Dr. Alain Jacot-Descombes, CIO / UNIGE

Size: px
Start display at page:

Download "Dr. Alain Jacot-Descombes, CIO / DSI @ UNIGE"

Transcription

1 Qui est responsable de l'information (numérique) au sein de l'entreprise? Retour d'expérience de l'unige dans la gouvernance de son système d'information Who is responsible for the (digital) information within the company? Practical experiences from the UNIGE in the governance of its information system Dr. Alain Jacot-Descombes, CIO / UNIGE SWITCH Executive Focus, 19th March 2015, Bern 1

2 Agenda Ø Data / Information Ø Digital Enterprise Ø Information UNIGE Ø Cyber Risks Ø Conclusion 2

3 Data / Information : from Prehistory to Digital Era «People or computers can find patterns in data to perceive information, and information can be used to enhance knowledge» 3

4 The Physical Nature of Information 1370 AC 1200 BC BC 1454 AC 2400 BC 196 BC «Lascaux painpng» par Prof saxx Travail personnel. Sous licence CC BY- SA 3.0 via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:lascaux_painpng.jpg#mediaviewer/file:lascaux_painpng.jpg «Ritmal- Cuneiform tablet - Kirkor Minassian collecpon - Library of Congress». Sous licence Domaine public via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:ritmal- Cuneiform_tablet_- _Kirkor_Minassian_collecPon_- _Library_of_Congress.jpg#mediaviewer/File:Ritmal- Cuneiform_tablet_- _Kirkor_Minassian_collecPon_- _Library_of_Congress.jpg h'p://commons.wikimedia.org/wiki/file%3abookdead.jpg [Public domain], via Wikimedia Commons from Wikimedia Commons «Rose'a Stone» par Hans Hillewaert. Sous licence CC BY- SA 4.0 via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:rose'a_stone.jpg#mediaviewer/file:rose'a_stone.jpg Cologny, FondaPon MarPn Bodmer, Cod. Bodmer 78, f. 1r Guido de Columnis, Historia destrucponis Troiae (h'p:// codices.unifr.ch/en/list/one/fmb/cb- 0078) «Gutenberg Bible» par Raul654. Sous licence CC BY- SA 3.0 via Wikimedia Commons - h'p://commons.wikimedia.org/wiki/file:gutenberg_bible.jpg#mediaviewer/file:gutenberg_bible.jpg AJD / Who is responsible for the (digital) information within the company? 4

5 The Physical Nature of Information UK Newcastle University Library??? Data format? Data locapon? Data owners? Archived Data? AJD / Who is responsible for the (digital) information within the company? 5

6 Data / Information in the Digital World Data o facts and statistics collected together for reference or analysis Big Data Information o facts provided or learned about something or someone o data as processed, stored, or transmitted by a computer. Fast Data Smart Data 6

7 Information / Data Assets of the Universities Research Data Teaching & Learning Data Administrative Data some of them with regulatory requirements : o Personnal data o Financial data o Reference / master data o Research data linked to patent, publication o Medical data o Historical data o etc. 7

8 Digital Enterprise : How to master the Information System and to leverage Information Technology for the Business? 8

9 The Information System of an Enterprise Governance An information system is a system composed of people and computers that processes or interprets information (wikipedia) Management & Opera.ons People Informa(on Processes Tools 9

10 Optimized the Enterprise through Digitalization Services Business Model IT Business Process InformaPon Delivery Value Joint Business & IT Initiatives : to transform the business model to create new, value-added services to simplify and to optimize the business processes to manage information to save costs NB: IT costs is ~4% of Enterprise costs à the 96% costs should be challenged through digitalization 10

11 Information System Framework and Responsibilities Enterprise Strategy Enterprise Architecture the business processes are based on (computerized) informa(on and func(ons, implemented by databases and applica(ons that are supported by technical infrastructures Demand Risks Risks Service CxO CyO CzO CTO CIO CISO Processes & Informa.on (func?onal domains) Informa.on System (IS) Informa.on Technologies (IT) IS Risks & Security 11

