<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Ed Ferrara]]></title><description><![CDATA[Edward Ferrara is an interim CIO, CTO, and CISO who helps regulated organizations reduce risk, stabilize operations, and modernize IT. A former Forrester analyst, he delivers board-ready insight and execution.]]></description><link>https://www.strat-tech.org</link><image><url>https://substackcdn.com/image/fetch/$s_!yGd-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826592dd-d7e0-4b01-b34b-1d587904efc0_165x165.png</url><title>Ed Ferrara</title><link>https://www.strat-tech.org</link></image><generator>Substack</generator><lastBuildDate>Thu, 30 Apr 2026 12:53:52 GMT</lastBuildDate><atom:link href="https://www.strat-tech.org/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ed Ferrara]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[strategicthink@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[strategicthink@substack.com]]></itunes:email><itunes:name><![CDATA[Ed Ferrara]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ed Ferrara]]></itunes:author><googleplay:owner><![CDATA[strategicthink@substack.com]]></googleplay:owner><googleplay:email><![CDATA[strategicthink@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ed Ferrara]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Data in the Evolving Financial Services World: Banking Profitability]]></title><description><![CDATA[Observations by a C-Level Advisor and Independent Industry Analyst]]></description><link>https://www.strat-tech.org/p/data-in-the-evolving-financial-services</link><guid isPermaLink="false">https://www.strat-tech.org/p/data-in-the-evolving-financial-services</guid><dc:creator><![CDATA[Ed Ferrara]]></dc:creator><pubDate>Sun, 12 Apr 2026 18:43:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mfjh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mfjh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mfjh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!mfjh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!mfjh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!mfjh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mfjh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1178372,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strat-tech.org/i/193981100?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mfjh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!mfjh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!mfjh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!mfjh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4602af2c-69be-4081-a87a-7930c9f46a33_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Preface</h1><p><em>This research document is part of a series created for the <a href="http://www.greenleafgrp.com/">Greenleaf Group</a> to highlight the importance of data and its use across financial services organizations. See the About Greenleaf section below. This report focuses on data monetization and its role in driving profitability in the banking industry.</em></p><h1>Introduction</h1><p>This is the fifth installment in my series on data management, valuation, and value creation. In the first four installments, I focused on Life Science companies.[2-5] Now, I turn my attention to the financial services industry. I have been fortunate to work in both sectors and have gained insights that apply across these fields. Financial services, like life sciences, have become heavily reliant on data; data is now a vital part of the industry, driving everything from risk modeling and fraud detection to payments innovation and highly personalized customer experiences. However, as data volumes increase&#8212;and regulatory expectations rise&#8212;so do the challenges of managing, protecting, and deriving value from data.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strat-tech.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I&#8217;ve worked with property and casualty insurers, employee benefits carriers, and international commercial banks. Across these organizations, the real opportunity isn&#8217;t just collecting more data but transforming it from an operational byproduct into a strategic asset that manages risk, drives competitive advantage, and supports long-term growth. This challenge mirrors what&#8217;s seen in the life sciences industry, though from a different perspective.</p><h1>Commercial Banks </h1><p>Commercial banks make money in eight basic ways [6]:</p><ol><li><p><strong>Net interest income on Loans - </strong>essentially paying less for the funds they loan to customers, and what the customer pays in interest.[7] </p></li></ol><p>For example:</p><blockquote><ul><li><p>The bank pays the depositor 1% interest on money deposited as savings</p></li><li><p>The bank lends the money out at 6%</p></li><li><p>The bank earns 5% on the difference, called net interest margin (NIM</p></li></ul></blockquote><ol start="2"><li><p><strong>Fees for Services</strong> &#8211; Banks charge fees for a variety of services. Bank fees are a significant source of revenue for financial institutions and can vary by service, making it essential for consumers to understand and monitor these charges.  Fees vary by service and can add up quickly, especially for consumers. [8] These include:</p></li></ol><blockquote><ul><li><p>Checking and account maintenance</p></li><li><p>ATM usage</p></li><li><p>Wire transfers</p></li><li><p>Overdraft Fees</p></li><li><p>Mortgage origination</p></li><li><p>Loan servicing</p></li><li><p>Wealth and asset management</p></li><li><p>Safe deposit boxes</p></li><li><p>Merchant services (card processing for businesses)</p></li></ul></blockquote><ol start="3"><li><p><strong>Credit Card Revenue</strong> &#8211; Credit cards generate three types of income. Consider American Express. Although not technically a commercial bank, the company operates as a credit card issuer, and its business model is emulated by commercial banks. American Express earns most of its revenue from discounting merchant transactions. The company also generates income from cardholders through interest, annual fees, and conversion fees. American Express&#8217;s spend-centric model incentivizes card usage with special offers and rewards. Despite higher merchant fees, many businesses accept Amex to reach affluent cardholders. American Express continues to expand its premium consumer base and strengthen its global network. [9]</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/DRayq/2/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48e97a8e-7996-4a2d-9829-1ae10d049e2d_1220x446.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7b4c978-23a1-4de6-818d-c0216ea628fd_1220x516.png&quot;,&quot;height&quot;:289,&quot;title&quot;:&quot;Table 1 - Credit Card Revenue and Profit Sources&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/DRayq/2/" width="730" height="289" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div></li></ol><ol start="4"><li><p><strong>Investment Income</strong> &#8211; Banks invest money in:</p></li></ol><blockquote><ul><li><p>Government and corporate bonds</p></li><li><p>Securities (Common stock and bonds)</p></li><li><p>Money markets</p></li><li><p>Other banks&#8217; loan and investment portfolios</p></li></ul></blockquote><p>Morgan Stanley, for example, is one of the largest commercial banks in the world. Institutional securities, wealth management, and investment management drive Morgan Financials. Institutional securities are a significant revenue source, with services such as investment banking and financial advice. Wealth management generates stable revenue through services such as brokerage, lending, and retirement planning. Investment management focuses on asset management for institutional clients and contributes a smaller share of revenue. [10]</p><p>Banks also operate trading desks (in market-making, derivatives, and foreign exchange) &#8211; potentially very profitable but also high-risk. The 2008 financial crisis was mainly due to the widespread use of credit default swaps, a form of financial derivative. [11]</p><ol start="5"><li><p><strong>Wealth Management &amp; Advisory Services</strong> &#8211; for high-net-worth customers. These services include:</p></li></ol><blockquote><ul><li><p>Financial Planning</p></li><li><p>Investment management</p></li><li><p>Private banking</p></li><li><p>Trust services</p></li><li><p>Merger and acquisition advisory services (large banks) [10]</p></li></ul></blockquote><ol start="6"><li><p><strong>Loans and credit products</strong> &#8211; for both consumers and businesses, earning interest and fees on all these products. These include:</p></li></ol><blockquote><ul><li><p>Home and Commercial Mortgages</p></li><li><p>Personal loans</p></li><li><p>Auto loans</p></li><li><p>Small business loans</p></li><li><p>Corporate lending</p></li><li><p>Lines of credi</p></li><li><p>Student loans</p></li></ul></blockquote><p>7) <strong>Treasury &amp; cash management services</strong> - for businesses, providing recurring revenue. These include:</p><blockquote><ul><li><p>Payroll processing</p></li><li><p>Fraud protection</p></li><li><p>Cash concentration</p></li><li><p>Account reconciliation</p></li><li><p>Lockbox services</p></li><li><p>Short-term liquidity solutions</p></li></ul></blockquote><p>8) <strong>Foreign Exchange (FX) and International Banking - </strong> the foreign exchange market sets the exchange rate for many global currencies. Banks profit in FX by:</p><blockquote><ul><li><p>Charging for foreign exchange conversion fees</p></li><li><p>Selling currency at a markup (arbitrage)</p></li><li><p>Facilitating international payments</p></li><li><p>Offering hedging financial instruments (for corporations) [12]</p></li></ul></blockquote><p>As this list illustrates, the range of products offered by commercial banks is diverse and complex. In the era of Bitcoin and artificial intelligence, financial services organizations face new challenges, requiring me to focus intensely on executive-level cybersecurity strategies. Instead of focusing solely on network configurations or endpoint security, I highlighted organizational structure, risk management, and the reasons behind protecting information. Financial institutions&#8212;more than any other industry&#8212;depend heavily on data integrity and customer trust as key assets. Understanding the economics of cyber risk is essential: what are the financial consequences of inadequate information protection? What tangible value do secure data assets provide? [13]</p><p>As in the life sciences, the answer becomes clear when examining the modern balance sheet. For most global companies&#8212;including banks and FinTechs&#8212;the primary asset class is intangible assets. Under IFRS, intangible assets are &#8220;non-monetary assets without physical substance,&#8221; yet they hold future economic value and are often the most strategically important assets in financial services.</p><p>In banking and FinTech, intangible assets include customer data, proprietary algorithms, risk models, transaction data, fraud analytics, and AI-driven intellectual property. Although these assets are unseen, they are often more valuable than physical infrastructure. They support competitive advantage and regulatory compliance while enhancing the customer experience.</p><p>The World Intellectual Property Organization estimates that the global value of intangible assets now exceeds USD 80 trillion. Technology, payments, and financial platforms make up a large part of the world leaders in this category.</p><h1><strong>Conclusion</strong></h1><p>For the financial services industry, data is a significant driver of economic value in today&#8217;s financial ecosystem. Institutions that excel at creating data value&#8212;through analytics, governance, monetization, and AI&#8212;will determine the winners in banking, payments, and FinTech over the coming decade.</p><p>Financial services firms are exploring new data-driven frontiers across many areas. Below, I focus on two that are changing most rapidly. Additional aspects will be discussed in future posts.</p><p>While I highlighted revenue and profitability in banks, nearly every function in financial services is undergoing data-driven reinvention:</p><p>1. Algorithmic trading and quantitative strategies</p><p>2. Customer Insights, market Intelligence, and personalization</p><p>3. Customer onboarding and digital identity</p><p>4. Environmental, social, and governance (ESG) &#8211; sustainability scoring</p><p>5. Financial product pricing models</p><p>6. Operational efficiency modeling</p><p>7. Payments and settlement optimization</p><p>8. Regulatory reporting automation</p><p>9. Risk, Fraud, and Compliance Analytics</p><p>10. Treasury and liquidity analytics</p><p>These topics will be the focus of future articles.</p><h1>How Green Leaf Consulting Group Assists Financial Institutions</h1><p>Green Leaf Consulting Group brings hands-on experience helping financial organizations harness the value of data across risk, customer analytics, digital transformation, and strategic decision making.</p><h1>Looking Ahead</h1><p>In this series, I will explore additional dimensions of financial data strategy, including:</p><p>&#183; Direct and indirect monetization of financial data</p><p>&#183; ROI of modern data capabilities</p><p>&#183; business value creation through data-driven optimization</p><p>&#183; The transformative force of AI</p><p>Mastering data assets will define the winners and losers in the evolving financial services ecosystem.