IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives

Size: px
Start display at page:

Download "IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives"

Transcription

1 Page 1 of 12 IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives Panel Date: Thursday, April 18, 2013 Panel Time: 9-10am PST (60 minutes total, 15 minutes Q&A) Room: 112 Abstract: The Information Security Program Maturity Curve can provide an objective framework for defining, measuring and improving an organization s information security program. Listen to a panel of Symantec Managed Security Services (MSS) customers, each representing different stages of information security program development, discuss how they approached challenges inherent to each stage, as well as share key lessons learned. In addition, fifteen minutes will be provided for questions and answers. Panelists: Joseph Lee Director, IT Risk Management and Security, AARP Preston Jennings Chief Information Security Officer, PricewaterhouseCoopers Arno VanderWalt VP Information Security Operations at Wyndham Worldwide Moderator: Danny Dawes, Director, Managed Security Services Service Delivery

2 Page 2 of 12 Introduction (9:00 9:05) Danny: Thank you all for joining us for today s panel discussion on Approaching the Information Security Program Maturity Model: 3 Practitioners Perspectives. My name is Danny Dawes and I am the Director of Symantec s Managed Security Services, Service Delivery group. Let s start by level setting the concept of using a maturity curve to assess Information Security Program development. Several models exist in the industry; for example Gartner s Security Program Maturity Timeline and Forrester's Information Security Maturity Model Assessment Framework. When we talk with customers about their security programs, we find they align into three basic segments based on their awareness of their threat profile, risk adversity and overall security program maturity. Therefore, to simplify today s discussion, we ll refer to these three groups as: Adhoc Companies who are just starting to develop their Information Security Programs but no formalized security activities exist Best efforts security programs Companies who are doing their best to secure the Enterprise and hoping to mitigate most threats before they impact the business. Mature, proactive programs Companies whose goals, practices and performance metrics are fully defined.

3 Page 3 of 12 Introduction (con t) Interestingly, when we contacted customers regarding participating in this panel, most felt they fell in the middle category which makes sense. Because they are MSS customers, they have moved past the Adhoc stage, but few were hesitant to label their program as being proactive and mature. Perhaps they were afraid their CFO s were in the audience and they would lose funding if they implied their program development was complete. Therefore, we re asking our panel participants to comment on the various maturity segments based on past experience and observations of the industry. With that, I d like to ask our panelists to each take a minute or so to briefly introduce themselves: Introduction (9:05 9:10) [Brief introduction from all panelists please limit this to 90 seconds Name, title, year with company Background how did you get where you are today? Brief description of the network you manage What is your biggest concern/challenge regarding your environment, for example: o PwC employees spend considerable time on other companies networks? o AARP comprised of many different businesses (insurance, etc)? o Wyndham properties are very geographically dispersed?

4 Page 4 of 12 Please note: For each of the questions below, the panelist in the first position will take the lead for answering the question and therefore get the majority of the time. The second two panelists are welcome (and encouraged!) to contribute but need to keep it brief so we can ensure time for Q&A.

5 Page 5 of 12 The Usefulness of the Maturity Curve as an Evaluation Tool (9:10-9:15) Danny: What are your thoughts on this Maturity Curve? Is it a good summary of how different organizations might approach their information security program? Joe: understanding why security is important for your business and explaining to management why not everyone needs to be a 5 Versus highly risk adverse business that must be a 5 Preston: Arno:

6 Page 6 of 12 Assessing Your Program (9:15-9:20) Danny: A critical first step for any security professional walking into a new role is assessing where the new organization resides on this curve and where the gaps may lie. Thinking back to your most recent transition, what techniques did you use to make this assessment? Preston: team strengths, understanding what a mature program looks like, what the strengths are where the gaps are, figure out where you re going to make investments. Acknowledging that you just can t do it all. Joe: built AARP from non- existent program Arno:

