INFORMATION TECHNOLOGY TRAINING COURSES

Size: px
Start display at page:

Download "INFORMATION TECHNOLOGY TRAINING COURSES"

Transcription

1 INFORMATION TECHNOLOGY TRAINING COURSES

2 ICT 01 Microsoft OneNote 2013 Essentials In its simplest form, OneNote is an electronic version of a paper notebook where you can write down notes, thoughts, ideas, scribbles, reminders, and all kinds of other information. Unlike the traditional document page format of other programs such as word-processing or spreadsheet programs, OneNote offers a freeform canvas where you can type, write, or draw notes in the form of text, graphics, and images wherever and however you want them. Unlike the notes in a paper notebook, OneNote lets you add, move, and delete anything on its pages and in its sections. You can add more space where and when you need it, and you can stay organized by dragging note items into their own sections or even into different notebooks. You can separate and organize your notes by subjects or projects, or keep separate notebooks for different places and interests. OneNote is easy to use, and it doesn't force everyone to work in the same way. Course Contents: The course covers Create a OneNote notebook Working with Local Notebooks and Notebook Views Organize a notebook Create and Organize Sections and Pages Manage notebook content Locate Information in a Notebook Share information from a Notebook Share Notebooks Opening and Protecting Shared Notebooks. For Whom: Suitable for all cadres of staff in any organization. ICT 02 ICT and Office This course aims to enhance the knowledge of secretaries, personal assistants, clerical officers and office manager regarding the role of office management and its importance and to upgrade core office management skills. It provides opportunity to share experiences of best practices of office management among participants and also to assist participants in the effective implementation of learning in the work context. Contents: Computer Fundamental Concepts Guide to Administrative Behaviour Office Organization, Work Planning and Control Managing the Boss, the Office and Professional Ethics Managing Official and Confidential Information Office Account Procedure and Practice Office Productivity. For Whom: Suitable for secretaries, personal assistants, clerical officers and office managers in both the public and private sectors. ICT 03 Internet Basics and Applications Many public officers and top executives are denied the pool of advantages in the use of modern electronic communication facility in the internet world. They cannot access their mails or send information electronically, not to talk of making useful research in the electronic world. This course is designed to break the barriers and expose participants to the internet world.

3 Course Contents: The course will cover basic internet principles the service providers and users how the internet works World Wide Web basics set up cyber cafes electronic commerce and security concerns. For Whom: All middle and top public officers and top executives of public and private organizations. ICT 04 Understanding the New Government Integrated Financial Information System (GIFMIS) With the implementation of the e-payment System Platform (Remita), the Integrated Personnel and Payroll Information System (IPPIS), the Treasury Single Account (TSA) and the Government Integrated Financial Information System (GIFMIS), it becomes understandable that all financial transactions of government are carried out electronically. This new development posed a lot of challenges to all treasury staff towards the usage of the new systems and payment arrangements. In a bid to overcome these challenges, the training programme is specially designed for all Treasury staff across all the MDAsto be proficient, knowledgeable and highly skillful in the usage of the e-transaction platforms in the public sector. Course Contents: The course covers Overview of Financial Systems in Nigeria Introduction to CBN e-payment Platform (Remita) Introduction to Government Integrated Financial Information System (GIFMIS) GIFMIS System Set-up Understanding GIFMIS Chart of Accounts GIFMIS Processes and Procedure Generating Financial Reports Risk in the Electronic Financial System. For Whom: Suitable for all treasury accountants in line ministries, agencies and offices both at the state and federal government. ICT 05 Information System for Effective Process and Decision Making Information Systems (MIS) are databases incorporated on computer networks that provide relevant information to management for appropriate decision making. MIS components consist of management considerations and expectations, computer networks, information structures and sharing schemes, data transmission devices, and overall control and security of the information. MIS is used by lower and middle management in carrying out their day-to-day operational activities and short-term tactical activites. Decision Support Systems (DDS) and Executive Support Systems (ESS) are used by middle and top management for medium-term and longterm strategic decisions. Course Contents: These include the following information technology basics information management and integration database developments networking principles data transmission, standardization and security.

