b'Viewpointsand program executives to work together to understandIdentity proofing that incorporates biometrics and behavior. and make best use of their data for policy making, missionCompanies and government entities are increasingly turning execution, and program performance/management. Into algorithms and artificial intelligence/machine learning parallel to establishing a data and access baseline, agenciesto curate digital footprint data from multiple sourcesi.e., can take best advantage of technologies and toolsets tomultifactor authentication (MFA) to result in a confidence improve operational cybersecurity.factor score of an individuals identity. These tools gather multiple data points based on biometrics and behavior. Effective Implementation For example, online behavior follows patterns based on an Some examples of technical approaches and tools availableindividuals professional activities. If that behavior changes, to agencies to enable implementation include: that identity may have been compromised. Data discovery and classification tools and technologyConclusion that assist with establishing data provenance and trackingFederal agencies can start with the basics of understanding data flows. Dynamic, automated data discovery andtheir data portfolio and integrating that data with appropriate tracking highlights the behavior and flow of data and allowsaccess. It is the most cost-effective way to gain traction. agencies to understand how the data is accessed and usedThis is not glamorous work, but it is key to success. At the by agency personnel and customers/citizens. Data trackingsame time, an overarching governance approach needs to uncovers areas of vulnerability that should be addressedbe established to integrate and guide all agency activities for to enhance data loss prevention programs, and preventlong-term success.inappropriate access and improper data exposure. The study of data use patterns also gives agencies visibility into how the data is morphed and changed through use in mission processes and identifies areas where multiple data stores of the same data can be reduced. 2022 IBM Center for The Business of Government 73'