ITIL based IT management with live alerts and KPI s

Size: px
Start display at page:

Download "ITIL based IT management with live alerts and KPI s"

Transcription

1 ITIL based IT management with live alerts and KPI s This whitepaper describes, as a sample, the deployment of Ba-PRO for IT management as implemented within Ba-PRO development b.v. IT governance (ITIL), Corporate governance, Segregations of Duties (SoD), KPI dash boarding, fraud management, real time risk management. Look no further, Ba-PRO offers the current generation, integrated solution. Control, process and risk documentation integrated with back office data providing continuous monitoring, alerts on control violations and risks, and management KPI s on all relevant processes. Improvement and clarity at your fingertips. What is GRC? Governance, Risk, and Compliance is the business integration of: Governance that manages the strategic directives a company wants to follow. Risk management that assesses the areas of exposure and potential impacts. Compliance that is the tactical action to mitigate risk. The integration of the distinct GRC aspects determines your ability to effectively and efficiently manage the processes within your organization to become successful. Some Ba-PRO benefits efficient control documentation (e.g. Coso based framework, IFRS, Cobit) or upload from point solutions like Axentis, Excel, Open Pages, Paisley, Word. continuous control monitoring (automatic alerts and KPI s) give you the up to date status of affairs. real time risk management (5000+ business rules included) fully integrated solution (control documentation, automatic monitoring, improvement process supported) most cost effective solution available to date Topics Software: Business Control, Sarbanes, ITIL, CMMI, Service management Real time alerts / risk management Note: The screenshots are taken from a live system using data from Mantis (Call-Incident- Problem Management Process), dotproject (Project planning) and Availability Management (Server logs) Home page of the Ba-PRO IT governance application - Dashboard o KPI on availability of demo server o KPI on IDS (intrusion detection system) of firewall o Score of planned vs. actual hours o KPI on reported incidents per person/module - Alert when o reported hours exceeds 5% of planned hours (dotproject) o priority 1 incidents stay open longer than 1 day o demo server is less than 99.5% available over a period of 4 weeks o number of reported incidents within 1 week exceeds x Page 1

2 a. alert to corporate Ba-PRO NL when in Ba-PRO RO the number of reported vs planned hours exceeds 5% or overtime exceeds 10 hours per week drill down to resource and which hours reported on which tasks Page 2

3 b. alert on severe incidents reported by customers or testing department stay unsolved (open) longer than 24 hours drill down to incident and customer -> alert to take action to CTO or customer support manager c. demo server is available less than 99.5% (uptime) over a period of 4 weeks (information extracted from log files of server) -> alert per to take action to COO d. number of incidents reported within one week exceed x (extracted from Mantis) drill down to module in ba-pro -> alert to CTO or developer All alerts are generated by business rules, executed on real life data from agents, linked to controls, linked to ITIL processes. Business Rules generate alerts that are assigned to employees with certain roles (Approver, editor, viewer, consultant) Page 3

4 A set of ITIL process descriptions with business functions, process flows and responsibilites according the RACI model exist. Process descriptions are attached in PDF from ITIL (descriptions) Page 4

5 The linkage between FW items can be best seen at BaPRO BV -> processes -> Service Support -> Problem Management -> Knowledge management Process Flows can be viewed (not edited) End user can drill down to the detail data causing the alert and drill up to the process descriptions and diagrams as well as see the responsible persons. Page 5

6 End user is alerted when no action is taken after specified time. Reports show: alerts with no actions and alerts with actions with the possibility to review the actions Ba-pro can be used as procedure management system (waterfall model in flash as attached document) Controls and linked business rules: Page 6

7 Drill down to rule: Data for Business Rules is gathered by agents. Additional: - ITIL PDF or CobIT-ITIL documents are attached in PDF and linked to the respective processes. Process flow charts are attached to each ITIL process. Page 7