12 Information UNIGE 12

13 The Functional Domains of the UNIGE IS The UNIGE Information System (IS) has been divided into 9 functional domains. TEACHING FINANCE STUDENT LIFE GENERAL MANAGEMENT HUMAN RESOURCES RESEARCH LIBRARY LOGISTICS INFORMATION SYSTEM For each funcponal domain, the IS project & service porfolio is coordinated by a Commi'ee, that is composed of : CxO / business director (president) a CIO deputy a PMO member some key stakeholders 13

14 IS UNIGE Informa.on System (IS) Framework COCSIM COCSIM COCSIM COCSIM COPIL COPIL COPIL CIO According to strategies, / ISG Office priori?zing and funding the IS ins?tu?onal porbolio RECTORATE Business Processes Informa(on & Func(ons Databases & Applica(ons Technical Infrastructures M IN IN O R E V O LU LU T II O N S M AJ O R E V O L U T I O N S CxO CTO Business Architecture InformaPon Architecture ApplicaPon Architecture Infrastructure Architecture CAT Enterprise Architecture PMO ISG Office : IS Governance Office (IS ins?tu?onal porbolio) COCSIM : Porrolio Steering Commi'ee (IS func?onnal porbolio) COPIL : Project Steering Commi'ee PMO : Project Management Office (PPM) AJD / Who CAT is : IS responsible Architecture for Commission the (digital) information within the company? 14

15 IS UNIGE IS Project Manager Business Processes Informa?on & Func?ons Databases & Applica?ons Technical Infrastructures M AJ O R E V O L U T I O N IS Project Folder PMO Project description Project evaluation (radar) Financial Resources Project Organisation Solution description CAT analysis & statement CAT The CAT is screening / valida?ng many aspects of the project and the solu?on, both on business and IT sides data owners? data sensi(vity? data life cycle? access rights? archived data? legal issues? risks? SLA? hos(ng? architectures? Cloud services? 15

16 Information Security Management UNIGE The ISMS is part of the IS Governance framework and contributes to the Internal Control System (ISC) Business Processes Informa?on & Func?ons Databases & Applica?ons Technical Infrastructures Risks Risks CISO IS Risks & Security Securing (digital) information and services Based on the ISO standard / best practices Risk management process Plan-Do-Check-Act cycle (continuous improvement) Involving management and users 16

17 Cyber Risks 17

18 National strategy for Switzerland s protection against cyber risks (NCS, adopted by the Federal Council on June 27, 2012 ) cyber a'acks are carried out on computers, networks and data cyber a'acks are becoming more professional and dangerous state authoripes and administrapons at all levels (ConfederaPon, cantons, communes) can also be vicpms of cyber a'acks. They can be affected in their legislapve, execupve or judiciary funcpons, but also as operators and users of cripcal infrastructure or research insptupons efforts to ensure protecpon can collide with other equally legipmate interests First and foremost, the individual players are themselves responsible for maintaining and oppmising protecpve measures for minimising cyber risks 18

19 The Cloud strategy complements Switzerland s egovernment strategy regarding the use of cloud computing : o o o Cloud strategy (approved on ) «Cloud first» strategy for IS solutions (as in USA, EU) The cloud strategy addresses the identified risks and thereby supports risk-aware and responsible use of cloud computing services The cloud user assumes the responsibility for the use of cloud services and outsourcing of data in the cloud 19

20 The Research Community needs secured Cloud services (infrastructure & support) for High Performance Computing Data Management InsPtuPonal Clouds SWISS ACADEMIC CLOUD AJD / Who is responsible for the (digital) information within the company? 20 20

21 Conclusion 21

22 The informa.on security in the enterprise... is a managerial responsibility has to be organized and embedded in the working environment requires adapted measures Involves all actors 22

23 Thank you for your attention h'p:// execupve- transformaponal- cio 23

Cloud Compu)ng in Educa)on and Research

Cloud Compu)ng in Educa)on and Research Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research

More information

Integrating the Project Portfolio Management and Service Portfolio Management: The Governance of Enterprise IT Perspective

Integrating the Project Portfolio Management and Service Portfolio Management: The Governance of Enterprise IT Perspective Integrating the Project Portfolio and Portfolio : The Governance of Enterprise IT Perspective George Papoulias CGEIT. ITIL Expert, PRINCE2 Prac;;oner, CRISC, CISA Senior Project Manager CONTENTS TYPES