7 Page 7 of 12 Top Challenges Faced While Evolving Security Programs (9:20-9:25) Danny: Once you ve come in and made the initial assessment, the next step becomes taking the program to the next level. What were the top one or two challenge you faced in trying to evolve your information security program and how did you address those challenges in your environment?. Preston: reporting structure, ability to influence change, reports to CIO, now reports in to board of senior business leaders, decisions that would have been made by IT, now being driven by the business. Cyber warfare, business impact. Takes discuss around impact to business if we don t anything used to be a line item discussion. Joe Arno

8 Page 8 of 12 Transforming less mature programs (9:25-9:30) Danny: Have you ever worked for an organization that had a less mature security program? What kinds of challenges did you face trying to move them forward? Does anyone have anything to share here? If not, I m going to cut. Joe: Preston: Arno:

9 Page 9 of 12 Is it realistic to reach for a 5? (9:30-9:35) Danny: Do you think it s realistic for most organizations to strive to reach the upper level of the maturity curve? What challenges will they face in doing so? Joe: Preston: Arno:

10 Page 10 of 12 Demonstrating Program Performance (9:35-9:40) Danny: After protecting the enterprise, the ability to demonstrate program performance in order to justify funding is Holy Grail for most information security professionals. What techniques have you found most effective for proving the value and efficacy of your security program? Joe: Preston: Arno

11 Page 11 of 12 Program Evolution (9:40-9:45) Danny: The last question for our panelists is a bit open- ended but hopefully one the audience will appreciate. When you thinking about taking your information security program to the next level, what is the most important advice you can share with members of our audience today? Preston: language change, speaking the language of the business not the language of IT, you need to be bi- lingual understand what s important to each audience. What will resonant. Joe: you need to be relevant. It s not about information security, it s about supporting the business in an appropriate manner. Arno

12 Page 12 of 12 Wrap Up and Q&A (9:45-10am) Danny: We have some time for Q&A and I d like to make sure everyone has the opportunity to interact with our guests. So, would you please use the microphone, and we ll start the Q&A section at this time. (Questions from the audience) Danny: Thank you to all of you who joined us today, this discussion would not have been possible without you. And, thank you to our distinguished panelists: Joseph Lee Director, IT Risk Management and Security, AARP Preston Jennings Chief Information Security Officer, PricewaterhouseCoopers Arno.VanderWalt VP Information Security Operations at Wyndham Worldwide Can we please have a round of applause for our panelists?

BIG DATA WHAT S THE BIG DEAL?

BIG DATA WHAT S THE BIG DEAL? BIG DATA WHAT S THE BIG DEAL? 1 2 Recently, a senior executive in an ASX top 30 company approached me to ask for some insights for their Chairman who was attending a Big Data conference in the US. BIG

More information

Presentation Phrasebook. Version 1.1

Presentation Phrasebook. Version 1.1 Presentation Phrasebook Version 1.1 Academic English material from English for University. Com Giving a presentation This phrasebook presents useful phrases to help you perform the functions listed below:

More information

ESKISP6055.01 Manage security testing

ESKISP6055.01 Manage security testing Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting

More information

Data Management -Enabling

Data Management -Enabling Data Management -Enabling Open Data and Interoperability DAMA-Ottawa Seminar & Workshop June 15 th, 2011 Welcome On behalf of DAMA-Ottawa, welcome to our second DAMA event focused on Data Management issues

More information

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, 2015 10:00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It

More information

INCREASING THE STRATEGIC VALUE OF PPM THE KEY TO BUSINESS-DRIVEN PPM SUCCESS BUSINESS-DRIVEN WHITE PAPER SERIES

INCREASING THE STRATEGIC VALUE OF PPM THE KEY TO BUSINESS-DRIVEN PPM SUCCESS BUSINESS-DRIVEN WHITE PAPER SERIES INCREASING THE STRATEGIC VALUE OF PPM THE KEY TO BUSINESS-DRIVEN PPM SUCCESS BUSINESS-DRIVEN WHITE PAPER SERIES Introduction Every organization has strategic business objectives but those that successfully

More information

FRAMEWORK. 7 Building Blocks to Success

FRAMEWORK. 7 Building Blocks to Success The CMI Content MarketING FRAMEWORK 7 Building Blocks to Success Your company is probably already exploring the role that compelling content can play in your own marketing programs just as many other companies

More information

So with these formalities out of the way, I d now like to turn the call over to our Co-Founder and CEO, Avishai Abrahami.

