Dr. Alain Jacot-Descombes, CIO / UNIGE
|
|
|
- Barnard Miles
- 9 years ago
- Views:
Transcription
1 Qui est responsable de l'information (numérique) au sein de l'entreprise? Retour d'expérience de l'unige dans la gouvernance de son système d'information Who is responsible for the (digital) information within the company? Practical experiences from the UNIGE in the governance of its information system Dr. Alain Jacot-Descombes, CIO / UNIGE SWITCH Executive Focus, 19th March 2015, Bern 1
2 Agenda Ø Data / Information Ø Digital Enterprise Ø Information UNIGE Ø Cyber Risks Ø Conclusion 2
3 Data / Information : from Prehistory to Digital Era «People or computers can find patterns in data to perceive information, and information can be used to enhance knowledge» 3
4 The Physical Nature of Information 1370 AC 1200 BC BC 1454 AC 2400 BC 196 BC «Lascaux painpng» par Prof saxx Travail personnel. Sous licence CC BY- SA 3.0 via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:lascaux_painpng.jpg#mediaviewer/file:lascaux_painpng.jpg «Ritmal- Cuneiform tablet - Kirkor Minassian collecpon - Library of Congress». Sous licence Domaine public via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:ritmal- Cuneiform_tablet_- _Kirkor_Minassian_collecPon_- _Library_of_Congress.jpg#mediaviewer/File:Ritmal- Cuneiform_tablet_- _Kirkor_Minassian_collecPon_- _Library_of_Congress.jpg h'p://commons.wikimedia.org/wiki/file%3abookdead.jpg [Public domain], via Wikimedia Commons from Wikimedia Commons «Rose'a Stone» par Hans Hillewaert. Sous licence CC BY- SA 4.0 via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:rose'a_stone.jpg#mediaviewer/file:rose'a_stone.jpg Cologny, FondaPon MarPn Bodmer, Cod. Bodmer 78, f. 1r Guido de Columnis, Historia destrucponis Troiae (h'p:// codices.unifr.ch/en/list/one/fmb/cb- 0078) «Gutenberg Bible» par Raul654. Sous licence CC BY- SA 3.0 via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:gutenberg_bible.jpg#mediaviewer/file:gutenberg_bible.jpg AJD / Who is responsible for the (digital) information within the company? 4
5 The Physical Nature of Information UK Newcastle University Library??? Data format? Data locapon? Data owners? Archived Data? AJD / Who is responsible for the (digital) information within the company? 5
6 Data / Information in the Digital World Data o facts and statistics collected together for reference or analysis Big Data Information o facts provided or learned about something or someone o data as processed, stored, or transmitted by a computer. Fast Data Smart Data 6
7 Information / Data Assets of the Universities Research Data Teaching & Learning Data Administrative Data some of them with regulatory requirements : o Personnal data o Financial data o Reference / master data o Research data linked to patent, publication o Medical data o Historical data o etc. 7
8 Digital Enterprise : How to master the Information System and to leverage Information Technology for the Business? 8
9 The Information System of an Enterprise Governance An information system is a system composed of people and computers that processes or interprets information (wikipedia) Management & Opera.ons People Informa(on Processes Tools 9
10 Optimized the Enterprise through Digitalization Services Business Model IT Business Process InformaPon Delivery Value Joint Business & IT Initiatives : to transform the business model to create new, value-added services to simplify and to optimize the business processes to manage information to save costs NB: IT costs is ~4% of Enterprise costs à the 96% costs should be challenged through digitalization 10
11 Information System Framework and Responsibilities Enterprise Strategy Enterprise Architecture the business processes are based on (computerized) informa(on and func(ons, implemented by databases and applica(ons that are supported by technical infrastructures Demand Risks Risks Service CxO CyO CzO CTO CIO CISO Processes & Informa.on (func?onal domains) Informa.on System (IS) Informa.on Technologies (IT) IS Risks & Security 11
12 Information UNIGE 12
13 The Functional Domains of the UNIGE IS The UNIGE Information System (IS) has been divided into 9 functional domains. TEACHING FINANCE STUDENT LIFE GENERAL MANAGEMENT HUMAN RESOURCES RESEARCH LIBRARY LOGISTICS INFORMATION SYSTEM For each funcponal domain, the IS project & service porfolio is coordinated by a Commi'ee, that is composed of : CxO / business director (president) a CIO deputy a PMO member some key stakeholders 13
14 IS UNIGE Informa.on System (IS) Framework COCSIM COCSIM COCSIM COCSIM COPIL COPIL COPIL CIO According to strategies, / ISG Office priori?zing and funding the IS ins?tu?onal porbolio RECTORATE Business Processes Informa(on & Func(ons Databases & Applica(ons Technical Infrastructures M IN IN O R E V O LU LU T II O N S M AJ O R E V O L U T I O N S CxO CTO Business Architecture InformaPon Architecture ApplicaPon Architecture Infrastructure Architecture CAT Enterprise Architecture PMO ISG Office : IS Governance Office (IS ins?tu?onal porbolio) COCSIM : Porrolio Steering Commi'ee (IS func?onnal porbolio) COPIL : Project Steering Commi'ee PMO : Project Management Office (PPM) AJD / Who CAT is : IS responsible Architecture for Commission the (digital) information within the company? 14
