dualitytech.com Open in urlscan Pro
2600:9000:2490:3e00:2:d710:2680:93a1  Public Scan

Submitted URL: https://go.dualitytech.com/e/966673/i-for-data-driven-initiatives-/42pz1/176252253?h=Yzy9L9c6fp140DuUTbYTmAeHP1T_U3ePWTVfII...
Effective URL: https://dualitytech.com/how-risk-leaders-can-improve-roi-for-data-driven-initiatives/
Submission: On May 08 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://dualitytech.com/search/

<form class="elementor-search-form" role="search" action="https://dualitytech.com/search/" method="get">
  <div class="elementor-search-form__container">
    <div class="elementor-search-form__icon">
      <i aria-hidden="true" class="fas fa-search"></i> <span class="elementor-screen-only">Search</span>
    </div>
    <input placeholder="Search..." class="elementor-search-form__input" type="search" name="q" title="Search" value="">
  </div>
</form>

GET https://dualitytech.com/search/

<form class="elementor-search-form" role="search" action="https://dualitytech.com/search/" method="get">
  <div class="elementor-search-form__container">
    <div class="elementor-search-form__icon">
      <i aria-hidden="true" class="fas fa-search"></i> <span class="elementor-screen-only">Search</span>
    </div>
    <input placeholder="Search..." class="elementor-search-form__input" type="search" name="q" title="Search" value="">
  </div>
</form>

POST #

<form class="acsb-form" data-acsb-search="form" enctype="multipart/form-data" action="#" method="POST"> <input type="text" tabindex="0" name="acsb_search" autocomplete="off" placeholder="Unclear content? Search in dictionary..."
    aria-label="Unclear content? Search in dictionary..."> <i class="acsbi-search"></i> <i class="acsbi-chevron_down"></i> </form>

Text Content

Use Website In a Screen-Reader Mode
Skip to Content
↵ENTER
Skip to Menu
↵ENTER
Skip to Footer
↵ENTER

Consent to Cookies & Data processing
On this website we use cookies and similar functions to process end device
information and personal data. The processing is used for purposes such as to
integrate content, external services and elements from third parties,
statistical analysis/measurement, personalized advertising and the integration
of social media. Depending on the function, data is passed on to up to 22 third
parties and processed by them. This consent is voluntary, not required for the
use of our website and can be revoked at any time using the icon on the bottom
left.
Function
Marketing
Preferences
Measurement
Other
Social media
Reject all Accept allSave + Exit
Customize your choice | Cookies | Privacy notice

powered by consentmanager.net

Skip to content
Platform


PLATFORM OVERVIEW




QUERY ENGINE


MACHINE LEARNING AND ANALYTICS


OPEN SOURCE TECH


Use Case


FINANCIAL SERVICES




FRAUD PREVENTION


ANTI MONEY LAUNDERING


TRADE FINANCING


GOVERNMENT




SECURE INVESTIGATIONS


HEALTHCARE




REAL WORLD EVIDENCE


GENOME WIDE ASSOCIATION STUDIES


OTHER




TARGETED OFFERS

Partners


TECHNOLOGY




GOOGLE


IBM


ORACLE


INTEL


DARPA


OPEN SOURCE




OPEN FHE

Resources


BLOG


RESOURCE HUB


DEMO LIBRARY

Company


ABOUT US


EVENTS


NEWS


CAREERS

Contact us

Search
 * Platform
   
   
   * * * PLATFORM OVERVIEW
         
         
         
         
         QUERY ENGINE
         
         
         MACHINE LEARNING AND ANALYTICS
         
         
         OPEN SOURCE TECH
         
         
 * Use Case
   
   
   * * * FINANCIAL SERVICES
         
         
         
         
         FRAUD PREVENTION
         
         
         ANTI MONEY LAUNDERING
         
         
         TRADE FINANCING
         
         
         GOVERNMENT
         
         
         
         
         SECURE INVESTIGATIONS
         
         
         HEALTHCARE
         
         
         
         
         REAL WORLD EVIDENCE
         
         
         GENOME WIDE ASSOCIATION STUDIES
         
         
         OTHER
         
         
         