4 For Whom: Suitable for middle and top management staff of an organization. ICT 06 Information Security The Federal Government of Nigeria in its transformation agenda has embarked on efforts to implement its e-government policy by bringing in so many reforms in the Financial and Economic Sectors, the Electoral process, the Education and Public Service sector. There is no doubt that all government agencies has embraced electronic way of Revenue Forecasting, Generation, Finance and Accounting, Office, Human Resource and Payroll Administration. However, as good as the policy maybe, it is also of note that the system may breed a lot of fraud, thereby defrauding the Federal Government of its accrued revenue and also making a mockery of the Government policy. The objective of this training programme is to equip public servants with relevant skills and knowledge to be able to manage information security risks and threats. Course Contents: The course covers Access Control Principles and Objectives Telecommunications Security Objectives, Threats and Countermeasures Risk and Business Continuity Planning Policy, Standards and Organization Computer Architecture and System Security Law, Investigation and Ethics Cryptography Computer Operations Security. For Whom: Suitable for all ICT Staff in line ministries, agencies and offices both at the state and federal government. ICT 07 Information Technology Service (ITSM) The programme will provide a detailed, modular introduction to the concepts, terms, definitions, benefits, objectives, and relationships with core IT Service processes and functions, according to the ITIL best practice framework. The programme is based on principles described in ITIL s Service Support and Service Delivery Standards. The programme will prepare participants for the examination leading to the Foundation Certificate in IT Service. Course Contents: The course covers Introduction to Service The Service Lifecycle Service Portfolio Service Level Incident Change Financial Service Catalogue Availability Supplier Service Assets and Configuration For Whom: Suitable for Middle and Top Staff of IT Departments in Government Ministries, Departments and Regulatory Agencies, Private and Public Companies, and Banks.

5 ICT 08 Application of ICT to Human Resource All public and private offices, including businesses and government, generate personnel records. Personnel records play a vital role in providing the information needed by organizations to manage and pay their staff members, plan their workforce requirements and monitor staff performance. Ultimately, any organization s development and sustainability will depend on sound and effective human resource management, and the approaches it chooses to follow will be derived in part from an analysis of the information contained in personnel records. The purpose of this course is to provide guidance to those who create, use and keep personnel records, both in paper and electronic form. With the introduction of Human Resource Information Systems (HRIS), human resource management functions and processes are increasingly conducted electronically. Contents: Human Resource : An Overview Information System Evolution of ICT in Human Resource Human Resource Information System (HRIS) IPPIS Process: An Overview Improving Personnel Record-keeping System and Verifying the Payroll. For Whom: Suitable for Human Resource Personnel, Payroll and Salary Officers and Auditors ranging from lower, middle to top management team in both the public and private sectors. ICT 09 Computer Assisted Auditing and Risk With the computerization of all financial transactions of government, coupled with the implementation of the e-payment system, the Integrated Payroll and Personnel Information System (IPPIS), Government Integrated Financial Information System (GIFMIS) and e-tax System in the country, it becomes imperative for all Public Auditors to be proficient and highly skillful in the operation of computer assisted auditing software. Contents: Internal Auditing: An Overview Human Aspect of Internal Auditing Internal Control Risk Analysis and Information System (IS) Audit Process Computer Assisted Auditing Techniques, (ACL Software) International Auditing Standards Audit Reporting. For Whom: Suitable for all Public Sector Auditors (both Internal and External) ranging from lower, middle to top management team. ICT 10 e-government Strategies and Implementation e-government which is the application of information & communication tools in government, world over, is currently changing the way government business is implemented

6 with emphasis on due diligence, transparency, efficiency in the delivery of government services. We live in an increasingly interconnected society, where the Internet has spawned tremendous improvements in efficiency and customer service. People use the telephone and the Internet to get service 24 hours a day, seven days a week. More than 60 percent of all Internet users interact with government websites. E-Government will save taxpayers a significant amount of money, while adding value to citizens experience with government and better serving their needs. Contents: Introduction to e-governance and it s Components E-government Strategy Nigeria s March to e-government Practical examples of e-government implementation in Nigeria e-government: Lessons of Experience Chief Concern for e-government Key Issues for e-government Governance and of Change. For Whom: Suitable for all levels of managers in the Public and Private sectors ranging from lower, middle to top management team. ICT 11 Information Technology Infrastructure Library (ITIL) ITIL is an approach to deliver proactive and pragmatic IT Service. Depending upon industry sector, ITSM related costs account between 65%-80% of all IT expenditure. Put simply, IT Service (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Managing and mitigating IT risk is critical to the survival of every business. Proactive ITSM can be thought of as risk management for IT which can t be ignored by any public or private organization. This program is specially designed for all IT staff in any organization (Public and Private Sector) for decision making and risk assessment in IT products and services. Contents: IT Service IT Capabilities IT Resources IT Processes IT Functions and Operations. For Whom: This course is suitable for the following; Senior, Business Unit Managers, IT Staff responsible for keeping the IT System running, all IT products and services end users in all public and private sector. ICT 12 Cloud Computing This training program helps attendees understand the rapidly developing world of cloud computing. While the term is widely known, cloud computing's characteristics, architectures, and impact on system design is less widely understood. JK Consulting Cloud Computing course clears the fog regarding cloud computing and enables organizations to clearly grasp the potential of cloud computing for their future IT initiatives. Training Overview: Attendees to this workshop will learn cloud fundamentals as well as explore how to apply cloud computing to their applications and infrastructures.

