  Collaboration  Value generation  Program delivery  Data-driven culture  Information strategy  Skill development  Master data mgmt  Metadata mgmt  Data quality mgmt  Operations, SLA’s  Orchestration Stream Structured data  IT managed applications (ERP, SCM, CRM)  Master and reference data  Business owned informal data  Third party data Unstructured Data  Social  Documents, mail, images, voice, video Semistructured data  Internet  Internet of Things (machine, sensor)  Server logs  B2B Business ApplicationsBusiness ProcessesDecision makers Data at rest Data in motion Data Warehouse Data Asset Catalog Load Extract Transform Manage Quality Aggregate Historize Data Lake Business rules Predictive modelsBusiness results Alerts Signals Catalog Mask Store Ingest 1) Load ‘as- is’ 2) Distill on demand Prepare Blend Lifecycle Refine 3) Operationalize Planning Forecast, Simulation ETL
  • 7. 7Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess Lambda, Kappa, Streaming Architecture Objectives  Process infinite data sets  Reduce time-to-insight for those  Flexibility in consumption of this data  Historize data  Recoverable from (logical) errors  “Beat the CAP theorem” • Low latency • High availability   Buzz word alert : Near Real Time system Foundation  Event sourcing  Making use of immutable events  Compose all business logic out of them What is it good for?
  • 8. 8Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess Lambda architecture (2011) – What does it look like? https://www.mapr.com/developercentral/lambda-architecture https://www.oreilly.com/ideas/questioning-the-lambda-architecture
  • 9. Datenschutz  Anonymisierung, Pseudonymisierung  Berichtsprozesse für Regularien Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 9 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung
  • 10. EU General Data Protection Regulation (GDPR) in a nutshell, enforced at end of May 2018 Objectives • harmonize data protection across Europe • strengthen data protection for EU Citizens Scope • EU citizen’s data • Entities from all countries processing EU citizen’s data Sensitive Data • racial, ethnic origin • political opinions • philosophical, religious beliefs • health or sex life • sexual orientation • genetic, biometric Data Breach • third party gains unauthorised access to personal data • must be reported without undue delay Responsibilities • data protection officer • Data protection impact assessment • workforce privacy awareness training • data protection policies • Data protection by design • Record of data processing activities Penalties for non-compliance • up to 4% of worldwide turnover or 20 million € Rights • Erase records • Data portability • Explain automated decisions • Dissent data profiling Consent • permits types of processing • to be provided explicitly (opt-in) • can be withdrawn Principles • Lawful, fair, transparent • Purpose limitation • Data minimisation • Accuracy • Storage limitation • Integrity, confidential • Accountability Data Processing • Collecting, storing • Altering , deleting • Retrieving • Transmitting Data Subject natural person • Client • employee Supervisory authority Identification • name, id. number, location or physical, physiological, genetic, mental, economic, cultural or social identity factors Personal Data • any information relating to an identified or identifiable natural person Data Controller Data Processor • Service provider
  • 11. Datenhaltung  Big Data  NoSQL Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 11 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung
  • 12. 12Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess Manage Process Analyze Information Source data Data ExplorationReporting Ad-hoc Querying Search, Retrieval Structured data  tables Unstructured Data  Text, speech, … Semistructured data  JSON, XML, … Implementation perspective on reference architecture for Big Data Analytics Data Warehouse Data Asset Catalog  Index  Tags  Metadata Data Lake Analytical Sandbox NoSQL databases Key value store Document store Column store Graph store NLP SQL databases Row based Column based Streaming, Event Processing File system Analytics Base Tables Data Mining, Machine Learning Next Best Action High level ingestion and data preparation Low level ingestion ETL/ELT Adv. VisualizationSQL SQL Java Scala Python R Batch Processing Data virtualization Eventbased MicroBatch
  • 13. 13Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess Mapping components for data storage to the reference architecture for Big Data Analytics HDFS, MapR-FS, IBM GPFS HBase, Cassandra, Cloudera Kudu, Accumulo JackRabbit Giraph Google file system Google Big Table, MemSQL MongoDB, CouchDB, MarkLogic, IBM Cloudant Redis, Voldemort, BerkeleyDB, Oracle NoSQL, MemcacheDB Neo4J, OrientDB, Titan, Virtuoso, ArrangoDB, Oracle Spatial, Teradata Aster
  • 14. Datensicherheit  Anomalie- erkennung Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 14 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung
  • 15. SIEM and GRC can not prevent any type of data breach - we need a different approach Anomalous Behavior Traditional approaches need to be complemented – SIEM, GRC are still needed GRC says what is approved – the tasks you can do, the gates you can go through. Abnormal Behavior Detection says whether you should have Extend using Anomalous Behavior Detection: This approach: 1. Learns what is normal [the difference between approved and allowed] 2. Identifies what is anomalous and categorizes the risk 3. Alerts so you can react before it becomes a problem. New Outcomes are Possible It is an extension of current security approaches that enables a reduction in GRC and can identify threats that GRC cannot  It shows where “allowed” is not “normal” and the scope of the deviation from the norm.  Detect social engineering attacks as well as network level detections  Minimize the exposure time and loss  Potentially predict the leakage areas ahead of the attack  This can be applied to both GRC areas (Snowden) and non-GRC areas (networks, non-controlled information) to build up a broader pattern of behavior.
