Data Governance strategies for enterprise security

Data Governance strategies for enterprise security


Data, along with human resources have been recognized as the most important assets of any organization.  Research findings show that 90 percent of corporate data have been produced within the past five years – including paper-based, web-based, and cloud data.

With distributed and cloud computing strategies being deployed in many projects, new threats to data consistency, quality, and security are on the rise. Security professionals must work with data stewards to set the appropriate standards to safeguard this valuable asset.

Data Governance is a framework designed to achieve this objective of standardizing data repository structure, naming standards, consolidating access points to avoid unnecessary repetition of data, and ensure compliance. In this webinar, we will explore the data governance model, discuss available frameworks, data governance council to collaborate with data owners, while assigning roles and responsibility, plus accountability.

WATCH: March 23, 2 pm
Presenter: Sandra Fonseca, PhD


Dr. Sandra Fonseca is Professor of Information Systems, Systems Security & Audit, and Project Management, Graduate and Undergraduate Level. She has over 25 years of experience in Information Technology, 15 of them as Systems Security Manager.

She holds a Bachelor Degree in Business Administration in Information Systems from University of Puerto Rico, Rio Piedras Campus; a Master’s Degree in Information Systems (MIS) and a Graduate Certificate in Audit Information Systems from EDP College; Doctoral Degree in Management Information Systems (DBA) from Turabo University, part of Ana G. Méndez Educational System. She has served as Vice President of Education and Certifications of the Puerto Rico Chapter of the Project Management Institute (PMI), representative of Puerto Rico at the ISO21500 Latin America Committee. She also served for the ISACA and ISSA Puerto Rico Chapter’s Board of Directors as Director of Education.

Her research interests are on IT Controls at database and application levels, Incident Handling Techniques, Business Process Reengineering and Agile Project Management for Systems Security, IT Cloud Controls Assurance. (Certifications: CISA, CISM, CRISC, CICA, MOS, IC3)


» Become a complimentary member for access to CISSP assessment tools, security clearance resources, previous/upcoming webinars and workshops, plus more.



Join the Cybersecurity Elite
U of F Cybersecurity Education Path

Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.
» Download PDF or register for a