metadata intelligence - torornto - 2016-11...metadata intelligence and the cmmi data maturity model...
TRANSCRIPT
![Page 1: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/1.jpg)
![Page 2: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/2.jpg)
Metadata Intelligence and the CMMI Data Maturity Model
Protecting Critical Data
Wed. Nov. 16, 2016
Don SoulsbySandhill Consultants
Information Resource Management Association of Canada
![Page 3: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/3.jpg)
Who we are:
Sandhill ConsultantsIs a group of federated people, partners, products and processes that help our clients:Build comprehensive
Data ArchitectureResulting from a persistent
Data Management ProcessFounded on a robust
Data Governance PracticeProduces Trusted, Governed Data
Don Soulsby • Vice President Architecture
Strategies, Sandhill Consultants• CMMI – Enterprise Data
Management Expert (EDME)• Enterprise Architecture,
Business Intelligence, Metadata Consultant
• Data/Process modeller• Educator & Industry Speaker
3
Meta an abstract, high-level analysis
Wright person who creates, builds, or repairs something specified
![Page 4: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/4.jpg)
No Good News
No headline about the airship that didn’t crash…
![Page 5: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/5.jpg)
…By any other name
stratuminsurance.com
![Page 6: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/6.jpg)
It is not just about Locks and Keys!
Michael Bruemmer, VP, Experian Data Breach
Resolution
Companies are no longer judged by whether they have a breach, but rather on how they respond when a breach occurs.
![Page 7: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/7.jpg)
5 Things to Do When Your Company Gets Hacked
InfoMgmt – Daily - Oct 14, 2016 - by David Weldon
1. Pull the plug2. Wipe the slate clean3. Diagnose compromised systems4. Notify affected users5. Take corrective action
Phil Phillips, the head systems administrator at Experts Exchange
http://www.information-management.com/
The Towering Inferno (1974)
![Page 8: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/8.jpg)
It’s 10pm, do you know where..
your DATA ASSETS are?
Mel Epstein, New York's WNEW-TV, 1967
![Page 9: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/9.jpg)
Major Challenges – Data Assets
• Lack of Senior Executive support, do not see data assets on the books.
• Data in many distributed systems with no common data model and multiple repositories of metadata with limited search capabilities.
• Difficulty in getting funding centralized and strategically planned.
• IT project culture, limited support for cross project data programs – master data.
That which is Everybody’s business is Nobody’s business
Izaak Walton (17th Century)
![Page 10: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/10.jpg)
Investigate the Data Management Process
Data Management Body of Knowledge
![Page 11: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/11.jpg)
Data Management Maturity - DMM
The DMM model, first announced in May 2014, was developed using the principles and structure of CMMI
Institute’s Capability Maturity Model Integration (CMMI®)
The DMM℠ model outlines data process improvement across business lines — allowing executives to make better and faster decisions using a strategic view of
their data.
![Page 12: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/12.jpg)
CMMI Assessment
![Page 13: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/13.jpg)
Data Management Maturity Model (DMM)
Data Management
Strategy
DataGovernance
DataQuality
Platform &Architecture
DataOperations
![Page 14: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/14.jpg)
The Capability Maturity Model
Process
Control
Process
Measurement
Process
Definition
Basic
Management
Control
Initial
(1)ad hoc Process
Repeatable
(2)Stable Process
Defined
(3)Standard Process
Managed
(4)Measured Process
Optimizing
(5)Improving Process
Consistent
Execution
Controlled
Environment
Quality and
Productivity
Improvement
Continuing
Improvement
Chaotic
![Page 15: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/15.jpg)
Form & Substance
Data Management
Strategy
DataGovernance
DataQuality
Platform &Architecture
DataOperations
FORM• Data Structure and
Context• The definition and
meaning of the data
CONTENT• Data Content• Data Quality
dimensions and standards
MetadataIntelligence
![Page 16: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/16.jpg)
Data Vulnerability
DATAArchitecture
WHAT?
WHERE? WHO?
HOW?
Network
Architecture
Security
Architecture
RISK ASSESSMENT
• Classification• Valuation• Detection• MitigationApplication
Architecture
![Page 17: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/17.jpg)
Data Risk Assessment
• Classification• Valuation• Detection• Mitigation
![Page 18: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/18.jpg)
Risk Assessment: Classification
“Data is a Managed Corporate Asset”
Not all assets need to be managed the same way!
137Sales Revenue Amount Tower of Tuna Count
![Page 19: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/19.jpg)
Classification
Carolus Linnaeus
Aristotle
![Page 20: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/20.jpg)
Railway Asset Classification
Uniform Classification of Accounts (UCA)
• Purpose:
o The purpose of the UCA is to define the method of accounting for railway companies subject to regulation by the Canadian Transportation Agency (Agency).
