SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
© Wildhaber Consulting, Zürich 2014
The 10 Biggest Threats to
your Information (caused by
yourself, the CEO)
by Bruno Wildhaber
Fulll article
1
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat #1. Give Data away (to Siren Servers)
2
• What's a Siren server? Read Jaron Lanier's "Who own's the
Future?". This is a must read for everybody who thinks their
business model isn't endangered by Google & Co.
• Google and other big servers try to get your data.
• This is a market and the Siren servers will try to control personal
data, e.g. your business model will rely on data which is not under
your control (see Threat #7).
• If information represents value, value can be shared. If somebody
controls the data for 3D printing, the whole replacement part
business will die, not because of the ability to print the part, but
because somebody loaded this data onto a Siren server.
• This is the same development or fate which the music industry
went through.
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 2. Don't know where your Data is stored
• By sourcing to the cloud, you are loosing control over your
data.
• Most cloud services enforce rule which allow them to control
your data.
• Even if you have a 100page contract, your data is gone.
• You think you have an SAP shop and there is no danger to
you? Don’t be sure, because tools like Dropbox, Box or
Sharepoint will happy to hold lots of your valuable data.
Your employees will do this if you don't set up a good
Governance system (see Threat #8).
3
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 3. Don't know the Quality of Data (IT)
• Most information and data we base our decisions upon, are
junk.
• In the time of outsourcing and the cloud, the control aspects
shift from controlling your IT to controlling Information.
• Data Quality is a key success factor for all information
based business cases and to fullfil compliance requirements.
• IT Governance is still a very important discipline, which is
almost as much neglected as Information Governance, but
helps improving the quality of your data.
4
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 4. Don't define Metadata
• Metadata will stay, because data about data will be
required to organize information chaos.
• Taxonomies help to understand your business and help you
defining the right rules.
• You don't need retention lists if you start a business, but you
need to understand which data, knowledge and value are
kept in your organization.
• Sematic , intelligent search et. al. won‘t solve these issues.
They will support, but cannot replace structure.
5
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 5. Approach Information Governance Top Down
• Live has been swarmed from the swamps and invaded our
world from the oceans (Creationists pls ignore this part).
• The best business plan doesn't work if the basic idea isn't
strong enough and provides sufficient results (however, it‘s
good to have a plan).
• So why should we try to implement such an abstract topic as
"Information Governance" or "Information Management"
from the top if even the brightest minds in our organization
don't understand the meaning of it?
• So, go and start from the bottom, implement that social
media channel or archiving solution and work your way up.
6
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 6. Ignore Information as a Production Factor
• Information is a production factor and its importance
depends on the way your business model works.
• The value of information: Yes, you don't know it (most of the
times). There are only rare occasions where the value of
information can be calculated.
• UNDERSTAND the value, don‘t calculate.
• It will be crucial that you understand that any strategic
initiative you will undertake has an information component.
7
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 7. Ignore Data Privacy
• Data privacy or better personal privacy is an important
issue which is currently neglected by most users and
companies.
• Only totalitarian regimes (or the NSA) are in control of your
private information.
• If organizations are building business models using "free"
personal data, this might become a big problem. Sooner or
later, the value of personal data will rise.
• If governments will put more pressure on Siren servers (and
this will happen), your business advantage might disappear
from one moment to the other.
8
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 8. Don't involve the User
• Yes the ECM industry has capitulated from the user. They try
to convince customers that the "0 click" solution will work
and people must not be involved as part of the information
classification function.
• This is NONSENSE. You need to follow a minimal standard,
otherwise you will be replaced by a robot. Because robots
don't make mistakes.
• If people are free to decide what they do with your
company data, you can fire your management. Because if
people don't have to follow rules, they won't need to be
managed.
9
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 9. Put all your money into Data Security
• Data security is the field which has attracted billions of
dollars in the last 20 years. Most of it has been wasted.
• Companies should have focused on information valuation,
focusing security initiatives on valuable information only.
• Instead, tons of expensive medicine were thrown at minor
or irrelevant symptoms. What's the reason for this
behavior? Simple, if you don't know the diagnosis you take
some broadband medicaments. Or as my grandfather used
to say: "With medicine, your flu will be over in 7 days,
without .. in a week." (and the pharma industry prefers the
first solution).
• So rethink your security strategy, cut the budget by half and
spend this money on Information Governance. T
10
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 2014
Threat # 10. Treat Information as a Technology issue
• Everybody understands that information is valuable.
• However, many decision makers treat informations as it
would be sold in tins or as Spam (oh yes..).
• But Information Management is a traditional business, It has
been done by businesses long before IT was invented - and
it will still exist by the time nobody remembers the meaning
of "IT".
• Information must be treated as one of your most vital
production factors. It is important to keep it to yourself
unless there is a business case in giving it away.
• Data means power, if handed out, it’s gone.
11
Montag, 12. Mai 14
© Wildhaber Consulting, Zürich 201312
Dr. iur. Bruno Wildhaber
CIP / CISA / CISM / CGEIT
Wildhaber Consulting
CH 8301 Glattzentrum / Switzerland
Tel. +41 44 826 21 21
www.wildhaber.com
info@wildhaber.com
Wildhaber Consulting was founded in 1999 and offers consulting services to middle and large private organizations:
•Core Competence &Value Offering:
•Coaching non-tech executives leading complex I-governance programs.
•Strategic support for companies in the Information Governance and Information Security space.
•Lead and coach Information Governance initiatives such as Records Management, ECM, Electronic Archiving, Information
Security Management, IT Governance.
Wildhaber Consulting operates with a network of highly skilled experts and senior consultants based in Switzerland,
Europe and from the US.
The Kompetenzzentrum Records Management (KRM) is a platform for exchanging expert knowledge around the topic of
Electronic Archiving, Records and Information Management.As a member of the expert group revising the Swiss regulation
on retention, the competence centre published a practice handbook for practitioners and users, which became the de-
facto standard for RM in Switzerland and will be re-published in its 3rd edition.
Montag, 12. Mai 14