         
         TARGETED OFFERS
 * Partners
   
   
   * * * COLLABORATION HUB
         
         
         
         
         GOOGLE
         
         
         IBM
         
         
         INTEL
         
         
         ORACLE
         
         
         DARPA
         
         
         
 * Resources
   
   
   * * * BLOG
         
         
         RESOURCE HUB
         
         
         DEMO LIBRARY
 * Company
   
   
   * * * ABOUT US
         
         
         EVENTS
         
         
         NEWS
         
         
         CAREERS

Contact us

Search
Back


HOW RISK LEADERS CAN IMPROVE ROI FOR DATA-DRIVEN INITIATIVES


Phoebe Spanier|
May 5, 2023


Learn more about secure, collaborative computing Request a demo


Back


HOW RISK LEADERS CAN IMPROVE ROI FOR DATA-DRIVEN INITIATIVES

Phoebe Spanier|
May 5, 2023


Learn more about secure, collaborative computing Request a demo


Post

HOW ZERO-ACCESS ANALYTICS IMPROVES ROI FOR COMMON DATA INITIATIVES AND EXPANDS
ADDRESSABLE MARKETS BY STREAMLINING PROCESSES AND ELIMINATING REGULATORY
ROADBLOCKS.

You’ve heard about the need to get involved in business strategy discussions to
help drive business value and growth. But how can you avoid stepping out of your
lane or being told not to slow things down?

In our last blog, we discussed how zero-access data analytics solutions like
Duality’s can be used to first address the exploding risks seen with third-party
data arrangements.

This new capability begs the question, “If we can apply zero-access data
analytics to reduce risk in using sensitive data, can it also be used in a way
that drives growth or improves ROI on business initiatives?” Such a platform
provides data and security teams a force-multiplier for their data-driven
initiatives in two ways:

 1. Improving ROI by identifying data-driven initiatives wherein security,
    compliance, or privacy requirements demand time and/or money.
 2. Unlocking growth by focusing on initiatives that are limited or slowed by
    complexities found in compliance, security, or privacy; e.g., data
    monetization.


TABLE STAKES: COMMUNICATING VALUE

In order for CISOs, CPOs, and CDAOs to become growth drivers and leaders, they
must communicate effectively. This means using language that starts with
business value and is supported by use cases and technical capabilities. By
shifting to this order, conversations with non-technical leadership will be more
engaging versus asking for approval of a foregone conclusion explained by
technical capabilities and use cases alone. For example, Gartner notes, “Top
performing CISOs regularly meet with three times as many non-IT stakeholders as
they do IT stakeholders.” Rob Woods puts it succinctly: “Security teams cannot
do everything,” and continues to point out the obvious opportunities in working
closely with other departments. Security teams’ work adds value when others
understand and make use of it.


DISCOVERING OPPORTUNITIES FOR IMPROVED ROI

The following questions can help CISOs, CPOs, and CDAOs identify key areas where
ROI and value can be enhanced with zero-access data analytics:

 * Is a manual process to protect sensitive data used or required (e.g., data
   de-identification)?
 * Are lengthy legal and compliance processes needed in order to access or
   analyze a data set?
 * Are data and analytics protections technically enforced, or only
   organizationally enforced?
 * Do any methods used for data privacy and protection require trusting a third
   party?
 * With whom do we have data sharing agreements?
 * How are we monetizing data or analytics? If not, would we like to?

 

But, what if you’re not the one with those answers? Ideally, identifying where
complex processes and technologies exist is as easy as searching through a data
inventory or a recent audit report. However, we all know that such documents are
notoriously difficult to create and maintain due to the speed and sprawl of data
across cloud services. Additionally, such documentation may not reflect current
initiatives, goals, or wishes. Here are two ways to find out what’s being done
or considered:

 1. Start with corporate objectives. It may go without saying, but always align
    with corporate objectives. This will help appropriately prioritize and
    position discussions for maximum impact and support. Follow the trail from
    strategic objectives to the data-tactics required. This will provide a short
    list of high-profile, data-driven initiatives.
 2. Ask the users. Driving growth needs to be inclusive, so having strong
    relationships and regular conversations outside your specific team is highly
    recommended. Data Teams should have a good idea of where such processes are
    being used because they’re the primary players/users. The Privacy Team may
    also have records of where such processes exist

