Enterprise Information Management - From Strategy to Implementation
Start Date | End Date | Country | City | Days | Price | |
No Event date Found |
Overview
Audience
Learning Objectives
Presenter
- What is EIM and why is it needed?
- Key requirements for EIM
- Structured data – master, reference and transaction data
- Semi-structured data – JSON, XML, email
- Unstructured data - text, video, audio
- Dealing with new data sources - cloud data, sensor data, social media data, smart products (the internet of things)
- Understanding EIM scope
- OLTP systems
- Data Warehouses
- Big Data systems
- MDM and RDM systems
- Data virtualisation
- Messaging, ESBs and process data flows
- Enterprise Content M’gmt
- Building a business case for EIM
- The impact of unmanaged data on business performance
- Defining a strategy for EIM
- Resources - key roles and responsibilities
- Getting the organisation and operating model right
- Types of EIM policy
- Data integrity rules
- Data validation rules
- Data cleansing rules
- Data integration rules
- Data provisioning rules
- Data privacy rules
- Data access security
- Formalising EIM processes, e.g. the dispute resolution process
- EIM in your enterprise architecture
MODULE 2: EIM METHODOLOGY & TECHNOLOGIES
Having understood strategy, this session looks at methodology for EIM and the technologies needed to help apply it to your data to bring it under control. It also looks at how EIM platforms provide the foundation in your enterprise architecture to manage information across the enterprise
- A best practice step-by-step methodology for EIM and data governance
- Define, Identify, Assess, Integrate, Provision, Monitor, Protect and Secure
- The EIM technology platform
- The EIM Marketplace: Actian, Global IDs, IBM InfoSphere, Informatica, Oracle, SAP, SAS, Talend
- The EIM platform in your enterprise architecture
- EIM implementation options
- Centralised, distributed or federated
- Self-service BI – the need for data governance at the edge
- EIM on-premise and on the cloud
MODULE 3: EIM IMPLEMENTATION – DATA STANDARDISATION & THE BUSINESS GLOSSARY
This session looks at the first step in EIM – the need for data standardisation. The key to making this happen is to create common data names and definitions for your data to establish a shared business vocabulary (SBV). The SBV should be defined and stored in a business glossary.
- Semantic data standardisation using a shared business vocabulary
- SBV vs. taxonomy vs. ontology
- The role of a SBV in MDM, RDM, SOA, DW and data virtualisation
- Approaches to creating an SBV
- Enterprise Data Models & the SBV
- Business glossary products
- ASG, Collibra, Global IDs, Informatica, IBM InfoSphere Business Glossary, SAP Information Steward Metapedia, SAS Business Data Network
- Planning for a business glossary Organising data definitions in a business glossary
- Business involvement in SBV creation
- Using governance processes in data standardisation
- Enterprise Data Modelling using a SBV
MODULE 4 – DATA DISCOVERY, DATA QUALITY PROFILING, CLEANSING & INTEGRATION
Having defined your data, this session looks at the next steps in an EIM methodology, discovering where your data is and how to get it under control
- Implementing systematic disparate data and data relationship discovery
- Data discovery tools Global IDs, IBM InfoSphere Discovery Server, Informatica, Silwood, Sypherlink, SAS DataFlux
- Automated data mapping
- Data quality profiling
- Best practice data quality metrics
- Key approaches to data integration – data virtualisation, data consolidation and data synchronisation
- Generating data cleansing and integration services using common metadata
- Taming the distributed data landscape using enterprise data cleansing and integration
- The Enterprise Data Refinery - Hadoop as a staging area for enterprise data cleansing and integration
- Data provisioning – provisioning consistent information into data warehouses, MDM systems, NoSQL DBMSs and transaction systems
- Provisioning consistent on-demand information services using data virtualisation
- Achieving consistent data provisioning in a SOA
- Consistent data management across cloud and on-premise systems
- Data Entry – implementing an enterprise data quality firewall
- Data quality at the keyboard
- Data quality on inbound and outbound messaging
- Integrating data quality with data warehousing & MDM
- On-demand and event driven Data Quality Services
- Monitoring data quality using dashboards
- Managing data quality on the cloud
MODULE 5: MASTER DATA & REFERENCE DATA MANAGEMENT
This session introduces master data management and looks at why businesses are serious about introducing it. It also looks at the components of an MDM and RDM system and the styles of implementation.