  • 16. Detection of Anomalous Behavior – from Insight to Action Structured data Machine learning defines “normal” across user base Inform management Adjust policies Lockdown SIEM AD HR Unstructured data Images Social Email Video Automated response based on level of deviation and system criticality Users accessing key systems within role as defined by GRC Deviation from norm triggers action
  • 17. 1 Out of policy access In policy but extremely abnormal access 3 2 In policy but abnormal access Examples – SIEM, GRC and Detection of Anomalous Behavior User tries to access what they shouldn’t GRC says “no”, notifies SIEM SIEM collates, alerts, may reduce privileges via GRC/IAM User accesses single item out of norm but in policy GRC says “yes” AB ‘but that isn’t normal’, alert to SIEM SIEM collates, alerts, may reduce privileges via GRC/IAM User accesses multiple areas out of ordinary but in policy GRC says “yes” AB ‘this is the ONLY person EVER to do this!’ alert to SIEM Shutdown of user access + manager alerts
  • 18. 360 Grad Sicht  Stammdaten- Mgmt.  Daten- virtualisierung Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 18 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung
  • 19. Alternative Architekturansätze zur Bildung einer 360 Grad Sicht Copyright © Capgemini 2017. All Rights Reserved 19CWIN17-Customer Insights Prozess.pptx Master Data Management Data Virtualization Big Data / Data Lake
  • 20. Erkenntnisse durch Analytics  Predictive Analytics  Machine Learning  Artificial Intelligence Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 20 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung
  • 21. The terms “AI”, “Machine Learning” and “Deep Learning” form an abstraction hierarchy Artificial Intelligence Machine Learning Neural Networks Deep Learning Artificial Intelligence General term Machine Learning Sub-field of research Neural Networks Computational model building approach Deep Learning Class of algorithms for specific kinds of NNs Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 21
  • 22. Cognition Deep learning Image analysis Knowledge engineering Natural language generation Machine learning Robotics Sensory perception Natural language processing Think Act Sense Speech recognition Artificial Intelligence has different technological building blocks working together to form a learning cycle Copyright © Capgemini 2017. All Rights Reserved 22CWIN17-Customer Insights Prozess.pptx
  • 23. Ethische Aspekte der Nutzung von Daten und abgeleiteten Erkenntnissen Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 23 Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung
  • 24. Bei der Nutzung von Erkenntnissen aus Big Data Analytics müssen ethische Aspekte geprüft werden Copyright © Capgemini 2017. All Rights Reserved 24 Mit Daten sollte sparsam umgegangen werden Die Big Data Anwendung muss transparent gemacht werden Pauschalisierung darf Einzelpersonen nicht benachteiligen Betroffenen sollte Mitsprache bezüglich der eigenen Daten ermöglicht werden Die Anwendung muss Nutzen für Betroffene, Kunden oder Gesellschaft stiften Daten der Betroffenen müssen vor Missbrauch geschützt werden Gesetzestreue ist Grund- voraussetzung für ethisch korrektes Verhalten Nutzen Individuelle Prüfung Ethisch korrekte Anwendung von Big Data Transparenz Chancen- gleichheit Datensparsamkeit Mitbe- stimmung Gesetz Daten- sicherheit Nutzen
  • 25. Der Customer Insights Prozess im Überblick Touch- point Daten- beschaffung Daten- schutz Daten- haltung Daten- sicherheit 360 Grad Sicht Erkenntnis Ethik Erkenntnis- verwendung Copyright © Capgemini 2017. All Rights Reserved CWIN17-Customer Insights Prozess.pptx 25
