Presented to Cornell Trustees. Ted Dodds CIO and VP Cornell University Thursday, March 28, 2013

Size: px
Start display at page:

Download "Presented to Cornell Trustees. Ted Dodds CIO and VP Cornell University Thursday, March 28, 2013"

Transcription

1 Presented to Cornell Trustees Ted Dodds CIO and VP Cornell University Thursday, March 28, 2013

2 is is becoming

3 Cost Cost is a complexity challenge Common Infrastructure Complexity Planning Virtualization Cloud services Managed desktop Software consolidation Scale/Value

4 is a community 54% 46% 60% 40% Units Center Units Center IT staff IT staff

5 Central IT is rightsized FY09 FY10 FY11 FY12 FY13 0 FY09 FY10 FY11 FY12 FY13 FUNDING STAFF

6 is multiple organizations Deans, VPs 55% of IT staff work in colleges, schools, units

7

8

9 is well connected

10 is well connected

11 1,500 web sites, 9.5M hits/day 3,800 wi-fi access points, 200 buildings 28,000 active network ports 39,000 people using 103,000 devices is well connected

12 is connected to the world

13 is more than 1,100 software applications

14 is structured development of new IT services Identify Service Need Capture and refine the idea Determine Type Service/Informatio n Request? Change to existing service? New service? N IT Service Desk IT Request? Change Mgmt? Project Initiation? Y Governance/ Advisory committee Y Service Development & Project Initiation Develop Project Proposal Cost & Pricing Plan Service Requirements Resource Plan Service Levels Service Metrics Service Quality Service Roadmap Service Development Checklist Keep for future review Notify client of service status N Review move forward? Y Develop Opportunity Statement Have Leadership support? Know who needs to be involved? Resources could be available? Is the technology new?

15 is a catalogue of services

16 is cloud services 24,000 faculty/staff on Office ,000 students use Google mail 83,000 alumni forward to cornell.edu 2M incoming messages daily, 70% blocked 1.5M outgoing messages sent daily

17 is cloud services Office productivity Exchange, Word, Excel, Powerpoint, Sharepoint Student and Faculty Portfolios Digication, Mahara High Performance Computing RedCloud, Amazon Web Services, Azure Staff Skill Building SkillSoft Survey Tools Qualtrix Plagiarism Detection Turnitin Video Conferencing WebEx Multimedia Storage and Delivery Kaltura Human Resource Management WorkDay Customer Relationship SalesForce, Microsoft CRM Knowledge Management RightAnswers, IntelliResponse Website Hosting & Content Acquia/Drupal, Edublogs, Bluehost

18 is Red Cloud

19 is Cyber Security Threat Assessment External expertise Internal practices Incident assessment Directed change ITSO learning Reassess threats Remediation and Improvement Breach Prevention Policies Practices Technologies Awareness Monitoring Best practices Decision-making Breach Management 19

20 Student Use Content is increasingly focused on learning 100% Time Time 95% of all Ithaca-based students use BlackBoard, learning management system

21 is increasingly focused on learning Lecture capture etextbooks Lab Notebook software Classroom technologies Online learning

22

23 IT Strategic Planning - Framework Student Experience Learning Technologies Research PEOPLE Enterprise Systems IT Career Framework Service Excellence 28

24 The Planning Process Multiple advisory committees Faculty Advisory Board (FABIT) Interviews with researchers Student focus groups Question of the week IT planning conference Draft plan complete February 2013

25 Today, IT Expenditures Look Like This 10% Differentiators Academic technologies Analytics Research computing Mobility 90% Utilities Messaging/calendaring Most administrative systems Voice and most data networking Desktop support

26 We Aspire to a More Equal Balance 50% Utilities 50% Differentiators Academic technologies Usability Analytics Research support Mobility Messaging/calendaring Most administrative systems Voice and most data networking Desktop support

27 Initial Priorities 1. Build capacity for online learning 2. Enhance student experience 3. Transform IT skills 4. Extend utility services to research community 5. Improve usability of systems and services 6. Increase access to management information

