You are here:  Home  >  Conference and Webinar Communities  >  Current Article

RWDG Webinar: Tools of Data Governance – Purchased and Developed – Part 2 Developed

By   /  December 21, 2012  /  2 Comments

To view just the slides from this presentation, click HERE.

This Webinar was Sponsored by:

About the Webinar

Tools of data governance come in all shapes and sizes.  There are software products and tools on the market that can be used to enable and bring success to Data Governance programs.  There are templates and artifacts developed by experience consultants and practitioners that can add value to successful programs.  A significant benefit of attending Dataversity conferences is making use of the exhibit and networking time kicking the tires of industry leading products and learning from the knowledgeable vendors and consultants that are ready, willing and able to share in their products and experiences.

This set of two webinars will focus on purchasable products and products you can develop internally and specifically where they can benefit the companies that use them.  This second of the two-part webinar will share Tools of Data Governance that can be developed and customized internally to meet your company’s needs and add value to your data governance program.

Join Bob Seiner and DATAVERSITY for the twelfth in a series of monthly webinars titled “Real-World Data Governance” that will focus on sharing knowledge about the Tools of Data Governance – Purchased and Developed.

About the Speaker

Robert S. Seiner is the President and Principal of KIK Consulting & Educational Services and the Publisher of The Data Administration Newsletter (TDAN.com). Bob was recently awarded the DAMA Professional Award for significant and demonstrable contributions to the data management industry. Bob specializes in “non-invasive data governance”, data stewardship, and meta-data management solutions.

The twelfth webinar in the Real-Word Data Governance series is brought to you in partnership with:


You might also like...

Evolving Cloud Networks and How to Keep Them Secure

Read More →