- Reference Data vs. Master Data
- What is Master Data Management
- Why is MDM needed? - benefits
- Components of a MDM solution
- How does MDM fit into a SOA?
- MDM implementation options –Master Data Synchronisation vs. Virtual MDM. Single Entity Hub vs. Enterprise MDM
- Identifying candidate entities
- Understanding master data creation and maintenance
- Master data implementation
- Defining an SBV for master data entities
- Hierarchy Management
- Master data modelling
- Disparate master data discovery and mapping
- Disparate master data profiling
- Creating a master data hub using data cleansing and integration
- Implementing master data synchronisation
- Identifying and re-designing master data business processes
- The MDM solution marketplace
- Evaluating and combining MDM products
- Integration of MDM solutions with EIM platforms
- Integrating MDM with enterprise portals
- Sharing access to master data via master data services in a Service Oriented Architecture (SOA)
- Leveraging SOA for data synchronisation
- Integrating MDM with operational applications and process workflows
- Using master data to tag unstructured content
MODULE 6: TRANSITIONING TO ENTERPRISE MDM – THE CHANGE MANAGEMENT PROCESS
This session looks at the most difficult job of all – the change management process needed to get to enterprise master data management. It looks at the difficulties involved, what really needs to happen and the process of making it happen.
- Starting a MDM change management program
- Changing data entry system data stores
- Changing application logic to use shared MDM services
- Changing user interfaces
- Leveraging portal technology for user interface re-design
- Leveraging a service oriented architecture to access MDM shared services
- Changing ETL jobs to leverage master data
- Hierarchy change management in MDM and BI systems
- Transitioning from multiple data entry systems to one data entry system
- Transitioning change to existing business processes to take advantage of MDM
- Planning for incremental change management
MODULE 7: EIM FOR BIG DATA & DATA WAREHOUSES
This session looks at how EIM methodology and processes can be applied to managing, governing and provisioning data in a Big Data analytical ecosystem and in traditional data warehouses. How do you deal with very large data volumes and different varieties of data? How does loading data into Hadoop differ from loading data into a data warehouse? What about NoSQL databases? How should low-latency data be handled? Topics that will be covered include:
- Types of Big Data
- Connecting to Big Data sources, e.g. web logs, clickstream, sensor data, unstructured and semi-structured content
- The role of information management in an extended analytical environment
- Supplying consistent data to multiple analytical platforms
- Best practices for integrating and governing multi-structured and structured Big data
- Dealing with data quality in a Big Data environment
- Loading Big Data – what’s different about loading Hadoop files versus NoSQL and analytical relational databases
- Data warehouse offload – using Hadoop as a staging area and data refinery
- Governing data in a Data Science environment
- Joined up analytical processing from ETL to analytical workflows
- Mapping discovered data of value into your DW and business vocabulary
- Big data protection
MODULE 8: INFORMATION AUDIT & PROTECTION – THE FORGOTTON SIDE OF EIM
Over recent years we have seen many major brands suffer embarrassing publicity due to data security breaches that have damaged their brand and reduced customer confidence. With data now highly distributed and so many technologies in place that offer audit and security, many organisations end up with a piecemeal approach to information audit and protection. Policies are everywhere with no single view of the policies associated with securing data across the enterprise. The number of administrators involved is often difficult to determine and regulatory compliance is now demanding that data is protected and that organisations can prove this to their auditors. So how are organisations dealing with this problem? Are data privacy policies enforced everywhere? How is data access security co-ordinated across portals, processes, applications and data? Is anyone auditing privileged user activity? This session defines this problem, looks at the requirements needed for Enterprise Data Audit and Protection and then looks at what technologies are available to help you integrate this into you EIM strategy
- What is Data Audit and Security and what is involved in managing it?
- Status check - Where are we in data audit, access security and protection today?
- What are the requirements for enterprise data audit, access security and protection?
- What needs to be considered when dealing with the data audit and security challenge?
- What about privileged users?
- What technologies are available to tackle this problem? – IBM Optim and InfoSphere Guardium, Imperva, EMC RSA
- How do they integrate with Data Governance programs?
- How to get started in securing, auditing and protecting you data