SlideShare a Scribd company logo
Case study: Implementing
Data Governance and
ISMS at UNSW
Kate Carruthers
Version 1.0
March 2017
Classification: PUBLIC
This case study covers the complexities of implementing
data & information governance and an information &
security management system as part of a broader
cybersecurity framework at an institution like UNSW
Australia. It explores some of the unique challenges of
securing an institution that has over 50,000 students and
which undertakes research that ranges from open data to
personally identifying patient information.
16/08/2017 Data & Information Governance Office 1
Fast facts
16/08/2017 Data & Information Governance Office 2
The Group of Eight (Go8) is a
coalition of leading Australian
universities, intensive in research
and comprehensive in general and
professional education.
The Global
Alliance of
Technological
Universities is a
network of the
world’s top
technological
universities
APRU is a network of 45 premier
research universities from 16
economies around the Pacific Rim.
Universitas 21 is
the leading
global network of
research-intensive
universities.
The PLuS (Phoenix London Sydney) Alliance combines the
strengths of three leading research universities on three continents
to develop innovative solutions to these challenges in global health,
social justice and sustainability while progressing the responsible
innovation of advanced technologies
Alliances
16/08/2017 Data & Information Governance Office 3
16/08/2017 Data & Information Governance Office 4
Diverse user community
16/08/2017 Data & Information Governance Office 5
3 realms of data
16/08/2017 Data & Information Governance Office 6
Learning &
Teaching
Research
Administrative
Enterprise systems
Local Faculty-based
systems
Systems of record
Learning Management
Lecture recording
MOOCs
Research data
Publications
Cultural issues
Academic freedom
Inventing the future
We know what we’re doing
I’ve got a PhD and you don’t
16/08/2017 Data & Information Governance Office 7
16/08/2017 Data & Information Governance Office 8
Cybersecurity and enterprise risk
management are a key focus for
Council and Management
Data & information governance are a
key foundation for cybersecurity
Cybersecurity and enterprise risk
management are a key focus for
Council and Management
Data & information governance are a
key foundation for cybersecurity
Management
16/08/2017 Data & Information Governance Office 9
Data & information governance are a
key foundation for cybersecurity
16/08/2017 Data & Information Governance Office 10
16/08/2017 Data & Information Governance Office 11
16/08/2017 Data & Information Governance Office 12
Responses to the hack
War room
Perimeter defences
Visibility at Council level
Risk register
Appointment of dedicated Info Sec resources
16/08/2017 Data & Information Governance Office 13
Threats
1. Phishing, Whaling/Spear Phishing
2. Ransomware
3. DDOS/Zombie botnet armies
4. Big data
5. Ignorance
16/08/2017 Data & Information Governance Office 14
16/08/2017 Data & Information Governance Office 15
Work plan
16/08/2017 Data & Information Governance Office 16
Setup policy
framework
Re-establish Data
Governance
Committees
Establish Data
Ownership structure
Identify ‘Crown
Jewels’
Implement Data
Classification
Implement System
Classification
Implement ISMS
Implement Business
Glossary Tool
Implement Data
Quality Process
Implement Internal
Data Sharing
Agreements
Implement Reference
Data Management
Implement Master
Data Management
Done PlannedKey: In progress
The 4 dimensions Framework:
• provides enterprise wide roles and responsibilities to be accountable for decisions related to data assets
• establishes policies & procedures to manage the data assets
• provides diverse tools for managing operational data tasks
UNSW Data Governance Framework focuses on the oversight, guidance and quality
of enterprise data assets enabled through People, Policies, Procedures and Tools
Policies are high level statements that
provide context for strategic decisions
relating to the data assets
People are members of UNSW governance
bodies, which hold the authority for decision
relating to data assets
Tools are pre-prepared objects that support
people carrying out procedures
Procedures are specific instructions
designed to ensure policy is followed and
outcomes are measurable
Workflow for
Approval
Checklists
Issues
Register
Data Profiling
Data Sharing
Data Reporting
Regulatory
Compliance
Data Asset
Prioritisation
Data Exchange
Agreements
Data Process Flow
Data Integration
Data Security
Strategic Drivers
Dimensions
Enterprise
Oversight of Data
Enterprise
Guidance on Data
Enterprise
Quality of Data
Performance
Metrics
Policies Procedures Tools
Data Executives
Data Owners
Data Stewards
People
Data Creators/
Data Specialists
1 2 3 4
16/08/2017 Data & Information Governance Office 17
Alignment - Legal, Privacy, IT & Info Sec
Mar-2017 Data & Information Governance 18
Information literacy
Data driven improvements
Policies &
Standards
Information
Quality
Privacy,
Compliance,
Security
Architecture,
Integration
Establish
Decision Rights
Stewardship
Assess Risk &
Define Controls
Consistent Data
Definitions
Adapted from University of Wisconsin Data Governance Framework
Fundamentals
Data ownership
Data classification
Data handling guidelines
ISMS Standards
16/08/2017 Data & Information Governance Office 19
Boundaries between
Data Governance &
IT teams –
collaboration is
critical
Data Classification
16/08/2017 Data & Information Governance Office 5
Data Classification Example Data Types
Highly Sensitive
Data subject to regulatory control
Medical
Children & Young persons
Credit Card
Research Data (containing personal medical data)
Sensitive
Student and Staff HR data
Organisational financial data
Exam material
Exam Results
Research Data (containing personal data)
Private
Business unit process and procedure
Unpublished Intellectual property
ICT system design & configuration information
Public
Faculty and staff directory information
Course catalogues
Published research data
Data classification process
16/08/2017 Data & Information Governance Office 21
Apply the controls
Apply data classification to the Information Asset
Assess data risks
Identify the Information Assets
Identify the Data Owner
ISMS
16/08/2017 Data & Information Governance Office 22
UNSW
Faculties/Divisions/Affiliates
Critical Apps
Critical Apps
Critical Apps
Critical Apps
CMDB
Cloud/Internet
Faculty
Security Forums
Security approach
Data Collection & Validation or Verification
Reporting of potential threats/risks and compliance – e.g. Heat maps to Security Forums
in each Faculty
Risk Workshops
Mitigation action plans
Ongoing Compliance Maintenance Process
16/08/2017 Data & Information Governance Office 23
Goal: Standardisation of cyber security management
processes across UNSW
16/08/2017 Data & Information Governance Office 24
What we’ve learned so far
1. Methodically build up info sec layers
2. Every day do one thing better
3. Data governance matters
4. Info sec is a team sport
16/08/2017 Data & Information Governance Office 25
Thank you
Kate Carruthers
k.carruthers@unsw.edu.au
16/08/2017 Data & Information Governance Office 26

