SlideShare a Scribd company logo
1 of 59
Download to read offline
Automated Data
Governance 101
Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt
Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt
© 2019 IMMUTA
What is data governance?
Automated Data Governance 101
Privacy ComplianceSecurity
Why is data governance so difficult?
© 2019 IMMUTA
Privacy ComplianceSecurity
The Privacy Problem:
Too Much Data
© 2019 IMMUTA
Judd & Leslie Are Living Happy Lives
© 2019 IMMUTA
▪ Chris Wong perusing Twitter in March 2014
▪ Sees a Taxi & Limousine Commission chart
on traffic patterns
▪ Makes a freedom of information request for
12 months of data
▪ Receives 50 gigabytes of data
A New York City Researcher Gets Curious...
© 2019 IMMUTA
▪ Data was released containing taxi pickups,
dropoffs, location, time, amount, and tip
amount, among others
▪ This seems pretty harmless, right?
The New York Taxi & Limousine Commission
© 2019 IMMUTA
▪ This photo was geotagged (with time), so
by simply querying by medallion and time,
we know how much Judd and Leslie tip!
Well, Judd and Leslie May Not Think It’s Harmless...
© 2019 IMMUTA
This is an Example of a “Link Attack”
Medallion & Photo Time Medallion & Pickup Time
New York
Taxi Data
© 2019 IMMUTA
Same Attack on Other Celebrities
© 2019 IMMUTA
Same Attack on Other Celebrities
© 2019 IMMUTA
Same Attack on Other Celebrities
© 2019 IMMUTA
“... the dates and locations of four
purchases are enough to identify 90
percent of the people in a data set
recording three months’ worth of credit
card transactions by 1.1 million users ...
someone with copies of just three of your
recent receipts - or one receipt, one
Instagram photo, and one tweet about
the phone you just bought - would have
a 94 percent chance of extracting your
credit card records from those of a
million other people.”
In Fact...
© 2019 IMMUTA
▪ The volume of data we generate has
undermined privacy as we know it
▪ Instead of focusing on how and when our data is
gathered…
▪ Privacy is best served in limiting how our data
is being used - or how the data consumers
within our organizations are using this data
▪ The privacy problem begets another challenge
for enterprises: how do you balance data
privacy with utility?
The End of Privacy (As We Know It)
Data can either
be useful or
perfectly
anonymous,
but never both.
Paul Ohm
Broken Promises of Privacy
57 UCLA Law Review 1701 (2010)
© 2019 IMMUTA
▪ To preserve privacy, organizations have to
make the data less closely resemble the
raw data (or full data).
▪ Moving along this curve, data becomes
more robust against certain types of privacy
risks.
▪ The actual trade-off is highly coupled with
analytical context.
In Practice, Privacy is a Continuum
© 2019 IMMUTA
Privacy ComplianceSecurity
The Security Problem:
Too Much Complexity
© 2019 IMMUTA
Traditionally defined as a “triad”:
● Confidentiality only the right people can view the right data . . .
● Integrity . . . in the right form . . .
● Availability . . . at the right time.
Information Security
© 2019 IMMUTA
Today’s IT Landscape
▪ 2.5 quintillion bytes of data created each day
▪ 90 percent of the data in the world was generated in the
last 2 years
▪ Estimated 50 billion connected devices by next year - over
six per person on the planet
▪ Average of 40,000 searches conducted on Google per
second
▪ Web browsing, email, cell tower pings, image and video,
audio, and more
▪ Average business uses ~500 custom software
applications, only 40 percent of which are known to IT
▪ Number of known vulnerabilities is increasing (significantly)
over time
▪ Complexity of software systems and IT environments also
appears to be increasing
▪ Adoption of AI tools and techniques is exacerbating these
trends
The Data We Generate (And Collect) The Software We Use
Complexity Is the Enemy of Security
The only
computer that’s
completely secure
is a computer that
no one can use.
Willis Ware
Cybersecurity Pioneer
© 2019 IMMUTA
Privacy ComplianceSecurity
The Compliance Problem:
Not Enough Time
The number and complexity of regulations on data is
increasing drastically.
150+ Privacy Laws
Proposed in 25 States
250+ Information Security Laws
Proposed in 45 States
Could Cost Organizations Up to $122B Per Year
In 2019 in the U.S. alone…
© 2019 IMMUTA
GDPR
▪ EU’s General Data Protection
Regulation
▪ Came into force May 2018 as the first
and most stringent law in a new wave
of global privacy regulations
▪ Fines up to four percent of global
revenue
▪ Driven many global companies to
rethink how they collect and reuse
their data
A Few Examples
CCPA
▪ California Consumer Privacy Act
▪ Passed in 2018 and goes into effect
January 2020
▪ State legislators implemented some
of the strictest standards on
consumer data in the nation
▪ Potentially affects any business that
collects the data of California
residents
Cybersecurity Law
▪ Enacted by the Chinese government
in 2017
▪ Increased penalties on the misuse of
data collected or stored in the world’s
second largest economy
© 2019 IMMUTA
Noncompliance Has Serious Consequences
© 2019 IMMUTA
▪ Involves lots of analytical work
▪ “Meetings and memos” approach
▪ Increasing number of stakeholders and
regulatory environments are now involved
▪ Not simple, and not fast!
Compliance Takes Time
How are we addressing these
problems today?
Passively.
© 2019 IMMUTA
❏ Time-Consuming Meetings
❏ Long Policy Memos
❏ Custom Permissions
❏ Varying Policies Per Database
❏ Creation of New Copies of Data to Satisfy Compliance or Privacy Concerns
Traditional Signs of Passive Data Governance
© 2019 IMMUTA
How long does it take between
1) when your organization collects data, and
2) when that data can be accessed and used?
