RT for Incident Response (RTIR)

Size: px
Start display at page:

Download "RT for Incident Response (RTIR)"

Transcription

1 RT for Incident Response (RTIR) Andy Bone JANET-CERT Manager

2 What is RTIR A tool for incident handling Currently in Beta

3 Why Change History Increasing volume of incidents Requirement for multiple person triage System struggling to cope Need to increase resilience (BCP) Increase automation

4 JANET-CERT was using Remedy-ARS / IMAP based tool Unmaintained Designed for small team and smaller friendlier internet Required manual interaction for each incoming message New development would have been costly Limited platform support History Little built in workflow or integration with external tools Hard for multiple staff to work in parallel on the same incident

5 History What we wanted to do Allow JANET-CERT staff to manage increasing workload effectively Provide a base for other IR teams to build new tools Be easily extensible as new services need to be provided Save money

6 History How did we start Began by mapping workflow (through triage) Define requirements >

7 Define Requirements The buzz words Usable Cross platform Open-source Maintainable using current team skills Extensible using current team skills Securable Supported

8 History How did we start Began by mapping workflow (through triage) Define requirements > Evaluate current IHS solutions Request Tracker chosen >>

9 Request Tracker Chosen Why Request Tracker Designed to track issues It doesn t really care what sort What s it used for Bug tracking, helpdesk, customer service, abuse, network operations, sales lead tracking, to do lists. RT was close, but didn t have everything we needed

10 RT

11 RT

12 History How did we start Began by mapping workflow (through triage) Define requirements > Evaluate current IHS solutions Request Tracker chosen >> Extra development and support required >>>

13 New development What we wanted extra IRT specific workflows clicky data extraction and tracking whois integration >

14 whois

15 whois

16 New development What we wanted extra IRT specific workflows clicky data extraction and tracking whois integration > separate threads for each conversation convenient searching simple scriptable actions new reporting functionality tied into our new SLA requirement

17 History How did we start Began by mapping workflow (through triage) Define requirements > Evaluate current IHS solutions Request Tracker chosen >> Extra development and support required >>> Agree Statement of Work with Best Practical Work commenced Nov 2002 expected completion June 2003.

18 Home page

19 RTIR Structure Incident Reports Someone has a problem of some kind

20 Incident Reports

21 Incident Reports

22 RTIR Structure Incident Reports Someone has a problem of some kind Investigations IRT attempts to get to the root of the problem

23 Investigations

24 Investigations

25 RTIR Structure Incident Reports Someone has a problem of some kind Investigations IRT attempts to get to the root of the problem Blocks Track network level intervention against threat

26 Blocks

27 RTIR Structure Incident Reports Someone has a problem of some kind Investigations Blocks IRT attempts to get to the root of the problem Track network level intervention against threat Incidents Ties it all together. May have many related incident reports, investigations and blocks

28 Incidents

29 Incidents

30 Incidents

31 Incidents

32 The future Cross-IRT integration IODEF? RT-native integration Cross-tool integration PGP signing/validation Automatically create new incident reports for phenomena detected, but not if RT already knows about it. Auto-categorization of incoming incident reports? Other team implementations

33 Finding out more Closed list for incident response team staff

34 Questions

Request Tracker for Incident Response (RTIR)

Request Tracker for Incident Response (RTIR) Request Tracker for Incident Response (RTIR) Kevin Falcone Best Practical Solutions RT/RTIR RT RTIR Extending RTIR Future development of RTIR REQUEST TRACKER RT is a ticketing system Bugtracking Helpdesk

More information

RT and RT for Incident Response

RT and RT for Incident Response RT and RT for Incident Response I represent a software vendor We sell support, training, consulting and customization for RT, RTIR and RTFM This talk could be dangerously close to a sales pitch. I m not

More information

RT and RT for Incident Response

RT and RT for Incident Response RT and RT for Incident Response Carlos Fuentes Bermejo RTIR WG - Primary Technical Contact RedIRIS IRIS-CERT - Security Specialist Si habla español Couldn t be here today :( Jesse Vincent Designed RT and

More information

Designing and Developing an Application for Incident Response Teams

Designing and Developing an Application for Incident Response Teams Designing and Developing an Application for Incident Response Teams Kees Leune and Sebastiaan Tesink Tilburg University, The Netherlands FIRST 2006, Baltimore, MD, USA High-quality Internet for higher

More information

RTIR incident handling work-flow

RTIR incident handling work-flow RTIR incident handling work-flow JANET CSIRT JANET(UK) WI/JCSIRT/003 Page 1 of 18 INTRODUCTION Request Tracker for Incident Response (RTIR) is the incident handling and ticketing system used by JANET CSIRT,

More information

OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o.

OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o. HOMO Vulnerabilis Aghast Awarensis Dexterous Securis OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o. History postmaster@, hostmaster@, abuse@ Mailbox

More information

IT Support Tracking with Request Tracker (RT)

IT Support Tracking with Request Tracker (RT) IT Support Tracking with Request Tracker (RT) Archibald Steiner AfNOG 2013 LUSAKA Overview What is RT? A bit of terminology Demonstration of the RT web interface Behind the scenes configuration options

More information

WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012

WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012 WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012 The Challenge: Managing Distributed Applications in System Center 2012 System Center 2012 gives IT Operations managers

More information

Comindware Tracker. Reviewer s Guide. 2012 Comindware Inc.

Comindware Tracker. Reviewer s Guide. 2012 Comindware Inc. Comindware Tracker Reviewer s Guide 2012 Comindware Inc. 1 Dear Editor, We appreciate that you decided to try Comindware Tracker and write a review about it. We would like to make it easier for you and

More information

Changes in IANA Service March 2006

Changes in IANA Service March 2006 Changes in IANA Service March 2006 CENTR General Assembly 29 London, UK Kim Davies kim.davies@icann.org Our Key Current Projects 1. Workflow Systems 2. Policy Review 3. Website Development 4. 24x7x365

More information

Vector HelpDesk v6.0. What's New Bulletin. Feature rich internal and external customer support

Vector HelpDesk v6.0. What's New Bulletin. Feature rich internal and external customer support What's New Bulletin Vector HelpDesk v6.0 Feature rich internal and external customer support Version 6.0 represents more than two years of development and one of our most feature-rich releases ever. The

More information

PNMsoft Sequence Ticketing Solution (PSTS)

PNMsoft Sequence Ticketing Solution (PSTS) PNMsoft Sequence Ticketing Solution (PSTS) PNMsoft Sequence Ticketing Solution (PSTS) is a software solution built on an industry leading Business Process Management platform. It enables organizations

More information

BOOTSTRAPPING YOUR INFORMATION SECURITY PROGRAM. Brian Smith-Sweeney bsmithsweeney@nyu.edu @bsmithsweeney

BOOTSTRAPPING YOUR INFORMATION SECURITY PROGRAM. Brian Smith-Sweeney bsmithsweeney@nyu.edu @bsmithsweeney BOOTSTRAPPING YOUR INFORMATION SECURITY PROGRAM Brian Smith-Sweeney bsmithsweeney@nyu.edu @bsmithsweeney GOALS OF BOOTSTRAPPING Gain visibility Build capability Form relationships Get quick wins Establish

More information

Welcome to. CMS/ONC will be using JIRA to track issues or bugs associated with the electronic Clinical Quality Measures (ecqm)

Welcome to. CMS/ONC will be using JIRA to track issues or bugs associated with the electronic Clinical Quality Measures (ecqm) Welcome to JIRA is a software program that tracks issues and bugs. It also allows you to quickly search issues that have been resolved or are currently being worked on. CMS/ONC will be using JIRA to track

More information

Integration of Standardized Syntax and Semantics (Common Language) into CSIRT Operations

Integration of Standardized Syntax and Semantics (Common Language) into CSIRT Operations INFORMATION SOCIETIES TECHNOLOGY (IST) PROGRAMME Proposal acronym: Proposal full title: ecsirt.net European CSIRT Network Proposal/Contract number: IST-2001-37558 Integration of Standardized Syntax and

More information

Incident Informa.on Exchange in Darknet Monitoring System dra9- suzuki- mile- darknet- 00

