Cyber Situation Awareness Package. Product Descriptions
|
|
|
- Briana Beasley
- 10 years ago
- Views:
Transcription
1 Annex D Cyber Situation Awareness Package Product Descriptions Contents: CySAP COMMON STAFF REQUIREMENT Page 2 CySAP BUSINESS CASE Page 8 CySAP THROUGH LIFE MANAGEMENT PLAN Page 14 1
2 PRODUCT DESCRIPTION - CySAP COMMON STAFF REQUIREMENT Version Control Version Date Author Approval and Remarks No June 2014 EDA (Stace) Initial draft for consideration at second meeting of the AHWG on 17/18 June June 14 AHWG Agreed version of the CSR. 1. Purpose. The purpose of the CySAP Common Staff Requirement (CSR) is to: 1.1. expand user requirements outlined within the scope of the CST in order to, 1.2. describe the system requirements with sufficient detail to enable the potential users to understand capability requirements that have sufficient qualitative and quantitative detail to justify time and cost of subsequent programme implementation validate user requirements within operational environments and scenarios, and with identified user (operational) communities. 2. Composition. The CySAP CSR shall be composed of the following: 2.1. Executive Summary Introduction Part One General Description Origin of the Need. Supplement the Background from the originating CST with any additional solution-focussed background. Conceptual requirements Operational Context. Describe the associated Concept of Use (CONUSE) incorporating the operating environment. 2
3 Project Boundary. Explain where the boundary is, or how it will be determined. Identify if architectures or models are to be used or developed System Context. Describe any fundamental interdependencies with other systems, examples include hosting platform or infrastructure, and essential interoperability. Identify any other CSR / systems significantly contributing to the same CST Constraints. Highlight any constraints that will have a significant or abnormal impact on the system, and which are therefore worthy of management awareness. Include individual Defence Lines of Development (DLoD) policy-level constraints Assumptions. Identify any significant overarching assumptions determined by the AHWG, additional to those identified in the CST Required In-Service Date (IOC/FOC definitions) based on an assessment of national requirements and associated national programme plans Priorities. Carry priorities forward from the CST, and supplemented if appropriate Part Two Key System Requirements. Part 2 of CSR records the Key System Requirements (KSRs). The following notes apply: Each KSR should be drawn from Part Sufficient operational evidence should be applied to reinforce the justification of the prioritisation as a key requirements. This could be the part where levels of capability are defined as core requirements 3
4 with subsequent iterations describing more advanced levels of capability Part Three System Requirements. Part 3 of the CSR contains the complete, structured, set of individual system requirements and constraints. When deriving system requirements from user requirements, opportunities should be sought to cluster and consolidate requirements. Ideally there should be links between identified user requirements and system requirements and information presented in tabular form Part Four References and Context Documents so that the CSR is self-contained and can stand-alone Context documents may be included at the discretion of the AHWG Most supporting documentation is included to provide additional understanding or because it is referred to frequently in the CSR Additional documents are particularly valuable to readers who may not be familiar with the background to the requirement, for example industry. All system requirements must be included in Part 3 of the CSR regardless of these documents Context documents must provide the supplementary information required for verification and system acceptance, expressing the conditions under which the performance must be achievable Possible context documents include: The CST - Reference Documents The Acquisition Strategy. 4