So with these formalities out of the way, I d now like to turn the call over to our Co-Founder and CEO, Avishai Abrahami. Wix.com Second Quarter 2014 Earnings Call Transcript August 6, 2014 Joe Pollaro, VP Strategic Partnerships and Investor Relations Good morning. I d like to welcome everyone to today s call to discuss Wix

More information

THE CMI CONTENT MARKETING FRAMEWORK. 7 Building Blocks to Success

THE CMI CONTENT MARKETING FRAMEWORK. 7 Building Blocks to Success THE CMI CONTENT MARKETING FRAMEWORK 7 Building Blocks to Success Your company is probably already exploring the role that compelling content can play in your own marketing programs just as many other companies

More information

A Forrester Consulting Thought Leadership Paper Commissioned By AT&T Collaboration Frontier: An Integrated Experience

A Forrester Consulting Thought Leadership Paper Commissioned By AT&T Collaboration Frontier: An Integrated Experience A Forrester Consulting Thought Leadership Paper Commissioned By AT&T August 2013 Table Of Contents Executive Summary... 2 The Profile Of Respondents Is Across The Board... 3 Investment In Collaboration

More information

DRIVING VALUE IN HEALTHCARE: PERSPECTIVES FROM TWO ACO EXECUTIVES, PART I

DRIVING VALUE IN HEALTHCARE: PERSPECTIVES FROM TWO ACO EXECUTIVES, PART I DRIVING VALUE IN HEALTHCARE: PERSPECTIVES FROM TWO ACO EXECUTIVES, PART I A firm understanding of the key components and drivers of healthcare reform is increasingly important within the pharmaceutical,

More information

THE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS

THE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS THE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS What makes a high-potential? Quite possibly not what you think. The HR Guide to Identifying High-Potentials 1 Chapter 1 - Introduction If you agree people are

More information

Assessing Your Information Technology Organization

Assessing Your Information Technology Organization Assessing Your Information Technology Organization Are you running it like a business? By: James Murray, Partner Trey Robinson, Director Copyright 2009 by ScottMadden, Inc. All rights reserved. Assessing

More information

SUPPLY CHAIN & PROCUREMENT INSIGHTS REPORT CANADA, ARE WE FALLING BEHIND?

SUPPLY CHAIN & PROCUREMENT INSIGHTS REPORT CANADA, ARE WE FALLING BEHIND? GRAND & TOY 2012 SUPPLY CHAIN & PROCUREMENT INSIGHTS REPORT CANADA, ARE WE FALLING BEHIND? Research conducted by TABLE OF CONTENTS Overview... 3 Procurement Tactically Focused but Evolving...4 Communication

More information

Making Sense of Multichannel Marketing

Making Sense of Multichannel Marketing 22 Oct 2012 Vol. 11, No. 9 Published by VirSci Corp. www.pharmamarketingnews.com www.virsci.com Making Sense of Multichannel Marketing Towards Achieving the Holy Grail of Marketing Effectiveness Author:

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

ENTERPRISE RISK MANAGEMENT FRAMEWORK

ENTERPRISE RISK MANAGEMENT FRAMEWORK ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...

