A. List the name, unit, and contact information for each author of the funding request. Name Unit Ann Geyer OCIO: SPP

Size: px
Start display at page:

Download "A. List the name, unit, and email contact information for each author of the funding request. Name Unit Email Ann Geyer OCIO: SPP ageyer@berkeley."

Transcription

1 I. Funding request overview A. List the name, unit, and contact information for each author of the funding request. Name Unit Ann Geyer OCIO: SPP B. Give the title of the funding request. Campus Security Assessment Program (formerly DSR) C. Give a brief description of the funding request. This proposal describes a three-tiered approach for conducting data security risk assessments to identify and rate campus systems based on their risk characteristics; review and assess the adequacy of current security practices; recommend actionable plans for remediation; and promote ongoing security risk management. The proposal is intimately linked to the Chancellor s Operational Excellence (OE) goals in that risk reduction is implicitly embedded in each of the seven individual initiatives. Effective security risk management requires risk awareness. A key component of the Security Assessment Program is to work closely with campus units in business and IT positions to help them understand the data security risks associated with their information environments and identify effective ways in which they can reduce those risks. If risk is being accepted, the program promotes active risk monitoring so that data owners stay alert to potential security incidents and are able to react quickly if needed. The proposal addresses the Chancellor s OE goal of efficiency by using the security assessment results to build a campus security baseline. The baseline becomes the foundation for new security programs sponsored and supported by the OCIO office for Security, Privacy, Policy (SPP). The proposal addresses the Chancellor s OE goal of cost savings through risk reduction. Data breaches, even minor ones, are expensive. A recent campus breach that impacted 35 credit card numbers stored only on paper resulted in $50,000 of breach response expenses. D. Estimated Start Date: 7/1/2011 E. Estimated Completion Date: 6/30/2012 F. Give the name, unit, and contact information for the following: Page 1 of 12

2 Name Unit Sponsor(s) 1 Shelton Waggener OCIO shelw@berkeley.edu Functional Owner 2 Ann Geyer OCIO:SPP ageyer@berkeley.edu Project Manager 3 New Hire OCIO:SPP Budget Contact 4 Sarita Dixit OCIO sarita@berkeley.edu G. Give a summary of the IT Bank funding being requested: FY IT Bank funding request Total (all years) IT Bank funding request $700,000 $1.5 million (includes prior funding for the DSR program in FY09 and FY10) II. Statement of need and proposed solution A. Identify and describe what needs the proposed solution is seeking to address (e.g., a software upgrade is necessary because the version currently in use is no longer supported). Prevent Data Breaches & Improve Data Stewardship The Chancellor has assigned a high priority to preventing data breaches. The campus is at risk because it has not generally revised its basic security practices to guard against current and emerging security threats. More than half the campus units maintain notice triggering data, some with very limited IT resources. Many unit data systems were meant to be temporary solutions operating in standalone environments, but over time were extended in scope and scale without attention to security. The number of web applications on campus continues to grow as units strive to increase operational efficiency through the use of technology. However, that growth introduces additional risk to campus data. According to the FBI, web applications have become one of the top vectors for data theft. With over 275 individual developers, most of whom have no formal security training, the campus has a serious risk that if unassessed will remain unaddressed. Increase Compliance with Payment Card Industry (PCI) Data Security Standards The campus has over 150 units that accept some type of credit card payment which makes them subject to the PCI Data Security Standard. Units must self-assess and attest to their PCI compliance without sufficient awareness of requirements and without adequate monitoring to ensure compliant behavior. More units are using web applications for credit 1 The Sponsor is defined as one who has authority (often an executive of the organization) to assign resources, help the project manager overcome roadblocks to the successful development of the solution, and enforce decisions regarding the solution. 2 The Functional Owner is defined as one who oversees the ongoing operation of the service or system created by the solution. 3 The Project Manager is defined as the person assigned by the Sponsor to achieve the solution development s objectives. 4 The Budget Contact is defined as the person who is responsible for budget transfers and reporting. Page 2 of 12

3 card transactions and interfacing to campus enterprise systems. A breach involving PCI data may have devastating financial consequences for the campus. (cont d) Increase Effectiveness of Security Solutions Without good risk assessment data, the campus cannot optimize security investments to address actual campus or unit risks. And, data proprietors need to understand security risks in order to make informed decisions about data management. B. Describe the solution that is being proposed to meet the identified need(s). The Campus Security Assessment Program expands the original DSR into a three-tiered approach for conducting data security risk assessments to identify and rate campus systems based on their risk characteristics; review and assess the adequacy of current security practices; recommend actionable plans for remediation; and promote ongoing risk management. Tier 1 is a validated self-assessment of general security practices. This method is used to decide whether a more detailed assessment is warranted. It is also a key component of working with unit management to understand and incorporate risk management practices into standard operations. Tier 2 is a facilitated (in-person) assessment of risk and control gaps. This tier is used for units that have limited IT support; small footprint systems; or are launching new applications where the risk profile needs to be established. The key outcomes are a clearly defined risk profile for the unit, a risk register for the data system, and an actionable plan to reduce unnecessary security risk and comply with existing campus security policy. Tier 3 is the detailed technical security review. This level is conducted for large pockets of notice triggering data, merchants in higher risk PCI categories, or units that have elevated concerns for data security because of regulation or contractual obligations. The three-tiered approach allows us to conduct more assessments because the effort level and technical skills are much less for the tier 1 (validated) and 2 (facilitated). For unit management less familiar with security risk management methods, the tiered approach allows us to begin risk discussions at the most appropriate technical level. We also have integrated Tier 1 and Tier 2 assessments into other security programs managed by SPP. For example, any unit applying for approval to collect and retain SSN data will be required to complete the Tier 1 self-assessment which will be validated by a DSR team member. Based on this high level assessment, SPP will consult with the unit about whether a more detailed level of assessment is warranted. In conjunction with Billing and Payment Services, we will be assessing all campus merchants using Tier to validate the FY11 Campus PCI Attestation. We are in discussions with the OE PMO to integrate the security assessment methodology into project management procedures to ensure that security risks are identified and addressed in new data projects. III. Impact and strategic alignment A. Alignment to OE. Describe how the proposed solution aligns with the Chancellor s Organizational Effectiveness (OE, goals. Page 3 of 12