28 Thanks for Listening Questions? Presented to Cornell Trustees Ted Dodds CIO and VP Cornell University Thursday, March 28,

29 is Cyber Security Threat Assessment External expertise Internal practices Incident assessment Directed change ITSO learning Reassess threats Remediation and Improvement Breach Prevention Policies Practices Technologies Awareness Monitoring Best practices Decision-making Breach Management 38

30 Threat Assessment External Expertise National Regional Sector independent Internal Practices Active scanning Targeted penetration testing 39

31 Breach Prevention University Policy Practices Security assessments Security training Technologies Encryption Unit firewalls Anti-virus Awareness 40

32 Breach Management Active monitoring Contemporary practices = rapid response Decision making Role clarity Decision rights Governance 41

33 Remediation & Improvement Assess unit practices to standard Direct change in practices that caused incident Identify any ITSO lessons learned Reassess threat landscape 42

Information Technology Master Plan Presentation November 2013

Information Technology Master Plan Presentation November 2013 Information Technology Master Plan Presentation November 2013 Trends Educause Top 10 (2009 2014) 1. Governance, Planning, Funding and Staffing 1. Establishing and implementing IT governance throughout

More information

UNIVERSITY OF WISCONSIN SYSTEM INFORMATION TECHNOLOGY SUMMARY FISCAL YEAR 2015

UNIVERSITY OF WISCONSIN SYSTEM INFORMATION TECHNOLOGY SUMMARY FISCAL YEAR 2015 UNIVERSITY OF WISCONSIN SYSTEM INFORMATION TECHNOLOGY SUMMARY FISCAL YEAR 2015 This page intentionally left blank. UW System IT Summary FY 2015 Page 2 CONTENTS INTRODUCTION... 5 GENERAL IT SERVICES...

More information

Business Plan: Information Technology Services (ITS)

Business Plan: Information Technology Services (ITS) Business Plan: Information Technology Services (ITS) How does this service contribute to the results identified in the City of London Strategic Plan? A Sustainable Infrastructure A Caring Community Fundamental

More information

If you have questions regarding this survey, contact Ken Johnson at itsurvey@fsu.edu, or call the ITS Service Center at 850-644-HELP.

If you have questions regarding this survey, contact Ken Johnson at itsurvey@fsu.edu, or call the ITS Service Center at 850-644-HELP. Information Technology Resources Survey For Faculty Thank you for your interest in completing this survey. Your response is sincerely appreciated. This survey is designed to evaluate the usage of technology

More information

The University of Information Technology -UCSC

The University of Information Technology -UCSC The primary mission of ITS is to provide high quality infrastructure, support, and innovation in the delivery of information technology products and services to continually advance UCSC s reputation as

More information

University of Cincinnati. Strategic Directions

University of Cincinnati. Strategic Directions University of Cincinnati Information Technologies (UCit) Strategic Directions Academic Year 2009 2010 http://www.uc.edu/ucit/ A high-performance organization, UCit fulfills an essential role at the University

More information

BYOD & MOBILE SECURITY

BYOD & MOBILE SECURITY 2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own

More information

DRAFT. FY15 UW-Stout Institutional IT Plan

DRAFT. FY15 UW-Stout Institutional IT Plan DRAFT FY15 UW-Stout Institutional IT Plan A. & University Strategic Objectives [1-2 pages] 1. How was the plan developed? The UW-Stout IT Planning is tightly integrated into the campus planning model.

More information

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission Program Summary DoIT provides collaboration and conferencing tools for hosting academic classes, training courses, webinars and demonstrations; attending virtual meetings through audio or video conferencing;

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

A Primer on Cloud Computing. By Anand Ganesan Byteonic.com

A Primer on Cloud Computing. By Anand Ganesan Byteonic.com A Primer on Cloud Computing By Anand Ganesan Byteonic.com Background Cloud Computing Defined Taxonomy Value Proposition Cloud Providers Who uses it Opportunities for Improvement Agenda The Challenges Make

More information

Information Technology 2016-2021 Strategic Plan

Information Technology 2016-2021 Strategic Plan Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...

