TECHNOLOGY TRANSFER PRESENTS MIKE ROSEN MAY 18-19, 2015 MAY 20-21, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Size: px
Start display at page:

Download "TECHNOLOGY TRANSFER PRESENTS MIKE ROSEN MAY 18-19, 2015 MAY 20-21, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)"

Transcription

1 TECHNOLOGY TRANSFER PRESENTS MIKE ROSEN Business Architecture Preparation for the Certification exam Enterprise Security Architecture MAY 18-19, 2015 MAY 20-21, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it

2 Business Architecture: Preparation for the Certification exam ABOUT THIS SEMINAR Business Architecture has become mainstream and is the fastest growing area of Enterprise Architecture. The Business Architecture Body of Knowledge (BIZBOK) is now at V4.1, and continues to expand on industry best practices. Starting in 2015, an international certification will be available for individual practitioners to become Certified Business Architect based on the BIZBOK and related business material. Whether you are interested in certification or not, this course will provide an overview of Business Architecture and help participants develop their skills and techniques. For those looking toward certification, it will help you prepare to take the certification exam. The seminar is structured as a combination of presentation, interactive discussion and group based exercises, so participants get the chance to apply the concepts learned during the facilitated exercises. Seminar ObjectiveS Delegates will gain an understanding of the skills required to become a Certified Business Architect, including: What is Business Architecture? What is the BIZBOK? What are the foundational techniques? How do you apply Business Architecture to specific business scenarios? How is Business Architecture related to other business domains? How do you use Business Architecture to help define and execute strategy? How do you use Business Architecture to align with IT systems? What is a Certified Business Architect? How do you prepare for the certification exam? WhO ShOuld attend Architects looking to become a Certified Business Architect. Existing architects who want to sharpen their skills, new architects who want to learn Best Practices, and anyone who aspires to become a business architect.

3 OUTLINE DAy 1 DAy 2 Foundation and core Skills Business Architecture Foundational Concepts - Introduction - Core principles - Goals and Objectives Business Architecture Core Mapping Knowledge - Capability Mapping - Value Mapping - Information Mapping - Organizational Mapping - Cross Mappings Business Architecture Extended Mapping Knowledge - Stakeholder Mapping - Strategy Mapping - Initiative Mapping - Product Mapping - Extended Cross Mappings extended Skills Business Architecture Alignment with Related Business Disciplines - Portfolio Management - BPM - Requirements Definition - Lean Six Sigma - Case Management Business Architecture and Business Performance Analysis - Measures and Metrics - Heat Mapping Business Architect Role - Competency Model Business Architecture Governance - Maturity Model Business Architecture and IT Architecture Alignment - Architecture Framework Alignment - SOA - IT Transformations Business Architecture Situation and Scenario Usage - Common Scenarios - Understanding and Identifying Scenarios - Using Scenarios to Guide Business Architecture Activities Business Architecture Infrastructure Management - Knowledge Base - Tools

4 Enterprise Security Architecture ABOUT THIS SEMINAR Security is becoming the most important issue for enterprises and CIOs. The new threats are everywhere. It s not high school kids hacking for fun anymore. Cybercrime is sponsored by governments, corporations, and organized crime that have the resources to hire top talent, and the patience to pick away, for months at a time, until an attack has been successful. Previous security models that constructed a fortress around the enterprise are no longer effective. In addition to the increasingly sophisticated attackers, the proliferation of devices adds millions of new vulnerability points. And even if your enterprise is secure, your partners and global outsourcers might not be, providing a vector into your enterprise. Liabilities from security breaches damage brands and dwarf other losses. Security is no longer just the concern of a few specialized personnel. It will be elevated to a top priority of CEOs and senior leaderships, either proactively, or reactively in response to yet another expensive incident. Executives have and will lose their job as a consequence of breaches. However, the CIO and IT is also best positioned to address Security and raise awareness to the business. This seminar will provide a practical, comprehensive, and architectural approach to helping CIOs and security personnel address evolving security threats and environment. The seminar is structured as a combination of presentation, interactive discussion and group based exercises, so participants get the chance to apply the concepts learned to example scenarios during the facilitated exercises. Seminar ObjectiveS Delegates will gain an understanding of the issues and requirements for creating an enterprise security architecture, including answers to the following: What are the main issues to consider when planning to address security? What are the new 3rd platform threats and vulnerabilities? What are new approaches to understand and identifying them? How do we make sure that our policies, processes, information assurance, application level security, technology, and analysis solutions work together? How do we transition from a fortress mentality to deperimeterization? What is an Enterprise Security Architecture and how do we create one? WhO ShOuld attend Architects Mangers CIOs CISOs and who want to know the important concepts, understand the new threats, and identify how to address them in today s security environment.

