WASHINGTON, Oct. 2, 2017 /PRNewswire/ -- This afternoon, Peter L. Levin, co-founder and CEO of Amida Technology Solutions, Inc. (Amida), and former CTO at the U.S. Department of Veterans Affairs, will discuss "Modern Data Management: Exploring the Root Problem and Way Forward," at the first ever Washington Big Data conference at the Walter E. Washington Convention Center.
"Most people do not realize the extent of their vulnerability and exposure to data breach," says Mr. Levin. "Poorly managed data is poorly secured data. Enterprises who keep personal data on individuals have a moral responsibility to know what data they have, where it is, and who can access it."
Mr. Levin will walk the audience through the basic problem underlying many big data applications: static inventories and fractured policies. This situation is the result of paying more attention to people-facing applications than to the data fuel that drives them.
Many enterprises are hampered by their data management infrastructure. When new services or capabilities are brought online, IT departments work diligently to integrate them with the legacy systems, but rarely consider where the data is coming from and how it is used or re-used. Stepping back to ask and answer the following questions will pay big dividends:
- What data do we have, where is it located, and how is it stored and updated?
- Who has access to the data?
- Who is responsible for maintaining the structure?
- Can the data be repurposed?
- How do we enforce data quality across all enterprise systems?
The unequivocal answer, Mr. Levin states, is an ongoing, actively managed, data governance program. "Discover your data, understand its schema, create a roster of who has access to it, and codify the rules and responsibilities for each of those parties," he advises.
Mr. Levin further asserts, "We can have business and public sector agencies who properly control and secure their data. It takes effort and planning to create coherent and reusable models in frameworks that are compliant with security, privacy, and regulatory requirements. Some folks might find it unglamorous in the age of mobile apps, but it's the low-profile critical infrastructure that enables safe life-changing services. I bet there are some high-profile folks in the news these days who are longing for less 'exposure'."
SOURCE Amida Technology Solutions