8 Ba-PRO uses the application for internal document management (product, project documentation) Page 8

9 Appendix What is ITIL? What is COSO? What is CobiT? What is CMMI? What is ISO17799 All of above are best practice business frameworks, defining processes and (technical) procedures, risks, workorders and controls. All of them have a different level of detail and overlap. COSO (the committee of sponoring organizations of the treadway commission, initially founded in 1985 to sponsor the National Commission on Fraudulent Financial Reporting, an independent private sector initiative) is a best practice framework defining organization wide controls, with no special focus on IT. CobiT extends COSO with a set of IT controls going into more detail. ITIL is a set of best practice IT processes extends CobiT. The best practice development of IT processes has been initiated in the 70 s by the OGC in the UK with market leaders of all industries and provide a general guideline of IT processes that cover all areas. At the moment ITIL is being renewed with the ITIL 2.0 initiative that includes also project management. ISO17799 is a set of best practice IT Security controls for organizations to meet the standards for CobiT security. CMMI (Capability Maturity Model Integration, initiated by the Carnegie Mellon Software Engineering Institute) focuses on Software development processes and controls. Starting from software design to project planning and budgeting to execution, release management and maintenance and support, processes are defined. Maturity levels exist from ad-hoc processes (level 1) to institutionalized processes (level 3) to the highest level: process improvement (level 5). Page 9

Achieving Business Imperatives through IT Governance and Risk

Achieving Business Imperatives through IT Governance and Risk IBM Global Technology Services Achieving Business Imperatives through IT Governance and Risk Peter Stremus Internet Security Systems, an IBM Company Introduction : Compliance Value Over the past 15 years

More information

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they

More information

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA

More information

Certified Software Quality Assurance Professional VS-1085

Certified Software Quality Assurance Professional VS-1085 Certified Software Quality Assurance Professional VS-1085 Certified Software Quality Assurance Professional Certified Software Quality Assurance Professional Certification Code VS-1085 Vskills certification

More information

2005 Kasse Initiatives, LLC version 1.2. ITIL Overview - 1

2005 Kasse Initiatives, LLC version 1.2. ITIL Overview - 1 ITIL IT Infrastructure Library Overview ITIL Overview - 1 Vocabulary Incident - any event which is not part of the standard operation of a service and which causes or may cause an interruption to or reduction

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

Internal Control Deliverables. For. System Development Projects

Internal Control Deliverables. For. System Development Projects DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...

More information

How to Lead the People in a Program Based Environment

How to Lead the People in a Program Based Environment SESSION ID: GRC-W01 Balancing Compliance and Operational Security Demands Steve Winterfeld Bank Information Security Officer CISSP, PCIP What is more important? Compliance with laws / regulations Following

More information

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT

More information

COBIT Helps Organizations Meet Performance and Compliance Requirements

COBIT Helps Organizations Meet Performance and Compliance Requirements DISCUSS THIS ARTICLE COBIT Helps Organizations Meet Performance and Compliance Requirements By Sreechith Radhakrishnan, COBIT Certified Assessor, ISO/IEC 20000 LA, ISO/IEC 27001 LA, ISO22301 LA, ITIL Expert,

More information

Business Intelligence for IT

Business Intelligence for IT DATA SHEET KEY FEATURES: In built static and drill down reports based on good practices (ITIL, COBIT, ISO 20000). Ability to build Ad-hoc reports easily Dashboard for higher level executives Built-in Integration

More information

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT

More information

Compliance and Governance

Compliance and Governance Compliance and Governance Compliance and Governance Governance is concerned with accountability and responsibility in terms of the standards that are used to direct and control an IS department. The wave

More information

An Introduction to the Information Security Program Model (ISPM)

An Introduction to the Information Security Program Model (ISPM) SECURELY ENABLING BUSINESS An Introduction to the Information Security Program Model (ISPM) Presented by: Nick Puetz VP of Strategic Services, FishNet Security David Robinson CIO, Lockton Companies AGENDA

More information

Sarbanes-Oxley Control Transformation Through Automation

Sarbanes-Oxley Control Transformation Through Automation Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 info@bluelance.com

More information

Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment

Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment 2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director

More information

Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000

Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Preparation Guide Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Edition June 2015 Copyright 2015 EXIN All rights reserved. No part of this publication may be published,

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode) HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release