More information

ESKISP6056.01 Direct security testing

ESKISP6056.01 Direct security testing Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

IT Services Management

IT Services Management IT Services Management Developing an Effective ITSM Communications Plan White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction

More information

Cybersecurity..Is your PE Firm Ready? October 30, 2014

Cybersecurity..Is your PE Firm Ready? October 30, 2014 Cybersecurity..Is your PE Firm Ready? October 30, 2014 What you will learn. Understanding SEC s interest in cybersecurity Mitigating cyber risk at the PE firm and the portfolio companies Developing a plan

More information

Operational Assessment: An Essential Step in Establishing an Efficient Operational Infrastructure

Operational Assessment: An Essential Step in Establishing an Efficient Operational Infrastructure Operational Assessment: An Essential Step in Establishing an Efficient Operational Infrastructure From rising investor expectations to new regulatory requirements, more and more is being demanded from

More information

How To Plan For Cloud Computing

How To Plan For Cloud Computing Minutes on Modern Finance Best Practice Series Tax Implications of Cloud Computing: What Every CFO Needs to Know Lost in the Cloud The Tax Implications of Cloud Computing If you re like most chief financial

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Seven Steps for Success

Seven Steps for Success Seven Steps for Success The right way to implement a new IT Service Management (ITSM) tool Thoughts from Barclay Rae for Cherwell Software Hurray! We ve selected a new tool. Job done. It s easy to think

More information

Becoming Agile: a getting started guide for Agile management in Marketing and their partners in IT, Sales, Customer Service and other business teams.

Becoming Agile: a getting started guide for Agile management in Marketing and their partners in IT, Sales, Customer Service and other business teams. Becoming Agile: a getting started guide for Agile management in Marketing and their partners in IT, Sales, Customer Service and other business teams. Agile for Business www.agilefluent.com Summary The

More information

Best Practice in Corporate Performance Management at DHL Express: Gain an INSIGHT into Yield and How It Drives Analytics

Best Practice in Corporate Performance Management at DHL Express: Gain an INSIGHT into Yield and How It Drives Analytics Best Practice in Corporate Performance Management at DHL Express: Gain an INSIGHT into Yield and How It Drives Analytics Graeme Aitken, VP Business Controlling, DHL Express Americas THE HISTORY OF DHL

More information

EFFECTIVE CHANGE MANAGEMENT Skills to make change management a culture that delivers project benefits and a return on investment.

EFFECTIVE CHANGE MANAGEMENT Skills to make change management a culture that delivers project benefits and a return on investment. Management Consulting Systems Integration Managed Services WHITE PAPER EFFECTIVE CHANGE MANAGEMENT Skills to make change management a culture that delivers project benefits and a return on investment.

More information

The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content

The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content Before We Begin Choose Audio mode No Handouts Recorded Session Available Ask questions through the Q&A

More information

Adoption, Approaches & Attitudes

Adoption, Approaches & Attitudes Adoption, Approaches & Attitudes The Future of Cloud Computing in the Public and Private Sectors A Global Cloud Computing Study Sponsored by JUNE 2011 TABLE OF CONTENTS Executive Summary... 1 Methodology

More information

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual

More information

ANALYTICS & CHANGE. Keys to Building Buy-In

ANALYTICS & CHANGE. Keys to Building Buy-In ANALYTICS & CHANGE Keys to Building Buy-In Many organizations are poised to take full advantage of analytics to drive mission and business success using analytics not just to understand past events, but

More information

Wilhelmenia Ravenell IT Manager Eli Lilly and Company

Wilhelmenia Ravenell IT Manager Eli Lilly and Company Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience

More information

Becoming Agile: a getting started guide for Agile project management in Marketing, Customer Service, HR and other business teams.

Becoming Agile: a getting started guide for Agile project management in Marketing, Customer Service, HR and other business teams. Becoming Agile: a getting started guide for Agile project management in Marketing, Customer Service, HR and other business teams. Agile for Business www.agilefluent.com Summary The success of Agile project

More information

Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS

Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS 2011 Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...

