{"id":1840,"date":"2021-09-29T15:18:33","date_gmt":"2021-09-29T19:18:33","guid":{"rendered":"https:\/\/compliancechief360.com\/?p=1840"},"modified":"2022-05-19T13:02:36","modified_gmt":"2022-05-19T17:02:36","slug":"looking-for-compliance-risks-in-oceans-of-data","status":"publish","type":"post","link":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/","title":{"rendered":"Looking for Compliance Risks in Oceans of Data"},"content":{"rendered":"<h3><span style=\"color: #57bc90;\">Leveraging machine learning and advanced anomaly detection to address the overwhelming flood of digital communications data<\/span><\/h3>\n<span class=\"wpsdc-drop-cap\">S<\/span>ince email first revolutionized the way professionals communicate with each other, the proliferation of faster and more sophisticated digital communication tools for powering business has only continued to expand. It\u2019s well known that companies are facing an unprecedented spike in the volume and complexity of data they generate from digital collaboration platforms that combine elements of instant messaging, audio and video conferencing, file sharing, and social media. And it\u2019s getting much worse.<\/p>\n<p>As \u201cwork-from-anywhere\u201d models became a requirement during the COVID-19 pandemic and workers were forced to interact almost completely over digital platforms, those oceans of data rose dramatically. This tremendous growth in digital communications data is accompanied by a host of potential underlying compliance risks, even while compliance officers already report their teams are being <a href=\"https:\/\/www.law360.com\/articles\/1359078\/compliance-officers-stretched-thin-as-remote-work-goes-on\">stretched thinner than ever<\/a>. Email traffic itself has <a href=\"https:\/\/www.ragan.com\/internal-email-usage-spikes-more-than-100-during-coronavirus-crisis\/\">nearly doubled<\/a> since the emergence of the pandemic, but the majority of the explosion in company-generated data comes from platforms such as Microsoft Teams, which generates up to 18 new fields of metadata and transactional records for each of its six unique types of virtual interactions.<\/p>\n<p>At the core of the issue is the fact that the flood of data has rapidly outpaced companies\u2019 ability to implement data governance strategies to effectively monitor its integrity. This limitation, however, hasn\u2019t stopped numerous regulators including the Criminal Division of the U.S. Department of Justice (DoJ), the Securities and Exchange Commission (SEC), and Financial Industry Regulatory Authority (FINRA) each from issuing their own separate guidance regarding companies\u2019 retention and utilization of internal data assets in furtherance of <a href=\"https:\/\/www.justice.gov\/criminal-fraud\/page\/file\/937501\">compliance and risk management programs<\/a>. (See, <em>SEC Rule 17a-3 and 17a-4, SEC Rule 204-2 and 206(4)-7; and FINRA 2210, 2212-2216, 3110, 4511 and 4513.)<\/em><\/p>\n<p>The <a href=\"https:\/\/www.justice.gov\/criminal-fraud\/page\/file\/937501\">messaging from regulators<\/a> since the onset of the COVID-19 pandemic made clear that the onus is on compliance program leaders not only to find ways to effectively monitor this new surge in data they\u2019re experiencing at present, but also to continually remediate, according to the DoJ, “any impediments exist that limit [compliance and control personnel\u2019s] access to relevant sources of data\u201d for testing of policies, controls, and transactions.<\/p>\n<p>It\u2019s a tall order. Many companies are finding that the legacy tools and technologies in place to conduct risk-based monitoring are inadequate or impractical for overseeing and exerting control over such large and diverse sets of data in the manner that regulators now seem to broadly expect.<\/p>\n<p><span style=\"color: #015249;\"><strong>Why Traditional Approaches Fail<\/strong><\/span><br \/>\nThe most traditional and widely-used approaches to digital communications monitoring center around keyword searches, which employ a series of statistical queries to identify or \u201ccount\u201d the frequency of search term matches within a particular data set. In their most basic form, keyword search tools can take the form of using \u201cControl+F\u201d at the top of your web browser, while newer natural language processing-based (NLP) tools may incorporate features such as advanced search term syntax languages that enable \u201cbatching\u201d of similar results to further isolate individual review areas. Digital communications monitoring tools based on this approach, however, are often only effective in situations where the volume of data is low and the scope of the review is limited to <em>known<\/em> words or phrases associated with the risk or target activity.