More information

Application Lifecycle Management

Application Lifecycle Management Application Lifecycle Management Application Lifecycle Management It is important to ensure that the way applications are delivered meets the needs of the customer as defined in any SLAs. Much of the thrust

More information

Using Assurance Models in IT Audit Engagements

Using Assurance Models in IT Audit Engagements Using Assurance Models in IT Audit Engagements Adrian Baldwin, Yolanta Beres, Simon Shiu Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-148R1 January 29, 2008* audit, assurance, compliance,

More information

Information overload: How to make data analytics work for the internal audit function

Information overload: How to make data analytics work for the internal audit function Information overload: How to make data analytics work for the internal audit function Danny Miller, Scott Higgins and Michael Rose Contents 1 A value proposition for internal audit 2 Leveraging data analytics

More information

IT Compliance 24.09.2007. After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)

IT Compliance 24.09.2007. After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM) IT Compliance 24.09. AHS After Hours Seminar Zurich Improving IT Risk & Compliance Management (RCM) Bruno J. Wiederkehr Member of the Board ISACA Switzerland Chapter Agenda 1. Understanding the RCM Requirements

More information

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements

More information

CFE 2. Enterprise Risk Management. Study Guide - Supplemental Background Material

CFE 2. Enterprise Risk Management. Study Guide - Supplemental Background Material P a g e 1 CFE 2 Enterprise Risk Management Study Guide - Supplemental Background Material The passing score for this test is 74% Reference Guides: Enterprise Risk Management Best Practices: From Assessment

More information

Preparation Guide. IT Service Management Foundation Bridge based on ISO/IEC 20000

Preparation Guide. IT Service Management Foundation Bridge based on ISO/IEC 20000 Preparation Guide IT Service Management Foundation Bridge based on ISO/IEC 20000 Edition April 2011 Copyright 2011 EXIN All rights reserved. No part of this publication may be published, reproduced, copied

More information

ITIL AND COBIT EXPLAINED

ITIL AND COBIT EXPLAINED ITIL AND COBIT EXPLAINED 1 AGENDA Overview of Frameworks Similarities and Differences Details on COBIT Framework (based on version 4.1) Details on ITIL Framework, focused mainly on version.2. Comparison

More information

Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL.

Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL. Internal Audit Report on January 2010 2010 January - English - Information Technology - Security Access - FINAL.doc Contents Background...3 Introduction...3 IT Security Architecture,Diagram 1...4 Terms

More information

Combine ITIL and COBIT to Meet Business Challenges

Combine ITIL and COBIT to Meet Business Challenges Combine ITIL and COBIT to Meet Business Challenges By Peter Hill, Director, IT Governance Network, and Ken Turbitt, Best Practices Director, BMC Software BEST PRACTICES WHITE PAPER Table of Contents ABSTRACT...

More information

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation

More information

Project Plan Failure - Tough Questions for Disaster Planners

Project Plan Failure - Tough Questions for Disaster Planners Covering IT and Telecom from a Canadian Viewpoint July 2015 Planning Matters Issue Just When You Thought You Were Safe Project Plan Failure By Peter Aggus Your company is doing exceedingly well and you

More information

Outsourcing and Information Security

Outsourcing and Information Security IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing

More information

QPR Quality Management

QPR Quality Management QPR Quality Management Solution Overview QPR Balanced Scorecard Solution - Overview Your organization s success with Balanced Scorecard certainly depends on more than just the technology to support it.

More information

Enterprise Risk Management in Compliance 360

Enterprise Risk Management in Compliance 360 Enterprise Risk Management in Compliance 360 2 Enterprise Risk Management in Compliance 360 Effective risk management involves identifying and understanding the risks the organization is faced with, analyzing

More information

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

14 October 2015 ISACA Curaçao Conference By: Paul Helmich Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study

More information

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey A Comparison of IT Governance & Control Frameworks in Cloud Computing Jack D. Becker ITDS Department, UNT & Elana Bailey ITDS Department, UNT MS in IS AMCIS 2014 August, 2014 Savannah, GA Presentation

More information

SITA Service Management Strategy Implementation. Presented by: SITA Service Management Centre