5 The Acceptance Strategy and associated verification test conditions The Concept of Use (CONUSE) for the system The operational process or mission profiles that will use the system - not the system s operating procedure The system requirements or specification of the legacy system to be updated or upgraded - if applicable Reference to specifications for Defence Lines of Development (DLoD) solutions, including the Equipment Contract Specifications Reference to system requirements for interoperating systems, or associated Information Exchange Requirements (IERs) or Interface Control Documents if they exist Reference to associated architectures or models Operational Analysis and trade study reports, associated scenarios and vignettes Other references, policies or Standards. 3. Derivation. The sources for the CSR consist of the following: 3.1. CST and supporting references cms national analysis (related to national capability requirements) 3.3. Outputs from the EDA External Assistance Bilateral and AdHoc research Results for AHWG Meetings and associated AHWG dialogue. 4. Format and Presentation. The CSR will be a written report in English (translation requirements?). Paragraphs will be numbered thus (1.1.1 etc (as per the CST)). Drafts will be line numbered and progressions of the Product will be via Comments Matrix. The CSR will be accompanied by a scripted PowerPoint presentation for use by national staff. This will be in English. 5
6 5. Required CySAP CSR Development Competencies/Resources. The development of the CSR will require a wide range of experience and competences drawn from the following disciplines: 5.1. Technical Expertise in: Cyber defence technical capabilities (functional services) Architectures (NAF v3) Cyber threat intelligence processing Systems engineering C2 Information Systems and COP application Integration of systems and services within national HQs 5.2. Capability Development Expertise Strategic Requirements Capability Gap Analysis User/Operation Requirement Validation Threat Analysis Operational Scenario Dependencies Strategic/programmatic interfaces (ie extant NATO and national plans) 5.3. System Accreditation Expertise Security Requirements 6. Quality Criteria. cms will describe what quality criteria will be applied by national staff who will ultimately be authorised to make a decisions based on the CySAP CSR. It is assumed that National capability acquisition decisions will be based on references, input from national subject matter experts and benchmarks/baselines against which CSR system requirements and key system requirements will be endorsed. During the 6
7 course of CSR development it is expected that cms will determine what quantitative and qualitative evidence and criteria is needed to underpin the CSR. 7. Quality Method. As the CSR is developed, each national CySAP CSR review process will be determined and incorporated within the CSR together with details on how the Project will be integrated within national programmes and existing capabilities. This should describe responsibilities by post title and any particular national SMEs, resources, dependencies, risks, ambitions, priorities. 7
8 PRODUCT DESCRIPTION - CySAP BUSINESS CASE Version Control Version Date Author Approval and Remarks No June 2014 EDA (Stace) Initial draft for consideration at second meeting of the AHWG on 17/18 June June 2014 AHWG Accepted at AHWG Meeting on 18 June Purpose. The purpose of the CySAP Business Case (BC) is to justify to cms authorities the initiation of a collaborative approach to implementing the CySAP modules within EU HQs and potentially other areas of cyber defence operational utilisation. 9. Composition. The CySAP BC shall be composed of the following chapters - based on text recommended in the 'EDA Guide to the Conduct of a Programme Preparation Phase': 9.1. Summary Issue Recommendation Timing - related to the recommendation Requirement Options (requirements solutions) Option Analysis (cost/benefit analysis) In-Service Support Education/Training Service Maintenance. Upgrades and capability growth Interoperability Affordability Procurement & Commercial Strategy. (different acquisition options) International Co-operation. 8
9 9.15. Risks Legal Safety & Environmental Considerations High-level Plan Whole-life Costs (related to High Level Plan) Strategic Context. and link to other. 10. Derivation. The sources for the BC consist of the following: CST and supporting references TLMP CSR cms national analysis (related to national capability requirements) Outputs from the EDA External Assistance such as Industrial Analysis and Bilateral and AdHoc research Results for AHWG Meetings and associated AHWG dialogue. 11. Format and Presentation. The BC will be a written report in English (translation requirements?). Paragraphs will be numbered thus (1.1.1 etc (as per the CST)). Drafts will be line numbered and progressions of the Product will be via Comments Matrix. The BC will be accompanied by a scripted PowerPoint presentation for use by national staff. This will be in English. 12. Required CySAP BC Development Competencies/Resources. The development of the BC will require a wide range of experience and competences drawn from the following disciplines: Technical Expertise in: Cyber defence technical capabilities (functional services) Architectures cyber threat intelligence processing COP application and integration within national HQs 9
