IAM/IAG Maturity Assessment Dos & Don'ts

Size: px
Start display at page:

Download "IAM/IAG Maturity Assessment Dos & Don'ts"

Transcription

1 IAM/IAG Maturity Assessment Dos & Don'ts Thursday, May 15th, 15:30 16:00 Dr. Horst Walther Senior Analyst KuppingerCole

2 IAM/IAG Maturity Assessment Dos & Don ts Rating the maturity of IAM/IAG programs is not easy. Who is the right one to do such rating? Which input is required? How to you ensure that the rating does not become more complex than the rest of the program? What to look at what are the Key Performance Indicators (KPIs) & Key Risk Indicators (KRIs) to look at & how to do it without years-long collection of such indicators? What are the right benchmarks you can use Who can help you in benchmarking? Which lessons to draw from the results? In this session, Dr. Horst Walther will talk about the Dos & Don ts of Maturity Assessments.

3 Maturity models Maturity models are one of the widespread areas in the field of improving organizational performance. They identify organizational strengths & weaknesses as well as providing benchmarking information. There are many maturity models like OPM3, CMMI, P3M3, PRINCE, BPMM, Kerzner's model, SPICE, COBIT etc. These models differ from each other in terms of their factors & characteristics There is no standard related to these models. It is important for organizations to be able to assess their situation by a comprehensive and useful model. KuppingerCole 5/20/2014 P3M3. Portfolio, Programme & Project Management Maturity Model CMMI : Capability Maturity Model Integration OPM3 : Organizational Project Management Maturity Model SPICE: Software Process Improvement & Capability Determination COBIT: Control Objectives for Information & Related Technology 3

4 CMM The forefather of all maturity models Initial (chaotic, ad hoc) - the starting point for use of a new or undocumented repeat process. Repeatable The process is at least documented sufficiently, to enable repeating the same steps. Defined The process is defined/confirmed as a standard business process. Managed The process is quantitatively managed in accordance with agreed-upon metrics. Optimizing process management includes deliberate process optimization/improvement. KuppingerCole

5 CMM gave maturity models a kick start In 1986 triggered by the U.S. DoD (Department of Defence), the SEI (Software Engineering Institute) at Carnegie Mellon University, started the development of a system for assessing the maturity of software processes. In 1991, the model was issued as Capability Maturity Model 1.0 CMMI (Capability Maturity Model Integration) was released in early CMM lead to a proliferation of CM models. Popular models, based on the original CMU CMM, are Spice for maturity assessment & assessment of software processes & COBIT for IT governance processes & many others. The notion of Maturity Models will be henceforth tied to one name: Watts S. Humphrey. KuppingerCole

6 Why Maturity Assessments? Assessment according to a common maturity model enable Positioning - current achievements in a framework Benchmarking - to compare with others (competitors, best of breed, ) Quantification - of otherwise qualitative information Evidence - for compliance & certification purposes Orientation - to define the starting point for change activities. Reputation - as it is fancy not to rely on gut feelings. Transparency - serving as the foundation for any good governance. KuppingerCole

7 Maturity Models for IAM / IAG & related There are overwhelmingly plenty models around; you could well craft your own. KuppingerCole

8 Maturity assessments & IAM / IAG We deem it prudent to assess IAM / IAG processes for maturity too. However this discipline is inherently immature in itself. Terms (like authorisation, provisioning, ) are weakly defined & poorly understood. IT depts carry the burden to solve business tasks without being mandated. Few standards, generic practices have been established. Hence Maturity assessments have to be undertaken with some extra care. Nevertheless, a huge number of maturity models is around. Tailored approaches currently appear to be most promising. KuppingerCole pioneered in this discipline. KuppingerCole

9 What it needs to do Maturity Assessements in-depth knowledge of the status of the technology market segment the programs are related today knowledge about the status of other organizations, both in the industry of the organization and in other industries good understanding of trends that will have an impact on the program and investments a rigorous methodological approach based on reliable information 9 KuppingerCole

10 Build the assessment on top of KPIs / KRIs The following generic approach for deriving KPIs/KRIs is recommended Define goals: Define what should be achieved & how the initiative relates to other initiatives in the organization. There should be one consistent risk management approach in the organization, while starting small & distributed. Define metrics: The KRIs/KPIs to be used have to be defined. That includes the definition of thresholds which should be met. Define responsibilities: In the beginning, the responsibilities for providing the current values of metrics, the aggregation of these metrics into scorecards & the reporting structures including alerting & escalations have to be defined. Define actions: The approach has to result in predefined actions in case that a risk increases beyond the defined threshold. KuppingerCole 5/20/