Incident Informa.on Exchange in Darknet Monitoring System dra9- suzuki- mile- darknet- 00 Incident Informa.on Exchange in Darknet Monitoring System dra9- suzuki- mile- darknet- 00 Mio Suzuki Cybersecurity Laboratory Network Security Research Institute National Institute of Information and Communications

More information

Add Approval Workflow

Add Approval Workflow Add Approval Workflow Add Approval workflow to a list or library The workflows included with SharePoint products are features that you can use to automate your business processes, making them both more

More information

User and Customer Interviews How XSOL has assisted ERP implementations. Survey

User and Customer Interviews How XSOL has assisted ERP implementations. Survey User and Customer Interviews How XSOL has assisted ERP implementations Survey Summary I can honestly say I have worked with a lot of technology companies and this is the first time I ve had the same resounding

More information

How to Build a Service Management Hub for Digital Service Innovation

How to Build a Service Management Hub for Digital Service Innovation solution white paper How to Build a Service Management Hub for Digital Service Innovation Empower IT and business agility by taking ITSM to the cloud Table of Contents 1 EXECUTIVE SUMMARY The Mission:

More information

Written by: Johan Strand, Reviewed by: Chafic Nassif, Date: 2006-04-26. Getting an ipath server running on Linux

Written by: Johan Strand, Reviewed by: Chafic Nassif, Date: 2006-04-26. Getting an ipath server running on Linux Getting an ipath server running on Linux Table of Contents Table of Contents... 2 1.0. Introduction... 3 2.0. Overview... 3 3.0. Installing Linux... 3 4.0. Installing software that ipath requires... 3

More information

Managing Amazon Web Services within a Hybrid IT model

Managing Amazon Web Services within a Hybrid IT model Managing Amazon Web Services within a Hybrid IT model The last few years have seen revolutionary changes to IT operations as technology infrastructure has been transformed through virtualisation, and the

More information

The problem with privileged users: What you don t know can hurt you

The problem with privileged users: What you don t know can hurt you The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so

More information

FULLY MANAGED SERVICE COMPLETE SUPPORT FOR YOUR MOBILE ENTERPRISE

FULLY MANAGED SERVICE COMPLETE SUPPORT FOR YOUR MOBILE ENTERPRISE FULLY MANAGED SERVICE COMPLETE SUPPORT FOR YOUR MOBILE ENTERPRISE At Spirit, we realise that our customers are looking for choice, flexibility and value. That s why we have developed our special Fully

More information

Designing and developing an Application for Incident Response Teams

Designing and developing an Application for Incident Response Teams Designing and developing an Application for Incident Response Teams Kees Leune and Sebastiaan Tesink {kees,sebas}@uvt.nl Tilburg University, Infolab The Netherlands May 9, 2006 Abstract Computer security

More information

everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service]

everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] [Essential Third Party Integration] [Cross Platform Service Desk Solution] [Reporting

More information

Add Feedback Workflow

Add Feedback Workflow Add Feedback Workflow Add Feedback Collection workflow to a list or library The workflows included with SharePoint products are features that you can use to automate your business processes, making them

More information

WRS CLIENT CASE STUDIES

WRS CLIENT CASE STUDIES WRS Billing Services are great: the fees are low, I can track everything on the computer, and it s all very easy for me to look at. Emily Gordon, M.D. Vital Signs Medical Associates Middletown, NY Vital

More information

Meanings of different Social Services meetings

Meanings of different Social Services meetings Meanings of different Social Services meetings Your Advocate will talk to you before a meeting to find out what you want to say, in case you don t want to talk yourself. Your Advocate can talk to you after

More information

How to measure your business resiliency

How to measure your business resiliency How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic krzysztof.pulkiewicz@bcmlogic.com

More information

IBM Welcomes the British Print Industry Federation to Warwick

IBM Welcomes the British Print Industry Federation to Warwick IBM Welcomes the British Print Industry Federation to Warwick UK Print Industry Transformation IBM in Association with the British Printing Industry Federation 2005 IBM Corporation IBM Printing Systems

More information

How Freshservice helped Moneycorp streamline their IT Support

How Freshservice helped Moneycorp streamline their IT Support How Freshservice helped Moneycorp streamline their IT Support Moneycorp (TTT Moneycorp Limited) is a UK company offering foreign exchange services to individual and corporate customers. It operates in

