MANAGING DAILY SECURITY OPERATIONS WITH LEAN AND KANBAN
|
|
|
- Felix Quinn
- 10 years ago
- Views:
Transcription
1 MANAGING DAILY SECURITY OPERATIONS WITH LEAN AND KANBAN Gene Kim IT Revolution Press Branden R. Williams HireBranden.com Session ID: END-W22 Session Classification: Intermediate
2 AGENDA AND OBJECTIVES Discuss Lean & Applicability Reveal Challenges with the Volume of Work Discuss the Three Ways Show Transformation Phases Drink and be Merry
3 HOW IS AN IT/IS PERSON S DAY PRIORITIZED TODAY?
4 1: THE BIGGEST FIRE
5 2: THE LOUDEST EXECUTIVE
6 WHERE DOES THIS LEAD US? To the hamster wheel of pain and suffering!
7 The Familiar Problem (Scrub for non-dupes) We get dumped on by everyone Our work is always late We sometimes make promises that we can t deliver on We defer work that we shouldn t No one takes no for an answer We act before understanding the business Business is dissatisfied with our work
8 THERE MUST BE A BETTER WAY
9 THE GOAL, DR. ELIYAHU M. GOLDRATT Who here is an MBA? You ve probably read this! Introduces Theory of Constraints
10 IT SECURITY IS AN ELECTRONIC FACTORY Concepts that drive physical factories can drive IT/IS work Lean production in factories can teach us quite a bit about systems and types of work Physical or digital, the concepts apply universally We have inputs, WIP, and outputs Some of our inputs and outputs may not be tangible (unless printed) What is WIP? Work In Process, or work that is incomplete It is neither raw materials nor a finished product Ties up input resources and prevents useful outputs from flowing through It s the gunk in the IT/IS machine!
11 WHAT IS LEAN? Lean is a system that does two things: Reduce waste Improve throughput Common analogies: Manufacturing (plants) Supply chain Key differentiator: PULL system VISUALIZED work
12 THE FIRST WAY: SYSTEMS THINKING (L TO R) Understand the flow of work Always seek to increase flow Never unconsciously pass defects downstream Never allow local optimization to cause global degradation Achieve profound understanding of the system
13 WHAT IS WORK? Inputs: Dev project reviews Prep for upcoming audits Deploy security technologies Fix audit findings Migrate from virtual to cloud Preventive projects to elevate constraint WIP: Unfinished projects Code changes prior to deploy Uncommitted changes
14 WHAT IS WORK? (CONTINUED) Outputs Completed projects Services running Audits complete Completed projects Happy customers
15 EXAMPLE: A TYPICAL TODO LIST Prepare But budget presentation wait. for exec staff Approve change for Order Entry application Pull log files for PCI assessors Create report on Microsoft Super Tuesday THERE S Respond audit findings for SOX audit (OVERDUE) Apply firewall rules from last change control meetings Review due diligence report from cloud vendor Build MORE!! service catalog for infosec program (duh) Research that new web attack technique: does it affect us?
16 EXAMPLE: A LONGER TYPICAL TODO LIST Reach out to new internal auditor Think about unified control strategy for compliance (3 rd year on TODO list) Create appointment with developer, asking to stop avoiding input validation (who is his manager?) Find out who owns server TWX : is port 9050 really supposed to be open? (TOR?) Respond to angry from Marketing director: privacy regulations aren t optional (!!) Sarah: please take me off the physical security alert list Read that report from external auditor: can t TL;DR any more
17 KANBAN What is it, and why does it work? Created by Taiichi Ohno (Toyota) Scheduling board for lean production Good: Visualizes work in a system Better: Visualizes work FLOW THROUGH a system Outcomes: WORK GETS DONE! Work takes less time to complete (i.e., reduced cycle time, on time!) Better tracking of effort and costs Find recurring work that we can automate Find work where there s too much time waiting or in queue Business gets what they need, when they need it Infosec becomes viewed as a reliable partner
18 SAMPLE KANBAN PROCESS W/WIP LIMITS READY DOING (2) DONE Add Write MS project plan to patch for new automated distribution code deployment system Review code for Project Hoosegow, Sprint 39
19 WHAT WORK IS REALLY MOST IMPORTANT? Top line goals of top executives exist for a reason Does your work align to those goals? Does it help those executives meet those goals? If not, WHY ARE YOU DOING IT? Understand where controls exist in the business As the keeper of the IT controls, are you responsible for catching everything? What other controls exist in the business that you can leverage to avoid putting work into the system? Or, even better, if you identify a constraint around another control, can you do work to elevate that constraint for the business?