11 How to choose KRIs & KPIs It is most important to choose the appropriate KRIs/KPIs: 1. Choose valid indicators: Indicators have to be directly related to a risk. Changes in the value of the indicator have to indicate increasing/decreasing risks. 2. Choose indicators which can be influenced directly: There have to be actions defined for every indicator. Indicators which can be influenced (& improved) easily are a good choice. 3. Choose indicators which are easy to collect: If you need special tools or increased staff to collect raw data, you may have chosen the wrong metric collection has to be easy. KuppingerCole 5/20/

12 Work example: Digital identities per physical person Indicator: Group(s) of Indicators: Interpretation: Average number of Digital identities per physical person. IAM, GRC Defines the ratio of digital identities (e.g. identifiers to which accounts are mapped) and the number of physical persons (internal, external). Unit type: Percentage Direction: Minimize (Optimum: 1) IT Risks associated: Security risks: Situations in which one person has several digital identities often lead to unmanaged accounts. As well there are some security risks in preferring elevated accounts or unsecure authentication approaches. From a GRC perspective, these situations make it very difficult to analyse and control security. Efficiency risks: Having to deal with several identities is more complex and might lead to an increasing number of password losses. Operational Risks associated: Due to the security risks these situations might lead to undetected SoD conflicts in case that the relation of several digital identities to one physical person isn t identified. How to optimize: Use global identifiers as an abstraction level or map all accounts to one physical identity (if applicable). Annotations: KuppingerCole 5/20/2014 Some IAM and GRC tools can t deal with multiple layers of identities, e.g. accounts, digital identities and 12 additional global identifiers as an additional mapping layer.

13 Select KPIs / KRIs from these activity domains A typical assessment will evaluate KPIs / KRIs from the following activity domains against Best Practice: Visibility & Acceptance Guidelines & Policies Organisational Structure Status of Organisation Deployment Scope & Coverage Risk Awareness Technical Master Plan Access & Governance Analytics Identity Management & Provisioning Support for the Extended Enterprise Privilege Management & SIEM Authentication & Authorisation 13

14 Where to assess the Maturity? e.g. in the 7 KC IAM/IAG Maturity domains KC proposes Maturity Level Matrices for IAM/IAG for 7 major areas: 1. Access Governance 2. Access Management & Federation 3. Authentication 4. Cloud Identity Management 5. Dynamic Authorization Management 6. Identity Provisioning 7. Privilege Management These matrices cover the most important areas of IAM/IAG. Including some minor segments, such as Enterprise Single Sign-On. Some of the matrices cover a fairly broad range of topics. E.g. Authentication, includes strong authentication, risk- & context-based authentication & authorization, & versatile authentication. KuppingerCole 5/20/

15 Maturity Levels tailored to the domain KC example for Access Management / Governance 15 KuppingerCole

16 How to visualise the results Evaluation sample 1 (table) Maturity Level 5 Maturity Level 3 Best of Class Good in Class Current Average Visibility & Acceptance Guidelines & Policies Organisational Structure Penetration of the Organisation Scope & Coverage Risk Awareness Technical Master Plan Access Governance/Analytics Identity Management Extended Enterprise Privilege Management & SIEM Authentication & Authorisation KuppingerCole 16

17 How to visualise the results Evaluation sample 2 (graph) Maturity Assessment Example of evaluation The customer s status compared to Best of Class Customer Best of Class Visibility and Acceptance Authentication and 9 8 Guidelines and Policies 7 6 Privilege Management and 5 4 Organisational Structure 3 2 Support for the Extended 1 0 Status of Organisation Identity Management & Scope and Coverage Access and Governance Risk Awareness Technical Master Plan 17

18 The recommended actions example working plan for until the next maturity assessment Visibility & Acceptance Guidelines & Policies Organisational Structure Penetration of the Organisation Scope & Coverage Risk Awareness Technical Master Plan Access Governance/Analytics Identity Management Extended Enterprise Privilege Management & SIEM KuppingerCole 18 Authentication & Authorisation No actions required Consolidate & harmonise the existing stack Shift IAG responsibility to business Extend current practices to a 2nd business line Consider including customer direct access No actions recommended Consolidate isolated projects to a controlled program Employ a big data approach to enable analytics No actions required Actions recommended postponed due to low priority Apply SIEM to privileged Access Management Include dynamic authorisation to the enterprise concept

