RT for Incident Response (RTIR)
|
|
- Audrey Robertson
- 8 years ago
- Views:
Transcription
1 RT for Incident Response (RTIR) Andy Bone JANET-CERT Manager
2 What is RTIR A tool for incident handling Currently in Beta
3 Why Change History Increasing volume of incidents Requirement for multiple person triage System struggling to cope Need to increase resilience (BCP) Increase automation
4 JANET-CERT was using Remedy-ARS / IMAP based tool Unmaintained Designed for small team and smaller friendlier internet Required manual interaction for each incoming message New development would have been costly Limited platform support History Little built in workflow or integration with external tools Hard for multiple staff to work in parallel on the same incident
5 History What we wanted to do Allow JANET-CERT staff to manage increasing workload effectively Provide a base for other IR teams to build new tools Be easily extensible as new services need to be provided Save money
6 History How did we start Began by mapping workflow (through triage) Define requirements >
7 Define Requirements The buzz words Usable Cross platform Open-source Maintainable using current team skills Extensible using current team skills Securable Supported
8 History How did we start Began by mapping workflow (through triage) Define requirements > Evaluate current IHS solutions Request Tracker chosen >>
9 Request Tracker Chosen Why Request Tracker Designed to track issues It doesn t really care what sort What s it used for Bug tracking, helpdesk, customer service, abuse, network operations, sales lead tracking, to do lists. RT was close, but didn t have everything we needed
10 RT
11 RT
12 History How did we start Began by mapping workflow (through triage) Define requirements > Evaluate current IHS solutions Request Tracker chosen >> Extra development and support required >>>
13 New development What we wanted extra IRT specific workflows clicky data extraction and tracking whois integration >
14 whois
15 whois
16 New development What we wanted extra IRT specific workflows clicky data extraction and tracking whois integration > separate threads for each conversation convenient searching simple scriptable actions new reporting functionality tied into our new SLA requirement
17 History How did we start Began by mapping workflow (through triage) Define requirements > Evaluate current IHS solutions Request Tracker chosen >> Extra development and support required >>> Agree Statement of Work with Best Practical Work commenced Nov 2002 expected completion June 2003.
18 Home page
19 RTIR Structure Incident Reports Someone has a problem of some kind
20 Incident Reports
21 Incident Reports
22 RTIR Structure Incident Reports Someone has a problem of some kind Investigations IRT attempts to get to the root of the problem
23 Investigations
24 Investigations
25 RTIR Structure Incident Reports Someone has a problem of some kind Investigations IRT attempts to get to the root of the problem Blocks Track network level intervention against threat
26 Blocks
27 RTIR Structure Incident Reports Someone has a problem of some kind Investigations Blocks IRT attempts to get to the root of the problem Track network level intervention against threat Incidents Ties it all together. May have many related incident reports, investigations and blocks
28 Incidents
29 Incidents
30 Incidents
31 Incidents
32 The future Cross-IRT integration IODEF? RT-native integration Cross-tool integration PGP signing/validation Automatically create new incident reports for phenomena detected, but not if RT already knows about it. Auto-categorization of incoming incident reports? Other team implementations
33 Finding out more Closed list for incident response team staff
34 Questions
Request Tracker for Incident Response (RTIR)
Request Tracker for Incident Response (RTIR) Kevin Falcone Best Practical Solutions RT/RTIR RT RTIR Extending RTIR Future development of RTIR REQUEST TRACKER RT is a ticketing system Bugtracking Helpdesk
More informationRT and RT for Incident Response
RT and RT for Incident Response I represent a software vendor We sell support, training, consulting and customization for RT, RTIR and RTFM This talk could be dangerously close to a sales pitch. I m not
More informationRT and RT for Incident Response
RT and RT for Incident Response Carlos Fuentes Bermejo RTIR WG - Primary Technical Contact RedIRIS IRIS-CERT - Security Specialist Si habla español Couldn t be here today :( Jesse Vincent Designed RT and
More informationDesigning and Developing an Application for Incident Response Teams
Designing and Developing an Application for Incident Response Teams Kees Leune and Sebastiaan Tesink Tilburg University, The Netherlands FIRST 2006, Baltimore, MD, USA High-quality Internet for higher
More informationCopyright 2005-2010 Soleran, Inc. esalestrack On-Demand CRM. Trademarks and all rights reserved. esalestrack is a Soleran product Privacy Statement
More information
RTIR incident handling work-flow
RTIR incident handling work-flow JANET CSIRT JANET(UK) WI/JCSIRT/003 Page 1 of 18 INTRODUCTION Request Tracker for Incident Response (RTIR) is the incident handling and ticketing system used by JANET CSIRT,
More informationOTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o.