  • 26. Über Capgemini Mit mehr als 140.000 Mitarbeitern in über 40 Ländern ist Capgemini einer der weltweit führenden Anbieter von Management- und IT-Beratung, Technologie-Services sowie Outsourcing-Dienstleistungen. Im Jahr 2013 betrug der Umsatz der Capgemini-Gruppe 10,1 Milliarden Euro. Gemeinsam mit seinen Kunden erstellt Capgemini Geschäfts- wie auch Technologielösungen, die passgenau auf die individuellen Anforderungen zugeschnitten sind. Auf der Grundlage seines weltweiten Liefermodells Rightshore® zeichnet sich Capgemini als multinationale Organisation durch seine besondere Art der Zusammenarbeit aus – die Collaborative Business ExperienceTM. Rightshore® ist eine eingetragene Marke von Capgemini Die in der Präsentation enthaltenen Informationen sind Eigentum. Copyright © 2016 Capgemini. Alle Rechte vorbehalten. www.de.capgemini.com

Editor's Notes

  1. Principal data flow is bottom up Reference architecture is composed of processing steps and deliverables
  2. Principal data flow is bottom up Reference architecture is composed of processing steps and deliverables
  3. Principal data flow is bottom up Reference architecture is composed of processing steps and deliverables
  4. “The challenge has always been ‘how to catch up’, the new challenge is ‘how to stay ahead’” that represents the difference of ABSA over GRC. With GRC you change the rules after the horse has bolted, with ABSA you have a better chance of finding people fiddling with the bolts. It’s not if – it’s when. Reduce the time an attacker is inside the network. Other solutions can’t see the entire attack vector. Traditional SIEM sees logs GRC does not defend from threat actors “in role” Move from the mindset of react to prevent. 80% of IT security budget is currently spent on remediation & response to a threat, infection, or breach. Network/security engineers are generally NOT decision-makers. Compliance teams have a LOT of influence. “Audit Teams” and “Security Teams” and “Server Teams” have their own agendas/stakes in the game The CIO/CISO is looking for a differentiator; something that gives him more than a ‘tunnel view’ The wider business wants to build security and compliance insights – but lack the skills, tools and are over dependent on IT change cycles. Take a business driven view of the critical assets and build a risk view of: Asset type and importance Raw data – e.g. engineering and testing data that has strategic value IP – source code, methods, algorithms that give competitive advantage Impact to business of these asset classes Prioritize the threat approach and anomalous behavior Need ways to identify the anomalous behavior based on systems access and take automated proportionate
  5. Advanced algorithms that run against holistic data set (including HR, AD, etc.) to identify high risk activities by authorized users User is acting in role as set by GRC and policy but anomalously against learned “normal” Triggers automated controls based on system criticality
  6. The building blocks of AI are at different level of maturity from early “research stage” to pragmatic utilization A technology starts at the research stage, where it is primarily the focus of more “foundational research”. As it matures, organizations start adopting it into the enterprise, typically through a “conceptual phase”. The technology will typically have some early “maturity-issues” as it progresses Eventually it will be “production ready” and shown to be stable at high volume and for a variety of use-cases As the different technologies mature, the AI infused processes and “machine” will become more advanced The number of use-cases for AI infused processes will increase as the technological capabilities mature The organization must also adapt and select which processes are relevant for integrating AI solutions Integration of AI components can be done in the process in several ways: incorporated in the applications themselves (SMART-modules), or by a separate solution introduced into the process
  7. 6-1 komplett raus ggf Top 5 zeigen cloud hervorheben (pfeil dicker) - text kürzen - von business getriebenes thema - kicker - prioritäten an challenges anpassen --- skalierbarer, agiler, flexibler (beenfits aus 8 nehmen) - strategic priorities nur auf clod beziehen - links rechts schatten