Five Things That Happened To Data In 2015

2015 Was yet another fascinating and challenging year for all those involved with data. In this summary David Reed reveals his top 5 significant data happenings.

1 - Charities exposed

Good deeds can't hide bad practices. That was the hard lesson learnt this year by charities when a tsunami of media coverage led to a government-backed enquiry and fresh regulation. What started with the tragic suicide of a pensioner spiraled into the Etherington report and its chief fix for charity data problems, the Fundraising Preference Service.

Few should regret the impact on the "dark DM" data brokers and call centres that for years have traded consumer names with permissions long past their sell-by date. All should wonder at the scale of the practice - the ICO has written to over 1,000 such companies it has identified as operating at the margins of compliance (or beyond).

It remains to be seen how the mechanics of the newly regulated charity data eco-system will function. Fundraisers will have to work hard to rebuild trust at a time when data controllers in every sector will be trying to do the same thing. British consumer-like to give - but they don't like being taken for granted.

2 - Election results called wrong
Not even David Cameron expected the outcome of May's general election - the Prime Minister had reportedly not written an acceptance speech, let alone a note of thanks for winning the first workable Conservative majority since 1992.

For market researchers it was a humiliating fail - but big data analysts, including the much-heralded Nate Silver, former social media guru to President Obama, were caught out just as badly. Qualitative and quantitative measures of voting intention all called the wrong result, placing a big question mark over the value of predictive analytics of all types.

The lesson to be learned is that human behaviour is still not capable of being accurately modeled by even the smartest machines. People lie (including to themselves), they change their minds and, crucially, they act on impulse. Apart from voters still committed to tribal party allegiances, the "don't knows" acted as an unknown variable in the model. Think about that the next time you present an insight with a high confidence rating and consider whether you have excluded or accurately weighted the consumer base about whose intentions you know the least.

The only group that got a lot of these predictions correct was CASM part of DEMOS who are connected to Kings College London and Sussex University in the UK who have a software analysis programme called Method 52 which accurately analyses Social Media.

3 - Safe Harbour unsafe
US-based companies have taken it for granted that they will be able to ship data on their EU-based customers back to the homeland. The Schrems court case put a sizeable blockade in their way, at least in principle for now. Safe Harbour still applies to retrospectively-transferred data, but a new fix is needed going forward.

Three strategies are being adopted in the wake of the judgement: carry on as before and see what negotiations on Safe Harbour 2.0 end up demanding; build data centres inside the EU so data does not need to be shipped; or ignore the whole problem and carry on doing what you wanted to in the first place.

The first of these is unlikely to result in any regulatory penalties for now as it is recognised that the lawmakers had not kept up with other demands, (principally the requirement of US security services to access all the data they want without putting in place the few safeguards which European citizens enjoy).

The second is more sustainable and is helping to fuel both capacity and capability around data management across the EU. As for the third, it is not only out of step with the law, it is also not in line with the mood of consumers who have been spooked by the way their data can be examined by the spooks. For now, consumers are still willing to accept the US data homing model, but perhaps only until real alternatives emerge.

4 - Tesco data sale fail
Tesco started 2015 looking around for some quick cash. It's attention turned to dunnhumby, the data asset, which it had inexplicably been ignoring for some time (how else to explain the retailer's failure to spot shifts in customers' buying behaviours?) For a while it looked as if it might have a £2 billion windfall on its books.

Then prospective buyers started their due diligence. What would they get for their money? Rights to Clubcard data? No, they would stay firmly under the grocery chain's control. Cutting-edge big data algorithms and IP? No, there was little sign of that inside the family-sized analytics business. Instead, new owners would gain some reasonably smart people and a few years contracting to Tesco before facing a competitive pitch.

 One insider's best guess at the true value was of revenues of around £10 million a year, putting any valuation a long way off what was being asked.

So what had gone wrong with former innovator and once triumphant data operation? A combination of incumbent apathy and constrained specifications from its major client appear to have stopped the company from leaping into the new world of big data analytics, or even securing core assets in the same way as its deadly rival, Nectar. For now, Tesco and dunnhumby are stuck with each other in a marriage that doesn't appear to be making either of them happy.

5. - Big data booms
Predictions of the growth of big data as a genuine focus for investment by companies have not been hard to come by in 2015. More difficult have been real-world examples of projects emerging from proof of concept stage and delivering actual business value.

But make no mistake Hadoop clusters are being spun up all around UK plc. and ever more companies are circling their data wagons around Apache Spark. Big data solutions are becoming the new normal, especially as firms discover just how much cost they can save by migrating out of conventional data warehousing environments. It may not be possible to name practitioners right now, but the days of the big stack technology solution are starting to look numbered.

DataIQ: http://bit.ly/1PRJGdQ

David Reed is the editor of DataIQ

 

« US Critical Infrastructure Is Vulnerable To Electromagnetic War
ISIS Has a New Secure Messaging App »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

Bounga Informatics

Bounga Informatics

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

National Authority for Electronic Certification and Cyber Security (AKCESK)

National Authority for Electronic Certification and Cyber Security (AKCESK)

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

eLearnSecurity

eLearnSecurity

eLearnSecurity is an innovator in the IT Security training market providing quality online courses paired with highly practical virtual labs.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.