• E.g. Equipment
o Rolling Stock – Revenue Service
• 171 Locomotives
![Page 21: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/21.jpg)
Subject Area Model
![Page 22: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/22.jpg)
UCA - Data – Asset/Expense ?
General Expenses• The accounts in this activity group are designed
to record costs related to the railway company as a whole.
• 801 Management Serviceso Include the costs of corporate and rail functions of a
staff nature which provide services to other management groups, including administrative and office services (including cafeterias, libraries, etc.), investigation and security, medical services, legal services, information systems and data processing, and research and development.
![Page 23: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/23.jpg)
Data Risk Assessment
• Classification• Valuation• Detection• Mitigation
![Page 24: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/24.jpg)
Risk Assessment: Valuation
Monetize Data Assets ?
![Page 25: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/25.jpg)
More than classification – Rules!
• 271 Locomotives - Accumulated Amortization
o Record accumulated amortization of account 171 - Locomotives.
o Record by type of locomotive as set out in schedule A. (Section 1901)
• 501 Locomotive Maintenance
o Include the cost of repairing locomotives.
o Record according to schedule A (section 1901).
o Reference: Instruction 1502.04
• 503 Locomotive Servicing
o Include the cost of servicing locomotives. Record according to schedule A (section 1901).
o Reference: Instruction 1502.04
• 971 Locomotives - Amortizationo Include the amortization expense assessed for account 171 - Locomotives.
o Record according to schedule A. (Section 1901)
![Page 26: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/26.jpg)
Data Asset Prioritization
Critical data elements
• (CDEs) are defined as “the data that is critical to success” in a specific business area (line of business, shared service, or group function), or “the data required to get the job done.”
Competing with High Quality Data: Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality
by Rajesh JugulumJuly 2014
![Page 27: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/27.jpg)
Privacy• Personal information• Personal Financial
information • Non-personal
information
Critical Data Element - Risk
Accessibility• Secure - Internet• Monitored - Extranet• Unsecure - Internet
Reliability• Trusted• Verifiable• Un-trusted
Confidentiality• Sensitive• Confidential• Internal Use • Public
![Page 28: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/28.jpg)
Privacy• Personal information• Personal Financial
information • Non-personal
information
Critical Data Element - Risk
Accessibility• Secure - Internet• Monitored - Extranet• Unsecure - Internet
Reliability• Trusted• Verifiable• Un-trusted
Confidentiality• Sensitive• Confidential• Internal Use • Public
![Page 29: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/29.jpg)
Data Risk Assessment
• Classification• Valuation• Detection• Mitigation
![Page 30: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/30.jpg)
Risk Assessment: Detection
Courtesy ASG.
F O R MC O N T E N T+
Anatomy of a Data Element
![Page 31: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/31.jpg)
Data Governance Capabilities
Governance Management
Business Glossary
Metadata Management
DataGovernance
Best practices for ensuring broad participation in the practice and senior oversight of the effectiveness of data management.
![Page 32: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/32.jpg)
Stewardship
Everybody’s business is Nobody’s business, and Nobody’s business is My business
Clara Barton
![Page 33: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/33.jpg)
Form vs. Content
• BASIC TABULAR STRUCTURE
![Page 34: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/34.jpg)
Form - Row & Column Stewards
Governance Stewardship• Data Metadata - Party
who is responsible for the decision about WHAT data the enterprise will collect and maintain the data represented by the Column
Process Stewardship
• Process Metadata - Party who is responsible for the decision about HOW the enterprise will collect and maintain the data represented by the Row
![Page 35: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/35.jpg)
Content Stewards
• Data Qualification Stewardship
o Compliance Metadata - Party who is responsible for qualifying entries per the constraints on the data.
![Page 36: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/36.jpg)
Glossary - Critical Data Element
• Business Term– Name– Description– Workflow Status– Abbreviation – Acronym– Synonym
• Term Type– Topic
• Term– Qualified Term
(element)
• Origin• System of Reord• Business Rule• Authority• Scope• Organization• Domain
BusinessTerm
BusinessTerm
Multiple
![Page 37: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/37.jpg)
Data Quality Capabilities
Data Quality Strategy
Data Profiling
Data Quality Assessment
Data Cleansing
DataQuality
Best practices for defining and implementing a collaborative approach for detecting, assessing, and cleansing data defects to ensure fitness for intended uses in business operations, decision making, and planning.
