SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Managing Enterprise Information Effectively Andrew Warland
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The digital world ,[object Object],[object Object],[object Object],[object Object]
Metadata ,[object Object],[object Object],[object Object],[object Object],[object Object]
Search ,[object Object],[object Object]
Retention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Compliance ,[object Object],[object Object],[object Object],[object Object]
Engagement ,[object Object],[object Object],[object Object],[object Object],[object Object]
Success factors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
David J Rosenthal
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Cheryl Goldberg
 
Cyber-Liability for Healthcare Providers Marketing Piece
Cyber-Liability for Healthcare Providers Marketing PieceCyber-Liability for Healthcare Providers Marketing Piece
Cyber-Liability for Healthcare Providers Marketing Piece
Chandler Waldis
 

Was ist angesagt? (19)

GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365
 
Effective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locationsEffective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locations
 
What is GDPR Data Flow Mapping
What is GDPR Data Flow MappingWhat is GDPR Data Flow Mapping
What is GDPR Data Flow Mapping
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
Lexis Diligence overview
Lexis Diligence overview Lexis Diligence overview
Lexis Diligence overview
 
Needtoknow
NeedtoknowNeedtoknow
Needtoknow
 
Tomorrow's IT Professional
Tomorrow's IT ProfessionalTomorrow's IT Professional
Tomorrow's IT Professional
 
Webinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPRWebinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPR
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
SOLIX - Empowering Data Management
SOLIX - Empowering Data ManagementSOLIX - Empowering Data Management
SOLIX - Empowering Data Management
 
iKnow Solutions Laura Eisenhardt
iKnow Solutions Laura EisenhardtiKnow Solutions Laura Eisenhardt
iKnow Solutions Laura Eisenhardt
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Securing your Event Data
Securing your Event DataSecuring your Event Data
Securing your Event Data
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit Sagoo
 
Cyber-Liability for Healthcare Providers Marketing Piece
Cyber-Liability for Healthcare Providers Marketing PieceCyber-Liability for Healthcare Providers Marketing Piece
Cyber-Liability for Healthcare Providers Marketing Piece
 

Ähnlich wie Andrew Warland

Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Joe Orlando
 

Ähnlich wie Andrew Warland (20)

How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
BRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEBBRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEB
 
Governing the Chaos
Governing the ChaosGoverning the Chaos
Governing the Chaos
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Accelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based CareAccelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based Care
 
Conni Christensen - Automating Information Governance: What's Holding Us Back...
Conni Christensen - Automating Information Governance: What's Holding Us Back...Conni Christensen - Automating Information Governance: What's Holding Us Back...
Conni Christensen - Automating Information Governance: What's Holding Us Back...
 
Enterprise Data Management Enables Unique Device Identification (UDI)
Enterprise Data Management Enables Unique Device Identification (UDI)Enterprise Data Management Enables Unique Device Identification (UDI)
Enterprise Data Management Enables Unique Device Identification (UDI)
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 

Mehr von Ark Group Australia Pty Ltd

Games for the Australian Government
Games for the Australian GovernmentGames for the Australian Government
Games for the Australian Government
Ark Group Australia Pty Ltd
 
Content Creation and the Australian Public Sector - one day only in Canberra
Content Creation and the Australian Public Sector - one day only in CanberraContent Creation and the Australian Public Sector - one day only in Canberra
Content Creation and the Australian Public Sector - one day only in Canberra
Ark Group Australia Pty Ltd
 
The Essential Toolkit for Your: EDRM Renovation Australia 2017
The Essential Toolkit for Your: EDRM Renovation Australia 2017  The Essential Toolkit for Your: EDRM Renovation Australia 2017
The Essential Toolkit for Your: EDRM Renovation Australia 2017
Ark Group Australia Pty Ltd
 
Intranet Change
Intranet ChangeIntranet Change
The Australian Government Online Learning Toolkit
The Australian Government Online Learning ToolkitThe Australian Government Online Learning Toolkit
The Australian Government Online Learning Toolkit
Ark Group Australia Pty Ltd
 
Improving Performance Through Business Process Management
Improving Performance Through Business Process ManagementImproving Performance Through Business Process Management
Improving Performance Through Business Process Management
Ark Group Australia Pty Ltd
 
Creative Knowledge Retention - A Two-Day Knowledge Huddle
Creative Knowledge Retention - A Two-Day Knowledge HuddleCreative Knowledge Retention - A Two-Day Knowledge Huddle
Creative Knowledge Retention - A Two-Day Knowledge Huddle
Ark Group Australia Pty Ltd
 
