AST Digital Magazine June 2017 Digital-June | Page 53

Volume 13 This means scouring both structured and un- structured data for potentially sensitive informa- tion, and assigning repositories for individual in- formation assets. After all, if agencies do not know where HVAs are being kept, how can they adequately protect them, let alone optimize their compliance, risk management and redundancy reduction pro- cesses? Information maps can help agencies to address this concern. An information map is a database that captures an inventory of what systems, ap- plications and repositories agencies have, where they are, and who is responsible for managing them. June 2017 Edition As agencies continue to collect more and more information, the risk of improperly managed HVAs will only continue to increase. Every agency needs to take OMB’s advice to govern their information in an enterprise fashion, rather than in an ad-hoc fashion. By continuously updating their information stores in the context of a larger information framework, agencies will be addressing several layers of risk, ranging from improper internal use all the way up to targeted external cybersecurity threats. With this tool, agencies will be able to keep tabs on their information systems and records, identify sensitive information like PII, PHI or CUI, monitor the use of assets, gain analytical insight and con- sistently update information stores. At the end of this process, agencies should have a firm idea of their ideal asset management sce- nario. Finally, agencies will be ready to put their policy into action and manage asset-specific concerns in a timely and continuous manner. After addressing these steps, agencies will have laid the necessary groundwork for responsible governance of HVAs. They will continue to face challenges associ- ated with keeping their framework and reten- tion schedules continuously up-to-date. This will provide agencies with the quantifiable statistics needed for compliance trails. After accomplishing all of this, agencies will have completed a large majority of the behind-the- scenes work needed to secure the HVAs under their control. From there, they will have the foundation that they need to further secure their information as- sets, whether that be additional cybersecurity, physical controls, or anything in between. (Keeping up-to-date with compliance with privacy and secu- rity laws is important for your organization. Find out about records and information managers’ role in this process.Cour- tesy of Iron Mountain and YouTube) About the Author Tyler Morris is a strategy and product executive with experience supporting private and public sec- tor organizations to solve critical business issues, grow market share, and perform large-scale trans- formation. Morris’ expertise includes leading business plan- ning efforts for complex products, programs and initiatives including growth strategies, market en- try, industry evaluation, and IT transformation, with a demonstrated record of performance work- ing closely with corporate leadership and project teams to develop and implement strategic change. Morris specializes in strategic planning, prod- uct management, government, market research, growth strategy, process re-engineering, manage- ment consulting, organizational design, business development, customer relationship management, and coaching. 53