Weitere ähnliche Inhalte

Was ist angesagt?

New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?Druva
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric SecurityWatchful Software
 
Hack4Sports 2016: Pitch team NIMBLIT
Hack4Sports 2016: Pitch team NIMBLITHack4Sports 2016: Pitch team NIMBLIT
Hack4Sports 2016: Pitch team NIMBLITHack4Sports
 
Better business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBetter business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBillington K
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeJean-Michel Franco
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceKate Carruthers
 
7 key problems Water Industry need to solve
7 key problems Water Industry need to solve7 key problems Water Industry need to solve
7 key problems Water Industry need to solveDaniel Cardelús
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Data Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeData Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeSysfore Technologies
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Business Intelligence for Business Analyst October 2018
Business Intelligence for Business Analyst  October 2018Business Intelligence for Business Analyst  October 2018
Business Intelligence for Business Analyst October 2018Ayo Apampa
 
Harnessing the Fear Factor
Harnessing the Fear FactorHarnessing the Fear Factor
Harnessing the Fear FactorKevin Mason
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 

Was ist angesagt? (18)

New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Hack4Sports 2016: Pitch team NIMBLIT
Hack4Sports 2016: Pitch team NIMBLITHack4Sports 2016: Pitch team NIMBLIT
Hack4Sports 2016: Pitch team NIMBLIT
 
Better business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBetter business outcomes with Big Data Analytics
Better business outcomes with Big Data Analytics
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practice
 
7 key problems Water Industry need to solve
7 key problems Water Industry need to solve7 key problems Water Industry need to solve
7 key problems Water Industry need to solve
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Data Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeData Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | Sysfore
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Techsrus
TechsrusTechsrus
Techsrus
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Business Intelligence for Business Analyst October 2018
Business Intelligence for Business Analyst  October 2018Business Intelligence for Business Analyst  October 2018
Business Intelligence for Business Analyst October 2018
 
Harnessing the Fear Factor
Harnessing the Fear FactorHarnessing the Fear Factor
Harnessing the Fear Factor
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 

Andere mochten auch

Building a Mobile Drupal Site
Building a Mobile Drupal SiteBuilding a Mobile Drupal Site
Building a Mobile Drupal SiteMark Jarrell
 
Theming Your Views
Theming Your ViewsTheming Your Views
Theming Your ViewsMark Jarrell
 
APSU Drupal Training
APSU Drupal TrainingAPSU Drupal Training
APSU Drupal TrainingMark Jarrell
 
APSU Drupal Training - Personal Sites
APSU Drupal Training - Personal SitesAPSU Drupal Training - Personal Sites
APSU Drupal Training - Personal SitesMark Jarrell
 
APSU Drupal Training Personal
APSU Drupal Training PersonalAPSU Drupal Training Personal
APSU Drupal Training PersonalMark Jarrell
 