HOMO Vulnerabilis Aghast Awarensis Dexterous Securis OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o. History postmaster@, hostmaster@, abuse@ Mailbox
More informationIT Support Tracking with Request Tracker (RT)
IT Support Tracking with Request Tracker (RT) Archibald Steiner AfNOG 2013 LUSAKA Overview What is RT? A bit of terminology Demonstration of the RT web interface Behind the scenes configuration options
More informationWHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012
WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012 The Challenge: Managing Distributed Applications in System Center 2012 System Center 2012 gives IT Operations managers
More informationComindware Tracker. Reviewer s Guide. 2012 Comindware Inc.
Comindware Tracker Reviewer s Guide 2012 Comindware Inc. 1 Dear Editor, We appreciate that you decided to try Comindware Tracker and write a review about it. We would like to make it easier for you and
More informationChanges in IANA Service March 2006
Changes in IANA Service March 2006 CENTR General Assembly 29 London, UK Kim Davies kim.davies@icann.org Our Key Current Projects 1. Workflow Systems 2. Policy Review 3. Website Development 4. 24x7x365
More informationVector HelpDesk v6.0. What's New Bulletin. Feature rich internal and external customer support
What's New Bulletin Vector HelpDesk v6.0 Feature rich internal and external customer support Version 6.0 represents more than two years of development and one of our most feature-rich releases ever. The
More informationPNMsoft Sequence Ticketing Solution (PSTS)
PNMsoft Sequence Ticketing Solution (PSTS) PNMsoft Sequence Ticketing Solution (PSTS) is a software solution built on an industry leading Business Process Management platform. It enables organizations
More informationBOOTSTRAPPING YOUR INFORMATION SECURITY PROGRAM. Brian Smith-Sweeney bsmithsweeney@nyu.edu @bsmithsweeney
BOOTSTRAPPING YOUR INFORMATION SECURITY PROGRAM Brian Smith-Sweeney bsmithsweeney@nyu.edu @bsmithsweeney GOALS OF BOOTSTRAPPING Gain visibility Build capability Form relationships Get quick wins Establish
More informationWelcome to. CMS/ONC will be using JIRA to track issues or bugs associated with the electronic Clinical Quality Measures (ecqm)
Welcome to JIRA is a software program that tracks issues and bugs. It also allows you to quickly search issues that have been resolved or are currently being worked on. CMS/ONC will be using JIRA to track
More informationIntegration of Standardized Syntax and Semantics (Common Language) into CSIRT Operations
INFORMATION SOCIETIES TECHNOLOGY (IST) PROGRAMME Proposal acronym: Proposal full title: ecsirt.net European CSIRT Network Proposal/Contract number: IST-2001-37558 Integration of Standardized Syntax and
More informationIncident Informa.on Exchange in Darknet Monitoring System dra9- suzuki- mile- darknet- 00
Incident Informa.on Exchange in Darknet Monitoring System dra9- suzuki- mile- darknet- 00 Mio Suzuki Cybersecurity Laboratory Network Security Research Institute National Institute of Information and Communications
More informationAdd Approval Workflow
Add Approval Workflow Add Approval workflow to a list or library The workflows included with SharePoint products are features that you can use to automate your business processes, making them both more
More informationUser and Customer Interviews How XSOL has assisted ERP implementations. Survey
User and Customer Interviews How XSOL has assisted ERP implementations Survey Summary I can honestly say I have worked with a lot of technology companies and this is the first time I ve had the same resounding
More informationHow to Build a Service Management Hub for Digital Service Innovation
solution white paper How to Build a Service Management Hub for Digital Service Innovation Empower IT and business agility by taking ITSM to the cloud Table of Contents 1 EXECUTIVE SUMMARY The Mission:
More informationWritten by: Johan Strand, Reviewed by: Chafic Nassif, Date: 2006-04-26. Getting an ipath server running on Linux
Getting an ipath server running on Linux Table of Contents Table of Contents... 2 1.0. Introduction... 3 2.0. Overview... 3 3.0. Installing Linux... 3 4.0. Installing software that ipath requires... 3
More informationManaging Amazon Web Services within a Hybrid IT model