SITA Service Management Strategy Implementation. Presented by: SITA Service Management Centre SITA Service Management Strategy Implementation Presented by: SITA Service Management Centre Contents What is a Service? What is Service Management? SITA Service Management Strategy Methodology Service

More information

Lessons from McKesson s Approach to Maintaining a Mature, Cost-Effective Sarbanes-Oxley Program

Lessons from McKesson s Approach to Maintaining a Mature, Cost-Effective Sarbanes-Oxley Program Orange County Convention Center Orlando, Florida May 15-18, 2011 Lessons from McKesson s Approach to Maintaining a Mature, Cost-Effective Sarbanes-Oxley Program Vickie Pilotti Kelly Worley Ben Wienand

More information

Surviving SOX with Scrum. Integrating Scrum in IT Governance at Allianz

Surviving SOX with Scrum. Integrating Scrum in IT Governance at Allianz Surviving SOX with Scrum Integrating Scrum in IT Governance at Allianz 1 Who are we? Simon Roberts MBA and Dr. Christoph Mathis Independent Scrum coaches and trainers; Scrum since 2002, XP since late 1990s

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com COBIT 5 All together now! Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com 1 Copyright Notice COBIT is 1996, 1998, 2000, 2005 2012 ISACA and IT Governance Institute.

More information

GLOBAL STANDARD FOR INFORMATION MANAGEMENT

GLOBAL STANDARD FOR INFORMATION MANAGEMENT GLOBAL STANDARD FOR INFORMATION MANAGEMENT Manohar Ganshani Businesses have today expanded beyond local geographies. Global presence demands uniformity within the processes across disparate locations of

More information

Pragmatic Metrics for Building Security Dashboards

Pragmatic Metrics for Building Security Dashboards SESSION ID: GRC-W03 Pragmatic Metrics for Building Security Dashboards James Tarala Principal Consultant Enclave Security @isaudit Problem Statement What s measured improves. Peter Drucker In an era of

More information

Introduction to Change

Introduction to Change Introduction to Management and SDLC Steve Owyoung Sr. Manager KPMG LLP, IT Advisory Doug Mohrland Audit Manager Oracle Corporation Discussiontopics o significance o o s o o o o Software (SDLC) s Organization

More information

The IT Infrastructure Library (ITIL)

The IT Infrastructure Library (ITIL) IT service management is often equated with the Information Technology Infrastructure Library (ITIL), even though there are a variety of standards and frameworks contributing to the overall ITSM discipline.

More information

Governance, Risk & Compliance for Public Sector

Governance, Risk & Compliance for Public Sector Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS idashboards for Operations Management PROVIDING INSIGHT FOR OPERATIONAL SUCCESS idashboards helped Precoat move from manual data mining and paper reports to a system that allows us to identify best practices

More information

WHITE PAPER. How to simplify and control the cardholder security environment

WHITE PAPER. How to simplify and control the cardholder security environment WHITE PAPER How to simplify and control the cardholder security environment Document Version V1-0 Document Set: QCC Information Security Prepared By Nick Prescot - QCC Information Security Ltd Sponsored

More information

April 20, 2006. Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices)

April 20, 2006. Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices) Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices) April 20, 2006 San Francisco ISACA Chapter Luncheon Seminar Presented By Lance M. Turcato, CISA, CISM, CPA Deputy City

More information

Program Lifecycle Methodology Version 1.7

Program Lifecycle Methodology Version 1.7 Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated

More information

Minnesota Health Insurance Exchange (MNHIX)

Minnesota Health Insurance Exchange (MNHIX) Minnesota Health Insurance Exchange (MNHIX) Project Status Report Week Ending: 09-19-2012 Page - 1 Executive Summary The Executive Summary provides an executive level review of general project activities,

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

ITIL CSI 2011 Vernon Lloyd

ITIL CSI 2011 Vernon Lloyd ITIL CSI 2011 Vernon Lloyd 12 th December 2011 Implementing or Improving? Vernon Lloyd International Client Director Fox IT Without change there is no innovation, creativity, or incentive for improvement