More Related Content

PDF
Data governance – an essential foundation to good cyber security practice
PDF
Data Governance - a work in progress
PDF
Data Protection for Higher Education
PDF
Starting data governance
PDF
Modelling Higher Education's digital future
PDF
Data & Digital Ethics: some thoughts
PDF
Real-World Data Governance: Data Governance Expectations
PDF
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Data governance – an essential foundation to good cyber security practice
Data Governance - a work in progress
Data Protection for Higher Education
Starting data governance
Modelling Higher Education's digital future
Data & Digital Ethics: some thoughts
Real-World Data Governance: Data Governance Expectations
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...

What's hot (20)

PDF
Data Governance Best Practices and Lessons Learned
PDF
Your Worst GDPR Nightmare - Unstructured Data
PDF
Real-World Data Governance: Governance Risk and Compliance
PDF
DataEd Slides: Getting Data Quality Right – Success Stories
PDF
Keith prabhu global high on cloud summit
PDF
Getting (Re)Started with Data Stewardship
PDF
DataEd Online: Let's Talk Metadata Strategies and Successes
PDF
Data Management is Data Governance
PDF
Comparing Approaches to Data Governance
PPTX
Winter school in research data science research data management - final
PDF
DAMA Webinar: The Data Governance of Personal (PII) Data
PDF
Real-World Data Governance: What is a Data Steward and What Do They Do?
PDF
Data-Ed Slides: Best Practices in Data Stewardship (Technical)
PDF
Guardians of Trust: Building Trust in Data & Analytics
PDF
Dama Ireland slides - Data Trust event 9th June 2016
PDF
The Data Model as a Data Governance Artifact
PDF
Securing executive support for data governance - John Morton
PDF
Data Stewards – Defining and Assigning
PDF
Practical steps to GDPR compliance
PDF
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Data Governance Best Practices and Lessons Learned
Your Worst GDPR Nightmare - Unstructured Data
Real-World Data Governance: Governance Risk and Compliance
DataEd Slides: Getting Data Quality Right – Success Stories
Keith prabhu global high on cloud summit
Getting (Re)Started with Data Stewardship
DataEd Online: Let's Talk Metadata Strategies and Successes
Data Management is Data Governance
Comparing Approaches to Data Governance
Winter school in research data science research data management - final
DAMA Webinar: The Data Governance of Personal (PII) Data
Real-World Data Governance: What is a Data Steward and What Do They Do?
Data-Ed Slides: Best Practices in Data Stewardship (Technical)
Guardians of Trust: Building Trust in Data & Analytics
Dama Ireland slides - Data Trust event 9th June 2016
The Data Model as a Data Governance Artifact
Securing executive support for data governance - John Morton
Data Stewards – Defining and Assigning
Practical steps to GDPR compliance
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Ad

Similar to Implementing Data Governance & ISMS in a University (20)

