SSC Operations IT Transformation in Motion

Size: px
Start display at page:

Download "SSC Operations IT Transformation in Motion"

Transcription

1 SSC Operations IT Transformation in Motion Financial Management Institute (FMI PD Week 2013) November 28, 2013 Kevin Radford Senior Assistant Deputy Minister Operations Branch

2 Outline SSC OPERATIONS IT TRANSFORMATION IN MOTION SSC Mandate and Vision SSC Background A year in review Target End State OPS Branch Mission/Vision OPS Branch Priorities to meet SSC Objectives OPS Branch Model OPS Branch Challenges and Way Forward 2

3 SSC Mandate and Vision SSC MANDATE The Government of Canada created Shared Services Canada on August 4, 2011, to fundamentally transform how the Government manages its information technology (IT) infrastructure SSC VISION To be the public sector s most innovative organization in providing cost-effective shared services that improve service delivery to Canadians. 3

4 Shared Services Canada - Background Budget 2011 A New Organization with an IT Focus STANDARDIZE CONSOLIDATE Raison d être Reduce costs Improve security Maximize efficiencies Minimize risks RE-ENGINEER 4

5 A Year in Review Transformed the procurement process Completed the procurement process with industry June 25, 2013: contract awarded to Bell and CGI Systems TELECOMMUNICATIONS June 2013: Cabinet support for Transformation Plan July 9, 2013: hosted Industry engagement day for GC Network and Wide-Area network Implemented Government Enterprise System (GENS) in 130 of 3850 buildings DATA CENTRES June 2013: Cabinet support for Transformation Plan July 17, 2013: hosted industry engagement day on data centre platform Developed concensus between SSC and industry on fundamental directions on technology and service orientation Centre de données Ouest de Quebec: created horizontal teams across SSC; opening of first development data centre coming soon CYBER AND IT SECURITY January 2013: launched two-step procurement process to strengthen the supply chain integrity 5

6 Data Centre and Networks Target End State Simpler, Safer and Smarter Enhanced Enterprise Security Enterprise Security Cyber threats Allies (International) Businesses Canadians Internet Virtual Private Cloud Governments GC Network GC 377 Network 000 users buildings Regional and International Carriers ( users; buildings) Production XYZ Production X Production XYZ Production Y Business Continuity Sensitive Data Enclaves Supercomputer Geographic Diversity Six data centres in pairs for high performance and availability Data centres in diverse locations for disaster tolerance Development Third Pair ABC Mix of ownership Reuse of existing Crown real property assets Public-private partnerships (P3s) Outsourcing ownership and maintenance to the private sector 6

7 Operations Branch Overview Our Mission and Vision OPS BRANCH MISSION We are a global leader in the operation and management of shared IT services, recognized by those we serve as a valued partner, an astute innovator, transparent in decision-making and an enterprise that offers a workplace of choice in which employees are highly valued and developed. Secure, reliable IT faster, better, cheaper OPS BRANCH VISION IT capacity in advance of need number one employer of choice Capacity before need 7

8 OPS Branch priorities to meet SSC Objectives Continue to focus support on mission critical systems and work with partners to improve quality of service No more than 10% increase in the number of business critical incidents over last fiscal Maintain the percentage of business critical Incidents recovered within 4 hours Expand the enterprise approach to monitoring IT operations with particular focus on security Contribute as required to TSSD on disaster recovery framework Review 15% of partner business continuity plans Continue to align, implement and optimize IT service management processes Establish enterprise-wide information technology service management processes for Configuration / asset management, release management and service desk Implement horizontal opportunities to improve IT service delivery and optimize resources, facilities and assets Manage investments according to the approved procurement plan and capital plan Establish work force management committee in order to manage resources strategically 8

