SlideShare a Scribd company logo
1 of 70
Download to read offline
The Value from Big Data Analytics
Vint 2012
A Boeing 747 generates 30 TB of data in 1 flight
Vint 2012
EIU 2012
16
www.isaca.org
Big Data—Characteristics
Very large, distributed aggregations of loosely
structured data – often incomplete & inaccessible:
• Petabytes/Exabytes of data,
• Millions/billions/trillions of records,
• Loosely-structured, distributed data,
• Flat schemas with complex interrelationships,
• Coming from diverse sources,
• Social networks,
• Sensor networks,
• Servers (files, logs, chats, video),
• etc.,
• Often involving time-stamped events,
• Applications (Transactional or Analytical)
Big Data—Characteristics
Fourth ‘v’: Validity = data quality & integration connected to
collaborate data governance.
Fifth ‘v’: Veracity = data integrity & the ability for an organization to
trust the data and be able to confidently use it to make crucial
decisions
Big Data—Characteristics
Vint 2012
Big Data top requirements
Big Data project challenges
Big Data project difficulties
The dark side of Big Data
The dark side of Big Data
Big Data a priority??
Main management
questions on big data:
1. Where should we store our
data?
2. How are we going to protect
our data?
3. How are we going to use our
data safely & lawfully?
Core element on big data:
The full life cycle
of information
needs to be
considered!
Big data perception issue:
Addressing 

big data risk & concerns 

can NOT be seen
exclusively 

as an IT exercise!
Key elements to take into
account with Big Data
1. Data Quality: shift from “quest for perfect data” to
“fit for use data”
●Add practicality
●Reduce time, cost and effort
2. Data Volume: shift from “shiny object syndrome”
to “managed analytics”
3. Project Budgets: shift from “business
determining needs” to “business & IT working
together”
4. User Proficiency & Knowledge Transfer: shift
from “specialist expert analytics know best” to 

“business using tools & experts”
Data Quality Sub-dimensions
WEF 2012
Key risk with Big Data:
privacy & security
Privacy-related laws must be considered for Big Data
projects. Responsibility for applying data privacy & security
techniques falls on the individual capturing, using data &
performing analysis: determine & document how data privacy
& security issues will be addressed prior to a Big Data project.
1. What is the goal of the Big Data project?
2. How will this data be used? Anyone who will access & hold this data
during analysis must adhere to appropriate data governance standards.
3. Who will be able to access, review and analyze this data? Which roles &
responsibilities of users within organization will have access to personal
& sensitive information.
4. How will this data be secured to prevent unauthorized access?
5. How will this data be updated?
Source: COBIT® 5, figure 15. © 2012 ISACA® All rights reserved.
Principles, policies &
Information
Processes
Corporate governance : ERM = COSO
Organisational structure
Services, Infrastructure,
Culture, Ethics,
Behaviour
People, Skills, Competencie
Big data control
categories:
1. Approach &
Understanding
2. Quality & Integrity
3. Confidentiality & privacy
4. Availability
Top 10 types of Big Data
Analytical Usage
Role of Internal Audit in
Managing Big Data
Check the extent of data assets and deep dive into what all is available. Data that is redundant or
unimportant may be identified and reduced.
To manage data holdings effectively, an organization must first be aware of the location, condition and
value of its research assets. Conducting a data audit provides this information, raising awareness of
collection strengths and identifying weaknesses in data policies and management procedures.
The benefits of conducting an audit for managing big data
effectively are:
Monitor holdings and avoid big data leaks. Data hacking, social engineering and data leaks are all
concepts that plague a company – an audit can help a company identify areas where there is a
possibility of leakage.
Manage risks associated with big data loss and irretrievability. Data which is not structured and is
lying untouched may never be retrieved; an audit can help identify such cases.
Develop a big data strategy and implement robust big data policies. Big data requires robust
management and proper structurization.
Improve workflows and benefit from efficiency savings. Check where there are complex and time-
consuming workflows and where there is a scope of improving efficiencies.
Realize the value of big data through improved access and reuse to check if there are areas that
have not been used in a while.
Source: http://www.data-audit.eu/docs/DAF_briefing_paper.pdf
Complex Big Data
Big Data Security
Big Data
Accessibility
Big Data
Quality
Big Data
Understanding
Managing Big Data
through Internal Audit
Most companies collect large volumes of data but they do not have comprehensive
approaches for centralizing the information. Internal audit can help companies
manage big data by streamlining and collating data effectively.
Issues of big data that internal audit can help mitigate:
Maintaining effective data security is increasingly recognized as a critical risk area for
organizations. Loss of control over data security can have severe ramifications for an
organization, including regulatory penalties, loss of reputation, and damage to
business operations and profitability. Auditing can help organizations secure and
control data collected.
Giving access to big data to the right person at the right time is another challenge
organizations face. Segregation of Duties (SoD) is an important aspect that can be
checked by an IA.
The more data one accumulates, the harder it is to keep everything consistent and
correct. Internal audit can check the quality of big data.
Understanding and interpretation of big data remains one of the primary concerns for
many organizations. Auditors can effectively simplify an organization’s data
effectively.
Source: http://www.acl.com/pdfs/wp_AA_Best_Practices.pdf, http://
smartdatacollective.com/brett-stupakevich/48184/4-biggest-problems-big-data
Conclusions
Big Data
! Big data = valuable asset & powerful tool with
far reaching impacts. Big data initiatives need to
have visibility at board level & executive level
sponsors.
! Success of enterprises will depend on how they
meet & deal with big data challenges & impacts.
! To harness value & deliver resilient and faster
analytic solutions, enterprises must implement
big data solutions using repeatable frameworks
& processes coupled with good governance &
risk management framework.
Any organization’s data = one of most valuable assets.
Without a way to obtain, cleanse, organize and evaluate its
data, an organization is left with a vast, chaotic pool of 0 & 1.
Big Data results can be used to:
◦ improve business efficiencies;
◦ verify process effectiveness;
◦ identify areas of key risk, fraud, errors or misuse;
◦ influence business decisions.
Maximum benefits from Big Data can be achieved for any
organization if:
◦ the approach is aligned to the business,
◦ the (privacy & security) risks are managed,
◦ the process is effectively planned, designed, implemented,
tested and governed.
Big Data
“Even with infinite knowledge of past behaviour,
we often won’t have enough information to make
meaningful predictions about the future. 