</p><h1>References</h1><p>1. Services, E.L., <em>Financial Services Graphic</em>. 2024, Elevate Legal Services: <a href="https://elawfirm.org/blog/understanding-the-electronic-funds-transfer-act-efta-what-you-need-to-know/">https://elawfirm.org/blog/understanding-the-electronic-funds-transfer-act-efta-what-you-need-to-know/</a>.</p><p>2. Ferrara, E., <em>Data in the Evolving world of Life Sciences - Part 1</em>, in <em>Greenleaf Insights</em>, M. Miner, Editor. 2025, Greenleaf Group: Ambler, PA, USA.</p><p>3. Ferrara, E., <em>Data in the Evolving World of Life Sciences - Part 2: Change and Measurement</em>, in <em>Greenleaf Insights</em>, M. Miner, Editor. 2025, Greenleaf Group: Ambler, PA, USA.</p><p>4. Ferrara, E., <em>Data in the evolving world of Life Sciences - Part 3: Compliance, Regulation, and National Security</em>, in <em>Greenleaf</em>, M. Miner, Editor. 2025, Greenleaf Group: Ambler, PA, USA.</p><p>5. Ferrara, E., <em>Data in the evolving world of Life Sciences - Part 4: Chaos to Order</em>, in <em>Greenleaf Insights</em>, M. Miner, Editor. 2025, Greenleaf Group: Ambler, PA, USA.</p><p>6. Board, F.R., <em>Federal Reserve Board Large Commercial Banks: September 30, 2025</em>. 2025, Federal Reserve Board New York, NY, USA.</p><p>7. Mahajan, O., <em>Net Interest Margin - Overview, Components, and Examples</em>, in <em>Wall Street Oasis</em>, W. El Maouch, Editor. 2025, Wall Street Oasis.</p><p>8. Kenton, W., <em>Comprehensive Guide to Bank Fees_ Types, Definitions, and How to Avoid Them.pdf&gt;</em>, in <em>Investopedia</em>, C. Potters, Editor. 2025, Investopedia: Investopedia.com.</p><p>9. Reiff, N., <em>How American Express Profit: Fees, Interest, and Merchant Revenue</em>, in <em>Investopedia</em>, E. Estevez and M. Rosenston, Editors. 2025, Investopedia: https://www.investopedia.com</p><p>10. Jonas, D., <em>Morgan Stanley&#8217;s Revenue Streams: Institutional, Wealth, &amp; Investment Management</em>, in <em>Investopedia</em>, T.J. Catalano, Editor. 2025, Investopedia: </p><p>https://www.investopedia.com.</p><p>11. Liu, J., <em>Credit Default Swap (CDS) - A Major Player in the 2008 Financial Crisis</em>, in <em>Wall Street Oasis</em>, I. Lin, Editor. 2025, Wall Street Oasis: wallstreetoasis.com.</p><p>12. Cusimano, J., <em>What Is the Foreign Exchange Market? How It Works &amp; Examples</em>, in <em>Forex Resources</em>. 2024, Satrys: https://statrys.com</p><p>13. Institute, C.F. <em>Intangible Assets</em>. 2025; Available from: <a href="https://corporatefinanceinstitute.com/resources/accounting/intangible-assets/">https://corporatefinanceinstitute.com/resources/accounting/intangible-assets/</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strat-tech.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[AI is Turning Data Platforms Into Decision Engines]]></title><description><![CDATA[Observations from a C-Level Advisor and Independent Industry Analyst]]></description><link>https://www.strat-tech.org/p/ai-is-turning-data-platforms-into</link><guid isPermaLink="false">https://www.strat-tech.org/p/ai-is-turning-data-platforms-into</guid><dc:creator><![CDATA[Ed Ferrara]]></dc:creator><pubDate>Mon, 06 Apr 2026 17:21:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IPYe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>By Ed Ferrara, C-Level Advisor and Independent Industry Analyst,</em> <em>March 2026</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IPYe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IPYe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 424w, https://substackcdn.com/image/fetch/$s_!IPYe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 848w, https://substackcdn.com/image/fetch/$s_!IPYe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 1272w, https://substackcdn.com/image/fetch/$s_!IPYe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IPYe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png" width="728" height="312.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:625,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:2876285,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strat-tech.org/i/193055198?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IPYe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 424w, https://substackcdn.com/image/fetch/$s_!IPYe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 848w, https://substackcdn.com/image/fetch/$s_!IPYe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 1272w, https://substackcdn.com/image/fetch/$s_!IPYe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3b3c884-8e5b-4c54-849b-c0f48e53f215_2572x1104.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Preface</h1><p><em>This article is part of a series created for the Greenleaf Group to highlight the complexity of data and its use across organizations of various sizes and industries. See the About Greenleaf section below. This research report focuses on technology providers who claim to revolutionize data analytics with Artificial Intelligence.</em></p><h2>Key Insights</h2><ul><li><p><strong>AI is shifting analytics from reporting to real-time decision infrastructure.</strong> Organizations are moving beyond descriptive insights toward automated, adaptive systems that directly influence operational outcomes and strategic execution.</p></li><li><p><strong>Automation is materially improving productivity and speeding insight.</strong> AI-driven automation of data preparation, modeling, and experimentation is reducing development cycles and enabling faster deployment of analytics capabilities.</p></li><li><p><strong>Competitive advantages will shift toward organizations that operationalize and automate analytics.</strong> Firms that embed AI into core processes &#8212; such as risk management, customer engagement, and supply chain optimization &#8212; will outperform those that treat analytics as a standalone reporting function.</p></li><li><p><strong>Enterprise data platforms are evolving into AI platforms.</strong> Integrated environments that unify data management, machine learning pipelines, and generative AI capabilities are simplifying architecture and accelerating innovation.</p></li><li><p><strong>Governance and model risk management are now board-level concerns.</strong> As AI systems influence financial, operational, and customer decisions, oversight of transparency, bias, explainability, and regulatory compliance becomes critical.</p></li></ul><div><hr></div><h2>Introduction</h2><p>This paper </p><p>Artificial Intelligence (AI) is revolutionizing data science and analytics by fundamentally improving what practitioners can accomplish and, in some cases, shifting the role of the data scientist.</p><p>Automation of routine tasks is probably the most immediate impact. Tasks like data cleaning, feature engineering, and model selection &#8212; which used to take up most of a data scientist&#8217;s time &#8212; can now be largely automated through automated machine learning (AutoML) and AI-assisted pipelines. This allows more time for higher-level problem framing and interpretation.</p><p>Natural Language Querying (NLQ) makes analytics more accessible. For example, tools like text-to-SQL and AI-powered BI platforms enable business users to query data in plain English, reducing the workload for technical staff. Someone without SQL skills can now ask, &#8220;What were our top-performing regions last quarter?&#8221; and receive a meaningful and detailed answer. Technologies such as Snowflake and Databricks offer multidimensional data analysis.</p><h3>Speed</h3><p>Faster and more efficient modeling is another breakthrough. Foundation models and transfer learning mean teams no longer need large, labeled datasets to build useful predictive models. LLMs also help in writing analysis code, creating documentation, and clarifying model outputs in simple language &#8212; thereby speeding up workflows.</p><h3>Anomaly Detection</h3><p>Anomaly detection and real-time analytics have improved significantly. AI systems can now monitor complex data streams and identify issues much faster than traditional threshold-based alerts, which is crucial for fraud detection, operations monitoring, and infrastructure management.</p><h3>AI Has Challenges</h3><p>AI presents new challenges: data quality and governance matter more than ever (garbage in, garbage out &#8212; now at scale), model interpretability is a growing concern, and there is an ongoing debate over bias and fairness in automated decision-making.</p><h3>The Data Scientist</h3><p>The role of the data scientist is evolving from someone who constructs models to someone who supervises, interprets, and manages AI systems &#8212; becoming more strategic and less purely technical. Some basic analysis tasks are being consolidated, while demand grows for people who can link AI capabilities with business judgment. For those involved in technology strategy and enterprise architecture, the main change is that AI is transforming analytics from just a tool for analysts into an essential operational capability integrated into business processes.</p><h3>Data Science Lifecycle</h3><p>The Data Science Lifecycle is a structured framework that describes the repetitive process data scientists follow to extract value and insights from data. While variations exist across organizations and frameworks, the most widely used are CRISP-DM and TDSP. [1,2]</p><h2>CRISP-DM</h2><p>The Cross-Industry Standard Process for Data Mining (CRISP-DM) is one of the oldest and most widely used frameworks for data science and data mining life-cycles. It was originally created in the late 1990s by a group of companies, including IBM, Daimler, and SPSS. [2]</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/rx3zy/4/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/764a991e-df0b-4c04-a0db-649d331a452e_1220x1906.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e42e8ba-64e4-4f79-8e20-4049d098de92_1220x2098.png&quot;,&quot;height&quot;:1065,&quot;title&quot;:&quot;Table 1 - CRISP-DM Lifecycle&quot;,&quot;description&quot;:&quot;The Cross-Industry Standard Process for Data Mining (CRISP-DM) is one of the oldest and most widely used frameworks for data science and data mining life-cycles. It was originally created in the late 1990s by a group of companies, including IBM, Daimler, and SPSS.&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/rx3zy/4/" width="730" height="1065" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>The lifecycle is iterative rather than linear &#8212; findings at any stage often send the team back to an earlier one. Artificial Intelligence is significantly automating many of the technical tasks traditionally performed by data scientists.</p><div><hr></div><h2>TDSP</h2><p>Team Data Science Process (TDSP) is a modern, agile framework created by Microsoft for collaborative, team-based data science projects in enterprise settings. Combining aspects of Scrum and CRISP-DM yields a process like Microsoft&#8217;s Team Data Science Process. Introduced in 2016, TDSP is described as &#8220;an agile, iterative data science methodology to deliver predictive analytics solutions and intelligent applications efficiently.&#8221; The approach is more streamlined, using five phases instead of eight compared to CRISP-DM. [3]</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/evSB1/4/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0fd74fef-c4e5-4797-afc8-5798151a6ecb_1220x862.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47046501-310c-411c-b524-798bc02d54b8_1220x932.png&quot;,&quot;height&quot;:467,&quot;title&quot;:&quot;Table 2 -TDSP Phasing [3]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/evSB1/4/" width="730" height="467" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p><em>Figure 1 &#8212; Team Data Science Lifecycle</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eprA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eprA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 424w, https://substackcdn.com/image/fetch/$s_!eprA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 848w, https://substackcdn.com/image/fetch/$s_!eprA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 1272w, https://substackcdn.com/image/fetch/$s_!eprA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eprA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png" width="1456" height="1050" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1050,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:522938,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strat-tech.org/i/193055198?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eprA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 424w, https://substackcdn.com/image/fetch/$s_!eprA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 848w, https://substackcdn.com/image/fetch/$s_!eprA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 1272w, https://substackcdn.com/image/fetch/$s_!eprA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ced267b-2fb9-428e-92b4-a03dc6c91c70_1876x1353.