7 Course Contents: These include the following Key cloud computing characteristics Cloud computing architectures and impact on application design Managing cloud infrastructures Ensuring data privacy and storage persistence Creating a cloud computing action plan. For Whom: Suitable for Senior IT managers assessing the potential for leveraging cloud computing, System architects designing systems incorporating cloud computing, IT operations managers responsible for infrastructure services and Application developers considering cloud computing options for future projects.

ITIL's IT Service Lifecycle - The Five New Silos of IT

ITIL's IT Service Lifecycle - The Five New Silos of IT The workable, practical guide to Do IT Yourself Vol. 4.01 January 1, 2008 ITIL's IT Service Lifecycle - The Five New Silos of IT By Rick Lemieux In my last article I spoke about IT s evolution from its

More information

ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT

ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT POSITION: REPORTS TO: LOCATED: ICT Service Desk Team Leader ICT Services Design Manager Kings Way, South Melbourne DATE: March 2015 ORGANISATIONAL ENVIRONMENT Melbourne City Mission is a leader and innovator

More information

Integrating Project Management and Service Management

Integrating Project Management and Service Management Integrating Project and Integrating Project and By Reg Lo with contributions from Michael Robinson. 1 Introduction Project has become a well recognized management discipline within IT. is also becoming

More information

Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you

Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you Fujitsu Cloud IaaS Trusted Public S5 shaping tomorrow with you Realizing the cloud opportunity: Fujitsu Cloud iaas trusted Public s5 All the benefits of the public cloud, with enterprise-grade performance

More information

Introduction. The key Human Capital functional areas in the Commission include the following: Manpower Planning & Recruitment

Introduction. The key Human Capital functional areas in the Commission include the following: Manpower Planning & Recruitment HR MANAGEMENT SYSTEMS: THE CASE OF THE NIGERIAN COMMUNICATIONS COMMISSION Introduction The Nigerian Communications Commission is the independent National Regulatory Authority charged with the responsibility

More information

Knowledge Management 101 Better Support Decisions, Faster

Knowledge Management 101 Better Support Decisions, Faster Knowledge Management 101 Better Support Decisions, Faster A Third Sky White Paper By Brian Florence, ITSM Senior Consultant for Third Sky, Inc. Third Sky, Inc. Introduction Information used to support

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

ITIL Service Lifecycle Stream

ITIL Service Lifecycle Stream ITIL Lifecycle Stream Syllabus at a Glance Strategy Design Transition Operation Continual Improvement Introduction to service strategy Introduction to service design Introduction to service transition

More information

Job Description. UK Payments Administration. Security Unit. Salary Band:

Job Description. UK Payments Administration. Security Unit. Salary Band: Job Description Job Title: Security Manager Company: UK Payments Administration Unit: Security Unit Reporting To: Director of Security Salary and: D Purpose of Job The security manager role is the principal

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Duration: One year with the option of an additional year based on performance.

Duration: One year with the option of an additional year based on performance. Position: Adviser to the Internal Audit Unit Objectives: A person to support the newly established Internal audit unit to transform it from its infancy stage to a unit that is a trusted adviser, and more

More information

Information Management

Information Management G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,

More information

CITY OF HOUSTON. Executive Order. Information Technology (IT) Governance

CITY OF HOUSTON. Executive Order. Information Technology (IT) Governance CITY OF HOUSTON Executive Order E.O. No: 1-44 Effective Date: December 20, 2012 1. AUTHORITY 1.1 Article VI, Section 7a, of the City Charter of the City of Houston. 2. PURPOSE 2.1 The City of Houston seeks