More information

How To Improve Your University'S Reputation

How To Improve Your University'S Reputation 2015 Work Programme other projects Customer Services Projects Review Start of Term for 2015 Rollout of new AJ build in conjunction with Teaching and Learning IT Lab Removals Preparation of communications

More information

Strategic Plan FY 2014-2016

Strategic Plan FY 2014-2016 Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Leveraging the Cloud for Your Business

Leveraging the Cloud for Your Business Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and

More information

ISE Northeast Executive Forum and Awards

ISE Northeast Executive Forum and Awards ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information

More information

Quick guide: Using the Cloud to support your business

Quick guide: Using the Cloud to support your business Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses

More information

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed

More information

Head of User Experience Information Services (IS)

Head of User Experience Information Services (IS) Head of User Experience Information Services (IS) Reporting to: Director of Global IT Programmes and Solutions Salary: 47,787-57,031 per annum (pro rata) depending on skills and experience. Salary progression

More information

X 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science.

X 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science. X 420.5 Network, Operating System, and Database Security Fall 2014, Registration Number 249343W UCLA EXTENSION: Computer Science Course Syllabus 12 Sessions: Mondays, 6-9 pm, September 29 - December 15,

More information

Cloud Computing Overview

Cloud Computing Overview Cloud Computing Overview Presented by: Luis Ledezma, SMP Tech, Inc. Cloud Computing Overview 2 Defining Cloud Computing Definition Characteristics Layers / Service Models Deployment Schemes Business Drivers

More information

The Pennsylvania State University IT Assessment Executive Summary

The Pennsylvania State University IT Assessment Executive Summary The Pennsylvania State University IT Assessment Executive Summary Final Summary of Recommendations June 16, 2011 Goldstein & Associates, LLC Contents Section Page Introduction 3 Summary Recommendations

More information

Appendix A-2 Generic Job Titles for respective categories

Appendix A-2 Generic Job Titles for respective categories Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide

More information

Information Security Attack Tree Modeling for Enhancing Student Learning

Information Security Attack Tree Modeling for Enhancing Student Learning Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department

More information

Philosophy of Community and Technical College Education

Philosophy of Community and Technical College Education Philosophy of Community and Technical College Education CTL0900 Course Description Minnesota State Colleges & Universities Phone: 651-201-1888 Fax: 651-649-5409 http://facultycourses.mnscu.edu/ SYLLABUS

More information

Thank you for your time and consideration

Thank you for your time and consideration Generation 7 Built To Serve Businesses Thank you for your time and consideration POPP.com, Inc. All rights reserved. 1 - AP 4/28/15 POPP.com, Inc. All rights reserved. 2 - AP 4/28/15 Past And Present POPP

More information

Subject: Overview of Information Technology Services and the Strategic Technology Plan. Proposed Committee Action No Action Required Information Only.

Subject: Overview of Information Technology Services and the Strategic Technology Plan. Proposed Committee Action No Action Required Information Only. AGENDA ITEM: IV Florida Polytechnic University Board of Trustees Technology Committee Subject: Overview of Information Technology Services and the Strategic Technology Plan Proposed Committee Action No

More information

Role and Mandate of Computing and Communications (C&C) Memorial University

Role and Mandate of Computing and Communications (C&C) Memorial University Role and Mandate of Computing and Communications (C&C) Memorial University Mission: Our goal is to promote quality and excellence in the delivery of information services to the university community. We

More information

Integrated Technology Plan (FY10 FY12)

Integrated Technology Plan (FY10 FY12) (FY10 FY12) Anne Arundel Community College embraces and promotes a seamless integration of appropriate technologies in support of the learning community within the framework of the college s mission and