<\/p>\n<p>The unique and unpredictable nature of human language presents severe complications for compliance leaders that rely solely on keyword searches and other tools based on simple term-frequency to oversee the mass volumes emails, chat messages, customer service calls, and recorded video conference data their companies generate on a daily basis. Notably, there are three key factors that can undermine the effectiveness of traditional keyword search-based monitoring tools when deployed on digital communications datasets of today\u2019s scale and complexity:<\/p>\n<p><strong>1) Adversarial Adaptation:<\/strong> By now, most employees are well aware that their organizations are <a href=\"https:\/\/www.wsj.com\/articles\/the-new-ways-your-boss-is-spying-on-you-11563528604\">collecting and monitoring their digital communications data<\/a>. Adversarial adaptation refers to the fact that bad actors are constantly adapting or evolving their use of digital communications platforms to avoid detection by monitoring tools. By the time the compliance team has updated its search term list to include a new nickname for a prohibited activity, employees may have already moved on to using an emoji, GIF, or other chat feature signaling to take the discussion offline. Because they limit results to what the reviewer knows to include in the search terms beforehand, the detection power of tools that rely primarily on keyword searches inherently get weaker over time as user behavior evolves in an adversarial manner.<\/p>\n<p><strong>2) Unbalanced Activity:<\/strong> Of the terabytes of digital communications records that companies generate each year of operations, only a minute proportion is likely to exhibit characteristics that put the company at risk. While crucial to executing operations across the business, the overwhelming majority of a company\u2019s emails, chats, and meeting logs tend to be \u2013 from a compliance and internal control perspective \u2013 mundane and of no significance to achieving objectives. Unfortunately, this aspect of digital communications data is in direct conflict with traditional monitoring tools based on the principle that a document\u2019s relevance is based unilaterally on the number of times that search terms appear within its content. As the volume of messages being examined increases, using this approach to separate the red flags from rest of the data set becomes less reliable and more prone to blind spots where isolated, one-off issues are more likely to remain undetected.<\/p>\n<p><strong>3) Linear Growth of False Positives:<\/strong> More often than not, compliance audits and internal investigations are not limited to one single focus area or review criteria. As these reviews evolve in scope and complexity, teams using keyword search-based tools have no choice but to tack on additional search terms, casting an ever-wider net for each new risk element added to the list of targets. Because traditional term-frequency algorithms return all matching iterations of search terms regardless of their relevance, the quantity of false positives that review teams will have to sift through increases each time an additional search term gets added to the list. As a result, compliance and internal audit teams are often forced to go through a lengthy trial-and-error process with search term lists, modifying or removing terms until the number of potential \u201chits\u201d is considered manageable for the budget and resources available to actually perform the review.<\/p>\n<p><span style=\"color: #015249;\"><strong>Machine Learning to the Rescue<\/strong><\/span><br \/>\nLong before the emergence of COVID-19 accelerated the adoption of digital workspace platforms, experts in data science and computer science had already been developing new mathematical and analytical approaches to outlier detection that address the shortcomings of keyword searches. In 2018, a team of Paris-based researchers published the results of their experimental comparison and analysis of fourteen different algorithms and techniques for detecting outliers within datasets, otherwise known as unsupervised anomaly detection. The <a href=\"https:\/\/doi.org\/10.1016\/j.patcog.2017.09.037\">results of the study<\/a>, which compared of each algorithm\u2019s ability to flag outliers across 15 unique real-world datasets with sample sizes ranging from 723 to 20,000, showed one technique that consistently outperformed all other algorithms on multiple datasets, known as <em>isolation forests<\/em>.<\/p>\n<p><a href=\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Isolation-Forest-example.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1842 alignleft\" src=\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Isolation-Forest-example-300x200.png\" alt=\"Isolation Forest Example\" width=\"836\" height=\"557\" srcset=\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Isolation-Forest-example-300x200.png 300w, https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Isolation-Forest-example-768x512.png 768w, https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Isolation-Forest-example.png 900w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/a><\/p>\n<p> <\/p>\n<p>First developed in 2008 by a group of academics including Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou, the <a href=\"https:\/\/cs.nju.edu.cn\/zhouzh\/zhouzh.files\/publication\/icdm08b.pdf?q=isolation-forest\">isolation forest technique<\/a> is based on the statistical reality that outliers in datasets are \u201cfew and different,\u201d meaning that they occur less often and have attribute values that vary greatly compared to inliers. The algorithm uses a series of binary splits, called isolation trees, which can be trained with machine learning techniques and model datasets to rapidly calculate an \u201canomaly score\u201d between 0 and 1 for each unique value in a data set. The closer a data point\u2019s anomaly score is to 1, the more closely that data point resembles the traits of an outlier.