10 12.2. National Acquisition/Armament Expertise (procedural validation) Economic Case Commercial Case Financial Case Management (national process) Case Capability Development Expertise Strategic Case Capability Gap Analysis User/Operation Requirement Validation Threat Analysis Operational Scenario Dependancies Strategic/programmatic interfaces (ie extant NATO and national plans) System Accreditation Expertise Security Case 13. Quality Criteria. cms will describe what quality criteria will be applied by national staff who will ultimately be authorised to make a decision based on the CySAP BC Recommendation(s). It is assumed that National capability acquisition decisions will be based on references and benchmarks/baselines against which BC options will be assessed. What levels of quantitative and qualitative evidence is needed to enable decisions to be made? Each CySAP module may require different criteria. 14. Quality Method. As the BC is developed, each national CySAP BC review process will be determined and incorporated within the BC together with details on how the Project will be integrated within national programmes. This is an opportunity for cms to describe national process and timelines to support the progression of CySAP beyond the 10
11 Programme Preparation Phase. This should describe responsibilities by post title and any particular national skills, resources, dependencies, risks, ambitions, priorities. 11
12 PRODUCT DESCRIPTION - CySAP THROUGH LIFE MANAGEMENT PLAN Version Control Version Date Author Approval and Remarks No June 2014 EDA (Stace) Initial draft for consideration at second meeting of the AHWG on 17/18 June Purpose. The purpose of the CySAP Through Life Management Plan(TLMP) is to provide cms with the results of collaborative analysis on how the CySAP capability will be managed across its life cycle from Concept, Assessment ( of capability lines of development, business cases and acquisition options), Development & Demonstration, through to implementation into service and through life support to eventual withdrawal of service. The TLMP document supports the CySAP Business Case. 2. Composition. The CySAP TLMP shall be composed of the following chapters - based on text recommended in the 'EDA Guide to the Conduct of a Programme Preparation Phase': 2.1. Summary Mission & Objectives Stakeholders Strategies Plans and Processes Resources Evaluation of Success. 3. Derivation. The sources for the TLMP consist of the following: 3.1. CST and supporting references CSR Process cms national analysis (related to national capability requirements) 3.4. Outputs from the EDA External Assistance such as Industrial Analysis and 12
13 3.5. Bilateral and AdHoc research with industry partners Results from AHWG Meetings and associated AHWG dialogue TLMP Reference: 4. Format and Presentation. The TLMP will be a written report in English (translation requirements?). Paragraphs will be numbered thus (1.1.1 etc (as per the CST)). Drafts will be line numbered and development of the Product will be via Comments Matrix. The TLMP will be accompanied by a scripted PowerPoint presentation for use by national staff. This will be in English. 5. Required CySAP TLMP Development Competences. The development of the TLMP will require a wide range of experience and competences drawn from the following disciplines: 5.1. Technical Expertise in: Cyber defence technology life cycle Architectures - integration of TLMP within NAF (also see TLMP relevance to system integration with Threat source and COP applications, and integration within national HQs 5.2. National Acquisition/Armament Expertise (alignment and coherence with national processes and procedural validation) Whole Life Cost (WLC) planning Commercial analysis Financial - investment appraisals/cost modelling Management (national process) Case - resource programming Capability Development Expertise Strategic Case Dependancies Strategic/programmatic interfaces (ie extant NATO and national plans) 5.4. System Accreditation Expertise Security Case coherence with national requirements. 13