PPTX
Data and information governance: getting this right to support an information...
PPTX
Keep your data safe and be compliant via a 360° approach
PDF
Data governance guide
PPTX
Establishing an information governance program
PPTX
Data governance guide
PDF
sunil_soares_dama_day.pdf
PDF
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...
PDF
Your're Special (But Not That Special)
PDF
Cor concepts information governance-protection-of-personal-information-act-popi
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4a: Information Security Programs
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PDF
Information governance presentation
PDF
Data Breaches and the EU GDPR
ODP
CISSP Week 9
PDF
Effective IT Security Governance
PDF
Ibm data governance framework
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PPT
Security Governance
PDF
Data Champions Network
Data and information governance: getting this right to support an information...
Keep your data safe and be compliant via a 360° approach
Data governance guide
Establishing an information governance program
Data governance guide
sunil_soares_dama_day.pdf
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...
Your're Special (But Not That Special)
Cor concepts information governance-protection-of-personal-information-act-popi
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
Protecting the Crown Jewels – Enlist the Beefeaters
Information governance presentation
Data Breaches and the EU GDPR
CISSP Week 9
Effective IT Security Governance
Ibm data governance framework
A practical data privacy and security approach to ffiec, gdpr and ccpa
Security Governance
Data Champions Network
Ad

More from Kate Carruthers (20)

PDF
Info Sec, AI, and Ethics
PDF
Internet of Things and Governance
PDF
Digital Marketing and your startup
PDF
Data at the centre of a complex world
PDF
Data & Digital Ethics - CDAO Conference Sydney 2018
PDF
Future proof your career
PDF
Taking disruption for granted
PDF
The Internet of Things - 36th International Conference of Privacy and Data Co...
PDF
Social media: balancing risk and control
PDF
Building the sharing economy
PDF
Hardware is Hard - Products are Hard Melbourne 2013
PDF
Social and technology trends for banking
PDF
Internet of things: New Technology and its Impact on Business Models
PDF
Crowdfunding
PDF
Your blog your brand - tips on getting started with your blog
PDF
Social media for social good 2012
PDF
Whats the big idea with social media media140-2012
PDF
Failing in the right direction
PPTX
The Power of Social Business
PPT
Gathering11 - envisioning change
Info Sec, AI, and Ethics
Internet of Things and Governance
Digital Marketing and your startup
Data at the centre of a complex world
Data & Digital Ethics - CDAO Conference Sydney 2018
Future proof your career
Taking disruption for granted
The Internet of Things - 36th International Conference of Privacy and Data Co...
Social media: balancing risk and control
Building the sharing economy
Hardware is Hard - Products are Hard Melbourne 2013
Social and technology trends for banking
Internet of things: New Technology and its Impact on Business Models
Crowdfunding
Your blog your brand - tips on getting started with your blog
Social media for social good 2012
Whats the big idea with social media media140-2012
Failing in the right direction
The Power of Social Business
Gathering11 - envisioning change

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Building Integrated photovoltaic BIPV_UPV.pdf

