{"id":391804,"date":"2023-04-26T12:38:06","date_gmt":"2023-04-26T16:38:06","guid":{"rendered":"https:\/\/www.govloop.com\/?p=391804"},"modified":"2023-04-26T12:38:07","modified_gmt":"2023-04-26T16:38:07","slug":"secure-data-secure-decision-making","status":"publish","type":"post","link":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/","title":{"rendered":"Secure Data, Secure Decision-Making"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Easy access to data is crucial for decision-making, especially in finding the right questions to ask. But security is equally crucial. As data increases, it becomes more challenging to store, share and secure it, within and across organizations.<\/p>\n\n\n\n<p>\u201cWe want to use data more and more to make data-based or data-oriented decisions,\u201d said Kevin Steeprows, Field Chief Technology Officer with Red River, a technology transformation company serving government and enterprise customers. \u201cBut we\u2019ve still got that same dilemma that has existed since the dawn of time, that there\u2019s so much data out there. Where does it reside? Who has access to it?\u201d<\/p>\n\n\n\n<p>Red River helps agencies with many facets of technology integration that pertain to data, such as cloud migration, data center development, data mapping and infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Take Stock of What You Have<\/h2>\n\n\n\n<p>To make solid steps forward, Steeprow recommended agencies \u201cstart where they are.\u201d <\/p>\n\n\n\n<p>That means evaluating the systems that are already in place and finding out who can access them. Red River helps identify the characteristics of the highest-value data sources to determine if they align with the agency\u2019s mission. Data that pertains to compliance requirements and mandates is a priority.<\/p>\n\n\n\n<p>Visualization, which pulls together information from different sources, helps users understand what data means and respond to it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Keep Access Authorized<\/h2>\n\n\n\n<p>A big challenge is managing the tension between keeping data secure and making it accessible.<\/p>\n\n\n\n<p>Red River helps agencies build security models that help them with threat-hunting, through adaptive thresholding, mathematical principles and ML, and dashboards highlighting potential malicious activity.<\/p>\n\n\n\n<p>\u201cSo, with all those things to protect the data, how are we going to get access to it in order to make a decision that\u2019s meaningful and appropriate?\u201d asked Steeprow.<\/p>\n\n\n\n<p>For example, if zero-trust architecture prevents an agency from accessing data needed for decision-making, Red River systems help notify the user that data is missing, because of the way they have tried to access it. Steeprow and his team also help agencies record data correlations, so that there is a historical record of how users have analyzed information, he said.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Build a More Complete Picture<\/h2>\n\n\n\n<p>According to Steeprow, agencies need to get a full, holistic view of data systems, \u201crather than just diving in and asking a question, pulling data and coming up with an answer \u2014 and hoping that that\u2019s the right answer.\u201d<\/p>\n\n\n\n<p>If someone is working with incomplete data, they might be asking the wrong question, resulting in useless or, worse, misleading results, he said. That\u2019s especially true for emergency situations when directors need to make decisions quickly.<\/p>\n\n\n\n<p>As Steeprow said, AI and ML are only just beginning to bring data management to a place where information is comprehensive and accurate. But already the process is helping software engineers and agencies think in new ways, ask questions and evaluate processes.<\/p>\n\n\n\n<p>All those capabilities \u2014 when fully integrated into an agency\u2019s data coordination and processes \u2014 lead to more secure and complete use of data.<\/p>\n\n\n\n<p><em>This article appears in our guide, \u201c<a href=\"https:\/\/go.govloop.com\/data-based-decision-making\" target=\"_blank\" rel=\"noreferrer noopener\">Decision Intelligence: New Possibilities for Data-Based Decision-Making<\/a>.\u201d For more about how agencies are using data in practical ways, download it here:<\/em><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-text-align-center wp-element-button\" href=\"https:\/\/go.govloop.com\/data-based-decision-making\" target=\"_blank\" rel=\"noreferrer noopener\">Get the guide<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Image by\u00a0<a href=\"https:\/\/pixabay.com\/users\/akitada31-172067\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=6560745\">Roman<\/a>\u00a0from\u00a0<a href=\"https:\/\/pixabay.com\/\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=6560745\">Pixabay<\/a>\u00a0<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>As data increases, it becomes more difficult for agencies to store, share and secure it, both internally and with other organizations.<\/p>\n","protected":false},"author":204028,"featured_media":391843,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,15,24],"tags":[11027,14481,28446,22679],"class_list":["post-391804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analytics","category-cybersecurity","category-tech","tag-data-management","tag-data-security","tag-decision-intelligence-2023","tag-red-river"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Data, Secure Decision-Making - GovLoop<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Data, Secure Decision-Making - GovLoop\" \/>\n<meta property=\"og:description\" content=\"As data increases, it becomes more difficult for agencies to store, share and secure it, both internally and with other organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/\" \/>\n<meta property=\"og:site_name\" content=\"GovLoop\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-26T16:38:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-26T16:38:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.govloop.com\/wp-content\/uploads\/2023\/04\/computer-gc78d763a1_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Susan Kirby-Smith\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Susan Kirby-Smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/\"},\"author\":{\"name\":\"Susan Kirby-Smith\",\"@id\":\"https:\\\/\\\/www.govloop.com\\\/#\\\/schema\\\/person\\\/b0a8dc2576c58ef8e2558d9fc3a81043\"},\"headline\":\"Secure Data, Secure Decision-Making\",\"datePublished\":\"2023-04-26T16:38:06+00:00\",\"dateModified\":\"2023-04-26T16:38:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/\"},\"wordCount\":533,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.govloop.