More information

State of Cloud Survey GLOBAL FINDINGS

State of Cloud Survey GLOBAL FINDINGS 2011 State of Cloud Survey GLOBAL FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation

Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation 2015 State of the Internal Audit Profession Study Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation 68% of companies have gone through or

More information

Information Security Risk Management

Information Security Risk Management Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net

More information

How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency

How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency WHITE PAPER Getting Secure in the Cloud How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency JULY 2011 2 Summary Three out of five study participants trust cloud

More information

LONDON Operation Excellence Dashboard Metrics and Processes

LONDON Operation Excellence Dashboard Metrics and Processes LONDON Operation Excellence Dashboard Metrics and Processes Wednesday, June 25, 2014 08:30 to 09:30 ICANN London, England CAROLE CORNELL: Okay. I m sorry. Let s begin. I m going to play with this as I

More information

PMI s PULSE OF THE PROFESSION IN-DEPTH REPORT THE HIGH COST OF LOW PERFORMANCE: THE ESSENTIAL ROLE OF COMMUNICATIONS ORGANIZATI ONAL AGILITY

PMI s PULSE OF THE PROFESSION IN-DEPTH REPORT THE HIGH COST OF LOW PERFORMANCE: THE ESSENTIAL ROLE OF COMMUNICATIONS ORGANIZATI ONAL AGILITY PMI s PULSE OF THE PROFESSION IN-DEPTH REPORT THE HIGH COST OF LOW PERFORMANCE: THE ESSENTIAL ROLE OF COMMUNICATIONS ORGANIZATI ONAL AGILITY MAY 2013 EXECUTIVE SUMMARY In the context of organizational

More information

"Professional Programs in/and the Liberal Arts University January 25, 2010

Professional Programs in/and the Liberal Arts University January 25, 2010 Moderator: Michael R. Halleran, Provost "Professional Programs in/and the Liberal Arts University January 25, 2010 Panel: Pamela Eddy, Associate Professor of Education Bill Geary, Associate Professor of

More information

Information Technology Governance: Key Success Factors

Information Technology Governance: Key Success Factors Information Technology Governance: Key Success Factors Tim Brooks VP & CIO Saint Louis University AITP September 22, 2011 Tim Brooks - Saint Louis University 1 Discussion Points What is IT Governance?

More information

2011 Virtualization and Evolution to the Cloud Survey

2011 Virtualization and Evolution to the Cloud Survey 2011 Virtualization and Evolution to the Cloud Survey DENMARK RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...

More information

HRizons Human Capital Management

HRizons Human Capital Management HRizons Human Capital Management Metadata Page Title: HRizons_Human_Capital_Management Description: HRizons addresses the human capital management needs of your organization in a coordinated, comprehensive

More information

How To Understand The Reasons For A Cloud-Based Server Farm

How To Understand The Reasons For A Cloud-Based Server Farm 2011 Virtualization and Evolution to the Cloud Survey GLOBAL RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...

More information

Welcome! Our Session Will Begin Shortly.

Welcome! Our Session Will Begin Shortly. Welcome! Our Session Will Begin Shortly. Audio Dial-In Information 1-877-668-4490 Access code: 922 603 498 #ACMP2015 2015 Association For Change Management Professionals. 1 Session Logistics All attendee

More information

Justifying Marketing Automation and Pilot Program

Justifying Marketing Automation and Pilot Program Introduction Marketing automation - is the name given to software platforms designed for marketing departments and organizations to simplify processes by automating repetitive tasks. Marketing departments

More information

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,

More information

How America s Top Retailers Set the Tone with Welcome Emails

How America s Top Retailers Set the Tone with Welcome Emails How America s Top Retailers Set the Tone with Welcome Emails Introduction Sending welcome emails to new subscribers is a universally accepted best practice in email marketing. Ideally, welcome emails get

More information

How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010

How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010 How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010 Thought-Leading Consultants in: Business Analytics Business Performance Management Business Intelligence

More information

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise instead of the preposition. Your partner can guess the

More information

BYOD: No Longer "If" but "How" Justin Martin Regional Product Manager Greg Slade Director Product Management

BYOD: No Longer If but How Justin Martin Regional Product Manager Greg Slade Director Product Management Justin Martin Regional Product Manager Greg Slade Director Product Management Your Presenters Part of the UP&P User Protection and Productivity Group Customer advocates for the Enterprise Mobility Product