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Automated Machine Learning Engineering Tools</h2><p>New technology provides automated feature engineering capabilities:</p><ul><li><p>Automated model selection and hyperparameter tuning</p></li><li><p>AI-assisted coding through systems such as GitHub Copilot</p></li><li><p>Rapid experimentation with hundreds of candidate models</p></li></ul><p>These tools:</p><ul><li><p>Reduce the time needed to develop models</p></li><li><p>Lower the barrier to entry for non-specialists</p></li><li><p>Allow data scientists to focus increasingly on problem framing, data quality, and governance rather than on algorithm construction</p></li></ul><div><hr></div><h2>Predictive Analytics to Generative and Cognitive Analytics</h2><p>AI advances new analytic paradigms and opportunities. Traditional analytics focused on predicting outcomes. AI now enables generative and reasoning capabilities.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/VDIzk/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2542fc98-2513-4698-bc66-ba4379712da6_1220x424.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb6da02d-4d7b-426b-9992-43f11320dec9_1220x494.png&quot;,&quot;height&quot;:278,&quot;title&quot;:&quot;Table 3 - New Analytic Paradigms&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/VDIzk/1/" width="730" height="278" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>Large language models like ChatGPT and Claude enable analysts to communicate and work in natural language rather than SQL or Python. This capability enables business users to more effectively engage with the data analysis process and actively engage in problem-solving.</p><h2>Natural Language Interfaces to Data</h2><p>AI is making it significantly easier for people of various skill levels to access data science and analytical systems. These tools provide:</p><ul><li><p>Text-to-SQL query generation</p></li><li><p>Conversational data exploration</p></li><li><p>Automated report generation</p></li><li><p>AI-generated dashboards and narratives</p></li></ul><p>Platforms such as Tableau and Microsoft Power BI now embed natural language query engines. Snowflake and Databricks, discussed in more detail below, also provide charts and graphs using Natural Language Querying (NLQ).</p><p>Analytics is shifting from specialist-led workflows to organization-wide decision platforms.</p><h2>Synthetic Data and Data Augmentation</h2><p>AI can generate synthetic datasets to address limitations in real-world data. Synthetic data is especially important in regulated industries like financial services and healthcare, where access to real-world data is restricted. Synthetic data enables high-quality analysis results for:</p><ul><li><p>Privacy-preserving data sharing</p></li><li><p>Rare event modeling</p></li><li><p>Medical research datasets</p></li><li><p>Fraud detection training data</p></li></ul><p><em>(See previous articles on data in the <a href="https://greenleafgrp.com/insights/?_content_type=article&amp;_category=life-sciences">Life Sciences</a> and <a href="https://greenleafgrp.com/insights/?_content_type=article&amp;_category=financial-services">Financial Services</a> industries.)</em></p><h2>AI-driven Data Engineering</h2><p>AI is increasingly used in data preparation and pipeline management, which has historically accounted for 30% to 75% of data science efforts.</p><p>Examples include:</p><ul><li><p>Automated Schema Mapping</p></li><li><p>Data Quality Anomaly Detection</p></li><li><p>Intelligent Data Cataloging</p></li></ul><p><em>Figure 2 &#8212; Most Time Consuming Tasks [7]</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sdbq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sdbq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 424w, https://substackcdn.com/image/fetch/$s_!sdbq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 848w, https://substackcdn.com/image/fetch/$s_!sdbq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 1272w, https://substackcdn.com/image/fetch/$s_!sdbq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sdbq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png" width="671" height="431" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:431,&quot;width&quot;:671,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:42002,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strat-tech.org/i/193055198?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sdbq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 424w, https://substackcdn.com/image/fetch/$s_!sdbq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 848w, https://substackcdn.com/image/fetch/$s_!sdbq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 1272w, https://substackcdn.com/image/fetch/$s_!sdbq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbfc241-0536-4fe2-a46e-cbe8c9133dac_671x431.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>AI Governance</h2><p>For enterprise organizations, the rapid progress of AI is leading to a new field: AI governance architecture. At the heart of this change is the growing role of the data scientist, whose tasks are expanding beyond their traditional focus on statistical modeling, algorithm selection, and data cleaning.</p><p>Today&#8217;s data scientists are increasingly asked to tackle higher-level challenges &#8212; defining the right problems, applying deep domain expertise, and designing decision systems that combine human judgment with machine intelligence. Importantly, they are also taking on the role of stewards of model governance, ensuring that AI systems remain transparent, accountable, and aligned with organizational values.</p><p>This shift reflects a broader understanding that creating effective AI isn&#8217;t just a technical effort, but a sociotechnical one &#8212; requiring data scientists to work at the crossroads of technology, ethics, and business strategy.</p><h2>Convergence of AI, Data Platforms, and Analytics</h2><p>The rapid advancement of artificial intelligence is leading to a merging of data platforms, machine learning infrastructure, and analytics systems. Traditionally, organizations kept separate platforms for data warehousing, machine learning experiments, and operational analytics. Today&#8217;s AI platforms combine these layers into unified environments that support the entire data-to-decision process.</p><p>Two of the most influential platforms shaping this architecture are <strong>Snowflake and Databricks</strong>. Both platforms offer integrated environments that combine large-scale data storage, distributed computing, machine learning pipelines, and increasingly, generative AI capabilities.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/s0x0m/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/058e9442-4717-45ef-9e89-800c600fe916_1220x1078.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/23fb5008-7a73-4c64-a213-bdc1755dbbd1_1220x1148.png&quot;,&quot;height&quot;:615,&quot;title&quot;:&quot;Table 4 AI Data Platform Features&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/s0x0m/1/" width="730" height="615" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><h4>Table Notes</h4><p>[1] A neural network is a computational model composed of layers of interconnected nodes (neurons) that transform input data through weighted mathematical operations to learn complex relationships and make predictions. </p><p>[2] Transformer architecture is a neural network design used in modern artificial intelligence systems, especially large language models (LLMs) &#8212; that enables machines to understand relationships between words, sequences, or data elements using a mechanism called attention.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/fkKVA/2/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a891c123-4635-4e9b-a0f9-121f9e0fda6e_1220x756.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b0f5568-7d0d-4bdd-89cc-e4dffea3aa55_1220x826.png&quot;,&quot;height&quot;:448,&quot;title&quot;:&quot;Table 5 - Snowflake and Databricks Feature Comparison&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/fkKVA/2/" width="730" height="448" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><h4>Table Notes</h4><p>[1] Apache Spark&#8482; is an open-source unified analytics engine for distributed data processing that supports batch processing, streaming, machine learning, and SQL-based analytics at scale. </p><p>[2] Delta Lake&#8482; is an open-source data storage framework that brings reliability, performance, and governance features typically found in data warehouses to data lakes. It was developed by Databricks and is a foundational technology in modern Lakehouse architectures. </p><p>[3] Snowflake Cortex&#8482; is an integrated AI service layer within the Snowflake platform that provides prebuilt and customizable AI functions &#8212; including large language model (LLM) inference &#8212; for analytics, data engineering, and application development. </p><p>[4] Mosaic AI&#8482; is a unified generative AI platform within Databricks that enables enterprises to develop, deploy, and govern AI applications using their own data and scalable Lakehouse infrastructure.</p><p>The platforms have different philosophies, described as closed/managed vs. open/flexible. Snowflake optimizes for simplicity, concurrency, and SQL performance out of the box. Databricks optimizes for flexibility, openness, and the full data+ML lifecycle &#8212; but at the expense of operational complexity.</p><p>In practice, many organizations use both platforms:</p><ul><li><p><strong>Snowflake</strong> for enterprise analytics and data sharing</p></li><li><p><strong>Databricks</strong> for large-scale machine learning and AI model development</p></li></ul><h2>Conclusion</h2><p>AI is fundamentally transforming analytics architectures, turning data platforms into integrated, AI-powered environments that handle structured, semi-structured, and unstructured data &#8212; including streaming data &#8212; while supporting the entire machine learning lifecycle. These platforms enhance accessibility with natural language interfaces such as conversational analytics and text-to-SQL, and incorporate governance features like data lineage, model oversight, and regulatory compliance directly into the infrastructure. The result is a unified system where data ingestion, AI model development, and operational decision-making work together within a single, cohesive architecture.</p><p>Strategically, this shift indicates a move from viewing analytics as a support role to making it a central part of operations. Success is now judged not just by access to data but by the ability to deploy insights reliably, at scale, and with proper governance. Organizations that naturally align their data platforms, AI tools, and decision-making processes &#8212; rather than keeping them separate &#8212; will be better positioned to simplify their architecture, reduce AI risks, and deliver measurable business results.</p><h2>About Green Leaf</h2><p><a href="https://greenleafgrp.com/">Green Leaf Consulting Group</a> offers practical experience in helping financial organizations leverage data for risk management, customer analytics, digital transformation, strategic decision-making, and AI-driven innovation.</p><h2>References</h2><ol><li><p>Wirth, R. and J. Hipp. <em>CRISP-DM: Towards a standard process model for data mining.</em> 4th International Conference on the Practical Applications of Knowledge Discovery and Data Mining. 2000.</p></li><li><p>Chapman, P., <em>CRISP-DM 1.0: Step-by-step data mining guide.</em> 2000, SPSS: Netherlands.</p></li><li><p>Data Science PM, <em>What is TDSP?</em> 2025. https://www.datascience-pm.com/tdsp/</p></li><li><p>Ferrara, E., <em>Data in the Evolving World of Life Sciences: Chaos to Order.</em> Greenleaf Group Insights, 2025. https://greenleafgrp.com/insights/data-in-the-evolving-world-of-life-sciences-chaos-to-order/</p></li><li><p>Ferrara, E., <em>Risk, Regulation, and Trust: Why Data Governance Defines Leadership in Banking and FinTech.</em> Greenleaf Insights, 2026. https://greenleafgrp.com/insights/risk-regulation-and-trust-why-data-governance-defines-leadership-in-banking-and-fintech/</p></li><li><p>Crowdflower, <em>Data Science Report.</em> 2016. https://www2.cs.uh.edu/~ceick/UDM/CFDS16.pdf</p></li><li><p>Anaconda, <em>2023 State of Data Science Report &#8212; AI Takes Center Stage.</em> 2023.</p></li><li><p>Anaconda, <em>8th Annual State of Data Science &amp; AI Report: How Companies Are Moving Ahead &#8212; Or Not &#8212; In the AI Race.</em> 2025.</p></li><li><p>Clegg, N., et al., <em>AI Governance Alliance: Briefing Paper Series.</em> 2024.</p></li></ol><div><hr></div><h3>Footnotes</h3><p><strong>Tableau</strong> &#8212; Provides a powerful data visualization and business intelligence platform that enables users to explore and analyze data through visually engaging dashboards. It allows organizations to turn raw data into actionable insights, fostering a data-driven culture (www.tableau.com).</p><p><strong>Microsoft Power BI</strong> &#8212; A robust business intelligence platform designed to transform raw data into meaningful insights through interactive dashboards and reports. This cloud-based service integrates seamlessly with the Microsoft ecosystem, providing powerful data visualization and analytics capabilities for users across various industries.</p><p><strong>Data Preparation statistic</strong> &#8212; The &#8220;30% to 75% of data science effort is spent on data preparation&#8221; statistic is widely cited in industry and academic literature and originates from multiple consistent observations across surveys and practitioner reports.