20 WORK SHOULD ALWAYS SUPPORT BUSINESS Top line goals of top executives exist for a reason Does your work align to those goals? Does it help those executives meet those goals? If not, WHY ARE YOU DOING IT? Understand where controls exist in the business As the keeper of the IT controls, are you responsible for catching everything? What other controls exist in the business that you can leverage to avoid putting work into the system? Or, even better, if you identify a constraint around another control, can you do work to elevate that constraint for the business?
21 HOW DO YOU SUPPORT THE BUSINESS? Infuriating platitude: Infosec needs to enable the business Goal: Grow European business by 20% Y/Y Response: Because we are good at information security, we can run the business at a lower fraud rate and take on riskier (and more lucrative) business than our competitors Going from mythical, consultant-sounding speak to actions is hard.
22 SELLING INFOSEC Pride before fall, fall before redemption Offense is profit center (NFL: scoring points on board; projects) Steal market share, acquiring companies Investing in new products (giving budget) Diversify or enable new channels/markets Defense is a cost center Exclusive use of scarce resource or supply chain resource Divesting business to protect the core (getting rid of POS system); Business waste
23 BUSINESS ALIGNMENT EXAMPLE Performance Measures Area of IT Reliance Business Risk Due to IT IT Controls Relied Upon 1. Understanding customer needs and wants 2. Product portfolio 3. Time to market (R&D) 4. Sales forecast accuracy 5. Sales pipeline 6. Customer on-time delivery 7. Customer retention
24 BUSINESS ALIGNMENT EXAMPLE (CONT.) Performance Measures Area of IT Reliance Business Risk Due to IT IT Controls Relied Upon 1. Understanding customer needs and wants Order entry and inventory management systems 2. Product portfolio Order entry systems 3. Time to market (R&D) Phoenix 4. Sales forecast accuracy (same as #1) 5. Sales pipeline 6. Customer on-time delivery 7. Customer retention CRM, marketing campaign, phone/voic , MRP systems CRM, phone/voic , MRP systems CRM, customer support systems
25 BUSINESS ALIGNMENT EXAMPLE (CONT.) Performance Measures Area of IT Reliance Business Risk Due to IT IT Controls Relied Upon 1. Understanding customer needs and wants Order entry and inventory management systems Data not accurate, reports not timely and require rework 2. Product portfolio Order entry systems Data are inaccurate 3. Time to market (R&D) Phoenix 4. Sales forecast accuracy (same as #1) (same as #1) 5. Sales pipeline 6. Customer on-time delivery 7. Customer retention CRM, marketing campaign, phone/voic , MRP systems CRM, phone/voic , MRP systems CRM, customer support systems three-year cycle time & WIP makes clearing IRR hurdle rate unlikely Sales mgmt can t view/manage pipeline, customers can t add/change orders Customers can t add/change orders Sales cannot manage customer health
26 BUSINESS ALIGNMENT EXAMPLE (CONT.) Performance Measures Area of IT Reliance Business Risk Due to IT Controls Relied Upon 1. Understanding customer needs and wants Order entry and inventory management systems Data not accurate, reports not timely and require rework 2. Product portfolio Order entry systems Data are inaccurate 3. Time to market (R&D) Phoenix 4. Sales forecast accuracy (same as #1) (same as #1) 5. Sales pipeline 6. Customer on-time delivery 7. Customer retention CRM, marketing campaign, phone/voic , MRP systems CRM, phone/voic , MRP systems CRM, customer support systems three-year cycle time & WIP makes clearing IRR hurdle rate unlikely Sales mgmt can t view/manage pipeline, customers can t add/change orders Customers can t add/change orders Sales cannot manage customer health Need input validation to prevent bad data from Marketing Need weekly reporting capability Need testing of automated controls to ensure integrity of data Need better review of new projects to ensure business goals achievement likely Need better change and configuration controls around app and environment Loosen report controls to allow managers to add/modify reports Change control & sec reviews to ensure uptime