More information

Addressing SOX compliance with XaitPorter. Version 1.0 Sept. 2014

Addressing SOX compliance with XaitPorter. Version 1.0 Sept. 2014 Addressing SOX compliance with XaitPorter Version 1.0 Sept. 2014 Table of Contents 1 Addressing Compliance... 1 2 SOX Compliance... 2 3 Key Benefits... 5 4 Contact Information... 6 1 Addressing Compliance

More information

IT Risk Management Life Cycle and enabling it with GRC Technology

IT Risk Management Life Cycle and enabling it with GRC Technology IT Risk Management Life Cycle and enabling it with GRC Technology Debbie Lew (debbie.lew@ey.com), Senior Manager, E&Y Steven Jones (steven.jones@ey.com), Senior Manager, E&Y Overview 1. What is risk management?

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

Optimizing Automation of Internal Controls for GRC and General Business Process Compliance

Optimizing Automation of Internal Controls for GRC and General Business Process Compliance Optimizing Automation of Internal s for GRC and General Business Process Compliance Whitepaper Compliancy Software, Inc. www.compliancysoftware.com Telephone: +1.919.342.6212 Email: info@compliancysoftware.com

More information

CXO Dashboards. How to drive business performance with certainty. 2009 CXO Dashboards

CXO Dashboards. How to drive business performance with certainty. 2009 CXO Dashboards CXO Dashboards How to drive business performance with certainty Several executives find it difficult to manage their strategic objectives with certainty Too many pressures to balance Not enough visibility

More information

Enterprise Information Security Business Risk Assessment

Enterprise Information Security Business Risk Assessment Enterprise Information Security Business Risk Assessment Information Security and Privacy May 11, 2009 State of Oregon http://www.oregon.gov/das/eispd/eso Executive Summary In 2007 the Enterprise Information

More information

Demonstrating Regulatory Compliance

Demonstrating Regulatory Compliance White Paper Demonstrating Regulatory Compliance Simplifying Security Management November 2006 Executive Summary Increasingly, organizations throughout Europe are expected to comply (and to demonstrate

More information

Surviving an Identity Audit

Surviving an Identity Audit What small and midsize organizations need to know about the identity portion of an IT compliance audit Whitepaper Contents Executive Overview.......................................... 2 Introduction..............................................

More information

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL EGI Technical Forum 2011, Lyon (France) September 22, 2011 Dr. Thomas Schaaf www.gslm.eu EMERGENCE TECH LTD. The

More information

Engaged Management ReView Reviewer Guidelines V.1.0. Friday, March 11, 2015

Engaged Management ReView Reviewer Guidelines V.1.0. Friday, March 11, 2015 Engaged Management ReView Reviewer Guidelines V.1.0 Friday, March 11, 2015 Table of Contents Engaged Management ReView (EMR) Reviewer Guidelines... 3 SECTION 1: Reviewer Receiving Invitation to Review

More information

sample exam ITMP.EN IT Management Principles (ITMP.EN) edition 2010 content introduction 3 exam 4 answer key 9 evaluation 16

sample exam ITMP.EN IT Management Principles (ITMP.EN) edition 2010 content introduction 3 exam 4 answer key 9 evaluation 16 sample exam ITMP.EN IT Management Principles (ITMP.EN) edition 2010 content introduction 3 exam 4 answer key 9 evaluation 16 EXIN International B.V. Examination Institute for Information Science Janssoenborch,

More information

Trends in Information Technology (IT) Auditing

Trends in Information Technology (IT) Auditing Trends in Information Technology (IT) Auditing Padma Kumar Audit Officer May 21, 2015 Discussion Topics Common and Emerging IT Risks Trends in IT Auditing IT Audit Frameworks & Standards IT Audit Plan

More information

Continuously Improve Mobile App Quality: IBM Mobile Quality Assurance

Continuously Improve Mobile App Quality: IBM Mobile Quality Assurance Continuously Improve Mobile App Quality: IBM Mobile Quality Assurance Khurram Nizami (knizami@us.ibm.com) 1 #IBMMobile 2013 IBM Corporation 2 #IBMMobile 2013 IBM Corporation 1 4 in 3 2014 Forrester Research,

More information

White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance

White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance White Paper Sarbanes Oxley and iseries Security, Audit and Compliance This White Paper was written by AH Technology Distributors of isecurity a suite of iseries security products developed by Raz-Lee Security

More information

Supporting Compliance Management with Technology

Supporting Compliance Management with Technology Supporting Management with Technology May 27, 2009 Agenda Observations and challenges from the marketplace Process Overview of Tools to Support Understanding Your Requirements Closing Thoughts Questions?