In fact, the more data we have, the more false
confidence we will have… 

The important part is to understand what our
limits are and to use the best possible science to
fill in the gaps. All the data in the world will never
achieve that goal for us.”
Peter Fader, co-director of the Wharton Customer
Analytics Initiative at the University of Pennsylvania
and Professor Marketing at Penn’s Wharton School
of Business in MIT’s Technology Review, May 2012
http://www.technologyreview.com/news/427786/is-there-big-money-in-big-data/
Marc Vael

President
ISACA
http://www.isaca.be/
For more information…
marc@vael.net
http://www.linkedin.com/in/marcvael
@marcvael
www.isaca.org/knowledgecenter
61
Big Data Governance questions
1. What principles, policies and frameworks are we
going to establish to support the achievement of
business strategy through big data?
2. Can we trust our sources of big data?
3. What structures and skills do we have to govern and
manage IT?
4. What structures and skills do we have to govern big
data privacy?
5. Do we have the right tools to meet our big data
privacy requirements?
Big Data Governance questions
6. How do we verify the authenticity of the data?
7. Can we verify how the information will be used?
8. What decision options do we have regarding big data
privacy?
9. What is the context for each decision?
10. Can we simulate the decisions and understand the
consequences?
11. Will we record the consequences and use that
information to improve our big data information gathering,
context, analysis and decision-making processes?
Big Data Governance questions
12. How will we protect our sources, our processes and
our decisions from theft and corruption?
13. Are we exploiting the insights we get from big data?
14. What information are we collecting without exposing
the enterprise to legal and regulatory battles?
15. What actions are we taking that create trends that
can be exploited by our rivals?
16. What policies are in place to ensure that employees
keep stakeholder information confidential during and
after employment?
Big Data Governance potential answers
! Senior management buy-in and evidence of continuous
commitment
! Data anonymization/sanitization or de-identification
! Adequate, relevant, useful and current big data privacy
policies, processes, procedures and supporting structures
! Appropriate data destruction, comprehensive data
management policy, clearly defined disposal ownership and
accountability
! Compliance with legal and regulatory data requirements
! Continuous education and training of big data policies,
processes and procedures
Big data control category: 