4 The Campus Security Assessment Program closely aligns with the Chancellor s OE initiatives in that risk reduction is a recurring theme embedded in each of the seven individual initiatives. The Campus Security Assessment Program reduces the likelihood of data breaches by identifying security and data management weaknesses, educates unit management on how to minimize its notice triggering data footprint, supports unit IT staff in identifying effective security practices, and increases overall campus security efficiency and effectiveness by using the consolidated risk assessment results to identify common security needs and compensating solutions. B. Benefits. Identify any other anticipated benefits in implementing the proposed solution (e.g., Will the solution avert a system failure? Eliminate a compliance risk?). Key Benefits of a Campus Security Assessment Program Focuses unit and campus management attention and security resources on the most critical data security risks Helps units become risk aware and mature their understanding of risk management techniques Enables better communication of campus security risks across all units Provides a platform for building standard security solutions that optimizes costs across data systems and simplifies deployment requirements Develops a common language and framework for data management and risk decision making Improves compliance with privacy laws, regulations and campus policies C. Beneficiaries. Describe the constituency that is intended to benefit from the proposed solution (e.g., number of people, systems, or departments). This program benefits all campus units and all individuals from whom the campus collects personally identifiable information. The program supports both unit management and IT personnel in developing their risk management skills and identifying ways to reduce risk. D. Collaboration. Describe the extent to which this proposed solution is a collaborative effort either within campus or with external partners. The Campus Security Assessment Program has several prominent campus partners. Billing and Payment Services is assisting the CPSO to introduce risk assessment into the campus merchant community and will be participating in Tier 1 (validated) and Tier 2 (facilitated) assessments by providing payment processing subject matter expertise. Student Services is partnering by utilizing the same risk assessment methodology and integrating risk assessment requirements into new project approvals. The Student Services security officer will be trained and function as a risk assessment team member. The three student clinics health, optometry, and mental health will utilize the program to assess its security compliance obligations. Overtures are underway with the Committee for Protection of Human Subjects to partner with risk assessment activities for the research community and with OE PMOs office to integrate security assessment into new project management. E. Extensibility. If applicable, describe how this initiative may enable additional projects to be considered (e.g., Could the solution be extended to serve other constituents on campus or could other projects be built on top of this one?). Page 4 of 12

5 This proposal describes several areas in which the program is already being integrated into central IT programs. A proven security assessment program consisting of methodology, training materials, procedures, templates, and performance metrics is readily exportable to other campuses. IV. Work plan and proposed solution design A. Deliverables and Constraints. Provide a statement of: Deliverables results the solution must deliver to achieve the stated objectives. Constraints factors that may limit the options for providing the solution (e.g., an inflexible deadline). Deliverables The Campus Security Assessment Program is intended to be a 1 year intensive program to jumpstart campus risk management by assessing at least half of all campus units using the most appropriate tier level. The consolidated assessment data then creates a foundation for defining a multi-year security program and continuing to build risk awareness sensitivity and responsiveness among data owners, data users, and IT support staff. The specific program deliverables are: Fully documented risk assessment methodologies for each of the three tiers Online self-assessment tool A minimum of five trained risk assessment facilitators 50 Tier 1 validated risk assessments 30 Tier 2 facilitated risk assessments 20 Tier 3 detailed technical assessments A fully vetted UC Berkeley 2011 PCI Attestation Report Constraints Skilled resources The program relies on the availability of an outsource contract to acquire sufficient resources to conduct and complete the assessment deliverables. Access to a pool of pre-trained, ready-to-go assessment specialists is critical to accomplishing the planned deliverables in a 12-month time frame. Campus Cooperation The program relies on successfully establishing good working relationships with campus unit management. Risk assessments must be seen as a means to characterize and manage unit risk and not merely a requirement that carries cost and inconvenience without compensating value delivered. Unit Mitigation Security mitigation responsibility rests with campus units supported by effective security programs and IT support services. This program assists campus units in identifying their most pressing security risks and developing responsive mitigation programs. Ongoing monitoring and mitigation compliance responsibility will be part of ongoing security operations. Page 5 of 12

6 B. Milestones. Provide a work plan for the proposed solution with high-level steps to complete the solution, including timeline. (Try to limit your plan to no more than seven steps.) Milestone Timeline 1. Hire dedicated staff for the assessment program July Contract for external resources August Complete initial facilitator training August Define program communications material and Sept 2011 begin distributing information to unit management. 5. Conduct tiered assessments Monthly schedule starting in Sept 6. Produce quarterly risk profile reports Oct, Dec, Mar, June 7. Determine funding model for ongoing operational support Feb 2012 C. Core technology categories are listed in the table below followed by examples for each category. Use the column on the right to describe all technologies (including versions) that are included in the proposed solution. Core technology category Other technology not listed Examples Specific technology proposed for this solution (include version) This program will utilize security assessment and remediation software acquired under the DSR program. It will also evaluate commercially available security management information systems such as RSA Archer for ongoing security risk management and metric reporting capability. D. Staffing. Provide detail on the anticipated staffing for this solution, including the project manager. How will the staffing needs be filled (e.g., from your staff, contract staff, vendor, etc.) If applicable, describe how you will provide backfill for existing staff being assigned to the solution development. Role How the role will be filled (including backfill) 1. Program Oversight Ann Geyer, CPSO 2 Technical leads SPP security analyst Matt Wolf-existing DSR program staff; SPP security analyst new hire 3. T2 Risk Facilitators Program interns from both business & IT functions; Page 6 of 12