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security

More information

The Global Workspace Alliance USER-FOCUSED SOLUTIONS FOR TODAY S GLOBAL WORKSPACE NEEDS

The Global Workspace Alliance USER-FOCUSED SOLUTIONS FOR TODAY S GLOBAL WORKSPACE NEEDS The Global Workspace Alliance USER-FOCUSED SOLUTIONS FOR TODAY S GLOBAL WORKSPACE NEEDS INTRODUCING The Global Workspace Alliance USER-FOCUSED SOLUTIONS FOR TODAY S GLOBAL WORKSPACE NEEDS To thrive in

More information

Ministry of Information and Communication Technology

Ministry of Information and Communication Technology 26. MINISTRY OF INFORMATION AND COMMUNICATION TECHNOLOGY 26.1 The (MICT) has as mission to provide the right environment for the harnessing of Information and Communication Technologies to generate employment,

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

October 7, 2011. Presented to. The PMI Washington DC Chapter. Pedro Agosto. Director of Client Services, XA Systems, LLC. pedro.agosto@xasystems.

October 7, 2011. Presented to. The PMI Washington DC Chapter. Pedro Agosto. Director of Client Services, XA Systems, LLC. pedro.agosto@xasystems. October 7, 2011 Presented to The PMI Washington DC Chapter By Pedro Agosto Director of Client Services, XA Systems, LLC pedro.agosto@xasystems.com Introduction Re-evaluating IT Services Today s Challenges

More information

SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM

SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM Optimizing ITSM for Cloud Computing Reginald Lo Director, Accelerate Management, VMware rlo@vmware.com Session Description Organizations

More information

Introduction to ITIL for Project Managers

Introduction to ITIL for Project Managers CSC NORTH AMERICAN PUBLIC SECTOR Introduction to ITIL for Project Managers May Chantilly Luncheon Linda Budiman, PMP ITILv2 & ITILv3 Process Architect ITIL Service Manager, CobiT certified 5/13/2008 8:08:45

More information

Availability Management: A CA Service Management Process Map

Availability Management: A CA Service Management Process Map TECHNOLOGY brief: AVAILABILITY MANAGEMENT Availability : A CA Process Map Malcolm Ryder ARCHITECT CA SERVICES Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 Simplifying ITIL How to Use the

More information

Tentative Action Plan

Tentative Action Plan Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information

More information

General Guidelines for the Development of Government Payment Programs

General Guidelines for the Development of Government Payment Programs General Guidelines for the Development of Government Payment Programs Social Safety Nets Course Washington D.C., 15 December 2014 Massimo Cirasino, Head, Payment Systems Development Group The World Bank

More information

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care

More information

Best Practice ITIL (Information Technology Infrastructure Library)

Best Practice ITIL (Information Technology Infrastructure Library) Best Practice ITIL (Information Technology Infrastructure Library) To achieve G H Bank s overall objectives, the Information Technology Group must provide excellent cutting-edge IT services to all stakeholders

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet

Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet Management and Use of Information & Information Technology (I&IT) Directive Management Board of Cabinet February 28, 2014 TABLE OF CONTENTS PURPOSE... 1 APPLICATION AND SCOPE... 1 PRINCIPLES... 1 ENABLE

More information

NSW Government ICT Governance Framework for Whole of Government Investments

NSW Government ICT Governance Framework for Whole of Government Investments NSW Government ICT Governance Framework for Whole of Government Investments November 2014 CONTENTS 1. Introduction 1 2. Scope and application 2 3. Purpose 2 4. Outcomes 2 5. Governance framework 3 6. Governance

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...

More information

IBM Software Cloud service delivery and management

IBM Software Cloud service delivery and management IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,

More information

ENTERPRISE RISK MANAGEMENT FRAMEWORK

ENTERPRISE RISK MANAGEMENT FRAMEWORK ROCKHAMPTON REGIONAL COUNCIL ENTERPRISE RISK MANAGEMENT FRAMEWORK 2013 Adopted 25 June 2013 Reviewed: October 2015 TABLE OF CONTENTS 1. Introduction... 3 1.1 Council s Mission... 3 1.2 Council s Values...