<\/p>\n<p>In addition to its superior ability to detect outliers, other features of isolation forests such as low memory usage and fast computation time led another team of data scientists, including R\u00e9mi Domingues, to <a href=\"https:\/\/doi.org\/10.1016\/j.patcog.2017.09.037\">conclude<\/a> in 2018 that isolation forest \u201cis an excellent method to efficiently identify outliers while showing an excellent scalability on large datasets along with an acceptable memory usage for datasets up to one million samples.\u201d The demonstrated reliability and scalability of this approach to detecting outliers has since given rise to renowned social media companies, <a href=\"https:\/\/engineering.linkedin.com\/blog\/2019\/isolation-forest\">including LinkedIn<\/a>, to adopt isolation forests as their primary tool for detecting and preventing various types of online abuse including fake accounts, member profile scraping, automated spam, and account takeovers.<\/p>\n<p><span style=\"color: #015249;\"><strong>Using Advanced Anomaly Detection<\/strong><\/span><br \/>\nWhen dealing with mass volumes of digital communications data, utilizing an advanced anomaly detection algorithm such as the isolation forest technique has a number of advantages that can translate to increased efficiency and more reliable results for compliance team members conducting reviews. Unlike keyword searches, anomaly detection algorithms account for the fact that language is repetitive, and the frequency of a word within a set of communications data does not always imply relevance. Thus, monitoring tools that leverage anomaly detection algorithms trained via machine learning can help greatly reduce the volume of false positives flagged for review, allowing compliance teams to complete reviews in shorter times using less resources.<\/p>\n<p>In addition to saving time and improving efficiency, however, the fact that anomaly detection tools do not rely on delimited search term lists can neutralize the effects of search term bias and adversarial adaptation. When compliance teams are forced to limit their monitoring of digital communications data to <em>known<\/em> risks contained in a delimited search term list, the likelihood of <em>unknown<\/em> risks remaining undetected is much higher. Prioritizing review efforts based on a statistical measure of uniqueness such as anomaly score, as opposed to the number of search term hits, can provide a much more robust and uniform method of executing compliance audits when the number of documents to be reviewed greatly exceeds the number of reviewers.<\/p>\n<p>As the volume of digital communications data continues to grow, meeting the heightened monitoring expectations of regulators will likely prove to be a demanding task, especially while many compliance departments are still working through the backlog of action items emerging from the shift to remote work. To keep an eye on the risks that may be buried in the overwhelming volume of digital communications, organizations must reevaluate their monitoring strategies and equip themselves with the proper tools capable of digesting this data into actionable insights for detecting and responding to activities that put the company in harm\u2019s way.\u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1477\" src=\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/06\/CC360-end-slug.png\" alt=\"\" width=\"20\" height=\"20\" \/><\/p>\n<hr \/>\n<p><span style=\"color: #015249;\"><em>John Poulin is Chief Technology Officer at Helio Argos, the developer of HelioPDR, a proprietary automated compliance data analytics tool. <\/em><\/span><\/p>\n<p><span style=\"color: #015249;\"><em>Ben Schein, CFE, is an Associate at Helio Health Group LLC, a data science-focused compliance consulting organization for the life sciences sector.