More information

White Paper: The SaaSy Approach to Delivering Electronic Health Records

White Paper: The SaaSy Approach to Delivering Electronic Health Records This white paper explains how Amazing Charts in Cloud can transform your practice without forcing you to sacrifice productivity or take on the costs of hosting your own EHR. White Paper: The SaaSy Approach

More information

The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs Siemens AG 2014. All rights reserved

The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs Siemens AG 2014. All rights reserved B. Grobauer, S.Berger, J. Göbel, T. Schreck, J. Wallinger Siemens CERT The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs Note MANTIS is available as Open Source under GPL v2+ from https://github.com/siemens/django-mantis

More information

Looking back on how desktop support has evolved, it s interesting to see how tools

Looking back on how desktop support has evolved, it s interesting to see how tools DECEMBER 2013 Desktop Support Technology Written by Michael Hanson Data analysis by Jenny Rains Looking back on how desktop support has evolved, it s interesting to see how tools have changed. Many years

More information

Top 5 IT Service Provider Fails and what to do about them. connectsmart.com (954) 624-9566 info@connectsmart.com

Top 5 IT Service Provider Fails and what to do about them. connectsmart.com (954) 624-9566 info@connectsmart.com Top 5 IT Service Provider Fails and what to do about them connectsmart.com (954) 624-9566 info@connectsmart.com INTRO As a service provider, we ve all implemented solutions to automate and connect all

More information

Two Factor Authentication - A Simple Way to Compare Costs and Risks

Two Factor Authentication - A Simple Way to Compare Costs and Risks The Hidden Costs and Risks of DIY Two Factor Authentication Foreword Dave Abraham examines the real costs involved in implementing and managing two factor authentication (2FA) in-house. Dave Abraham is

More information

quality hosting solution. we manage your hosting. so that you can manage your business.

quality hosting solution. we manage your hosting. so that you can manage your business. quality hosting solution. we manage your hosting. so that you can manage your business. Orisma Technology Co., Ltd. 1104/2 Pattanakarn Rd. Suanluang, Suanluang Bangkok 10250, Thailand Tel. 66 2187 2591-3

More information

FORMS-DRIVEN WORKFLOW SOLUTIONS WHITE PAPER

FORMS-DRIVEN WORKFLOW SOLUTIONS WHITE PAPER FORMS-DRIVEN WORKFLOW SOLUTIONS WHITE PAPER www.nintex.com CONTENTS INTRODUCTION...................................................... 3 KEY CONCEPTS OF MODERN FORMS SOLUTIONS................................

More information

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang marco_zhang@dell.com

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang marco_zhang@dell.com PCI DSS Compliance: The Importance of Privileged Management Marco Zhang marco_zhang@dell.com What is a privileged account? 2 Lots of privileged accounts Network Devices Databases Servers Mainframes Applications

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning We believe all organisations recognise the importance of having a Business Continuity Plan, however we understand that it can be difficult to know where to start. That s why

More information

'& ##! %1# ##!!* #!!! 23!!!

'& ##! %1# ##!!* #!!! 23!!! !" 1 !"# $ Companies invest a lot of time and money into tools for functional test automation and performance testing. I think this tends to lead to the belief that the best way to utilize these tools

More information

How to Define SIEM Strategy, Management and Success in the Enterprise

How to Define SIEM Strategy, Management and Success in the Enterprise How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have

More information

versasrs HelpDesk quality of service

versasrs HelpDesk quality of service Case Study / Interview Adelaide City Council / Corporate Property versasrs HelpDesk has greatly improved the entire business process for service requests from start to completion.. And we have only touched

More information

Why Companies are Integrating DAM & Online Proofing

Why Companies are Integrating DAM & Online Proofing Why Companies are Integrating DAM & Online Proofing DAM There are a growing number of organizations who have or are planning to integrate their Digital Asset Management (DAM) system with an Online Proofing