Managing Amazon Web Services within a Hybrid IT model The last few years have seen revolutionary changes to IT operations as technology infrastructure has been transformed through virtualisation, and the
More informationThe problem with privileged users: What you don t know can hurt you
The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so
More informationFULLY MANAGED SERVICE COMPLETE SUPPORT FOR YOUR MOBILE ENTERPRISE
FULLY MANAGED SERVICE COMPLETE SUPPORT FOR YOUR MOBILE ENTERPRISE At Spirit, we realise that our customers are looking for choice, flexibility and value. That s why we have developed our special Fully
More informationDesigning and developing an Application for Incident Response Teams
Designing and developing an Application for Incident Response Teams Kees Leune and Sebastiaan Tesink {kees,sebas}@uvt.nl Tilburg University, Infolab The Netherlands May 9, 2006 Abstract Computer security
More informationeverything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service]
everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] [Essential Third Party Integration] [Cross Platform Service Desk Solution] [Reporting
More informationAdd Feedback Workflow
Add Feedback Workflow Add Feedback Collection workflow to a list or library The workflows included with SharePoint products are features that you can use to automate your business processes, making them
More informationWRS CLIENT CASE STUDIES
WRS Billing Services are great: the fees are low, I can track everything on the computer, and it s all very easy for me to look at. Emily Gordon, M.D. Vital Signs Medical Associates Middletown, NY Vital
More informationMeanings of different Social Services meetings
Meanings of different Social Services meetings Your Advocate will talk to you before a meeting to find out what you want to say, in case you don t want to talk yourself. Your Advocate can talk to you after
More informationHow to measure your business resiliency
How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic krzysztof.pulkiewicz@bcmlogic.com
More informationIBM Welcomes the British Print Industry Federation to Warwick
IBM Welcomes the British Print Industry Federation to Warwick UK Print Industry Transformation IBM in Association with the British Printing Industry Federation 2005 IBM Corporation IBM Printing Systems
More informationHow Freshservice helped Moneycorp streamline their IT Support
How Freshservice helped Moneycorp streamline their IT Support Moneycorp (TTT Moneycorp Limited) is a UK company offering foreign exchange services to individual and corporate customers. It operates in
More informationWhite Paper: The SaaSy Approach to Delivering Electronic Health Records
This white paper explains how Amazing Charts in Cloud can transform your practice without forcing you to sacrifice productivity or take on the costs of hosting your own EHR. White Paper: The SaaSy Approach
More informationThe MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs Siemens AG 2014. All rights reserved
B. Grobauer, S.Berger, J. Göbel, T. Schreck, J. Wallinger Siemens CERT The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs Note MANTIS is available as Open Source under GPL v2+ from https://github.com/siemens/django-mantis
More informationLooking back on how desktop support has evolved, it s interesting to see how tools
DECEMBER 2013 Desktop Support Technology Written by Michael Hanson Data analysis by Jenny Rains Looking back on how desktop support has evolved, it s interesting to see how tools have changed. Many years
More informationTop 5 IT Service Provider Fails and what to do about them. connectsmart.com (954) 624-9566 info@connectsmart.com
Top 5 IT Service Provider Fails and what to do about them connectsmart.com (954) 624-9566 info@connectsmart.com INTRO As a service provider, we ve all implemented solutions to automate and connect all
More informationTwo Factor Authentication - A Simple Way to Compare Costs and Risks
The Hidden Costs and Risks of DIY Two Factor Authentication Foreword Dave Abraham examines the real costs involved in implementing and managing two factor authentication (2FA) in-house. Dave Abraham is
More informationquality hosting solution. we manage your hosting. so that you can manage your business.