Ed Pietraszewski Portfolio
Ed Pietraszewski PortfolioEd Pietraszewski Portfolio
Ed Pietraszewski Portfolioepietraszewski
 
Web Archivierung - Gründe
Web Archivierung - GründeWeb Archivierung - Gründe
Web Archivierung - GründeHumoback
 
11th Marine Money Conference Uygar Pamuk
11th Marine Money Conference   Uygar Pamuk11th Marine Money Conference   Uygar Pamuk
11th Marine Money Conference Uygar PamukUygarKaptan
 
Building University Websites with the Drupal Content Management System
Building University Websites with the Drupal Content Management SystemBuilding University Websites with the Drupal Content Management System
Building University Websites with the Drupal Content Management SystemMark Jarrell
 
Information Management Strategy 2011
Information Management Strategy  2011Information Management Strategy  2011
Information Management Strategy 2011Humoback
 

Andere mochten auch (13)

Building a Mobile Drupal Site
Building a Mobile Drupal SiteBuilding a Mobile Drupal Site
Building a Mobile Drupal Site
 
Theming Your Views
Theming Your ViewsTheming Your Views
Theming Your Views
 
Fluency
FluencyFluency
Fluency
 
APSU Drupal Training
APSU Drupal TrainingAPSU Drupal Training
APSU Drupal Training
 
APSU Drupal Training - Personal Sites
APSU Drupal Training - Personal SitesAPSU Drupal Training - Personal Sites
APSU Drupal Training - Personal Sites
 
APSU Drupal Training Personal
APSU Drupal Training PersonalAPSU Drupal Training Personal
APSU Drupal Training Personal
 
Weston Electricity 2
Weston Electricity 2Weston Electricity 2
Weston Electricity 2
 
Ed Pietraszewski Portfolio
Ed Pietraszewski PortfolioEd Pietraszewski Portfolio
Ed Pietraszewski Portfolio
 
Web Archivierung - Gründe
Web Archivierung - GründeWeb Archivierung - Gründe
Web Archivierung - Gründe
 
Form Alterations
Form AlterationsForm Alterations
Form Alterations
 
11th Marine Money Conference Uygar Pamuk
11th Marine Money Conference   Uygar Pamuk11th Marine Money Conference   Uygar Pamuk
11th Marine Money Conference Uygar Pamuk
 
Building University Websites with the Drupal Content Management System
Building University Websites with the Drupal Content Management SystemBuilding University Websites with the Drupal Content Management System
Building University Websites with the Drupal Content Management System
 
Information Management Strategy 2011
Information Management Strategy  2011Information Management Strategy  2011
Information Management Strategy 2011
 

Ähnlich wie The 10 biggest threats to your information (caused by yourself the CEO)

Veritas corporate brochure emea
Veritas corporate brochure emeaVeritas corporate brochure emea
Veritas corporate brochure emeaHayatollah Ayoubi
 
How To Identify The Data Opportunities For Every Business?
How To Identify The Data Opportunities For Every Business?How To Identify The Data Opportunities For Every Business?
How To Identify The Data Opportunities For Every Business?Bernard Marr
 
The big deal about big data
The big deal about big dataThe big deal about big data
The big deal about big dataPamTen Inc
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
12 steps to sucess in People analytics.pptx
12 steps to sucess in People analytics.pptx12 steps to sucess in People analytics.pptx
12 steps to sucess in People analytics.pptxPixentia
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofitRoger Hagedorn
 
Barry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeapBarry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeapBarry Ooi
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Big dataplatform operationalstrategy
Big dataplatform operationalstrategyBig dataplatform operationalstrategy
Big dataplatform operationalstrategyHimanshu Bari
 
Building an Effective Data Management Strategy
Building an Effective Data Management StrategyBuilding an Effective Data Management Strategy
Building an Effective Data Management StrategyHarley Capewell
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroStephen Lahanas
 
7 Data Management Tips & Best Practices | Database Management Services In Delhi
7 Data Management Tips & Best Practices | Database Management Services In Delhi7 Data Management Tips & Best Practices | Database Management Services In Delhi
7 Data Management Tips & Best Practices | Database Management Services In DelhiOdyssey Web Designing Company India
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 
Analytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureAnalytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureaNumak & Company
 
The Trusted Path That Driven Big Data to Success
The Trusted Path That Driven Big Data to SuccessThe Trusted Path That Driven Big Data to Success
The Trusted Path That Driven Big Data to Successankitbhandari32
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceIBM Software India
 
Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012Pozzolini
 

Ähnlich wie The 10 biggest threats to your information (caused by yourself the CEO) (20)

Veritas corporate brochure emea
Veritas corporate brochure emeaVeritas corporate brochure emea
Veritas corporate brochure emea
 
How To Identify The Data Opportunities For Every Business?
How To Identify The Data Opportunities For Every Business?How To Identify The Data Opportunities For Every Business?
How To Identify The Data Opportunities For Every Business?
 