More information

UW Connect Update & Incident Management Overview

UW Connect Update & Incident Management Overview UW Connect Update & Incident Management Overview Mary Mulvihill, Service Management Office Mike Houlihan, Process Owner Service Management Board Meeting May 19, 2014 Outline UW Connect implementation update

More information

Software Development Lifecycle. Steve Macbeth Group Program Manager Search Technology Center Microsoft Research Asia

Software Development Lifecycle. Steve Macbeth Group Program Manager Search Technology Center Microsoft Research Asia Software Development Lifecycle Steve Macbeth Group Program Manager Search Technology Center Microsoft Research Asia About Me Currently manage a team of 10 Program Managers at Microsoft Research Asia Over

More information

Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users. https://kayako-test.cv.nrao.edu/

Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users. https://kayako-test.cv.nrao.edu/ Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users NAME ROLE: USER To submit helpdesk tickets you can access the helpdesk directly at: https://kayako-test.cv.nrao.edu/ NOTE: Due diligence needs to

More information

How to Exercise a Business Continuity Plan (BCP)

How to Exercise a Business Continuity Plan (BCP) How to Exercise a Business Continuity Plan (BCP) This document provides a step by step guide to exercising a Business Continuity Plan (BCP). The exercise of a BCP should not be undertaken in isolation,

More information

Beta UX DistributionMaster

Beta UX DistributionMaster Beta UX DistributionMaster High-Performance Output Management System for Unix Platforms Centralized administration and distribution of documents throughout the company regardless of the originating platform,

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

Re-thinking IT End User Support A simple, clear and compelling End User support strategy for the future

Re-thinking IT End User Support A simple, clear and compelling End User support strategy for the future Mark Bennett 25 th November 2015 Re-thinking IT End User Support A simple, clear and compelling End User support strategy for the future Rethinking IT Support IT Care Leadership & Culture IT Care Self

More information

Enterprise Data Supply Chain Management

Enterprise Data Supply Chain Management Enterprise Data Supply Chain Management What You Need to Know July 2015 www.stonebranch.com Abstract Of all the assets a company owns, perhaps the most valuable is its data. This data has its highest meaning

More information

Introduction. 1. Integrates with your existing system. 2. Doesn t alter your existing system

Introduction. 1. Integrates with your existing system. 2. Doesn t alter your existing system Introduction According to Forrester, approximately half of ERP customers are currently on releases that are two versions behind the current release, which may be four years old or more. For these companies,

More information

SQL Azure and SqlBulkCopy

SQL Azure and SqlBulkCopy SQL Azure and SqlBulkCopy Presented by Herve Roggero Managing Partner, Blue Syntax Consulting SQL Azure MVP Email: hroggero@bluesyntax.net Twitter: @hroggero LinkedIn: SQL Azure and SQL Server Security

More information

4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook

4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook 29 29 4. Exercise: Developing CERT Infrastructure Main Objective Targeted Audience Total Duration To learn what kind of software and hardware solutions could be used to provide a particular CERT service

More information

AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE

AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE Ref: Chapter 3.1 GOVERNANCE FRAMEWORK Information Technology Steering Committee

More information

Building a Successful Business Continuity Program. Clyde Hague, CISM, CISSP, CRISC Information Security Officer First Merchants Corporation

Building a Successful Business Continuity Program. Clyde Hague, CISM, CISSP, CRISC Information Security Officer First Merchants Corporation Building a Successful Business Continuity Program Clyde Hague, CISM, CISSP, CRISC Information Security Officer First Merchants Corporation Discussion Topics Breaking Down the Parts Create a Solid Base

More information

GRIDS IN DATA WAREHOUSING

GRIDS IN DATA WAREHOUSING GRIDS IN DATA WAREHOUSING By Madhu Zode Oct 2008 Page 1 of 6 ABSTRACT The main characteristic of any data warehouse is its ability to hold huge volume of data while still offering the good query performance.

