How do I go about setting a successful Master Data Management strategy?

9.7k viewscircle icon1 Upvotecircle icon4 Comments
Sort by:
Senior Director in Finance (non-banking)6 years ago

Key characteristics of MDM strategy

Identification of key data and meta data (data about data)
True North of the data source
Federation of data and its management
Create different tracks (depending on the org size/complexity)
Data Ownership -Identify data owners and stewards - maybe a CDO
Data Governance - What and how do you govern it
Data Management - Ongoing data scrubbing
Tool Selection and Implementation
Being Patient... as these journeys take awhile

CIO in Healthcare and Biotech6 years ago

I find that setting a MDM strategy is one of the most challenging because most organizational cultures aren't quite savvy around this concept. First thing is to understand that org culture so that you know who your positive and negative stakeholders are and make a plan on how best to leverage those stakeholders in the process. This is also an area ripe for bringing in an outside resource to help guide the development but it needs to be someone who has the scars from having crafted and implemented a MDM strategy before.

Lightbulb on1
CIO in Finance (non-banking)7 years ago

I started by outlining principles of what I wanted to accomplish (transparency, self service, targeted power users, more consistently right data outcomes) and then sought out people, process, technology to help realize that vision. Its a long ride so be patient.

1 Reply
no title7 years ago

The first thing I would do is to identify what are the key data elements that are important to the business stakeholders. Next, you need to identify where the data resides, how does it get updated, changed etc. At this point, you can now start to look at your MDM process and technology.

Lightbulb on1

Content you might like

Sales/Marketing19%

Competitive Analysis39%

Product Innovation24%

Training9%

Business Forecasting5%

Other (please note in the comments)1%

View Results

We are not able to do this in real time as of now9%

We do quarterly manual reviews or yearly interviews with the 3rd parties33%

We depend on the 3rd parties to let us know out of band if they feel they have violated the DPA, SCC28%

We have a dedicated personnel that monitors these data transfers using homegrown tools11%

We use outbound firewalls, CDNS, load balancers, API gateways - to get some visibility into these issues, but don't have a complete workflow in place9%

We have built homegrown custom solutions to address this4%

We use commercial services to answer if there is a difference between expected DPA, SCC behavior and reality in terms of data being sent to 3rd parties2%

View Results