7 4. T2-T3 PCI assessment specialists 5. T3 technical specialists, e.g., DBA specialist, application development specialist, pen testing interns are trained as facilitators and conduct security assessments under the guidance of program staff; at end of rotation, return to home units to support and reinforce risk management practices SPP security analysts and Outsource contract IST recharge; outsource contract E. Risks. Describe any known risks associated with undertaking this proposed solution (e.g., staff resources have not been identified yet; system involves sensitive data; the technology is new to the campus) and how you plan to reduce or eliminate the risk. Risk Mitigation plan 1. Unit cooperation Broadly communicate program goals, objectives, and benefits to unit management. Engage support from key Vice Chancellors. Use testimonials from DSR clients. Use data breach cost data to clarify potential risk savings. ] 2. Partial funding granted Reduce scope of program 3. No funding granted Change course to education program to develop awareness; work with cooperative units on a case by case basis; focus on articulating data stewardship roles and responsibilities. V. Funding model and budget A. Narrative. Provide a high-level narrative overview of the funding model and expense budget. This proposal is a one-year intensive assessment program that builds on the previous work and success of the Data Security Review (DSR) program. There are three funding sources for this proposal in FY11: OCIO:SPP contributions ($100K), Billing and Payment Services contributions ($25K), and IT Bank funding ($700K for FY11 and a projected $227K in Carryforward from the FY10 DSR program). The planning for this proposal included a number of work sessions with key campus stakeholders in IT, Finance, Administration, Compliance, and Student Services. The consensus input was to use centralized funding to launch a campus security assessment program, introduce management to the approach, provide direct value and then move to a risk-based funding model. B. Partial Funding Implications. Could the proposed solution move forward with partial funding? If yes, describe the revised scope, including the associated dollar impact. Page 7 of 12

8 Yes. A reduction in funding would directly impact the scope of the program and the timing of individual assessment deliverables. The most expensive part of the program is the detailed technical security reviews (based on the DSR program). Reduced funding would be addressed by putting more emphasis on using T1 assessments to assign an initial risk category which would be the basis of shifting costs directly onto individual units. An attempt would be made to identify units to volunteer staff for T2 facilitator training to keep that aspect of the program viable. If the funding is significantly reduced, the program would be redesigned. It would change to an education and awareness program. Activities would be designed to educate campus data owners and work with existing unit support functions such as PMO. C. Sustainable Funding Plan. What is the plan for sustainable funding to support ongoing operations after IT Bank funding ends (i.e., how will ongoing staff support, software licenses/maintenance/upgrade costs, hardware maintenance, and replacement costs, etc. be funded)? OCIO:SPP has developed a prototype recharge funding model for supporting campus security operations. This funding model is based on a sliding scale fee structure that decreases in portion to the risk reduction activities of the unit. The model has been reviewed and approved by the IST Budget Office and is ready for implementation once the campus Recharge Committee has approved it. Once the new Common Good funding model is developed and approved by the campus, we will evaluate whether the ongoing security risk assessment qualifies. The Campus Risk Management, now part of Compliance, is working on non-it risk assessment funding support and we are interested in developing a common approach for the campus at large. D. Financial (Revenue/Cost) Deliverables. If the proposed solution is expected to realize savings or revenue, describe the savings or expected increase in revenue (in general, detail is required Section VI below), plans for reinvesting the resources, and How this impacts the funding model. The proposal does not expect to produce any direct revenue or cost savings. As a risk reduction program, it will improve the cost-effectiveness of future IT security investments by linking such decisions to risk reduction objectives; it will enable evidence based security decisions that help avoid over or under spending; and it will motivate a proactive attention to risk management that encourages early problem identification that permits resolution before breaches occur or security risks are baked into system design or operations. Please download and fill out the Funding Model and Budget Excel spreadsheets located at and follow the instructions on the first worksheet in the workbook. Include both completed sheets, the funding model and the line item descriptions, with this packet in your budget submission. VI. Assessment Plan Note. This section has been substantially revised this year as part of the campus effort to utilize metrics in evaluating the success of activities. For an extensive example, please refer to the sample ITFR application found on the ITFR FY page, Page 8 of 12

9 UC Berkeley is currently operating under a severe budget constraint. The campus must give the highest priority to projects that significantly improve its performance as described by the OE initiative. Funded projects must deliver specific and measurable benefits that enable the campus to make the best use of resources to serve our core missions of teaching and research. In categories VI.A through VI.G, please provide the metrics that describe the current state of the campus operation and the performance improvements that the campus will receive by investing in the project. Also describe the method used to assess each metric. If a metric that is pertinent to your project is not included here, describe it in VI.H. Use the space below to list describe in detail any assumptions concerning financial data, e.g., salary and benefits expenses. Please specify sources where possible. A. Assessment Plan and Financial Assumptions Assessment Plan Program management is committed to tracking the key milestones as a means of demonstrating the program is achieving its stated objectives. In addition, OCIO:SPP has a separate security measurement program in progress that will be used to evaluate improvements to campus security that are directly or indirectly associated with this proposed program. The metric program will collect and consolidate assessment results and produce management oriented dashboard reports. Program metrics are one of the proposed milestones and thus are not yet clearly defined; however the metrics are intended to report campus status and trending data in the following areas: 1. Assessment program objectives: Average cost/assessment Management satisfaction about value and benefits Degree of knowledge transfer to unit operations 2. Risk reduction objectives: Decreases in critical system and operational vulnerabilities Increase compliance levels to campus security standards Increased use of security and privacy by design development principles 3. Risk awareness and management orientation Increased requests for assessments initiated directly by unit management Quality of business and IT communications and jointly engaged decisionmaking (measured via surveys) Increase unit participation in campus data stewardship and security oversight governance vehicles. Financial Assumptions Salaries actual salaries are used for current SPP program employees; midpoint salary levels are used for new hires; intern salaries are managed as a fixed allotment Benefits: the FY12 benefit ratio is 37% No of Assessments and Level of Effort Program Staff Unit Staff T1 Assessments 4 hrs 4 hrs T2 Assessments 20 hrs 10 hrs Page 9 of 12