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Keep managers better informed on their areas of responsibility and highlight the issues that require their attention with dashboards!

Keep managers better informed on their areas of responsibility and highlight the issues that require their attention with dashboards! Meet Your Targets! Effective Performance Management certainly requires more than just the technology to support it. Expertise in KPI development, target setting, framework modeling, dashboard development

More information

Compliance Applicata. Milano, 7 febbraio 2007. Dr. Jean Paul Ballerini Sr. Technology Solutions Expert

Compliance Applicata. Milano, 7 febbraio 2007. Dr. Jean Paul Ballerini Sr. Technology Solutions Expert Compliance Applicata Milano, 7 febbraio 2007 Dr. Jean Paul Ballerini Sr. Technology Solutions Expert Legislazione e Normative Terrorism Act 2000 Sarbanes Oxley Act FSA CMA HIPAA Here is another one Obscene

More information

Metricus for ServiceNow

Metricus for ServiceNow represents the integration of Metricus a cloud platform for IT Performance Measurement and ServiceNow a leading cloud-based provider of IT service Management. By leveraging Metricus as an integrated, seamless

More information

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance WHITE PAPER Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance The objective of this white paper is to

More information

Cisco Advanced Services Network Management Systems Architectural Leading Practice

Cisco Advanced Services Network Management Systems Architectural Leading Practice Cisco Advanced Services Network Management Systems Architectural Leading Practice Contents Introduction Preface Intent Network Management Goals and Requirements Operational Goals Functional Requirements

More information

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

Strategic IT audit. Develop an IT Strategic IT Assurance Plan Strategic IT audit Develop an IT Strategic IT Assurance Plan Speaker Biography Hans Henrik Berthing is Partner at Verifica and Senior Advisor & Associated Professor at Aalborg University. He is specialized

More information

IT Service Management in Practice

IT Service Management in Practice IT Service Management in Practice Karl Czerny - Gasse 2/2/32 A - 1200 Vienna +43 1 92912 65 7 +43 1 92912 66 office@walter-abel.at www.walter-abel.at www.itsmprocesses.com 1 IT Service Management in Practice

More information

<risk> Enterprise Risk Management

<risk> Enterprise Risk Management Global Resources... Local Knowledge is vital in supporting business continuity across diverse and challenging environments and operating models. By consolidating risk management activities into a single,

More information

REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS

REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS IT GOVERNANCE SUMMIT OCTOBER, 2015 REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS Presented by Ralph Ugbodu CGEIT, CISA, CRISC, CISSP, CFE, EDRP, ISO 27001 Lead Auditor, COBIT5.

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

70-246: Monitoring and Operating a Private Cloud with System Center 2012

70-246: Monitoring and Operating a Private Cloud with System Center 2012 70-246: Monitoring and Operating a Private Cloud with System Center 2012 Module 01 - System Center 2012 Lesson 1: What is System Center 2012? Suite of Components Operations Manager Configuration Manager

More information

Title: Lucent s ITSM Journey Session #: 299 Speaker: Sheila Bridge Company: Lucent Technologies, Inc.

Title: Lucent s ITSM Journey Session #: 299 Speaker: Sheila Bridge Company: Lucent Technologies, Inc. Title: Lucent s ITSM Journey Session #: 299 Speaker: Sheila Bridge Company: Lucent Technologies, Inc. Presentation Outline q Background q Foundation to Support Successful ITSM Implementation q ITSM Project

More information

Memeo C1 Secure File Transfer and Compliance

Memeo C1 Secure File Transfer and Compliance Overview and analysis of Memeo C1 and SSAE16 & SOX Compliance Requirements Memeo C1 Secure File Transfer and Compliance Comply360, Inc Contents Executive Summary... 2 Overview... 2 Scope of Evaluation...