</p><p><strong>AI Data Cloud</strong> &#8212; Snowflake now uses the term <em>AI Data Cloud</em> as part of their branding. In the past the industry term <em>Cloud Data Warehouse</em> has also been used.</p><p><strong>Neural network</strong> &#8212; A computational model composed of layers of interconnected nodes (neurons) that transform input data through weighted mathematical operations to learn complex relationships and make predictions.</p><p><strong>Transformer architecture</strong> &#8212; A neural network design used in modern AI systems, especially large language models (LLMs), that enables machines to understand relationships between words, sequences, or data elements using a mechanism called <em>attention</em>.</p><p><strong>Apache Spark&#8482;</strong> &#8212; An open-source unified analytics engine for distributed data processing that supports batch processing, streaming, machine learning, and SQL-based analytics at scale.</p><p><strong>Delta Lake&#8482;</strong> &#8212; An open-source data storage framework that brings reliability, performance, and governance features typically found in data warehouses to data lakes. Developed by Databricks, it is a foundational technology in modern Lakehouse architectures.</p><p><strong>Snowflake Cortex&#8482;</strong> &#8212; An integrated AI service layer within the Snowflake platform that provides prebuilt and customizable AI functions &#8212; including large language model (LLM) inference &#8212; for analytics, data engineering, and application development.</p><p><strong>Mosaic AI&#8482;</strong> &#8212; A unified generative AI platform within Databricks that enables enterprises to develop, deploy, and govern AI applications using their own data and scalable Lakehouse infrastructure.</p>]]></content:encoded></item><item><title><![CDATA[Data in the Evolving World of Life Sciences – Compliance, Regulation, and National Security]]></title><description><![CDATA[By Ed Ferrara, Strategic Technology Advisors & CIO / CISO Advisor to Green Leaf Consulting Group]]></description><link>https://www.strat-tech.org/p/data-in-the-evolving-world-of-life-d1b</link><guid isPermaLink="false">https://www.strat-tech.org/p/data-in-the-evolving-world-of-life-d1b</guid><dc:creator><![CDATA[Ed Ferrara]]></dc:creator><pubDate>Sun, 25 Jan 2026 20:17:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Dwd7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf10837-c6d6-443c-b622-9ab86615a0ef_1220x850.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>October 22, 2025</strong></p><h1>Preface</h1><p><em>This article is part of a series developed for Greenleaf Group to highlight the complexity of data and its use across organizations of all sizes and across vertical industries. The first four articles in this series focused on the life sciences industry. Subsequent articles will focus on other industries and on technology providers promising to revolutionize data analytics through Artificial Intelligence.</em></p><h1>Compliance, Regulation, and National Security</h1><h2>Preface</h2><p><em>This article is part of a series developed for the <a href="http://www.greenleafgrp.com">Greenleaf Group</a> to highlight the complexity of data and its use across organizations of all sizes and across vertical industries. The first four articles in this series focus on the life sciences industry. Subsequent articles will focus on other industries and on technology providers promising to revolutionize data analytics through artificial intelligence.</em></p><h1>Introduction</h1><p>In my past two blogs, I explored the role of data in life sciences, first through the lens of research and development and medical affairs, and then through the principles of quality and compliance in manufacturing. This next frontier takes that discussion one step further. Today, compliance and regulation in life sciences extend beyond clinical and manufacturing oversight; they now intersect with national security. As data volumes grow and global collaboration increases, protecting sensitive health and research information has become not only a matter of privacy and ethics but also of geopolitical importance.</p><p>Historically, life science organizations had to worry only about the United States Food and Drug Administration (FDA), the European Medicines Agency, and other countries&#8217; pharmaceutical regulatory agencies.</p><p>In general, Life Science companies operated outside the scope of US national security regulations and exemptions from US Privacy laws. The United States has recognized that certain countries maintain an adversarial stance towards it.</p><h2>Protecting Americans&#8217; Sensitive Data from Foreign Adversaries</h2><p>On February 28, 2024, President Joe Biden signed an executive order expanding the scope of Executive Order 13873 (May 15, 2019) and Executive Order 14034 (June 9, 2021) &#8211; Protecting Americans&#8217; Sensitive Data from Foreign Adversaries. President Biden issued this order in response to certain countries attempting to steal various types of sensitive bulk personal data [KB1] [EF2]. From the administration&#8217;s perspective, this appropriation of this information constituted an unusual and extraordinary threat, originating in whole or in substantial part outside the United States, to the national security and foreign policy of the United States. Access to Americans&#8217; bulk sensitive personal data or United States Government-related data increases the ability of countries of concern to engage in a wide range of malicious activities. Countries of concern could use advanced technology (e.g., artificial intelligence) to analyze and manipulate large volumes of sensitive personal data to engage in espionage, influence kinetic or cyber operations, and identify strategic advantages over the United States.[1]</p><h2>Building on the Biden Era Executive Order</h2><p>In April 2025, the United States Department of Justice&#8217;s (US-DOJ) Final Rule Restricting Transfers of Bulk Sensitive Personal Data took effect, marking a watershed moment for national security and biomedical research. Codified at 28 C.F.R. Part 202, the rule implements President Biden&#8217;s Executive Order 14117, which prohibits or restricts US persons from providing bulk sensitive personal data&#8212;or any government-related data&#8212;to &#8220;countries of concern&#8221; or entities under their control. [1]</p><p>On April 8, 2025, the Trump administration finalized an executive order that expanded the Biden administration&#8217;s language and specifically targeted the life sciences industry.[2]</p><p>The implications of this rule are significant for the life science industry. Life science companies and their medications frequently rely on human genomic, clinical, and biomarker data. The rule&#8217;s reach extends beyond espionage prevention; it rethinks how biotech, pharma, and digital health companies handle cross-border data, manage vendors, and design research collaborations. </p><h2>A New National-Security Frontier in Data</h2><p>The United States Department of Justice deems foreign exploitation of Americans&#8217; health and genomic data an &#8220;unusual and extraordinary threat.&#8221;</p><p>The new rule closes a significant gap in US national security authorities: until now, foreign adversaries could buy or license US data through commercial IT. In Deputy Attorney General Todd Blanche&#8217;s words, &#8220;Why hack it when you can buy it?&#8221;</p><p>The rule formally designates countries, including:</p><ul><li><p>China (including Hong Kong and Macau)</p></li><li><p>Cuba</p></li><li><p>Iran</p></li><li><p>North Korea</p></li><li><p>Russia</p></li><li><p>Venezuela</p></li></ul><p>These countries are designated explicitly as of concern because they demonstrate the intent and capacity to use such data for surveillance, coercion, or military advantage. [3]</p><h2>What is &#8220;Bulk Sensitive Personal Data&#8221;?</h2><p>Bulk United States sensitive personal data is any collection or set of sensitive personal data related to US persons, encompassing all formats. For life-science organizations, &#8220;bulk&#8221; means more than volume&#8212;it defines the regulatory threshold for restrictions. Under the Final Rule, any dataset&#8212;whether anonymized, pseudonymized, or encrypted&#8212;can trigger compliance obligations if it meets or exceeds these limits within 12 months.</p><p>This information includes anonymized, pseudonymized, de-identified, or encrypted data that meets or exceeds the thresholds set by the new regulations. Any combination of these types that meets the lowest threshold also qualifies as bulk. That means even a modest-sized clinical trial can fall squarely within the rule. See Tables 1, 2, and 3 below.</p><p>Key Aspects Life Science companies must evaluate how they handle bulk sensitive personal data and ensure that any commercial uses of this information do not include sales to the US-DOJ listed countries of concern.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/8rVhe/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3bf10837-c6d6-443c-b622-9ab86615a0ef_1220x850.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb31dab2-1c98-463d-b9b1-85a959b6ac3f_1220x920.png&quot;,&quot;height&quot;:462,&quot;title&quot;:&quot;Table 1 - Key Aspects of Bulk Data Classification&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/8rVhe/1/" width="730" height="462" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><h2>Implications</h2><p>To ensure compliance, Life Science companies must assess their business models to determine which information is covered by the new rule.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/8ll8j/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f10a0f8-6722-46b4-9cc0-b34c779cef46_1220x690.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c87d2970-0cd5-41f4-8e57-0a911aa37c54_1220x760.png&quot;,&quot;height&quot;:415,&quot;title&quot;:&quot;Table 2 - Implications for Life Science Organizations&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/8ll8j/1/" width="730" height="415" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><h2>Covered Data Transactions</h2><p>There are two types of government-related data. The first is any <strong>precise geolocation data</strong>, regardless of volume, for any location within any area enumerated on the Government-Related Location Data List in the original Biden executive order. The second type of government-related data is any sensitive personal data, regardless of volume, that a transacting party markets as linked or linkable to current or recent former employees or contractors, or retired senior officials, of the United States Government, including the military and Intelligence Community. These provisions also include &#8220;recent former employees&#8221; or &#8220;recent former contractors&#8221; &#8211; employees or contractors who worked for or provided services to the United States government, in a paid or unpaid status, within the past two years of a potential covered data transaction with a country of concern or covered person.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/wFQxP/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dcd54fab-def6-4d61-8e3c-ff1754d3db25_1220x1104.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22d21a1e-7ffa-4759-91c2-457d8f719530_1220x1174.png&quot;,&quot;height&quot;:626,&quot;title&quot;:&quot;Table 3 - Data Rule Classifications&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/wFQxP/1/" width="730" height="626" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><h4>Table Notes and Definitions</h4><p><strong>Proteomics</strong> is the large-scale study of proteins, particularly their functions and structures. It involves the identification, quantification, and analysis of the entire set of proteins expressed by a genome, cell, tissue, or organism at a given time.</p><p><strong>Transcriptomics</strong> is the study of the transcriptome, which comprises all the RNA molecules transcribed from the DNA in a cell or organism at a specific time. This field of research focuses on understanding gene expression patterns, RNA processing, and the functional roles of various RNA species.</p><p><strong>Epigenomics</strong> is the study of the epigenome, the complete set of epigenetic modifications in a cell&#8217;s genetic material. These modifications do not alter the DNA sequence but can influence gene expression, cellular functions, and ultimately organismal development and health.</p><h2>Key Prohibitions and Restrictions [4]</h2><p>The US-DOJ separates &#8220;covered data transactions&#8221; into prohibited, restricted, and exempt categories.</p><p>Prohibited transactions include:</p><ul><li><p>Data brokerage&#8212;the sale, licensing, or commercial transfer of bulk data to a covered person or country of concern.</p></li><li><p>Any transaction giving such entities access to bulk human &#8216;omic&#8217; or biospecimen data.</p></li><li><p>Restricted transactions include vendor, employment, or investment agreements with covered persons or countries of concern. These may proceed only if the US party adopts the Cybersecurity and Infrastructure Security Agency (CISA) security requirements and maintains a DOJ-compliant Data Compliance Program with annual audits and officer certification.