 

THE ‘LOW-HANGING FRUIT’: DEATH TO DE-IDENTIFICATION 

Out with the old, in with the new. If an organization is using de-identification
in any operation, there’s a high likelihood of being able to improve its ROI.
Why? De-identification is a process-driven tactic that removes specific data
points making it hard – but not impossible (not GDPR compliant) – for someone
with access to the dataset to identify a particular person or group therein.
Whether by tokenization or removal, this comes at a cost found in time to value,
quality of insights, and the utility of the data overall. There is significant
time spent between the data owners, data analyzers, and privacy/security experts
in determining that the dataset meets requirements while still providing a
minimal level of value to the analyzers. In healthcare, the method is called
expert determination which adds even more time and cost to the effort. In any
case, when valuable data context is removed from a dataset, the value and
quality of insights that can be derived are also reduced. This leaves many
wondering, if insights aren’t actionable, what’s the point?

In a recent example, Colin Woodard, Director of Nationhood Lab, mentioned the
detrimental impact of working with restricted data by saying, “For privacy
reasons the [CDC] suppresses county data with low numbers, which wreaks havoc on
efforts to calculate rates for less numerous ethno-racial groups.” This is not
uncommon. In addition, such subsets are limited in utility since they can’t be
linked with other, disparate datasets. This means that a de-identified dataset
must be valuable enough on its own, which is problematic in the face of the
growing need for collaboration among data-driven enterprises.

Virtually any operation utilizing de-identification processes will benefit from
zero-access analytics by:

 1. Enhancing security and reducing risk (deidentification does not satisfy
    anonymization).
 2. Reducing time to value & preparation costs by streamlining processes.
 3. Improving the quality of insights by working with full data context.
 4. Improving data utility since disparate datasets can be linked.
 5. Remove or severely limit the movement of data prior to use.


The values in modernizing such a process for today’s data-driven enterprises
should be quite clear. Most of the work will be aligning the many stakeholders
involved.

 

DATA MONETIZATION

Data monetization: Two words that are sure to send chills down the spine of
those responsible for data governance, protection, security, or privacy. To
explain the adrenaline rush caused by such an initiative, we must mention the
core prerequisites versus the operational difficulties. First, the organization
needs to have its data under control and organized. Commonly, the answer will
vary based on the datasets and data types being discussed. Wrangling data
sprawled across services and clouds is daunting even without regulations in
mind. Once the baseline preparation is done (or nearly there), we can begin
building a plan to operationalize data monetization as a new revenue stream with
security, privacy, and compliance requirements met or exceeded. Today, the
status of data monetization efforts in data-driven organizations typically falls
under one of the following three descriptions:

 * An established line of business.

 * Done, but in limited circumstances.

 * A desired future.


ESTABLISHED LINE OF BUSINESS – IMPROVING ROI AND TAM

If selling data to 3rd parties is already an established line of business (or
your only line of business), there’s an opportunity to both improve ROI and
expand the total addressable market (TAM) using a zero-access approach. For
example, sensitive datasets are often sold in their entirety rather than
accessed through a portal. The customer will receive and host this data (note* a
risk, time, and cost increase) on their end before making use of it. This is
largely driven by client requirements to keep their analytical needs and
insights private – without visibility from the vendor – due to security,
regulatory, or intellectual property concerns. This approach can be cost
prohibitive, reduces the quality of insights, and may limit the geographies in
which such a service can be offered due to data localization and transfer laws.
Using a zero-access analytics platform allows vendors to satisfy data
localization and transfer laws, reduce costs of service delivery, setup time,
and total cost of ownership (TCO) while satisfying the needs of their clients.
By reducing costs and complexities, data vendors can expand to new geographies
and customer segments, driving profitability and overall revenue growth with the
addition of wholly new audiences.



Duality provides options to query, analyze joined/linked data sets, or run
models on encrypted data. The above shows the Duality Query flow, where
sensitive query parameters are hidden from commercial data vendors.


