IT Change Management Process Training
|
|
|
- Wesley Stewart
- 10 years ago
- Views:
Transcription
1 IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge of handling IT Changes. As such, this course aims to deliver informa9on that is easily understood and relevant to everyone. We invite your specific ques9ons or comments and encourage you to follow up directly with your manager.
2 Course Objec9ves This course explains the following: Value of Change Management to the Enterprise Key Defini9ons for Change Management Roles and Responsibili9es The Five Phases of the Change Management Process
3 Addi9onal Informa9on & Resources Throughout this course you will have access to the Change Management Process document. This document provides the detailed defini9ons, roles and responsibili9es, and process ac9vi9es that are performed during the Change Management Process. You can access this informa9on any 9me during the course by clicking the icon at the top right- hand of the course. Go ahead and try it now! Click here to Bookmark the Change Management Process in your browser.
4 A Case Study and the Value of Change Management to the Enterprise A request was made to upgrade an applica9on that supported the Opera9ng Rooms (ORs) of a major hospital. This Request for Change (RFC) required a hardware configura9on change in the ORs. The change was implemented and shortly awerwards, the Service Desk started receiving calls that Physicians were unable to access the applica9on. As a result, pending surgeries were delayed and surgeries in progress were compromised. Pa9ent safety was at risk! A post implementa9on review was conducted and it was determined that an RFC was submixed into the Change Management System that included all the required steps and tes9ng by the assignee; however, during implementa9on, the assignee neglected to follow the change plan which documented detailed steps on configuring hardware for older model computers in the ORs. This meant the change was implemented without following the en9re Change Management Process. Failure to follow the change plan caused risk to pa9ent care. The Change Management Process provides value to the Enterprise by enabling Changes to be made with minimum disrup9on to IT Services by ensuring change procedures are completed, reviewed and approved prior to implementa9on. Failure to Plan equals Plan for Failure
5 Key Defini9ons A Change is any modifica9on to the systems, infrastructure, or applica9ons that comprise the UCSF IT produc9on environment. RFC is an acronym for Request for change A request to implement a Change within the UCSF IT produc9on environment CMS is an acronym for Change Management System SoWware tool u9lized for the request, approval, tracking and details of changes. We use ServiceNow. CI is an acronym for Configura9on Item A component that needs to be managed under the Change Process in order to deliver an IT Service. CAB is an acronym for Change Advisory Board Meets regularly to help the change manager assess, priori9ze and schedule changes. PIR is an acronym for Post Implementa>on Review - A review that is conducted when an RFC implementa9on has not been successful. Change Management is an IT Service Management Process that aims to control the lifecycle of all changes. The primary objec9ve of the Change Management Process is to enable Changes to be made with minimum disrup9on to IT Services.
6 Change Management Policy To ensure the integrity, consistency and availability of UCSF IT Services, all changes to the UCSF IT produc9on environment will be tracked via a Request for Change (RFC). RFCs will be entered into and managed via ServiceNow to ensure Changes are centrally tracked, approved, reported upon, and enforced in a reliable and consistent manner. RFCs must be reviewed and approved by the Change Advisory Board (CAB) prior to execu9on to ensure a proposed Change does not compromise the stability of the produc9on environment. Zero tolerance for unauthorized changes!
7 Roles & Responsibili9es Within the Change Management process, specific roles and func9ons have been defined. Each role is responsible for comple9ng specific tasks within the process, however, all roles contribute to the success of the process. The Roles include: Change Assignee Peer Reviewer Group Manager Approver IT Director Approver Change Manager Change Advisory Board (CAB)
8 Change Assignee The Change Assignee is the individual making the changes in the environment. Responsibili9es of the Change Assignee include : Ensuring that a detailed and accurate change request has been submixed. Obtain technical Peer Review and other required approvals prior to the implementa9on 9me. Represent the change to the CAB Implement the change as planned, including valida9on, and closure of the change before the scheduled end date/9me. Par9cipate in Post Implementa9on Reviews (PIR).
9 Peer Reviewer The Peer Reviewer is the technical peer with similar knowledge of the environment where the Change will take place. Responsibili9es of the Peer Reviewer include : Review the RFC and ensure that the specific technical steps planned appear to be correct. Update the RFC, indica9ng that they have reviewed the technical steps of the Change. Represent the RFC during CAB, if the Assignee is unavailable. Back up the assignee during the actual implementa9on.
