The Data Governance Watershed
“You’ve been breached!” These are words none of us want to hear, but the situation is almost inevitable. When the breach does occur, will your data governance structure help to protect you? Many organisations are at a data governance watershed, somewhere between having systems and processes in place and actually being effective.
What is your opinion of this statement – ‘While many organisations have implemented technology, process and policies, to support data governance, most are not sure it’s effective?’
For me, some of the key issues, in terms of data governance and privacy are;
- We are now more heavily regulated than ever before
- There is a strong public expectation of privacy
- A data breach will happen at some point
- We are not sure what data we store
- We are not sure where the data is stored
- We are not sure who is touching the data
- We not sure what they’re doing with the data
Technology Investment
It is very common for organisations to have invested in technology to comply with regulatory or privacy requirements, but have not leveraged its full value of the technology. It is crucial to ensure technology is utilised effectively and integrated with business process to provide maximum protection with minimum business impact. We commonly see technology such as the following underutilised;
- Office 365
- Microsoft Information Protection (MIP)
- Azure Information Protection (AIP)
- Data classification, discovery and tracking technology
What Should My Key Objectives Look Like?
The key objectives to protect your organisation should include;
- Provision of accurate visibility of the data landscape
- Leveraging the maximum from existing technologies
- Understanding your risk
- Reducing the sensitive data footprint
- Driving a positive change in the organisational culture
Contact the Author
Christopher McNaughton
Director | SECMON1
EM christopher.mcnaughton@secmon1.com
PH 1300 410900
www.SECMON1.com
The Rialto, 525 Collins St. Melbourne
Don’t Become a Victim of Cyber Crime
The Impacts of a Cyber Attack In your personal li ...