5 OUTLINE DAy 1 DAy 2 Security Fundamentals and threats Introduction Four questions that keeps the CISO awake at night Case studies Enter the 3rd Platform - What is the 3rd Platform - New threats and vulnerabilities - Cloud - Mobile - Social Understanding and identifying new threats Event correlation Integrating information to analyze and correlate? - New sources of threat data designing a Security architecture Key elements of an overall security strategy Effective defense-in-depth? Goodbye Fortress, Hello Deparimeterization Principles for security policies Information integrity Application security containers Prioritizing tactics for maximum impact Holistic Enterprise Security Architecture - Business Architecture considerations - Information Architecture considerations - Application Architecture considerations - Technology Architecture considerations - Service Architecture considerations Mitigating risk from partners and suppliers Conclusion

6 INFORMATION PARTICIPATION FEE business architecture 1200 enterprise Security architecture 1200 Special price for the delegates who attend both seminars: 2300 The fee includes all seminar documentation, luncheon and coffee breaks. VENUE Roma, Residenza di Ripetta Via di Ripetta, 231 Rome (Italy) SEMINAR TIMETABLE 9.30 am pm 2.00 pm pm HOW TO REGISTER you must send the registration form with the receipt of the payment to: TECHNOLOGy TRANSFER S.r.l. Piazza Cavour, Rome (Italy) Fax within may 4, 2015 PAYMENT Wire transfer to: Technology Transfer S.r.l. Banca: Cariparma Agenzia 1 di Roma IBAN Code: IT 03 W BIC/SWIFT: CRPPIT2P546 GENERAL CONDITIONS DISCOUNT The participants who will register 30 days before the seminar are entitled to a 5% discount. If a company registers 5 participants to the same seminar, it will pay only for 4. Those who benefit of this discount are not entitled to other discounts for the same seminar. CANCELLATION POLICY A full refund is given for any cancellation received more than 15 days before the seminar starts. Cancellations less than 15 days prior the event are liable for 50% of the fee. Cancellations less than one week prior to the event date will be liable for the full fee. CANCELLATION LIABILITY In the case of cancellation of an event for any reason, Technology Transfer s liability is limited to the return of the registration fee only. MIKE FERGUSON business architecture Rome May 18-19, 2015 Residenza di Ripetta - Via di Ripetta, 231 Registration fee: 1200 first name... surname... job title... Stamp and signature enterprise Security architecture Rome May 20-21, 2015 Residenza di Ripetta - Via di Ripetta, 231 Registration fee: 1200 organisation... address... postcode... both SeminarS Special price for the delegates who attend both seminars: 2300 city... country... If anyone registered is unable to attend, or in case of cancellation of the seminar, the general conditions mentioned before are applicable. telephone... fax Send your registration form with the receipt of the payment to: Technology Transfer S.r.l. Piazza Cavour, Rome (Italy) Tel Fax info@technologytransfer.it

7 SPEAKER mike rosen is Chief Scientist at Wilton Consulting Group, which provides expert consulting in Business Architecture, Enterprise Architecture, Service-Oriented Architecture, and Enterprise Solutions. Mr. Rosen is also a founding member and Vice President of the Business Architects Guild,an analyst and Research Advisor for IDC, and Editorial Director for SOA Institute. His current emphasis is on the use of business architecture to improve execution of strategy and on the architecture and implementation of agile, flexible business solutions. He has years of experience in the architecture and design of applications for global corporations and 20+ years of product development experience. Mr. Rosen is an internationally recognized speaker and author of several books including applied SOa: architecture and design Strategies.

TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it MODERN DATA

More information

TECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED ANALYTICS WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it ADVANCED

More information

TECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG. Strategic Management of the IT Organization

TECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG. Strategic Management of the IT Organization TECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG Strategic Management of the IT Organization DEVELOPING A BALANCED SCORECARD TO MEASURE IT PERFORMANCE AND TO ALIGN IT AND BUSINESS ROME NOVEMBER 11-13, 2015

More information

TECHNOLOGY TRANSFER PRESENTS MARK BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS

TECHNOLOGY TRANSFER PRESENTS MARK BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS TECHNOLOGY TRANSFER PRESENTS MARK MADSEN SOCIAL MEDIA, WEB ANALYTICS AND BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS ROME MAY 12-13, 2011 VISCONTI PALACE HOTEL

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS DECEMBER 10-11, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY LA TECHNOLOGY TRANSFER PRESENTS PRESENTA MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY DECEMBER 14-15, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

TECHNOLOGY TRANSFER PRESENTS MAX. From EAI to SOA ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION

TECHNOLOGY TRANSFER PRESENTS MAX. From EAI to SOA ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER From EAI to SOA to Cloud Integration ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION DECEMBER 12-14, 2011 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES APRIL 2-4, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it

More information

STEPHEN FEW SHOW ME THE NUMBERS

STEPHEN FEW SHOW ME THE NUMBERS TECHNOLOGY TRANSFER PRESENTS STEPHEN FEW SHOW ME THE NUMBERS Designing Tables and Graphs to Enlighten MAY 6, 2009 DATA VISUALIZATION FOR DISCOVERY AND ANALYSIS Simple Graphing Techniques for Analyzing

More information

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM ANALYTICS JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT APRIL 27-29, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY MAY 11-13, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

DANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

DANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) LA TECHNOLOGY TRANSFER PRESENTS PRESENTA DANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it

More information

TECHNOLOGY TRANSFER PRESENTS OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS RICK VAN DER LANS Data Virtualization for Agile Business Intelligence Systems New Database Technology for Data Warehousing OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA

More information

TECHNOLOGY TRANSFER PRESENTS SHAKU. Is it the new face of APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS SHAKU. Is it the new face of APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS SHAKU ATRE DASHBOARD Is it the new face of Business Intelligence? APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK BREAKING AND FIXING WEB APPLICATIONS SECURITY PENETRATION TESTING IOS APPS JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)

More information

TECHNOLOGY TRANSFER PRESENTS VLADIMIR NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS VLADIMIR NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS VLADIMIR BACVANSKI MODERN INFORMATION ARCHITECTURE DEVELOPING WITH SCALA NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

MICHAEL SCHMITZ NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

MICHAEL SCHMITZ NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MICHAEL SCHMITZ DATA WAREHOUSING Advanced Design and Implementation Issues ETL FOR THE DATA WAREHOUSE A Template-Driven Approach NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA

More information

TECHNOLOGY TRANSFER PRESENTS MIKE MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS MIKE MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON ENTERPRISE BUSINESS INTEGRATION USING BUSINESS INTELLIGENCE, BAM AND EVENT PROCESSING FOR BUSINESS OPTIMIZATION MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA

More information

MAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)

MAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) Architectures, Technologies and Best Practices OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

The Logical Data Warehouse

The Logical Data Warehouse TECHNOLOGY TRANSFER PRESENTS RICK VAN DER LANS The Logical Data Warehouse Design, Architecture, and Technology Incorporating Big Data, Hadoop and NoSQL in Data Warehouse and Business Intelligence Systems

More information

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

Data Management, Analytics and Business Intelligence

Data Management, Analytics and Business Intelligence TECHNOLOGY TRANSFER PRESENTS Rome, June 25-26 2015 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL SUMMIT 2 0 1 5 Data Management, Analytics and Business Intelligence A B O U T T H E S U M M I T

More information

MIKE FERGUSON OCTOBER 1-2, 2007 OCTOBER 3-4, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

MIKE FERGUSON OCTOBER 1-2, 2007 OCTOBER 3-4, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BUSINESS INTELLIGENCE AND PERFORMANCE MANAGEMENT: BI 2.0 in the Real-Time Intelligent Enterprise ENTERPRISE DATA INTEGRATION AND MASTER DATA MANAGEMENT OCTOBER