10 Group Manager Approver The Group Manager Approver is the manager who provides the first level of approval to a RFC, allowing it to go before the CAB for review. In most cases, this is the manager of the Change Assignee. If that is not possible, the Change Approver can be any IT manager or above. Responsibili9es of the Group Manager Approver include: Review all RFC submixed by staff members of their group Ensure all necessary communica9on, coordina9on, documenta9on and tes9ng has been completed properly on all RFC prior to approval Approve all RFC prior to them being submixed for review by the Change Advisory Board Represent the change during CAB if the Assignee and Peer Reviewer are unavailable. Par9cipate in Post Implementa9on Reviews (PIR).
11 IT Director Approver The IT Director Approver is the director who provides the second level of approval to a RFC that are high risk or requires to be expedited, allowing it to go before the CAB for review. In most cases, this is the director of the Change Assignee. If that is not possible, the IT Director Approver can be any IT director or above. Responsibili9es of the IT Director Approver include: Review all high risk or expedited RFCs submixed by staff members of their group Ensure all necessary communica9on, coordina9on, documenta9on and tes9ng has been completed properly on all high risk or expedited RFCs prior to approval Represent the change during CAB if the Assignee, Peer Reviewer, and Group Manager are unavailable. Approve all high risk or expedited RFCs prior to them being submixed for review by the Change Advisory Board
12 Change Manager The Change Manager is responsible for the overall facilita9on of the Change Management process. Responsibili9es of the Change Manager include: Coordinate and chair the regularly scheduled mee9ngs of the Change Advisory Board. Facilitate the resolu9on of any schedule conflicts that may arise. Maintain the policies and procedures necessary to carry necessary CM func9ons.
13 Change Advisory Board (CAB) The Change Advisory Board (CAB) is a group of individuals that represent various IT units and Client communi9es. This group is responsible for final review and approval/rejec9on of all comprehensive RFCs. The CAB meets at a regularly scheduled interval to review all pending RFCs. All Changes are reviewed by the CAB during its scheduled mee9ng. The CAB has the authority to do any of the following: Cancel or reject changes Approve RFC as presented Re- assess the risk level of a Change Re- assess the impact level of a Change Request addi9onal informa9on prior to approval
14 Change Types One of the key descriptors of a Change is its type. The Change type dictates which of the process steps must be completed. There are five Change types: rouene, emergency, comprehensive, expedited comprehensive, and latent. The process steps that are executed during a Change are adjusted based on type. The Change types are defined as follows: A RouEne change is a pre- approved change that is low in risk, rela9vely common, and follows a pre- defined procedure or work instruc9on. Rou9ne changes require ini9al review and approval by the CAB, but once approved, no longer require individual CAB approval. An Emergency change is one that must be done immediately. It is of such a high priority that it is auto- approved and scheduling is not required. The Emergency Change must be related to an ac9ve high or cri9cal priority incident. A Comprehensive change requires that all Change process steps be completed and reviewed for approval by the Change Advisory Board (CAB) prior to implementa9on. An Expedited Comprehensive change also requires that all Change process steps be completed, however, the change must be implemented in a 9me frame that does not allow them to go through the normal CAB approval cycle. Review and approval is done electronically. A Latent change that is logged awer implementa9on and did not follow the Change Management process. A PIR is required for latent changes and must be reviewed at CAB. A Latent change is also known as an unauthorized change!
15
16 Phase 1: Create RouEne Change 1. Select an approved rou9ne template to create a rou9ne RFC. Rou9ne templates require an ini9al CAB approval in order for the RFC to become Rou9ne 2. Select the responsible assignee to manage the Change The Change Assignee can schedule the change and go straight to the implementa9on phase, however, they need to ensure there are no conflicts with other RFCs scheduled before implemen9ng their rou9ne Change
17 Phase 1: Create Emergency Change 1. Create an RFC in ServiceNow and select responsible assignment group and assignee to manage the Change 2. Relate the Change to an ac9ve High or Cri9cal Incident. 3. Define the Change, Valida9on and Back- out plans: The Change Plan should include enough detail to explain what will be done. Valida9on plans should include steps to verify that the change fulfilled the technical and business objec9ves. It should also include steps to verify that exis9ng func9onality was not uninten9onally affected. Back- out plans should include the trigger that will be used by the assignee to transi9on from the implementa9on to the back- out procedure. 4. Document the impact to the business and assess the risk level. 5. Iden9fy Configura9on items (CIs) that will be added, removed, or modified by the change. 6. Define the change window, including implementa9on 9me, valida9on 9me and poten9al back- out 9me.
