David Schlesinger

Cyber-Attacks in the News and Data Regulatory Compliance

david_schlesinger-cissp

by David Schlesinger CISSP You probably have heard of the “Stuxnet” worm or the “Flame” code that was presumably aimed at machines processing radioactive substances.  (If you haven’t heard of either, you are working far too hard and need to look around at what is happening in the IT world.)  These are specially crafted pieces…

Data Governance and Corporate Agility are Customer Centric

david_schlesinger-cissp

by David Schlesinger CISSP Business is a complex exercise in organization and human nature.  Peter Drucker famously said “the purpose of a business is to create a customer;” yet a lot of things must be done to manage the business that at first glance do not touch the end customer.  This is a false notion;…

Conversations about Big Data – How Hot is Your Data Center?

david_schlesinger-cissp

by David Schlesinger CISSP Big Data requires Big Data Centers.  When you build a place to handle Big Data, you have many computers all working together.  This raises considerations regarding using a common ground for all power cables, how much fuel to keep for the back-up generators, the air-conditioning fan duct orientation, proper heights of…

Why Data Management Should Collaborate with Security

david_schlesinger-cissp

by David Schlesinger CISSP While some people still believe that data protection and information security require different skill sets (and they are correct), they further believe that each discipline does “just fine thank you” when operating in isolation.  This last belief is as wrong as believing that nobody will hack your home computer because it…

Conversations about Big Data – Who Can See What?

david_schlesinger-cissp

by David Schlesinger CISSP Traditional Database Management Systems have ways to make sure that not everybody can see everything.  Thus, the clerks in the sales office cannot see the personal health history of the CEO (if the CEO complains loudly about the cost of Viagra at office parties however, confidentiality in the computer system is…

Conversations about Big Data – Why Do We Need Big Data?

david_schlesinger-cissp

by David Schlesinger CISSP With the arrival of the Internet everything changed.  Not just the introduction of email, SPAM and selling ice-cream makers via websites; not even eBay™ and massive multi-player games; no, the thing that changed was that all along the broadband connection there sits a word full of people. Once upon a time…