quality hosting solution. we manage your hosting. so that you can manage your business. Orisma Technology Co., Ltd. 1104/2 Pattanakarn Rd. Suanluang, Suanluang Bangkok 10250, Thailand Tel. 66 2187 2591-3
More informationFORMS-DRIVEN WORKFLOW SOLUTIONS WHITE PAPER
FORMS-DRIVEN WORKFLOW SOLUTIONS WHITE PAPER www.nintex.com CONTENTS INTRODUCTION...................................................... 3 KEY CONCEPTS OF MODERN FORMS SOLUTIONS................................
More informationPCI DSS Compliance: The Importance of Privileged Management. Marco Zhang marco_zhang@dell.com
PCI DSS Compliance: The Importance of Privileged Management Marco Zhang marco_zhang@dell.com What is a privileged account? 2 Lots of privileged accounts Network Devices Databases Servers Mainframes Applications
More informationBusiness Continuity Planning
Business Continuity Planning We believe all organisations recognise the importance of having a Business Continuity Plan, however we understand that it can be difficult to know where to start. That s why
More information'& ##! %1# ##!!* #!!! 23!!!
!" 1 !"# $ Companies invest a lot of time and money into tools for functional test automation and performance testing. I think this tends to lead to the belief that the best way to utilize these tools
More informationHow to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
More informationversasrs HelpDesk quality of service
Case Study / Interview Adelaide City Council / Corporate Property versasrs HelpDesk has greatly improved the entire business process for service requests from start to completion.. And we have only touched
More informationWhy Companies are Integrating DAM & Online Proofing
Why Companies are Integrating DAM & Online Proofing DAM There are a growing number of organizations who have or are planning to integrate their Digital Asset Management (DAM) system with an Online Proofing
More informationUW Connect Update & Incident Management Overview
UW Connect Update & Incident Management Overview Mary Mulvihill, Service Management Office Mike Houlihan, Process Owner Service Management Board Meeting May 19, 2014 Outline UW Connect implementation update
More informationSoftware Development Lifecycle. Steve Macbeth Group Program Manager Search Technology Center Microsoft Research Asia
Software Development Lifecycle Steve Macbeth Group Program Manager Search Technology Center Microsoft Research Asia About Me Currently manage a team of 10 Program Managers at Microsoft Research Asia Over
More informationKayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users. https://kayako-test.cv.nrao.edu/
Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users NAME ROLE: USER To submit helpdesk tickets you can access the helpdesk directly at: https://kayako-test.cv.nrao.edu/ NOTE: Due diligence needs to
More informationHow to Exercise a Business Continuity Plan (BCP)
How to Exercise a Business Continuity Plan (BCP) This document provides a step by step guide to exercising a Business Continuity Plan (BCP). The exercise of a BCP should not be undertaken in isolation,
More informationBeta UX DistributionMaster
Beta UX DistributionMaster High-Performance Output Management System for Unix Platforms Centralized administration and distribution of documents throughout the company regardless of the originating platform,
More informationIntegrated windows authentication for customers based on Probation GSI network
Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management
More informationRe-thinking IT End User Support A simple, clear and compelling End User support strategy for the future
Mark Bennett 25 th November 2015 Re-thinking IT End User Support A simple, clear and compelling End User support strategy for the future Rethinking IT Support IT Care Leadership & Culture IT Care Self
More informationEnterprise Data Supply Chain Management
Enterprise Data Supply Chain Management What You Need to Know July 2015 www.stonebranch.com Abstract Of all the assets a company owns, perhaps the most valuable is its data. This data has its highest meaning