More information

Building the Business Case for IT Service Management

Building the Business Case for IT Service Management Recognized by Forrester as an Emerging Leader Building the Business Case for IT Service Management Learning to speak the language of business and help our executives promote our IT initiatives Author:

More information

Build a Better Workplace: Engagement Edition

Build a Better Workplace: Engagement Edition Build a Better Workplace: Employee Engagement Edition Employee engagement, that willingness of each employee to strive to do their best work on a daily basis, has become the leading indicator of performance

More information

ANALYTICS & CHANGE KEYS TO BUILDING BUY-IN

ANALYTICS & CHANGE KEYS TO BUILDING BUY-IN ANALYTICS & CHANGE KEYS TO BUILDING BUY-IN by Ezmeralda Khalil Principal Katherine Wood Susan Michener Many organizations are poised to take full advantage of analytics to drive mission and business success

More information

SYMANTEC CORPORATION 4Q13 and FY13 RESULTS PREPARED REMARKS

SYMANTEC CORPORATION 4Q13 and FY13 RESULTS PREPARED REMARKS Introduction Helyn Corcos, Vice President Investor Relations Good afternoon and thank you for joining our call to discuss our fourth quarter and fiscal year 2013 results. With me today are Steve Bennett,

More information

The Leadership Hand in Safety

The Leadership Hand in Safety The Leadership Hand in Safety. leaders have the ability to make a difference! Who we are 1 of 13 Regional Health Authorities in Saskatchewan Legislated through The Regional Health Authorities Act Governed

More information

Enterprise Architecture: A Governance Framework

Enterprise Architecture: A Governance Framework Enterprise Architecture: A Governance Framework Part I: Embedding Architecture into the Organization Sohel Aziz, Thomas Obitz, Reva Modi and Santonu Sarkar The whitepapers arei related to two sessions

More information

Measuring plant performance - The need for metrics standardization

Measuring plant performance - The need for metrics standardization Baker/SKF Baker/SKF Measuring plant performance - The need for metrics standardization By: Walter Nijsen Asst. Maintenance and Reliability Leader Cargill Grain and Oilseeds Europe Understanding how our

More information

Three Attributes of Every Successful Merchant Services Program-20140604 1602-1

Three Attributes of Every Successful Merchant Services Program-20140604 1602-1 Three Attributes of Every Successful Merchant Services Program-20140604 1602-1 [Start of recorded material] [Starts Mid Sentence] thank everyone that s joined the call today. I know everybody is busy with

More information

InfoTrak Information for Better Decisions

InfoTrak Information for Better Decisions InfoTrak Information for Better Decisions Profitable Customer Relationship Management Builds on Strategy and Technology On average, businesses lose 15 percent to 20 percent of their customer base each

More information

How To Create A Knowledge Enabled Organization

How To Create A Knowledge Enabled Organization Losing Your Minds: Capturing, Retaining and Leveraging Organizational Knowledge bill Kaplan Published by In association with Losing Your Minds: Capturing, Retaining and Leveraging Organizational Knowledge

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

How Merchant Services Can Restore Non-Interest Revenue

How Merchant Services Can Restore Non-Interest Revenue How Merchant Services Can Restore Non-Interest Revenue Mike Halford is the senior VP of merchant sales for Security Card Services. He is primarily responsible for designing, building and managing our referral

More information

Enabling Continuous PCI DSS Compliance. Achieving Consistent PCI Requirement 1 Adherence Using RedSeal

Enabling Continuous PCI DSS Compliance. Achieving Consistent PCI Requirement 1 Adherence Using RedSeal SOLUTION BRIEF Enabling Continuous PCI DSS Compliance Achieving Consistent PCI Requirement 1 Adherence Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom Circle, Suite 800, Santa

More information

A CDO Primer: How to Succeed as a Chief Data Officer

A CDO Primer: How to Succeed as a Chief Data Officer A CDO Primer: How to Succeed as a Chief Data Officer Joseph M. Bugajski Managing Vice President Gartner, Inc. 30 May 2012 The CDO s role is to be the executive guarantor of the enterprise s information