19 7 Dos & recommendations 1. Tailor oversize maturity models to your specific needs. 2. There is currently no way to avoid proprietary models 3. They provide (limited) knowledge bases & hence comparability. 4. IAM / IAGs inherent immaturity limit the benchmarking applicability. 5. Accept IAM / IAG purely as a business task. 6. Invest some effort into a clear, rigorous & logical terminology. 7. You may well define your own custom KPIs / KRIs. KuppingerCole

20 5 Don ts & warnings 1. No overkill assessments must not be huge projects 2. Not for the shelf assessments should result in actions 3. Not one time effort - Assess regularly at least every 2-3 years 4. Not just IT - Consider business and technology 5. No introspection look for outside view, experts, external knowledge KuppingerCole 5/20/

A Report on The Capability Maturity Model

A Report on The Capability Maturity Model A Report on The Capability Maturity Model Hakan Bayraksan hxb07u 29 November 2009 G53QAT Table of Contents Introduction...2 The evolution of CMMI...3 CMM... 3 CMMI... 3 The definition of CMMI... 4 Level

More information

Nydia González 1, Franck Marle 1 and Jean-Claude Bocquet 1. Ecole Centrale Paris, FRANCE

Nydia González 1, Franck Marle 1 and Jean-Claude Bocquet 1. Ecole Centrale Paris, FRANCE INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE Nydia González 1, Franck Marle 1 and Jean-Claude Bocquet 1 1 Ecole Centrale

More information

Lecture 8 About Quality and Quality Management Systems

Lecture 8 About Quality and Quality Management Systems Lecture 8 About Quality and Quality Management Systems Kari Systä 10.03.2014 10.03.2014 TIE-21100/21106; K.Systä 1 Content of today s lecture Two weeks ago we discussed about testing and inspections, that

More information

ObserveIT User Activity Monitoring

ObserveIT User Activity Monitoring KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

Portfolio, Programme and Project Management Maturity Model - a Guide to Improving Performance

Portfolio, Programme and Project Management Maturity Model - a Guide to Improving Performance Portfolio, Programme and Project Management Maturity Model - a Guide to Improving Performance By Andy Murray Improving Performance Using Maturity Models The 1990's saw a dramatic increase in the number

More information

CAPABILITY MATURITY MODEL INTEGRATION

CAPABILITY MATURITY MODEL INTEGRATION CAPABILITY MATURITY MODEL INTEGRATION Radu CONSTANTINESCU PhD Candidate, University Assistant Academy of Economic Studies, Bucharest, Romania E-mail: [email protected] Web page: http:// www.raduconstantinescu.ase.ro

More information

Management & Administration. Project Management: Avoiding Peter Principle Promotions Gary McQuown Data and Analytic Solutions, Inc.

Management & Administration. Project Management: Avoiding Peter Principle Promotions Gary McQuown Data and Analytic Solutions, Inc. Project Management: Avoiding Peter Principle Promotions Gary McQuown Data and Analytic Solutions, Inc. Fairfax VA ABSTRACT 'The Peter Principle states that "in a hierarchy every employee tends to rise

More information

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation

More information

MGMT 4135 Project Management. Chapter-16. Project Oversight

MGMT 4135 Project Management. Chapter-16. Project Oversight MGMT 4135 Project Management Chapter-16 Project Oversight Project Oversight: defined as a set of principles and processes to guide and improve the management of projects. Ensures projects meet the needs

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

Benefits of conducting a Project Management Maturity Assessment with PM Academy:

Benefits of conducting a Project Management Maturity Assessment with PM Academy: PROJECT MANAGEMENT MATURITY ASSESSMENT At PM Academy we believe that assessing the maturity of your project is the first step in improving the infrastructure surrounding project management in your organisation.

