IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives
|
|
- Julie Andrews
- 8 years ago
- Views:
Transcription
1 Page 1 of 12 IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives Panel Date: Thursday, April 18, 2013 Panel Time: 9-10am PST (60 minutes total, 15 minutes Q&A) Room: 112 Abstract: The Information Security Program Maturity Curve can provide an objective framework for defining, measuring and improving an organization s information security program. Listen to a panel of Symantec Managed Security Services (MSS) customers, each representing different stages of information security program development, discuss how they approached challenges inherent to each stage, as well as share key lessons learned. In addition, fifteen minutes will be provided for questions and answers. Panelists: Joseph Lee Director, IT Risk Management and Security, AARP Preston Jennings Chief Information Security Officer, PricewaterhouseCoopers Arno VanderWalt VP Information Security Operations at Wyndham Worldwide Moderator: Danny Dawes, Director, Managed Security Services Service Delivery
2 Page 2 of 12 Introduction (9:00 9:05) Danny: Thank you all for joining us for today s panel discussion on Approaching the Information Security Program Maturity Model: 3 Practitioners Perspectives. My name is Danny Dawes and I am the Director of Symantec s Managed Security Services, Service Delivery group. Let s start by level setting the concept of using a maturity curve to assess Information Security Program development. Several models exist in the industry; for example Gartner s Security Program Maturity Timeline and Forrester's Information Security Maturity Model Assessment Framework. When we talk with customers about their security programs, we find they align into three basic segments based on their awareness of their threat profile, risk adversity and overall security program maturity. Therefore, to simplify today s discussion, we ll refer to these three groups as: Adhoc Companies who are just starting to develop their Information Security Programs but no formalized security activities exist Best efforts security programs Companies who are doing their best to secure the Enterprise and hoping to mitigate most threats before they impact the business. Mature, proactive programs Companies whose goals, practices and performance metrics are fully defined.
3 Page 3 of 12 Introduction (con t) Interestingly, when we contacted customers regarding participating in this panel, most felt they fell in the middle category which makes sense. Because they are MSS customers, they have moved past the Adhoc stage, but few were hesitant to label their program as being proactive and mature. Perhaps they were afraid their CFO s were in the audience and they would lose funding if they implied their program development was complete. Therefore, we re asking our panel participants to comment on the various maturity segments based on past experience and observations of the industry. With that, I d like to ask our panelists to each take a minute or so to briefly introduce themselves: Introduction (9:05 9:10) [Brief introduction from all panelists please limit this to 90 seconds Name, title, year with company Background how did you get where you are today? Brief description of the network you manage What is your biggest concern/challenge regarding your environment, for example: o PwC employees spend considerable time on other companies networks? o AARP comprised of many different businesses (insurance, etc)? o Wyndham properties are very geographically dispersed?
4 Page 4 of 12 Please note: For each of the questions below, the panelist in the first position will take the lead for answering the question and therefore get the majority of the time. The second two panelists are welcome (and encouraged!) to contribute but need to keep it brief so we can ensure time for Q&A.
5 Page 5 of 12 The Usefulness of the Maturity Curve as an Evaluation Tool (9:10-9:15) Danny: What are your thoughts on this Maturity Curve? Is it a good summary of how different organizations might approach their information security program? Joe: understanding why security is important for your business and explaining to management why not everyone needs to be a 5 Versus highly risk adverse business that must be a 5 Preston: Arno:
6 Page 6 of 12 Assessing Your Program (9:15-9:20) Danny: A critical first step for any security professional walking into a new role is assessing where the new organization resides on this curve and where the gaps may lie. Thinking back to your most recent transition, what techniques did you use to make this assessment? Preston: team strengths, understanding what a mature program looks like, what the strengths are where the gaps are, figure out where you re going to make investments. Acknowledging that you just can t do it all. Joe: built AARP from non- existent program Arno:
7 Page 7 of 12 Top Challenges Faced While Evolving Security Programs (9:20-9:25) Danny: Once you ve come in and made the initial assessment, the next step becomes taking the program to the next level. What were the top one or two challenge you faced in trying to evolve your information security program and how did you address those challenges in your environment?. Preston: reporting structure, ability to influence change, reports to CIO, now reports in to board of senior business leaders, decisions that would have been made by IT, now being driven by the business. Cyber warfare, business impact. Takes discuss around impact to business if we don t anything used to be a line item discussion. Joe Arno