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects

Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their

More information

Cubic Live Services. Cubic Live s Strengths. Messaging Solutions & Services. Collaboration Solution & Services

Cubic Live Services. Cubic Live s Strengths. Messaging Solutions & Services. Collaboration Solution & Services Cubic Live Services Messaging Solutions & Services Hosted / In-house of Exchange 2010 Hosted / In-house of Cube Mail / Zimbra Email Hosted / In-house of Cube MailBank Mail Archiving Solution Hosted / In-house

More information

Groupware Project Definition: Scope of Project

Groupware Project Definition: Scope of Project Groupware Project Groupware Project Definition: Scope of Project Authors Mark Norman, Stuart Lee, Michael Fraser, Paul Davis Contents 1. Introduction...1 2. Management...2 3. Summary of the Project Deliverables...2

More information

Managing Agile Projects in TestTrack GUIDE

Managing Agile Projects in TestTrack GUIDE Managing Agile Projects in TestTrack GUIDE Table of Contents Introduction...1 Automatic Traceability...2 Setting Up TestTrack for Agile...6 Plan Your Folder Structure... 10 Building Your Product Backlog...

More information

Manual. Ticket Center Manual. Ticket Center 2: 1.0 1.1. May 17, 2013. AdNovum Informatik AG. Released. AdNovum Informatik AG. All rights reserved.

Manual. Ticket Center Manual. Ticket Center 2: 1.0 1.1. May 17, 2013. AdNovum Informatik AG. Released. AdNovum Informatik AG. All rights reserved. DESCRIPTION: Ticket Center RELEASE: Ticket Center 2: 1.0 DOCUMENT VERSION: 1.1 DATE: May 17, 2013 AUTHORS: AdNovum Informatik AG STATUS: Released AdNovum Informatik AG. All rights reserved. Contents 1

More information

Summary of a Score-P Governance Project

Summary of a Score-P Governance Project Score-P Governance Model Revision: 1675 Date: 2014-11-13 08:28:36 +0100 (Thu, 13 Nov 2014) David Böhme, Christian Feld, Felix Wolf 1 Mission Statement The Score-P project develops software for profiling,

More information

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012 SES / CIF Internet2 Combined Industry and Research Constituency Meeting April 24, 2012 Doug Pearson Technical Director, REN-ISAC dodpears@ren-isac.net Background on REN-ISAC The REN-ISAC mission is to

More information

Data Wrangling: The Elephant in the Room of Big Data. Norman Paton University of Manchester

Data Wrangling: The Elephant in the Room of Big Data. Norman Paton University of Manchester Data Wrangling: The Elephant in the Room of Big Data Norman Paton University of Manchester Data Wrangling Definitions: a process of iterative data exploration and transformation that enables analysis [1].

More information

Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products

Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products LANDESK Momentum Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products improve your ROI Upcoming Webinars: Visit: www.landesk.com/momentum

More information

A How-to Guide By: Riaan Van Der Merwe, General Manager, Dynamics, Neudesic

A How-to Guide By: Riaan Van Der Merwe, General Manager, Dynamics, Neudesic Managing Dynamics CRM 2013 Applications from Cradle to Grave A How-to Guide By: Riaan Van Der Merwe, General Manager, Dynamics, Neudesic Table of Contents Introduction...3 Creating the Right Fit...3 Solutions

More information

MANAGEMENT SYSTEM BASED ON OPEN SOURCE TOOLS

MANAGEMENT SYSTEM BASED ON OPEN SOURCE TOOLS 10th ICALEPCS Int. Conf. on Accelerator & Large Expt. Physics Control Systems. Geneva, 10-14 Oct 2005, WE3A.4-6O (2005) MANAGEMENT SYSTEM BASED ON OPEN SOURCE TOOLS I. Verstovšek 1, J. Kamenik 1 1Cosylab,

More information

Best Practices for Java Projects Horst Rechner

Best Practices for Java Projects Horst Rechner Best Practices for Java Projects Horst Rechner Abstract: The combination of automated builds with module and integration tests and centralized bug and work tracking using a combination of Eclipse, Mylyn,

More information

Implementing HIPAA into a Compliance Program

Implementing HIPAA into a Compliance Program Implementing HIPAA into a Compliance Program HCCA Annual Conference April 24, 2002 Kenneth W. Fody, Esq. - Independence Blue Cross Carole A. Klove, RN, JD Deloitte & Touche Agenda Introductions The HIPAA

More information

Free Software Configuration Management (SCM) Is it worth it?