27 Exercise: Compare Resulting infosec program Vs. Typical Infosec program Respond to audits Prepare for audits Convince IT Operations to implement patches
28 THE SECOND WAY: AMPLIFY FEEDBACK LOOPS (R TO L) Understand and respond to the needs of all customers, internal and external Shorten and amplify all feedback loops: stop the line when necessary Create quality at the source Create and embed knowledge where we need it
29 THE TWITTER INFOSEC PROGRAM
30 WHAT THE TWITTER INFOSEC TEAM DID They integrated brakeman into the Dev continuous integration process It does static code analysis upon code commit or even developer save It s them whenever a vulnerability is found, along with instructions on how to fix it It send them a congratulation when the developer fixes the vulnerability
31 STATIC CODE ANALYSIS EARLY
32 OUTCOMES Developers get immediate feedback: issues are found and fixed earlier We ve encoded our expertise into the automated testing framework We ve reduced our workload
33 THE THIRD WAY: CONTINUAL EXPERIMENTATION Foster a culture that rewards: Experimentation (taking risks) and learning from failure Repetition is the prerequisite to mastery Why? You need a culture that keeps pushing into the danger zone And have the habits that enable you to survive in the danger zone
34 34 WHOOPS!
35 INJECT FAILURES OFTEN
36 YOU DON T CHOOSE CHAOS MONKEY Chaos Monkey Chooses You!
37 OUTCOMES Defects and vulnerabilities are fixed faster than ever Surface area of risk keeps shrinking Infosec activities integrated into the daily work of Dev and IT Operations Technical debt is finally paid down Information security risk has been reduced Infosec recognized as helping the business win More budget and staff given to infosec
38 38 THE PHOENIX PROJECT
39 Branden R. com QUESTIONS? Gene
40 Starting With The Business Goals
41 GARTNER RISK-ADJUSTED VALUE MGMT Contact Paul Proctor, Chief of Research, Risk and Security, Gartner, Inc. Or your Gartner rep
42 THANK YOU!
MANAGING DAILY SECURITY OPERATIONS WITH LEAN AND KANBAN
MANAGING DAILY SECURITY OPERATIONS WITH LEAN AND KANBAN Branden R. Williams (@BrandenWilliams) EVP, Sysnet Global Solutions Session ID: GRC- T01A Session Classification: General Interest AGENDA AND OBJECTIVES
Lean manufacturing in the age of the Industrial Internet
Lean manufacturing in the age of the Industrial Internet From Henry Ford s moving assembly line to Taiichi Ohno s Toyota production system, now known as lean production, manufacturers globally have constantly
Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
Manufacturing Flow Management
Manufacturing Flow Management Distribution D Distribution Authorized to Department of Defense and U.S. DoD Contractors Only Aim High Fly - Fight - Win Supply Chain Management Processes Information Flow
Migration Scenario: Migrating Batch Processes to the AWS Cloud
Migration Scenario: Migrating Batch Processes to the AWS Cloud Produce Ingest Process Store Manage Distribute Asset Creation Data Ingestor Metadata Ingestor (Manual) Transcoder Encoder Asset Store Catalog
Supply Chain Leaders Understanding and Improving Supply Chain Performance Where It Counts
Leaders Understanding and Improving Performance Where It Counts What is the Leaders Programme? Leaders is an action-oriented, practical programme which identifies the most vital supply chain improvements
Getting Started with Kanban Paul Klipp
Getting Started with Kanban Paul Klipp kanbanery 2 Contents 3/ Getting Started with Kanban 4/ What is Kanban? 7/ Using Kanban Does kanban apply to me? How can it help me? What will I have to change? 10/
Ten Critical Questions to Ask a Manufacturing ERP Vendor
Ten Critical Questions to Ask a Manufacturing ERP Vendor Plex Online White Paper At a Glance: The ERP industry has earned such a poor reputation for delivery in the last 20 years that users have learned
7 Deadly Sins of the DIY Cloud
7 Deadly Sins of the DIY Cloud Uncovering the Hidden Impact of Custom App Development in the Cloud The Do-It-Yourself Cloud Revolution Cloud computing has brought a revolution to application development.