8 Page 8 of 12 Transforming less mature programs (9:25-9:30) Danny: Have you ever worked for an organization that had a less mature security program? What kinds of challenges did you face trying to move them forward? Does anyone have anything to share here? If not, I m going to cut. Joe: Preston: Arno:
9 Page 9 of 12 Is it realistic to reach for a 5? (9:30-9:35) Danny: Do you think it s realistic for most organizations to strive to reach the upper level of the maturity curve? What challenges will they face in doing so? Joe: Preston: Arno:
10 Page 10 of 12 Demonstrating Program Performance (9:35-9:40) Danny: After protecting the enterprise, the ability to demonstrate program performance in order to justify funding is Holy Grail for most information security professionals. What techniques have you found most effective for proving the value and efficacy of your security program? Joe: Preston: Arno
11 Page 11 of 12 Program Evolution (9:40-9:45) Danny: The last question for our panelists is a bit open- ended but hopefully one the audience will appreciate. When you thinking about taking your information security program to the next level, what is the most important advice you can share with members of our audience today? Preston: language change, speaking the language of the business not the language of IT, you need to be bi- lingual understand what s important to each audience. What will resonant. Joe: you need to be relevant. It s not about information security, it s about supporting the business in an appropriate manner. Arno
12 Page 12 of 12 Wrap Up and Q&A (9:45-10am) Danny: We have some time for Q&A and I d like to make sure everyone has the opportunity to interact with our guests. So, would you please use the microphone, and we ll start the Q&A section at this time. (Questions from the audience) Danny: Thank you to all of you who joined us today, this discussion would not have been possible without you. And, thank you to our distinguished panelists: Joseph Lee Director, IT Risk Management and Security, AARP Preston Jennings Chief Information Security Officer, PricewaterhouseCoopers Arno.VanderWalt VP Information Security Operations at Wyndham Worldwide Can we please have a round of applause for our panelists?
BIG DATA WHAT S THE BIG DEAL?
BIG DATA WHAT S THE BIG DEAL? 1 2 Recently, a senior executive in an ASX top 30 company approached me to ask for some insights for their Chairman who was attending a Big Data conference in the US. BIG
More informationPresentation Phrasebook. Version 1.1
Presentation Phrasebook Version 1.1 Academic English material from English for University. Com Giving a presentation This phrasebook presents useful phrases to help you perform the functions listed below:
More informationESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
More informationData Management -Enabling
Data Management -Enabling Open Data and Interoperability DAMA-Ottawa Seminar & Workshop June 15 th, 2011 Welcome On behalf of DAMA-Ottawa, welcome to our second DAMA event focused on Data Management issues
More informationRemarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, 2015 10:00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It
More informationINCREASING THE STRATEGIC VALUE OF PPM THE KEY TO BUSINESS-DRIVEN PPM SUCCESS BUSINESS-DRIVEN WHITE PAPER SERIES
INCREASING THE STRATEGIC VALUE OF PPM THE KEY TO BUSINESS-DRIVEN PPM SUCCESS BUSINESS-DRIVEN WHITE PAPER SERIES Introduction Every organization has strategic business objectives but those that successfully
More informationFRAMEWORK. 7 Building Blocks to Success
The CMI Content MarketING FRAMEWORK 7 Building Blocks to Success Your company is probably already exploring the role that compelling content can play in your own marketing programs just as many other companies
More informationSo with these formalities out of the way, I d now like to turn the call over to our Co-Founder and CEO, Avishai Abrahami.
Wix.com Second Quarter 2014 Earnings Call Transcript August 6, 2014 Joe Pollaro, VP Strategic Partnerships and Investor Relations Good morning. I d like to welcome everyone to today s call to discuss Wix
More informationTHE CMI CONTENT MARKETING FRAMEWORK. 7 Building Blocks to Success
THE CMI CONTENT MARKETING FRAMEWORK 7 Building Blocks to Success Your company is probably already exploring the role that compelling content can play in your own marketing programs just as many other companies
More informationA Forrester Consulting Thought Leadership Paper Commissioned By AT&T Collaboration Frontier: An Integrated Experience
A Forrester Consulting Thought Leadership Paper Commissioned By AT&T August 2013 Table Of Contents Executive Summary... 2 The Profile Of Respondents Is Across The Board... 3 Investment In Collaboration
More informationDRIVING VALUE IN HEALTHCARE: PERSPECTIVES FROM TWO ACO EXECUTIVES, PART I
DRIVING VALUE IN HEALTHCARE: PERSPECTIVES FROM TWO ACO EXECUTIVES, PART I A firm understanding of the key components and drivers of healthcare reform is increasingly important within the pharmaceutical,
More informationTHE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS
THE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS What makes a high-potential? Quite possibly not what you think. The HR Guide to Identifying High-Potentials 1 Chapter 1 - Introduction If you agree people are
More informationAssessing Your Information Technology Organization
Assessing Your Information Technology Organization Are you running it like a business? By: James Murray, Partner Trey Robinson, Director Copyright 2009 by ScottMadden, Inc. All rights reserved. Assessing
More informationSUPPLY CHAIN & PROCUREMENT INSIGHTS REPORT CANADA, ARE WE FALLING BEHIND?