Approach & Understanding
! “Right tone at the top”.
! Data policy.
! Inventory of all data sources
! Identify vulnerabilities in the data flow including internal &
external data sources, automated & manual processes.
! Data deficiency governance process for analysis of impact
and probability, escalation to senior management where
necessary, and a strategic or tactical resolution.
! Each vulnerability needs a data owner.
! Materiality criteria to identify most relevant data sets.
! Escalation path for data deficiency management.
Big data control category: 

Confidentiality / Privacy
! Through the data risk management process, all sensitive data
should be identified and appropriate controls put in place.
Rules & regulations govern how sensitive data should be
secured in storage & transit.
! Logical & physical access security controls are needed to
prevent unauthorized access to sensitive data. This includes
classic IT General Controls (password settings, masking or partially
masking sensitive data, periodic user access review, firewalls, server room door
security, server access logs, administrative access privileges and screen saver
lockout.)
! Encryption technologies must be used to store & transfer
highly sensitive information within + outside the enterprise.
Big data control category: 

Quality
! Assess data against accuracy, reliability, completeness and
timeliness criteria defined in the data policy & associated
standards.
! Data sourced from third party: contractually bound process to
gain confidence over data quality through an independent
validation of data quality controls at the third party or through
independent checks on any material data received.
! Ownership & responsibilities associated with each material
data set should be assigned. Appropriate training should be
rolled out to all relevant personnel to make them aware of their
data-related responsibilities.
Big data control category: 

Availability
! Reliable (tested) disaster recovery arrangements should be
in place to ensure that data are available in accordance with
◦ data recovery point objective (RPO) criteria and
◦ recovery time objective (RTO) criteria
defined in a business impact analysis (BIA).
Assurance considerations with Big Data
By using the same risk-based approach used to determine
the audit schedule, potential target areas may be identified in
following areas:
1. Determine operational effectiveness of the current control
environment.
2. Determine effectiveness of anti-fraud procedures &
controls.
3. Identify business process errors.
4. Identify business process improvements & inefficiencies in
the control environment.
5. Identify exceptions or unusual business rules.
6. Identify fraud.
7. Identify areas where poor data quality exists.

More Related Content

What's hot

Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightSymantec
 
The Five Pillars of Data Governance 2.0 Success
The Five Pillars of Data Governance 2.0 SuccessThe Five Pillars of Data Governance 2.0 Success
The Five Pillars of Data Governance 2.0 SuccessDATAVERSITY
 
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyHow to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyDATAVERSITY
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
 
Starting data governance
Starting data governance Starting data governance
Starting data governance Kate Carruthers
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
Evtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2hEvtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2hNadia Smith
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareEnterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareDATA360US
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianDoreen Christian
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceDATAVERSITY
 
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...Laura Edell
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progressKate Carruthers
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessRich Medina
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 

What's hot (19)

Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
The Five Pillars of Data Governance 2.0 Success
The Five Pillars of Data Governance 2.0 SuccessThe Five Pillars of Data Governance 2.0 Success
The Five Pillars of Data Governance 2.0 Success
 
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyHow to Integrate Data and Protect Privacy
How to Integrate Data and Protect Privacy
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
Starting data governance
Starting data governance Starting data governance
Starting data governance
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Evtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2hEvtm 281 07_bi2015_infographic_r2h
Evtm 281 07_bi2015_infographic_r2h
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareEnterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for Healthcare
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and Compliance
 
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation Readiness
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 

Similar to The value of big data analytics

Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
 
Group 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptxGroup 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptxNATASHABANO
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceIBM Software India
 
big data.pptx
big data.pptxbig data.pptx
big data.pptxVirajSaud
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Introduction to visualizing Big Data
Introduction to visualizing Big DataIntroduction to visualizing Big Data
Introduction to visualizing Big DataDawit Nida
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxsalutiontechnology
 
Big Data - Bridging Technology and Humans
Big Data - Bridging Technology and HumansBig Data - Bridging Technology and Humans
Big Data - Bridging Technology and HumansMark Laurance
 
What Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdfWhat Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdfMr. Business Magazine
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentCaserta
 
Data Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & ApproachesData Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & ApproachesDATAVERSITY
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Vishal Bamba
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, securityRoman Chanclor
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Big Data and Goverment Analytics
Big Data and Goverment AnalyticsBig Data and Goverment Analytics
Big Data and Goverment AnalyticsKhaled Ghadban
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfSoumodeep Nanee Kundu
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceDATAVERSITY
 
Accenture big-data
Accenture big-dataAccenture big-data
Accenture big-dataPlanimedia
 

Similar to The value of big data analytics (20)

Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Group 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptxGroup 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptx
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidence
 
big data.pptx
big data.pptxbig data.pptx
big data.pptx
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Introduction to visualizing Big Data
Introduction to visualizing Big DataIntroduction to visualizing Big Data
Introduction to visualizing Big Data
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptx
 
Big Data - Bridging Technology and Humans
Big Data - Bridging Technology and HumansBig Data - Bridging Technology and Humans
Big Data - Bridging Technology and Humans
 
What Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdfWhat Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdf
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business Environment
 
Data Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & ApproachesData Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & Approaches
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
 
ch02.pdf
ch02.pdfch02.pdf
ch02.pdf
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
Big data security
Big data securityBig data security
Big data security
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Big Data and Goverment Analytics
Big Data and Goverment AnalyticsBig Data and Goverment Analytics
Big Data and Goverment Analytics
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data Governance
 
Accenture big-data
Accenture big-dataAccenture big-data
Accenture big-data
 

More from Marc Vael

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as cisoMarc Vael
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersMarc Vael
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationMarc Vael
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?Marc Vael
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controlsMarc Vael
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrimeMarc Vael
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeMarc Vael
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)Marc Vael
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutMarc Vael
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security todayMarc Vael
 

More from Marc Vael (20)

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 

Recently uploaded

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 

Recently uploaded (20)