10 T3 Assessments 125 hrs/average 75 hrs Infrastructure costs: based on BAIRS actuals for OCIO/IST average costs Software Licenses: renewals based on actual costs Outsource Contract: cost estimates based on ROI information collected in Jan 2011; as well as analysis data from PCI Council and Gartner Group. Training Costs: includes training for CISSP certification for unit interns and refresher PCI DSS training for program career staff Please use the tables below to detail your metrics. Financial savings Current annual operational expenses New (or expected) annual operational expense Net operational savings Describe what your projected savings are based on, e.g., reduction in X $, no need for X $ Date when savings will be realized, if onetime, and/or dates with amounts over time if savings are on-going Increased revenue (please note if the revenue is local with no net gain to the campus, e.g., internal recharge or if it s new to the campus e.g., through contracts, grants and/or auxiliaries) Current annual revenue New (or expected) annual revenue Net increase in revenue Describe what your projected revenues are based on, e.g., grants and/or contracts for the campus expected by when in what amount(s) Date when increased revenues will be realized, if one-time, and/or dates with amounts over time if increases in revenue are on-going Reduced transaction processing time or increased transaction processing capacity Page 10 of 12

11 Current annual number of transactions processed Current average processing time per transaction Number of members of the campus community that currently use the service Annual number of transactions processed after the project is completed Average transaction processing time per transaction after the project is completed Number of members of the campus community that will use or provide the service after project completion Improved data security What data are currently at risk: the types of data, including whether or not there are restricted data; the volume of data, e.g., number of records; and the number and categories of impacted members of the campus community, e.g., students, faculty, and/or staff What federal laws, state laws, and/or University policies the campus must comply with to protect these data The proposed program is intended to assess the security risks to campus data systems containing notice triggering data as well as student, research, and copyrighted data that would negatively impact the campus s reputation with key stakeholders if a security breach occurred. A conservative estimate, based on best available data, indicates that more than 2/3 of all campus units maintain such data. Federal Requirements. Security risk assessment is the cornerstone requirement of most federal data protection requirements. The most prevalent and pervasive data security standards are those promulgated by the FTC and applied to financial data under SOX and GLB; medical data under HIPAA, FDA, and Medicare Reimbursements; and to individually identified consumer data under FCRA and the FTC Unfair and Deceptive Practices regulations. FTC Scrutiny. With the campus s growing dependence on web applications, any significant data breach of personal information will subject us to FTC scrutiny raising the potential for a long-term consent decree, supervision of our data practices, and significant financial penalties. The assessment program will also bring Page 11 of 12

12 Improved quality of service to members of the campus community transparency to UCOP and campus policy compliance. It incorporates requirements from IS-2; IS-3; IS-11; IS-12 as well as our two Minimum Security Standards for network devices and electronic information. What campus community satisfaction issues/concerns/needs the project is designed to address How this information will be gathered, e.g., through surveys, user groups, explicit management goals How the campus will measure whether the quality of the service has improved Program expects to increase unit management familiarity with basic security risk awareness and management provisions. Information will be collected via the assessment activities and by survey Quality of service is defined as unit management perception of the benefit and value of security assessments as a management decision making. This will be measured using the metric program previously discussed. Regulatory compliance What federal and state laws or policies the new service created by the project will allow the campus to comply with The number and types of impacted members of the campus community, e.g., students, faculty, and/or staff Same as the data security description. Same as the data security description. Page 12 of 12

13 UC Berkeley - FY IT Funding Request: Funding Model and Budget Template Section V.E. Part 1: Multi-Year Sustainable IT Funding Model and Budget Campus Security Assessment Program (formerly DSR) ACTUAL PROJECTED Line # Funding Model: Sources (round to the nearest $1,000) FY FY FY FY FY FY FY13-14 FY14-15 Cumulative Total 1 OCIO 13,000 80, , ,000 2 Billing & Payment Services 25,000 25,000 3 IT Loan and payback (project) 0 4 Grant or other (specify) 0 5 IT Bank Funding (project) 700, , ,000 1,575,000 6 Other (specify) 0 7 Total funding , , , ,793,000 Expenses (round to nearest $1,000) ACTUAL PROJECTED FY FY FY FY FY FY FY13-04 FY , , ,000 Cumulative Total 8 Salaries 924,000 9 actual rate 24,000 87, , , Supply & Expense 22,000 4,000 35,000 61,000 Infrastructure services (backup, storage, colocation, 10,000 network nodes, desktop support, etc.) 11 6,000 21,000 37, Software licenses/upgrades/maintenance 94,000 15,000 75, , Hardware purchase and refresh 0 14 Hardware maintenance 0 Contract/consulting services (project management, development consultants, etc.)(nonsalary) 15 41,000 27, , , Office space 0 17 Training & Travel 5,000 3,000 12,000 20, Other costs: specify 7,000 7, Total expenses , ,000 1,051, ,792, FUNDING LESS EXPENSES , , , Carryforward , , Cumulative Total , , Source for actuals: (Name of BAIRS report and parameters used for source data, including month run and account information) 04/25/11

14 UC Berkeley - FY IT Funding Request: Funding Model and Budget Title Line # Funding Model Sources OCIO:SPP 1 Section V.E. Part 2: Line Item Description of Multi-Year Sustainable IT Funding Model and Budget Briefly describe the sources and uses specified below. Explain significant changes over time. Reference examples in Instruction worksheet or sample IT Funding Request. Campus Security Assessment Program Description $100K to provide oversight, unit outreach, mitigation management; risk awareness; and performance metrics; 2 Billing & Payment Services $25K partner contribution to support program initiation 3 IT Loan and payback (project) 4 Grant or other (specify) 5 IT Bank Funding (project) $700K primary funding of baseline campus risk assessment 6 Other (specify) 7 Total Funding Expense Budget 8 Salaries (including Project Manager, if applicable) $528K -- 2 FTE Security Analyst IV; 3 FTE Data Security Interns 9 or actual rate $205K--37% - FY Supply & Expense $35K -- general office supplies 11 Infrastructure services (backup, storage, colocation, network nodes, desktop support, etc.) $21K -- in office equipment, software, & services Software licenses/upgrades/maintenance Hardware purchase and refresh $75K in ongoing security software license fees 14 Hardware maintenance 15 Contract/consulting services (project management, development consultants, etc.) $175K for contract resources to supply specialized skillsets 16 Office space 17 Training & Travel $12K for security training 18 Other costs: specify 19 Total Expenses Funds Less Expenses 20 Funds Less Expenses 21 Carryforward FY Carryforward due to key staff leaving the University and related slowdown in implementation. 22 Cumulative Total 04/25/11