GRAND & TOY 2012 SUPPLY CHAIN & PROCUREMENT INSIGHTS REPORT CANADA, ARE WE FALLING BEHIND? Research conducted by TABLE OF CONTENTS Overview... 3 Procurement Tactically Focused but Evolving...4 Communication
More informationMaking Sense of Multichannel Marketing
22 Oct 2012 Vol. 11, No. 9 Published by VirSci Corp. www.pharmamarketingnews.com www.virsci.com Making Sense of Multichannel Marketing Towards Achieving the Holy Grail of Marketing Effectiveness Author:
More informationIT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
More informationENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
More informationESKISP6056.01 Direct security testing
Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being
More informationFFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
More informationIT Services Management
IT Services Management Developing an Effective ITSM Communications Plan White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction
More informationCybersecurity..Is your PE Firm Ready? October 30, 2014
Cybersecurity..Is your PE Firm Ready? October 30, 2014 What you will learn. Understanding SEC s interest in cybersecurity Mitigating cyber risk at the PE firm and the portfolio companies Developing a plan
More informationOperational Assessment: An Essential Step in Establishing an Efficient Operational Infrastructure
Operational Assessment: An Essential Step in Establishing an Efficient Operational Infrastructure From rising investor expectations to new regulatory requirements, more and more is being demanded from
More informationHow To Plan For Cloud Computing
Minutes on Modern Finance Best Practice Series Tax Implications of Cloud Computing: What Every CFO Needs to Know Lost in the Cloud The Tax Implications of Cloud Computing If you re like most chief financial
More informationCyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
More informationSeven Steps for Success
Seven Steps for Success The right way to implement a new IT Service Management (ITSM) tool Thoughts from Barclay Rae for Cherwell Software Hurray! We ve selected a new tool. Job done. It s easy to think
More informationBecoming Agile: a getting started guide for Agile management in Marketing and their partners in IT, Sales, Customer Service and other business teams.
Becoming Agile: a getting started guide for Agile management in Marketing and their partners in IT, Sales, Customer Service and other business teams. Agile for Business www.agilefluent.com Summary The
More informationBest Practice in Corporate Performance Management at DHL Express: Gain an INSIGHT into Yield and How It Drives Analytics
Best Practice in Corporate Performance Management at DHL Express: Gain an INSIGHT into Yield and How It Drives Analytics Graeme Aitken, VP Business Controlling, DHL Express Americas THE HISTORY OF DHL
More informationEFFECTIVE CHANGE MANAGEMENT Skills to make change management a culture that delivers project benefits and a return on investment.
Management Consulting Systems Integration Managed Services WHITE PAPER EFFECTIVE CHANGE MANAGEMENT Skills to make change management a culture that delivers project benefits and a return on investment.
More informationThe Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content
The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content Before We Begin Choose Audio mode No Handouts Recorded Session Available Ask questions through the Q&A
More informationAdoption, Approaches & Attitudes
Adoption, Approaches & Attitudes The Future of Cloud Computing in the Public and Private Sectors A Global Cloud Computing Study Sponsored by JUNE 2011 TABLE OF CONTENTS Executive Summary... 1 Methodology
More informationData Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center
P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual
More informationANALYTICS & CHANGE. Keys to Building Buy-In
ANALYTICS & CHANGE Keys to Building Buy-In Many organizations are poised to take full advantage of analytics to drive mission and business success using analytics not just to understand past events, but
More informationWilhelmenia Ravenell IT Manager Eli Lilly and Company
Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience
More informationBecoming Agile: a getting started guide for Agile project management in Marketing, Customer Service, HR and other business teams.
