Post on 15-May-2018
JPK
Gro
upBusiness Forecasting and Analytics Forum
September 19-20 • Chicago, IL
Data Monetization
September 20, 11:00am
Sarah Reeser, PMP, ITIL, CISM brings 20+ years of leading within domestic and
international teams to provide technology enabled business solutions and services,
specifically accommodating those organizations that have gone through acquisitions,
mergers and separations. She has led many large projects and efforts within various
industries, including, Banking/Capital Markets, Healthcare/Life Sciences, Insurance,
Manufacturing, Energy/Technology, Consumer/Retail, Travel/Transportation and
Government. Sarah believes in being a “silo-surfer” and taking a holistic approach to
leading projects. She has expertise in facilitating interactive cooperation, consensus,
and commitment with stakeholders, business users, and team members.
View presentation online at:
https://jpkgroupsummits.com/attendee5
Sarah Reeser – Chicago Transit Authority (CTA)
Ways to Monetizing Data while Respecting Privacy
S A R A H R E E S E R , P M P , I T I L , C I S M
S E N I O R M A N A G E R D A T A A N A L Y T I C S P R O J E C T S
C H I C A G O T R A N S I T A U T H O R I T Y
DATA MONETIZATION WHILE RESPECTING PRIVACY
Mitigating steps and strategies around addressing some of
the most common risks associated with data monetization,
while maximizing on the value of opportunity.
SARAH REESER, PMP, ITIL, CISM
Data Monetization while respecting
privacy2
PMP – PROJECT MANAGEMENT PROFESSIONALITIL – INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARYCISM – CERTIFIED INFORMATION SECURITY MANAGER
Believes in being a “silo-surfer” and taking a holistic approach to leading projects.
Has expertise in facilitating interactive cooperation, consensus, and commitment with stakeholders, business users, and team members.
Vast experience working with multiple methodologies and attention to the ‘details’ has given her the ability to assist organizations in bringing the awareness around ‘business impacts’ of their respective operational processes, applications, data interfaces and back office systems to exceed business, security, compliance and customer needs.
Big 4 advisory service providers have sought to bring in Sarah to consult for their respective clients to problem solve business challenges in blending technology, mining and joining data from multiple sources while applying data governance best practices.
Her new role at the Chicago Transit Authority is exciting as she feels like she has arrived to a destination where the opportunities are endless to leverage data and technology to link people, jobs and communities.
Sarah Reeser, PMP, ITIL, CISM
Data Monetization while respecting
privacy3
Sarah Reeser, PMP, ITIL, CISM
Collaborative Rolls
•Senior IT Project/Program Manager
• IT Risk and Compliance
• IT Data Center Operations
• Internal Audit Coordination
• IT Outsourcing and Vendor Management
• Finance Governance
• Business Continuity
• Software Delivery
•Data Analytics
•Contract Oversight
Clients and Industry
Experience
Brings 20+ years of leading within domestic and international teams to provide technology enabled business solutions and services, specifically accommodating those organizations that have gone through acquisitions, mergers and separations.
Including, Banking/Capital Markets Healthcare/Life Sciences, Insurance, Manufacturing, Energy/Technology, Consumer/Retail, Travel/Transportation and Government.
• AbbVie
• Addeco
• Accenture
• Allstate
• Aon
• Avanade
• Cadence Health
• Chicago Transit
Authority
• CSC
• Experis
• Exelon
• Farmers Insurance
• IBM
• KPMG
• McKinsey &
Company
• Mutual of Omaha
• Northern Trust
• Novartis
• Pfizer Animal
Health
• PWC
• State of Nebraska
• Sears
• Smiths Group
• Structured
Communications
• Taproot
Foundation
• Tek Systems
• United Airlines
• Zurich
Sarah Reeser, PMP, ITIL, CISM
Companies are facing
a growing challenge:
how to use vast
amounts of data about
individuals they now
gather to create
greater value for their
businesses and
customers without
crossing the line into
unethical, unlawful or
unwanted use.
Data-Use governance
can unlock business
value and mitigate risk.
Data Monetization while respecting
privacy4
Sarah Reeser, PMP, ITIL, CISM
PMO - PROJECT MANAGEMENT INVOLVES COLLECTING DATA, ANALYZING THE DATA, & MAKING DECISIONS BASED ON IT.
Data Monetization while respecting
privacy5
Opportunities of where to apply and leverage
Data-Use governance
Sarah Reeser, PMP, ITIL, CISM
DATA MONETIZATION WHILE RESPECTING PRIVACY
• Data monetization introduces challenges businesses won't be able to ignore.
