Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
IBM. Taming the data demons: leveraginginformation in the age of risk

IBM. Taming the data demons: leveraginginformation in the age of risk

Ratings: (0)|Views: 310|Likes:
Published by Nicolás Boettcher

More info:

Published by: Nicolás Boettcher on Apr 04, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/04/2011

pdf

text

original

 
IBM Global Technology Services
Thought Leadership White Paper
September 2010
Taming the data demons: leveraginginformation in the age of risk
 
2
Taming the data demons: leveraging information in the age of risk
Contents
2
Introduction
3
Data risk management defined
4
Meeting the unrealized need
4
Yesterday’s data risk management—saying “no”
5
Today’s data risk management—saying “yes”
5
It starts with governance
6
The trouble with silos
6
The shortest distance between data and its safety
7
Data on the move
9
Holistic has its benefits
9
IBM can help
12
For more information
Introduction
Innovative companies understand that risk is essential togrowing a business. Every initiative that has the potential tobreak new ground, open up new markets or extend a competi-tive advantage also has a potential downside. The key is toidentify these downside risks ahead of time, accurately evaluat-ing their effect on the business, and putting processes andsafeguards in place to mitigate them. This is true of every typeof risk an organization faces—business-driven, event-drivenand, especially, data-driven risk.With data being the new world currency, and the cost of maintaining and protecting that data running exponentially higher than the cost to capture it in the first place, data risk management is assuming a new importance among IT andline-of-business executives alike.It may not be enough, however, to simply assign data risk management a new level of importance. A new point-of-viewmay be required, as well. A holistic point-of-view that makesdata risk management an integral part of both enterprise-wide data polices and business strategies. A point-of-viewthat has the potential to deliver lower cost, faster return oninvestment, better compliance and a more flexible and resilientorganization.This white paper explores the framework and advantages of aholistic approach to data risk management, and provides bothIT and line-of-business executives with the “why” and “how”to begin putting a holistic data risk management program towork in organizations large and small.
 
IBM Global Technology Service
3
IT
s
ecurity 78%63%50%40%28%25%22%17%13%11%6%Hardware and
s
y
s
tem malfunctionPower failurePhy
s
ical
s
ecurityTheftProduct quality i
ss
ue
s
Federal compliance i
ss
ue
s
Natural di
s
a
s
terE-di
s
covery reque
s
t
s
Supply chain brea
k
downTerrori
s
m activity
Source: 2010 IBM Global IT Ri
sk
Study
Figure 1
: Today’s organizations face a wide range of risk issues, almost all of which have an impact on that organization’s data.
Data risk management defined
There is no getting around it, if a business today loses accessto its data, it is soon out of business. There are many reasonswhy an organization could find its access to reliable, securedata compromised—everything from a missing laptop to acorporate merger to a hurricane (see Figure 1). Then thereare the legal and compliance requirements. In fact, many organizations that never previously considered themselves tobe potential targets for hackers, or maintainers of sensitivecustomer data, now find themselves every bit as responsiblefor compliance as banks, hospitals and other traditional sub-jects of compliance regulations.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->