More information

ITIL: Continual Service Improvement

ITIL: Continual Service Improvement Management of IT Environment (9) Riadenie IT prostredia ITIL: Continual Service Improvement Karol Furdík Department of Cybernetics and AI, FEI TU Košice 1 Outline } CSI - Continual Service Improvement

More information

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value

More information

Redesigned Framework and Approach for IT Project Management

Redesigned Framework and Approach for IT Project Management Vol. 5 No. 3, July, 2011 Redesigned Framework and Approach for IT Project Management Champa Hewagamage 1, K. P. Hewagamage 2 1 Department of Information Technology, Faculty of Management Studies and Commerce,

More information

Contents. visualintegrator The Data Creator for Analytical Applications. www.visualmetrics.co.uk. Executive Summary. Operational Scenario

Contents. visualintegrator The Data Creator for Analytical Applications. www.visualmetrics.co.uk. Executive Summary. Operational Scenario About visualmetrics visualmetrics is a Business Intelligence (BI) solutions provider that develops and delivers best of breed Analytical Applications, utilising BI tools, to its focus markets. Based in

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Frameworks for IT Management

Frameworks for IT Management Frameworks for IT Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see www.vanharen.net 7 CMMI Capability Maturity Model Integration

More information

Certified Software Quality Assurance Professional VS-1085

Certified Software Quality Assurance Professional VS-1085 Certified Software Quality Assurance Professional VS-1085 Certified Software Quality Assurance Professional Certified Software Quality Assurance Professional Certification Code VS-1085 Vskills certification

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first

More information

Anatomy of an Enterprise Software Delivery Project

Anatomy of an Enterprise Software Delivery Project Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific

More information

MKS Integrity & CMMI. July, 2007

MKS Integrity & CMMI. July, 2007 & CMMI July, 2007 Why the drive for CMMI? Missed commitments Spiralling costs Late delivery to the market Last minute crunches Inadequate management visibility Too many surprises Quality problems Customer

More information

[project.headway] Integrating Project HEADWAY And CMMI

[project.headway] Integrating Project HEADWAY And CMMI [project.headway] I N T E G R A T I O N S E R I E S Integrating Project HEADWAY And CMMI P R O J E C T H E A D W A Y W H I T E P A P E R Integrating Project HEADWAY And CMMI Introduction This white paper

More information

ACCESS INTELLIGENCE. an intelligent step beyond Access Management. White Paper

ACCESS INTELLIGENCE. an intelligent step beyond Access Management. White Paper ACCESS INTELLIGENCE an intelligent step beyond Access Management White Paper Table of Contents Access Intelligence an intelligent step beyond Access Management...3 The new Identity Access Management paradigm...3

More information

Dobre praktyki zarządzania zakupami technologicznymi

Dobre praktyki zarządzania zakupami technologicznymi Dobre praktyki zarządzania zakupami technologicznymi Leszek Maśniak Executive Partner, Gartner Poland Ministerstwo Administracji i Cyfryzacji, Warszawa 12-10-2014 Gartner at a Glance 6,100 associates 14,000+

More information

Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions Transcript

Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions Transcript Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions Transcript Part 1: What Are Maturity Models and Why Are They Useful? Julia Allen: Welcome to CERT's Podcast Series:

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

PROCESS IMPROVEMENT CAPABILITY MATURITY MODEL

PROCESS IMPROVEMENT CAPABILITY MATURITY MODEL PROCESS IMPROVEMENT CAPABILITY MATURITY MODEL Immature versus Mature Software Organisations In an immature software organisation, software processes are generally improvised by practitioners and their

More information

37 Marketing Automation Best Practices David M. Raab Raab Associates Inc.

37 Marketing Automation Best Practices David M. Raab Raab Associates Inc. 37 Marketing Automation Best Practices David M. Raab Raab Associates Inc. Many companies today have installed marketing automation or demand generation software.* But buying a system is like joining a

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

Universiteit Leiden. ICT in Business. Leiden Institute of Advanced Computer Science (LIACS) Capability Maturity Model for Software Usage

Universiteit Leiden. ICT in Business. Leiden Institute of Advanced Computer Science (LIACS) Capability Maturity Model for Software Usage Universiteit Leiden ICT in Business Capability Maturity Model for Software Usage Name: Yunwei Huang Student-no: s1101005 Date: 16/06/2014 1st supervisor: Dr. Luuk Groenewegen 2nd supervisor: Dr. Nelleke

More information

Dashboard Reporting Business Intelligence

Dashboard Reporting Business Intelligence Dashboard Reporting Dashboards are One of 5 Styles of BI Applications Increasing Analytics & User Interactivity Advanced Analysis & Ad Hoc OLAP Analysis Reporting Ad Hoc Analysis Predictive Analysis Data