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 

The value of big data analytics

  • 1. The Value from Big Data Analytics
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11. A Boeing 747 generates 30 TB of data in 1 flight
  • 12.
  • 13.
  • 17.
  • 18.
  • 19.
  • 20. Big Data—Characteristics Very large, distributed aggregations of loosely structured data – often incomplete & inaccessible: • Petabytes/Exabytes of data, • Millions/billions/trillions of records, • Loosely-structured, distributed data, • Flat schemas with complex interrelationships, • Coming from diverse sources, • Social networks, • Sensor networks, • Servers (files, logs, chats, video), • etc., • Often involving time-stamped events, • Applications (Transactional or Analytical)
  • 22. Fourth ‘v’: Validity = data quality & integration connected to collaborate data governance. Fifth ‘v’: Veracity = data integrity & the ability for an organization to trust the data and be able to confidently use it to make crucial decisions Big Data—Characteristics
  • 23.
  • 24.
  • 26.
  • 27. Big Data top requirements
  • 28. Big Data project challenges
  • 29. Big Data project difficulties
  • 30. The dark side of Big Data
  • 31. The dark side of Big Data
  • 32. Big Data a priority??
  • 33. Main management questions on big data: 1. Where should we store our data? 2. How are we going to protect our data? 3. How are we going to use our data safely & lawfully?
  • 34. Core element on big data: The full life cycle of information needs to be considered!
  • 35. Big data perception issue: Addressing 
 big data risk & concerns 
 can NOT be seen exclusively 
 as an IT exercise!
  • 36. Key elements to take into account with Big Data 1. Data Quality: shift from “quest for perfect data” to “fit for use data” ●Add practicality ●Reduce time, cost and effort 2. Data Volume: shift from “shiny object syndrome” to “managed analytics” 3. Project Budgets: shift from “business determining needs” to “business & IT working together” 4. User Proficiency & Knowledge Transfer: shift from “specialist expert analytics know best” to 
 “business using tools & experts”
  • 39. Key risk with Big Data: privacy & security Privacy-related laws must be considered for Big Data projects. Responsibility for applying data privacy & security techniques falls on the individual capturing, using data & performing analysis: determine & document how data privacy & security issues will be addressed prior to a Big Data project. 1. What is the goal of the Big Data project? 2. How will this data be used? Anyone who will access & hold this data during analysis must adhere to appropriate data governance standards. 3. Who will be able to access, review and analyze this data? Which roles & responsibilities of users within organization will have access to personal & sensitive information. 4. How will this data be secured to prevent unauthorized access? 5. How will this data be updated?
  • 40. Source: COBIT® 5, figure 15. © 2012 ISACA® All rights reserved.
  • 41.
  • 45. Corporate governance : ERM = COSO Organisational structure
  • 49.
  • 50. Big data control categories: 1. Approach & Understanding 2. Quality & Integrity 3. Confidentiality & privacy 4. Availability
  • 51. Top 10 types of Big Data Analytical Usage
  • 52. Role of Internal Audit in Managing Big Data Check the extent of data assets and deep dive into what all is available. Data that is redundant or unimportant may be identified and reduced. To manage data holdings effectively, an organization must first be aware of the location, condition and value of its research assets. Conducting a data audit provides this information, raising awareness of collection strengths and identifying weaknesses in data policies and management procedures. The benefits of conducting an audit for managing big data effectively are: Monitor holdings and avoid big data leaks. Data hacking, social engineering and data leaks are all concepts that plague a company – an audit can help a company identify areas where there is a possibility of leakage. Manage risks associated with big data loss and irretrievability. Data which is not structured and is lying untouched may never be retrieved; an audit can help identify such cases. Develop a big data strategy and implement robust big data policies. Big data requires robust management and proper structurization. Improve workflows and benefit from efficiency savings. Check where there are complex and time- consuming workflows and where there is a scope of improving efficiencies. Realize the value of big data through improved access and reuse to check if there are areas that have not been used in a while. Source: http://www.data-audit.eu/docs/DAF_briefing_paper.pdf
  • 53. Complex Big Data Big Data Security Big Data Accessibility Big Data Quality Big Data Understanding Managing Big Data through Internal Audit Most companies collect large volumes of data but they do not have comprehensive approaches for centralizing the information. Internal audit can help companies manage big data by streamlining and collating data effectively. Issues of big data that internal audit can help mitigate: Maintaining effective data security is increasingly recognized as a critical risk area for organizations. Loss of control over data security can have severe ramifications for an organization, including regulatory penalties, loss of reputation, and damage to business operations and profitability. Auditing can help organizations secure and control data collected. Giving access to big data to the right person at the right time is another challenge organizations face. Segregation of Duties (SoD) is an important aspect that can be checked by an IA. The more data one accumulates, the harder it is to keep everything consistent and correct. Internal audit can check the quality of big data. Understanding and interpretation of big data remains one of the primary concerns for many organizations. Auditors can effectively simplify an organization’s data effectively. Source: http://www.acl.com/pdfs/wp_AA_Best_Practices.pdf, http:// smartdatacollective.com/brett-stupakevich/48184/4-biggest-problems-big-data
  • 55. Big Data ! Big data = valuable asset & powerful tool with far reaching impacts. Big data initiatives need to have visibility at board level & executive level sponsors. ! Success of enterprises will depend on how they meet & deal with big data challenges & impacts. ! To harness value & deliver resilient and faster analytic solutions, enterprises must implement big data solutions using repeatable frameworks & processes coupled with good governance & risk management framework.