3. Department(s) to receive funding: Various potential Remedy ticketing users.

3. Department(s) to receive funding: Various potential Remedy ticketing users. AVCIT & CIO FY 200910 BUDGET PLANNING SECTION V: BLOCK GRANT REQUEST Ticketing System for IST and Campus Departments (A continuation of the Remedy for Campus Block Grant Request for FY 0910) ABBA Category

More information

OE RESOURCE REQUEST APPLICATION

OE RESOURCE REQUEST APPLICATION OE RESOURCE REQUEST APPLICATION University of California, Berkeley I. SPONSORSHIP A. Initiative Initiative IT Infrastructure Initiative Manager Michael Mundrane Phone -6365 E-Mail mundrane@berkeley.edu

More information

OE PROJECT CHARTER Business Process Management System Implementation

OE PROJECT CHARTER Business Process Management System Implementation PROJECT NAME: PREPARED BY: DATE (MM/DD/YYYY): Andrea Lambert, Senior Business Process Consultant, OE Program Office 09/15/2014 PROJECT CHARTER VERSION HISTORY VERSION DATE COMMENTS (DRAFT, SIGNED, REVISED

More information

Rails Environment Upgrade (VM Migration, Framework Upgrade) ABBA Category Two: Information Technology

Rails Environment Upgrade (VM Migration, Framework Upgrade) ABBA Category Two: Information Technology AVCIT & CIO FY 201112 BUDGET PLANNING INTERNAL USE Rails Environment Upgrade (VM Migration, Framework Upgrade) ABBA Category Two: Information Technology 1. Amount of OneTime Funding Request (FY 1112):

More information

Information Technology Strategic Plan 2013 9/23/2013

Information Technology Strategic Plan 2013 9/23/2013 Information Technology Strategic Plan 2013 9/23/2013 Unit Mission Statement: Information Technology Shared Services is dedicated to providing unparalleled service and support to the UC Davis College of

More information

An Oracle White Paper March 2013. Project Management Office Starter Kit

An Oracle White Paper March 2013. Project Management Office Starter Kit An Oracle White Paper March 2013 Project Management Office Starter Kit Executive Overview... 1 Introduction... 1 Plan Phase... 2 Create Statement of Purpose and Goals... 2 Define Scope and Target Maturity...

More information

ERP Survey Questionnaire

ERP Survey Questionnaire 0 ERP Survey Questionnaire Thank you for your participation in the EDUCAUSE study of Enterprise Resource Planning (ERP) systems. The survey is a key part of a major study on ERP in higher education in

More information

TD Bank N.A. s Enterprise-Wide PMO Monitors Projects and Maintains Focus on Strategic Goals

TD Bank N.A. s Enterprise-Wide PMO Monitors Projects and Maintains Focus on Strategic Goals WHITE PAPER TD Bank N.A. s Enterprise-Wide PMO Monitors Projects and Maintains Focus on Strategic Goals AT A GLANCE TDBNA first began using a project management office (PMO) to support its privatization

More information

RISK MANAGEMENT REPORTING GUIDELINES AND MANUAL 2013/14. For North Simcoe Muskoka LHIN Health Service Providers

RISK MANAGEMENT REPORTING GUIDELINES AND MANUAL 2013/14. For North Simcoe Muskoka LHIN Health Service Providers RISK MANAGEMENT REPORTING GUIDELINES AND MANUAL 2013/14 For North Simcoe Muskoka LHIN Health Service Providers Table of Contents Purpose of this document... 2 Introduction... 3 What is Risk?... 4 What

More information

WVU. PROJECT MANAGEMENT LITE Training Manual for Project Managers and Team Members. Robert C. Byrd Health Sciences Center Chancellor s Office

WVU. PROJECT MANAGEMENT LITE Training Manual for Project Managers and Team Members. Robert C. Byrd Health Sciences Center Chancellor s Office WVU Robert C. Byrd Health Sciences Center Chancellor s Office PROJECT MANAGEMENT LITE Training Manual for Project Managers and Team Members Fostering a culture of high purpose, accountability & accomplishment

More information

OE PROJECT CHARTER TEMPLATE

OE PROJECT CHARTER TEMPLATE PROJECT : PREPARED BY: DATE (MM/DD/YYYY): Project Name Typically the Project Manager Project Charter Last Modified Date PROJECT CHARTER VERSION HISTORY VERSION DATE (MM/DD/YYYY) COMMENTS (DRAFT, SIGNED,

More information

PMO Starter Kit. White Paper

PMO Starter Kit. White Paper PMO Starter Kit White Paper January 2011 TABLE OF CONTENTS 1. ABOUT THE PMO STARTER KIT...3 2. INTRODUCTION TO THE PMO STARTER KIT WHITE PAPER...3 3. PMO DEVELOPMENT ROADMAP...4 4. PLAN PHASE...5 4.1 CREATE

More information

PROJECT MANAGEMENT PLAN <PROJECT NAME>

PROJECT MANAGEMENT PLAN <PROJECT NAME> PROJECT MANAGEMENT PLAN TEMPLATE This Project Management Plan Template is free for you to copy and use on your project and within your organization. We hope that you find this template useful and welcome

More information

Evaluation Plan: Process Evaluation for Hypothetical AmeriCorps Program

Evaluation Plan: Process Evaluation for Hypothetical AmeriCorps Program Evaluation Plan: Process Evaluation for Hypothetical AmeriCorps Program Introduction: This evaluation plan describes a process evaluation for Financial Empowerment Corps (FEC), an AmeriCorps State and

More information

EXECUTIVE SUMMARY...5

EXECUTIVE SUMMARY...5 Table of Contents EXECUTIVE SUMMARY...5 CONTEXT...5 AUDIT OBJECTIVE...5 AUDIT SCOPE...5 AUDIT CONCLUSION...6 KEY OBSERVATIONS AND RECOMMENDATIONS...6 1. INTRODUCTION...9 1.1 BACKGROUND...9 1.2 OBJECTIVES...9