More information

Foredragfor Den Norske Dataforening, den 08.10.2003

Foredragfor Den Norske Dataforening, den 08.10.2003 Foredragfor Den Norske Dataforening, den 08.10.2003 CMM, CMMI and ISO 15504 (SPICE) Bruk av modenhetsmodeller under programmvareutvikling, er det nøkkelen til suskess? Malte Foegen, Jürgen Richter IT Maturity

More information

Plan-Driven Methodologies

Plan-Driven Methodologies Plan-Driven Methodologies The traditional way to develop software Based on system engineering and quality disciplines (process improvement) Standards developed from DoD & industry to make process fit a

More information

Research Data Management Framework: Capability Maturity Guide

Research Data Management Framework: Capability Maturity Guide ANDS Guides Research Data Management Framework: Capability Maturity Guide Introduction The outline set out below shows five levels of attainment or maturity which institutions may achieve in managing their

More information

Distributed and Outsourced Software Engineering. The CMMI Model. Peter Kolb. Software Engineering

Distributed and Outsourced Software Engineering. The CMMI Model. Peter Kolb. Software Engineering Distributed and Outsourced Software Engineering The CMMI Model Peter Kolb Software Engineering SEI Trademarks and Service Marks SM CMM Integration SCAMPI are service marks of Carnegie Mellon University

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

Concept of Operations for the Capability Maturity Model Integration (CMMI SM )

Concept of Operations for the Capability Maturity Model Integration (CMMI SM ) Concept of Operations for the Capability Maturity Model Integration (CMMI SM ) August 11, 1999 Contents: Introduction CMMI Overview Concept for Operational Use of the CMMI Migration to CMMI Models Concept

More information

CMMi and Application Outsourcing

CMMi and Application Outsourcing White Paper CMMi and Application Outsourcing Abstract A lot of applications outsourcing providers in the market today are claiming for being assessed in different maturity levels of CMMi. But it is important

More information

Data Quality for BASEL II

Data Quality for BASEL II Data Quality for BASEL II Meeting the demand for transparent, correct and repeatable data process controls Harte-Hanks Trillium Software www.trilliumsoftware.com Corporate Headquarters + 1 (978) 436-8900

More information

Developing CMMI in IT Projects with Considering other Development Models

Developing CMMI in IT Projects with Considering other Development Models Developing CMMI in IT Projects with Considering other Development Models Anahita Ahmadi* MSc in Socio Economic Systems Engineering Organizational Process Development Engineer, International Systems Engineering

More information

VENDOR REPORT by Martin Kuppinger April 2013. Atos DirX. KuppingerCole

VENDOR REPORT by Martin Kuppinger April 2013. Atos DirX. KuppingerCole KuppingerCole VENDOR REPORT by Martin Kuppinger April 2013 Identity, Security, and Risk Management as part of a broad solution portfolio. Industry focus and integration as reason for an IAM Business Case

More information

How To Save Money At The University Of California

How To Save Money At The University Of California THE UNIVERSITY OF CALIFORNIA ERM PROGRAM REDUCES THE COSTS OF RISK AND BORROWING BY JOHN BUGALLA AND KRISTINA NARVAEZ In December 2005, the University of California s Department of Risk Management was

More information

A Capability Maturity Model for Scientific Data Management

A Capability Maturity Model for Scientific Data Management A Capability Maturity Model for Scientific Data Management 1 A Capability Maturity Model for Scientific Data Management Kevin Crowston & Jian Qin School of Information Studies, Syracuse University July

More information

SW Process Improvement and CMMI. Dr. Kanchit Malaivongs Authorized SCAMPI Lead Appraisor Authorized CMMI Instructor

SW Process Improvement and CMMI. Dr. Kanchit Malaivongs Authorized SCAMPI Lead Appraisor Authorized CMMI Instructor SW Process Improvement and CMMI Dr. Kanchit Malaivongs Authorized SCAMPI Lead Appraisor Authorized CMMI Instructor Topics of Presentation Why improvement? What is CMMI? Process Areas and Practices in CMMI

More information

Developing organisational capability in programme & project management. David Trevitt, IVI Senior Advisor 16 th October 2014

Developing organisational capability in programme & project management. David Trevitt, IVI Senior Advisor 16 th October 2014 Developing organisational capability in programme & project management David Trevitt, IVI Senior Advisor 16 th October 2014 Innovation Value Institute 2014 Developing organisational capability in programme