Is your approach to data governance passive? Ask yourself...
A. Days
B. Weeks
C. Months
How can we move away
from a passive approach
to data governance?
Automated Data Governance.
© 2019 IMMUTA
Automated data governance is the process
of proactively applying rules on data
to ensure compliance and drive data analytics.
What Is Automated Data Governance?
5 Pillars of Automated
Data Governance
© 2019 IMMUTA
1. Any Tool
2. Any Data
3. No Copies
4. Any Level of Expertise
5. One Policy, In One Place
5 Pillars of Effective Automated Data Governance
Pillar 1
Any Tool
© 2019 IMMUTA
Pillar 1: Any Tool
▪ Automated data governance must support
any tool a data scientist or analyst uses, now
or in the future
▪ Enables data science and analytics teams to
use their tool of choice to access the data
they need
▪ Avoids tool “lock in” for governance reasons
▪ Incentivizes governance for the long-term
Pillar 2
Any Data
© 2019 IMMUTA
Pillar 2: Any Data
▪ Must enable the use of ALL data, regardless
of where it’s stored or the underlying storage
technology
▪ Otherwise, leaves insights undiscovered or
incentivizes non-compliance
▪ Flexibility is key to long-term governance
efforts
Pillar 3
No Copies
© 2019 IMMUTA
Pillar 3: No Copies
▪ A passive approach frequently relies on
creating new copies of data, usually with
sensitive identifiers removed or obscured -
this can’t scale!
▪ Automated data governance requires direct
access to the same live data across the
organization
▪ Data must never be copied for governance
purposes
Pillar 4
Any Level of Expertise
© 2019 IMMUTA
Pillar 4: Any Level of Expertise
▪ Requires that anyone, with any level of
expertise, can understand what rules are
being applied to enterprise data
▪ Must empower both those with technical skill
sets and those with privacy and compliance
knowledge, so all teams can play a
meaningful role controlling how data is used
Pillar 5
One Policy, In One Place
© 2019 IMMUTA
Pillar 5: One Policy, In One Place
▪ Requires that data policies live in one central
location, so they can be easily tracked,
monitored
▪ Allows for standardization - and updates over
time
▪ Key to long-term governance efforts
Your Roadmap for
Automating Data Governance
© 2019 IMMUTA
1. What process governs how an analyst receives new data?
2. Where do your policies come from? What rules do you most care about adhering to?
3. Where is your data, and who’s responsible for it?
4. How is your data used, and how is it catalogued and tagged?
5. What technology stack do you rely on to share data faster, and control data more
effectively?
How You Can Automate Data Governance
52
Download
WHITE PAPER
Automated Data Governance 101
go.immuta.com/ADG-101
Automated Data Governance
In Practice
© 2019 IMMUTA
Data Access and Governance
▪ AI-based digital diagnostics and personalized therapies.
▪ Self-service data for data scientists for exploration, experimentation,
and analytics.
▪ Run any queries they want without taking additional steps to ensure
HIPAA compliance.
▪ Data privacy and security concerns are paramount.
▪ Data is stored in Amazon Aurora and analyzed in Databricks and
Tableau.
▪ Create different views of the same data for different parties with
varying functional responsibilities.
▪ Removing ePHI and HIPAA sensitive information for model building
was extremely time and labor intensive.
Cognoa:
Digital Behavioral
Health Company
© 2019 IMMUTA
GDPR Compliant Analytics
▪ Data collection from vehicles requires complex controls.
▪ Different use cases require different levels of anonymization.
▪ Differential privacy is a key enabler.
▪ A model to allow for individual-related insights and/or use cases
without violating privacy protection.
▪ Re-identification required: predictive maintenance on a vehicle; they
need to unmask the owner in order to provide maintenance
(purpose-based views).
▪ Analyzing the most-listened-to radio stations. This does not require
identifying an individual, and thus only requires aggregate questions.
Multinational
Automobile
Corporation
© 2019 IMMUTA
Accelerated Time to Insight from
Highly Sensitive Government Data
▪ Built an integrated data analytics platform for the Office of the
Secretary of Defense.
▪ Maintenance and Availability Data Warehouse (MADW) contains
availability, cost, inventory, and transactional data on nearly every
Department of Defense weapons system and readiness reportable
piece of equipment.
▪ More than one billion maintenance records from 46 authoritative data
systems.
▪ Integration of availability, cost, inventory, maintenance, and supply
data makes numerous analyses available to leaders across the DoD
enterprise.
LMI:
Consultancy Dedicated to
Improving the Business of
Government
© 2019 IMMUTA
Built a Self-Service Environment for Easy
Access to Operational Data
▪ Scalable, no-code self-service data access for business intelligence
operations.
▪ Provide a single interface for legal teams to implement global policy
enforcement on controlled metadata vs one-by-one policy creation.
▪ Automate reporting for credit and loan decisions.
▪ Set project-, purpose-, and role-based restrictions that ensure users
can only see the data they are entitled to see.
▪ Controlling access to all data in Data Lake, providing automated
reports on the purpose of all data usage (a core GDPR requirement)
▪ Exposed over 8000 data sources, abstracted policy enforcement and
instantaneously allowed non-technical users to gain access to the
data for the first time, e.g. HR and Marketing.
Global Financial
Institution
58
Download
WHITE PAPER
Automated Data Governance 101
go.immuta.com/ADG-101
Q&A
Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt
Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt

More Related Content

What's hot

Real-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsReal-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business Expectations
DATAVERSITY
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Leon Kappelman
 
Data governance, Information security strategy
Data governance, Information security strategyData governance, Information security strategy
Data governance, Information security strategy
vasanthi4ever
 
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
DATAVERSITY
 

What's hot (20)

Data Governance
Data GovernanceData Governance
Data Governance
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
 
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
Real-World Data Governance: Metadata to Empower Data Stewards - Introducing t...
 
Big data Readiness white paper
Big data  Readiness white paperBig data  Readiness white paper
Big data Readiness white paper
 
Strategic imperative the enterprise data model
Strategic imperative the enterprise data modelStrategic imperative the enterprise data model
Strategic imperative the enterprise data model
 
Real-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsReal-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business Expectations
 
RWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyRWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance Policy
 
Real-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsReal-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance Tools
 
Data-Ed: Show Me the Money: The Business Value of Data and ROI
Data-Ed: Show Me the Money: The Business Value of Data and ROIData-Ed: Show Me the Money: The Business Value of Data and ROI
Data-Ed: Show Me the Money: The Business Value of Data and ROI
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
 
DataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data Sins
 
How Can Everybody Be a Data Steward?
How Can Everybody Be a Data Steward?How Can Everybody Be a Data Steward?
How Can Everybody Be a Data Steward?
 