VISUAL management techniques for optimum INVENTORY form, fit and function
You won t GET LEAN... until you GET VISUAL! VISUAL management techniques for optimum INVENTORY form, fit and function Raw materials, work-in-process, finished goods, location and product flow Kanban Min/max
Lean Manufacturing and Six Sigma
Lean Manufacturing and Six Sigma Research Questions What have we done in the past? What must we do in the future? How do we know these are the correct actions? 1 Lean Definitions Key concepts of lean:
Stop doing data entry... Let Chatter bring updates to you... Make territory planning painless... Plan on making a big deal...
7 data.com Table of Contents Dreamforce 2012 was visionary. But it was also practical. And the proof is in this ebook. It has our top takeaways of basic strategies to help you make the biggest impact on
Elevate Customer Experience and Engagement in the New Digital World
Elevate Customer Experience and Engagement in the New Digital World John Chan CRM Solutions Lead, Microsoft Business Solutions Microsoft Asia Customer buying behavior has fundamentally changed therefore,
Lean and Kanban at Scale Extending Kanban across the portfolio, program and team levels. Al Shalloway, Net Objectives. September 4 th, 2014
Lean and Kanban at Scale Extending Kanban across the portfolio, program and team levels Al Shalloway, Net Objectives September 4 th, 2014 Implementing Kanban at Scale Al Shalloway, CEO & Founder of Net
Perfect Customer Relationship Management (CRM) System
Al-Andalus Software Development & Technology Co. Perfect Customer Relationship Management (CRM) System Product Overview Overview Perfect Customer Relationship Management (CRM) System empowers your sales,
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Ten Critical Questions to Ask a Manufacturing ERP Vendor
Ten Critical Questions to Ask a Manufacturing ERP Vendor At a Glance: The ERP industry has earned such a poor reputation for delivery in the last 20 years that users have learned to live within a very
Executive Guide to SAFe 24 July 2014. An Executive s Guide to the Scaled Agile Framework. [email protected] @AlShalloway
An Executive s Guide to the Scaled Agile Framework Al Shalloway CEO, Net Objectives Al Shalloway CEO, Founder [email protected] @AlShalloway co-founder of Lean-Systems Society co-founder Lean-Kanban
Infrastructure As Code: Fueling The Fire For Faster Application Delivery
A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft March 2015 Infrastructure As Code: Fueling The Fire For Faster Application Delivery Table Of Contents Executive Summary... 1 Companies
Second CRM CRM Solution for Small Companies
Second CRM CRM Solution for Small Companies Technologize Your Business TM Introductory Presentation June 2010 Agenda Second CRM On Demand CRM Solution Introduction Second CRM Features Pricing, Implementation
DELIVERING EXCEPTIONAL CUSTOMER CARE
REAL WORLD SCENARIOS Volume 1 Cases 1-4 DELIVERING EXCEPTIONAL CUSTOMER CARE WINNING THE HEARTS OF YOUR CUSTOMERS BUILDing THE FOUNDATION STREAMLINing SUPPORT CASES GAINing A COMPETITIVE ADVANTAGE knowing