Implementing Data Governance & ISMS in a University

  • 1. Case study: Implementing Data Governance and ISMS at UNSW Kate Carruthers Version 1.0 March 2017 Classification: PUBLIC
  • 2. This case study covers the complexities of implementing data & information governance and an information & security management system as part of a broader cybersecurity framework at an institution like UNSW Australia. It explores some of the unique challenges of securing an institution that has over 50,000 students and which undertakes research that ranges from open data to personally identifying patient information. 16/08/2017 Data & Information Governance Office 1
  • 3. Fast facts 16/08/2017 Data & Information Governance Office 2
  • 4. The Group of Eight (Go8) is a coalition of leading Australian universities, intensive in research and comprehensive in general and professional education. The Global Alliance of Technological Universities is a network of the world’s top technological universities APRU is a network of 45 premier research universities from 16 economies around the Pacific Rim. Universitas 21 is the leading global network of research-intensive universities. The PLuS (Phoenix London Sydney) Alliance combines the strengths of three leading research universities on three continents to develop innovative solutions to these challenges in global health, social justice and sustainability while progressing the responsible innovation of advanced technologies Alliances 16/08/2017 Data & Information Governance Office 3
  • 5. 16/08/2017 Data & Information Governance Office 4
  • 6. Diverse user community 16/08/2017 Data & Information Governance Office 5
  • 7. 3 realms of data 16/08/2017 Data & Information Governance Office 6 Learning & Teaching Research Administrative Enterprise systems Local Faculty-based systems Systems of record Learning Management Lecture recording MOOCs Research data Publications
  • 8. Cultural issues Academic freedom Inventing the future We know what we’re doing I’ve got a PhD and you don’t 16/08/2017 Data & Information Governance Office 7
  • 9. 16/08/2017 Data & Information Governance Office 8 Cybersecurity and enterprise risk management are a key focus for Council and Management Data & information governance are a key foundation for cybersecurity Cybersecurity and enterprise risk management are a key focus for Council and Management
  • 10. Data & information governance are a key foundation for cybersecurity Management 16/08/2017 Data & Information Governance Office 9 Data & information governance are a key foundation for cybersecurity
  • 11. 16/08/2017 Data & Information Governance Office 10
  • 12. 16/08/2017 Data & Information Governance Office 11
  • 13. 16/08/2017 Data & Information Governance Office 12
  • 14. Responses to the hack War room Perimeter defences Visibility at Council level Risk register Appointment of dedicated Info Sec resources 16/08/2017 Data & Information Governance Office 13
  • 15. Threats 1. Phishing, Whaling/Spear Phishing 2. Ransomware 3. DDOS/Zombie botnet armies 4. Big data 5. Ignorance 16/08/2017 Data & Information Governance Office 14
  • 16. 16/08/2017 Data & Information Governance Office 15
  • 17. Work plan 16/08/2017 Data & Information Governance Office 16 Setup policy framework Re-establish Data Governance Committees Establish Data Ownership structure Identify ‘Crown Jewels’ Implement Data Classification Implement System Classification Implement ISMS Implement Business Glossary Tool Implement Data Quality Process Implement Internal Data Sharing Agreements Implement Reference Data Management Implement Master Data Management Done PlannedKey: In progress
  • 18. The 4 dimensions Framework: • provides enterprise wide roles and responsibilities to be accountable for decisions related to data assets • establishes policies & procedures to manage the data assets • provides diverse tools for managing operational data tasks UNSW Data Governance Framework focuses on the oversight, guidance and quality of enterprise data assets enabled through People, Policies, Procedures and Tools Policies are high level statements that provide context for strategic decisions relating to the data assets People are members of UNSW governance bodies, which hold the authority for decision relating to data assets Tools are pre-prepared objects that support people carrying out procedures Procedures are specific instructions designed to ensure policy is followed and outcomes are measurable Workflow for Approval Checklists Issues Register Data Profiling Data Sharing Data Reporting Regulatory Compliance Data Asset Prioritisation Data Exchange Agreements Data Process Flow Data Integration Data Security Strategic Drivers Dimensions Enterprise Oversight of Data Enterprise Guidance on Data Enterprise Quality of Data Performance Metrics Policies Procedures Tools Data Executives Data Owners Data Stewards People Data Creators/ Data Specialists 1 2 3 4 16/08/2017 Data & Information Governance Office 17
  • 19. Alignment - Legal, Privacy, IT & Info Sec Mar-2017 Data & Information Governance 18 Information literacy Data driven improvements Policies & Standards Information Quality Privacy, Compliance, Security Architecture, Integration Establish Decision Rights Stewardship Assess Risk & Define Controls Consistent Data Definitions Adapted from University of Wisconsin Data Governance Framework
  • 20. Fundamentals Data ownership Data classification Data handling guidelines ISMS Standards 16/08/2017 Data & Information Governance Office 19 Boundaries between Data Governance & IT teams – collaboration is critical
  • 21. Data Classification 16/08/2017 Data & Information Governance Office 5 Data Classification Example Data Types Highly Sensitive Data subject to regulatory control Medical Children & Young persons Credit Card Research Data (containing personal medical data) Sensitive Student and Staff HR data Organisational financial data Exam material Exam Results Research Data (containing personal data) Private Business unit process and procedure Unpublished Intellectual property ICT system design & configuration information Public Faculty and staff directory information Course catalogues Published research data
  • 22. Data classification process 16/08/2017 Data & Information Governance Office 21 Apply the controls Apply data classification to the Information Asset Assess data risks Identify the Information Assets Identify the Data Owner
  • 23. ISMS 16/08/2017 Data & Information Governance Office 22 UNSW Faculties/Divisions/Affiliates Critical Apps Critical Apps Critical Apps Critical Apps CMDB Cloud/Internet Faculty Security Forums
  • 24. Security approach Data Collection & Validation or Verification Reporting of potential threats/risks and compliance – e.g. Heat maps to Security Forums in each Faculty Risk Workshops Mitigation action plans Ongoing Compliance Maintenance Process 16/08/2017 Data & Information Governance Office 23 Goal: Standardisation of cyber security management processes across UNSW
  • 25. 16/08/2017 Data & Information Governance Office 24
  • 26. What we’ve learned so far 1. Methodically build up info sec layers 2. Every day do one thing better 3. Data governance matters 4. Info sec is a team sport 16/08/2017 Data & Information Governance Office 25
  • 27. Thank you Kate Carruthers k.carruthers@unsw.edu.au 16/08/2017 Data & Information Governance Office 26