18 Phase 1: Create Comprehensive Change 1. Create an RFC in ServiceNow and select responsible assignment group and assignee to manage the Change 2. Define the Change, Valida9on and Back- out plans: The Change Plan should include enough detail to explain what will be done. Valida9on plans should include steps to verify that the change fulfilled the technical and business objec9ves. It should also include steps to verify that exis9ng func9onality was not uninten9onally affected. Back- out plans should include the trigger that will be used by the assignee to transi9on from the implementa9on to the back- out procedure. 3. Document the impact to the business and assess the risk level. 4. Iden9fy Configura9on items (CIs) that will be added, removed, or modified by the change. 5. Iden9fy the Peer Reviewer, Group Manager Approver and if required IT Director Approver. 6. Define the change window, including implementa9on 9me, valida9on 9me and poten9al back- out 9me. ServiceNow will automa9cally determine if the Change Type is Comprehensive or Expedited Comprehensive.
19 Phase 2: Conduct Reviews & Obtain Approval 1. Once an RFC has been completed and is ready to be submixed for approval, the Change Assignee must request a review of the RFC from a technical peer with similar knowledge of the Change. Peer Reviews are not required for Change Types: Rou9ne or Emergency 2. The technical peer reviews the RFC to ensure the technical steps planned appear to be correct. Once this is verified, the peer reviewer will update the RFC, indica9ng that they have reviewed the technical steps of the Change Keep in mind that the peer reviewer shares responsibility for the change!
20 Phase 2: Conduct Reviews & Obtain Approval 3. Once the RFC has been fully completed, submit the RFC for approval. The Change type dictates which approval steps must be completed. Change Type: Change Review and Approval: Rou9ne Pre- approved Emergency Auto- approved Comprehensive Peer Reviewer Group Manager Approval IT Director Approval (high risk only) CAB Expedited Comprehensive Peer Reviewer Group Manager Approval IT Director Approval* Expedited CAB (Campus only) * For Campus, IT Director Approval is only required for high risk Changes. * For Med Center, in addi9on to high risk changes, all expedited comprehensive Changes also require IT Director Approval.
21 Phase 2: Conduct Reviews & Obtain Approval 4. The Group Manager reviews the RFC for Approve or Reject the request. Approval will advance the RFC to the next level of approval. The Group Manager reviews the RFC for accuracy and to ensure the appropriate ac9ons have taken place, including but not limited to peer review of the proposed solu9on, plan for no9fica9on of the user community if required, and coordina9on of change with appropriate teams. 5. For high risk Changes, the IT Director reviews the RFC and Approve or Reject the request. Approval will advance the RFC to the next level of approval. IT Director approval is required for all Medical Center Expedited Comprehensive Changes and will advance to scheduled once approved. 6. The Change Advisory Board (CAB) will meet regularly for the purpose of reviewing all pending RFC. The CAB will either approve or reject the RFC during the course of the mee9ng. This is the final level of approval. All Change Assignee who have a RFC pending must axend the CAB mee9ng or send a representa9ve from their department who can properly represent and discuss the Change. Failure to do so may result in the automa9c Rejec9on of the RFC.
22 Phase 3: Schedule Change 1. Once the final approval is received, the Change Manager will change the status to scheduled. 2. If an update to the CI is required, a task will be created and must be completed before the change can be closed. 3. The Change Assignee no9fies the Service Desk and provide sufficient details to enable them to respond to calls from users who may be impacted by the change. 4. The Change Assignee or IT Service Desk sends required no9fica9ons to the user community.