Becoming a Data-Driven Organization - Aligning Business & Data Strategy
Becoming a Data-Driven Organization - Aligning Business & Data StrategyBecoming a Data-Driven Organization - Aligning Business & Data Strategy
Becoming a Data-Driven Organization - Aligning Business & Data Strategy
 
Data governance, Information security strategy
Data governance, Information security strategyData governance, Information security strategy
Data governance, Information security strategy
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Mike2.0 Information Governance Overview
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overview
 
TeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch ToolTeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch Tool
 
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
Real-World Data Governance: Comparing World Class Solutions in Data Governanc...
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: Metadata
 
RWDG Slides: Data and Metadata Will Not Govern Themselves
RWDG Slides: Data and Metadata Will Not Govern ThemselvesRWDG Slides: Data and Metadata Will Not Govern Themselves
RWDG Slides: Data and Metadata Will Not Govern Themselves
 

Similar to Automated Data Governance 101 - A Guide to Proactively Addressing Your Privacy, Security, and Compliance Needs

Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
IDERA Software
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
confluent
 

Similar to Automated Data Governance 101 - A Guide to Proactively Addressing Your Privacy, Security, and Compliance Needs (20)

2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
What's the future for data orchestration
What's the future for data orchestrationWhat's the future for data orchestration
What's the future for data orchestration
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 

More from DATAVERSITY

The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
DATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
DATAVERSITY
 

More from DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Recently uploaded

Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
wsppdmt
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
HyderabadDolls
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 

Recently uploaded (20)

Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 

Automated Data Governance 101 - A Guide to Proactively Addressing Your Privacy, Security, and Compliance Needs