More information

OE PROJECT CHARTER TEMPLATE

OE PROJECT CHARTER TEMPLATE PROJECT : BearBuy Implementation PREPARED BY: Vanessa Wong and Jon Conhaim DATE (MM/DD/YYYY): 07/23/2011 PROJECT CHARTER VERSION HISTORY VERSION DATE COMMENTS (DRAFT, SIGNED, REVISED CURRENT STATUS) (MM/DD/YYYY)

More information

Building Bridges: The Link Between Strategic Planning and Budgeting

Building Bridges: The Link Between Strategic Planning and Budgeting Building Bridges: The Link Between Strategic Planning and Budgeting Dr. Sona K. Andrews Vice Chancellor for Academic Strategies Oregon University System Stacy Pearson Vice President for Finance and Administration

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

Department of Finance & Management Strategic Plan V.3.3

Department of Finance & Management Strategic Plan V.3.3 Department of Finance & Management Strategic Plan V.3.3 Planning Period: 2012 2015 Table of Contents Message from the Commissioner... 3 Department Overview... 4 Department Strategic Planning Process...

More information

Small Business. Leveraging SBA IT resources to support America s small businesses

Small Business. Leveraging SBA IT resources to support America s small businesses Small Business Administration Information Technology Strategic Plan ( ITSP) 2012-2016 Leveraging SBA IT resources to support America s small businesses Message from the Chief Information Officer The Small

More information

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I IT Management Advisory A Privacy Officer s Guide to Providing Enterprise De-Identification Services Ki Consulting has helped several large healthcare organizations to establish de-identification services

More information

Office of Budget and Financial Planning

Office of Budget and Financial Planning The Office of Budget and Financial Planning (OBFP) is a professional service organization for financial planning and resource allocation and management. Our mission is to deliver value-added planning and

More information

Project Charter EMI Outreach July 25, 2011. OE Project Charter. 1.0 July 25, 2011 Draft w/ VC Denton comments included 1.1 11/02/2011 Proofed/edited

Project Charter EMI Outreach July 25, 2011. OE Project Charter. 1.0 July 25, 2011 Draft w/ VC Denton comments included 1.1 11/02/2011 Proofed/edited Project Charter EMI Outreach July 25, 2011 OE Project Charter Project Name: Energy Management: Marketing and Outreach Prepared by: Lisa McNeilly Date (MM/DD/YYYY): July 25, 2011 Project Charter Version

More information

CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link

CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link Peter Milla CASRO Technical Consultant/CIRQ Technical Advisor peter@petermilla.com Background CASRO and Standards CASRO takes

More information

Office of Budget and Financial Planning

Office of Budget and Financial Planning The Office of Budget and Financial Planning (OBFP) is a professional service organization in the Institute s financial administration area. The mission of the office is to provide value added integrated

More information

Department of Human Resources

Department of Human Resources Workforce Services Workforce Policy and Planning Department Management/ Human Resource Information Systems Employee Relations Employment Compensation and Workforce Analysis Employee Benefits Organizational

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)?

WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)? WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)? Due to the often complex and risky nature of projects, many organizations experience pressure for consistency in strategy, communication,

More information

Manag. Roles. Novemb. ber 20122

Manag. Roles. Novemb. ber 20122 Information Technology Manag gement Framework Roles and Respo onsibilities Version 1.2 Novemb ber 20122 ITM Roles and Version History Version ed By Revision Date Approved By Approval Date Description of

More information

2008 NASCIO Award Submission. Utilizing PCI Compliance to Improve Enterprise Risk Management

2008 NASCIO Award Submission. Utilizing PCI Compliance to Improve Enterprise Risk Management Section A Cover Page 2008 NASCIO Award Submission Utilizing PCI Compliance to Improve Enterprise Risk Management Information Security and Privacy Michigan Section B - Executive Summary Michigan has implemented

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide

Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide Standard 1 Governance for Safety and Quality in Health Service Organisations Safety and Quality Improvement Guide 1 1 1October 1 2012 ISBN: Print: 978-1-921983-27-6 Electronic: 978-1-921983-28-3 Suggested

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Business Analyst Position Description

Business Analyst Position Description Analyst Position Description September 4, 2015 Analysis Position Description September 4, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

State of Montana. Office Of Public Instruction IT Strategic Plan 2014. 1. Executive Summary

State of Montana. Office Of Public Instruction IT Strategic Plan 2014. 1. Executive Summary State of Montana Office Of Public Instruction IT Strategic Plan 2014 1. Executive Summary 1 The IT Division has experienced dramatic growth of its supported environment in the past three to four years.

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

State of Washington. Guide to Developing Strategic Workforce Plans. Updated December 2008

State of Washington. Guide to Developing Strategic Workforce Plans. Updated December 2008 State of Washington Guide to Developing Strategic Workforce Plans Updated December 2008 Table of Contents Introduction... 3 What Is Workforce Planning?... 3 Workforce Planning Strategy Areas... 4 Strategic

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

1.1 Please indicate below if any aspect of the service is legally mandated by any of the following and provide the relevant reference.

1.1 Please indicate below if any aspect of the service is legally mandated by any of the following and provide the relevant reference. Response ID:60; 100888517 Data 1. Support Services Report Template Report Info Name of the person completing this report : Borre Ulrichsen Title of the person completing this report : CIO & AVP, IT Services

More information

Effectively Managing EHR Projects: Guidelines for Successful Implementation

Effectively Managing EHR Projects: Guidelines for Successful Implementation Phoenix Health Systems Effectively Managing EHR Projects: Guidelines for Successful Implementation Introduction Effectively managing any EHR (Electronic Health Record) implementation can be challenging.

More information

Models for Operational Efficiency and Practice Improvement

Models for Operational Efficiency and Practice Improvement Models for Operational Efficiency and Practice Improvement William Dracos, Emory University Peggy Huston, University of California, Berkeley Mara Fellouris, University of California, San Francisco Mike

More information

Project Management Methodology

Project Management Methodology Project Management Methodology 1/6/2015 PAGE 1 OF 28 Version 2.0 Contents INTRODUCTION... 4 1. Overview... 4 PHASE 1 PROJECT INITIATION... 5 1. Governance Model... 6 2. Project Prioritization Process...