More information

T E C H N O L O G Y T R A N S F E R P R E S E N T S

T E C H N O L O G Y T R A N S F E R P R E S E N T S T E C H N O L O G Y T R A N S F E R P R E S E N T S Rome, December 4-5 2014 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL S U M M I T 2 0 1 4 BIG DATA ANALYTICS A B o U T T H E S U M M I T In

More information

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON JUNE 3-4, 2015 JUNE 5, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON JUNE 3-4, 2015 JUNE 5, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON Big Data and Analytics From Strategy to Implementation Data Virtualization in Practice JUNE 3-4, 2015 JUNE 5, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231

More information

MIKE FERGUSON ENTERPRISE SERVICE ORIENTED APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

MIKE FERGUSON ENTERPRISE SERVICE ORIENTED APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON ENTERPRISE SERVICE ORIENTED ARCHITECTURE AND INTEGRATION ENTERPRISE DATA INTEGRATION AND MASTER DATA MANAGEMENT APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA

More information

TECHNOLOGY TRANSFER PRESENTS INTERNATIONAL. Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE BIG DATA

TECHNOLOGY TRANSFER PRESENTS INTERNATIONAL. Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE BIG DATA TECHNOLOGY TRANSFER PRESENTS Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL CONFERENCE 2 0 1 5 BIG DATA A B O U T T H E S U M M I T The last twelve months can only be described

More information

TECHNOLOGY TRANSFER PRESENTS CRAIG AGILE SOFTWARE DEVELOPMENT. Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013

TECHNOLOGY TRANSFER PRESENTS CRAIG AGILE SOFTWARE DEVELOPMENT. Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013 TECHNOLOGY TRANSFER PRESENTS CRAIG LARMAN AGILE SOFTWARE DEVELOPMENT Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013 AGILE, LEAN & ITERATIVE DEVELOPMENT Management Overview MAY 13,

More information

Enterprise Web & Cloud Computing

Enterprise Web & Cloud Computing T E C H N O L O G Y T R A N S F E R P R E S E N T S Rome, December 1-3, 2010 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE E U R O P E 2 0 1 0 Enterprise Web & Cloud Computing A B O U T T H E C O

More information

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop TECHNOLOGY TRANSFER PRESENTS KEVIN CARDWELL Q/SA (Qualified Security Analyst) Penetration Tester & Optional Q/PTL (Qualified Penetration Licence) Workshop MAY 18-22, 2009 VISCONTI PALACE HOTEL - VIA FEDERICO

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com

Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com Knowledge Partner Presents 27th May 2015 - Bengaluru 5th June 2015 - New Delhi 24th June 2015 - Mumbai Vendor Risk Management For sponsorship or to become our partner, contact: marketing@achromicpoint.com

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

www.pwc.com Developing a robust cyber security governance framework 16 April 2015 www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Application Overhaul. Key Initiative Overview

Application Overhaul. Key Initiative Overview Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON JUNE 6-7, 2016 JUNE 8-9, 2016 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON JUNE 6-7, 2016 JUNE 8-9, 2016 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON Big Data and Analytics From Strategy to Implementation Enterprise Data Governance & Master Data Management JUNE 6-7, 2016 JUNE 8-9, 2016 RESIDENZA DI RIPETTA

More information

Cyber security: Are consumer companies up to the challenge?

Cyber security: Are consumer companies up to the challenge? Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies

More information

Implementing Practical Information Security Programs

Implementing Practical Information Security Programs Implementing Practical Information Security Programs CISO Summit March 17-19, 2013 Presented by: David Cass, SVP & Chief Information Security Officer, Elsevier Information Security & Data Protection Office

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Maximize the synergies between ITIL and DevOps

Maximize the synergies between ITIL and DevOps BEST PRACTICES WHITE PAPER Maximize the synergies between ITIL and DevOps By Anthony Orr, Director of Service Management, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Global Process Innovation Value Proposition

Global Process Innovation Value Proposition Global Process Innovation Value Proposition 1 Global Process Innovation will help your organization implement sustainable Business Process Management that delivers strategic value. With active support

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The

More information

Building the Agile Enterprise. The MK/OMG Press

Building the Agile Enterprise. The MK/OMG Press Brochure More information from http://www.researchandmarkets.com/reports/1757796/ Building the Agile Enterprise. The MK/OMG Press Description: In the last ten years IT has brought fundamental changes to

More information

Agile Information Security Management in Software R&D

Agile Information Security Management in Software R&D Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

CERTIFICATION PROGRAM. For more information www.staffingindustry.com/certification memberservices@staffingindustry.com 800.950.

