{"id":10757,"date":"2016-12-01T13:33:45","date_gmt":"2016-12-01T18:33:45","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=10757"},"modified":"2020-01-08T09:57:56","modified_gmt":"2020-01-08T14:57:56","slug":"data-security-governance","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/","title":{"rendered":"Data Security Governance"},"content":{"rendered":"<h3><b>The Latest Data Risk Landscape <\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Enterprise data continues to change rapidly in form, size, use, and residence. Rarely does it remain in siloed constructs anymore, limited to certain business units or untouched by the outside world. Data now freely crosses the prior conceived thresholds that limit business potential. It floats about in the cloud, spreads between business units, and flows everywhere. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">But for all the change and opportunity that data represents, once it\u2019s created or collected, it is under threat of attack and misuse. With the number of reported data breaches doubling in the last ten years, and half a billion records exposed last year, our reliance on information is under increasing threat from a lack of security.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10758\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png\" alt=\"U.S. Data Breaches\" width=\"600\" height=\"390\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png 752w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches-300x195.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">With the exposure of personal data at industrial scale, the growth of data privacy legislation was inevitable. Companies and government agencies collecting and handling personally identifiable information (PII) must now comply with <\/span><span style=\"font-weight: 400;\">Payment Card Industry Data Security Standard (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/pci-dss\">PCI DSS<\/a>) and Health Insurance Portability and Accountability Act (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/hipaa\">HIPAA<\/a>) requirements in the United States, the General Data Protection Regulation (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/gdpr\">GDPR<\/a>) in Europe, and many international and local follow-on laws like POPI in South Africa, KVKK in Turkey, and the California Consumer Privacy Act (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/ccpa\">CCPA<\/a>).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data breaches also carry explicit costs. The Ponemon Institute <\/span><a href=\"https:\/\/www.bluefin.com\/bluefin-news\/highlights-ibm-security-ponemon-institutes-2019-cost-data-breach-study\/\"><i><span style=\"font-weight: 400;\">Cost of a Data Breach<\/span><\/i><\/a> <i><span style=\"font-weight: 400;\">Study<\/span><\/i><span style=\"font-weight: 400;\"> found that the average cost per compromised record is roughly $150 in 2019.\u00a0 The study puts the risk of a having 10,000 stolen or lost records above 26%. So, you have just above a one-in-four chance of losing 10,000 records. Would you take the risk if you could use technology to prevent it?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations stuck in old operational models and mindsets fail to recognize the importance of company-wide security protocols. To improve, they must address their need for what Gartner calls Data Security Governance and thus protect information in structured and coordinated events, not as an afterthought or remediation after a breach.<\/span><\/p>\n<h3><b>What is Data Security Governance?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Gartner defines data security governance (DSG) as \u201ca subset of information governance that deals specifically with protecting corporate data (in both structured database and unstructured file-based forms) through defined data policies and processes.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You define the policies. You define the processes. There is no one-size-fits-all solution to DSG. Furthermore, there is no single product that meets all of the needs of DSG. You must look at your data and weigh which areas have the greatest need and the most importance to your company. You take data governance into your own hands to avert disaster. Remember that your information is your responsibility. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While there are multiple pathways to safeguarding data &#8212; logical, physical, and human &#8212; \u00a0three\u00a0 primary software methods that IRI customers successfully employ are the classification, discovery, and de-identification (masking) of PII and other data considered sensitive.<\/span><\/p>\n<h3><b>Data Classification<\/b><\/h3>\n<p>In order to find and protect specific data at risk, it must first be defined in named categories or groups. Data so classified can be cataloged not only by its name and attributes (e.g., US SSN, 9 numbers), but also subject to computational validation (to distinguish it from other 9-digit strings), and sensitivity attribution (secret, sensitive, etc.).