Becoming Agile: a getting started guide for Agile project management in Marketing, Customer Service, HR and other business teams. Agile for Business www.agilefluent.com Summary The success of Agile project
More informationVirtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS
2011 Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...
More informationState of Cloud Survey GLOBAL FINDINGS
2011 State of Cloud Survey GLOBAL FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff
More informationInternal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation
2015 State of the Internal Audit Profession Study Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation 68% of companies have gone through or
More informationInformation Security Risk Management
Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net
More informationHow to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency
WHITE PAPER Getting Secure in the Cloud How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency JULY 2011 2 Summary Three out of five study participants trust cloud
More informationLONDON Operation Excellence Dashboard Metrics and Processes
LONDON Operation Excellence Dashboard Metrics and Processes Wednesday, June 25, 2014 08:30 to 09:30 ICANN London, England CAROLE CORNELL: Okay. I m sorry. Let s begin. I m going to play with this as I
More informationPMI s PULSE OF THE PROFESSION IN-DEPTH REPORT THE HIGH COST OF LOW PERFORMANCE: THE ESSENTIAL ROLE OF COMMUNICATIONS ORGANIZATI ONAL AGILITY
PMI s PULSE OF THE PROFESSION IN-DEPTH REPORT THE HIGH COST OF LOW PERFORMANCE: THE ESSENTIAL ROLE OF COMMUNICATIONS ORGANIZATI ONAL AGILITY MAY 2013 EXECUTIVE SUMMARY In the context of organizational
More information"Professional Programs in/and the Liberal Arts University January 25, 2010
Moderator: Michael R. Halleran, Provost "Professional Programs in/and the Liberal Arts University January 25, 2010 Panel: Pamela Eddy, Associate Professor of Education Bill Geary, Associate Professor of
More informationInformation Technology Governance: Key Success Factors
Information Technology Governance: Key Success Factors Tim Brooks VP & CIO Saint Louis University AITP September 22, 2011 Tim Brooks - Saint Louis University 1 Discussion Points What is IT Governance?
More information2011 Virtualization and Evolution to the Cloud Survey
2011 Virtualization and Evolution to the Cloud Survey DENMARK RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...
More informationHRizons Human Capital Management
HRizons Human Capital Management Metadata Page Title: HRizons_Human_Capital_Management Description: HRizons addresses the human capital management needs of your organization in a coordinated, comprehensive
More informationHow To Understand The Reasons For A Cloud-Based Server Farm
2011 Virtualization and Evolution to the Cloud Survey GLOBAL RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...
More informationWelcome! Our Session Will Begin Shortly.
Welcome! Our Session Will Begin Shortly. Audio Dial-In Information 1-877-668-4490 Access code: 922 603 498 #ACMP2015 2015 Association For Change Management Professionals. 1 Session Logistics All attendee
More informationJustifying Marketing Automation and Pilot Program
Introduction Marketing automation - is the name given to software platforms designed for marketing departments and organizations to simplify processes by automating repetitive tasks. Marketing departments
More informationThreat Intelligence and Its Role Within Enterprise Cybersecurity Practices
Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,
More informationHow America s Top Retailers Set the Tone with Welcome Emails
How America s Top Retailers Set the Tone with Welcome Emails Introduction Sending welcome emails to new subscribers is a universally accepted best practice in email marketing. Ideally, welcome emails get
More informationHow Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010
How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010 Thought-Leading Consultants in: Business Analytics Business Performance Management Business Intelligence
More informationPresentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise
Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise instead of the preposition. Your partner can guess the
More informationBYOD: No Longer "If" but "How" Justin Martin Regional Product Manager Greg Slade Director Product Management
Justin Martin Regional Product Manager Greg Slade Director Product Management Your Presenters Part of the UP&P User Protection and Productivity Group Customer advocates for the Enterprise Mobility Product
More informationBuilding the Business Case for IT Service Management
Recognized by Forrester as an Emerging Leader Building the Business Case for IT Service Management Learning to speak the language of business and help our executives promote our IT initiatives Author:
More informationBuild a Better Workplace: Engagement Edition
Build a Better Workplace: Employee Engagement Edition Employee engagement, that willingness of each employee to strive to do their best work on a daily basis, has become the leading indicator of performance
More informationANALYTICS & CHANGE KEYS TO BUILDING BUY-IN
ANALYTICS & CHANGE KEYS TO BUILDING BUY-IN by Ezmeralda Khalil Principal Katherine Wood Susan Michener Many organizations are poised to take full advantage of analytics to drive mission and business success
More informationSYMANTEC CORPORATION 4Q13 and FY13 RESULTS PREPARED REMARKS
Introduction Helyn Corcos, Vice President Investor Relations Good afternoon and thank you for joining our call to discuss our fourth quarter and fiscal year 2013 results. With me today are Steve Bennett,
More informationThe Leadership Hand in Safety
The Leadership Hand in Safety. leaders have the ability to make a difference! Who we are 1 of 13 Regional Health Authorities in Saskatchewan Legislated through The Regional Health Authorities Act Governed
More informationEnterprise Architecture: A Governance Framework
Enterprise Architecture: A Governance Framework Part I: Embedding Architecture into the Organization Sohel Aziz, Thomas Obitz, Reva Modi and Santonu Sarkar The whitepapers arei related to two sessions
More informationMeasuring plant performance - The need for metrics standardization
Baker/SKF Baker/SKF Measuring plant performance - The need for metrics standardization By: Walter Nijsen Asst. Maintenance and Reliability Leader Cargill Grain and Oilseeds Europe Understanding how our
More informationThree Attributes of Every Successful Merchant Services Program-20140604 1602-1
Three Attributes of Every Successful Merchant Services Program-20140604 1602-1 [Start of recorded material] [Starts Mid Sentence] thank everyone that s joined the call today. I know everybody is busy with
More informationInfoTrak Information for Better Decisions
InfoTrak Information for Better Decisions Profitable Customer Relationship Management Builds on Strategy and Technology On average, businesses lose 15 percent to 20 percent of their customer base each
More informationHow To Create A Knowledge Enabled Organization
Losing Your Minds: Capturing, Retaining and Leveraging Organizational Knowledge bill Kaplan Published by In association with Losing Your Minds: Capturing, Retaining and Leveraging Organizational Knowledge
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationHow Merchant Services Can Restore Non-Interest Revenue
How Merchant Services Can Restore Non-Interest Revenue Mike Halford is the senior VP of merchant sales for Security Card Services. He is primarily responsible for designing, building and managing our referral
More informationEnabling Continuous PCI DSS Compliance. Achieving Consistent PCI Requirement 1 Adherence Using RedSeal
SOLUTION BRIEF Enabling Continuous PCI DSS Compliance Achieving Consistent PCI Requirement 1 Adherence Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom Circle, Suite 800, Santa
More informationA CDO Primer: How to Succeed as a Chief Data Officer
A CDO Primer: How to Succeed as a Chief Data Officer Joseph M. Bugajski Managing Vice President Gartner, Inc. 30 May 2012 The CDO s role is to be the executive guarantor of the enterprise s information
More informationWhy the Bank Customer Experience Matters Creating the Ultimate Banking Experience
WHITEPAPER Why the Bank Customer Experience Matters Cheryl Flink, PhD. Senior Vice President, Research 2 Why the bank Customer experience Matters The Great Recession has stunned consumers and made many
More informationHow to Justify Your Security Assessment Budget
2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice
More informationThe 11 Step Plan for CRM Success
The 11 Step Plan for CRM Success There are some statistics for CRM that give it a bad reputation: 70% of CRM initiatives fail to achieve their expected objectives - source Cap Gemini Ernst & Young 90%
More informationHow To Manage Data In Real Time
Microsoft IT Data Management Maturity Data to match the business velocity and accelerate the organization s evolution towards Real-Time Enterprise! Luisa Recalcati Enterprise Architect 9/4/2013 Agenda
More informationESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationCIO 24/7 Podcast No.6 Cloud Computing
CIO 24/7 Podcast No.6 Cloud Computing Welcome to edition six of Accenture s CIO 24/7 podcast. We bring you practical real world insight on IT delivery and strategy straight from the leaders of Accenture
More informationMetrics by design A practical approach to measuring internal audit performance
Metrics by design A practical approach to measuring internal audit performance September 2014 At a glance Expectations of Internal Audit are rising. Regulatory pressure is increasing. Budgets are tightening.
More informationOPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
More informationBELL LABS ADVISORY SERVICE FOR SMART GRID NETWORK TRANSFORMATION STRATEGIC PLANNING FOR THE MODERNIZATION OF UTILITY COMMUNICATIONS NETWORKS
BELL LABS ADVISORY SERVICE FOR SMART GRID NETWORK TRANSFORMATION STRATEGIC PLANNING FOR THE MODERNIZATION OF UTILITY COMMUNICATIONS NETWORKS APPLICATION NOTE SUMMARY Bell Labs Advisory Service for Smart
More informationLeveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
More informationThe Why & How of Managed Services
SOLUTIONS Cut Costs While Improving Productivity The Why & How of Managed Services What are Managed Services? CIOs all face similar challenges: cost containment, reliability of systems and keeping pace
More informationForex Trading. What Finally Worked For Me
Forex Trading What Finally Worked For Me If you find typographical errors in this book they are here for a purpose. Some people actually enjoy looking for them and we strive to please as many people as
More informationState of Cloud Survey SOUTH AFRICA FINDINGS
2011 State of Cloud Survey SOUTH AFRICA FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT
More informationRSA ARCHER AUDIT MANAGEMENT
RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures
More informationMeasuring the Success of Your Mobile Strategy
WHITEPAPER / MOBILE ANALYTICS Measuring the Success of Your Mobile Strategy Applying the lessons learned over the past 15 years, digital marketers now use web analytics to measure what matters to their
More informationCh.4 Communication for user adoption. White paper
Ch.4 Communication for user adoption White paper Usage matters Critical steps for user adoption of HR software Chapter 4: Communication for user adoption In this chapter we consider communication, recognizing
More informationLead to Money: Aligning Finance with Sales and Marketing Processes
#LeadToMoney Sales Management Association Webcast Lead to Money: Aligning Finance with Sales and Marketing Processes 13 February 2014 Presented by Copyright 2014 The Sales Management Association. About
More informationDeveloping a Strategic Roadmap Why you need it & how to do it right
Developing a Strategic Roadmap Why you need it & how to do it right Session ID# 12509 Juan Porter TopDown Consulting Juan Porter Experience Overview President & Founder of TopDown Consulting Over 25 years
More information2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
More informationBlending Corporate Governance with. Information Security
Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power
More informationHow to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
More informationDOD Medical Device Cybersecurity Considerations
Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,
More informationHow to Safely Migrate your ERP to the Cloud in Three Steps
How to Safely Migrate your ERP to the Cloud in Three Steps Introduction Enterprise Resource Planning (ERP) has served as the central nervous system of large organisations for the past two decades. The
More informationState of Medical Device Development. 2014 State of Medical Device Development seapine.com 1
State of Medical Device Development 2014 2014 State of Medical Device Development seapine.com 1 Executive Summary The demand for smarter, safer, more connected medical devices has introduced new complexities
More informationPreempting ERP Project Failure Project Assurance through Collaborative Intervention
Preempting ERP Project Failure Project Assurance through Collaborative Intervention The Prinzo Group, December 2010 Overview Preempting enterprise resource planning (ERP) project failure could well become
More informationHalo. NZ s leading business conferences. Business Intelligence. From
From Supporting Organisations Silver Sponsors Halo Business Intelligence NZ s leading business conferences DAY 1 19th February 8.30 Registration and coffee 9.00 Opening remarks from the Chair David Bloch,
More informationHighlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event:
Highlights from the Security Awareness Special Interest Group () New Year 2014 event: Cyber security adopting a new approach to answer the Board s concerns Hosted by EY: 14th January 2014 The Security
More informationFrom Evolution to Revolution: The Founders and the Headliners of Information Security
From Evolution to Revolution: The Founders and the Headliners of Information Security Georgia Tech Information Security Center Panel session, 22 nd National Information Systems Security Conference Fall,
More informationTHE WHY & HOW OF MANAGED SERVICES
SOLUTIONS CUT COSTS WHILE IMPROVING PRODUCTIVITY THE WHY & HOW OF MANAGED SERVICES WHAT ARE MANAGED SERVICES? CIOs all face similar challenges: cost containment, reliability of systems and keeping pace
More informationThe Essentials of a Documented Content Marketing Strategy: 36 QUESTIONS TO ANSWER
The Essentials of a Documented Content Marketing Strategy: 36 QUESTIONS TO ANSWER 1 Why does a documented content marketing strategy matter? The majority of content marketers don t have a documented content
More informationGUIDEBOOK MAXIMIZING SUCCESS DELIVERING MICROSOFT DYNAMICS
GUIDEBOOK MAXIMIZING SUCCESS DELIVERING MICROSOFT DYNAMICS Corporate Headquarters Nucleus Research Inc. 100 State Street Boston, MA 02109 Phone: +1 617.720.2000 Nucleus Research Inc. TOPICS Enterprise
More information