</p><h2>Necessary Exemptions [4]</h2></li></ul><p>The new rule provides for some exempt transactions to protect legitimate scientific and regulatory activity:</p><ul><li><p>FDA-regulated clinical investigations and post-marketing surveillance using de-identified or pseudonymized data.</p></li><li><p>Submissions required by the FDA or foreign health authorities.</p></li><li><p>Federally funded research, telecommunications, financial services, and official US government business.</p></li></ul><h2>From Privacy to National Security</h2><p>There is growing awareness among many governments worldwide that adversaries can weaponize various types of personal information. Unlike HIPAA or GDPR, which hinge on individual privacy and consent, the new DOJ rule is grounded in national security risk and applies to all information and events, including de-identified data. The US-DOJ&#8217;s National Security Division (NSD) explicitly likens the regime to export controls on data, placing it alongside sanctions administered by OFAC. US persons must &#8220;know their data&#8221;&#8212;inventory what they hold, where it flows, and who ultimately accesses it.</p><p>Data protection and national security fusion reflects a global trend: information is now a strategic resource. For life sciences, where genomic data is the new oil, the rule underscores that data sovereignty is security sovereignty. [5]</p><h2>Impact on Life-Science Companies</h2><p>In my first blog, I explained that intangible assets dominate the balance sheets of most modern companies. Other authors have noted &#8220;Data is the new oil&#8221; [6] [7]. Few industries rely more heavily on cross-border data sharing than biotechnology and healthcare. Clinical trials, genomic sequencing, contract research, and post-marketing surveillance all involve global data flows.</p><p>Yet these very strengths&#8212;data intensity and international collaboration&#8212;create exposure under the new rule. The rule&#8217;s breadth, departure from existing privacy-focused laws, and significant civil and criminal penalties mean life-science companies must now evaluate how to minimize risk in prohibited and restricted transactions</p><p>For many of Green Leaf&#8217;s life sciences clients, these shifts have prompted a reassessment of how data is stored, shared, and governed. Cloud strategy, vendor selection, and data classification polices now carry implications that reach beyond compliance.</p><h2>Violations</h2><p>Like other regulations with criminal liability, violating the new rule is a serious issue. Violations carry civil penalties up to $368,000 or twice the transaction value, and criminal penalties of $1 million and 20 years&#8217; imprisonment for willful acts.</p><h2>Life Science&#8217;s Plan for Action [4]</h2><p>Life Science companies that generate and use bulk &#8220;omic&#8221; information must:</p><ul><li><p>Establish a Data Compliance Program &#8211; A written, risk-based program identifying data types, transaction parties, and data-flow maps; certified annually by a senior officer.</p></li><li><p>Conduct independent audits &#8211; Annual audits verifying adherence to CISA security controls and compliance procedures.</p></li><li><p>Maintain records for ten years &#8211; Covering transaction details, licenses, advisory opinions, and audit results.</p></li><li><p>Report certain events &#8211; Including rejected prohibited transactions and suspected onward transfers to countries of concern.</p></li><li><p>Develop an Action Plan that includes:</p><ul><li><p>Map global data flows</p></li><li><p>Screen Counterparties</p></li><li><p>Amend contracts</p></li><li><p>Leverage exemptions</p></li><li><p>Integrate security frameworks</p></li><li><p>Educate leadership</p></li></ul></li></ul><h1>Conclusion</h1><p>As noted in my prior posts, the life science sector is experiencing a data revolution. From drug development to regulatory approval and manufacturing, Data analytics and AI are unlocking insights across genomics, clinical trials, and precision medicine.</p><p>However, with innovation comes exposure: the same datasets that enable breakthroughs can also reveal national vulnerabilities if exploited by adversaries.</p><p>The DOJ&#8217;s Data Security Program signals that data protection is now a matter of national defense, not merely corporate compliance. For life-science companies, aligning discovery with defense isn&#8217;t optional&#8212;it&#8217;s the new operating reality.</p><p>The 2025 DOJ Data Rule marks the first comprehensive US attempt to treat personal and biomedical data as a strategic asset. Life science organizations that proactively build compliant, risk-based data security programs will not only avoid penalties&#8212;they will also earn trust as stewards of America&#8217;s future genomic and health data.</p><p>Green Leaf Consulting Group is well-positioned to assist Life Science companies in understanding the risks. The experts at Green Leaf can design and implement a compliance action plan for the new rule, providing data flow analysis, information supply chain mapping, contract review, and modification of information security frameworks (policies and procedures). They can also educate leaders and managers on the implications of these changes and how to address them.</p><h1>References</h1><p>1. Biden, J.R., <em>Executive Order 14117 of February 28, 2024</em>, T.W. House, Editor. 2024, US Federal Register, Washington, DC.</p><p>2. Pierce, J.C., et al., <em>Life Sciences Companies Must Navigate the DOJ Data Rule</em>, in <em>Goodwin - Alerts</em>. 2025, Goodwin LLP: Boston, MA.</p><p>3. Division, N.S., <em>Data Security Program: Compliance Guide</em>, U.S.D.o. Justice, Editor. 2025, United States Department of Justice - National Security Division: Washington, DC.</p><p>4. Section, N.S.D.F.I.R., <em>National Security Division Data Security Program Compliance Guide - 04112025</em>, U.S.D.o. Justice, Editor. 2025, United States Department of Justice: Washington, DC.</p><p>5. Egan, M., et al., <em>The DOJ&#8217;s Bulk Sensitive Personal Data Rule&#8217;s Imminent Relevance to Life Sciences Companies</em>, in <em>Cooley Alert</em>. 2025, Cooley LLP: Palo Alto, CA.</p><p>6. Bhageshpur, K., <em>Data Is The New Oil -- And That&#8217;s A Good Thing</em>, in<em> Forbes Technology Council</em>. 2019, Forbes.</p><p>7. Technology, O.I., <em>The DOJ Big Data Act: What Insurers Need to Know</em>. 2025, OIP Insurance Technology: Henderson, NV.</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Data in the Evolving World of Life Sciences – You Get What You Measure]]></title><description><![CDATA[By Ed Ferrara, Strategic Technology Advisors & CIO / CISO Advisor to Green Leaf Consulting Group]]></description><link>https://www.strat-tech.org/p/data-in-the-evolving-world-of-life-d5e</link><guid isPermaLink="false">https://www.strat-tech.org/p/data-in-the-evolving-world-of-life-d5e</guid><dc:creator><![CDATA[Ed Ferrara]]></dc:creator><pubDate>Sun, 25 Jan 2026 13:38:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!I27r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0701c097-9355-4cb5-9aa9-0c512cb322ba_514x396.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>October 2025</strong></p><h1>Preface</h1><p><em>This article is part of a series developed for <a href="https://greenleafgrp.com/insights/?_content_type=article">Greenleaf Group</a> to highlight the complexity of data and its use across organizations of all sizes and across vertical industries. The first four articles in this series focus on the life sciences industry. Subsequent articles will focus on other industries and technology providers promisi&#8230;</em></p>
      <p>
          <a href="https://www.strat-tech.org/p/data-in-the-evolving-world-of-life-d5e">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Data in the Evolving World of Life Sciences - Intangible Assets]]></title><description><![CDATA[By Ed Ferrara, Strategic Technology Advisors & CIO / CISO Advisor to Greenleaf Group]]></description><link>https://www.strat-tech.org/p/data-in-the-evolving-world-of-life</link><guid isPermaLink="false">https://www.strat-tech.org/p/data-in-the-evolving-world-of-life</guid><dc:creator><![CDATA[Ed Ferrara]]></dc:creator><pubDate>Sun, 25 Jan 2026 10:56:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yGd-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826592dd-d7e0-4b01-b34b-1d587904efc0_165x165.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>September 30, 2025</p><p><em>This article is part of a series developed for <a href="https://greenleafgrp.com/insights/?_content_type=article">Greenleaf Group</a> to highlight the complexity of data held and used by organizations of all sizes and across vertical industries. The first four articles in this series focus on the life sciences industry. Subsequent articles will focus on the financial services industry and on technology providers promising to revolutionize data analytics through Artificial Intelligence.</em></p><h1><em>Introduction</em></h1><p>Data has become the lifeblood of the life sciences industry, powering everything from clinical trials and regulatory filings to precision medicine and digital therapeutics. Yet as data volumes grow, so do the challenges of managing, protecting, and deriving value from it.</p><p>Drawing on my experience as a former CISO at a $12B biopharma and an industry analyst at Forrester, I&#8217;ve seen firsthand how organizations struggle to balance innovation with security, compliance, and governance. The real opportunity lies in transforming data from a byproduct of operations into a strategic asset that drives scientific discovery and business growth. [MM1] While at Forrester, I focused on issues of importance to the Chief Information Security Officer. Most of my colleagues worried about the technical aspects of the network, operating system, and application security. I touched on those as well; however, I focused on management issues, such as what a modern cybersecurity team looks like and the financials of cybersecurity. Why does any company need to protect its information assets? If they believe they do, is there a quantitative rationale for such protection?</p><p>The answer became clear when I researched the balance sheets of large corporations. What I found is that, for a vast majority of large organizations, the makeup of their assets on the balance sheet consists of what financial analysts term intangibles. [MM2]</p><p>According to International Financial Reporting Standards (IFRS), assets are without physical substance. However, companies expect intangible assets to generate economic returns for the company in the future. As a long-term asset, this expectation extends beyond one year or one operating cycle [1]. The IFRS word choice is Interesting: &#8220;non-monetary assets without physical substance.&#8221; Yet, these are still assets and in balance perhaps the most valuable of all.</p><p>This is especially true for life sciences companies; information security isn&#8217;t just about protecting networks or applications, it&#8217;s about safeguarding intellectual property, patient data, and clinical trial integrity. Most assets on a biopharma&#8217;s balance sheet are intangible &#8212; data, IP, and other non-physical assets that generate future economic value. Protecting and maximizing the value of these assets is critical for long-term success.</p><p>The World Intellectual Property Organization estimates that the global value of all intangible assets has surpassed 80 trillion US dollars worldwide [2].</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9T7_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9T7_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 424w, https://substackcdn.com/image/fetch/$s_!9T7_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 848w, https://substackcdn.com/image/fetch/$s_!9T7_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 1272w, https://substackcdn.com/image/fetch/$s_!9T7_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9T7_!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png" width="1200" height="750.7246376811594" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:259,&quot;width&quot;:414,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A graph showing the growth of the company's financial growth\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="A graph showing the growth of the company's financial growth

AI-generated content may be incorrect." title="A graph showing the growth of the company's financial growth