More information

Practical Approaches to Achieving Sustainable IT Governance

Practical Approaches to Achieving Sustainable IT Governance Practical Approaches to Achieving Sustainable IT Governance Beyond Mandates: Getting to Sustainable IT Governance Best Practices Agenda IT Governance Definition IT Governance Principles IT Governance Decisions

More information

Everything You Need to Know about Cloud BI. Freek Kamst

Everything You Need to Know about Cloud BI. Freek Kamst Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to

More information

How To Implement An Information Security Management System

How To Implement An Information Security Management System ISO/IEC 27001 Informa2on Security Management System Presented by Daminda Perera 26/07/2008 ISO/IEC 27001:2005 Informa@on technology Security techniques Informa@on security management systems Requirements

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

How small and medium-sized enterprises can formulate an information security management system

How small and medium-sized enterprises can formulate an information security management system How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and

More information

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda

More information

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks

More information

IT Governance Charter

IT Governance Charter Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms

More information

Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)

Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM) Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM) Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator Master s team Nicolas Mayer

More information

NIST Cloud Computing Program Activities

NIST Cloud Computing Program Activities NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing

More information

Report to Rapport au: Council Conseil 9 December 2015 / 9 décembre 2015. Submitted on October 26, 2015 Soumis le 26 octobre 2015

Report to Rapport au: Council Conseil 9 December 2015 / 9 décembre 2015. Submitted on October 26, 2015 Soumis le 26 octobre 2015 1 Report to Rapport au: Council Conseil 9 December 2015 / 9 décembre 2015 Submitted on October 26, 2015 Soumis le 26 octobre 2015 Submitted by Soumis par: Susan Jones, Acting Deputy City Manager, City

More information

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5

More information

Introduc)on to the IoT- A methodology

Introduc)on to the IoT- A methodology 10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy

More information

benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al

benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al 1/06/15 Benefits of virtualiza/on Virtualiza/on Which of the following is not a poten/al benefit of virtualiza/on? A. cost effec/ve B. applica/on migra/on is easy C. improve applica/on performance D. run

More information

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Hosted Exchange for Business

Hosted Exchange for Business Your complete guide to Hosted Exchange Hosted Exchange for Business 1 Table of Contents Hosted Desk- 3 What is Hosted Exchange? 3 What are the benefits of Hosted Exchange? 4 How easy is it to migrate to

More information

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist Beyond Mandates: Getting to Sustainable IT Governance Best Practices Steve Romero PMP, CISSP, CPM IT Governance Evangelist Agenda > IT Governance Definition > IT Governance Principles > IT Governance Decisions

More information

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities

More information

Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia

Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia MARIO SPREMIĆ, Ph.D., CGEIT, Full Professor Faculty of Economics and Business Zagreb, University of Zagreb

More information

Revised October 2013

Revised October 2013 Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience

More information

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network

More information

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1 BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President

More information

Preparing yourself for ISO/IEC 27001 2013

Preparing yourself for ISO/IEC 27001 2013 Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys ([email protected]) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,

More information

Information Security Management System Information Security Policy

Information Security Management System Information Security Policy Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been

More information

VENDOR MANAGEMENT Presented By:

VENDOR MANAGEMENT Presented By: VENDOR MANAGEMENT EXAMINER EXPECTATIONS FOR ASSESSING & MANAGING 3RD PARTY RISK Presented By: Tom Hinkel, VP of Compliance Services Safe Systems, Inc. Agenda Blurred Lines: Defini/on of vendor Recent regulatory

More information

North Texas ISSA CISO Roundtable

North Texas ISSA CISO Roundtable North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton

More information

BIRN Update. Carl Kesselman

BIRN Update. Carl Kesselman BIRN Update Carl Kesselman Professor of Industrial and Systems Engineering Information Sciences Institute Fellow Viterbi School of Engineering University of Southern California Biomedical Informatics Research

More information

Masterclass Cycle on Information Security Management

Masterclass Cycle on Information Security Management Masterclass Cycle on Information Security Management The Masterclass Cycle on Information Security Management is a truly European modular programme, co-created with the CIO community, that targets a high