23 Phase 4: Implement Change 1. Before ini9a9ng the actual change ac9vity, the Change assignee should change the status from Scheduled to WIP. The change cannot go to WIP before the scheduled start date/9me. 2. AWer changing the status to WIP, the assignee should enter the actual start date/9me. 3. The Change Assignee executes the Change Change Assignee should document ac9vi9es in the Work Log. Examples of the kind of informa9on that would be appropriate are: Reaching key milestones in the implementa9on Unexpected issues with the implementa9on The start/stop of valida9on as well as any unexpected results The reasons for backing out a change or closing the record as incomplete 4. The CI Support Group updates the CI if required and closes their task.
24 Phase 5: Conduct Post ImplementaEon Review & Close Change 1. Once the Change is completed, the Change Assignee no9fies the Service Desk and advise them of the success or failure as well as the current state of the impacted environment. 2. The Change Assignee should complete the RFC within 24 hours of the Change execu9on by selec9ng a Results Code for the Change. The result codes are: Successful: Implemented within the approved change window and all of the approved components for the change were implemented (no more, no less) Backed out: Started, but caused issues that required a reversal of the implementa9on Completed with issues: Implemented with issues that did not require a back out. Changes that are also completed outside the approved change window is considered completed with issues Incomplete: Par9ally implemented; not all of the components approved for the Change were implemented
25 Phase 5: Conduct Post ImplementaEon Review & Close Change 3. Any result code that is not Successful is considered an excep9on and will require the Group Manager Approver to conduct a Post Implementa9on Review (PIR) of the excep9on. The PIR should document: A descrip9on summarizing why the change was not successful A descrip9on of the business impact A descrip9on of effort that will be put in place to prevent a similar excep9on
Case Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
PROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
Exchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
So#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
A Publication of FastSpring. FastSpring. Advertiser. QuickStart Guide. Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program
A Publication of FastSpring FastSpring Advertiser QuickStart Guide Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program Welcome to the FastSpring Affiliate Program (powered by Impact
Legacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
Process Owner: Change Manager Version: 1.0
BMC REMEDY 8.1 CHANGE MANAGEMENT USER GUIDE Process Owner: Change Manager Version: 1.0 DOCUMENT REVISION HISTORY Revision Description Date Approved by Number V1.0 Initial Release 6/25/2015 6/25/2015 Page
DTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
Bank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
Introduction... 4. Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4. RFC Procedures... 5
Remedy Change Management Version 3.0 Modified: 10/27/2015 Table of Contents Introduction... 4 Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4 RFC Procedures... 5 Process Flow
An Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
How To Manage Change Management At Uni
Change Management Process VERSION 1.0 Version Date: 1 May 2006 Table of Revisions REVISION NUMBER DESCRIPTION OF CHANGES (PARAGRAPH AND OR SECTION NUMBERS FOR REVISION TRACKING) DATE OF CHANGE REVIEWED
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records
electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of
Fixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
Syndromic Surveillance BioSense Onboarding in Arizona
Syndromic Surveillance BioSense Onboarding in Arizona Sara Imholte, Stanley Kotey, Manoj Shaw & Krystal Collier Electronic Disease Surveillance Program April 1, 2015 Introduc*ons Background Onboarding
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon Executive Summary: This document is seven pages. Page one is informational/background only. What follows over the next six pages are
ICD- 10: Learning for a Successful Transi:on Part 2. Objec.ves for the Webinars. ICD- 10 Webinar Topics
ICD- 10: Learning for a Successful Transi:on Helene Fearon, PT, FAPTA Rhea Cohn, PT, DPT August 21, 2015 Practice Management Expertise for the Rehabilitation Professional DOCUMENTATION / CODING / BILLING
Phone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, [email protected] Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework. FASP Annual Conference October 29, 2015
The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework FASP Annual Conference October 29, 2015 Dr. Jayna Jenkins, Florida PS/RtI Project EARLY WARNING SYSTEMS AND THE
ENTERPRISE CHANGE MANAGEMENT PROCESS
University of California San Francisco ENTERPRISE CHANGE MANAGEMENT PROCESS VERSION 2.00, REV. 6/20/2013 Table of Contents 1 About this Process Document... 6 1.1 Intended Audience... 6 1.2 Assumptions...