More information

IRM Incident Communication and Response Plan

IRM Incident Communication and Response Plan I. Purpose A crisis communication plan provides policies and procedures for the communication of IT service interruption within the university. The goal of this communication plan is to establish guidelines

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

WSU Vancouver Information Technology Service Catalog

WSU Vancouver Information Technology Service Catalog WSU Vancouver Information Technology Service Catalog Overview The VIT Service Catalog documents the technology services and support delivered by VIT to its customers. Included are the general levels of

More information

Leveraging the Cloud for your Business

Leveraging the Cloud for your Business Leveraging the Cloud for your Business Save money and time by moving to the cloud Learn how Moving to the Cloud 3 from small and mid-sized businesses (SMBs) to Enterprise Companies. What problems can cloud

More information

Unisys Innovation Plan

Unisys Innovation Plan Unisys Innovation Plan June 12th, 2015 Our View of the Market Unisys regards user support, cloud/datacenter, applications, data, analytics, social, service management and security as essential components

More information

Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management

Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2014 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering

More information

Designing & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012

Designing & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012 Designing & Implementing Enterprise Security Programs MBA Bank Expo 2012 April 11, 2012 Session Purpose G R O U P Premise: Security is institutionalized, but the enterprise is evolving. the enterprise

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

Citrus College. Technology Master Plan 2009-2014 Adopted 2011

Citrus College. Technology Master Plan 2009-2014 Adopted 2011 Citrus College Technology Master Plan 2009-2014 Adopted 2011 Citrus College District Information Technology Master Plan 2009-2014 2011 Update Table of Contents Planning Overview... 3 Background... 4 Factors

More information

Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management

Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2013 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering

More information

INFORMATION AND COMMUNICATIONS TECHNOLOGY

INFORMATION AND COMMUNICATIONS TECHNOLOGY W I N T E R 2016, I SS U E 1 INFORMATION AND COMMUNICATIONS TECHNOLOGY COMMUNITY UPDATE SUPPORTING TEACHING AND LEARNING Classroom Renewal Project In the summer of 2015, a number of classrooms were renewed

More information

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona The Legal Cloud What is Cloud Computing? Working in the Cloud Cloud Computing is A way to work

More information

Training Catalog. Information Technology and Computing Services

Training Catalog. Information Technology and Computing Services Information Technology and Computing Services Training Catalog ITCS provides technology training to help you enhance and expand your classroom or office, communicate and collaborate with colleagues or

More information

Moraine Valley Community College. Strategic Technology Priorities and Goals

Moraine Valley Community College. Strategic Technology Priorities and Goals Moraine Valley Community College Strategic Technology Priorities and Goals FY 2016-2019 Letter from the President Moraine Valley Community College s mission of providing a learning-centered environment

More information

Strategic Goals. 1. Information Technology Infrastructure in support of University Strategic Goals

Strategic Goals. 1. Information Technology Infrastructure in support of University Strategic Goals Strategic Goals 1. Information Technology Infrastructure in support of University Strategic Goals a. Work toward building a modern data center and providing data services that support campus units and

More information

Information Technology Strategic Plan 2014-2017

Information Technology Strategic Plan 2014-2017 Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents

More information

IT Strategic Planning at Princeton University. Nadine Stern Associate CIO for Operations and Planning December, 2013

IT Strategic Planning at Princeton University. Nadine Stern Associate CIO for Operations and Planning December, 2013 IT Strategic Planning at Princeton University Nadine Stern Associate CIO for Operations and Planning December, 2013 Office of Information Technology: OIT Slide 2 Princeton University About me: VP for IT

More information

dbp delivering business performance business optimization services

dbp delivering business performance business optimization services delivering business performance business optimization services Expert level consulting services + Business management + Sales and marketing + Customer retention + Technology Complete business planning

More information

External Review Service

External Review Service External Review Service Proposal Using the AACSB accreditation process as a model, the AACSB Affinity Group Technology in Business Schools Roundtable (TBSr), will conduct an IT External Review Service