Free Software Configuration Management (SCM) Is it worth it? d Free Software Configuration Management (SCM) Is it worth it? Considerations When Comparing Open- Source SCM to Commercial SCM Solutions Authored by: David Kelly and Heather Ashton Upside Research, Inc.

More information

23.9.2015. Kangas Cybersecurity strategy

23.9.2015. Kangas Cybersecurity strategy Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures

More information

PRETTY EASY PRIVACY 05-2014

PRETTY EASY PRIVACY 05-2014 PRETTY EASY PRIVACY 05-2014 It is called kinko Overview introduction spot the problem building good crypto tools challenges more than tools get involved Snowden 2013......rekindled interest in privacy.

More information

Welcome to the CQA Connect Online Portal

Welcome to the CQA Connect Online Portal Welcome to the CQA Connect Online Portal 2015/2016 Visit www.colesqualityacademy.saiglobal.com What is CQA Connect? CQA Connect is an extension of the Coles Quality Academy, for suppliers working in partnership

More information

versasrs HelpDesk quality of service

versasrs HelpDesk quality of service Case Study / Interview City Of West Torrens Now we are identifying issues clearly, be that with a user, or a piece of equipment or an application, we now have a better idea of what is going on. From a

More information

Business Process Automation

Business Process Automation Business Process Automation 5 THINGS YOU NEED TO KNOW As technology improves, connectivity increases and budgets shrink or stay flat, more and more businesses large and small, business-to-business (B2B)

More information

A Process is Not Just a Flowchart (or a BPMN model)

A Process is Not Just a Flowchart (or a BPMN model) A Process is Not Just a Flowchart (or a BPMN model) The two methods of representing process designs that I see most frequently are process drawings (typically in Microsoft Visio) and BPMN models (and often

More information

The Challenge. Key Challenges at CG Power Systems (Ireland) When Stephen McSharry (Engineering Manager), took over the responsibility

The Challenge. Key Challenges at CG Power Systems (Ireland) When Stephen McSharry (Engineering Manager), took over the responsibility The Challenge Key Challenges at CG Power Systems (Ireland) When Stephen McSharry (Engineering Manager), took over the responsibility of the maintenance department in CG Power Systems Ireland (CG) in 2007,

More information

Real world experiences for CMDB Success

Real world experiences for CMDB Success Real world experiences for CMDB Success Gaurav Dutt Uniyal Infosys Technologies Limited The CMDB and CMS - the Powerhouse of Service Management 8 th July 2008 Agenda The present state CMDB implementation

More information

Information Management Resource Kit. Module on Management of Electronic Documents

Information Management Resource Kit. Module on Management of Electronic Documents Information Management Resource Kit Module on Management of Electronic Documents UNIT 5. DATABASE MANAGEMENT SYSTEMS LESSON 3. USING A DATABASE FOR DOCUMENT MANAGEMENT NOTE Please note that this PDF version

More information

MARYLAND S FOCUS SCHOOLS LEADERSHIP COMMUNITY OF PRACTICE

MARYLAND S FOCUS SCHOOLS LEADERSHIP COMMUNITY OF PRACTICE MARYLAND S FOCUS SCHOOLS LEADERSHIP COMMUNITY OF PRACTICE In May 2012, the Maryland State Department of Education (MSDE) was granted a Waiver from NCLB, which they had to implement beginning in June. MSDE

More information

Business Continuity Policy and Business Continuity Management System

Business Continuity Policy and Business Continuity Management System Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain

More information

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS

More information

By default, the Dashboard Search Lists show tickets in all statuses except Closed.

By default, the Dashboard Search Lists show tickets in all statuses except Closed. Set Up 1. Login with NetId at http://fpweb.utk.edu 2. The first time you login, you will be asked to run this: 3. Enable Pop ups from FootPrints Creating Searches to Show Active Status Tickets By default,

More information

HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013

HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013 HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013 Riley Moses Bri Fidder Jon Lewis Introduction & Product Vision BIMShift is a company that provides all

More information

A White Paper from AccessData Group. Cerberus. Malware Triage and Analysis

A White Paper from AccessData Group. Cerberus. Malware Triage and Analysis A White Paper from AccessData Group Cerberus Malware Triage and Analysis What is Cerberus? Cerberus is the first-ever automated reverse engineering tool designed to show a security analyst precisely what