  • 56. Any organization’s data = one of most valuable assets. Without a way to obtain, cleanse, organize and evaluate its data, an organization is left with a vast, chaotic pool of 0 & 1. Big Data results can be used to: ◦ improve business efficiencies; ◦ verify process effectiveness; ◦ identify areas of key risk, fraud, errors or misuse; ◦ influence business decisions. Maximum benefits from Big Data can be achieved for any organization if: ◦ the approach is aligned to the business, ◦ the (privacy & security) risks are managed, ◦ the process is effectively planned, designed, implemented, tested and governed. Big Data
  • 57. “Even with infinite knowledge of past behaviour, we often won’t have enough information to make meaningful predictions about the future. 
 In fact, the more data we have, the more false confidence we will have… 
 The important part is to understand what our limits are and to use the best possible science to fill in the gaps. All the data in the world will never achieve that goal for us.” Peter Fader, co-director of the Wharton Customer Analytics Initiative at the University of Pennsylvania and Professor Marketing at Penn’s Wharton School of Business in MIT’s Technology Review, May 2012 http://www.technologyreview.com/news/427786/is-there-big-money-in-big-data/
  • 58.
  • 59. Marc Vael
 President ISACA http://www.isaca.be/ For more information… marc@vael.net http://www.linkedin.com/in/marcvael @marcvael
  • 61. 61
  • 62. Big Data Governance questions 1. What principles, policies and frameworks are we going to establish to support the achievement of business strategy through big data? 2. Can we trust our sources of big data? 3. What structures and skills do we have to govern and manage IT? 4. What structures and skills do we have to govern big data privacy? 5. Do we have the right tools to meet our big data privacy requirements?
  • 63. Big Data Governance questions 6. How do we verify the authenticity of the data? 7. Can we verify how the information will be used? 8. What decision options do we have regarding big data privacy? 9. What is the context for each decision? 10. Can we simulate the decisions and understand the consequences? 11. Will we record the consequences and use that information to improve our big data information gathering, context, analysis and decision-making processes?
  • 64. Big Data Governance questions 12. How will we protect our sources, our processes and our decisions from theft and corruption? 13. Are we exploiting the insights we get from big data? 14. What information are we collecting without exposing the enterprise to legal and regulatory battles? 15. What actions are we taking that create trends that can be exploited by our rivals? 16. What policies are in place to ensure that employees keep stakeholder information confidential during and after employment?
  • 65. Big Data Governance potential answers ! Senior management buy-in and evidence of continuous commitment ! Data anonymization/sanitization or de-identification ! Adequate, relevant, useful and current big data privacy policies, processes, procedures and supporting structures ! Appropriate data destruction, comprehensive data management policy, clearly defined disposal ownership and accountability ! Compliance with legal and regulatory data requirements ! Continuous education and training of big data policies, processes and procedures
  • 66. Big data control category: 
 Approach & Understanding ! “Right tone at the top”. ! Data policy. ! Inventory of all data sources ! Identify vulnerabilities in the data flow including internal & external data sources, automated & manual processes. ! Data deficiency governance process for analysis of impact and probability, escalation to senior management where necessary, and a strategic or tactical resolution. ! Each vulnerability needs a data owner. ! Materiality criteria to identify most relevant data sets. ! Escalation path for data deficiency management.
  • 67. Big data control category: 
 Confidentiality / Privacy ! Through the data risk management process, all sensitive data should be identified and appropriate controls put in place. Rules & regulations govern how sensitive data should be secured in storage & transit. ! Logical & physical access security controls are needed to prevent unauthorized access to sensitive data. This includes classic IT General Controls (password settings, masking or partially masking sensitive data, periodic user access review, firewalls, server room door security, server access logs, administrative access privileges and screen saver lockout.) ! Encryption technologies must be used to store & transfer highly sensitive information within + outside the enterprise.
  • 68. Big data control category: 
 Quality ! Assess data against accuracy, reliability, completeness and timeliness criteria defined in the data policy & associated standards. ! Data sourced from third party: contractually bound process to gain confidence over data quality through an independent validation of data quality controls at the third party or through independent checks on any material data received. ! Ownership & responsibilities associated with each material data set should be assigned. Appropriate training should be rolled out to all relevant personnel to make them aware of their data-related responsibilities.
  • 69. Big data control category: 
 Availability ! Reliable (tested) disaster recovery arrangements should be in place to ensure that data are available in accordance with ◦ data recovery point objective (RPO) criteria and ◦ recovery time objective (RTO) criteria defined in a business impact analysis (BIA).
  • 70. Assurance considerations with Big Data By using the same risk-based approach used to determine the audit schedule, potential target areas may be identified in following areas: 1. Determine operational effectiveness of the current control environment. 2. Determine effectiveness of anti-fraud procedures & controls. 3. Identify business process errors. 4. Identify business process improvements & inefficiencies in the control environment. 5. Identify exceptions or unusual business rules. 6. Identify fraud. 7. Identify areas where poor data quality exists.