More informationIntroduction. 1. Integrates with your existing system. 2. Doesn t alter your existing system
Introduction According to Forrester, approximately half of ERP customers are currently on releases that are two versions behind the current release, which may be four years old or more. For these companies,
More informationSQL Azure and SqlBulkCopy
SQL Azure and SqlBulkCopy Presented by Herve Roggero Managing Partner, Blue Syntax Consulting SQL Azure MVP Email: hroggero@bluesyntax.net Twitter: @hroggero LinkedIn: SQL Azure and SQL Server Security
More information4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook
29 29 4. Exercise: Developing CERT Infrastructure Main Objective Targeted Audience Total Duration To learn what kind of software and hardware solutions could be used to provide a particular CERT service
More informationAUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE
AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE Ref: Chapter 3.1 GOVERNANCE FRAMEWORK Information Technology Steering Committee
More informationBuilding a Successful Business Continuity Program. Clyde Hague, CISM, CISSP, CRISC Information Security Officer First Merchants Corporation
Building a Successful Business Continuity Program Clyde Hague, CISM, CISSP, CRISC Information Security Officer First Merchants Corporation Discussion Topics Breaking Down the Parts Create a Solid Base
More informationGRIDS IN DATA WAREHOUSING
GRIDS IN DATA WAREHOUSING By Madhu Zode Oct 2008 Page 1 of 6 ABSTRACT The main characteristic of any data warehouse is its ability to hold huge volume of data while still offering the good query performance.
More informationSeven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
More informationCoverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their
More informationCubic Live Services. Cubic Live s Strengths. Messaging Solutions & Services. Collaboration Solution & Services
Cubic Live Services Messaging Solutions & Services Hosted / In-house of Exchange 2010 Hosted / In-house of Cube Mail / Zimbra Email Hosted / In-house of Cube MailBank Mail Archiving Solution Hosted / In-house
More informationGroupware Project Definition: Scope of Project
Groupware Project Groupware Project Definition: Scope of Project Authors Mark Norman, Stuart Lee, Michael Fraser, Paul Davis Contents 1. Introduction...1 2. Management...2 3. Summary of the Project Deliverables...2
More informationManaging Agile Projects in TestTrack GUIDE
Managing Agile Projects in TestTrack GUIDE Table of Contents Introduction...1 Automatic Traceability...2 Setting Up TestTrack for Agile...6 Plan Your Folder Structure... 10 Building Your Product Backlog...
More informationManual. Ticket Center Manual. Ticket Center 2: 1.0 1.1. May 17, 2013. AdNovum Informatik AG. Released. AdNovum Informatik AG. All rights reserved.
DESCRIPTION: Ticket Center RELEASE: Ticket Center 2: 1.0 DOCUMENT VERSION: 1.1 DATE: May 17, 2013 AUTHORS: AdNovum Informatik AG STATUS: Released AdNovum Informatik AG. All rights reserved. Contents 1
More informationSummary of a Score-P Governance Project
Score-P Governance Model Revision: 1675 Date: 2014-11-13 08:28:36 +0100 (Thu, 13 Nov 2014) David Böhme, Christian Feld, Felix Wolf 1 Mission Statement The Score-P project develops software for profiling,
More informationSES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012
SES / CIF Internet2 Combined Industry and Research Constituency Meeting April 24, 2012 Doug Pearson Technical Director, REN-ISAC dodpears@ren-isac.net Background on REN-ISAC The REN-ISAC mission is to
More informationData Wrangling: The Elephant in the Room of Big Data. Norman Paton University of Manchester
Data Wrangling: The Elephant in the Room of Big Data Norman Paton University of Manchester Data Wrangling Definitions: a process of iterative data exploration and transformation that enables analysis [1].
More informationMomentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products
LANDESK Momentum Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products improve your ROI Upcoming Webinars: Visit: www.landesk.com/momentum
More informationA How-to Guide By: Riaan Van Der Merwe, General Manager, Dynamics, Neudesic
Managing Dynamics CRM 2013 Applications from Cradle to Grave A How-to Guide By: Riaan Van Der Merwe, General Manager, Dynamics, Neudesic Table of Contents Introduction...3 Creating the Right Fit...3 Solutions
More informationMANAGEMENT SYSTEM BASED ON OPEN SOURCE TOOLS
10th ICALEPCS Int. Conf. on Accelerator & Large Expt. Physics Control Systems. Geneva, 10-14 Oct 2005, WE3A.4-6O (2005) MANAGEMENT SYSTEM BASED ON OPEN SOURCE TOOLS I. Verstovšek 1, J. Kamenik 1 1Cosylab,
More informationBest Practices for Java Projects Horst Rechner
Best Practices for Java Projects Horst Rechner Abstract: The combination of automated builds with module and integration tests and centralized bug and work tracking using a combination of Eclipse, Mylyn,
More informationImplementing HIPAA into a Compliance Program
Implementing HIPAA into a Compliance Program HCCA Annual Conference April 24, 2002 Kenneth W. Fody, Esq. - Independence Blue Cross Carole A. Klove, RN, JD Deloitte & Touche Agenda Introductions The HIPAA
More informationFree Software Configuration Management (SCM) Is it worth it?
d Free Software Configuration Management (SCM) Is it worth it? Considerations When Comparing Open- Source SCM to Commercial SCM Solutions Authored by: David Kelly and Heather Ashton Upside Research, Inc.
More information23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
More informationPRETTY EASY PRIVACY 05-2014
PRETTY EASY PRIVACY 05-2014 It is called kinko Overview introduction spot the problem building good crypto tools challenges more than tools get involved Snowden 2013......rekindled interest in privacy.
More informationWelcome to the CQA Connect Online Portal
Welcome to the CQA Connect Online Portal 2015/2016 Visit www.colesqualityacademy.saiglobal.com What is CQA Connect? CQA Connect is an extension of the Coles Quality Academy, for suppliers working in partnership
More informationversasrs HelpDesk quality of service
Case Study / Interview City Of West Torrens Now we are identifying issues clearly, be that with a user, or a piece of equipment or an application, we now have a better idea of what is going on. From a
More informationBusiness Process Automation
Business Process Automation 5 THINGS YOU NEED TO KNOW As technology improves, connectivity increases and budgets shrink or stay flat, more and more businesses large and small, business-to-business (B2B)
More informationA Process is Not Just a Flowchart (or a BPMN model)
A Process is Not Just a Flowchart (or a BPMN model) The two methods of representing process designs that I see most frequently are process drawings (typically in Microsoft Visio) and BPMN models (and often
More informationThe Challenge. Key Challenges at CG Power Systems (Ireland) When Stephen McSharry (Engineering Manager), took over the responsibility
The Challenge Key Challenges at CG Power Systems (Ireland) When Stephen McSharry (Engineering Manager), took over the responsibility of the maintenance department in CG Power Systems Ireland (CG) in 2007,
More informationReal world experiences for CMDB Success
Real world experiences for CMDB Success Gaurav Dutt Uniyal Infosys Technologies Limited The CMDB and CMS - the Powerhouse of Service Management 8 th July 2008 Agenda The present state CMDB implementation
More informationInformation Management Resource Kit. Module on Management of Electronic Documents
Information Management Resource Kit Module on Management of Electronic Documents UNIT 5. DATABASE MANAGEMENT SYSTEMS LESSON 3. USING A DATABASE FOR DOCUMENT MANAGEMENT NOTE Please note that this PDF version
More informationMARYLAND S FOCUS SCHOOLS LEADERSHIP COMMUNITY OF PRACTICE
MARYLAND S FOCUS SCHOOLS LEADERSHIP COMMUNITY OF PRACTICE In May 2012, the Maryland State Department of Education (MSDE) was granted a Waiver from NCLB, which they had to implement beginning in June. MSDE
More informationBusiness Continuity Policy and Business Continuity Management System
Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain
More informationOperational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS
More informationBy default, the Dashboard Search Lists show tickets in all statuses except Closed.
