logo

Muhammad Rawish Siddiqui

Muhammad Rawish Siddiqui

As an accomplished professional with a Master Degree in Computer Science (Specialization in Software Engineering) and a PGD in Management Information Systems, over 20 years of hands-on experience in Information Technology, Data Governance, Data Management, and PDPL plus NCA Compliance. Expertise spans diverse sectors, including Aviation, Healthcare, Investment, Education, and Construction, allowing me to effectively bridge the gap between technical and business needs.

Leadership roles include Manager – Data Management (DMO), Manager Systems, Sr. Team Lead – Data Specialist, Manager Applications, and Adjunct Faculty Member among others. I am also deeply involved in applied research, focusing on Big Data Governance, Privacy, Security, and Compliance. My work has been published in prestigious international journals, offering valuable insights into solving industry challenges.

Possesses extensive expertise spanning a diverse range of platforms, tools, technologies, hardware, software, and operating systems, effectively leveraging this knowledge to address complex challenges in Data governance, security, privacy and compliance.

With 45+ professional certifications, including Certified Data Management Professional (CDMP), GDPR, CCPA, Certified Data Protection Officer (CDPO), ITIL, EC-Council Disaster Recovery Professional, AWS Cloud Certified, Oracle Technologies including e-Business, Databases, and Oracle Cloud Infrastructure (OCI). I have continually enhanced my expertise in the ever-evolving field of data privacy and security. My competencies also include Disaster Recovery, Business Continuity, Regulatory Compliance (GDPR, NCA, CCPA, NDMO), Data Architecture, Metadata Management, and more.

Numerous initiatives in Data Governance, Data Management, Data Privacy, Data Protection, ensuring compliance with international, and local standards such as NCA, GDPR, KSA PDPL, and NDMO.

mdmteam.org/author/rawish/
January 28, 2022
  • By Muhammad Rawish Siddiqui
  • 0

ECM – Enterprise Content Management and Content Metadata

What Is Enterprise Content Management (ECM)? Enterprise Content Management includes the processes, techniques, and technologies for organizing, categorizing, and structuring information resources so that they can be stored, published, and …

Read more
January 27, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Management – Define Data Security Standards

Introduction to Policies and Standards Policies provide guidelines for behavior. They do not outline every possible contingency. Standards supplement policies and provide additional detail on how to meet the intention …

Read more
January 27, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Management – DAM, Data Map, e-Discovery and EDRM

Digital Asset Management System (DAM) in Information Governance Digital Asset Management (DAM) is a process similar to Document Management that focuses on the storage, tracking, and use of rich media …

Read more
January 27, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Management – Data Security Policy

Importance of Cybersecurity Policy in Data Protection Organizations should create data security policies based on business and regulatory requirements. A policy is a statement of a selected course of action …

Read more
January 26, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Management – Record Management

Understanding Record Management in the Context of Data Governance Records Management includes the full lifecycle: from record creation or receipt through processing, distribution, organization, and retrieval, to disposition. Records can …

Read more
January 25, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Management – Document Management

Document Lifecycle and Data Classification in Enterprise Content Management Data Management – Professionals are stakeholders in decisions about document classification and retention. They must support consistency between the base structured …

Read more
January 25, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Security – Types, Restrictions and Risks

Types of Data Security Three types of Data Security are: Data Security Restrictions System Security Risks

Read more
January 24, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Security – Essential Concepts

IS – Information Security has a specific Vocabulary. Knowledge of Key Terms enables Clearer Articulation of Governance Requirements. Cybersecurity Threats and Attack Surface Management in Data Security – Essential Concepts …

Read more
January 24, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Security – Goals and Principles

The Goals of Data Security Activities include Data Security in an Organization follows these Guiding Principles

Read more
January 23, 2022
  • By Muhammad Rawish Siddiqui
  • 0

Data Security – Initiation

Let’s begin Information Security by classifying an Organization’s Data in order to identify which Data requires Protection. The Overall Process includes the following steps: Identify and Classify Sensitive Data Assets …

Read more
Page 19 of 25« First«...10...1718192021...»Last »