 



SPECIAL CASES OR A DESIRED FUTURE – OPERATIONALIZING A DATA SERVICE

Almost all organizations have data that is valuable to other organizations, an
opportunity many are beginning to explore. The “data gold mine” realization is
often followed by enthusiasm. Unfortunately, the momentum is lost in the fray of
complexities and requirements identified by security, data, IT, and
privacy/legal teams. These complexities can limit data monetization to strategic
relationships or special circumstances only, if at all. A zero-access analytics
platform removes arguably the most significant complications in setting up a
scalable operation; data access, protection, security, and privacy. With a
platform that checks all boxes by default, all that remains is to have customers
install a piece of software to begin gaining value from your new, or newly
expanded, line of business.

 

TWO BIRDS, ONE STONE

If you’re looking for a way to impact growth from the risk side of the aisle, a
platform like Duality’s provides many such opportunities while simultaneously
improving overall risk posture. Using a zero-access analytics platform
eliminates risk from sensitive data use, improves ROI for data initiatives, and
can generate more revenue by turning valuable wish lists into realities.

By introducing a zero-access analytics platform in the context of improving ROI
and unlocking growth-driving initiatives, risk leaders like the CISO, CPO, and
CDAO earn their place at the table as growth leaders rather than simply being
service department heads.

 

WHAT’S NEXT?

In blog 1, we covered how to eliminate risk from common, 3rd party data
arrangements to prove that data in-use can be secure. We’ve now discussed how to
improve ROI for existing, but complex, data operations. Next, we’ll talk about
paths to strategic growth and innovation by exploring options that either
couldn’t be done or haven’t been considered.

Book a demo with us to learn more.

You might also like


REGULATORY & TECHNICAL CHALLENGES IN DATA COLLABORATION IN HEALTHCARE

Derek Wood April 25, 2023


GETTING STARTED: THE EVOLVING ROLES OF CISOS, CDAOS, AND CPOS

Phoebe Spanier April 20, 2023


HEALTHCARE DATA OWNERSHIP

Derek Wood April 18, 2023


THE GREAT DATA LAND-GRAB: WHY HEALTHCARE DATA INTEGRATION MATTERS

Derek Wood April 11, 2023
Sign up for more knowledge and insights from our experts


Linkedin Twitter

ABOUT DUALITY

 * Company
 * Careers



PLATFORM

 * Platform Overview
 * Query Engine
 * Machine Learning and Analytics

INDUSTRY SOLUTIONS

 * Financial Services
 * Healthcare
 * Government



PARTNERS

 * Collaboration Hub
 * Intel
 * Oracle
 * IBM
 * Google



NEWS

 * Events
 * Blog



CONTACT US

SUBSCRIBE TO OUR MONTHLY NEWSLETTER



All rights reserved to © Duality 2022
 * Terms of Use
 * Privacy
 * Cookies Policy

Privacy settings

English
Accessibility Adjustments
Reset Settings Statement Hide Interface

Choose the right accessibility profile for you
OFF ON
Seizure Safe Profile Clear flashes & reduces color
This profile enables epileptic and seizure prone users to browse safely by
eliminating the risk of seizures that result from flashing or blinking
animations and risky color combinations.
OFF ON
Vision Impaired Profile Enhances website's visuals
This profile adjusts the website, so that it is accessible to the majority of
visual impairments such as Degrading Eyesight, Tunnel Vision, Cataract,
Glaucoma, and others.
OFF ON
ADHD Friendly Profile More focus & fewer distractions
This profile significantly reduces distractions, to help people with ADHD and
Neurodevelopmental disorders browse, read, and focus on the essential elements
of the website more easily.
OFF ON
Cognitive Disability Profile Assists with reading & focusing
This profile provides various assistive features to help users with cognitive
disabilities such as Autism, Dyslexia, CVA, and others, to focus on the
essential elements of the website more easily.
OFF ON
Keyboard Navigation (Motor) Use website with the keyboard
This profile enables motor-impaired persons to operate the website using the
keyboard Tab, Shift+Tab, and the Enter keys. Users can also use shortcuts such
as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics)
to jump to specific elements.