More information

Cloud security with Sage Construction Anywhere

Cloud security with Sage Construction Anywhere Cloud security with Sage Construction Anywhere Table of Contents Cloud computing s advantage for construction companies... 3 Security concerns... 3 The Sage commitment to security... 4 Sage application

More information

IMTC SPECIAL TRAINING CALENDAR FOR 2015/2016

IMTC SPECIAL TRAINING CALENDAR FOR 2015/2016 SPECIAL TRAINING CALENDAR FOR 2015/2016 PUBLIC RELATIONS & PROTOCOL OFFICERS COURSE 1. Protocol and Event Management 2. Planning & Managing PR Campaigns 3. Protocol Etiquette and Civility Course 4. International

More information

MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE

MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE IT SYSTEMS COMPLIANCE AND QUALITY ASSURANCE SPECIALIST

More information

Software Licenses Managing the Asset and Related Risks

Software Licenses Managing the Asset and Related Risks AUDITOR GENERAL S REPORT ACTION REQUIRED Software Licenses Managing the Asset and Related Risks Date: February 4, 2015 To: From: Wards: Audit Committee Auditor General All Reference Number: SUMMARY The

More information

ISO20000: What it is and how it relates to ITIL v3

ISO20000: What it is and how it relates to ITIL v3 ISO20000: What it is and how it relates to ITIL v3 John DiMaria; Certified Six Sigma BB, HISP BSI Product Manager; ICT (ISMS,ITSM,BCM) Objectives and Agenda To raise awareness, to inform and to enthuse

More information

-Blue Print- The Quality Approach towards IT Service Management

-Blue Print- The Quality Approach towards IT Service Management -Blue Print- The Quality Approach towards IT Service Management The Qualification and Certification Program in IT Service Management according to ISO/IEC 20000 TÜV SÜD Akademie GmbH Certification Body

More information

NIST Cyber Security Activities

NIST Cyber Security Activities NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division

More information

ITIL. Lifecycle. www.alctraining.com.my. ITIL Intermediate: Continual Service Improvement. Service Strategy. Service Design. Service Transition

ITIL. Lifecycle. www.alctraining.com.my. ITIL Intermediate: Continual Service Improvement. Service Strategy. Service Design. Service Transition Take your ITIL skills to the next level ITIL Lifecycle ITIL Intermediate: Part of the complete ITIL Education Program Advance your career Add value to your organisation Gain credits towards ITIL Expert

More information

ITIL Foundation for IT Service Management 2011 Edition

ITIL Foundation for IT Service Management 2011 Edition ITIL Foundation for IT Service Management 2011 Edition ITIL Rev 03.12 3 days Description ITIL (IT Infrastructure Library) provides a practical, no-nonsense framework for identifying, planning, delivering

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

Network Resource Management Directive

Network Resource Management Directive Office of the Prime Minister Central Information Management Unit Directive document CIMU D 0036:2003 Network Resource Management Directive Version: 1.0 Effective date: 10.12.2003 Table of Contents 1. Purpose...3

More information

2014 Health Insurance List of jobs

2014 Health Insurance List of jobs Chief Executive Officer Business Unit Head of Network Services Account Implementation Specialist Behavioral Health Case Manager II Chief Operating Officer Chief Administrative Officer Head of Strategic

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer Agenda 1. Introduction to Configuration Management 2. Importance of Configuration Management 3. Should we care? 4.

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA INFORMATION SYSTEMS AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY GENERAL CONTROLS OCTOBER 2014 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR

More information

Charities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Charities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Charities & Not for Profit Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Charities are there to help those in need. But who helps

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

Section 4 MANAGEMENT CONTROLS AND PROCESSES. Section 4

Section 4 MANAGEMENT CONTROLS AND PROCESSES. Section 4 Section 4 MANAGEMENT CONTROLS AND PROCESSES Section 4 MANAGEMENT CONTROLS AND PROCESSES MANAGEMENT CONTROLS AND PROCESSES FEATURED IN THIS SECTION 4.1 Information Management Framework... 1 4.2 Strategic

More information

Introduction to Microsoft OneNote 2007

Introduction to Microsoft OneNote 2007 Introduction to Microsoft OneNote 2007 This document provides a basic overview of the features in Microsoft OneNote 2007. What is OneNote? In its simplest form, OneNote is an electronic version of a paper

More information

How To Understand And Implement Pas 55

How To Understand And Implement Pas 55 White Paper June 2009 Enabling the benefits of PAS 55: The new standard for asset management in the industry Page 2 Contents 2 Introduction 2 The PAS 55 asset management standard 4 The scope of PAS 55