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

ITIL AND COBIT EXPLAINED

ITIL AND COBIT EXPLAINED ITIL AND COBIT EXPLAINED 1 AGENDA Overview of Frameworks Similarities and Differences Details on COBIT Framework (based on version 4.1) Details on ITIL Framework, focused mainly on version.2. Comparison

More information

Bradford J. Willke, CISSP

Bradford J. Willke, CISSP Engineering National Cybersecurity and Critical Information Infrastructure Protection Bradford J. Willke, CISSP 16 October 2007 ITU Regional Workshop Buenos Aires, Argentina Overview Purpose: This session

More information

Enterprise Risk Management

Enterprise Risk Management Enterprise Management ERM provides a framework for risk management, which typically involves identifying particular events or circumstances relevant to the organization's objectives (risks and opportunities),

More information

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

Security and Identity Management Auditing Converge

Security and Identity Management Auditing Converge Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,

More information

Software Process Improvement CMM

Software Process Improvement CMM Software Process Improvement CMM Marcello Visconti Departamento de Informática Universidad Técnica Federico Santa María Valparaíso, Chile Software Engineering Institute Founded by the Department of Defense

More information

Family Evaluation Framework overview & introduction

Family Evaluation Framework overview & introduction A Family Evaluation Framework overview & introduction P B Frank van der Linden O Partner: Philips Medical Systems Veenpluis 4-6 5684 PC Best, the Netherlands Date: 29 August, 2005 Number: PH-0503-01 Version:

More information

The Advantages and Disadvantages of Using Software Engineering Standards

The Advantages and Disadvantages of Using Software Engineering Standards 1 Introduction and Overview INTRODUCTION Many companies, in their push to complete successful Level 2 Capability Maturity Model (CMM ) 1 or Capability Maturity Model Integration (CMMI ) 2 appraisals, have

More information

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT

More information

Operational Risk Management Program Version 1.0 October 2013

Operational Risk Management Program Version 1.0 October 2013 Introduction This module applies to Fannie Mae and Freddie Mac (collectively, the Enterprises), the Federal Home Loan Banks (FHLBanks), and the Office of Finance, (which for purposes of this module are

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

Software Engineering CSCI 4490. Class 50 Software Process Improvement. December 1, 2014

Software Engineering CSCI 4490. Class 50 Software Process Improvement. December 1, 2014 Class 50 Software Process Improvement December 1, 2014 ~Improving the Process of Software Development Our Focus: The role of the Capability Maturity Model Integration (CMMI) in improving the software development

More information

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security

More information

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS idashboards for Financial Services PROVIDING INSIGHT FOR OPERATIONAL SUCCESS We had a huge leap in account openings once staff could see how their sales compared to other staff and branches. They now have

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Agile Governance. Appropriate oversight for the Agile organisation. Chris Davies AXA Personal Lines Insurance. Andrew Craddock Partner - nlighten

Agile Governance. Appropriate oversight for the Agile organisation. Chris Davies AXA Personal Lines Insurance. Andrew Craddock Partner - nlighten Appropriate oversight for the Agile organisation Andrew Craddock Partner - nlighten Chris Davies AXA Personal Lines Insurance Governance Corporate Governance the set of processes, customs, policies, laws,

More information

Engineering Standards in Support of

Engineering Standards in Support of The Application of IEEE Software and System Engineering Standards in Support of Software Process Improvement Susan K. (Kathy) Land Northrop Grumman IT Huntsville, AL [email protected] In Other Words Using

More information

Introduction to SEIs Capability Maturity Model Integration (CMMI)

Introduction to SEIs Capability Maturity Model Integration (CMMI) Introduction to SEIs Capability Maturity Model Integration (CMMI) Rajiv Kapur, Ph.D. President and CEO Cura Consulting Solutions Principal, CCI Group Adjunct Professor, Industrial & Systems Engineering,

More information

Software Process Improvement. Overview

Software Process Improvement. Overview Software Process Improvement Overview Marcello Visconti Departamento de Informática Universidad Técnica Federico Santa María Valparaíso, Chile Motivation Immaturity of software engineering - state of the

More information

Sample Reporting. Analytics and Evaluation

Sample Reporting. Analytics and Evaluation Sample Reporting Analytics and Evaluation This sample publication is provided with the understanding that company names and related example reporting are solely illustrative and the content does not constitute

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS

REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS IT GOVERNANCE SUMMIT OCTOBER, 2015 REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS Presented by Ralph Ugbodu CGEIT, CISA, CRISC, CISSP, CFE, EDRP, ISO 27001 Lead Auditor, COBIT5.