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/computer-gc78d763a1_1280.jpg\",\"keywords\":[\"data management\",\"Data Security\",\"Decision Intelligence 2023\",\"Red River\"],\"articleSection\":[\"Analytics\",\"Cybersecurity\",\"Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/\",\"url\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/\",\"name\":\"Secure Data, Secure Decision-Making - GovLoop\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.govloop.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.govloop.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/computer-gc78d763a1_1280.jpg\",\"datePublished\":\"2023-04-26T16:38:06+00:00\",\"dateModified\":\"2023-04-26T16:38:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.govloop.com\\\/#\\\/schema\\\/person\\\/b0a8dc2576c58ef8e2558d9fc3a81043\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.govloop.com\\\/secure-data-secure-decision-making\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.govloop.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/computer-gc78d763a1_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/www.govloop.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/computer-gc78d763a1_1280.jpg\",\"width\":1280,\"height\":596},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.govloop.com\\\/#website\",\"url\":\"https:\\\/\\\/www.govloop.com\\\/\",\"name\":\"GovLoop\",\"description\":\"The Knowledge Network for Government\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.govloop.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.govloop.com\\\/#\\\/schema\\\/person\\\/b0a8dc2576c58ef8e2558d9fc3a81043\",\"name\":\"Susan Kirby-Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.govloop.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/cropped-Susan_Kirby_Smith-031-scaled-1-96x96.jpg\",\"url\":\"https:\\\/\\\/www.govloop.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/cropped-Susan_Kirby_Smith-031-scaled-1-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.govloop.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/cropped-Susan_Kirby_Smith-031-scaled-1-96x96.jpg\",\"caption\":\"Susan Kirby-Smith\"},\"url\":\"https:\\\/\\\/www.govloop.com\\\/author\\\/susankirbysmith\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Data, Secure Decision-Making - GovLoop","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/","og_locale":"en_US","og_type":"article","og_title":"Secure Data, Secure Decision-Making - GovLoop","og_description":"As data increases, it becomes more difficult for agencies to store, share and secure it, both internally and with other organizations.","og_url":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/","og_site_name":"GovLoop","article_published_time":"2023-04-26T16:38:06+00:00","article_modified_time":"2023-04-26T16:38:07+00:00","og_image":[{"width":1280,"height":596,"url":"https:\/\/www.govloop.com\/wp-content\/uploads\/2023\/04\/computer-gc78d763a1_1280.jpg","type":"image\/jpeg"}],"author":"Susan Kirby-Smith","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Susan Kirby-Smith","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/#article","isPartOf":{"@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/"},"author":{"name":"Susan Kirby-Smith","@id":"https:\/\/www.govloop.com\/#\/schema\/person\/b0a8dc2576c58ef8e2558d9fc3a81043"},"headline":"Secure Data, Secure Decision-Making","datePublished":"2023-04-26T16:38:06+00:00","dateModified":"2023-04-26T16:38:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/"},"wordCount":533,"commentCount":0,"image":{"@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/#primaryimage"},"thumbnailUrl":"https:\/\/www.govloop.com\/wp-content\/uploads\/2023\/04\/computer-gc78d763a1_1280.jpg","keywords":["data management","Data Security","Decision Intelligence 2023","Red River"],"articleSection":["Analytics","Cybersecurity","Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.govloop.com\/secure-data-secure-decision-making\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/","url":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/","name":"Secure Data, Secure Decision-Making - GovLoop","isPartOf":{"@id":"https:\/\/www.govloop.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/#primaryimage"},"image":{"@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/#primaryimage"},"thumbnailUrl":"https:\/\/www.govloop.com\/wp-content\/uploads\/2023\/04\/computer-gc78d763a1_1280.jpg","datePublished":"2023-04-26T16:38:06+00:00","dateModified":"2023-04-26T16:38:07+00:00","author":{"@id":"https:\/\/www.govloop.com\/#\/schema\/person\/b0a8dc2576c58ef8e2558d9fc3a81043"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.govloop.com\/secure-data-secure-decision-making\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.govloop.com\/secure-data-secure-decision-making\/#primaryimage","url":"https:\/\/www.govloop.com\/wp-content\/uploads\/2023\/04\/computer-gc78d763a1_1280.jpg","contentUrl":"https:\/\/www.govloop.com\/wp-content\/uploads\/2023\/04\/computer-gc78d763a1_1280.jpg","width":1280,"height":596},{"@type":"WebSite","@id":"https:\/\/www.govloop.com\/#website","url":"https:\/\/www.govloop.com\/","name":"GovLoop","description":"The Knowledge Network for Government","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.govloop.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.govloop.com\/#\/schema\/person\/b0a8dc2576c58ef8e2558d9fc3a81043","name":"Susan Kirby-Smith","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.govloop.com\/wp-content\/uploads\/2022\/09\/cropped-Susan_Kirby_Smith-031-scaled-1-96x96.jpg","url":"https:\/\/www.govloop.com\/wp-content\/uploads\/2022\/09\/cropped-Susan_Kirby_Smith-031-scaled-1-96x96.jpg","contentUrl":"https:\/\/www.govloop.com\/wp-content\/uploads\/2022\/09\/cropped-Susan_Kirby_Smith-031-scaled-1-96x96.jpg","caption":"Susan Kirby-Smith"},"url":"https:\/\/www.govloop.com\/author\/susankirbysmith\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/posts\/391804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/users\/204028"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/comments?post=391804"}],"version-history":[{"count":8,"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/posts\/391804\/revisions"}],"predecessor-version":[{"id":391848,"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/posts\/391804\/revisions\/391848"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/media\/391843"}],"wp:attachment":[{"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/media?parent=391804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/categories?post=391804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govloop.com\/wp-json\/wp\/v2\/tags?post=391804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}