More information

DATATRAK Customer Case Study

DATATRAK Customer Case Study DATATRAK Customer Case Study DATATRAK: A Success Story of Traceability and Process Transparency This case study explores how DATATRAK International, Inc., a company offering software solutions and consulting

More information

Workflow/Business Process Management

Workflow/Business Process Management 1 Workflow/Business Process Management Andy C. Tran Staff Systems Engineer 2 Agenda Business Process Management Overview Demo 3 Generic Case based Work Flow Pattern Case Initiation Case Assessment & Assignment

More information

Graduating CRM Beyond Pipeline Management CRM

Graduating CRM Beyond Pipeline Management CRM Graduating CRM Beyond Pipeline CRM Graduating CRM Beyond Pipeline Graduating CRM Beyond Pipeline So you ve got your CRM deployment running smoothly. Congrats to you! If you re like most of our customers,

More information

How To Use Open Source Software For Library Work

How To Use Open Source Software For Library Work USE OF OPEN SOURCE SOFTWARE AT THE NATIONAL LIBRARY OF AUSTRALIA Reports on Special Subjects ABSTRACT The National Library of Australia has been a long-term user of open source software to support generic

More information

Zoho Projects. Social collaborative project management platform

Zoho Projects. Social collaborative project management platform Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its

More information

EFFICIENT KNOWLEDGE MANAGEMENT: A PEAK PERFORMANCE SOLUTION TO STAKEHOLDER ENGAGEMENT WHITE PAPER

EFFICIENT KNOWLEDGE MANAGEMENT: A PEAK PERFORMANCE SOLUTION TO STAKEHOLDER ENGAGEMENT WHITE PAPER EFFICIENT KNOWLEDGE MANAGEMENT: A PEAK PERFORMANCE SOLUTION TO STAKEHOLDER ENGAGEMENT WHITE PAPER SEPTEMBER 2010 EFFICIENT KNOWLEDGE MANAGEMENT: A PEAK PERFORMANCE SOLUTION TO STAKEHOLDER ENGAGEMENT WHITE

More information

How Can Scheduling Software Impact on Service?

How Can Scheduling Software Impact on Service? How Can Scheduling Software Impact on Service? A white paper written by Steve Downton and commissioned by Solarvista 31/10/13 V 1 Contents Executive Summary 4 To Schedule or Not to Schedule? 6 Manual,

More information

T-MOBILE USES SOCIAL MEDIA ANALYTICS TO BOOST EFFICIENCY

T-MOBILE USES SOCIAL MEDIA ANALYTICS TO BOOST EFFICIENCY T-MOBILE USES SOCIAL MEDIA ANALYTICS TO BOOST EFFICIENCY The Dutch T-Mobile has been active on social media for almost 5 years now. Initially, their focus was on forums, which have now been accompanied

More information

WORKPLACE SAFETY AND INSURANCE APPEALS TRIBUNAL

WORKPLACE SAFETY AND INSURANCE APPEALS TRIBUNAL 2005 ONWSIAT 1489 WORKPLACE SAFETY AND INSURANCE APPEALS TRIBUNAL DECISION NO. 627/05 [1] This appeal was heard in Ottawa on April 1, 2005, by a Tribunal Panel consisting of: B. Alexander: Vice-Chair,

More information

Email the wrong tool in the right place? EmAil when used for business

Email the wrong tool in the right place? EmAil when used for business Email the wrong tool in the right place? A guide to the hidden costs of EmAil when used for business transaction processing introduction Email is an amazing tool that has revolutionised business communications

More information

SaaS project development PERSIA, THE APPLICATION FOR RECRUITMENT PROCESSES AUTOMATION. www.persiahr.com

SaaS project development PERSIA, THE APPLICATION FOR RECRUITMENT PROCESSES AUTOMATION. www.persiahr.com SaaS project development PERSIA, THE APPLICATION FOR RECRUITMENT PROCESSES AUTOMATION www.persiahr.com PROJECT DESCRIPTION Persia is a Web application that automates human resources recruiting processes.

More information