<\/p>\n<p>In addition to those assignments, data classes or class groups can be characterized by where they are located and\/or how they should be found\u00a0 (search method\/s) if their locations are unknown. Also possible is the global assignment of a remediation, or masking function, so that de-identification can be carried out consistently for all members of the class, regardless of location, preserving its referential integrity.<\/p>\n<h3><b>Data Discovery<\/b><\/h3>\n<p>To find sensitive data, search functions that may or may not be associated with data classes can be executed. Examples of discovery techniques includes RegEx or Perl Compatible Regular Expression (PCRE) searches through databases or files, fuzzy (soundalike) matching algorithms, special path or column filtering logic, named entity recognition\u00a0 (NER), facial recognition, etc.<\/p>\n<p>It is also possible to leverage machine learning in the recognition process. IRI supports semi-supervised machine learning in NER model building, for example, in its DarkShield product (below).<\/p>\n<h3><b>Data De-Identification<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the ways to reduce, and <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\"><span style=\"font-weight: 400;\">even nullify<\/span><\/a><span style=\"font-weight: 400;\">, the risk of data breaches is by <\/span><a href=\"http:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">masking data<\/span><\/a><span style=\"font-weight: 400;\"> at rest or in motion, with field-level functions that render it protected but still usable to some extent. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><span style=\"font-weight: 400;\">Gartner analyst Marc Meunier, \u201cHow Data Masking Is Evolving to Protect Data from Insiders and Outsiders:\u201d<\/span><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Adopting data masking helps organizations raise the level of security and privacy assurance for their sensitive data \u2014 be it protected health information (PHI), personally identifiable information (PII) or intellectual property (IP). At the same time, data masking helps meet compliance requirements with security and privacy standards and regulations.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Most enterprises &#8212; either by virtue of internal rules or data privacy laws &#8212; have been, are now, or will soon be, making data masking a core element of their overall security strategy.<\/span><\/p>\n<h3>Proven Software Solutions<\/h3>\n<p><span style=\"font-weight: 400;\">IRI provides static and dynamic data masking solutions for databases, flat files, proprietary mainframe and legacy application sources, and big data platforms (Hadoop, NoSQL, Amazon, etc.) in its <\/span><a href=\"http:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> product or <\/span><a href=\"http:\/\/www.iri.com\/products\/voracity\"><span style=\"font-weight: 400;\">Voracity<\/span><\/a><span style=\"font-weight: 400;\"> platform, as well as data at risk in Excel via <\/span><a href=\"http:\/\/www.iri.com\/products\/cellshield\/cellshield-ee\"><span style=\"font-weight: 400;\">CellShield<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For data in semi-and unstructured sources like NoSQL DBs, free-form text files and application logs, MS Office and .PDF documents, plus image files (even faces), you can use <a href=\"https:\/\/www.iri.com\/products\/darkshield\">DarkShield<\/a> to classify, discover, and de-identify it. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In these &#8216;shield&#8217; products, you can use functions like blurring, deletion, encryption, redaction, pseudonymization, hashing, and tokenization, with or without the ability to reverse those functions.\u00a0<\/span><span style=\"font-weight: 400;\">Voracity &#8212; which includes those products &#8212; also folds data masking into data integration and migration operations, as well as data federation (virtualization), reporting and data wrangling for analytic operations. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Built-in data discovery, classification, metadata management, and audit logging features facilitate both automatic and manual assessments of the re-identifiability of affected records. S<\/span><span style=\"font-weight: 400;\">ee <\/span><a href=\"http:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">www.iri.com\/solutions\/data-masking<\/span><\/a><span style=\"font-weight: 400;\">\u00a0and <a href=\"https:\/\/www.iri.com\/solutions\/data-governance\">www.iri.com\/solutions\/data-governance<\/a> for more information, and contact your IRI representative if you need help creating or enforcing your DSG framework through a data-centric, or &#8216;startpoint&#8217; security approach.