14 6. Quality Criteria. The TLMP is a supporting document to the Business Case within the CSR process and as such there is no specific approval requirements by cms. However, TLM is an important element of the CySAP capability and needs to be coherent with national ways and means of establishing the operation of such a capability. What levels of quantitative and qualitative evidence is needed to enable such coherence to be established? Each CySAP module may require a different TLM solution. 7. Quality Method. This should describe each national CySAP TLMP review process and how the TLMP will be integrated within national programmes. This is an opportunity for cms to describe national process and timelines to support the progression of CySAP beyond the Programme Preparation Phase. This should describe responsibilities by post title and any particular national skills, resources, dependencies, risks, ambitions, priorities. 14
Technology management in warship acquisition
management in warship acquisition A J Shanks B.Eng(Hons) MIET BMT Defence Services Limited SYNOPSIS Today s warship designers and engineers look to technology to provide warships and systems better, cheaper
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
Synopsis Cyber Situation Awareness Package
Synopsis Cyber Situation Awareness Package Contents Executive Summary 1. Introduction 1.1 Background 1.2 Aim 1.3 Scope 1.4 Assumptions 2. Mission Need 2.1 Main Characteristics 2.2 Threat Analysis 2.3 System
Description of Program Management Processes (Initiating, Planning) 2011 PROGstudy.com. All rights reserved
Description of Program Management Processes (Initiating, Planning) Topics Covered Program Management Process Groups salient features Description of all processes in Initiating Process Group: Initiate Program
A EUROPEAN DEFENCE RESEARCH & TECHNOLOGY STRATEGY
A EUROPEAN DEFENCE RESEARCH & TECHNOLOGY STRATEGY An Introduction to the EDRT Strategy Alexander Weis, Chief Executive, European Defence Agency Enhancing the effectiveness of the European Defence Research
The Gateway Review Process
The Gateway Review Process The Gateway Review Process examines programs and projects at key decision points. It aims to provide timely advice to the Senior Responsible Owner (SRO) as the person responsible
European Defence Agency Capabilities Directorate COMMON STAFF TARGET FOR MILITARY COOPERATION ON CYBER RANGES IN THE EUROPEAN UNION
European Defence Agency Capabilities Directorate COMMON STAFF TARGET FOR MILITARY COOPERATION ON CYBER RANGES IN THE EUROPEAN UNION Version 1.0 Brussels, 14/November/2013 This page intentionally left blank
TEC Capital Asset Management Standard January 2011
TEC Capital Asset Management Standard January 2011 TEC Capital Asset Management Standard Tertiary Education Commission January 2011 0 Table of contents Introduction 2 Capital Asset Management 3 Defining
The Transport Business Cases
Do not remove this if sending to pagerunnerr Page Title The Transport Business Cases January 2013 1 Contents Introduction... 3 1. The Transport Business Case... 4 Phase One preparing the Strategic Business
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
<Business Case Name> <Responsible Entity> <Date>
(The entity Chief Information Officer, Chief Financial Officer and Business Area programme Lead must sign-off the completed business case) Signed: Date:
Supporting Effective Evaluations: A Guide to Developing Performance Measurement Strategies
Home > Centre of Excellence for Evaluation Supporting Effective Evaluations: A Guide to Developing Performance Measurement Strategies 6.0 Performance Measurement Strategy Framework 6.1 Overview of the
[project.headway] Integrating Project HEADWAY And CMMI
[project.headway] I N T E G R A T I O N S E R I E S Integrating Project HEADWAY And CMMI P R O J E C T H E A D W A Y W H I T E P A P E R Integrating Project HEADWAY And CMMI Introduction This white paper
MINISTRY OF DEFENCE. MOD Architectural Framework Concepts & Doctrine Community of Interest Deskbook
- M10-013 MINISTRY OF DEFENCE MOD Architectural Framework Concepts & Doctrine Community of Interest Deskbook Draft 0.1 29 July 2005 Prepared by:- Approved by:- CROWN COPYRIGHT 2005. THIS DOCUMENT IS THE
OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE CREATE COMPETITIVE ADVANTAGE A PLATFORM FOR INNOVATION
National Standardization Strategic Framework OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE A PLATFORM FOR INNOVATION CREATE COMPETITIVE ADVANTAGE Foreword Standards influence everything we do.