15 IS UNIGE IS Project Manager Business Processes Informa?on & Func?ons Databases & Applica?ons Technical Infrastructures M AJ O R E V O L U T I O N IS Project Folder PMO Project description Project evaluation (radar) Financial Resources Project Organisation Solution description CAT analysis & statement CAT The CAT is screening / valida?ng many aspects of the project and the solu?on, both on business and IT sides data owners? data sensi(vity? data life cycle? access rights? archived data? legal issues? risks? SLA? hos(ng? architectures? Cloud services? 15
16 Information Security Management UNIGE The ISMS is part of the IS Governance framework and contributes to the Internal Control System (ISC) Business Processes Informa?on & Func?ons Databases & Applica?ons Technical Infrastructures Risks Risks CISO IS Risks & Security Securing (digital) information and services Based on the ISO standard / best practices Risk management process Plan-Do-Check-Act cycle (continuous improvement) Involving management and users 16
17 Cyber Risks 17
18 National strategy for Switzerland s protection against cyber risks (NCS, adopted by the Federal Council on June 27, 2012 ) cyber a'acks are carried out on computers, networks and data cyber a'acks are becoming more professional and dangerous state authoripes and administrapons at all levels (ConfederaPon, cantons, communes) can also be vicpms of cyber a'acks. They can be affected in their legislapve, execupve or judiciary funcpons, but also as operators and users of cripcal infrastructure or research insptupons efforts to ensure protecpon can collide with other equally legipmate interests First and foremost, the individual players are themselves responsible for maintaining and oppmising protecpve measures for minimising cyber risks 18
19 The Cloud strategy complements Switzerland s egovernment strategy regarding the use of cloud computing : o o o Cloud strategy (approved on ) «Cloud first» strategy for IS solutions (as in USA, EU) The cloud strategy addresses the identified risks and thereby supports risk-aware and responsible use of cloud computing services The cloud user assumes the responsibility for the use of cloud services and outsourcing of data in the cloud 19
20 The Research Community needs secured Cloud services (infrastructure & support) for High Performance Computing Data Management InsPtuPonal Clouds SWISS ACADEMIC CLOUD AJD / Who is responsible for the (digital) information within the company? 20 20
21 Conclusion 21
22 The informa.on security in the enterprise... is a managerial responsibility has to be organized and embedded in the working environment requires adapted measures Involves all actors 22
23 Thank you for your attention h'p:// execupve- transformaponal- cio 23
Cloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
Integrating the Project Portfolio Management and Service Portfolio Management: The Governance of Enterprise IT Perspective
Integrating the Project Portfolio and Portfolio : The Governance of Enterprise IT Perspective George Papoulias CGEIT. ITIL Expert, PRINCE2 Prac;;oner, CRISC, CISA Senior Project Manager CONTENTS TYPES
Practical Approaches to Achieving Sustainable IT Governance
Practical Approaches to Achieving Sustainable IT Governance Beyond Mandates: Getting to Sustainable IT Governance Best Practices Agenda IT Governance Definition IT Governance Principles IT Governance Decisions
Everything You Need to Know about Cloud BI. Freek Kamst
Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to
How To Implement An Information Security Management System
ISO/IEC 27001 Informa2on Security Management System Presented by Daminda Perera 26/07/2008 ISO/IEC 27001:2005 Informa@on technology Security techniques Informa@on security management systems Requirements
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Project Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda
SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar
SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks
IT Governance Charter
Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms
Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)
Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM) Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator Master s team Nicolas Mayer
NIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
Report to Rapport au: Council Conseil 9 December 2015 / 9 décembre 2015. Submitted on October 26, 2015 Soumis le 26 octobre 2015
1 Report to Rapport au: Council Conseil 9 December 2015 / 9 décembre 2015 Submitted on October 26, 2015 Soumis le 26 octobre 2015 Submitted by Soumis par: Susan Jones, Acting Deputy City Manager, City
COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction
Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5
Introduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al
1/06/15 Benefits of virtualiza/on Virtualiza/on Which of the following is not a poten/al benefit of virtualiza/on? A. cost effec/ve B. applica/on migra/on is easy C. improve applica/on performance D. run
ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt
ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
Hosted Exchange for Business
Your complete guide to Hosted Exchange Hosted Exchange for Business 1 Table of Contents Hosted Desk- 3 What is Hosted Exchange? 3 What are the benefits of Hosted Exchange? 4 How easy is it to migrate to
Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist
Beyond Mandates: Getting to Sustainable IT Governance Best Practices Steve Romero PMP, CISSP, CPM IT Governance Evangelist Agenda > IT Governance Definition > IT Governance Principles > IT Governance Decisions