![Page 38: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/38.jpg)
Data Quality Issues
ETL
ACCOUNTABILITY
![Page 39: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/39.jpg)
UCA – Data Quality
Section 1602 Instructions Relating to Particular Groups of Statistics
• Records Rejected
• 1602.04 For computerized data bases used in the development of operating statistics from waybills and conductor's journals, records shall be maintained of data rejected due to uncorrected error conditions.
![Page 40: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/40.jpg)
Measurement
DataQuality indicators
Metadata Repository Report
![Page 41: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/41.jpg)
Data Quality Dimensions
1. Accuracy – criteria related to affinity with original intent, veracity as compared to an authoritative source, and measurement precision
2. Completeness –criteria related to the availability of required data attributes
3. Coverage – criteria related to the availability of required data records
4. Conformity – criteria related to alignment of content with required standards
5. Consistency – criteria related to compliance with required patterns and uniformity rules
6. Duplication – criteria related to redundancy of records or attributes7. Integrity – criteria related to the accuracy of data relationships
(parent and child linkage) 8. Timeliness – criteria related to the currency of content and
availability to be used when needed
![Page 42: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/42.jpg)
Conformity, Duplication, Masking
MASK &CAMOFLAGUE
![Page 43: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/43.jpg)
Data Quality going Forward
OBSERVATIONAL Analytics
ALGORYTMIC Analytics
DQ%
DQ%
![Page 44: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/44.jpg)
Data Risk Assessment
• Classification• Valuation• Detection• Mitigation
![Page 45: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/45.jpg)
Risk Assessment: Mitigation
Data Traceability Ecosystem
Business Domain
IT Domain
![Page 46: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/46.jpg)
Metadata Driven Impact Analysis
Business Domain
Technology Domain
PhysicalData Model
ConceptualData Model
Business Glossary
DATABASE
LogicalData Model
Middle Out MetadataRepository
![Page 47: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/47.jpg)
Forensic Metadata
Study exposes social media sites that delete photographs’ metadata.
http://www.embeddedmetadata.org/social-media-test-results.php
![Page 48: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/48.jpg)
UCA Data + Metadata
Section 1102 Records
• 1102.02 Records are to be maintained in a manner facilitating review, audit and tracing of transactions to source data. Where full information on transactions is not recorded in the general books of a carrier the entries therein shall be supported by other records, suitably cross-referenced, containing such information.
![Page 49: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/49.jpg)
Metadata Integration
The integration ofbusiness and technical
metadata has become the holy grail of Data Governance.
Rick Sherman DM Review Magazine
“But just like the holy grail, it seems to be a never-ending quest fueled by the belief that technology is going to solve all our problems.”
![Page 50: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/50.jpg)
TMDDatabase Column
Business & Technical Metadata
BMDBusiness Term
ASSOCIATIVE ENTITY
![Page 51: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/51.jpg)
Business Glossary - Taxonomy
Pinot Noir
France
Country
Red
Type
Burgundy
Region
Light
Body
Index for Searching
![Page 52: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/52.jpg)
Taxonomy VS Ontology
Taxonomy • General - the practice and science of
classification of things or concepts• Corporate taxonomy, the hierarchical
classification of entities of interest to an enterprise, organization or administration
Business
Glossary
Business
Information
Model
Ontology• Information Science, fformal naming and
definition of the types, properties, and interrelationships of the entities that exist for a particular domain of discourse.
![Page 53: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/53.jpg)
Data Governance Metamodel
BusinessTerm
DataElement
ASSOCIATIVE ENTITY
Data Element
KEYS
Subject Area• Entity
• AttributeRelationship
BusinessTermBusiness Concept
or Category• Business Term
• Qualified Term (Element)
Relationship
?????
