[Guide] Designing a Data Governance Program in Financial Services

Perficient Data & Analytics

As firms began to recognize the power of data for its ability to optimize business processes, as well as to provide a strategic advantage, new disciplines for its governance emerged. Technologies such as data mining and artificial intelligence (AI) have matured to create predictive analytics models from data resources. As there are different classifications of data, each with its own characteristics, management will need to implement specific controls and governance.

ABBYY Releases Research: State of Process Mining and Robotic Process Automation

Document Imaging Report

Global survey results released today found that process knowledge is the primary success factor for robotic process automation (RPA) projects, yet only 31% of US organizations are currently using process mining tools to understand their processes. The importance of a process-first approach is growing, according to the State of Process Mining and Robotic Process Automation survey conducted among 400 senior decision makers in the US, UK, France and Germany. IT service management.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

#ModernDataMasters: Mike Evans, Chief Technology Officer


It will be possible to put more emphasis on the people, process and data governance which really make MDM live and breathe.”. A passion of mine is imparting the knowledge and experience that the data leaders of today possess to the next generation of data professionals. We teach that problem solving is at the core of MDM, and how important data governance principles are regardless of the configuration of the underpinning technology.”. Kate Tickner, Reltio.

MDM 63

Financial Statements and Disclosures under CECL

Perficient Data & Analytics

Entities must first include the new CECL disclosures in their financial statements and regulatory reports (e.g., The structure and granularity of an entity’s income statement and balance sheet does not to change, as the details of the CECL models are presented through financial statement disclosures. real estate, mining). residential or commercial property, government-guaranteed collateral, uncollateralized (unsecured).

#ModernDataMasters: Steve Whiting, Chief Operations Officer


Ethical data management means you need data governance and data security by design – these initiatives are hard to retrofit. In the past organisations often mobilized for large MDM programmes and had to retrospectively drive the governance throughout – now we are seeing that data governance is often leading – it has become a non-negotiable.”. It’s called “Managing a Professional Services Firm” by David Maister. Kate Tickner, Reltio.

MDM 40

ABBYY Acquires TimelinePI to Strengthen Leadership Role in Digital Transformation

Document Imaging Report

The acquisition of TimelinePI represents a significant milestone in establishing ABBYY’s leadership role in the digital transformation market as well as a global player in the emerging process mining market, which Gartner estimates will triple by 2023. For example, financial services institutions are challenged with onboarding new customers for products including mortgages, consumer credit offerings, traditional banking services and investment products.

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

The Last Watchdog

Here are a few key takeaways: Cool new experiences Amazon Web Services, Microsoft Azure, Google Cloud and Alibaba Cloud supply computer processing and data storage as a utility. DevOps has decentralized the creation and delivery of smart applications that can mine humongous data sets to create cool new user experiences. The services on that smartphone you’re holding makes use of hundreds of unique APIs. LW provides consulting services to the vendors we cover.).

State Attackers Moving from Stealing Data to Social Meddling

Ascent Innovations

The new cyber intelligence report expects the monetary benefits will allure the use of crypto-mining malware and cryptocurrencies by cyber attackers this year. State actors tend to zero in on government agencies or utilities and energy targets. They look to steal credit card numbers from financial services & insurance companies or install malware on the critical systems used by healthcare companies. State Attackers Moving from Stealing Data to Social Meddling.

It’s time to think twice about retail loyalty programs

Thales eSecurity

In this case, it looks as though the attackers had been on the Starwood network for somewhere around three years, mining out their reservations database (keep in mind that Marriott only acquired Starwood in 2016 ). We had some results this year from the 100+ US retail IT security professionals that were surveyed for the 2018 Thales Data Threat Report that differed from every other segment we polled (healthcare, federal government, financial services).