More information

Microsoft Office 365 From Vodafone 2015 Update

Microsoft Office 365 From Vodafone 2015 Update Microsoft Office 365 From Vodafone 2015 Update What is Microsoft Office 365? Microsoft Office 365 offered by Vodafone is a hosted, cloud-based IT solution that combines Microsoft s suite of communication

More information

Continued Investigation of Risks and Concerns with

Continued Investigation of Risks and Concerns with August 7, 2015 Continued Investigation of Risks and Concerns with Cloud-based Solutions and Storage of Personal Data Team Members Name College/Affiliation Email Phone Linda Baer Comptroller s Office lbaer@purdue.edu

More information

Service Catalog. Office of Information Technology Lenoir-Rhyne University

Service Catalog. Office of Information Technology Lenoir-Rhyne University Service Catalog Office of Information Technology Lenoir-Rhyne University Updated July 28, 2014 Service Catalog Communication and Collaboration Campus Cable Television Service Campus Telephone Service (Nortel,

More information

University of London Computer Centre Moodle Plugin Matrix

University of London Computer Centre Moodle Plugin Matrix age 1 The University of London Computer Centre () Moodle lugin Matrix identifies available plugins for each installation including their support level. egular updates will be made to the list of available

More information

Software Defined Hybrid IT. Execute your 2020 plan

Software Defined Hybrid IT. Execute your 2020 plan Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.

More information

CALS COMMUNICATIONS AND CYBER TECHNOLOGIES 2021 STRATEGIC PLAN. PURPOSE: To help CALS become the most cyber-savvy Land Grant University in the nation

CALS COMMUNICATIONS AND CYBER TECHNOLOGIES 2021 STRATEGIC PLAN. PURPOSE: To help CALS become the most cyber-savvy Land Grant University in the nation CALS COMMUNICATIONS AND CYBER TECHNOLOGIES 2021 STRATEGIC PLAN PURPOSE: To help CALS become the most cyber-savvy Land Grant University in the nation 2021 VISION: To become a hybridized team of data specialists,

More information

Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing

Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing White Paper Date: 12/9/2011 Version: 0.4 (Final) Author: Matt Baker, Clarity Business and IT Solutions Creating Dynamic IT Infrastructure

More information

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101 Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro

More information

Jumpstarting Your Security Awareness Program

Jumpstarting Your Security Awareness Program Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb

More information

ITS Executive Steering Committee (ITESC) Agenda and Materials October 09, 2014

ITS Executive Steering Committee (ITESC) Agenda and Materials October 09, 2014 ITS Executive Steering Committee (ITESC) Agenda and Materials October 09, 2014 1 Agenda Technology Briefing S. Malisch Anytime Anywhere Access Strategy Discussion M. Konda Upcoming ITESC Meeting Schedule

More information

Introduction to Cloud Services

Introduction to Cloud Services Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud

More information

University of San Diego

University of San Diego University of San Diego Academic Technology Services An Online Orientation -- Services at a Glance! 1 Updated: 8/14/15 Welcome to USD This guide is developed to assist faculty with instructional resources

More information

Iowa State University Proposal for HR-01 ISU HR Operating Model

Iowa State University Proposal for HR-01 ISU HR Operating Model Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and

More information

2011 NASCIO Recognition Award Nomination State of Georgia

2011 NASCIO Recognition Award Nomination State of Georgia 2011 NASCIO Recognition Award Nomination State of Georgia Nomination Category: Enterprise IT Management Initiatives Title of Nomination: Georgia Enterprise Technology Services Nomination Submitted By:

More information

N/A. Yes. Students are expected to review and understand all areas of the course outline.