9 OPS Branch priorities to meet SSC Objectives GC-CIRT: Transfer of the Government of Canada Computer Incident Response Team from Communications Security Establishment Canada to SSC The transfer of the Government of Canada Computer Incident Response Team from the Communication Security Establishment Canada on November 1, 2013 Work with Treasury Board Secretariat and partners to develop an enterprise view of disaster recovery and business continuity Contribute as required to TSSD on disaster recovery framework. Review 15% of partner business continuity plans Identify and seize opportunities to remove barriers between departments to improve the effectiveness of IT security Continue to enhance security requirements for the current Federal Information Protection centre site - 24 month timeframe for completion Continue year 2 requirements of the 3 year plan to fully implement a Security Incident Recovery Team One SSC, One team, One plan 9

10 Operations Branch Overview OPS Branch Model Drivers GC Priorities SSC Priorities Partner Priorities NON-CORE / EXISTING SERVICES SERVICE A SERVICE Y OPERATE OPERATIONS SERVICE Z NEW CORE SERVICES NETWORK Conduct GC Operations and Support Transformation LINES OF OPERATIONS (Strategies & Roadmaps) Data Centre Operations (Stabilize, prioritize, rationalize) Execute Data Centre Services Services Consolidate / virtualize servers Maximize use of existing capacity Implement enterprise IT recapitalization SUPPORTING LINES OF OPERATIONS Network Operations (Secure, consolidate, modernize) Execute Voice Services Centrex to VOIP and Cellular Dispose unused Centrex lines/ phones Virtual circuit migration: ISDN to IP Shared VC / telepresence conf. rooms NCR network optimization Service Management (Process Optimization) Infrastructure Evolution (Technology Optimization) DATA CENTRE Business / Talent Management ( Align & Develop the Team ) Governance (OPS bus. mgmt, technical, ITSM, etc.) IT Security (Defend and protect) Execute Data Centre Security Remove barriers btw depts. Minimize secure perimeters Execute Network Security SC Net Access Replacement UTM/firewall consolidation SRA Connectivity SERVICES Strategic Outcomes Modern, scalable, flexible infrastructure Standardized Service Levels: Capacity exceeds demand Success in GC Operations & GC Business Transformation Assured GC IT Security at home and abroad Highly skilled team leading GC IT innovation 10

11 Operations Branch: Line of Operations Data Centre Operations Focus: Data Centre and will focus on the delivery and operations of the transformed data centre. DATA CENTRE CAPABILITIES: STABILIZE, PRIORITIZE, RATIONALIZE Effectively manage fewer than 10 modern, secure and reliable data centers, ensuring maximum capacity utilization and workload mobility, highly responsive & scalable service delivery on demand, & optimal levels of virtualization / automation TARGET ENVIRONMENT Centralized and interconnected, virtualized infrastructure General improvement of quality of facilities, infrastructure and operations Standardized, modularized, automated, agile Optimized, sustainable, resilient, highly available and responsive Greener operations 11

12 Operations Branch: Line of Operations Network & Telecom Operations Focus: Network and Telecom will focus on rationalizing and consolidating network services and implement network telecommunications service on single enterprise. NETWORK CAPABILITIES: SECURE, CONSOLIDATE, MODERNIZE An integrated, standardized telecommunications network that supports Government of Canada operations from coast to coast and internationally TARGET ENVIRONMENT Standardized, rationalized, ubiquitous network infrastructure High capacity to meet current & future demands Highly resilient, scalable & secure Consistent, end-to-end performance characteristics for cost effectiveness 12

13 Operations Branch: Line of Operations IT Security Focus: IT Security will focus on an enterprise-wide approach to transform security. IT SECURITY CAPABILITIES: DEFEND AND PROTECT Safeguard information while meeting business and operational requirements via accurate processes and tools to monitor our systems; recovery; detect threats; analyze activity; respond to attacks and report events of concern. TARGET ENVIRONMENT Secure integrated information environment Security Operations Centre (SOC): tools to monitor / detect, analyze protect, report, and respond Managed SSC response to Security incidents involving actual, incipient or potential security breaches or vulnerabilities General understanding across SSC of security issues and policies and awareness of individual responsibilities Pro-active approach to preventing security breaches 13