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Latest Data Risk Landscape Enterprise data continues to change rapidly in form, size, use, and residence. Rarely does it remain in siloed constructs anymore, limited to certain business units or untouched by the outside world. Data now freely crosses the prior conceived thresholds that limit business potential. It floats about in the cloud, spreads<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\" title=\"Data Security Governance\">Read More<\/a><\/div>\n","protected":false},"author":101,"featured_media":10758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34,3],"tags":[1452,1215,405,14,13,1213,1214,861,1219,81,603,520,369,400,24,1216],"class_list":["post-10757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","category-vldb-operations","tag-ccpa","tag-cellshield","tag-data-breach","tag-data-masking","tag-data-protection-2","tag-data-security-governance","tag-dsg","tag-gartner","tag-gdpr","tag-hadoop","tag-hipaa","tag-iri-fieldshield","tag-nosql","tag-pci-dss","tag-vldb","tag-voracity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Security Governance - IRI<\/title>\n<meta name=\"description\" content=\"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security Governance - IRI\" \/>\n<meta property=\"og:description\" content=\"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-01T18:33:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-08T14:57:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png\" \/>\n\t<meta property=\"og:image:width\" content=\"752\" \/>\n\t<meta property=\"og:image:height\" content=\"489\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Donna Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\"},\"author\":{\"name\":\"Donna Davis\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\"},\"headline\":\"Data Security Governance\",\"datePublished\":\"2016-12-01T18:33:45+00:00\",\"dateModified\":\"2020-01-08T14:57:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\"},\"wordCount\":1002,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png\",\"keywords\":[\"CCPA\",\"CellShield\",\"data breach\",\"data masking\",\"data protection\",\"Data Security Governance\",\"DSG\",\"Gartner\",\"GDPR\",\"hadoop\",\"HIPAA\",\"IRI FieldShield\",\"NoSQL\",\"PCI DSS\",\"VLDB\",\"Voracity\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\",\"VLDB\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\",\"name\":\"Data Security Governance - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png\",\"datePublished\":\"2016-12-01T18:33:45+00:00\",\"dateModified\":\"2020-01-08T14:57:56+00:00\",\"description\":\"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png\",\"width\":752,\"height\":489,\"caption\":\"U.S. Data Breaches\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security Governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\",\"name\":\"Donna Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"caption\":\"Donna Davis\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/donnad\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security Governance - IRI","description":"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/","og_locale":"en_US","og_type":"article","og_title":"Data Security Governance - IRI","og_description":"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.","og_url":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/","og_site_name":"IRI","article_published_time":"2016-12-01T18:33:45+00:00","article_modified_time":"2020-01-08T14:57:56+00:00","og_image":[{"width":752,"height":489,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png","type":"image\/png"}],"author":"Donna Davis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Donna Davis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/"},"author":{"name":"Donna Davis","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b"},"headline":"Data Security Governance","datePublished":"2016-12-01T18:33:45+00:00","dateModified":"2020-01-08T14:57:56+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/"},"wordCount":1002,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png","keywords":["CCPA","CellShield","data breach","data masking","data protection","Data Security Governance","DSG","Gartner","GDPR","hadoop","HIPAA","IRI FieldShield","NoSQL","PCI DSS","VLDB","Voracity"],"articleSection":["Data Masking\/Protection","IRI Business","VLDB"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/","url":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/","name":"Data Security Governance - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png","datePublished":"2016-12-01T18:33:45+00:00","dateModified":"2020-01-08T14:57:56+00:00","description":"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png","width":752,"height":489,"caption":"U.S. Data Breaches"},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Security Governance"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b","name":"Donna Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","caption":"Donna Davis"},"url":"https:\/\/beta.iri.com\/blog\/author\/donnad\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/12\/US-Data-Breaches.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10757"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/101"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=10757"}],"version-history":[{"count":12,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10757\/revisions"}],"predecessor-version":[{"id":17605,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10757\/revisions\/17605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/10758"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=10757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=10757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=10757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}