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!9T7_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 424w, https://substackcdn.com/image/fetch/$s_!9T7_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 848w, https://substackcdn.com/image/fetch/$s_!9T7_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 1272w, https://substackcdn.com/image/fetch/$s_!9T7_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07efe983-0e66-47a6-9448-d842a9e93e7e_414x259.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure 1 - Global Intangible Asset Growth 1996-2004</em></p><p>In the same report, the authors note that technology and pharmaceutical companies continue to dominate among the most intangible asset-rich firms. Life sciences companies that made the top firm list include Novo Nordisk, AstraZeneca, and Teva Pharmaceuticals [2].</p><p>So, what can we get from this information? Data represents a vast share of the wealth in the modern economy. Learning to leverage this asset is a critical success factor for all life sciences companies. Other businesses must master the discipline of creating data value.</p><p>Life sciences companies are now exploring new frontiers for the creative use of data [MM3] [ESF4] across multiple areas. Let&#8217;s look at two important ones. I will cover additional dimensions in subsequent posts.</p><h2><strong>Research &amp; Development (R&amp;D)</strong></h2><p>Data has always been intrinsic to the research and development process for life sciences. For example, analyzing the results of a clinical trial can involve collecting large samples of patient data on their disease response to the new medication and, equally important, how this compares with patient responses who received a placebo during the trial.</p><p>&#8220;All clinical trials and many observational studies have a designated primary outcome of interest, which is the quantitative metric used to determine the effect of the treatment or exposure. The statistical properties, such as the probability distribution of the outcome variable and quantifying changes in said variable due to the exposure, are of primary importance in determining the choice of statistical methodology.&#8221; [3]</p><p>Artificial Intelligence is now impacting R&amp;D as life sciences companies seek more cost-effective ways to bring drugs to market. Data science has emerged as a cornerstone for decision-making and problem-solving across various sectors, with potentially transformative implications for life sciences and healthcare organizations. Sloan Partners, a life sciences executive search firm, reports that the ability to analyze vast amounts of data accurately and quickly to extract meaningful insights has revolutionized how we approach scientific research and development, clinical practices, diagnostics, drug development, and patient care. [4]</p><h2><strong>Medical Affairs (Pharmaceutical Market Influence)</strong></h2><p>Another example is Medical Affairs. Medical Science Liaisons engage healthcare providers (HCPs) and Key Opinion Leaders (KOLs) to share scientific information and build relationships with these influencer groups.</p><p>Using various types of data to leverage medical affairs information for better patient outcomes:</p><ul><li><p>Harnessing real-world data and clinical insights.</p></li><li><p>Influence physician prescribing behaviors</p></li><li><p>Payer decisions</p></li><li><p>Market access and reimbursement strategies</p></li></ul><p>Using this information, life sciences companies judge market perceptions as well as measure the effectiveness of their medications in the marketplace.</p><p>I chose just two possible areas where data is critical to life sciences organizations. There are other use cases where data is essential for life sciences organizations. Other examples include finance, facilities, operations, manufacturing, sourcing, and logistics.</p><p>Using just these examples, it is obvious why information and data assets represent a significant part of a life sciences company&#8217;s balance sheet.</p><p>Green Leaf Consulting Group brings hands-on experience in <a href="https://greenleafgrp.com/life-sciences/">helping life sciences companies</a> harness the power of data within research and development and medical affairs. From ensuring data integrity in clinical research to delivering compliant, insight-rich reporting for medical affairs teams, we help organizations turn data into a strategic advantage that advances science and enhances patient care.</p><p>In this series of articles, I will explore the various dimensions of information and data assets and why mastering an organization&#8217;s data assets will define the winners and losers in the next decade. In my next post, I will explore the other data dimensions that drive life sciences organizations, including direct monetization (a controversial topic), return on investment (ROI), business value creation through data-driven optimization, and the 800-pound gorilla in the data science room &#8211; AI.[MM5] [ESF6] [MM7] </p><h1><strong>References</strong></h1><p>1. Mackie, C., <em>Intangible Assets: Measuring and Enhancing Their Contribution to Corporate Value and Economic Growth: Summary of a Workshop</em>. 2009, The National Academy of Sciences: Washington, DC, USA.</p><p>2. Brown, A., et al., <em>The Value of Intangible Assets of Corporations Worldwide Rebounds to an All-Time High of USD 80 Trillion in 2024</em>, W.I.P. Organization, Editor. 2024.</p><p>3. Smeltzer, M.P. and M.A. Ray, <em>Statistical considerations for outcomes in clinical research: A review of common data types and methodology.</em> Exp Biol Med (Maywood), 2022. <strong>247</strong>(9): p. 734&#8211;742.</p><p>4. Sloan Partners, <em>The Growing Importance of Big Data &amp; Data Science in Life Sciences &amp; Healthcare</em>, in <em>Sloan Partners - Insights</em>. 2024, Sloan Partners: https://slonepartners.com</p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Risk, Regulation, and Trust: Why Data Governance Defines Leadership in Banking and FinTech]]></title><description><![CDATA[Risk, Regulation, and Trust: Why Data Governance Defines Leadership in Banking and FinTech]]></description><link>https://www.strat-tech.org/p/risk-regulation-and-trust-why-data</link><guid isPermaLink="false">https://www.strat-tech.org/p/risk-regulation-and-trust-why-data</guid><dc:creator><![CDATA[Ed Ferrara]]></dc:creator><pubDate>Sat, 24 Jan 2026 22:46:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yGd-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826592dd-d7e0-4b01-b34b-1d587904efc0_165x165.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Risk, Regulation, and Trust: Why Data Governance Defines Leadership in Banking and FinTech</h1><p>This article is part of a series developed for <a href="https://greenleafgrp.com/insights/?_content_type=article">Greenleaf Group</a> to highlight the complexity of the data and data use in organizations of all sizes and across vertical industries. The first four articles in this series focused on the life sciences industry. Subsequent articles will focus on the financial services industry and on technology providers promising to revolutionize data analytics through Artificial Intelligence.</p><h2>Introduction: Macro and Micro Views on the Use of Data in Financial Services</h2><p>In past articles, the views and observations expressed were primarily from a micro-level perspective on the use of data within a specific domain. It could be argued that the datasets reviewed are tactical, addressing specific business processes. [1, 2]</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strat-tech.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This article shifts the focus to a broader picture &#8211; how broad changes in the world economy and political and economic shifts will make data significantly more important for solving strategic challenges.</p><p>Modern data science is built on the power of big data, and as I pointed out, it is easy to get lost in the sea of data; however, being lost in a sea of data does not mean we can&#8217;t or shouldn&#8217;t attempt to identify patterns and trends in the information. The financial services industry is changing, and the pace of change is accelerating.</p><p>The first FinTech, Security First Bank, was created in 1995 and sparked recognition that financial services could be improved through technology. [3] Innovations introduced by FinTechs such as Security First and its successors greatly influenced traditional banks, forcing them to adopt new technologies to remain competitive.</p><h2>Two Models, One Trust Imperative</h2><p>Traditional banks and FinTech companies often view themselves as fundamentally different. Banks emphasize stability, regulatory compliance, and balance sheet strength. FinTechs emphasize speed, innovation, customer experience, and platform-driven growth. Yet beneath these differences lies a shared reality: both are now data-centric financial institutions and depend on trust built through responsible data use.</p><p>Since then, digital channels, real-time payments, embedded finance, and AI-driven decisioning have become ubiquitous, and the distinction between banks and FinTechs continues to blur. Regulators increasingly treat FinTechs as systemically relevant financial actors, while banks adopt FinTech-style architectures and operating models. In this converging landscape, risk, regulation, and trust are no longer institution-specific concerns but are data-driven imperatives.</p><h2>Risk Is No Longer a Balance Sheet Issue Alone</h2><p>For decades, banks managed risk primarily through capital adequacy, credit underwriting discipline, and market exposure controls. FinTechs, by contrast, often framed risk in terms of platform reliability, fraud prevention, and growth sustainability. Today, both models face the same underlying truth: risk has become a data problem.</p><h3>Data Quality and Interpretation</h3><p>Poor data quality can distort credit models, increase false positives or negatives in fraud detection, undermine stress testing, and lead to unfair or non-compliant customer outcomes. As automation accelerates, errors propagate faster and farther.</p><h3>New Pressures</h3><p>As capital fractures amid geopolitical tensions (trade and kinetic conflicts), technological advancements, and demographic trends, global commerce and financial services business models must adapt. Not only are there more variables in play than usual, but the sector&#8217;s pace of change (adaptation) is accelerating at a speed never imagined. Executives are trying to navigate the complexities of a multi-shock world, where the only thing firms can be certain of is uncertainty. World events are rapidly reshaping the financial services landscape; resilient companies will focus on having the data, analytical capability, and leadership to pivot toward opportunity and away from uncontrolled risk. [4]</p><p>This is not a new problem. Information has always been instrumental in decision-making. Richard Hamming (1915-1998) is credited with coining the phrase &#8220;You get what you measure.&#8221; [5, 6]</p><p>However, bias can deceive us, allowing us to see things as we want to, rather than as they really are. We may think our measurements are accurate, but personal desires cloud the analysis, and we create false narratives.</p><h2>The 2008 Financial Crisis</h2><p>The 2008 global financial crisis was the worst economic disaster since the Great Depression. It caused upheaval in financial markets worldwide, brought down major banks, and left millions of people without homes, jobs, or savings. At its core, the crisis stemmed from a toxic mix of deregulation, excessive risk-taking, lax lending standards, and the bursting of a massive housing bubble. But the seeds of the crash were sown over many years through flawed policy decisions and unchecked market excesses.</p><p>One of the most significant lessons learned from the global financial crisis that began in 2007 was that banks&#8217; information technology (IT) and data architectures were inadequate to support the broad management of financial risks. Many banks could not aggregate risk exposures and quickly and accurately identify concentrations at the bank group level, across business lines, and between legal entities. Some banks were unable to manage their risks effectively due to weak risk data aggregation capabilities and risk reporting practices. This had severe consequences for the banks themselves and for the stability of the financial system overall. [7]</p><p>The data had been there for some time, and a time bomb and an equivalent financial time bomb had been set, with the fuse lit. As Michael Burry observed in a New York Times Op-Ed article written after the crisis, many formerly prestigious firms (Lehman Brothers, Bear Stearns, and others) collapsed. Several factors caused the crash. [8]</p><p>In 2008, after the crash, Alan Greenspan, the former chairman of the Federal Reserve, admitted he had made a mistake. He is quoted as saying:</p><p><em>&#8220;I made a mistake in presuming that the self-interest of organizations, specifically banks and others, was such that they were best capable of protecting their own shareholders,&#8221; he said. [9]</em></p><h2>Regulation, Innovation, and Uncertainty</h2><p>Economists widely expect that the extensive use of leverage across the financial system, combined with policy efforts to lower interest rates in support of economic growth, will increase inflationary pressures. For banks, FinTechs, and investors, this environment heightens uncertainty about asset valuations, funding costs, and long-term capital allocation. At the same time, regulators are struggling to keep pace with the rapid pace of change in financial services, while market indicators suggest that sophisticated institutional investors are increasingly diversifying exposure away from the U.S. in search of more stable or higher-growth opportunities abroad. [4]</p><p>Regulatory focus is intensifying around data lineage, technology controls, and algorithmic decision-making&#8212;areas at the core of modern FinTech and digital banking models. As a result, FinTech firms are facing bank-like regulatory expectations much earlier in their growth cycles, particularly in domains such as consumer protection, operational resilience, model governance, and data management. For investors, this shift