14 Operations Branch: Supporting Line of Operations IT Service Management We will progressively align Best Practices across Operations to drive Operational Excellence OPS Focus For: 2012/ / /15 SERVICE MANAGEMENT CAPABILITIES (FOR OPERATIONS BRANCH) Standardize select Operational Support & Analysis Capabilities Evolve select Infrastructure Release, Control & Validation Capabilities Strengthen Planning, Protection & Optimization Optimizing Service Offerings and Agreements TARGET ENVIRONMENT / OUTCOMES IT Services aligned to GC Operational & Business Requirements for improved efficiency and effectiveness Harmonized enterprise-wide IT Service management processes and supporting tools, that are deployed nationally across the SSC, to ensure Operational Excellence Accurate & meaningful service performance data provided to all levels of management to enable sound decision making and responsible management of IT resources 14

15 Operations Branch: Current Status Top 3 Challenges 1 2 Competing priorities / Too Much to Do Delivering existing services ( keep the lights on ) while supporting the transformation to new services. Mandatory Economic Action Plan commitments Aligning and optimizing complex diverse infrastructures from the 43 departments to maximize capacity and to achieve committed savings. 3 Management of change Aligning to the new way of working while building the talents / capabilities required to deliver OPS commitments in and into the future. 15

16 Way Ahead The future will not look like the past. "Transformation through Innovation" is a concept which is truly far reaching. As we work with our partners, collaboration with the finance community will continue to be critical to our success. 16

17 Wrap Up and Open Discussion Questions? 17

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Presentation to The Institute of Internal Auditors Breakfast Session February 6, 2014 Outline of

More information

Data Centre Networks Overview

Data Centre Networks Overview TELECOMMUNICATIONS TRANSFORMATION PROGRAM Data Centre Networks (DCN) Industry Day Data Centre Networks Overview Michel Fortin Director General, Telecommunications Transformation Program Transformation,

More information

Plan for Data Centres and Networks: Status Update

Plan for Data Centres and Networks: Status Update Plan for Data Centres and Networks: Status Update Presentation to the Information Technology Infrastructure Roundtable March 1, 2013 Grant Westcott, Chief Operating Officer 1 Outline Data Centre and Telecom:

More information

Technology. Accenture Infrastructure Outsourcing Services

Technology. Accenture Infrastructure Outsourcing Services Technology Accenture Infrastructure Outsourcing Services 2 Accenture Infrastructure Outsourcing Services enable organizations to create a more cost-effective and responsive IT infrastructure one that not

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet

Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet Management and Use of Information & Information Technology (I&IT) Directive Management Board of Cabinet February 28, 2014 TABLE OF CONTENTS PURPOSE... 1 APPLICATION AND SCOPE... 1 PRINCIPLES... 1 ENABLE

More information

Transformation Initiatives: Status Update

Transformation Initiatives: Status Update Transformation Initiatives: Status Update Presentation to the Information Technology Infrastructure Roundtable June 11, 2014 Grant Westcott, Chief Operating Officer and Vice-Chair, Information Technology

More information

Financial Management Transformation (FMT)

Financial Management Transformation (FMT) Financial Management Transformation (FMT) Presentation to fmi*igf PD Week 2013 Transformation for Innovation November 26, 2013 Financial Management Transformation Sector Office of the Comptroller General

More information

Enabling Service Innovation on a Smarter Planet with Integrated Service Management. Chris Mallon, Service Management Executive, IBM Canada

Enabling Service Innovation on a Smarter Planet with Integrated Service Management. Chris Mallon, Service Management Executive, IBM Canada Enabling Service Innovation on a Smarter Planet with Integrated Service Management Chris Mallon, Service Management Executive, IBM Canada Our world is getting smarter intelligence is being infused into

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cybersecurity Enhancement Account. FY 2017 President s Budget Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014 CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Accenture Technology Consulting. Clearing the Path for Business Growth

Accenture Technology Consulting. Clearing the Path for Business Growth Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

Software Defined Hybrid IT. Execute your 2020 plan

Software Defined Hybrid IT. Execute your 2020 plan Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.