HOW A CRM SOLUTION HELPS SMALL BUSINESSES
Book 3 of 4 HOW A CRM SOLUTION HELPS SMALL BUSINESSES PART OF THE CRM SUCCESS SERIES Introduction LEARNING ABOUT CRM Technology has changed the game for small businesses. Where department size was once
Responsible Big Data Governance: Preventing Regulatory Overreaction
Responsible Big Data Governance: Preventing Regulatory Overreaction Paulo Pereira Chief Data Architect and Governance Leader March 22th, 2015 Imagination at work The Industrial Internet What happened when
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Endeavour Dynamics Offering
Endeavour Dynamics Offering Microsoft Dynamics AX 2012 is recognised as a global leading ERP system that supports a single instance strategy for medium to large enterprise companies. Endeavour is proud
Five Tips to Achieve a Lean Manufacturing Business
Five Tips to Achieve a Lean Manufacturing Business Executive Overview Introduction The more successful manufacturers today are those with the ability to meet customer delivery schedules while maintaining
OPTIMIZING PRODUCTION
REAL WORLD SCENARIOS Volume 2 Cases 7-12 OPTIMIZING PRODUCTION SQUEEZE MORE OUT OF PRODUCTION OPTIMIZING SCHEDULING PRODUCTION FLOW IMPROVEMENTS INTEGRATED MAINTENANCE PLANNING INTEGRATED PROJECT MANAGEMENT
www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications
www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by & Oracle s Cloud CRM & CX Applications Agenda Introductions & Customer Experience / CX Defined Why CX is Critical Today?
Using Kanban Boards in Agile
Using Kanban Boards in Agile Project Management By Tony J Barrett LCDR USCG (Ret.), PE, EVP, PMP, CSM CEO of Valued Technology, Inc. Presented at PMI Seminar on 13 September 2013 Agenda A Brief History
Lean Metrics How to measure and improve the flow of work. Chris Hefley, CEO of LeanKit. November 5 th, 2014
Lean Metrics How to measure and improve the flow of work Chris Hefley, CEO of LeanKit November 5 th, 2014 Introduction to Lean Metrics What metrics should you measure? How to track them? What effect do
Resco Mobile CRM Vision
Resco Mobile CRM Vision Vision for next 3 years & more Table of Contents Mission Statement... 2 Main Areas of Focus... 3 CRM Tool... 3 Communication... 3 Calendaring... 3 Cloud Storage... 3 Customer Apps...
Appendix Lean Glossary Page 1
Appendix Lean Glossary Page 1 Andon Board A visual control device in a work area giving the current status on performance to expectations and alerting team members to emerging issues. Batch-and- Queue
Datasheet Electronic Kanban Ultriva vs. ERP ekanban Modules By Narayan Laksham
Datasheet Electronic Kanban Ultriva vs. ERP ekanban Modules By Narayan Laksham Summary: Several ERP vendors offer rudimentary Kanban modules to compliment their MRP systems. However, these Kanban modules
Security Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
The Resource Management Life Cycle