materially alters risk profiles, compliance costs, and time-to-scale assumptions, while for institutions, it reinforces the need to embed regulatory readiness in product and platform design from the outset. [10]</p><p>The financial services sector is entering a period of meaningful regulatory realignment. Shifting political priorities, macroeconomic volatility, and rapid technological innovation are prompting regulators worldwide to reassess how financial oversight should be applied in a digital-first economy. In the United States, agencies including the Consumer Financial Protection Bureau (CFPB), the Office of the Comptroller of the Currency (OCC), and the Federal Deposit Insurance Corporation (FDIC) are evolving their supervisory approaches to address emerging risks associated with non-bank financial institutions, embedded finance, and technology-driven business models. For banks and FinTechs alike, regulatory engagement is increasingly a strategic function rather than a purely compliance-driven exercise. [4]</p><p>At the same time, digital assets and cryptocurrency markets are shifting from speculative experimentation toward regulated financial infrastructure. The emergence of central bank digital currencies (CBDCs), growing institutional participation, and increased regulatory scrutiny are redefining how digital assets fit within the broader financial ecosystem. For investors and financial institutions, this evolution presents both opportunity and risk: blockchain-enabled settlement, tokenized assets, and programmable money offer efficiency gains and new revenue models, while regulatory uncertainty and jurisdictional fragmentation remain key concerns. The next five years will be decisive as policymakers, market participants, and investors seek to balance innovation with regulatory discipline&#8212;determining whether digital assets become a catalyst for financial system modernization or a constrained niche within it. [11]</p><h2>Explainability as a Trust Requirement</h2><p>To maintain customer trust, institutions must clearly explain how they make data-driven decisions. Explainability is no longer optional&#8212;it is a regulatory, legal, and reputational imperative. Regulators and customers will demand it as a key performance indicator. Customers choose providers based on transparency, fairness, and data stewardship. Trust increasingly determines market success.</p><h3>The Cost of Weak Data Governance</h3><p>Weak governance leads to regulatory fines, customer attrition, operational inefficiencies, and strategic hesitation. Strong governance enables speed, innovation, and trust.</p><h2>Executive Accountability</h2><p>Data leadership is executive leadership. CIOs, CTOs, CISOs, CROs, and CFOs must align governance with a clear-sighted assessment of what the data shows, so that it supports the institution&#8217;s strategy and maintains customer trust and regulatory compliance. A response from the executive suite that there was &#8220;no way of knowing&#8221; in the event of a major market correction will not suffice.</p><h2>Conclusion</h2><p>Data unifies risk, regulation, and trust. Institutions that master data governance will lead in banking and FinTech over the next decade. Greenleaf has data experts and C-level interim executives on staff who can develop a cost-effective, practical data governance program that addresses regulatory and operational risk and provides proof points for clients and their customers that they take data protection, privacy, and innovation seriously. If you have these concerns and would like an objective review, please contact the <a href="https://greenleafgrp.com">Greenleaf Group</a> or</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FnVY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FnVY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 424w, https://substackcdn.com/image/fetch/$s_!FnVY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 848w, https://substackcdn.com/image/fetch/$s_!FnVY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 1272w, https://substackcdn.com/image/fetch/$s_!FnVY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FnVY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic" width="200" height="165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:12167,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strat-tech.org/i/185674731?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FnVY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 424w, https://substackcdn.com/image/fetch/$s_!FnVY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 848w, https://substackcdn.com/image/fetch/$s_!FnVY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 1272w, https://substackcdn.com/image/fetch/$s_!FnVY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90747db2-c920-4e56-a9b7-0d095f64d647_200x165.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p> <a href="http://www.strat-tech.org">Strategic Technology Advisors.</a></p><h1>References</h1><p>1. Ferrara, E., <em>Data in the Evolving World of Life Sciences_ Chaos to Order</em>, in <em>Greenleaf Group - Insights</em>, M. Miner, Editor. 2025, Greenleaf Group: <a href="https://greenleafgrp.com/insights/data-in-the-evolving-world-of-life-sciences-chaos-to-order/">https://greenleafgrp.com/insights/data-in-the-evolving-world-of-life-sciences-chaos-to-order/</a>.</p><p>2. Ferrara, E., <em>Why Data Now Defines Value in Banking and Financial Services</em>, in <em>Greenleaf Insights</em>, M. Miner, Editor. 2025, Greenleaf Group: <a href="https://greenleafgrp.com/insights/why-data-now-defines-value-in-banking-and-financial-services/">https://greenleafgrp.com/insights/why-data-now-defines-value-in-banking-and-financial-services/</a>.</p><p>3. Wikipedia, <em>Security First Network Bank</em>. 2025.</p><p>4. Peter, P., <em>What will be left of financial services tomorrow?</em>, in <em>PWC - Insights</em>. 2025, PWC: <a href="https://www.pwc.com/us/en/industries/assets/industry-edge-financial-services-tomorrow.pdf">https://www.pwc.com/us/en/industries/assets/industry-edge-financial-services-tomorrow.pdf</a>.</p><p>5. Ferrara, E., <em>Data in the Evolving World of Life Science (Part 2)</em>, in <em>Greenleaf - Insights</em>, M. Miner, Editor. 2025, Greenleaf Group: <a href="https://greenleafgrp.com/insights/data-in-the-evolving-world-of-life-sciences-part-2/">https://greenleafgrp.com/insights/data-in-the-evolving-world-of-life-sciences-part-2/</a>.</p><p>6. Hamming, R.W., <em>Hamming, &#8220;You Get What You Measure&#8221; (June 1, 1995)</em>. 1995: YouTube.</p><p>7. Adachi, M., et al., <em>Principles for effective risk data aggregation and risk reporting</em>, F. Vargas, Editor. 2013, Bank for International Settlements: Basel, Switzerland.</p><p>8. Burry, M., <em>I Saw the Crisis Coming. Why Didn&#8217;t the Fed?</em>, in <em>The New York Times</em>. 2010, The New York Times: New York, NY, USA.</p><p>9. Beattie, A. and J. Politi, <em>&#8216;I made a mistake,&#8217; admits Greenspan</em>, in <em>Financial Times</em>. 2008, Financial Times: London, UK.</p><p>10. Sheth, N., <em>Fintech&#8217;s Next Big Challenge? Thriving In An Era Of Regulatory Uncertainty</em>, in <em>Forbes</em>. 2025, Forbes Media: New York, NY, USA.</p><p>11. Kumar, U., <em>7 Trends of AI and Data Science in 2026.</em> Medium, 2026.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strat-tech.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Business Value of an Effective Security Program ]]></title><description><![CDATA[Information Security Economics 2025]]></description><link>https://www.strat-tech.org/p/the-business-value-of-an-effective</link><guid isPermaLink="false">https://www.strat-tech.org/p/the-business-value-of-an-effective</guid><dc:creator><![CDATA[Ed Ferrara]]></dc:creator><pubDate>Sun, 11 Jan 2026 17:25:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yGd-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826592dd-d7e0-4b01-b34b-1d587904efc0_165x165.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>1 Executive Summary</h1><p>I wrote the first version of this paper as Vice President, Principal Analyst at Forrester Research. Much has changed since 2012, when the first version was published.</p><p>Modern organizations run on information. Product design, digital services, supply chains, and customer experiences are all powered by data that can be copied, stolen, encrypted, or manipulated at very low cost by increasingly professionalized threat actors. At the same time, boards and executive teams expect chief information security officers (CISOs) to justify security spend with the same financial discipline that applies to any other investment. This was true in 2012 and is still true today.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strat-tech.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This paper presents an updated 2025 version of Forrester&#8217;s Information Security Value Model. [1] This paper reframes information security as an economic function that protects and enables revenue, rather than a pure cost center. The model helps CISOs:</p><ol><li><p>Value information assets in business terms.</p></li><li><p>Quantify fixed and variable security costs.</p></li><li><p>Estimate expected loss using modern risk-quantification techniques.</p></li><li><p>Express security value as a transparent, decision-supportive financial ratio.</p></li></ol><p>I also provide a practical implementation roadmap, updated terminology aligned with today&#8217;s cloud- and AI-driven environments, recommendations for enhancing visuals and dashboards, and guidance on telling a clear financial story about cyber risk to senior leadership and the board.</p><h1>2 Introduction: Why Security Economics Matter in 2025</h1><p>Security and risk leaders face a paradox. Cyber risk is growing in frequency, impact, and complexity, yet security budgets are not keeping pace and, in many organizations, are effectively flat in real terms. Regulators, customers, and investors expect stronger controls, better resilience, and faster incident response, while executive teams expect security to enable digital growth rather than constrain it.</p><p>In this environment, qualitative arguments and generic industry benchmarks are no longer sufficient. CISOs must demonstrate how security investments reduce expected losses, protect revenue, and align with the organization&#8217;s risk appetite. They need a security business model that mirrors the economic rigor used by attackers and their finance peers. The Information Security Value Model addresses this need by pairing information asset valuation with cost and risk modeling, enabling security to be managed as a portfolio of economic decisions.</p><h1>3 The Modern Threat Landscape and Attacker Economics</h1><p>Cybercriminals and state-aligned actors now operate as sophisticated businesses. Ransomware-as-a-service platforms, credential markets, and initial-access brokers have created a mature ecosystem in which each actor specializes in a segment of the value chain. Cloud environments, remote work, and ubiquitous APIs have expanded the attack surface, while automation and AI tools enable adversaries to scale operations at relatively low incremental cost.</p><p>The economics of this ecosystem are clear: attackers target the information and systems that generate the most value. This includes intellectual property, payment and customer data, operational technology, and the digital platforms that underpin service delivery. They pursue the highest payoff for the lowest effort and risk. For example, encrypting a small number of high-value databases or compromising a key cloud identity provider may yield more leverage than a broad but shallow intrusion. In effect, attackers perform their own informal cost&#8211;benefit analysis of an organization&#8217;s information assets.</p><p>If security leaders cannot explain the economic value of the information they protect, they will struggle to compete with attackers. Adopting a clear financial model for security is therefore not optional; it is a prerequisite for effective strategy and credible decision-making.</p><h1>4 Information as a Revenue-Producing Asset</h1><p>Traditional accounting treats information as an intangible asset, if it is recognized at all. Hardware, office buildings, and manufacturing equipment appear explicitly on the balance sheet, but the data that drives modern business models often does not. In 2025, this perspective is increasingly detached from reality. Information is a primary input to revenue-generating activities and should be managed accordingly.</p><p>For this model, we define the economic value of an information asset as the share of current and future revenue that depends on the availability, integrity, and confidentiality of that information, minus the direct and indirect costs of creating, managing, and protecting it. This definition makes information value explicitly conditional on business use: data that no longer supports products, services, or regulatory obligations has little or no economic value and should be archived or deleted.</p><p>To make this definition operational, we categorize information into three broad types:</p><p>1. Revenue-generating information: directly tied to products or services sold to customers, such as software source code, pricing models, or customer transaction data.