More information

Cloud Communications for the Enterprise. www.smoothstone.com

Cloud Communications for the Enterprise. www.smoothstone.com Cloud Communications for the Enterprise Agenda General Environment Overview Common Industry Trends Why The Cloud Approach Smoothstone Overview Platform/Technology Overview UCaaS Applications DRS Solutions

More information

About Injazat Data Systems

About Injazat Data Systems About Injazat Data Systems Injazat Data Systems is an industry-recognized market leader in the region for secure and business-aligned IT services. Injazat serves a diverse variety of industry sectors,

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Douglas County School District. Information Technology. Strategic Plan 2014-17

Douglas County School District. Information Technology. Strategic Plan 2014-17 Douglas County School District Information Technology Strategic Plan 2014-17 Introduction About the Strategic Plan About the Division The goal of the Douglas County School District is to prepare students

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Cohesion Managed Services

Cohesion Managed Services Cohesion It is s objective to deliver, through its Cohesion managed & hosted services portfolio, the kind of business cohesion that IT managers dream of, but never imagine they can afford. The services

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

Speaking Notes for. Liseanne Forand. President, Shared Services Canada. At GTEC

Speaking Notes for. Liseanne Forand. President, Shared Services Canada. At GTEC Speaking Notes for Liseanne Forand President, Shared Services Canada At GTEC October 20, 2011 1 I d like to start by thanking the GTEC board for giving me the opportunity to talk to you today about the

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY MISSION STATEMENT The Information Technology department provides technology, telecommunications and information systems leadership and strategic planning while ensuring efficient, cost effective implementation

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Cloud vision and capabilities

Cloud vision and capabilities Nov 7, 2012 Cloud vision and capabilities - N-Cloud framework - Introduction Marv Mouchawar President, Cloud Services NTT DATA Inc Kazuhiro Gomi President & CEO NTT America Steve Nola CEO, Cloud Solutions

More information

BT Unified Trading communication. The Future Delivered

BT Unified Trading communication. The Future Delivered BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based

More information

Infrastructure consulting. Global Infrastructure

Infrastructure consulting. Global Infrastructure Infrastructure consulting Global Infrastructure Services Operational costs systems availability compliance and security energy and power usage disaster recovery all contribute to today s increasingly complex

More information

PUB (MPI) 1-62 Reference: Gartner Scorecard

PUB (MPI) 1-62 Reference: Gartner Scorecard Information Requests Round 1 PUB (MPI) 1-62 Reference: Gartner Scorecard PUB/MPI 2-23 2013 GRA a) Please file an update to the response to Gartner s recommendations provided at PUB/MPI 2-23 from last year

More information

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual

More information

Managed Desktop Services. End-user workplace management solutions for your distributed-client computing environment. HP Services

Managed Desktop Services. End-user workplace management solutions for your distributed-client computing environment. HP Services Managed Desktop Services End-user workplace management solutions for your distributed-client computing environment HP Services Managing your distributed-client computing environment If your IT organization

More information

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection

More information

SESSION 709 Wednesday, November 4, 9:00am - 10:00am Track: Strategic View

SESSION 709 Wednesday, November 4, 9:00am - 10:00am Track: Strategic View SESSION 709 Wednesday, November 4, 9:00am - 10:00am Track: Strategic View The Business of IT Provisioning Bill Irvine Transformation Strategist, Accelerate Innovation, VMware [email protected] Session

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

The multisourcing approach to IT consolidation

The multisourcing approach to IT consolidation Experience the commitment WHITE PAPER The multisourcing approach to IT consolidation The proven commercial practice of multisourcing services integration can help state and local governments achieve IT

More information

Cisco Remote Management Services for Financial Services

Cisco Remote Management Services for Financial Services Cisco Remote Management Services for Financial Services The global financial services industry continues to evolve to adjust to a shifting market landscape and increased customer expectations. With demand

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

Industry Engagement Event. CLOUD COMPUTING SOLUTIONS CONSULTATION EN578 151297/A November 13 th, 2014 Delta Hotel, Ottawa.