Note: This profile prompts automatically for keyboard users.
OFF ON
Blind Users (Screen Reader) Optimize website for screen-readers
This profile adjusts the website to be compatible with screen-readers such as
JAWS, NVDA, VoiceOver, and TalkBack. A screen-reader is software that is
installed on the blind user’s computer and smartphone, and websites should
ensure compatibility with it.

Note: This profile prompts automatically to screen-readers.
Content Adjustments
Content Scaling
Default

Readable Font
Highlight Titles
Highlight Links
Text Magnifier
Adjust Font Sizing
Default

Align Center
Adjust Line Height
Default

Align Left
Adjust Letter Spacing
Default

Align Right
Color Adjustments
Dark Contrast
Light Contrast
High Contrast
High Saturation
Adjust Text Colors
Cancel
Monochrome
Adjust Title Colors
Cancel
Low Saturation
Adjust Background Colors
Cancel
Orientation Adjustments
Mute Sounds
Hide Images
Read Mode
Reading Guide
Useful Links
Select an option Home Header Footer Main Content
Stop Animations
Reading Mask
Highlight Hover
Highlight Focus
Big Black Cursor
Big White Cursor
HIDDEN_ADJUSTMENTS
Keyboard Navigation
Accessible Mode
Screen Reader Adjustments
Read Mode
Web Accessibility By
Learn More
Choose the Interface Language
English
Español
Deutsch
Português
Français
Italiano
עברית
繁體中文
Pусский
عربى
عربى
Nederlands
繁體中文
日本語
Polski
Türk
Accessibility StatementCompliance status

We firmly believe that the internet should be available and accessible to anyone
and are committed to providing a website that is accessible to the broadest
possible audience, regardless of ability.

To fulfill this, we aim to adhere as strictly as possible to the World Wide Web
Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA
level. These guidelines explain how to make web content accessible to people
with a wide array of disabilities. Complying with those guidelines helps us
ensure that the website is accessible to blind people, people with motor
impairments, visual impairment, cognitive disabilities, and more.

This website utilizes various technologies that are meant to make it as
accessible as possible at all times. We utilize an accessibility interface that
allows persons with specific disabilities to adjust the website’s UI (user
interface) and design it to their personal needs.

Additionally, the website utilizes an AI-based application that runs in the
background and optimizes its accessibility level constantly. This application
remediates the website’s HTML, adapts its functionality and behavior for
screen-readers used by blind users, and for keyboard functions used by
individuals with motor impairments.

If you wish to contact the website’s owner please use the website's form

Screen-reader and keyboard navigation

Our website implements the ARIA attributes (Accessible Rich Internet
Applications) technique, alongside various behavioral changes, to ensure blind
users visiting with screen-readers can read, comprehend, and enjoy the website’s
functions. As soon as a user with a screen-reader enters your site, they
immediately receive a prompt to enter the Screen-Reader Profile so they can
browse and operate your site effectively. Here’s how our website covers some of
the most important screen-reader requirements:

 1. Screen-reader optimization: we run a process that learns the website’s
    components from top to bottom, to ensure ongoing compliance even when
    updating the website. In this process, we provide screen-readers with
    meaningful data using the ARIA set of attributes. For example, we provide
    accurate form labels; descriptions for actionable icons (social media icons,
    search icons, cart icons, etc.); validation guidance for form inputs;
    element roles such as buttons, menus, modal dialogues (popups), and others. 
    
    Additionally, the background process scans all of the website’s images. It
    provides an accurate and meaningful image-object-recognition-based
    description as an ALT (alternate text) tag for images that are not
    described. It will also extract texts embedded within the image using an OCR
    (optical character recognition) technology. To turn on screen-reader
    adjustments at any time, users need only to press the Alt+1 keyboard
    combination. Screen-reader users also get automatic announcements to turn
    the Screen-reader mode on as soon as they enter the website.
    
    These adjustments are compatible with popular screen readers such as JAWS,
    NVDA, VoiceOver, and TalkBack.
    