</p><p>2. Risk- and compliance-driven information: not directly revenue-generating but required to satisfy legal, regulatory, or contractual obligations, such as employee records or regulated financial and health data.</p><p>3. Supporting information: enables internal efficiency or decision-making, such as analytics data, internal process documentation, or training materials.</p><h1>5 The 2025 Information Security Value Model</h1><p>The Information Security Value Model quantifies how security investment relates to the value of information assets and the risk of loss. It consists of four significant steps:</p><p>1. Map information assets to business capabilities and revenue streams.</p><p>2. Quantify fixed and variable security costs associated with those assets.</p><p>3. Estimate expected loss by modeling threat scenarios and control effectiveness.</p><p>4. Calculate security value and optimize the security investment portfolio.</p><h2>5.1 Map Information Assets to Business Capabilities and Revenue</h2><p>Start with the business, not the technology. Work with product, sales, operations, and finance stakeholders to identify major revenue streams and the capabilities that support them&#8212;for example, digital commerce, subscription services, manufacturing, or logistics. For each capability, identify the critical information assets that must be available and trustworthy for that capability to function.</p><p>For each asset&#8211;capability pair, assign a proportional contribution to revenue. In some cases, this will be direct and obvious&#8212;for example, an e-commerce customer database that is required for order processing. In other cases, the relationship is indirect or shared across multiple products. The goal is not perfect precision but a consistent, defensible mapping that can be refined over time.</p><h2>1.1 Quantify Fixed and Variable Security Costs</h2><p>Next, classify your security costs as either fixed or variable and associate them with the information assets you have just mapped. Fixed costs are those that do not fluctuate significantly with incident volume over the short term, such as permanent staff, core tools, and baseline compliance obligations. Variable costs are triggered or increased by events, such as major breaches or new regulatory findings.</p><p>Typical fixed costs include:</p><ol><li><p>Core security tooling (identity, endpoint, network, cloud, SIEM/XDR).</p></li><li><p>Baseline compliance activities (audits, assessments, certifications).</p></li><li><p>Shared infrastructure charges for security services.</p></li><li><p>Typical variable costs include:</p></li></ol><ul><li><p>Security staff salaries and benefits.<sup>[1]</sup></p></li><li><p>Incident response and forensics.</p></li><li><p>Legal counsel, regulatory notifications, and fines.</p></li><li><p>Customer communication, call center surges, and credit monitoring.</p></li><li><p>Ransom payments or operational downtime losses, where applicable.</p></li><li><p>Post-incident technology changes, consulting engagements, and additional staffing.</p></li></ul><p>Assign these costs to the information assets they primarily protect, using reasonable allocation keys such as percentage of control coverage, percentage of asset criticality, or revenue share. The goal is to determine how much you currently spend to protect each major revenue-producing or risk-sensitive asset.</p><h2>1.2 Estimate Expected Loss Using Modern Risk Quantification</h2><p>To move beyond qualitative heat maps, use modern risk quantification techniques to estimate the expected loss for each information asset. Frameworks such as FAIR (Factor Analysis of Information Risk) and Monte Carlo simulations enable you to model ranges of probable loss rather than single-point estimates.[2]</p><p>For each critical asset, identify plausible threat scenarios, such as credential compromise leading to data theft, ransomware affecting availability, or insider misuse of sensitive information. Assess how often each scenario could occur and estimate the potential impact on factors such as revenue loss, response costs, regulatory penalties, and long-term reputation damage. Conduct simulations to generate a distribution of annualized loss exposure rather than relying on a single number.</p><p>This expected loss is a key input to the security value calculation. It quantifies the downside risk that security controls are intended to mitigate.</p><h2>1.3 Calculate Security Value and Optimize the Portfolio</h2><p>With revenue contribution, cost, and expected loss estimates in place, you can now calculate the economic value of your security program. A practical way to do this is to focus on three core quantities for each major asset or asset group:</p><ol><li><p>Revenue protected: the portion of revenue that depends on the asset being secure and available.</p></li><li><p>Expected loss avoided: the reduction in modeled loss due to existing or proposed controls.</p></li><li><p>Total security investment: the fixed and variable costs allocated to protecting the asset.</p></li></ol><p>A simplified expression of security value at the portfolio level is: Security Value = (Expected Loss Avoided + Revenue Protected + Enablement Benefits) / Total Security Investment.</p><p>This approach promotes continuous improvement. Over time, you aim to increase the numerator&#8212;by enhancing control effectiveness and expanding secure digital business&#8212;while managing or decreasing the denominator through automation, consolidation, and better prioritization. Security decisions can then be evaluated using the same return-on-investment logic applied to other business initiatives.</p><h2>1.4 Worked Example: Subscription SaaS Provider</h2><p>Consider a hypothetical software-as-a-service company that derives 80% of its revenue from a multi-tenant cloud platform. A small number of information assets&#8212;such as the production customer database, authentication service, and billing system&#8212;are clearly critical. Using the steps above, the CISO and finance team determine the following:</p><ol><li><p>65% of annual recurring revenue depends on the availability and integrity of the production database.</p></li><li><p>50% of that revenue would be at serious risk in a prolonged outage or a large-scale data breach.</p></li><li><p>The expected annualized loss exposure for the database, before control improvements, is modeled within a range that would meaningfully impact profitability.</p></li></ol><p>The organization then evaluates several investment options, including enhanced backup and recovery, privileged access management, and stronger identity protection. For each option, the team estimates the expected reduction in loss and the impact on overall security investment. This analysis helps executives prioritize the controls that offer the greatest expected loss reduction relative to cost, while also considering qualitative factors such as customer trust and regulatory review.</p><h1>2 Visuals, Tables, and Dashboards</h1><p>To make the Information Security Value Model usable in day-to-day decision-making, present it through clear visuals and dashboards rather than dense spreadsheets alone. The following elements are particularly helpful for executives:</p><ol><li><p>A revenue-to-asset map showing which information assets underpin which revenue streams.</p></li><li><p>A cost allocation table that summarizes fixed and variable security costs by asset group.</p></li><li><p>A risk curve that illustrates expected loss before and after key control investments.</p></li><li><p>A portfolio view that ranks assets by revenue contribution, expected loss, and current control strength.</p></li></ol><p>For example, a dashboard might display each major asset as a bubble positioned by revenue contribution (x-axis) and expected loss (y-axis), with bubble size representing total security spend and color representing residual risk. This provides an immediate visual cue about where security investment may be misaligned with business value.</p><h1>3 Communicating Security Value to Executives and the Board</h1><p>Even the most rigorous model will fail to gain traction if it is not communicated in a language that resonates with executive stakeholders. CISOs should frame security conversations around business outcomes rather than technical metrics. Instead of leading with vulnerability counts or tool coverage, focus on revenue-at-risk, expected loss reduction, and alignment with the organization&#8217;s stated risk appetite.</p><p>Effective board reporting on security typically includes:</p><ol><li><p>A concise narrative of the current threat environment as it relates to the organization&#8217;s strategy.</p></li><li><p>A summary of the most critical information assets and the revenue or mission outcomes they support.</p></li><li><p>Quantified estimates of expected loss and how key initiatives are changing that exposure.</p></li><li><p>A small set of leading and lagging indicators, such as time-to-detect, time-to-contain, and control coverage for high-value assets.</p></li><li><p>A forward-looking view of significant initiatives, dependencies, and investment decisions required in the next 12&#8211;24 months.</p></li></ol><p>By consistently framing security in these terms, CISOs build credibility as business leaders who manage a portfolio of risk and return, rather than as purely technical experts seeking incremental budget.</p><h1>4 Updated Terminology and Best Practices</h1><p>The 2025 version of the model aligns with modern security architectures and operational practices. Key concepts include:</p><p>1. Zero Trust: assuming no implicit trust based on network location and continuously verifying user and workload identity.</p><p>2. Cloud-native security: embedding controls into infrastructure-as-code, CI/CD pipelines, and managed cloud services.</p><p>3. AI-augmented defense: leveraging analytics and machine learning to detect anomalies, prioritize alerts, and automate routine actions.</p><p>4. Continuous compliance: using automation to maintain and demonstrate adherence to regulatory and customer expectations.</p><p>5. Business resilience: integrating cybersecurity with business continuity, crisis management, and operational risk disciplines.</p><p>Incorporating these practices into the Information Security Value Model ensures that valuation and cost assumptions reflect today&#8217;s operating reality, including shared responsibility with cloud providers and the growing role of automation in both attack and defense.</p><h1>5 Implementation Roadmap for CISOs</h1><p>Adopting an economic model for information security does not need to be an all-or-nothing transformation. CISOs can proceed in phases, building credibility and insight along the way.</p><p><strong>0&#8211;30 Days: Establish the foundation</strong></p><p>1. Identify and document the top revenue streams and mission-critical outcomes.</p><p>2. Select an initial set of 5&#8211;10 critical information assets that support those outcomes.</p><p>3. Begin a simple revenue mapping exercise with business and finance partners.</p><p><strong>30&#8211;60 Days: Build the model</strong></p><p>1. Catalogue fixed and variable security costs and begin allocating them to the selected asset set.</p><p>2. Define a small number of threat scenarios for each asset and estimate frequency and impact ranges.</p><p>3. Use a lightweight risk-quantification approach to produce initial expected loss estimates.</p><p><strong>60&#8211;120 Days: Operationalize and communicate</strong></p><p>1. Refine the model using feedback from finance, risk management, and business leaders.</p><p>2. Create dashboards and visuals that present the model in executive-friendly terms.</p><p>3. Use the model to inform at least one major investment decision or reallocation of spend.</p><p><strong>Ongoing: Iterate and expand</strong></p><p>1. Regularly update assumptions based on new threat intelligence, incidents, and business changes.</p><p>2. Expand the asset set and improve cost allocation accuracy over time.</p><p>3. Track changes in expected loss and security value as part of quarterly performance reviews.</p><h1>6 Conclusion</h1><p>Cybersecurity is not a purely technical discipline. It is an economic function that protects and enables the information assets on which modern organizations depend. By treating information as a revenue-producing asset and quantifying both the costs and benefits of security, CISOs can make more informed decisions, communicate more clearly with executives, and compete more effectively with adversaries who already think in financial terms.</p><p>The Information Security Value Model presented here provides a practical framework for this shift. It enables security leaders to measure security value as a function of revenue protected and expected loss avoided, and to continuously optimize their investment portfolio in line with the organization&#8217;s strategy and risk appetite.</p><h1>7 References</h1><p>1. Ferrara, E.S., <em>Determine the Business Value of an Effective Security Program &#8212; Information Security Economics 101.</em>Forrester Research, 2012.</p><p>2. Jones, J., <em>An Executive&#8217;s Guide to Cyber Risk Economics</em>. 2011, RiskLens.</p><div><hr></div><p><sup>[1]</sup> There is debate regarding employee salaries and benefits regarding the true variability of these costs.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strat-tech.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>