Industry Engagement Event. CLOUD COMPUTING SOLUTIONS CONSULTATION EN578 151297/A November 13 th, 2014 Delta Hotel, Ottawa. Industry Engagement Event CLOUD COMPUTING SOLUTIONS CONSULTATION EN578 151297/A November 13 th, 2014 Delta Hotel, Ottawa. Safe Harbour Statement This presentation contains information regarding potential

More information

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT SAM Benefits Overview SAM SAM is critical to managing an IT environment because effectiveness is seriously compromised when an organization doesn t know what software assets it has, where they are located,

More information

Business resilience: The best defense is a good offense

Business resilience: The best defense is a good offense IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue

More information

IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008

IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008 IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008 Jan Duffy, Research Director Industry Insights Agenda About IDC Insights Today s organizational complexities

More information

Canada School of Public Service 2012-13. Departmental Performance Report

Canada School of Public Service 2012-13. Departmental Performance Report Canada School of Public Service Departmental Performance Report Original version signed by: The Honourable Tony Clement President of the Treasury Board and Minister for the Federal Economic Development

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

Infrastructure as a Service: Accelerating Time to Profitable New Revenue Streams

Infrastructure as a Service: Accelerating Time to Profitable New Revenue Streams Infrastructure as a Service: Accelerating Time to Profitable New Revenue Streams Cisco Infrastructure as a Service Cisco has made a significant investment in understanding customer needs around data center

More information

Today s shared services operating models: The engine behind enterprise transformation

Today s shared services operating models: The engine behind enterprise transformation IBM Global Process Services Thought Leadership White Paper December 2011 Today s shared services operating models: The engine behind enterprise transformation Leveraging the power of globally integrated

More information

Audit of Financial Management Governance. Audit Report

Audit of Financial Management Governance. Audit Report Audit of Financial Management Governance Audit Report March 2015 TABLE OF CONTENTS Executive Summary... 2 What we examined... 2 Why it is important... 2 What we found... 2 Background... 4 Objective...

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

Virtualization s Evolution

Virtualization s Evolution Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,

More information

Enhanced Enterprise SIP Communication Solutions

Enhanced Enterprise SIP Communication Solutions Enhanced Enterprise SIP Communication Solutions with Avaya Aura and Allstream SIP Trunking An Allstream White Paper 1 Table Of Contents Beyond VoIP 1 SIP Trunking delivers even more benefits 1 Choosing

More information

Company size matters: Perspectives on IT Governance

Company size matters: Perspectives on IT Governance www.pwc.com/ca/technology-consulting Company size matters: Perspectives on IT Governance versus large Canadian organizations and IT Governance PwC conducted research for the 4th edition of the IT Governance

More information

Next-Generation Supply Management

Next-Generation Supply Management Cisco Internet Business Solutions Group (IBSG) Cisco IBSG 2012 Cisco and/or its affiliates. All rights reserved. Next-Generation Supply Management Authors Ram Muthukrishnan Kevin Sullivan May 2012 Cisco

More information

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES Purpose and Scope The purpose of the Security Code of Management Practices is to help protect people, property, products, processes, information and

More information

An Introduction to SIP

An Introduction to SIP SIP trunking, simply put, is a way for you to accomplish something that you already do, for less money, with equal or better quality, and with greater functionality. A Guide to SIP V4 An Introduction to

More information

Agency for State Technology

Agency for State Technology Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief

More information

DISA and the Evolving DoD Enterprise

DISA and the Evolving DoD Enterprise 1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing

More information

Technology. Accenture Data Center Services

Technology. Accenture Data Center Services Technology Accenture Data Center Services 2 Accenture employs marketleading technologies and processes to help clients design, implement and manage data center solutions that align to business priorities,

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

More information

Cisco Data Center Optimization Services

Cisco Data Center Optimization Services Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization

More information

SERVICE ORIENTED DATA CENTER (SODC) AND STORAGE. Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION

SERVICE ORIENTED DATA CENTER (SODC) AND STORAGE. Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION SERVICE ORIENTED DATA CENTER (SODC) AND STORAGE Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION Welcome to the Data Center and Storage Networking module part of the Cisco on

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: [email protected] Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

ICT Strategy for the Secretariat

ICT Strategy for the Secretariat ICT Strategy for the Secretariat Stronger ICT for a Better United Nations Briefing for the UN Reform Series organized jointly by UNITAR and the Permanent Mission of Switzerland to the United Nations 4

More information

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the Remarks by Carolyn G. DuChene Deputy Comptroller Operational Risk at the Bank Safety and Soundness Advisor Community Bank Enterprise Risk Management Seminar Washington, D.C. October 22, 2012 Good afternoon,

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Dear Colleagues: Thank you for your ongoing support in this process, and I look forward to our continued working relationship.

Dear Colleagues: Thank you for your ongoing support in this process, and I look forward to our continued working relationship. May 1, 2014 Dear Colleagues: I am pleased to present the 2014 strategic plan update for the West Virginia Office of Technology (OT), which outlines our approach to achieving the goals and objectives set

More information

The Push and Pull of the Cloud. TPI Cloud Computing Overview. April 5 th 2011

The Push and Pull of the Cloud. TPI Cloud Computing Overview. April 5 th 2011 0 The Push and Pull of the Cloud. TPI Cloud Computing Overview April 5 th 2011. No part of this document may be reproduced in any form or by any electronic or mechanical Copyright means, 2011 Technology

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges WHITE PAPER The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges Cloud computing offers a significant opportunity for improved business outcomes through the delivery of innovative

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organization is rapidly increasing in importance. It guides and supports

More information

PWGSC YOUR SERVICE OUR SERVICES, STANDARDS AND RESULTS 2015 2016

PWGSC YOUR SERVICE OUR SERVICES, STANDARDS AND RESULTS 2015 2016 PWGSC YOUR SERVICE OUR SERVICES, STANDARDS AND RESULTS 2015 2016 BUYING AND SELLING A. KEY SERVICES We provide departments and agencies with the expertise needed to acquire complex commercial goods and

More information

industrialized delivered globally via Atos Right-Fit outcomes-based Application Management Your business technologists.

industrialized delivered globally via Atos Right-Fit outcomes-based Application Management Your business technologists. industrialized outcomes-based Application Management delivered globally via Atos Right-Fit Your business technologists. Powering progress Managing the cost of change Telecom companies have been cutting

More information

Technology Services Strategic Plan

Technology Services Strategic Plan Technology Services Strategic Plan 2014 Table of Contents A Changing Landscape... 3 Values... 4 Technology Services Goals... 5 Employee Engagement... 6 Operational Efficiency... 7 Agency Satisfaction...

More information

NovaTel The Next Generation Carrier

NovaTel The Next Generation Carrier NovaTel The Next Generation Carrier The network is the core of your business and our network is built to withstand the most demanding requirements. Designed for tomorrow s needs, NovaTel s network is engineered

More information

U.S. Nuclear Regulatory Commission

U.S. Nuclear Regulatory Commission U.S. Nuclear Regulatory Commission 2011 Data Center Consolidation Plan and Progress Report Version 2.0 September 30, 2011 Enclosure Contents 1 Introduction... 2 2 Agency Goals for Data Center Consolidation...

More information