  • 1. Automated Data Governance 101 Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt
  • 2. © 2019 IMMUTA What is data governance? Automated Data Governance 101 Privacy ComplianceSecurity
  • 3. Why is data governance so difficult?
  • 4. © 2019 IMMUTA Privacy ComplianceSecurity
  • 6. © 2019 IMMUTA Judd & Leslie Are Living Happy Lives
  • 7. © 2019 IMMUTA ▪ Chris Wong perusing Twitter in March 2014 ▪ Sees a Taxi & Limousine Commission chart on traffic patterns ▪ Makes a freedom of information request for 12 months of data ▪ Receives 50 gigabytes of data A New York City Researcher Gets Curious...
  • 8. © 2019 IMMUTA ▪ Data was released containing taxi pickups, dropoffs, location, time, amount, and tip amount, among others ▪ This seems pretty harmless, right? The New York Taxi & Limousine Commission
  • 9. © 2019 IMMUTA ▪ This photo was geotagged (with time), so by simply querying by medallion and time, we know how much Judd and Leslie tip! Well, Judd and Leslie May Not Think It’s Harmless...
  • 10. © 2019 IMMUTA This is an Example of a “Link Attack” Medallion & Photo Time Medallion & Pickup Time New York Taxi Data
  • 11. © 2019 IMMUTA Same Attack on Other Celebrities
  • 12. © 2019 IMMUTA Same Attack on Other Celebrities
  • 13. © 2019 IMMUTA Same Attack on Other Celebrities
  • 14. © 2019 IMMUTA “... the dates and locations of four purchases are enough to identify 90 percent of the people in a data set recording three months’ worth of credit card transactions by 1.1 million users ... someone with copies of just three of your recent receipts - or one receipt, one Instagram photo, and one tweet about the phone you just bought - would have a 94 percent chance of extracting your credit card records from those of a million other people.” In Fact...
  • 15. © 2019 IMMUTA ▪ The volume of data we generate has undermined privacy as we know it ▪ Instead of focusing on how and when our data is gathered… ▪ Privacy is best served in limiting how our data is being used - or how the data consumers within our organizations are using this data ▪ The privacy problem begets another challenge for enterprises: how do you balance data privacy with utility? The End of Privacy (As We Know It)
  • 16. Data can either be useful or perfectly anonymous, but never both. Paul Ohm Broken Promises of Privacy 57 UCLA Law Review 1701 (2010)
  • 17. © 2019 IMMUTA ▪ To preserve privacy, organizations have to make the data less closely resemble the raw data (or full data). ▪ Moving along this curve, data becomes more robust against certain types of privacy risks. ▪ The actual trade-off is highly coupled with analytical context. In Practice, Privacy is a Continuum
  • 18. © 2019 IMMUTA Privacy ComplianceSecurity
  • 19. The Security Problem: Too Much Complexity
  • 20. © 2019 IMMUTA Traditionally defined as a “triad”: ● Confidentiality only the right people can view the right data . . . ● Integrity . . . in the right form . . . ● Availability . . . at the right time. Information Security
  • 21. © 2019 IMMUTA Today’s IT Landscape ▪ 2.5 quintillion bytes of data created each day ▪ 90 percent of the data in the world was generated in the last 2 years ▪ Estimated 50 billion connected devices by next year - over six per person on the planet ▪ Average of 40,000 searches conducted on Google per second ▪ Web browsing, email, cell tower pings, image and video, audio, and more ▪ Average business uses ~500 custom software applications, only 40 percent of which are known to IT ▪ Number of known vulnerabilities is increasing (significantly) over time ▪ Complexity of software systems and IT environments also appears to be increasing ▪ Adoption of AI tools and techniques is exacerbating these trends The Data We Generate (And Collect) The Software We Use
  • 22. Complexity Is the Enemy of Security
  • 23. The only computer that’s completely secure is a computer that no one can use. Willis Ware Cybersecurity Pioneer
  • 24. © 2019 IMMUTA Privacy ComplianceSecurity
  • 26. The number and complexity of regulations on data is increasing drastically.
  • 27. 150+ Privacy Laws Proposed in 25 States 250+ Information Security Laws Proposed in 45 States Could Cost Organizations Up to $122B Per Year In 2019 in the U.S. alone…
  • 28. © 2019 IMMUTA GDPR ▪ EU’s General Data Protection Regulation ▪ Came into force May 2018 as the first and most stringent law in a new wave of global privacy regulations ▪ Fines up to four percent of global revenue ▪ Driven many global companies to rethink how they collect and reuse their data A Few Examples CCPA ▪ California Consumer Privacy Act ▪ Passed in 2018 and goes into effect January 2020 ▪ State legislators implemented some of the strictest standards on consumer data in the nation ▪ Potentially affects any business that collects the data of California residents Cybersecurity Law ▪ Enacted by the Chinese government in 2017 ▪ Increased penalties on the misuse of data collected or stored in the world’s second largest economy
  • 29. © 2019 IMMUTA Noncompliance Has Serious Consequences
  • 30. © 2019 IMMUTA ▪ Involves lots of analytical work ▪ “Meetings and memos” approach ▪ Increasing number of stakeholders and regulatory environments are now involved ▪ Not simple, and not fast! Compliance Takes Time
  • 31. How are we addressing these problems today?
  • 33. © 2019 IMMUTA ❏ Time-Consuming Meetings ❏ Long Policy Memos ❏ Custom Permissions ❏ Varying Policies Per Database ❏ Creation of New Copies of Data to Satisfy Compliance or Privacy Concerns Traditional Signs of Passive Data Governance
  • 34. © 2019 IMMUTA How long does it take between 1) when your organization collects data, and 2) when that data can be accessed and used? Is your approach to data governance passive? Ask yourself... A. Days B. Weeks C. Months