More information

Why the Bank Customer Experience Matters Creating the Ultimate Banking Experience

Why the Bank Customer Experience Matters Creating the Ultimate Banking Experience WHITEPAPER Why the Bank Customer Experience Matters Cheryl Flink, PhD. Senior Vice President, Research 2 Why the bank Customer experience Matters The Great Recession has stunned consumers and made many

More information

How to Justify Your Security Assessment Budget

How to Justify Your Security Assessment Budget 2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice

More information

The 11 Step Plan for CRM Success

The 11 Step Plan for CRM Success The 11 Step Plan for CRM Success There are some statistics for CRM that give it a bad reputation: 70% of CRM initiatives fail to achieve their expected objectives - source Cap Gemini Ernst & Young 90%

More information

How To Manage Data In Real Time

How To Manage Data In Real Time Microsoft IT Data Management Maturity Data to match the business velocity and accelerate the organization s evolution towards Real-Time Enterprise! Luisa Recalcati Enterprise Architect 9/4/2013 Agenda

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

CIO 24/7 Podcast No.6 Cloud Computing

CIO 24/7 Podcast No.6 Cloud Computing CIO 24/7 Podcast No.6 Cloud Computing Welcome to edition six of Accenture s CIO 24/7 podcast. We bring you practical real world insight on IT delivery and strategy straight from the leaders of Accenture

More information

Metrics by design A practical approach to measuring internal audit performance

Metrics by design A practical approach to measuring internal audit performance Metrics by design A practical approach to measuring internal audit performance September 2014 At a glance Expectations of Internal Audit are rising. Regulatory pressure is increasing. Budgets are tightening.

More information

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)

More information

BELL LABS ADVISORY SERVICE FOR SMART GRID NETWORK TRANSFORMATION STRATEGIC PLANNING FOR THE MODERNIZATION OF UTILITY COMMUNICATIONS NETWORKS

BELL LABS ADVISORY SERVICE FOR SMART GRID NETWORK TRANSFORMATION STRATEGIC PLANNING FOR THE MODERNIZATION OF UTILITY COMMUNICATIONS NETWORKS BELL LABS ADVISORY SERVICE FOR SMART GRID NETWORK TRANSFORMATION STRATEGIC PLANNING FOR THE MODERNIZATION OF UTILITY COMMUNICATIONS NETWORKS APPLICATION NOTE SUMMARY Bell Labs Advisory Service for Smart

More information

Leveraging Network and Vulnerability metrics Using RedSeal

Leveraging Network and Vulnerability metrics Using RedSeal SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom

More information

The Why & How of Managed Services

The Why & How of Managed Services SOLUTIONS Cut Costs While Improving Productivity The Why & How of Managed Services What are Managed Services? CIOs all face similar challenges: cost containment, reliability of systems and keeping pace

More information

Forex Trading. What Finally Worked For Me

Forex Trading. What Finally Worked For Me Forex Trading What Finally Worked For Me If you find typographical errors in this book they are here for a purpose. Some people actually enjoy looking for them and we strive to please as many people as

More information

State of Cloud Survey SOUTH AFRICA FINDINGS

State of Cloud Survey SOUTH AFRICA FINDINGS 2011 State of Cloud Survey SOUTH AFRICA FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT

More information

RSA ARCHER AUDIT MANAGEMENT

RSA ARCHER AUDIT MANAGEMENT RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures

More information

Measuring the Success of Your Mobile Strategy

Measuring the Success of Your Mobile Strategy WHITEPAPER / MOBILE ANALYTICS Measuring the Success of Your Mobile Strategy Applying the lessons learned over the past 15 years, digital marketers now use web analytics to measure what matters to their

More information

Ch.4 Communication for user adoption. White paper

Ch.4 Communication for user adoption. White paper Ch.4 Communication for user adoption White paper Usage matters Critical steps for user adoption of HR software Chapter 4: Communication for user adoption In this chapter we consider communication, recognizing