The Resource Management Life Cycle Resource Planning for 2013 Revised November 2012 http://epmlive.com Contents Introduction...2 What is Resource Management?...2 Who Participates in Resource Management?...2
ENTERPRISE MANAGEMENT AND SUPPORT IN THE TELECOMMUNICATIONS INDUSTRY
ENTERPRISE MANAGEMENT AND SUPPORT IN THE TELECOMMUNICATIONS INDUSTRY The Telecommunications Industry Companies in the telecommunications industry face a number of challenges as market saturation, slow
Lean Software Development and Kanban
1 of 7 10.04.2013 21:30 Lean Software Development and Kanban Learning Objectives After completing this topic, you should be able to recognize the seven principles of lean software development identify
The ITSM Journey. Value. Chaos. Patrick Bolger. Chief Evangelist Hornbill Service Management
The ITSM Journey Chaos Value Patrick Bolger Chief Evangelist Hornbill Service Management Agenda ITIL the realities of adoption Greatest barriers to improving ITSM The ITSM journey Reactive to proactive
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
THE 7 STEPS TO A SUCCESSFUL CRM IMPLEMENTATION DEPLOYING CRM IN THE NEW ERA OF CONNECTED CUSTOMERS
THE NEW ERA OF ABOUT THE AUTHOR Paul Rogers is the Head of Customer Experience and CRM within HCL s Applications Division. Based in London, Paul is responsible for leading HCL s CRM consulting and technology
RESEARCH NOTE NETSUITE S IMPACT ON MANUFACTURING COMPANY PERFORMANCE
Document K59 RESEARCH NOTE NETSUITE S IMPACT ON MANUFACTURING COMPANY PERFORMANCE THE BOTTOM LINE When Nucleus analysts investigated the use of NetSuite by manufacturers, they found these companies were
How to Manage Your Data as a Strategic Information Asset
How to Manage Your Data as a Strategic Information Asset CONCLUSIONS PAPER Insights from a webinar in the 2012 Applying Business Analytics Webinar Series Featuring: Mark Troester, Former IT/CIO Thought
Shifting Roles for Security in the Virtualized Data Center: Who Owns What?
Shifting Roles for Security in the Virtualized Data Center: Who Owns What? SESSION ID: CSV-T07 Rob Randell, CISSP Director Systems Engineering Principal Security Architect VMware / NSBU Malcolm Rieke Director
Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
Why Cloud BI? The 10 Substantial Benefits of Software-as-a-Service Business Intelligence
The 10 Substantial Benefits of Software-as-a-Service Business Intelligence Executive Summary Smart businesses are pursuing every available opportunity to maximize performance and minimize costs. Business
How to make effective Outbound Contact Center. Taweewut Waicharoen April 9,09
How to make effective Outbound Contact Center Taweewut Waicharoen April 9,09 Agenda Overview of Outbound Contact Center Telemarketing and Collection business practices Virtual Agents KPI in Contact Center
CREATING PACKAGED IP FOR BUSINESS ANALYTICS PROJECTS
CREATING PACKAGED IP FOR BUSINESS ANALYTICS PROJECTS A PERSPECTIVE FOR SYSTEMS INTEGRATORS Sponsored by Microsoft Corporation 1/ What is Packaged IP? Categorizing the Options 2/ Why Offer Packaged IP?
Scaling Agile Is Hard, Here s How You Do It!