Recent Posts

  • EU GDPR – Article 66 (Urgency Procedure)
  • EU GDPR – Article 65 (Dispute resolution by the Board)
  • EU GDPR – Article 64 (Opinion of the Board)
  • EU GDPR – Article 63 (Consistency Mechanism)
  • EU GDPR – Article 62 (Joint Operations of Supervisory Authorities)

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • March 2025
  • February 2025
  • January 2025
  • September 2024
  • August 2024
  • July 2024
  • October 2022
  • September 2022
  • August 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021

Categories

  • Artificial Intelligence
  • BDaaS – Big Data As-a-Service
  • BI and Analytics
  • Big Data
  • Big Data
  • Big Data & Artificial Intelligence
  • Big Data & Data Science
  • Biology
  • C-Store
  • CCPA – California Consumer Privacy Act
  • Chemistry
  • CMA – CMM
  • Column-Oriented Database
  • Columnar Database
  • Conceptual Data Model
  • Content Management
  • Content Modeling
  • Could Computing
  • CSS & JavaScript
  • Data Architecture
  • Data Catalog and Metadata Domain
  • Data Engineering
  • Data Ethics
  • Data Governance
  • Data Governance – Operating Model
  • Data Governance & Compliance
  • Data Lake
  • Data Management
  • Data Masking
  • Data Modeling
  • Data Models
  • Data Privacy
  • Data Profiling
  • Data Protection
  • Data Quality
  • Data Science
  • Data Security
  • Data Security
  • Data Steward
  • Data Strategy
  • Data Subject Rights
  • Data Warehousing and Business Intelligence
  • Databases
  • Definition and Concept
  • Digital Marketing
  • DII – Data Integration and InterOperability
  • DMMA – Data Management Maturity Assessment
  • Document Database
  • Document Management
  • Document Store
  • Document-Oriented Database
  • DPO – Data Protection Officer
  • English Language
  • Enterprise Architecture
  • ETL – ELT
  • GDPR – General Data Protection Regulation
  • Hadoop
  • HTML
  • Information Security
  • Information Technology & Computer Science
  • Integration Models
  • IoT – Internet of Things
  • ISO/IEC 27001
  • JSON Database
  • Key-Value Database
  • Key-Value Store
  • Knowledge Modeling
  • KPI – Key Performance Indicator
  • KPIs
  • KSA NDMO – National Data Management Office
  • KSA PDPL – Personal Data Protection Law
  • Logical Data Model
  • Machine Learning
  • Master Data
  • Mathematics
  • MDM
  • MDMTeam – Self-Paced Learning
  • Metadata
  • Metadata Management
  • NDMO DC – Classification Process
  • NDMO DG – Artifacts Control
  • NDMO DVR – Data Value Realization
  • NDMO MCM – Data Catalog and Metadata
  • NDMO P1
  • NDMO P2
  • NDMO PDP – Personal Data Protection
  • Normalization
  • NoSQL
  • NoSQL Graph Database
  • OLAP – Online Analytical Processing System
  • OLTP – Online Transactional Processing System
  • Ontology and Taxonomy
  • Operating System
  • Organization
  • Personal Data Protection
  • PHP
  • PHP and MySQL
  • Physical Data Model
  • Physics
  • PM – Project Management
  • Record Management
  • Reference Data
  • Regulation & Compliance
  • SBA – Services-Based Architecture
  • Science
  • Similar Words and Differences
  • TOGAF – Enterprise Architecture
  • TOGAF – The Open Group Architecture Framework
  • Uncategorized
  • Upgrade
  • Web Development
  • WordPress

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • March 2025
  • February 2025
  • January 2025
  • September 2024
  • August 2024
  • July 2024
  • October 2022
  • September 2022
  • August 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021

Recent Comments

  • Hafsa on Nucleus
  • Hafsa on EMULSION
  • Labeeq Siddiqui on How to Measure the Value of Data – NDMO (DVR-01)

Recent Posts

  • EU GDPR – Article 66 (Urgency Procedure)
  • EU GDPR – Article 65 (Dispute resolution by the Board)
  • EU GDPR – Article 64 (Opinion of the Board)
  • EU GDPR – Article 63 (Consistency Mechanism)
  • EU GDPR – Article 62 (Joint Operations of Supervisory Authorities)

Copyright © 2026 MDM Team All Rights Reserved. Disclaimer