More information

Lead to Money: Aligning Finance with Sales and Marketing Processes

Lead to Money: Aligning Finance with Sales and Marketing Processes #LeadToMoney Sales Management Association Webcast Lead to Money: Aligning Finance with Sales and Marketing Processes 13 February 2014 Presented by Copyright 2014 The Sales Management Association. About

More information

Developing a Strategic Roadmap Why you need it & how to do it right

Developing a Strategic Roadmap Why you need it & how to do it right Developing a Strategic Roadmap Why you need it & how to do it right Session ID# 12509 Juan Porter TopDown Consulting Juan Porter Experience Overview President & Founder of TopDown Consulting Over 25 years

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester

More information

Blending Corporate Governance with. Information Security

Blending Corporate Governance with. Information Security Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power

More information

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing

More information

DOD Medical Device Cybersecurity Considerations

DOD Medical Device Cybersecurity Considerations Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,

More information

How to Safely Migrate your ERP to the Cloud in Three Steps

How to Safely Migrate your ERP to the Cloud in Three Steps How to Safely Migrate your ERP to the Cloud in Three Steps Introduction Enterprise Resource Planning (ERP) has served as the central nervous system of large organisations for the past two decades. The

More information

State of Medical Device Development. 2014 State of Medical Device Development seapine.com 1

State of Medical Device Development. 2014 State of Medical Device Development seapine.com 1 State of Medical Device Development 2014 2014 State of Medical Device Development seapine.com 1 Executive Summary The demand for smarter, safer, more connected medical devices has introduced new complexities

More information

Preempting ERP Project Failure Project Assurance through Collaborative Intervention

Preempting ERP Project Failure Project Assurance through Collaborative Intervention Preempting ERP Project Failure Project Assurance through Collaborative Intervention The Prinzo Group, December 2010 Overview Preempting enterprise resource planning (ERP) project failure could well become

More information

Halo. NZ s leading business conferences. Business Intelligence. From

Halo. NZ s leading business conferences. Business Intelligence. From From Supporting Organisations Silver Sponsors Halo Business Intelligence NZ s leading business conferences DAY 1 19th February 8.30 Registration and coffee 9.00 Opening remarks from the Chair David Bloch,

More information

Highlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event:

Highlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event: Highlights from the Security Awareness Special Interest Group () New Year 2014 event: Cyber security adopting a new approach to answer the Board s concerns Hosted by EY: 14th January 2014 The Security

More information

From Evolution to Revolution: The Founders and the Headliners of Information Security

From Evolution to Revolution: The Founders and the Headliners of Information Security From Evolution to Revolution: The Founders and the Headliners of Information Security Georgia Tech Information Security Center Panel session, 22 nd National Information Systems Security Conference Fall,

More information

THE WHY & HOW OF MANAGED SERVICES

THE WHY & HOW OF MANAGED SERVICES SOLUTIONS CUT COSTS WHILE IMPROVING PRODUCTIVITY THE WHY & HOW OF MANAGED SERVICES WHAT ARE MANAGED SERVICES? CIOs all face similar challenges: cost containment, reliability of systems and keeping pace

More information

The Essentials of a Documented Content Marketing Strategy: 36 QUESTIONS TO ANSWER

The Essentials of a Documented Content Marketing Strategy: 36 QUESTIONS TO ANSWER The Essentials of a Documented Content Marketing Strategy: 36 QUESTIONS TO ANSWER 1 Why does a documented content marketing strategy matter? The majority of content marketers don t have a documented content

More information

GUIDEBOOK MAXIMIZING SUCCESS DELIVERING MICROSOFT DYNAMICS

GUIDEBOOK MAXIMIZING SUCCESS DELIVERING MICROSOFT DYNAMICS GUIDEBOOK MAXIMIZING SUCCESS DELIVERING MICROSOFT DYNAMICS Corporate Headquarters Nucleus Research Inc. 100 State Street Boston, MA 02109 Phone: +1 617.720.2000 Nucleus Research Inc. TOPICS Enterprise

More information