    
 2. Keyboard navigation optimization: The background process also adjusts the
    website’s HTML and adds various behaviors using JavaScript code to make the
    website operable by the keyboard. This includes the ability to navigate the
    website using the Tab and Shift+Tab keys, operate dropdowns with the arrow
    keys, close them with Esc, trigger buttons and links using the Enter key,
    navigate between radio and checkbox elements using the arrow keys, and fill
    them in with the Spacebar or Enter key.
    
    Additionally, keyboard users will find content-skip menus available at any
    time by clicking Alt+2, or as the first element of the site while navigating
    with the keyboard. The background process also handles triggered popups by
    moving the keyboard focus towards them as soon as they appear, not allowing
    the focus to drift outside.
    
    Users can also use shortcuts such as “M” (menus), “H” (headings), “F”
    (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

Disability profiles supported on our website
 * Epilepsy Safe Profile: this profile enables people with epilepsy to safely
   use the website by eliminating the risk of seizures resulting from flashing
   or blinking animations and risky color combinations.
 * Vision Impaired Profile: this profile adjusts the website so that it is
   accessible to the majority of visual impairments such as Degrading Eyesight,
   Tunnel Vision, Cataract, Glaucoma, and others.
 * Cognitive Disability Profile: this profile provides various assistive
   features to help users with cognitive disabilities such as Autism, Dyslexia,
   CVA, and others, to focus on the essential elements more easily.
 * ADHD Friendly Profile: this profile significantly reduces distractions and
   noise to help people with ADHD, and Neurodevelopmental disorders browse,
   read, and focus on the essential elements more easily.
 * Blind Users Profile (Screen-readers): this profile adjusts the website to be
   compatible with screen-readers such as JAWS, NVDA, VoiceOver, and TalkBack. A
   screen-reader is installed on the blind user’s computer, and this site is
   compatible with it.
 * Keyboard Navigation Profile (Motor-Impaired): this profile enables
   motor-impaired persons to operate the website using the keyboard Tab,
   Shift+Tab, and the Enter keys. Users can also use shortcuts such as “M”
   (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to
   jump to specific elements.

Additional UI, design, and readability adjustments
 1. Font adjustments – users can increase and decrease its size, change its
    family (type), adjust the spacing, alignment, line height, and more.
 2. Color adjustments – users can select various color contrast profiles such as
    light, dark, inverted, and monochrome. Additionally, users can swap color
    schemes of titles, texts, and backgrounds with over seven different coloring
    options.
 3. Animations – epileptic users can stop all running animations with the click
    of a button. Animations controlled by the interface include videos, GIFs,
    and CSS flashing transitions.
 4. Content highlighting – users can choose to emphasize essential elements such
    as links and titles. They can also choose to highlight focused or hovered
    elements only.
 5. Audio muting – users with hearing devices may experience headaches or other
    issues due to automatic audio playing. This option lets users mute the
    entire website instantly.
 6. Cognitive disorders – we utilize a search engine linked to Wikipedia and
    Wiktionary, allowing people with cognitive disorders to decipher meanings of
    phrases, initials, slang, and others.
 7. Additional functions – we allow users to change cursor color and size, use a
    printing mode, enable a virtual keyboard, and many other functions.

Assistive technology and browser compatibility

We aim to support as many browsers and assistive technologies as possible, so
our users can choose the best fitting tools for them, with as few limitations as
possible. Therefore, we have worked very hard to be able to support all major
systems that comprise over 95% of the user market share, including Google
Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS, and NVDA
(screen readers), both for Windows and MAC users.

Notes, comments, and feedback

Despite our very best efforts to allow anybody to adjust the website to their
needs, there may still be pages or sections that are not fully accessible, are
in the process of becoming accessible, or are lacking an adequate technological
solution to make them accessible. Still, we are continually improving our
accessibility, adding, updating, improving its options and features, and
developing and adopting new technologies. All this is meant to reach the optimal
level of accessibility following technological advancements. If you wish to
contact the website’s owner, please use the website's form

Hide Accessibility Interface? Please note: If you choose to hide the
accessibility interface, you won't be able to see it anymore, unless you clear
your browsing history and data. Are you sure that you wish to hide the
interface?
Accept Cancel

Continue



Processing the data, please give it a few seconds...
Press Alt+1 for screen-reader mode