More information

Procurement Reporting - OBIEE

Procurement Reporting - OBIEE UC BERKELEY Procurement Reporting - OBIEE Project Charter Tracey Bolton 9/7/2011 0 P age Version 3 Project Name: Prepared by: EDW Procurement Reporting Project Tracey Bolton Date (MM/DD/YYYY): 08/4/2011

More information

Company A Project Plan

Company A Project Plan Company A Project Plan Project Name: Close Optimization Project Example Prepared By: David Done - Project Manager Title: John Doe -Project Manager Date: March 17, 2011 Project Plan Approval Signatures

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

GEOSPATIAL LINE OF BUSINESS PROGRAM MANAGEMENT OFFICE CONCEPT OF OPERATIONS

GEOSPATIAL LINE OF BUSINESS PROGRAM MANAGEMENT OFFICE CONCEPT OF OPERATIONS GEOSPATIAL LINE OF BUSINESS PROGRAM MANAGEMENT OFFICE CONCEPT OF OPERATIONS March 2007 Adjudicated Draft TABLE OF CONTENTS 1 INTRODUCTION 3 2 VALUE PROPOSITION 3 3 ORGANIZING FRAMEWORK 3 31 PMO Organizational

More information

CONNECTICUT HOUSING FINANCE AUTHORITY REQUEST FOR PROPOSAL FOR Development of Strategic Information Technology Plan

CONNECTICUT HOUSING FINANCE AUTHORITY REQUEST FOR PROPOSAL FOR Development of Strategic Information Technology Plan Overview The Connecticut Housing Finance Authority (CHFA) was created in 1969 as a public instrumentality by the State Legislature. As a quasi-public agency and political subdivision of the State of Connecticut,

More information

SUMMARY OF POSITION ROLE/RESPONSIBILITIES:

SUMMARY OF POSITION ROLE/RESPONSIBILITIES: SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant

More information

Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today s Largest Organizations

Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today s Largest Organizations Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today s Largest Organizations Overview In late 2006 and 2007, Protiviti commissioned a study to gauge the fraud risk management (FRM)

More information

Field Research: Security Metrics Programs

Field Research: Security Metrics Programs Ramon Krikken Analyst Security and Risk Management Strategies Burton Group Field Research: Security Metrics Programs All Contents 2009 Burton Group. All rights reserved. Security Metrics Programs 2 Field

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Business Logistics Specialist Position Description

Business Logistics Specialist Position Description Specialist Position Description March 23, 2015 MIT Specialist Position Description March 23, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

Yale University Performance Management Guide

Yale University Performance Management Guide Yale University Performance Management Guide Table of Contents Section Page Philosophy and Intent 3 FOCUS Annual Performance Management Cycle 4 Expectations 5 Starting With the End in Mind 5 Important

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

Vulnerability Threat Management

Vulnerability Threat Management Vulnerability Threat Management Project Proposal Form Project Title Vulnerability Threat Management Agency/Entity Security Architecture Work Group Form Version: 20070910 Notes about this form: 1. USE.

More information

Positioning Pima County Community College District s Human Capital Management for the Future

Positioning Pima County Community College District s Human Capital Management for the Future Positioning Pima County Community College District s Human Capital Management for the Future February 4, 2015 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member

More information

Plans for Payroll >> 2012-2013 Payroll District Program Review

Plans for Payroll >> 2012-2013 Payroll District Program Review Page 1 of 18 Plans for Payroll >> 2012-2013 Payroll District Program Review Name : 2012-2013 Payroll District Program Review Principal Preparer : Angie Ontiveros Progress Report Preparer : Angie Ontiveros

More information

Real Estate Office Strategic Plan 2015

Real Estate Office Strategic Plan 2015 Real Estate Office Strategic Plan 2015 A. Current unit plans (this section is OPTIONAL): Please provide the URL for any current unit plans already in existence. NA. B. Unit mission/vision statement: Please

More information

Impact of New Internal Control Frameworks

Impact of New Internal Control Frameworks Impact of New Internal Control Frameworks Webcast: Tuesday, February 25, 2014 CPE Credit: 1 0 With You Today Bob Jacobson Principal, Risk Advisory Services Consulting Leader West Region Bob.Jacobson@mcgladrey.com

More information

GAO DATA CENTER CONSOLIDATION. Strengthened Oversight Needed to Achieve Cost Savings Goal. Report to Congressional Requesters

GAO DATA CENTER CONSOLIDATION. Strengthened Oversight Needed to Achieve Cost Savings Goal. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters April 2013 DATA CENTER CONSOLIDATION Strengthened Oversight Needed to Achieve Cost Savings Goal GAO-13-378 April 2013

More information

Executive Branch IT Reorganization Project Plan

Executive Branch IT Reorganization Project Plan Office of Information Resource Management Executive Branch Project Plan Work Program Funded by for IT Appropriations Reorganization 2007, 2009 and Five Small Projects Date: August 2009 Version: 1.3 Revision

More information

U.S. Nuclear Regulatory Commission

U.S. Nuclear Regulatory Commission U.S. Nuclear Regulatory Commission 2011 Data Center Consolidation Plan and Progress Report Version 2.0 September 30, 2011 Enclosure Contents 1 Introduction... 2 2 Agency Goals for Data Center Consolidation...