More information

ITIL Service Lifecycle Design

ITIL Service Lifecycle Design ITIL Service Lifecycle Design Course Details Course Code: Duration: Notes: ITILSL-Des 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based on

More information

Optimizing the Data Center for Today s Federal Government

Optimizing the Data Center for Today s Federal Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,

More information

2.0 OBJECTIVES OF THE CONSULTANCY SERVICE

2.0 OBJECTIVES OF THE CONSULTANCY SERVICE TERMS OF REFERENCE FOR AN INDEPENDENT DATA BASE MANAGEMENT AND IT CONSULTANT TO PROVIDE PREPARATION AND IMPLEMENTATION SUPPORT FOR THE NEITI INDUSTRY AUDIT DATA MANAGEMENT SYSTEM (NIADMS) 1.0 BACKGROUND

More information

1. Verzeichnis der ITIL V3 Service Strategy Prozesse

1. Verzeichnis der ITIL V3 Service Strategy Prozesse 1. Verzeichnis der ITIL V3 Service Strategy Prozesse Service Strategy Service Portfolio Financial Conception of IT Strategy IT Financial Organization Maintenance of the Service Portfolio IT Budgeting Demand

More information

Accountability Report. Department of Internal Services

Accountability Report. Department of Internal Services Accountability Report 2014 2015 Department of Internal Services Table of Contents Accountability Statement... 3 Message from the Minister and Deputy Minister... 4 Financial Results... 5 Measuring Our Performance...

More information

Governance and Audit Committee 23 November 2015

Governance and Audit Committee 23 November 2015 Agenda Item 7 Governance and Audit Committee 23 November 2015 Welland Internal Audit Consortium Internal Audit Plan & Performance Update 2015/16 Purpose of report: To provide Members with information on

More information

White paper. Secure Cloud Services: An Integrated Approach

White paper. Secure Cloud Services: An Integrated Approach White paper Secure Cloud Services: An Integrated Approach Edition October 2013 Whitepaper Information Management Secure Cloud Services: An Integrated Approach Edition October 2013 Copyright 2013 EXIN All

More information

Internal Audit Manual

Internal Audit Manual COMPTROLLER OF ACCOUNTS Ministry of Finance Government of the Republic of Trinidad Tobago Internal Audit Manual Prepared by the Financial Management Branch, Treasury Division, Ministry of Finance TABLE

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Developing and implementing e-procurement

Developing and implementing e-procurement Developing and implementing e-procurement Public Procurement in the EU the 2020 Agenda Governments and Public Administration: 5 Major IT Trends e-services: Increasing efficiency and transparency by delivering

More information

1. Global E Business and Collaboration. Lecture 2 TIM 50 Autumn 2012

1. Global E Business and Collaboration. Lecture 2 TIM 50 Autumn 2012 1. Global E Business and Collaboration Lecture 2 TIM 50 Autumn 2012 Objective of the Learning The Major Feature of Business Systems Performance of Business Organization Levels of Business management The

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

ITIL V3 - The Future Is Here

ITIL V3 - The Future Is Here ITIL V3 - The Future Is Here Copyright Notice Copyright Axios Systems 2007. The information, which is contained in this document, is the property of Axios Systems. The contents of the document must not

More information

ASTRAZENECA GLOBAL POLICY SAFETY, HEALTH AND ENVIRONMENT (SHE)

ASTRAZENECA GLOBAL POLICY SAFETY, HEALTH AND ENVIRONMENT (SHE) ASTRAZENECA GLOBAL POLICY SAFETY, HEALTH AND ENVIRONMENT (SHE) THIS POLICY SETS OUT HOW WE WILL MEET OUR COMMITMENT TO OPERATING OUR BUSINESS IN A WAY THAT PROTECTS PERSONAL HEALTH, WELLBEING AND SAFETY

More information

Surviving an Identity Audit

Surviving an Identity Audit What small and midsize organizations need to know about the identity portion of an IT compliance audit Whitepaper Contents Executive Overview.......................................... 2 Introduction..............................................

More information

Job Description: Head of Finance and Business Administration

Job Description: Head of Finance and Business Administration Job Description: Head of Finance and Business Administration Reports to: Location: Hours: Chief Executive Office (Birmingham) Based Average 2 day per week (flexible) Fixed term for 12 months Reporting

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

iso20000templates.com

iso20000templates.com iso20000templates.com Public IT Limited 2011 IT Service Policy Document Ref. ITSM01001 Version: 1.0 Draft 1 Document Author: Document Owner: V 1.0 Draft 1 Page 1 of 11 Revision History Version Date RFC

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Module: Computer Literacy Knowing how to use a computer has become a necessity for many people.