The big deal about big data
The big deal about big dataThe big deal about big data
The big deal about big data
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
12 steps to sucess in People analytics.pptx
12 steps to sucess in People analytics.pptx12 steps to sucess in People analytics.pptx
12 steps to sucess in People analytics.pptx
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofit
 
Barry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeapBarry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeap
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Big dataplatform operationalstrategy
Big dataplatform operationalstrategyBig dataplatform operationalstrategy
Big dataplatform operationalstrategy
 
Building an Effective Data Management Strategy
Building an Effective Data Management StrategyBuilding an Effective Data Management Strategy
Building an Effective Data Management Strategy
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - Intro
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 
7 Data Management Tips & Best Practices | Database Management Services In Delhi
7 Data Management Tips & Best Practices | Database Management Services In Delhi7 Data Management Tips & Best Practices | Database Management Services In Delhi
7 Data Management Tips & Best Practices | Database Management Services In Delhi
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Analytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureAnalytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven Culture
 
The Trusted Path That Driven Big Data to Success
The Trusted Path That Driven Big Data to SuccessThe Trusted Path That Driven Big Data to Success
The Trusted Path That Driven Big Data to Success
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidence
 
Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012
 

Kürzlich hochgeladen

Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024Alex Marques
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptxAss.Prof. Dr. Mogeeb Mosleh
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Hedda Bird
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxalinstan901
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
situational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Ssituational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Smisbafathima9940
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...Pooja Nehwal
 

Kürzlich hochgeladen (20)

Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
situational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Ssituational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima S
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 

The 10 biggest threats to your information (caused by yourself the CEO)