More information

Cyber Security Governance

Cyber Security Governance M T R 1 0 0 3 0 8 M I T R E T E C H N I C A L R E P O RT Cyber Security Governance A Component of MITRE's Cyber Prep Methodology Sponsor: Dept. No.: G020 Contract No.: Project No.: 01CCG005-AD The views,

More information

ITIL glossary and abbreviations. English

ITIL glossary and abbreviations. English ITIL glossary and abbreviations English This glossary may be freely downloaded. See www.itil-officialsite.com/internationalactivities/translatedglossaries.aspx for details of licence terms. AXELOS Limited

More information

Sample Exam. IT Service Management Foundation based on ISO/IEC 20000

Sample Exam. IT Service Management Foundation based on ISO/IEC 20000 Sample Exam IT Service Management Foundation based on ISO/IEC 20000 Edition April 2011 Copyright 2011 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored

More information

Operations and Network Center (CORE)

Operations and Network Center (CORE) Operations and Network Center (CORE) Get to know us The Operations and Network Center (CORE) is the cornerstone in Informatica ECI's strategy for the provision of managed information technology services.

More information

Quest InTrust. Change auditing and policy compliance for the secure enterprise. May 2008. Copyright 2006 Quest Software

Quest InTrust. Change auditing and policy compliance for the secure enterprise. May 2008. Copyright 2006 Quest Software Quest InTrust Change auditing and policy compliance for the secure enterprise May 2008 Copyright 2006 Quest Software Quest is the Thought Leader in Active Directory Named Microsoft Global ISV Partner of

More information

ITIL glossary and abbreviations. English

ITIL glossary and abbreviations. English ITIL glossary and abbreviations English 1 Acknowledgements We would like to thank Ashley Hanna (HP) and Stuart Rance (HP) who produced the original ITIL glossary in English in May 2007, and to Ashley Hanna

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Results Oriented Change Management

Results Oriented Change Management Results Oriented Change Management Validating Change Policy through Auditing Abstract Change management can be one of the largest and most difficult tasks for a business to implement, monitor and control

More information

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 11, 2014 Session

More information

IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE

IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE 1 IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE ANSWERS AND PRACTICAL TIPS FROM THE IT GOVERNANCE AUDIT PROFESSIONALS JOHAN LIDROS, PRESIDENT EMINERE GROUP KATE MULLIN, CISO, HEALTH

More information

Manage and Control Access Risk and Assess Its Financial Impact

Manage and Control Access Risk and Assess Its Financial Impact SAP Brief Extensions SAP Access Violation Management by Greenlight Objectives Manage and Control Access Risk and Assess Its Financial Impact Make access control decisions based on business impact Make

More information

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Passive Logging. Intrusion Detection System (IDS): Software that automates this process Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion

More information

Measuring the level of quality of IT Service Management

Measuring the level of quality of IT Service Management Central Page 176 of 344 Measuring the level of quality of IT Service Management Melita Kozina, Lucija Horvat Faculty of Organization and Informatics University of Zagreb Pavlinska 2, 42000 {melita.kozina,

More information

ITIL glossary and abbreviations. English

ITIL glossary and abbreviations. English ITIL glossary and abbreviations English This glossary may be freely downloaded. See www.itil-officialsite.com/internationalactivities/translatedglossaries.aspx for details of licence terms. 1 Acknowledgements

More information

IT Governance: framework and case study. 22 September 2010

IT Governance: framework and case study. 22 September 2010 IT Governance: framework and case study Presenter Yaowaluk Chadbunchachai Advisory Services Ernst & Young Corporate Services Limited Presentation topics ERM and IT governance IT governance framework IT

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA INFORMATION SYSTEMS AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY GENERAL CONTROLS OCTOBER 2014 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR

More information

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015 SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation

More information

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational

More information