Where’s The Money in Data?

There is little argument that there is value in data. In fact, when asked, many executives would say their data is one of their organization’s most valuable assets. Yet, as we progress further in to the age of digitization many of those same executives are asking “How do we use data to drive revenue?” or “Where’s the money in data?” It is much easier to consider and treat data as a valuable asset than it is to monetize it and actually generate value from it.

Data monetization, the term used to describe a variety of approaches to turning data into dollars, is a whole new ball game when it comes to managing and using data. It demands different business processes, a unique blend of skills and capabilities, and sometimes even requires new operating models. There are a variety of considerations for businesses looking to launch monetization initiatives. This five-part series will introduce a framework to help you evaluate the most appropriate method of monetization for your organization.
Part One: The Focus and State of the Problem
The most important factor in any monetization effort is the product, service or practice should solve a problem or have value in the context of the consumer’s use. When considering value for the consumer it first must have value of utility in order for it to have an exchange value to monetize. This is true whether there is to be exchange of currency in a sales transaction, an exchange of goods or services in a barter or trade deal, or an exchange of internal capabilities that reduce operating costs.
All data monetization efforts require that data is ultimately used to drive actions or decisions that solve a problem for an end consumer. This fundamental requirement is where most businesses fail when attempting to monetize data because the typical approach is “How can we sell data to increase our revenues?” which assumes that the value is the sale of the data itself. In order to successfully monetize data, organizations must flip this approach and start with the end in mind. The questions should be “What problem can our data solve?” and “How valuable would it be to the end consumer if these problems were solved?”
It is important to note that “end consumer” does not always mean customer either. Monetized data solutions can be for internal end consumers as well. Monetization is about solving problems, driving action or decisions, and creating solutions that provide unique capabilities with high utility value that the end consumer would not otherwise be able to generate on their own.
Two aspects of “problem” define the data monetization framework, the focus and the state (see figure 1). Focus determines if the problem to be solved is based on an internal or external need. If you are looking to reach more customers, sell more products or improve business processes, the focus of the problem is internal. If you are looking to improve the customer experience, create additional functionality or utility in products, or provide a solution to a customer’s problem, the focus is external.
The state of the problem is determined by how long the problem has existed. If it is a current, ongoing problem where the need is known, the state is existing. If however, the problem is recently identified or has not been ongoing, the state is new. The needs of existing problems are well defined whereas the needs of new problems may not be specific or wholly understood. This means that while all monetization offerings ultimately provide solutions to problems, monetizing opportunities for problems with a state of new, will require greater demonstration and definition of utility for the end consumer.
Defining the problem in the terms of state and focus determines the monetization opportunity at hand and is critical as each of the four data monetization opportunities have unique considerations and approaches for the collection, packaging and delivery of data-based solutions
Info-Management: http://bit.ly/1JPSGtX

 

« Cyber Insurance Policies: Worth the Money?
The Rules of Cyberspace Just Got A Bit Clearer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.