Scaling Agile Is Hard, Here s How You Do It! Diego Lo Giudice, Vice President, Principal Analyst April 9, 2014. Optional Conference, Budapest Agenda Is Agile still worthwhile? How are Organizations Doing
Developing a Formidable Business / Continuous Improvement Methodology in Africa. By: Frederick O Popoola
Developing a Formidable Business / Continuous Improvement Methodology in Africa By: Frederick O Popoola INTRODUCTION The Challenge: How do Organizations survive in a competitive environment? Need to change
Testing Control Systems
Testing Control Systems with Microsoft s Attack Surface Analyzer { Digital Bond, Inc Michael Toecker, PE ddddddddd ICSJWG October 15 th 18 th Track III { { Michael Toecker, PE Professional Engineer 8 Years
www.stephenbarkar.se Lean vs. Agile similarities and differences 2014-08-29 Created by Stephen Barkar - www.stephenbarkar.se
1 www.stephenbarkar.se Lean vs. Agile similarities and differences 2014-08-29 Purpose with the material 2 This material describes the basics of Agile and Lean and the similarities and differences between
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
GE Capital. Driving change and continuous process improvement. how-to
Driving change and continuous process improvement Process improvement or PI involves applying tools and techniques to help a company achieve its goals Characteristics Aligned around what customers value
Leverage the Internet of Things to Transform Maintenance and Service Operations
SAP Brief SAP s for the Internet of Things SAP Predictive Maintenance and Service SAP Enterprise Asset Management Objectives Leverage the Internet of Things to Transform Maintenance and Service Operations
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
The Webcast will begin at 1:00pm EST. www.gig-werks.com
Workflow throughout the Enterprise for Legal Firms and Departments The Webcast will begin at 1:00pm EST www.gig-werks.com Today s Presentation: Introduction & About Gig Werks Gig Werks Experience with
Customer Engagement. Gabriel Chan Financial Services Industry Dynamics CRM
Customer Engagement Gabriel Chan Financial Services Industry Dynamics CRM Cliché Lean and focus on customers Think like a designer and lead the way Mission : Empowering individuals & organisations to do
Enabling Continuous Delivery by Leveraging the Deployment Pipeline
Enabling Continuous Delivery by Leveraging the Deployment Pipeline Jason Carter Principal (972) 689-6402 [email protected] Pariveda Solutions, Inc. Dallas,TX Table of Contents Matching
PCI-DSS Penetration Testing
PCI-DSS Penetration Testing Adam Goslin, Co-Founder High Bit Security May 10, 2011 About High Bit Security High Bit helps companies obtain or maintain their PCI compliance (Level 1 through Level 4 compliance)
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
Business Challenges. Customer retention and new customer acquisition (customer relationship management)
Align and Optimize Workflows with Lean Dan Marino Marino Associates, LLC Strategic and tactical planning Information systems integration Customer retention and new customer acquisition (customer relationship
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD whoami? Senior Director of a Red Team PSIRT Case Manager Data Analyst Internet Crime Investigator Security Evangelist
According to CSO Insights, over 58% of pipeline opportunities end up as no decision or
The current state of sales performance is startling. According to CSO Insights, over 58% of pipeline opportunities end up as no decision or lost. According to Sales Benchmark Index, less than 42% of financial
IBM Global Business Services Microsoft Dynamics CRM solutions from IBM
IBM Global Business Services Microsoft Dynamics CRM solutions from IBM Power your productivity 2 Microsoft Dynamics CRM solutions from IBM Highlights Win more deals by spending more time on selling and
Enterprise Cloud Security via DevSecOps
SESSION ID: ASD-T08 Enterprise Cloud via DevSecOps Shannon Leitz Sr Mgr, Cloud & DevSecOps Leader Intuit Information @devsecops Scott C Kennedy Scientist Intuit Information @scknogas Agenda Who we are
Microsoft Dynamics AX 2012 R3, clear cut benefits for your Organisation
2012 R3 Microsoft Dynamics AX 2012 R3, clear cut benefits for your Organisation Microsoft Dynamics AX is an enterprise resource planning (ERP) solution for midsize and larger organisations that helps people
Best Practices in Release and Deployment Management
WHITEPAPER Best Practices in Release and Deployment Management Mark Levy Through 2016, a lack of effective release management will contribute up to 80% of production incidents in large organizations with
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
See what cloud can do for you.