More information

Establishing a business performance management ecosystem.

Establishing a business performance management ecosystem. IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance

More information

Capability Maturity Model Integration (CMMI SM ) Fundamentals

Capability Maturity Model Integration (CMMI SM ) Fundamentals Capability Maturity Model Integration (CMMI SM ) Fundamentals Capability Maturity Model Integration and CMMI are are service marks of Carnegie Mellon University 2008, GRafP Technologies inc. 1 What is

More information

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance

More information

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The

More information

Protecting the keys to your kingdom against cyber-attacks and insider threats

Protecting the keys to your kingdom against cyber-attacks and insider threats KuppingerCole Report WHITEPAPER by Martin Kuppinger November 2015 Protecting the keys to your kingdom against cyber-attacks and insider threats All organizations today are under constant attack, and high-privilege

More information

ITIL V3 AND THE SERVICE LIFECYCLE PART I THE MISSING COMPONENT

ITIL V3 AND THE SERVICE LIFECYCLE PART I THE MISSING COMPONENT ITIL V3 AND THE SERVICE LIFECYCLE PART I THE MISSING COMPONENT PLANVIEW INC. BACKGROUND IT departments continually have tremendous demands placed on them to manage new initiatives, projects, incidents,

More information

Using Assurance Models in IT Audit Engagements

Using Assurance Models in IT Audit Engagements Using Assurance Models in IT Audit Engagements Adrian Baldwin, Yolanta Beres, Simon Shiu Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-148R1 January 29, 2008* audit, assurance, compliance,

More information

What CMMI Cannot Give You: Good Software

What CMMI Cannot Give You: Good Software What CMMI Cannot Give You: Good Software Ivar Jacobson [email protected] [email protected] Objective To understand what CMM/CMMI is and what it is not To demonstrate how the unified process helps you

More information

CMMI and Agile our experience revealed

CMMI and Agile our experience revealed CMMI and Agile our experience revealed CMMI made Practical 2012 by Gerry Sweeney V1.1 Overview About Hornbill What we do Hornbill and CMMI CMMI and SCRUM Are they compatible? Final thoughts SEI Proprietary;

More information

COBIT 4.1 TABLE OF CONTENTS

COBIT 4.1 TABLE OF CONTENTS COBIT 4.1 TABLE OF CONTENTS Executive Overview....................................................................... 5 COBIT Framework.........................................................................

More information

Chartis RiskTech Quadrant for Model Risk Management Systems 2014

Chartis RiskTech Quadrant for Model Risk Management Systems 2014 Chartis RiskTech Quadrant for Model Risk Management Systems 2014 The RiskTech Quadrant is copyrighted June 2014 by Chartis Research Ltd. and is reused with permission. No part of the RiskTech Quadrant

More information

Credit Research & Risk Measurement

Credit Research & Risk Measurement Credit Research & RISK MEASUREMENT Credit Research & Risk Measurement Leverage the market standard in credit analysis and utilize the latest risk management technology to improve the efficiency of your

More information

Reaching CMM Levels 2 and 3 with the Rational Unified Process

Reaching CMM Levels 2 and 3 with the Rational Unified Process Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

CMMI meets ITIL. Dr. Ute Streubel

CMMI meets ITIL. Dr. Ute Streubel CMMI meets ITIL Dr. Ute Streubel KUGLER MAAG CIE GmbH Leibnizstr. 11, 70806 Kornwestheim / Stuttgart, Germany Phone / Fax +49 (0) 7154 807 210 / 229 [email protected] www.kuglermaag.com Stuttgart

More information

Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams.

Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams. : Delivering Value from IS & IT Investments John Ward and Elizabeth Daniel John Wiley & Son Ltd ISBN: 9780470094631, 399 pages Theme of the Book This book explores a process and practical tools and frameworks

More information

Violin Symphony Abstract

Violin Symphony Abstract Violin Symphony Abstract This white paper illustrates how Violin Symphony provides a simple, unified experience for managing multiple Violin Memory Arrays. Symphony facilitates scale-out deployment of

More information

Moving Forward with IT Governance and COBIT

Moving Forward with IT Governance and COBIT Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around

More information

integrating cutting-edge security technologies the case for SIEM & PAM

integrating cutting-edge security technologies the case for SIEM & PAM integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,

More information