N/A. Yes. Students are expected to review and understand all areas of the course outline. Course Outline School: Department: Course Title: Business Graduate Studies Sales Force Automation and Technology Course Code: MKTG 756 Course Hours/Credits: 28 Prerequisites: MKTG 751 Co-requisites: Eligible

More information

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic Fundamentals of Secure Collaboration in the Mobile Workforce Sinisha Patkovic 1 DISCUSSION Hyper connected X-Times future and blurring of lines between personal, social cloud, & enterprise. CIO Challenge:

More information

INFORMATION TECHNOLOGY PROFILE

INFORMATION TECHNOLOGY PROFILE INFORMATION TECHNOLOGY PROFILE February, 2013 IT Services Miami University www.miamioh.edu/uit Technology Profile, rev. February 2013 This report, published in February, 2013, is updated annually to reflect

More information

Core Data Service 2015 IT Domain Definition Change Overview

Core Data Service 2015 IT Domain Definition Change Overview Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning

More information

Current Developments Concerning Cybersecurity. ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016

Current Developments Concerning Cybersecurity. ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016 Current Developments Concerning Cybersecurity ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016 AGENDA Why is Cybersecurity Important? Top Cybersecurity

More information

Solution Requirements and Process Flow

Solution Requirements and Process Flow CHAPTER 2 Scope The Cisco Virtual Expert Management solution is a powerful, flexible communication solution that addresses a variety of technical, business, and associated service preferences. Deployment

More information

Cybersecurity in an All-IP World Are You Prepared?

Cybersecurity in an All-IP World Are You Prepared? Cybersecurity in an All-IP World Are You Prepared? Executive Summary Get started Produced by: In partnership with: Introduction: The distinctions between today s data, voice, wireless and video networks

More information

How can Cloud help your Security. Christophe Van Mollekot Solution Advisor Microsoft

How can Cloud help your Security. Christophe Van Mollekot Solution Advisor Microsoft How can Cloud help your Security Christophe Van Mollekot Solution Advisor Microsoft Global datacenter footprint 100+ Datacenters in over 40 countries Integral to business transformation 71% of strategic

More information

2016-2018 Strategic Report and Plan

2016-2018 Strategic Report and Plan UB Information Technology 2016-2018 Strategic Report and Plan Building Differentiating Cultures Office of the Vice President and Chief Information Officer University at Buffalo, North Campus UB Information

More information

A Cybersecurity Strategy

A Cybersecurity Strategy A Cybersecurity Strategy How Stop Worrying and Love the Cybersecurity Strategy Lockdown 2015 University of Wisconsin Madison 2 Elements of a Cybersecurity Strategy 1. Have a commonly agreed to purpose

More information

Information Technology Plan Technology Vision for the Community College

Information Technology Plan Technology Vision for the Community College Information Technology Plan Technology Vision for the Community College At Caldwell Community College and Technical Institute, information technology will be a primary resource for students, faculty, staff,

More information

THE POWER OF THE CLOUD IS CLOSER THAN YOU THINK. Michael Lee Aaron Saposnik SWC Technology Partners

THE POWER OF THE CLOUD IS CLOSER THAN YOU THINK. Michael Lee Aaron Saposnik SWC Technology Partners THE POWER OF THE CLOUD IS CLOSER THAN YOU THINK Michael Lee Aaron Saposnik SWC Technology Partners #SWCEvents Agenda SWC Introduction Cloud Definition & Market Overview Our Approach to the Cloud Cloud

More information

Klickstart Business Solutions & Services

Klickstart Business Solutions & Services About us With an Engineering background & vast experience spanning across two decades with an expertise in Technology Marketing, Branding, Business development & Sales we set out to create a platform every

More information

Office of Information Technology Service Catalog FY2015

Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...