See what cloud can do for you. Uncomplicating cloud business Table of contents Introduction 3 Why cloud is relevant for your business? 4 What is changing? 4 Why organizations are moving to cloud 5 What
New Zealand Company Six full time technical staff Offices in Auckland and Wellington
INCREASING THE VALUE OF PENETRATION TESTING ABOUT YOUR PRESENTER Brett Moore Insomnia Security New Zealand Company Six full time technical staff Offices in Auckland and Wellington Penetration Testing Web
Service OnBoarding: A Process Approach for Uniting ITIL and DevOps. Bill Cunningham
Service OnBoarding: A Process Approach for Uniting ITIL and DevOps Bill Cunningham Service OnBoarding A Process Approach for Uniting ITIL and DevOps through Standardized Non- Functional Requirements DevOps:
ITIL in the Cloud. Vernon Lloyd. www.foxit.net www.askthefox.info
ITIL in the Cloud Vernon Lloyd ITIL is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is Registered in the U.S. Patent and Trademark Office www.foxit.net
Achieving Basic Stability By Art Smalley
Achieving Basic Stability By Art Smalley Introduction Lean production has dramatically lifted the competitiveness of many manufacturing companies and the value they deliver to customers. What s more, encouraging
What is meant by the term, Lean Software Development? November 2014
What is meant by the term, Lean Software Development? Scope of this Report November 2014 This report provides a definition of Lean Software Development and explains some key characteristics. It explores
Making Every Project Business a Best-Run Business
SAP Functions in Detail SAP Business Suite SAP Commercial Project Management Making Every Project Business a Best-Run Business Table of Contents 3 Quick Facts 4 Facilitating Optimal Project Delivery for
10 reasons to embrace a hybrid solution.
10 reasons to embrace a hybrid solution. This whitepaper will help you learn the benefits of having one partner for colocation, cloud and managed services. Managing the complex IT Landscape Rapid expansion,
Make technology your business advantage
Make technology your business advantage $ Make technology your business advantage Microsoft helps small and midsize businesses (SMBs) make the use of technology a business advantage. Modernizing your systems
Getting Started with Lean Process Management
Getting Started with Lean Process Management Hi-Tec Exchange Conference San Francisco July 25, 2011 Missions To team with Organizational Leaders, Managers, & Employees to focus on customers & improve competitiveness,
DEMAND DRIVEN SUPPLY NETWORK WITH SCOR FOR UZEL
Fit4Future DEMAND DRIVEN SUPPLY NETWORK WITH SCOR FOR UZEL Istanbul Chamber of Industry 25.Mart.2008 Tolga Yıldırım Supply Chain Strategy Specialist ABOUT SPEAKER Tolga Yıldırım Central Supply Chain Strategy
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault Best Practices Whitepaper June 18, 2014 2 Table of Contents LIVING UP TO THE SALES PITCH... 3 THE INITIAL PURCHASE AND SELECTION
New BGP Performa Service for Advanced Software
2014 Honeywell Users Group Americas New BGP Performa Service for Advanced Software Gary Jubien: Americas AS Aftermarket Services Leader 1 Advanced Software Solutions Portfolio 2 Document Software control
VISUAL REQUIREMENTS MANAGEMENT WITH KANBAN. Mahesh Singh Co-founder/ Sr. VP Product, Digite, Inc.
VISUAL REQUIREMENTS MANAGEMENT WITH KANBAN Mahesh Singh Co-founder/ Sr. VP Product, Digite, Inc. Agenda 2 Quick Introduction/ Context How We Were.. ( Traditional Requirements Management, Release Scoping/
Scrum in a Large Project Theory and Practice
Scrum in a Large Project Theory and Practice Agile World 2012 Munich, July 12, 2012 Dr. Sebastian Stamminger Scrum in Large Projects Agenda Theory Case Study Teams Our Process Challenges Lessons Learned
Salesforce Automation
Salesforce Automation Bill Evanow Vice President, Sales salesforce.com Alana Kaselitz Principal Founder Echo Lane Jim Thompson Founder and CEO Rogue IT 1 July 16-17, 2009 Napa Valley Marriott Salesforce.com
Test Data Management in the New Era of Computing
Test Data Management in the New Era of Computing Vinod Khader IBM InfoSphere Optim Development Agenda Changing Business Environment and Data Management Challenges What is Test Data Management Best Practices
An Artesian Whitepaper
An Artesian Whitepaper This short paper talks about the subject of the semantic web, providing a definition and context and outlining how this can be exploited to drive commercial productivity particularly