<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leveraging machine learning and advanced anomaly detection to address the overwhelming flood of digital communications data Since email first revolutionized the way professionals communicate with each other, the proliferation of faster and more sophisticated digital communication tools for powering business has only continued to expand. It\u2019s well known that companies are facing an unprecedented spike […]<\/p>\n","protected":false},"author":1,"featured_media":1843,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,16],"tags":[62,34,42],"class_list":["post-1840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-insight-360","tag-data-governance","tag-regulation","tag-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Looking for Compliance Risks in Oceans of Data - Compliance Chief 360<\/title>\n<meta name=\"description\" content=\"The core of the issue is that the flood of data has outpaced companies\u2019 ability to adopt data governance strategies to monitor its integrity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Looking for Compliance Risks in Oceans of Data - Compliance Chief 360\" \/>\n<meta property=\"og:description\" content=\"The core of the issue is that the flood of data has outpaced companies\u2019 ability to adopt data governance strategies to monitor its integrity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Compliance Chief 360\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InternalAudit360com-546428422399536\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-29T19:18:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-19T17:02:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1083\" \/>\n\t<meta property=\"og:image:height\" content=\"722\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joseph McCafferty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McCafOnAudit\" \/>\n<meta name=\"twitter:site\" content=\"@CC360Com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Poulin and Ben Schein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/\"},\"author\":{\"name\":\"Joseph McCafferty\",\"@id\":\"https:\/\/compliancechief360.com\/#\/schema\/person\/ec45c18ca18b7e347e047c24fb6eb113\"},\"headline\":\"Looking for Compliance Risks in Oceans of Data\",\"datePublished\":\"2021-09-29T19:18:33+00:00\",\"dateModified\":\"2022-05-19T17:02:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/\"},\"wordCount\":1785,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/compliancechief360.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg\",\"keywords\":[\"Data Governance\",\"regulation\",\"technology\"],\"articleSection\":[\"Articles\",\"Insight 360\u00b0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/\",\"url\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/\",\"name\":\"Looking for Compliance Risks in Oceans of Data - Compliance Chief 360\",\"isPartOf\":{\"@id\":\"https:\/\/compliancechief360.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg\",\"datePublished\":\"2021-09-29T19:18:33+00:00\",\"dateModified\":\"2022-05-19T17:02:36+00:00\",\"description\":\"The core of the issue is that the flood of data has outpaced companies\u2019 ability to adopt data governance strategies to monitor its integrity.\",\"breadcrumb\":{\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage\",\"url\":\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg\",\"contentUrl\":\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg\",\"width\":1083,\"height\":722},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/compliancechief360.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Looking for Compliance Risks in Oceans of Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/compliancechief360.com\/#website\",\"url\":\"https:\/\/compliancechief360.com\/\",\"name\":\"Compliance Chief 360\",\"description\":\"The independent knowledge source for Compliance Officers\",\"publisher\":{\"@id\":\"https:\/\/compliancechief360.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/compliancechief360.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/compliancechief360.com\/#organization\",\"name\":\"Compliance Chief 360\",\"url\":\"https:\/\/compliancechief360.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/compliancechief360.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/07\/cropped-Compliance-Master-Logo.png\",\"contentUrl\":\"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/07\/cropped-Compliance-Master-Logo.png\",\"width\":636,\"height\":230,\"caption\":\"Compliance Chief 360\"},\"image\":{\"@id\":\"https:\/\/compliancechief360.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InternalAudit360com-546428422399536\/\",\"https:\/\/x.com\/CC360Com\",\"https:\/\/www.linkedin.com\/in\/joseph-mccafferty-4a11b29\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/compliancechief360.com\/#\/schema\/person\/ec45c18ca18b7e347e047c24fb6eb113\",\"name\":\"Joseph McCafferty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/compliancechief360.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4124bb2a8d2d81d714af93a207730f54?s=96&d=blank&r=r\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4124bb2a8d2d81d714af93a207730f54?s=96&d=blank&r=r\",\"caption\":\"Joseph McCafferty\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/joe-mccafferty-723030202\/\",\"https:\/\/x.com\/McCafOnAudit\"],\"url\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Looking for Compliance Risks in Oceans of Data - Compliance Chief 360","description":"The core of the issue is that the flood of data has outpaced companies\u2019 ability to adopt data governance strategies to monitor its integrity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/","og_locale":"en_US","og_type":"article","og_title":"Looking for Compliance Risks in Oceans of Data - Compliance Chief 360","og_description":"The