Business
Information
Model
Technical
Data
Model
![Page 54: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/54.jpg)
Risk Governed DataBusiness InformationModel
TechnicalData
Model
DATA MOVEMENT
LINEAGE
CDE SEMANTIC
LINEAGE
![Page 55: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/55.jpg)
Finding Critical Data Elements
![Page 56: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/56.jpg)
Data Reference Model
![Page 57: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/57.jpg)
Identifying Critical Data Elements
RegulatoryCompliance
![Page 58: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/58.jpg)
Critical Master Data
CustomerProduct
Process
Location
Calendar
$
42
Transaction Molecule
![Page 59: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/59.jpg)
Big Data Model
MODEL
![Page 60: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/60.jpg)
Business Terms
‘The ‘Wisdom of Crowds”
The author suggests that a crowd (or group) is usually
more accurate than an expert alone
![Page 61: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/61.jpg)
Critical Data Element Lifecycle
CriticalData
ElementGovernance
Search for term
Maintain Term
Retire Term
Identify New Term
Review Term
Approve Term
Publish Term
![Page 62: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/62.jpg)
Data Management Maturity Model (DMM)
Data Management
Strategy
DataGovernance
DataQuality
Platform &Architecture
DataOperations
MetadataIntelligence
CriticalData Elements
Roles &Responsibilities
DataLifecycle
DataStandards
![Page 63: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/63.jpg)
Business/Technology StrategyBusiness Domain Technology Domain
Business Information Model
Technical Data Model
INNOVATION& CHANGE
TECHNOLOGYPROJECTIONS
Business Strategy
TechnologyStrategy
ALIGNMENT
DATA GOVERNANCE
BusinessOperating
Model
Data Mgmt.Operating
Model
CRITICALDATA ELEMENT
![Page 64: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/64.jpg)
Not Just Data
BusinessDynamics
Model
SystemDynamics
Model
FunctionDynamics
Model
PROCESS
Business Information
Model
Logical Data Model – TO BE
Data DeliveryModel
DATA
Logical Data Model – AS IS
Reverse Engineered
Physical Model
![Page 65: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/65.jpg)
Data Standards
Measure = ObservationStandard
"You can't manage, what you can't measure”
You can’t measure,what you can’t define
![Page 66: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/66.jpg)
More than just a firewall
![Page 67: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/67.jpg)
IT Domain Traceability
Data
Customer
Name
Order
Order Number
Package
Package ID
• Logical Name• Physical Name• Unstructured Data
Application
Customer
Shop On Line
Deliver Order
• ERP Systems• Application Services• Integration
SecurityOrder PackagePurchase
Product
Customer
Process
Order
• Access• Definitions• Processes• Organizations
Network
• Servers• Cloud• Mobile
GOVERNANCE
![Page 68: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/68.jpg)
Enterprise Traceability
Data
Ne
two
rk
Secu
rity
Application
PRODUCT
PLA
CE PA
RTY
PROCESS
Technology Domain
Business Domain
![Page 69: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/69.jpg)
In Summary
• Classificationo Definitions & Standards
• Identifying and defining their information, and establishing business standards for it.
• Valuationo Quality criteria
• Establishing quality controls and monitoring quality of information for accuracy, timeliness, consistency, validity, completeness, redundancy and impact across projects.
• Detectiono Protection & Risk
• Classifying information to ensure appropriate protection in accordance with privacy and information security policies, and relevant standards.
• Mitigationo Life-Cycle
• Providing leadership and direction for information from its collection or creation through to its retention or disposal based on business, regulatory and legal requirements. How information is to be used, disseminated and maintained throughout the life-cycle.
![Page 70: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/70.jpg)
How to Get Started ?
”... please which way I ought to go from
here?"
"That depends a good deal on where you
want to get to," said the Cat.
"I don't much care where----" said Alice.
"Then it doesn't matter which way you
go," said the Cat.
NEED A MAP
YOU ARE HERE
SandhillDMM
Assessment
CMMI - Data Maturity
Model (DMM)
![Page 71: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/71.jpg)
Data Management Maturity Assessment
POWEROF 3
EDME
![Page 72: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/72.jpg)
Metadata Intelligrnce 2.0?
• Metadata Lifecycle
• Integration of Non-textual Metadata
• Cross pollination of Metadata Standards
o Semantic Web
• Resource Description Framework (W3C)
• Dublin Core (Non W3C)
o ISO (Geographic)
![Page 73: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/73.jpg)
EM-SOS!
Data
Management
Strategy
Platform &Architecture
DataOperations
Data
Management
Maturity
Model
DataQuality
DataGovernance
Data Structure
Modeling
Data Content
Modeling
Data Standards
Modeling
Data Lifecycle
Modeling
Business/Data
Strategy
Helping Clients Understand and Manage
the Form and Substance of Their Data.
EMSOS!
SANDHILL
DMM Assessment
Power Designer
Capability
Delivery Solutions
![Page 74: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/74.jpg)
Data
Governance
Capability
Delivery System
![Page 75: Metadata Intelligence - Torornto - 2016-11...Metadata Intelligence and the CMMI Data Maturity Model Protecting Critical Data Wed. Nov. 16, 2016 Don Soulsby Sandhill Consultants Information](https://reader033.vdocuments.site/reader033/viewer/2022052611/5f05524b7e708231d41262fc/html5/thumbnails/75.jpg)
Tibetan Proverb
“ If upstream is dirty,
downstream will be muddy”
[shuǐtóu] [bù] [qīngshuǐ] [wěi] [hún]