More information

Program Re-development for Continuing + Distance Education

Program Re-development for Continuing + Distance Education Program Re-development for Continuing + Distance Education Submitted to: Freda Robinson Program Manager, Business and Management Portfolio School of Continuing and Distance Education (C+DE) Red River College

More information

Mobile Applications And Services for Converged Networks

Mobile Applications And Services for Converged Networks Mobile Applications And Services for Converged Networks Russ Clark Matt Sanders CS 4261/8803 MAS Fall 2011 Mobile Apps and Services What are we talking about here? Mobile - not tied to your desktop cell

More information

QUESTIONS & RESPONSES #2

QUESTIONS & RESPONSES #2 QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL procurement@portoftacoma.com PHONE NUMBER 253-428-8608 SUBMITTAL

More information

Anthony Caragol Gonzalo Escarrá

Anthony Caragol Gonzalo Escarrá Anthony Caragol Gonzalo Escarrá #SWCEvents Agenda SWC Introduction Unified Communications Technology Landscape Introduction of Skype for Business 2015 Demonstration Getting Started About SWC Technology

More information

Structuring Information Management (IM) around a Service Centric Framework. Date: 6th May 2015. www.inl.gov. Ian Mckirdy

Structuring Information Management (IM) around a Service Centric Framework. Date: 6th May 2015. www.inl.gov. Ian Mckirdy Structuring Information Management (IM) around a Service Centric Framework Date: 6th May 2015 www.inl.gov Ian Mckirdy Information Management (IM) Service Management Approach to Service Portfolio and Service

More information

BUS311: Essentials of IS

BUS311: Essentials of IS University of Wisconsin Oshkosh College of Business Administration Instructor: Class Meeting: Office Hours: BUS311: Essentials of IS Fall 2012 Syllabus John M. Muraski, MS, PMP Office: SAGE 2444 Email:

More information

I T @ C O R N E L L : T E C H N O L O G Y I N A STR A T EGIC PLA N FOR I NFOR MA TI ON TE CHNO LO GY, 2 0 1 3-2017

I T @ C O R N E L L : T E C H N O L O G Y I N A STR A T EGIC PLA N FOR I NFOR MA TI ON TE CHNO LO GY, 2 0 1 3-2017 I T @ C O R N E L L : T E C H N O L O G Y I N S E R V I C E T O O N E C O R N ELL A STR A T EGIC PLA N FOR I NFOR MA TI ON TE CHNO LO GY, 2 0 1 3-2017 MAY 2013 CONTENTS Letter from the CIO... 2 Executive

More information

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201 Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Steps on a Computer Compared to Steps on an ipad

Steps on a Computer Compared to Steps on an ipad Steps on a Computer Compared to Steps on an Task Steps on a Computer Steps on an Additional Information Moving/ Navigating 1. Click or drag with a mouse to navigate to different programs, move files or

More information

Cloud Roadmap to Success. October, 2014

Cloud Roadmap to Success. October, 2014 Cloud Roadmap to Success October, 2014 Catapult Systems & Level 3 Today s Presenters Aneal.Roney@CatapultSystems.com Roger.Greene@level3.com What is the Cloud Technology trends: driving cloud adoption

More information

Office of Information Technology Service Catalog FY2015

Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...

More information

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0 Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5

More information

Board of Trustees IT Subcommittee Meeting. November 3, 2014 2:00-2:50 PM Harper Center 3023

Board of Trustees IT Subcommittee Meeting. November 3, 2014 2:00-2:50 PM Harper Center 3023 Board of Trustees IT Subcommittee Meeting November 3, 2014 2:00-2:50 PM Harper Center 3023 Agenda Introductions June 2, 2014 Meeting Minutes Creighton University Digital Strategy Information Technology

More information

Microsoft Exchange and Google Mail Solutions

Microsoft Exchange and Google Mail Solutions Microsoft Exchange and Google Mail Solutions Executive Summary: Email has become a critical application in most Education entities. When considering what systems are going to be used, a great deal of investigation

More information

Mitel MiCollab Client

Mitel MiCollab Client Mitel MiCollab Client Making In the Moment Communications More Dynamic In today s fast-paced, competitive world of business how can employees work together efficiently & effectively to help drive the success

More information

Improving Residual Risk Management Through the Use of Security Metrics

Improving Residual Risk Management Through the Use of Security Metrics Improving Residual Risk Management Through the Use of Security Metrics Every investment in security should be effective in reducing risk, but how do you measure it? Jonathan Pagett and Siaw-Lynn Ng introduce

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information