More information

The Cloud computing in the SIF

The Cloud computing in the SIF The Cloud computing in the SIF Needs and experiences from requirements point of view RELATORE: 8 th November 2010 Agenda Company Profile The computing infrastructure of the Tax Information System (in Italian

More information

ITIL: Foundation (Revision 1.6) Course Overview. Course Outline

ITIL: Foundation (Revision 1.6) Course Overview. Course Outline ITIL: Foundation (Revision 1.6) Course Overview The ITIL Foundation Certification Course introduces the new student to the fundamentals of IT Service Management as described in the IT Infrastructure Library

More information

Information Security Management System for Microsoft s Cloud Infrastructure

Information Security Management System for Microsoft s Cloud Infrastructure Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System

More information

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Technical Management Strategic Capabilities Statement. Business Solutions for the Future Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.

More information

BANGALORE ELECTRICITY SUPPLY COMPANY LTD.

BANGALORE ELECTRICITY SUPPLY COMPANY LTD. BANGALORE ELECTRICITY SUPPLY COMPANY LTD. TRAINING & HUMAN RESOURCES DEVELOPMENT POLICY - 2015 Policy approved by the Governing Board Meeting on 15 Sept 2015 Page 2 of 12 BANGALORE ELECTRICITY COMPANY

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Storm Clouds Ahead? A risk analysis of Cloud Computing

Storm Clouds Ahead? A risk analysis of Cloud Computing Storm Clouds Ahead? A risk analysis of Cloud Computing Andy Bolton Chief Executive Officer, Capacitas Abstract Many organisations are now considering using 'Cloud Computing' offerings to meet their scalability

More information

Understanding changes to the Trust Services Principles for SOC 2 reporting

Understanding changes to the Trust Services Principles for SOC 2 reporting Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting

More information

Public Service ICT Strategy

Public Service ICT Strategy January 2015 Delivering better outcomes and efficiency through innovation and excellence in ICT. Contents FOREWORD.3 1. EXECUTIVE SUMMARY... 4 1.1 Strategic Direction... 5 1.2 Strategic Objectives Overview...

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper BRIDGE the gaps between IT, cloud service providers, and the business. IT service management for the cloud Business white paper Executive summary Today, with more and more cloud services materializing,

More information

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface. iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 4 1.2 Context 4 1.3 Purpose 8 1.4 Usage 8 2 Management

More information

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012 GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental

More information

Interim Audit Report. Borough of Broxbourne Audit 2010/11

Interim Audit Report. Borough of Broxbourne Audit 2010/11 Interim Audit Report Borough of Broxbourne Audit 2010/11 The Audit Commission is an independent watchdog, driving economy, efficiency and effectiveness in local public services to deliver better outcomes

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

Introduction: ITIL Version 3 and the ITIL Process Map V3

Introduction: ITIL Version 3 and the ITIL Process Map V3 Introduction: ITIL Version 3 and the ITIL Process Map V3 IT Process Maps www.it-processmaps.com IT Process Know-How out of a Box IT Process Maps GbR, 2009-2 - Contents HISTORY OF ITIL... 4 The Beginnings...

More information

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

POSITION INFORMATION DOCUMENT

POSITION INFORMATION DOCUMENT POSITION INFORMATION DOCUMENT Position Title: Senior Manager, ICT Contracts Classification Code: ASO8 Division: ICT Services Directorate: ICT Contracts & Performance Management Type of Appointment: Branch:

More information

How To Become An Information Technology Consultant

How To Become An Information Technology Consultant Developing Tomorrow s Workforce Today Information and Communications Technology Council Conseil des technologies de l information et des communications Highlights of the ICT Competency Profiles framework

More information

UNITED KINGDOM DEBT MANAGEMENT OFFICE. Executive Agency Framework Document

UNITED KINGDOM DEBT MANAGEMENT OFFICE. Executive Agency Framework Document UNITED KINGDOM DEBT MANAGEMENT OFFICE Executive Agency Framework Document April 2005 UNITED KINGDOM DEBT MANAGEMENT OFFICE Executive Agency Framework Document April 2005 FOREWORD BY THE FINANCIAL SECRETARY

More information