Where’s The Money in Data?

There is little argument that there is value in data. In fact, when asked, many executives would say their data is one of their organization’s most valuable assets. Yet, as we progress further in to the age of digitization many of those same executives are asking “How do we use data to drive revenue?” or “Where’s the money in data?” It is much easier to consider and treat data as a valuable asset than it is to monetize it and actually generate value from it.

Data monetization, the term used to describe a variety of approaches to turning data into dollars, is a whole new ball game when it comes to managing and using data. It demands different business processes, a unique blend of skills and capabilities, and sometimes even requires new operating models. There are a variety of considerations for businesses looking to launch monetization initiatives. This five-part series will introduce a framework to help you evaluate the most appropriate method of monetization for your organization.
Part One: The Focus and State of the Problem
The most important factor in any monetization effort is the product, service or practice should solve a problem or have value in the context of the consumer’s use. When considering value for the consumer it first must have value of utility in order for it to have an exchange value to monetize. This is true whether there is to be exchange of currency in a sales transaction, an exchange of goods or services in a barter or trade deal, or an exchange of internal capabilities that reduce operating costs.
All data monetization efforts require that data is ultimately used to drive actions or decisions that solve a problem for an end consumer. This fundamental requirement is where most businesses fail when attempting to monetize data because the typical approach is “How can we sell data to increase our revenues?” which assumes that the value is the sale of the data itself. In order to successfully monetize data, organizations must flip this approach and start with the end in mind. The questions should be “What problem can our data solve?” and “How valuable would it be to the end consumer if these problems were solved?”
It is important to note that “end consumer” does not always mean customer either. Monetized data solutions can be for internal end consumers as well. Monetization is about solving problems, driving action or decisions, and creating solutions that provide unique capabilities with high utility value that the end consumer would not otherwise be able to generate on their own.
Two aspects of “problem” define the data monetization framework, the focus and the state (see figure 1). Focus determines if the problem to be solved is based on an internal or external need. If you are looking to reach more customers, sell more products or improve business processes, the focus of the problem is internal. If you are looking to improve the customer experience, create additional functionality or utility in products, or provide a solution to a customer’s problem, the focus is external.
The state of the problem is determined by how long the problem has existed. If it is a current, ongoing problem where the need is known, the state is existing. If however, the problem is recently identified or has not been ongoing, the state is new. The needs of existing problems are well defined whereas the needs of new problems may not be specific or wholly understood. This means that while all monetization offerings ultimately provide solutions to problems, monetizing opportunities for problems with a state of new, will require greater demonstration and definition of utility for the end consumer.
Defining the problem in the terms of state and focus determines the monetization opportunity at hand and is critical as each of the four data monetization opportunities have unique considerations and approaches for the collection, packaging and delivery of data-based solutions
Info-Management: http://bit.ly/1JPSGtX

 

« Cyber Insurance Policies: Worth the Money?
The Rules of Cyberspace Just Got A Bit Clearer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Intrepid Solutions & Services

Intrepid Solutions & Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

Defence Labs

Defence Labs

Defence Labs is a cybersecurity company specialising in cost effective penetration testing for small-to-medium sized enterprises.