Practice Overview. REQUIREMENTS DEFINITION Issue Date: <mm/dd/yyyy> Revision Date: <mm/dd/yyyy>
DEPARTMENT OF HEALTH AND HUMAN SERVICES ENTERPRISE PERFORMANCE LIFE CYCLE FRAMEWORK PRACTIICES GUIIDE REQUIREMENTS DEFINITION Issue Date: Revision Date: Document
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
Migrating and consolidating even the simplest of data
CALIBRE An Employee-Owned Management and Technology Services Company 6354 Walker Lane, Suite 300, Metro Park Alexandria, Virginia 22310-3252 USA p. 703.797.8500 or 1.888.CALIBRE international p. 011.1.888.CALIBRE
Guidelines of the Higher Education Council for accreditation within the higher education sector
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Guidelines of the Higher Education Council for accreditation
Document management concerns the whole board. Implementing document management - recommended practices and lessons learned
Document management concerns the whole board Implementing document management - recommended practices and lessons learned Contents Introduction 03 Introducing a document management solution 04 where one
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
ownership We increase return on investment by We deliver reliable results by engaging
Software Engineering Institute Capability Maturity Model Integrated Product and Process Development (Continuous) Project Management Process areas Project planning Establish estimates Develop a project
Guide to Enterprise Life Cycle Processes, Artifacts, and Reviews
Department of Health and Human Services Centers for Medicare & Medicaid Services Center for Consumer Information and Insurance Oversight Guide to Enterprise Life Cycle Processes, Artifacts, and Reviews
Quick Guide: Meeting ISO 55001 Requirements for Asset Management
Supplement to the IIMM 2011 Quick Guide: Meeting ISO 55001 Requirements for Asset Management Using the International Infrastructure Management Manual (IIMM) ISO 55001: What is required IIMM: How to get
Survey report on Nordic initiative for social responsibility using ISO 26000
Survey report on Nordic initiative for social responsibility using ISO 26000 2013 Contents SUMMARY... 3 1. INTRODUCTION... 4 1.1 Objective of the survey... 4 1.2 Basic information about the respondents...
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire
Building Your Strategic Business Case for HR Technology. Speaker: Kristie Evans Managing Principal HR Project Manager PM Instructor
Building Your Strategic Business Case for HR Technology Speaker: Kristie Evans Managing Principal HR Project Manager PM Instructor Agenda Today s Goals HR Value Outcomes Break 10 am Methodologies Business
Project Summary Information
LAVOSAR II European Reference Open Stard a Modern Integrated Electronic Mission System in Military L Vehicles Project Summary Inmation Background Contracting Agency: Contract Number Date: 3 May 05 European
Capital Planning Guidelines
Capital Planning Guidelines Contents Capital Planning Guidelines... 1 1. INTRODUCTION... 3 2. CAPITAL PROJECTS EVALUATION PROCESS... 3 3. APPRAISAL PROCESS UNDERTAKEN BY DEPARTMENTS... 4 3.1 Extension
Vacancy Number: A08/0413. Post Number: OSC BAS 0050. Job Title: Senior Contracting Officer. NATO Grade: A-3
Vacancy Number: A08/0413 Post Number: OSC BAS 0050 Job Title: Senior Contracting Officer NATO Grade: A-3 Basic Monthly Salary (12 x per year): 5 997,17, tax free Closing Date: 29 May 2013 GENERAL BACKGROUND:
Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture
Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and
december 08 tpp 08-5 Guidelines for Capital Business Cases OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper
december 08 Guidelines for Capital Business Cases OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper Preface The NSW Government is committed to the ongoing improvement of public services by ensuring
ESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
Principles for An. Effective Risk Appetite Framework
Principles for An Effective Risk Appetite Framework 18 November 2013 Table of Contents Page I. Introduction... 1 II. Key definitions... 2 III. Principles... 3 1. Risk appetite framework... 3 1.1 An effective
ITS Projects Systems Engineering Process Compliance Checklist
ITS Projects Systems Engineering Process Compliance Checklist FHWA Final Rule (23 CFR 940) This checklist is to be completed by the MDOT or LPA Project Management Staff. Please refer to the accompanying
System Development Life Cycle Guide
TEXAS DEPARTMENT OF INFORMATION RESOURCES System Development Life Cycle Guide Version 1.1 30 MAY 2008 Version History This and other Framework Extension tools are available on Framework Web site. Release
USING THE EVALUABILITY ASSESSMENT TOOL
USING THE EVALUABILITY ASSESSMENT TOOL INTRODUCTION The ILO is committed to strengthening the Office-wide application of results-based management (RBM) in order to more clearly demonstrate its results
PROGRAMMME SPECIFICATION FOR MA in LEADERSHIP AND MANAGEMENT (HEALTH AND SOCIAL CARE SERVICES)
PROGRAMMME SPECIFICATION FOR MA in LEADERSHIP AND MANAGEMENT (HEALTH AND SOCIAL CARE SERVICES) MA in LEADERSHIP AND MANAGEMENT (HEALTH AND SOCIAL CARE SERVICES) 1. Award 2. Route Management (Health and
NHS Procurement Dashboard: Overview
NHS Procurement Dashboard: Overview November 2013 You may re-use the text of this document (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence.
Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development
Project Planning and Management (PPM) V2.0 Project Type Guide Custom Development Version 1.1 January 2014 Last Revision: 1/22/2014 Page 1 Project Type Guide Summary: Custom Development Custom software
Call for experts for INSPIRE maintenance & implementation
INSPIRE Infrastructure for Spatial Information in Europe Call for experts for INSPIRE maintenance & implementation Title Creator Call for experts for INSPIRE maintenance & implementation EC & EEA INSPIRE
High level principles for risk management
16 February 2010 High level principles for risk management Background and introduction 1. In their declaration of 15 November 2008, the G-20 leaders stated that regulators should develop enhanced guidance
Network Rail Infrastructure Projects Joint Relationship Management Plan
Network Rail Infrastructure Projects Joint Relationship Management Plan Project Title Project Number [ ] [ ] Revision: Date: Description: Author [ ] Approved on behalf of Network Rail Approved on behalf
PHASE 5: DESIGN PHASE
PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed
Aviation Safety Policy. Aviation Safety (AVS) Safety Management System Requirements
Aviation Safety Policy ORDER VS 8000.367A Effective Date: 11/30/2012 SUBJ: Aviation Safety (AVS) Safety Management System Requirements 1. This order provides requirements to be met by AVS and AVS services/offices
How To Design A Project
Introduction to Procurement Why is procurement important? Client needs are unique and consequently each project meeting those needs has unique characteristics. This means that achieving the right project
Gateway review guidebook. for project owners and review teams
Gateway review guidebook for project owners and review teams The State of Queensland (Queensland Treasury and Trade) 2013. First published by the Queensland Government, Department of Infrastructure and
EU CUSTOMS BUSINESS PROCESS MODELLING POLICY
EUROPEAN COMMISSION MASP Revision 2014 v1.1 ANNEX 4 DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy, Legislation, Tariff Customs Processes and Project Management Brussels, 03.11.2014 TAXUD.a3
AIPM PROFESSIONAL COMPETENCY STANDARDS FOR PROJECT MANAGEMENT PART B CERTIFIED PRACTISING PROJECT PRACTITIONER (CPPP)
AIPM PROFESSIONAL COMPETENCY STANDARDS FOR PROJECT MANAGEMENT PART B CERTIFIED PRACTISING PROJECT PRACTITIONER (CPPP) Copyright: Australian Institute of Project Management Document Information Document
Part B1: Business case developing the business case
Overview Part A: Strategic assessment Part B1: Business case developing the business case Part B2: Business case procurement options Part B3: Business case funding and financing options Part C: Project
NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security
1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security [email protected] 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Data Migration through an Information Development Approach An Executive Overview
Data Migration through an Approach An Executive Overview Introducing MIKE2.0 An Open Source Methodology for http://www.openmethodology.org Management and Technology Consultants Data Migration through an
COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
University of Cambridge: Programme Specifications CERTIFICATE OF HIGHER EDUCATION IN INTERNATIONAL DEVELOPMENT
University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information in this programme specification. Programme specifications are produced and then reviewed
the asset management journey
the asset management journey Improve asset RELIABILITY Reduce your COSTS Increase your REVENUE In the current economic climate, capital investment is not a desirable option. Improve performance of the
Risk Management Strategy EEA & Norway Grants 2009-2014. Adopted by the Financial Mechanism Committee on 27 February 2013.