  • 35. How can we move away from a passive approach to data governance?
  • 37. © 2019 IMMUTA Automated data governance is the process of proactively applying rules on data to ensure compliance and drive data analytics. What Is Automated Data Governance?
  • 38. 5 Pillars of Automated Data Governance
  • 39. © 2019 IMMUTA 1. Any Tool 2. Any Data 3. No Copies 4. Any Level of Expertise 5. One Policy, In One Place 5 Pillars of Effective Automated Data Governance
  • 41. © 2019 IMMUTA Pillar 1: Any Tool ▪ Automated data governance must support any tool a data scientist or analyst uses, now or in the future ▪ Enables data science and analytics teams to use their tool of choice to access the data they need ▪ Avoids tool “lock in” for governance reasons ▪ Incentivizes governance for the long-term
  • 43. © 2019 IMMUTA Pillar 2: Any Data ▪ Must enable the use of ALL data, regardless of where it’s stored or the underlying storage technology ▪ Otherwise, leaves insights undiscovered or incentivizes non-compliance ▪ Flexibility is key to long-term governance efforts
  • 45. © 2019 IMMUTA Pillar 3: No Copies ▪ A passive approach frequently relies on creating new copies of data, usually with sensitive identifiers removed or obscured - this can’t scale! ▪ Automated data governance requires direct access to the same live data across the organization ▪ Data must never be copied for governance purposes
  • 46. Pillar 4 Any Level of Expertise
  • 47. © 2019 IMMUTA Pillar 4: Any Level of Expertise ▪ Requires that anyone, with any level of expertise, can understand what rules are being applied to enterprise data ▪ Must empower both those with technical skill sets and those with privacy and compliance knowledge, so all teams can play a meaningful role controlling how data is used
  • 48. Pillar 5 One Policy, In One Place
  • 49. © 2019 IMMUTA Pillar 5: One Policy, In One Place ▪ Requires that data policies live in one central location, so they can be easily tracked, monitored ▪ Allows for standardization - and updates over time ▪ Key to long-term governance efforts
  • 50. Your Roadmap for Automating Data Governance
  • 51. © 2019 IMMUTA 1. What process governs how an analyst receives new data? 2. Where do your policies come from? What rules do you most care about adhering to? 3. Where is your data, and who’s responsible for it? 4. How is your data used, and how is it catalogued and tagged? 5. What technology stack do you rely on to share data faster, and control data more effectively? How You Can Automate Data Governance
  • 52. 52 Download WHITE PAPER Automated Data Governance 101 go.immuta.com/ADG-101
  • 54. © 2019 IMMUTA Data Access and Governance ▪ AI-based digital diagnostics and personalized therapies. ▪ Self-service data for data scientists for exploration, experimentation, and analytics. ▪ Run any queries they want without taking additional steps to ensure HIPAA compliance. ▪ Data privacy and security concerns are paramount. ▪ Data is stored in Amazon Aurora and analyzed in Databricks and Tableau. ▪ Create different views of the same data for different parties with varying functional responsibilities. ▪ Removing ePHI and HIPAA sensitive information for model building was extremely time and labor intensive. Cognoa: Digital Behavioral Health Company
  • 55. © 2019 IMMUTA GDPR Compliant Analytics ▪ Data collection from vehicles requires complex controls. ▪ Different use cases require different levels of anonymization. ▪ Differential privacy is a key enabler. ▪ A model to allow for individual-related insights and/or use cases without violating privacy protection. ▪ Re-identification required: predictive maintenance on a vehicle; they need to unmask the owner in order to provide maintenance (purpose-based views). ▪ Analyzing the most-listened-to radio stations. This does not require identifying an individual, and thus only requires aggregate questions. Multinational Automobile Corporation
  • 56. © 2019 IMMUTA Accelerated Time to Insight from Highly Sensitive Government Data ▪ Built an integrated data analytics platform for the Office of the Secretary of Defense. ▪ Maintenance and Availability Data Warehouse (MADW) contains availability, cost, inventory, and transactional data on nearly every Department of Defense weapons system and readiness reportable piece of equipment. ▪ More than one billion maintenance records from 46 authoritative data systems. ▪ Integration of availability, cost, inventory, maintenance, and supply data makes numerous analyses available to leaders across the DoD enterprise. LMI: Consultancy Dedicated to Improving the Business of Government
  • 57. © 2019 IMMUTA Built a Self-Service Environment for Easy Access to Operational Data ▪ Scalable, no-code self-service data access for business intelligence operations. ▪ Provide a single interface for legal teams to implement global policy enforcement on controlled metadata vs one-by-one policy creation. ▪ Automate reporting for credit and loan decisions. ▪ Set project-, purpose-, and role-based restrictions that ensure users can only see the data they are entitled to see. ▪ Controlling access to all data in Data Lake, providing automated reports on the purpose of all data usage (a core GDPR requirement) ▪ Exposed over 8000 data sources, abstracted policy enforcement and instantaneously allowed non-technical users to gain access to the data for the first time, e.g. HR and Marketing. Global Financial Institution
  • 58. 58 Download WHITE PAPER Automated Data Governance 101 go.immuta.com/ADG-101
  • 59. Q&A Andrew Burt, Chief Privacy Officer, Immuta, Twitter: @AndBurt Matt Vogt, Head of Global Solution Architecture, Immuta, Twitter: @mattvogt