CERTIFICATION PROGRAM. For more information www.staffingindustry.com/certification memberservices@staffingindustry.com 800.950. CERTIFICATION PROGRAM For more information www.staffingindustry.com/certification memberservices@staffingindustry.com 800.950.9496 PROGRAM DESCRIPTION PROGRAM DESCRIPTION Staffing Industry Analysts Certified

More information

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK Cyber Security Trends 2016 Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK December, 2015 Cyber security Trends 2016 What do new technologies and

More information

ISTQB ADVANCED LEVEL TEST MANAGER CERTIFICATE IN SOFTWARE TESTING

ISTQB ADVANCED LEVEL TEST MANAGER CERTIFICATE IN SOFTWARE TESTING ISTQB ADVANCED LEVEL TEST MANAGER CERTIFICATE IN SOFTWARE TESTING Copyright 2015 ps_testware 1/6 Introduction The International Software Testing Qualifications Board (ISTQB) consists of Member Boards representing

More information

Enterprise Business Service Management

Enterprise Business Service Management Technical white paper Enterprise Business Service Management Key steps and components of a successful solution Table of contents Executive Summary... 2 Setting the goal establishing an IT initiative...

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

Efficient BPMN: from Anti-Patterns to Best Practices

Efficient BPMN: from Anti-Patterns to Best Practices Efficient BPMN: from Anti-Patterns to Best Practices Architecture Made Simple Kristina Bigelienė, No Magic Europe About Speaker Kristina Bigelienė kristina.bigeliene@nomagic.com Solution Architect for

More information

IT Governance. Key Initiative Overview

IT Governance. Key Initiative Overview Michael Gerrard Research Vice President and Distinguished Analyst IT governance addresses two major topics: demand governance ( doing the right things ) and supply-side governance ( doing things right

More information

Risk Management Policy

Risk Management Policy Risk Management Policy Risk Management Policy Record Number D14/79827 Responsible Manager Manager Strategy and Governance Last reviewed 10 March 2015 Adoption reference Council Resolution number 90.5 Previous

More information

Applying Business Architecture to the Cloud

Applying Business Architecture to the Cloud Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support

More information

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds

More information

ENTERPRISE SECURITY RISK MANAGEMENT: A HOLISTIC APPROACH TO SECURITY OVERVIEW AND BACKGROUND DEFINITION OF ESRM

ENTERPRISE SECURITY RISK MANAGEMENT: A HOLISTIC APPROACH TO SECURITY OVERVIEW AND BACKGROUND DEFINITION OF ESRM ENTERPRISE SECURITY RISK MANAGEMENT: A HOLISTIC APPROACH TO SECURITY OVERVIEW AND BACKGROUND Organizations are continuously exposed to a host of evolving threats which create a multitude of security risks.

More information

STREAMLINE HR BUSINESS PARTNERING & STRATEGY DEVELOPMENT

STREAMLINE HR BUSINESS PARTNERING & STRATEGY DEVELOPMENT STREAMLINE HR BUSINESS PARTNERING & STRATEGY DEVELOPMENT CAPITALIZE ON EXPERT KNOWLEDGE TO GAIN MAXIMUM VALUE ON THESE VITAL ISSUES Understand the basic questions you need to consider when developing an

More information

COMBATING CYBER THREATS: A HOW TO FOR THE CISO.

COMBATING CYBER THREATS: A HOW TO FOR THE CISO. www.wipro.com COMBATING CYBER THREATS: A HOW TO FOR THE CISO. Gopinathan. K, Practice Head - Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech Contents 02 -------------------------------------

More information

Oracle Education @ USF

Oracle Education @ USF Oracle Education @ USF Oracle Education @ USF helps increase your employability and also trains and prepares you for the competitive job market at a much lower cost compared to Oracle University. Oracle

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National

More information

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Best Practices to Improve Breach Readiness

Best Practices to Improve Breach Readiness Best Practices to Improve Breach Readiness Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC http://blog.emc2.de/trust-security @RobtWesGriffin 1 Security Breaches 2 Security