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia MARIO SPREMIĆ, Ph.D., CGEIT, Full Professor Faculty of Economics and Business Zagreb, University of Zagreb
Revised October 2013
Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network
BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
Preparing yourself for ISO/IEC 27001 2013
Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys ([email protected]) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,
Information Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
VENDOR MANAGEMENT Presented By:
VENDOR MANAGEMENT EXAMINER EXPECTATIONS FOR ASSESSING & MANAGING 3RD PARTY RISK Presented By: Tom Hinkel, VP of Compliance Services Safe Systems, Inc. Agenda Blurred Lines: Defini/on of vendor Recent regulatory
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
BIRN Update. Carl Kesselman
BIRN Update Carl Kesselman Professor of Industrial and Systems Engineering Information Sciences Institute Fellow Viterbi School of Engineering University of Southern California Biomedical Informatics Research
Masterclass Cycle on Information Security Management
Masterclass Cycle on Information Security Management The Masterclass Cycle on Information Security Management is a truly European modular programme, co-created with the CIO community, that targets a high
video communications the foundation for enterprise mobility + + + + + +
v R video communications the foundation for enterprise mobility executive summary Video at the heart of mobility In order to meet the advanced requirements of an enterprise, mobility must be taken to the
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
H2020-LEIT-ICT WP2016-17. Big Data PPP
H2020-LEIT-ICT WP2016-17 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data PPP: large scale
PhD Program in Pharmaceutical Sciences From drug discovery to the patient Training the next generations of pharmaceutical scientists
PhD Program in Pharmaceutical Sciences From drug discovery to the patient Training the next generations of pharmaceutical scientists Section des sciences pharmaceutiques Univerisité de Lausanne, Université
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.
Gartner s Value for Higher Education Clients Georgia Institute of Technology Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. Allison Weil,
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP
P a g e 1 Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP December 24, 2015 Coalfire Systems, Inc. www.coalfire.com 206-352- 6028 w w w. c o
Measuring Policing Complexity: A Research Based Agenda
ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject
Section 4 MANAGEMENT CONTROLS AND PROCESSES. Section 4
Section 4 MANAGEMENT CONTROLS AND PROCESSES Section 4 MANAGEMENT CONTROLS AND PROCESSES MANAGEMENT CONTROLS AND PROCESSES FEATURED IN THIS SECTION 4.1 Information Management Framework... 1 4.2 Strategic
INVITATION. Smart Grid & Cyber Security Conference
INVITATION Smart Grid & Cyber Security Conference 20 June 2013 Designing the Future for an Intelligent Energy Infrastructure Risk management and protection of critical infrastructure in an uncertain world
Moving Forward with IT Governance and COBIT
Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around
Selling Cyber Security to the Finance Officers
Selling Cyber Security to the Finance Officers Presented by, Phil Bertolini, Deputy County Executive & CIO Oakland County, MI www.oakgov.com/it/presentations September 2015 Agenda Introduction Business
WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons
WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment
Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing
Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing Compliancy Group Webinar 11/11/14 NOTICE: Proprietary and Confiden)al. This material is proprietary to Benera)on, LLC.
Maximizing Your IT Value with Well-Aligned Governance August 3, 2012
Maximizing Your IT Value with Well-Aligned Governance August 3, 2012 6 th Annual SoCal Excellence in Service Management Conference Your Presenter: Jason Brucker Associate Director within Protiviti's IT
Delivering IT as a Service
white paper itaas Delivering IT as a Service With a Software-Defined Data Center This white paper is based on research conducted by IDG Research Services on behalf of VMware. The June 2012 Cloud Innovation
Objectives for today. Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy
Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy This is not just about technology. The main area of change, thus the major challenge, is how we as leaders
Energy Efficient Systems
Energy Efficient Systems Workshop Report (September 2014) Usman Wajid University of Manchester United Kingdom Produced as a result of Workshop on Energy Efficient Systems @ ICT4S conference, Stockholm
M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security. Mihai Voicu CIO/CSO ILS Technology LLC
M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security Mihai Voicu CIO/CSO ILS Technology LLC Topics 1 What is the role of standardization in security for M2M solutions? 2 How are TIA and other
IT Governance Issues in Korean Government Integrated Data Center 1
IT Governance Issues in Korean Government Integrated Data Center 1 Mokpo National University, [email protected] Abstract Korean government established the GIDC (Government Integrated Data Center) as a