Risk Management Strategy EEA & Norway Grants 2009-2014 Adopted by the Financial Mechanism Committee on 27 February 2013. Contents 1 Purpose of the strategy... 3 2 Risk management as part of managing for
Mainstreaming European Military Cyber Defence Training & Exercises
2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sep 2013, Mr. Wolfgang Roehrig, Project Officer Cyber Defence Mainstreaming European Military Cyber Defence Training
Assessment frameworks for the higher education accreditation system Programme assessment (limited/extensive)
Assessment frameworks for the higher education accreditation system Programme assessment (limited/extensive) 22 November 2011 Contents 1 Structure of the system 5 3 Limited programme assessment 7 3.1
Project Manager (Renewable Energy) Terms of Reference
I. Position Information Project Manager (Renewable Energy) Terms of Reference Organization: Office of the Quartet (OQ) Title: Project Manager (Renewable Energy) Reports to: Energy Adviser Duty Station:
Job Description. Industry business analyst. Salary Band: Purpose of Job
Job Description Job Title: Industry business analyst Division/Company: Industry Policy/Payments UK Reporting To: Director of Industry Policy Salary and: C Purpose of Job To provide thought leadership and
Identification. Preparation and formulation. Evaluation. Review and approval. Implementation. A. Phase 1: Project identification
II. Figure 5: 6 The project cycle can be explained in terms of five phases: identification, preparation and formulation, review and approval, implementation, and evaluation. Distinctions among these phases,
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
U.S. Department of the Treasury. Treasury IT Performance Measures Guide
U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)
Enterprise IT Portfolio Governance and Management Model
STATE OF MICHIGAN Department of Information Technology Enterprise IT Portfolio Governance and Management Model NASCIO 2007 RECOGNITION AWARDS CATEGORY: IT PROJECT AND PORTFOLIO MANAGEMENT Enterprise IT
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
Programme Specifications
Programme Specifications MASTER OF PHILOSOPHY IN ARCHITECTURE AND URBAN DESIGN (MAUD) 1 Awarding body University of Cambridge 2 Teaching institution Department of Architecture 3 Accreditation details None
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains Mary J. Simpson System Concepts 6400 32 nd Northwest, #9 Seattle, WA 98107 USA Joseph J. Simpson System Concepts
School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology. EDD/ET 003 Requirements
School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology The mission of the Doctor of Education in Educational Leadership degree program
Five best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
Capital Adequacy: Advanced Measurement Approaches to Operational Risk
Prudential Standard APS 115 Capital Adequacy: Advanced Measurement Approaches to Operational Risk Objective and key requirements of this Prudential Standard This Prudential Standard sets out the requirements
REQUIREMENTS. for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION
APPROVED VERSION Page 1 REQUIREMENTS for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION APPROVED VERSION Page 2 TABLE OF CONTENTS INTRODUCTION Part One: Standards I. Standards for Quality Assurance
Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information
Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information 1 Awarding Institution / body: Lancaster University 2a Teaching institution: University
STANDARD TWINNING LIGHT PROJECT FICHE
STANDARD TWINNING LIGHT PROJECT FICHE 1. Basic Information 1.1 Programme: IPA 2011 1.2 Twinning Number: HR/2011/IB/OT/01 TWL 1.3 Title: Capacity Building of the National School for Public Administration
Empowering IT Acquisitions
Empowering IT Acquisitions Public Release 66ABG-2015-0081 Tim Rudolph, Ph.D. AFLCMC Chief Technology Officer AF Tech Advisor, Integrated Information Capabilities 21 May 2015 The Point Value Deployed Rapidly
SPICE International Standard for Software Process Assessment