Set Up 1. Login with NetId at http://fpweb.utk.edu 2. The first time you login, you will be asked to run this: 3. Enable Pop ups from FootPrints Creating Searches to Show Active Status Tickets By default,
More informationHTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013
HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013 Riley Moses Bri Fidder Jon Lewis Introduction & Product Vision BIMShift is a company that provides all
More informationA White Paper from AccessData Group. Cerberus. Malware Triage and Analysis
A White Paper from AccessData Group Cerberus Malware Triage and Analysis What is Cerberus? Cerberus is the first-ever automated reverse engineering tool designed to show a security analyst precisely what
More informationDATATRAK Customer Case Study
DATATRAK Customer Case Study DATATRAK: A Success Story of Traceability and Process Transparency This case study explores how DATATRAK International, Inc., a company offering software solutions and consulting
More informationWorkflow/Business Process Management
1 Workflow/Business Process Management Andy C. Tran Staff Systems Engineer 2 Agenda Business Process Management Overview Demo 3 Generic Case based Work Flow Pattern Case Initiation Case Assessment & Assignment
More informationGraduating CRM Beyond Pipeline Management CRM
Graduating CRM Beyond Pipeline CRM Graduating CRM Beyond Pipeline Graduating CRM Beyond Pipeline So you ve got your CRM deployment running smoothly. Congrats to you! If you re like most of our customers,
More informationHow To Use Open Source Software For Library Work
USE OF OPEN SOURCE SOFTWARE AT THE NATIONAL LIBRARY OF AUSTRALIA Reports on Special Subjects ABSTRACT The National Library of Australia has been a long-term user of open source software to support generic
More informationZoho Projects. Social collaborative project management platform
Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its
More informationEFFICIENT KNOWLEDGE MANAGEMENT: A PEAK PERFORMANCE SOLUTION TO STAKEHOLDER ENGAGEMENT WHITE PAPER
EFFICIENT KNOWLEDGE MANAGEMENT: A PEAK PERFORMANCE SOLUTION TO STAKEHOLDER ENGAGEMENT WHITE PAPER SEPTEMBER 2010 EFFICIENT KNOWLEDGE MANAGEMENT: A PEAK PERFORMANCE SOLUTION TO STAKEHOLDER ENGAGEMENT WHITE
More informationHow Can Scheduling Software Impact on Service?
How Can Scheduling Software Impact on Service? A white paper written by Steve Downton and commissioned by Solarvista 31/10/13 V 1 Contents Executive Summary 4 To Schedule or Not to Schedule? 6 Manual,
More informationT-MOBILE USES SOCIAL MEDIA ANALYTICS TO BOOST EFFICIENCY
T-MOBILE USES SOCIAL MEDIA ANALYTICS TO BOOST EFFICIENCY The Dutch T-Mobile has been active on social media for almost 5 years now. Initially, their focus was on forums, which have now been accompanied
More informationWORKPLACE SAFETY AND INSURANCE APPEALS TRIBUNAL
2005 ONWSIAT 1489 WORKPLACE SAFETY AND INSURANCE APPEALS TRIBUNAL DECISION NO. 627/05 [1] This appeal was heard in Ottawa on April 1, 2005, by a Tribunal Panel consisting of: B. Alexander: Vice-Chair,
More informationEmail the wrong tool in the right place? EmAil when used for business
Email the wrong tool in the right place? A guide to the hidden costs of EmAil when used for business transaction processing introduction Email is an amazing tool that has revolutionised business communications
More informationSaaS project development PERSIA, THE APPLICATION FOR RECRUITMENT PROCESSES AUTOMATION. www.persiahr.com
SaaS project development PERSIA, THE APPLICATION FOR RECRUITMENT PROCESSES AUTOMATION www.persiahr.com PROJECT DESCRIPTION Persia is a Web application that automates human resources recruiting processes.
More information