More information

The Resilient IT Infrastructure

The Resilient IT Infrastructure The Resilient IT Infrastructure Jeremy Wong Senior Vice President BCM Institute Republic Polytechnic, Block W4, Level 1, LR-W4B 25 November 2013 Jeremy Wong Senior Vice President Business Continuity Management

More information

Ann Geyer Tunitas Group. CGEIT Domains

Ann Geyer Tunitas Group. CGEIT Domains 1 CGEIT Exam Prep May 17, 2011 Ann Geyer Tunitas Group CGEIT Domains 2 Job Practice Areas by Domain 25% IT Gov Frameworks 20% Risk Mgmt 15% Strategic Alignment 15% Value Delivery 13% Resource Mgmt 12%

More information

EASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant

EASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant The Integrated CMMI-based Improvement Framework for Test and Evaluation Jeffrey L. Dutton Principal Consultant Engineering and Services Performance Improvement LLC 22 Copyrights and Service Marks CMMI

More information

A Business Analysis Perspective on Business Process Management

A Business Analysis Perspective on Business Process Management A Business Analysis Perspective on Business Process Management October 2013 Discussion Points! Why have Roles?! What is Business Analysis?! Who is the Business Analyst?! Business Analysis & Business Process

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

Strategic Planning. Key Initiative Overview

Strategic Planning. Key Initiative Overview David Aron Research Vice President This overview provides a high-level description of the Strategic Planning Key Initiative. IT leaders can use it to create strategies that help the business win, and change

More information

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA Demand Planning & Forecasting 2012 Predictive Intelligence Summit October 10-11, 2012 San Diego, CA Leverage demand planning to improve forecasting accuracy and drive decision making Enhance sales and

More information

Project Management Professional (PMP ) Exam Preparation

Project Management Professional (PMP ) Exam Preparation Project Management Professional (PMP ) Exam Preparation Learn the most effective methods of delivering projects within cost, schedule and resource constraints April 10 14, 2011 American University of Sharjah

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

PMA1. Strategic Project Portfolio & Program Management

PMA1. Strategic Project Portfolio & Program Management PMA1. Strategic Project Portfolio & Program Management Course Description This workshop helps participants focus on managing their project with a view on its place in the whole organisation. It introduces

More information

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE

More information

Advancing Your Business Analysis Career Intermediate and Senior Role Descriptions

Advancing Your Business Analysis Career Intermediate and Senior Role Descriptions Advancing Your Business Analysis Career Intermediate and Senior Role Descriptions The role names listed in the Career Road Map from International Institute of Business Analysis (IIBA) are not job titles

More information

IT MANAGEMENT TRAINING PROGRAM. Denmark. Bridge. Gap. the. between business and IT

IT MANAGEMENT TRAINING PROGRAM. Denmark. Bridge. Gap. the. between business and IT IT MANAGEMENT TRAINING PROGRAM Denmark Bridge the Gap between business and IT Bridge the Gap between business and IT Benefits: FOR THE ORGANIZATION The personal performance of the trainee is significantly

More information

Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com

Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com Information Technology Governance Steve Crutchley CEO - Consult2Comply www.consult2comply.com What is IT Governance? Information Technology Governance, IT Governance is a subset discipline of Corporate

More information

Cyber Security: from threat to opportunity

Cyber Security: from threat to opportunity IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known

More information

CIOs: How to Become the CEO s Business Partner

CIOs: How to Become the CEO s Business Partner CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate

More information

BEST PRACTICES IN CHANGE MANAGEMENT

BEST PRACTICES IN CHANGE MANAGEMENT BEST PRACTICES IN CHANGE MANAGEMENT 2016 EDITION Executive Summary Best Practices in Change Management 2016 edition slide 1 THE LARGEST BODY OF KNOWLEDGE ON CHANGE MANAGEMENT Continuing to lead the discipline

More information

How To Improve Your Business Process

How To Improve Your Business Process Business Process Improvement Introduction A four-day workshop covering the methods, diagnostics and tools for optimizing and modeling production and service processes. Course Objectives This practical

More information

A Primer on Cyber Threat Intelligence

A Primer on Cyber Threat Intelligence A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly

More information