WCCCE Keynote Speakers

Keynote Speaker: Peter Aiken

Peter Aiken

Peter Aiken is acknowledged to be a top data management (DM) authority. As a practicing data consultant, author and researcher, he has been actively performing and studying DM for more than 30 years. His expertise has been sought by some of the world's most important organizations and his achievements have been recognized internationally.  He has held leadership positions and consulted with more than 75 organizations in 21 countries across numerous industries, including defense, banking, healthcare, telecommunications and manufacturing. He is a sought-after keynote speaker and author of multiple publications, including his latest the "Case for the CDO" & "Monetizing Data Management." Peter is the Founding Director of Data Blueprint, a consulting firm that puts organizations on the right path to leverage data for competitive advantage and operational efficiency.  He is also Associate Professor of Information Systems at Virginia Commonwealth University (VCU) and past President of the International Data Management Association (DAMA-I).

Topic: Demystifying Big Data (click to download the complete presentation)

Yes, we face a data deluge and big data seems to be largely about how to deal with it.  But much of what has been written about big data is focused on selling hardware and services.  The truth is that until the concept of big data can be objectively defined, any measurements, claims of success, quantifications, etc. must be viewed skeptically and with suspicion.  While both the need for and approaches to these new requirements are faced by virtually every organization, jumping into the fray ill-prepared has (to date) reproduced the same dismal IT project results. 

Learning Objectives
-  The very real, very rapid, very great increases in data of all forms (charts showing data types and volume increases)
-  Challenges faced by virtually all data management programs
-  Means by which big data techniques can compliment existing data management practices
-  Necessary but insufficient pre-requisites to exploiting big data techniques
-  Prototyping nature of practicing big data techniques

Keynote Speakers: Sharon Polsky & Charles W. Woodsworth

Sharon Polsky

Sharon Polsky is president of AMINA  Corp and president of the Privacy & Access Council of Canada, and for more than 25 years, a who's who of governments and Fortune 500 corporations across North America have embraced her refreshingly pragmatic approach to information privacy, data governance, and information risk management. Since 2007, she has served as the President of the Privacy and Access Council of Canada and as the Editor-in-Chief of The Winston Report, the foremost quarterly journal devoted to information access, privacy protection and data governance in Canada. Sharon holds Canada's most senior professional privacy designation, Master Access and Privacy Professional (MAPP). 


Charles W. Woodsworth

Charles W. Wordsworth is Principal Consultant of Wordsworth & Associates, a leading Canadian provider of information systems security consulting services and vice president of the Privacy & Access Council of Canada. Wordsworth has the Information Systems Professional of Canada (I.S.P.) Certification, an internationally recognized information technology designation. He is also an Information Technology Certified Professional (ITCP). a Certified Management Consultant (CMC) and a Certified Network Forensic Professional (CNFP).


Topic: Data Governance Beyond the Border

The Emperor's Clothes have been stripped off, and recent attention to secretive data sharing has raised concern that complying with Canada's access and privacy laws is more complicated than we ever expected. It's more important than ever to understand how hidden laws and processes affect our ability to comply with Canada's privacy, access-to-information and anti-spam laws. In the face of this new reality, what changes will you have to make to ensure the programs, processes and systems in your organization comply with Canada's privacy, access-to-information and anti-spam laws?What can we learn from recent security breaches and how do we prepare and respond to the inevitable.