• Over half of global leaders see data analytic technologies as generating the greatest return for stakeholder engagement.
• The key challenge is for companies to find the right balance between using data to create greater value while mitigating the risks inherent in doing so.
Data Monetization while respecting
privacy6
Sarah Reeser, PMP, ITIL, CISM
CORPORATE USE OF DATA CAN INVOLVE SIGNIFICANT RISK
1. Lack of awareness about Data Collection
2. Data being compromised, stolen, misused
3. Making wrong decisions because of ‘bad’ data
4. Failing to comply with increasingly complex global
regulations
5. Missing out on opportunities due to an overly
cautious approach to data use
Data Monetization while respecting
privacy7
Sarah Reeser, PMP, ITIL, CISM
DATA COLLECTION
• Framework(s) Defined• Determine and define where you want
to be and where you want to go.
• Assessments to determine:• Determine where you are• Data Ownership/Data Custodian• Data User - what information is used,
what is needed• Identify what are the gaps in you
framework
• Collaboration Sites• To collect, organize and have a central
repository• Access and Authorization
• Train as you go
Data Monetization while respecting
privacy8
Lack of Data Awareness
- Not fully aware of how much data they are collecting, how is it protected, where it is stored.
- Missed business opportunities, but also
can add unnecessary risk.
THE CHALLENGE
Mitigating steps and strategies:
Sarah Reeser, PMP, ITIL, CISM
DATA BEING COMPROMISED, STOLEN, MISUSED
• Data Governance• Security Controls• Data Loss Prevention Program (DLP)• Assessments to determine:
• Data Ownership/Data Custodian• Data User - what information is used,
what is needed• Identify what are the gaps in you
framework
• Collaboration Sites• Access and Authorization Reviews• Train and educate as you go!• Outsourcing controls in sourcing
Management.
Data Monetization while respecting
privacy9
Data being compromised, stolen,
misused.
- HIGH PROFILE DATA BREACHES
- PRIVACY AND SECURITY RISKS
- DATA BLACK MARKET
THE CHALLENGE Mitigating steps and strategies:
Sarah Reeser, PMP, ITIL, CISM
BAD DATA
Data Monetization while respecting
privacy10
The data could be old or its source
can be unknown. Putting companies
and management in a precarious
position it decides to use that data in
a high-impact or high-profile way.
The results could be relatively benign,
such as mild embarrassment, OR it
could be extremely serious where
discussions affect someone’s health
or life.
THE CHALLENGE
DATA Governance Strategy and Framework
Assessments to determine:◦ Determine where you are and what you
have.◦ Data Ownership/Data Stewart/Data
Custodian◦ Data User - what information is used, what is
needed◦ Identify what are the gaps are in
comparison to your framework
Collaboration Sites◦ To collect, organize and have a designated
central repository
Access and Authorization Reviews
Train as you go
Form a relationship with your CISO or Information Security
Mitigating steps and strategies:
Sarah Reeser, PMP, ITIL, CISM
INCREASINGLY COMPLEX GLOBAL REGULATIONS
Data Monetization while respecting
privacy11
Regulatory strength is growing as governments step up their responses to concerns over data privacy and how data is used.
Relatively minor gaps in privacy controls now can result in substantial monetary damages (ie. GDPR -4% of companies revenue for violating this law)
Courts are becoming more activists.
Approaches to regulating privacy vary significantly across the globe.
THE CHALLENGE
DATA MINIMIZATION
◦ Limiting the collection of data, and retaining
that data for a set period of time rather than
indefinitely.
Assessments to determine:
◦ Determine where you are
◦ Data Ownership/Data Custodian
◦ Data User - what information is used, what is
needed
◦ Identify what are the gaps in you framework
Collaboration Sites
◦ To collect, organize and have a central
repository
Access and Authorization Reviews
Train as you go
Form a relationship with your CISO or Information Security
Form a relationship with Legal
Mitigating steps and strategies:
Sarah Reeser, PMP, ITIL, CISM
MISSING OUT ON OPPORTUNITIES DUE TO AN OVERLY CAUTIOUS APPROACH TO DATA USE
Data Monetization while respecting
privacy12
Being ‘overly cautious’ and choose to simply not use collected data.
Missed business opportunities to create
value and gain a competitive advantage.
THE CHALLENGE
Have a clear vision how to safely use data.
Understand possible negative
consequences associated with the data
collection and use.
Access and Authorization Reviews
Train as you go
Form a relationship with your CISO or
Information Security Group
Form a relationship with Legal.
Mitigating steps and strategies:
Sarah Reeser, PMP, ITIL, CISM
QUESTIONS
Data Monetization while respecting
privacy13