SPICE International Standard for Software Process Assessment Marko Pyhäjärvi Helsinki, 31 st November 2004 Seminar on Quality Models for Software Engineering Department of Computer Science UNIVESITY OF
Three Fundamental Techniques To Maximize the Value of Your Enterprise Data
Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Prepared for Talend by: David Loshin Knowledge Integrity, Inc. October, 2010 2010 Knowledge Integrity, Inc. 1 Introduction Organizations
CAPITAL PLANNING GUIDELINES
CAPITAL PLANNING GUIDELINES 1. INTRODUCTION... 2 2. EXTENSION OF EXISTING INFRASTRUCTURE PROJECTS... 2 3. NEW CAPITAL PROJECTS... 2 4. MINIMUM INFORMATION REQUIRED... 3 5. PREPARATORY WORK... 3 5.1 NEEDS
3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM)
3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM) Asset Management Council GENERAL Holders of this certificate will have an understanding of the contribution that they make
IDMS PMSA Infrastructure Project Management Congress, Durban, 16/17 September 2013. Greg Evans: Strategic Executive Engineering Unit
IDMS PMSA Infrastructure Project Management Congress, Durban, 16/17 September 2013 Greg Evans: Strategic Executive Engineering Unit IDMS Infrastructure Delivery Management System IDMS SECTION ONE Introduction
The Association of Change Management Professionals
The Association of Change Management Professionals Statement of Change Management Scope, Knowledge Areas, and Process Groups March 31, 2012 Introduction The Association of Change Management Professionals
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
PHASE 6: DEVELOPMENT PHASE
PHASE 6: DEVELOPMENT PHASE The Phase features a key step in the project: system construction. The previous phases lay the foundation for system development; the following phases ensure that the product
Status Report on the Operations Manual and Appraisal Toolkit
Status Report on the Operations Manual and Appraisal Toolkit GCF/BM-2015/Inf.06 5 May 2015 For information between meetings Page 1 I. Introduction Status Report on the Operations Manual and Appraisal Toolkit
Scenario Analysis Principles and Practices in the Insurance Industry
North American CRO Council Scenario Analysis Principles and Practices in the Insurance Industry 2013 North American CRO Council Incorporated [email protected] December 2013 Acknowledgement The
Business Intelligence is a system that collects, integrates, analyses and presents business information to support better business decision making.
UNIVERSITY OF EXETER BUSINESS INTELLIGENCE Key Messages & Communications Plan 1 Key Messages Background: Staff from across the University extract information from a variety of data storage areas to support
Programme Governance and Management Plan Version 2
PROCESS FOR CHANGE - Detailed Design Programme Governance and Management Plan Version 2 1 INTRODUCTION In October 2008, the Council approved the selection of seven opportunity themes to take forward from
UoD IT Job Description
UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management
JSP 886 THE DEFENCE LOGISTIC SUPPORT CHAIN MANUAL VOLUME 2 INVENTORY MANAGEMENT PART 9 THE MANAGEMENT OF ASSETS
JSP 886 THE DEFENCE LOGISTIC SUPPORT CHAIN MANUAL VOLUME 2 INVENTORY MANAGEMENT PART 9 THE MANAGEMENT OF ASSETS THE MASTER VERSION OF JSP 886 IS PUBLISHED ON THE DEFENCE INTRANET. FOR TECHNICAL REASONS,
The Human Capital Management Systems Business Case A Checklist to assist agencies developing a business case
The Human Capital Management Systems Business Case A Checklist to assist agencies developing a business case Final version for release Human Capital Management See more at psc.nsw.gov.au/hcm Index - Business
SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk
SHAREPOINT SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S SHAREPOINT CAPABILITY Lockheed Martin offers a full end to end service, delivering
Sample Quality Management Plan
This reference documents project-specific quality assurance and quality control procedures appropriate to the size, complexity, and nature of the project. Quality improvements are also documented and may