More information

PCI DSS. Payment Card Industry Data Security Standard. www.tuv.com/id

PCI DSS. Payment Card Industry Data Security Standard. www.tuv.com/id PCI DSS Payment Card Industry Data Security Standard www.tuv.com/id What Is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is the common security standard of all major credit cards brands.the

More information

State of Louisiana s Workforce Planning Model Right People, Right Skills, Right Jobs, Right Time

State of Louisiana s Workforce Planning Model Right People, Right Skills, Right Jobs, Right Time State of Louisiana s Workforce Planning Model Right People, Right Skills, Right Jobs, Right Time Table of Contents Introduction 2 What is Workforce Planning?...3 Why is Workforce Planning Important?.....3

More information

Sound Transit Internal Audit Report - No. 2014-3

Sound Transit Internal Audit Report - No. 2014-3 Sound Transit Internal Audit Report - No. 2014-3 IT Project Management Report Date: Dec. 26, 2014 Table of Contents Page Background 2 Audit Approach and Methodology 2 Summary of Results 4 Findings & Management

More information

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COMMITTEE OF SPONSORING ORGANIZATIONS (COSO) 2013 The Committee of Sponsoring Organizations (COSO) Internal Controls Integrated Framework,

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Customer Account Data Engine 2 Systems Development Guidelines; However, Process Improvements Are Needed to Address Inconsistencies September 30, Year

More information

IT Service Provider and Consumer Support Engineer Position Description

IT Service Provider and Consumer Support Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

INVESTMENT PLANNING AND PRIORITY SETTING: Management Approaches to Resource Allocation

INVESTMENT PLANNING AND PRIORITY SETTING: Management Approaches to Resource Allocation INVESTMENT PLANNING AND PRIORITY SETTING: Management Approaches to Resource Allocation Treasury Board Secretariat: Mel Thompson : Catherine Ella, P Eng, PMP Speakers Mel Thompson is the Principal Analyst

More information

ADMINISTRATOR PERFORMANCE APPRAISAL GUIDELINES

ADMINISTRATOR PERFORMANCE APPRAISAL GUIDELINES ADMINISTRATOR PERFORMANCE APPRAISAL GUIDELINES The Performance Appraisal Process at Madison College is designed to accomplish the following objectives: Encourage meaningful communication between the employee

More information

PCI Compliance Overview

PCI Compliance Overview PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)

More information

CERTIFIED ASSESSMENT OF HUMAN RESOURCE SYSTEMS

CERTIFIED ASSESSMENT OF HUMAN RESOURCE SYSTEMS A Report by a Panel of the NATIONAL ACADEMY OF PUBLIC ADMINISTRATION For the University of California July 2007 CERTIFIED ASSESSMENT OF HUMAN RESOURCE SYSTEMS A Pathway to Assurance Panel Frank Thompson,*

More information

IT Risk & Security Specialist Position Description

IT Risk & Security Specialist Position Description Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

2015 ANNUAL REPORT CHIEF INFORMATION OFFICER UNIVERSITY OF VIRGINIA

2015 ANNUAL REPORT CHIEF INFORMATION OFFICER UNIVERSITY OF VIRGINIA Summary In FY2014-15, goals for the CIO areas were aligned around two areas: the Cornerstone Plan (particularly Pillar V, Organizational Excellence, and Pillar II, Research Infrastructure and Services)

More information

Risk management and the transition of projects to business as usual

Risk management and the transition of projects to business as usual Advisory Risk management and the transition of projects to business as usual Financial Services kpmg.com 2 Risk Management and the Transition of Projects to Business as Usual Introduction Today s banks,

More information

WHITE PAPER December, 2008

WHITE PAPER December, 2008 INTRODUCTION Key to most IT organization s ongoing success is the leadership team s ability to anticipate, plan for, and adapt to change. With ever changing business/mission requirements, customer/user

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

Fixed Scope Offering for Oracle Fusion HCM. Slide 1

Fixed Scope Offering for Oracle Fusion HCM. Slide 1 Fixed Scope Offering for Oracle Fusion HCM Slide 1 Today s Business Challenges Adopt leading Global HCM practices. Streamline the HCM processes and achieve measurable efficiencies. Achieve HR excellence

More information

Online Compliance Program for PCI

Online Compliance Program for PCI Appendix F Online Compliance Program for PCI Service Description for PCI Compliance Monitors 1. General Introduction... 3 2. Online Compliance Program... 4 2.1 Introduction... 4 2.2 Portal Access... 4

More information

GTA Board of Directors September 4, 2014

GTA Board of Directors September 4, 2014 GTA Board of Directors September 4, 2014 Our Strategic Vision Our Mission A transparent, integrated enterprise where technology decisions are made with the citizen in mind To provide technology leadership

More information

RSA ARCHER AUDIT MANAGEMENT

RSA ARCHER AUDIT MANAGEMENT RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures

More information

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity Uncheck Yourself Build a Security-First Approach to Avoid Checkbox Compliance by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800

More information

Audit of the Data Center Consolidation Initiative at NARA. OIG Draft Audit Report No. 12-09. May 10, 2012

Audit of the Data Center Consolidation Initiative at NARA. OIG Draft Audit Report No. 12-09. May 10, 2012 Audit of the Data Center Consolidation Initiative at NARA OIG Draft Audit Report No. 12-09 May 10, 2012 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit

More information

Iowa State University Proposal for HR-01 ISU HR Operating Model

Iowa State University Proposal for HR-01 ISU HR Operating Model Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and

More information

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History

More information

Understanding the Performance Management Process

Understanding the Performance Management Process Understanding the Performance Management Process Monitoring Market Monitoring tools account for more then 50% of market Most organizations have not matured their monitoring environment Missing Process

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector

Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector Online learning is playing a critical role in the delivery of Teaching and Learning and the overall experience

More information

Sarbanes-Oxley (SOX) The Migration from Project to Process. Practical Actions for Getting Started. Jim DeLoach, Managing Director.

Sarbanes-Oxley (SOX) The Migration from Project to Process. Practical Actions for Getting Started. Jim DeLoach, Managing Director. Sarbanes-Oxley (SOX) The Migration from Project to Process Practical Actions for Getting Started Jim DeLoach, Managing Director November 7, 2006 The Results So Far? Source: AuditAnalytics.com May 2006

More information

Enhance State IT Contract Expertise

Enhance State IT Contract Expertise Enhance State IT Contract Expertise Chris Estes State Chief Information Officer Office of Information Technology Services March 2015 1 P a g e Table of Contents 1. Legislative Request... 3 2. Introduction...

More information

Sales Rep Frequently Asked Questions

Sales Rep Frequently Asked Questions V 02.21.13 Sales Rep Frequently Asked Questions OMEGA Processing Data Protection Program February 2013 - Updated In response to a national rise in data breaches and system compromises, OMEGA Processing

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information