KM Australia 2012 Congress
KM Australia 2012 CongressKM Australia 2012 Congress
KM Australia 2012 Congress
Ark Group Australia Pty Ltd
 

Mehr von Ark Group Australia Pty Ltd (20)

Games for the Australian Government
Games for the Australian GovernmentGames for the Australian Government
Games for the Australian Government
 
Content Creation and the Australian Public Sector - one day only in Canberra
Content Creation and the Australian Public Sector - one day only in CanberraContent Creation and the Australian Public Sector - one day only in Canberra
Content Creation and the Australian Public Sector - one day only in Canberra
 
The Essential Toolkit for Your: EDRM Renovation Australia 2017
The Essential Toolkit for Your: EDRM Renovation Australia 2017  The Essential Toolkit for Your: EDRM Renovation Australia 2017
The Essential Toolkit for Your: EDRM Renovation Australia 2017
 
The Wheels of Knowledge Management in Australia: Bill Kaplan and Zach Wahl
The Wheels of Knowledge Management in Australia: Bill Kaplan and Zach WahlThe Wheels of Knowledge Management in Australia: Bill Kaplan and Zach Wahl
The Wheels of Knowledge Management in Australia: Bill Kaplan and Zach Wahl
 
And Now for Something Completely Different: Change Management for the Austral...
And Now for Something Completely Different: Change Management for the Austral...And Now for Something Completely Different: Change Management for the Austral...
And Now for Something Completely Different: Change Management for the Austral...
 
Knowledge Management Australia 2016
Knowledge Management Australia 2016Knowledge Management Australia 2016
Knowledge Management Australia 2016
 
Marketing and the Australian Public Sector 2016
Marketing and the Australian Public Sector 2016Marketing and the Australian Public Sector 2016
Marketing and the Australian Public Sector 2016
 
Knowledge Management Australia 2015: The Discovery and Re-Discovery of Knowledge
Knowledge Management Australia 2015: The Discovery and Re-Discovery of KnowledgeKnowledge Management Australia 2015: The Discovery and Re-Discovery of Knowledge
Knowledge Management Australia 2015: The Discovery and Re-Discovery of Knowledge
 
Intranet Change
Intranet ChangeIntranet Change
Intranet Change
 
Threats and Legal Issues in Social Media
Threats and Legal Issues in Social MediaThreats and Legal Issues in Social Media
Threats and Legal Issues in Social Media
 
Transforming Your Library
Transforming Your LibraryTransforming Your Library
Transforming Your Library
 
The Australian Government Online Learning Toolkit
The Australian Government Online Learning ToolkitThe Australian Government Online Learning Toolkit
The Australian Government Online Learning Toolkit
 
Knowledge Management Australia 2013
Knowledge Management Australia 2013Knowledge Management Australia 2013
Knowledge Management Australia 2013
 
Getting to the point through Internal Communication
Getting to the point through Internal CommunicationGetting to the point through Internal Communication
Getting to the point through Internal Communication
 
Improving Performance Through Business Process Management
Improving Performance Through Business Process ManagementImproving Performance Through Business Process Management
Improving Performance Through Business Process Management
 
The Everyday Intranet
The Everyday Intranet The Everyday Intranet
The Everyday Intranet
 
E025intranets web
E025intranets webE025intranets web
E025intranets web
 
Creative Knowledge Retention - A Two-Day Knowledge Huddle
Creative Knowledge Retention - A Two-Day Knowledge HuddleCreative Knowledge Retention - A Two-Day Knowledge Huddle
Creative Knowledge Retention - A Two-Day Knowledge Huddle
 
KM Australia 2012 Congress
KM Australia 2012 CongressKM Australia 2012 Congress
KM Australia 2012 Congress
 
Leading the way in Internal Communication
Leading the way in Internal CommunicationLeading the way in Internal Communication
Leading the way in Internal Communication
 

Andrew Warland

Hinweis der Redaktion

  1. The nature and size of the problem of electronically stored information (ESI): the digital explosion.
  2. The nature and size of the problem of electronically stored information (ESI): the digital explosion.
  3. Metadata
  4. Search
  5. Applying retention and disposal policies to ESI
  6. Ensuring compliance.
  7. Getting Engaged
  8. Getting Engaged
  9. Ensuring engagement IT, IM/RM, Legal, Key users