Research in Simulation: Research and Grant Writing 101
Research in Simulation: Research and Grant Writing 101 Amar Patel, MS, NREMT-P, CFC Director, Center for Innovative Learning WakeMed Health & Hospitals Geoff Miller Director Eastern Virginia Medical School
Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010
Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,
Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
HUIT Change Management with ServiceNow. [email protected] September 2013
HUIT Change Management with ServiceNow [email protected] September 2013 Module 1: Basic Training - Change Requester/Implementer Change Management with ServiceNow Agenda Session Overview HUIT Change Management
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.
Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis
CS 5150 So(ware Engineering System Architecture: Introduc<on
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc
White Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management
White Paper August 2006 BMC Best Practice Process Flows for ITIL Change Management Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
HP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide
HP Service Manager Process Designer Content Pack 9.30.1 Processes and Best Practices Guide Document Release Date: June, 2012 Software Release Date: June, 2012 1 Legal Notices Warranty The only warranties
Project Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
Service Portfolio and Service Catalog Management. Foundation for making IT services transparent and linking IT outcomes to business outcomes
Service Portfolio and Service Catalog Management Foundation for making IT services transparent and linking IT outcomes to business outcomes Service What is a service? (Try now) A means to deliver value
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
FINANCIAL SERVICES CASE STUDY COLLECTION. Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP
FINANCIAL SERVICES CASE STUDY COLLECTION Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP The Workbooks product offered greater functionality... We also felt that we would receive
DDC Sequencing and Redundancy
DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system
Business Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers
The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons
Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014 A growing demand Business Teams want Open access to more informa4on More
Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
Capitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 [email protected] www.cdproject.net
inforouter Workflows How the create a workflow defini6on in inforouter - Version 8.0.x
inforouter Workflows How the create a workflow defini6on in inforouter - Version 8.0.x Ac6ve Innova6ons, Inc. A Document Management Company Copyright 1998-2015 www.inforouter.com Crea6ng Workflows in inforouter
Overview of Informa.on Technology Procurement. www.its.ms.gov
Overview of Informa.on Technology Procurement www.its.ms.gov ITS Law: Responsibili7es and Authority www.sos.ms.gov: Educa7on & Publica7ons: MS Code of 1972 (Unannotated: via LexisNexis) ITS Statute: Title
The importance of supply chain
Guidelines for Improving Supply Chain Management at Bulgarian Enterprises Chief Assist. Prof. Miroslava Rakovska, Ph.D. Department of Business Logistics, UNWE tеl. (02) 9435248, 0888704178 e-mail: [email protected]
Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.
Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
REDCap Longitudinal Studies & Surveys
REDCap Longitudinal Studies & Surveys ITHS Biomedical Informa2cs Core [email protected] Bas de Veer MS Research Consultant REDCap version: 6.0.1 Last updated October 22, 2014 1 Goals & Agenda Goals
About the Board. Minnesota Board of Behavioral Health and Therapy 10/24/12. Minnesota Board of Behavioral Health and Therapy
Minnesota Board of Behavioral Health and Therapy Kari Rechtzigel, Executive Director Samantha Strehlo, LADC Licensing Coordinator Judi Gordon, LADC, RN, Board Chair Minnesota Board of Behavioral Health
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
The purpose of this document is to define the Change Management policies for use across UIT.
UNIVERSITY OF UTAH - IT OPERATIONS POLICY UIT CHANGE MANAGEMENT POLICY Chapter or Section: Information Technology ID SOP-CNFM.001 UIT Configuration Management Policy Rev Date Author Change 4.4 9/29/11
Present Levels of Academic Achievement and Functional Performance (PLAAFP) Training
Present Levels of Academic Achievement and Functional Performance (PLAAFP) Training Dillard Research Associates and Alaska Educa4on & Early Development January 22, 2015 1 Objectives of Training To understand
Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS
Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
NFPA 70E: What Contractors and Employers Need to Know
2014 NFPA Conference & Expo NFPA 70E: What Contractors and Employers Need to Know Presented by: Michael J. Johnston Execu
2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
Disrup've Innova'ons Track
Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships
Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners
Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners INTEGRATION: Merging internal and external excellence into
Change Submitter: The person or business requesting or filing the Request For Change (RFC) notice.
ROLES, RESPONSIBILITIES, PROCEDUREs Change Submitter: The person or business requesting or filing the Request For Change (RFC) notice. IT Operations Change Manager: The steward of the Change Management
Introduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook
How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply
HP Change Configuration and Release Management (CCRM) Solution
HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document