core of the issue is that the flood of data has outpaced companies\u2019 ability to adopt data governance strategies to monitor its integrity.","og_url":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/","og_site_name":"Compliance Chief 360","article_publisher":"https:\/\/www.facebook.com\/InternalAudit360com-546428422399536\/","article_published_time":"2021-09-29T19:18:33+00:00","article_modified_time":"2022-05-19T17:02:36+00:00","og_image":[{"width":1083,"height":722,"url":"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg","type":"image\/jpeg"}],"author":"Joseph McCafferty","twitter_card":"summary_large_image","twitter_creator":"@McCafOnAudit","twitter_site":"@CC360Com","twitter_misc":{"Written by":"John Poulin and Ben Schein","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#article","isPartOf":{"@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/"},"author":{"name":"Joseph McCafferty","@id":"https:\/\/compliancechief360.com\/#\/schema\/person\/ec45c18ca18b7e347e047c24fb6eb113"},"headline":"Looking for Compliance Risks in Oceans of Data","datePublished":"2021-09-29T19:18:33+00:00","dateModified":"2022-05-19T17:02:36+00:00","mainEntityOfPage":{"@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/"},"wordCount":1785,"commentCount":0,"publisher":{"@id":"https:\/\/compliancechief360.com\/#organization"},"image":{"@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage"},"thumbnailUrl":"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg","keywords":["Data Governance","regulation","technology"],"articleSection":["Articles","Insight 360\u00b0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/","url":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/","name":"Looking for Compliance Risks in Oceans of Data - Compliance Chief 360","isPartOf":{"@id":"https:\/\/compliancechief360.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage"},"image":{"@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage"},"thumbnailUrl":"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg","datePublished":"2021-09-29T19:18:33+00:00","dateModified":"2022-05-19T17:02:36+00:00","description":"The core of the issue is that the flood of data has outpaced companies\u2019 ability to adopt data governance strategies to monitor its integrity.","breadcrumb":{"@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#primaryimage","url":"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg","contentUrl":"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/09\/Looking-for-Compliance-risks.jpg","width":1083,"height":722},{"@type":"BreadcrumbList","@id":"https:\/\/compliancechief360.com\/looking-for-compliance-risks-in-oceans-of-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliancechief360.com\/"},{"@type":"ListItem","position":2,"name":"Looking for Compliance Risks in Oceans of Data"}]},{"@type":"WebSite","@id":"https:\/\/compliancechief360.com\/#website","url":"https:\/\/compliancechief360.com\/","name":"Compliance Chief 360","description":"The independent knowledge source for Compliance Officers","publisher":{"@id":"https:\/\/compliancechief360.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliancechief360.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/compliancechief360.com\/#organization","name":"Compliance Chief 360","url":"https:\/\/compliancechief360.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compliancechief360.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/07\/cropped-Compliance-Master-Logo.png","contentUrl":"https:\/\/compliancechief360.com\/wp-content\/uploads\/2021\/07\/cropped-Compliance-Master-Logo.png","width":636,"height":230,"caption":"Compliance Chief 360"},"image":{"@id":"https:\/\/compliancechief360.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InternalAudit360com-546428422399536\/","https:\/\/x.com\/CC360Com","https:\/\/www.linkedin.com\/in\/joseph-mccafferty-4a11b29\/"]},{"@type":"Person","@id":"https:\/\/compliancechief360.com\/#\/schema\/person\/ec45c18ca18b7e347e047c24fb6eb113","name":"Joseph McCafferty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compliancechief360.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4124bb2a8d2d81d714af93a207730f54?s=96&d=blank&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4124bb2a8d2d81d714af93a207730f54?s=96&d=blank&r=r","caption":"Joseph McCafferty"},"sameAs":["https:\/\/www.linkedin.com\/in\/joe-mccafferty-723030202\/","https:\/\/x.com\/McCafOnAudit"],"url":""}]}},"_links":{"self":[{"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/posts\/1840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/comments?post=1840"}],"version-history":[{"count":8,"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/posts\/1840\/revisions"}],"predecessor-version":[{"id":1921,"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/posts\/1840\/revisions\/1921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/media?parent=1840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/categories?post=1840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliancechief360.com\/wp-json\/wp\/v2\/tags?post=1840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}