  • 1. © Wildhaber Consulting, Zürich 2014 The 10 Biggest Threats to your Information (caused by yourself, the CEO) by Bruno Wildhaber Fulll article 1 Montag, 12. Mai 14
  • 2. © Wildhaber Consulting, Zürich 2014 Threat #1. Give Data away (to Siren Servers) 2 • What's a Siren server? Read Jaron Lanier's "Who own's the Future?". This is a must read for everybody who thinks their business model isn't endangered by Google & Co. • Google and other big servers try to get your data. • This is a market and the Siren servers will try to control personal data, e.g. your business model will rely on data which is not under your control (see Threat #7). • If information represents value, value can be shared. If somebody controls the data for 3D printing, the whole replacement part business will die, not because of the ability to print the part, but because somebody loaded this data onto a Siren server. • This is the same development or fate which the music industry went through. Montag, 12. Mai 14
  • 3. © Wildhaber Consulting, Zürich 2014 Threat # 2. Don't know where your Data is stored • By sourcing to the cloud, you are loosing control over your data. • Most cloud services enforce rule which allow them to control your data. • Even if you have a 100page contract, your data is gone. • You think you have an SAP shop and there is no danger to you? Don’t be sure, because tools like Dropbox, Box or Sharepoint will happy to hold lots of your valuable data. Your employees will do this if you don't set up a good Governance system (see Threat #8). 3 Montag, 12. Mai 14
  • 4. © Wildhaber Consulting, Zürich 2014 Threat # 3. Don't know the Quality of Data (IT) • Most information and data we base our decisions upon, are junk. • In the time of outsourcing and the cloud, the control aspects shift from controlling your IT to controlling Information. • Data Quality is a key success factor for all information based business cases and to fullfil compliance requirements. • IT Governance is still a very important discipline, which is almost as much neglected as Information Governance, but helps improving the quality of your data. 4 Montag, 12. Mai 14
  • 5. © Wildhaber Consulting, Zürich 2014 Threat # 4. Don't define Metadata • Metadata will stay, because data about data will be required to organize information chaos. • Taxonomies help to understand your business and help you defining the right rules. • You don't need retention lists if you start a business, but you need to understand which data, knowledge and value are kept in your organization. • Sematic , intelligent search et. al. won‘t solve these issues. They will support, but cannot replace structure. 5 Montag, 12. Mai 14
  • 6. © Wildhaber Consulting, Zürich 2014 Threat # 5. Approach Information Governance Top Down • Live has been swarmed from the swamps and invaded our world from the oceans (Creationists pls ignore this part). • The best business plan doesn't work if the basic idea isn't strong enough and provides sufficient results (however, it‘s good to have a plan). • So why should we try to implement such an abstract topic as "Information Governance" or "Information Management" from the top if even the brightest minds in our organization don't understand the meaning of it? • So, go and start from the bottom, implement that social media channel or archiving solution and work your way up. 6 Montag, 12. Mai 14
  • 7. © Wildhaber Consulting, Zürich 2014 Threat # 6. Ignore Information as a Production Factor • Information is a production factor and its importance depends on the way your business model works. • The value of information: Yes, you don't know it (most of the times). There are only rare occasions where the value of information can be calculated. • UNDERSTAND the value, don‘t calculate. • It will be crucial that you understand that any strategic initiative you will undertake has an information component. 7 Montag, 12. Mai 14
  • 8. © Wildhaber Consulting, Zürich 2014 Threat # 7. Ignore Data Privacy • Data privacy or better personal privacy is an important issue which is currently neglected by most users and companies. • Only totalitarian regimes (or the NSA) are in control of your private information. • If organizations are building business models using "free" personal data, this might become a big problem. Sooner or later, the value of personal data will rise. • If governments will put more pressure on Siren servers (and this will happen), your business advantage might disappear from one moment to the other. 8 Montag, 12. Mai 14
  • 9. © Wildhaber Consulting, Zürich 2014 Threat # 8. Don't involve the User • Yes the ECM industry has capitulated from the user. They try to convince customers that the "0 click" solution will work and people must not be involved as part of the information classification function. • This is NONSENSE. You need to follow a minimal standard, otherwise you will be replaced by a robot. Because robots don't make mistakes. • If people are free to decide what they do with your company data, you can fire your management. Because if people don't have to follow rules, they won't need to be managed. 9 Montag, 12. Mai 14
  • 10. © Wildhaber Consulting, Zürich 2014 Threat # 9. Put all your money into Data Security • Data security is the field which has attracted billions of dollars in the last 20 years. Most of it has been wasted. • Companies should have focused on information valuation, focusing security initiatives on valuable information only. • Instead, tons of expensive medicine were thrown at minor or irrelevant symptoms. What's the reason for this behavior? Simple, if you don't know the diagnosis you take some broadband medicaments. Or as my grandfather used to say: "With medicine, your flu will be over in 7 days, without .. in a week." (and the pharma industry prefers the first solution). • So rethink your security strategy, cut the budget by half and spend this money on Information Governance. T 10 Montag, 12. Mai 14
  • 11. © Wildhaber Consulting, Zürich 2014 Threat # 10. Treat Information as a Technology issue • Everybody understands that information is valuable. • However, many decision makers treat informations as it would be sold in tins or as Spam (oh yes..). • But Information Management is a traditional business, It has been done by businesses long before IT was invented - and it will still exist by the time nobody remembers the meaning of "IT". • Information must be treated as one of your most vital production factors. It is important to keep it to yourself unless there is a business case in giving it away. • Data means power, if handed out, it’s gone. 11 Montag, 12. Mai 14
  • 12. © Wildhaber Consulting, Zürich 201312 Dr. iur. Bruno Wildhaber CIP / CISA / CISM / CGEIT Wildhaber Consulting CH 8301 Glattzentrum / Switzerland Tel. +41 44 826 21 21 www.wildhaber.com info@wildhaber.com Wildhaber Consulting was founded in 1999 and offers consulting services to middle and large private organizations: •Core Competence &Value Offering: •Coaching non-tech executives leading complex I-governance programs. •Strategic support for companies in the Information Governance and Information Security space. •Lead and coach Information Governance initiatives such as Records Management, ECM, Electronic Archiving, Information Security Management, IT Governance. Wildhaber Consulting operates with a network of highly skilled experts and senior consultants based in Switzerland, Europe and from the US. The Kompetenzzentrum Records Management (KRM) is a platform for exchanging expert knowledge around the topic of Electronic Archiving, Records and Information Management.As a member of the expert group revising the Swiss regulation on retention, the competence centre published a practice handbook for practitioners and users, which became the de- facto standard for RM in Switzerland and will be re-published in its 3rd edition. Montag, 12. Mai 14