More information

video communications the foundation for enterprise mobility + + + + + +

video communications the foundation for enterprise mobility + + + + + + v R video communications the foundation for enterprise mobility executive summary Video at the heart of mobility In order to meet the advanced requirements of an enterprise, mobility must be taken to the

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

H2020-LEIT-ICT WP2016-17. Big Data PPP

H2020-LEIT-ICT WP2016-17. Big Data PPP H2020-LEIT-ICT WP2016-17 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data PPP: large scale

More information

PhD Program in Pharmaceutical Sciences From drug discovery to the patient Training the next generations of pharmaceutical scientists

PhD Program in Pharmaceutical Sciences From drug discovery to the patient Training the next generations of pharmaceutical scientists PhD Program in Pharmaceutical Sciences From drug discovery to the patient Training the next generations of pharmaceutical scientists Section des sciences pharmaceutiques Univerisité de Lausanne, Université

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.

Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. Gartner s Value for Higher Education Clients Georgia Institute of Technology Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. Allison Weil,

More information

Cyber Security: from threat to opportunity

Cyber Security: from threat to opportunity IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known

More information

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP P a g e 1 Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP December 24, 2015 Coalfire Systems, Inc. www.coalfire.com 206-352- 6028 w w w. c o

More information

Measuring Policing Complexity: A Research Based Agenda

Measuring Policing Complexity: A Research Based Agenda ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Section 4 MANAGEMENT CONTROLS AND PROCESSES. Section 4

Section 4 MANAGEMENT CONTROLS AND PROCESSES. Section 4 Section 4 MANAGEMENT CONTROLS AND PROCESSES Section 4 MANAGEMENT CONTROLS AND PROCESSES MANAGEMENT CONTROLS AND PROCESSES FEATURED IN THIS SECTION 4.1 Information Management Framework... 1 4.2 Strategic

More information

INVITATION. Smart Grid & Cyber Security Conference

INVITATION. Smart Grid & Cyber Security Conference INVITATION Smart Grid & Cyber Security Conference 20 June 2013 Designing the Future for an Intelligent Energy Infrastructure Risk management and protection of critical infrastructure in an uncertain world

More information

Moving Forward with IT Governance and COBIT

Moving Forward with IT Governance and COBIT Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around

More information

Selling Cyber Security to the Finance Officers

Selling Cyber Security to the Finance Officers Selling Cyber Security to the Finance Officers Presented by, Phil Bertolini, Deputy County Executive & CIO Oakland County, MI www.oakgov.com/it/presentations September 2015 Agenda Introduction Business

More information

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment

More information

Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing

Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing Compliancy Group Webinar 11/11/14 NOTICE: Proprietary and Confiden)al. This material is proprietary to Benera)on, LLC.

More information

Maximizing Your IT Value with Well-Aligned Governance August 3, 2012

Maximizing Your IT Value with Well-Aligned Governance August 3, 2012 Maximizing Your IT Value with Well-Aligned Governance August 3, 2012 6 th Annual SoCal Excellence in Service Management Conference Your Presenter: Jason Brucker Associate Director within Protiviti's IT

More information

Delivering IT as a Service

Delivering IT as a Service white paper itaas Delivering IT as a Service With a Software-Defined Data Center This white paper is based on research conducted by IDG Research Services on behalf of VMware. The June 2012 Cloud Innovation

More information

Objectives for today. Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy

Objectives for today. Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy This is not just about technology. The main area of change, thus the major challenge, is how we as leaders

More information

Energy Efficient Systems

Energy Efficient Systems Energy Efficient Systems Workshop Report (September 2014) Usman Wajid University of Manchester United Kingdom Produced as a result of Workshop on Energy Efficient Systems @ ICT4S conference, Stockholm

More information

M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security. Mihai Voicu CIO/CSO ILS Technology LLC

M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security. Mihai Voicu CIO/CSO ILS Technology LLC M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security Mihai Voicu CIO/CSO ILS Technology LLC Topics 1 What is the role of standardization in security for M2M solutions? 2 How are TIA and other

More information

IT Governance Issues in Korean Government Integrated Data Center 1

IT Governance Issues in Korean Government Integrated Data Center 1 IT Governance Issues in Korean Government Integrated Data Center 1 Mokpo National University, [email protected] Abstract Korean government established the GIDC (Government Integrated Data Center) as a

More information