University Academic and Administrative Information Technology Steering Committee
|
|
|
- Ann Owens
- 10 years ago
- Views:
Transcription
1 University Academic and Administrative Information Technology Steering Committee Monthly Status Report for October, 2013 I. New IT Investment Proposals 1. QRadar Security Monitoring System Sponsor: Dan Han, Institutional Security Officer Description: Procure additional component license and upgrade existing QRadar system capability Schedule: One month to implement (December January 2014) Resources: Information Security Office staff, Technology Services staff Audience: ISO, local administrators of information technology security Benefits: Improve monitoring of risks and vulnerabilities that affect VCU s information technology assets, and provide better data to aide decisions regarding those risks 5-Year Cost: $212,400 ($118,000 initial, $94,400 four-year maintenance) Funded: Yes (HEETF) Recommendation: APPROVE 2. Server and Storage Architecture for MOOCs Sponsor: Gardner Campbell, Vice Provost for Learning Innovation and Student Success Description: Implement the WordPress Course Site and build an online learning community for MOOCs beginning in Summer 2014 Schedule: November Spring 2014 semester Resources: Staff from the Office of Online Education and Office of the Vice Provost for Learning Innovation and Student Success Audience: Students and faculty Benefits: Model and showcase a distinctive, high-engagement online learning environment 5-Year Cost: $90,000 ($18,000 per year license fee) Funded: Yes Recommendation: APPROVE 3. Secure Cloud Storage and Collaboration Solution Sponsor: Michael Duong, School of Medicine Technology Services Description: Implement a secure and HIPAA compliant cloud storage and collaboration solution to ensure PII and PHI information is secure
2 2 Schedule: Spring 2014 Resources: Audience: Benefits: through contractual agreements and through advanced auditing, monitoring and management tools. Central IT Staff Requirements: Information Security staff to perform security assessment; eid/ Windows active directory analyst for AD integration; Networking analyst to ensure connectivity and appropriate network security. SOM Technology Services: SOM Information Security and Infrastructure Services staff will be involved in all phases of the project form planning, deployment and ongoing administration; SOMTech Desktop Support Analysts will be involved in daily support. School of Medicine faculty and staff and other units that must comply with similar regulatory requirements across the university. 1. Reduce the use of personal and free cloud storage for work purposes 2. Standardize on a secure cloud storage and collaboration solution for housing and sharing very sensitive data 3. Compliance with regulatory requirements such as HIPAA/HITECH and others 4. Reduce the risk of data breaches 5. Reduce administrative overhead in investigating potential data breaches that involve data stored in the cloud and access from many end points 6. Allow for the auditing and technical controls of data types 5-Year Cost: >$50,000 (estimated) Funded: Yes (Pilot only) Recommendation: Hold for Consideration (final decision in November 20 th meeting)
3 3 Infrastructure and Operations Portfolio Project/Sponsor Cost Funded Benefits Description 1. Redundant Fiber Connection / $189,000/ Y $0 yearly Eliminate single point of network failure risk Vendor will install second fiber optic connection 2. Telephone Equipment and Billing System / $225,000/ Y $28,000 yearly Primary operations system for Telecommunications office Replace current system (Pinnacle) losing vendor support 3. LANDesk Customer Management System / $150,000/ Y $120,000 yearly Improved user experience, elimination of duplicative solutions, integration with current software suite Replace current system (Remedy), savings to partially fund new system 3. RedCap Survey Tool Support / Center for Clinical and Translational Research $100,000 yearly N (salary + benefits) Improved service to all users of RedCap survey software Request to add staff (1) required to fully support RedCap survey tool 4. Point- Of- Sale System for Technology Store $17,250 initial/ Y $2,000 yearly Support sales and administrative activities of new technology retail outlet Business Services to implement the LightSpeed POS system 5. QRadar Security Incident Monitoring System 6. Serve and Storage Architecture for MOOCs $118,000 initial/ Y $23,600 yearly $18,000 initial/ Y $18,000 yearly $817,250 initial $291,600 yearly Improve monitoring of risks and vulnerabilities that affect VCU s information technology assets, and provide better data to aide decisions regarding those risks Model and showcase distinctive, high- engagement online learning that leads to deep learning NOTE RedCap support funding is not identified Information Security Office to procure additional components and upgrade QRadar Implement the WordPress Course Site and build an online learning community for MOOCs beginning in Summer 2014
4 4 IN QUEUE 1. Network Equipment Replacement / 2. e911 System / Telecommunications $390,000 Y Maintain reliable network $131,400 Y Provide number and location data for all 911 calls Replace 110 network switches reaching end of life Replace existing system losing vendor support 3. Internet Upgrade / $50,000 / Y $40,000 yearly Increase aggregate bandwidth from 3.5Gbps to 5 Gbps Upgrade total Internet connection 4. Move Blackboard LMS to hosted solution / $318,000 Y Eliminate hardware costs and reduce staff time to support Move Blackboard from VCU- supported platform to vendor- supported Business Process Automation and Improvement Portfolio Project/Sponsor Cost Funded Benefits Description 1. Grants Management System/Office of Research Administration $670,000 / Y $35,000 yearly Improve grant submission and award management processes Implement Click Commerce system 2. Animal Resources System / ORA $437,000 / Y $20,000 yearly Improved functionality in animal resource management Implement Click Commerce system 3. Time and Attendance System / Human Resources $262,000 / Y $26,900 yearly Automated attendance and leave recording; improve FLSA compliance Implement TimeClock Plus system 4. Hobsons Apply Yourself / Strategic Enrollment Mgmt 5. Visa Management System / Global Education Office $100,000 + / Y $25,000 yearly $60,000 / Y $10,000 yearly Improve graduate application process Automate reporting of student/staff/faculty visa information to SEVIS Purchase off State contract, configure and implement hosted solution Implement the Sunapsis system from Indiana University
5 5 6. Career Services Technology Platform / University Career Center 7. Course Evaluation / Center for Teaching Excellence IN QUEUE $125,000 Y Improve ability for students to perform job searches $90,000 / Y $18,500 yearly $1,744,000 initial $135,400 yearly Improved instrument, more student data Partner with School of Business and School of Engineering to procure hosted solution Implement the explorance Blue system 1. ImageNow site license/ Technology Services 2. Customer Relationship Management System / Development & Alumni Relations $1.1 - $2 million N Remove funding barrier for schools and departments; leverage functionality $300,000 + (est.) Y Improve communications management to support fundraising and alumni relations Convert per user license to site license Issue an RFP to replace current Mellinum CRM system Innovation Portfolio Project Cost Funded Benefits Description 1. Research Opportunity and Application System / Center for High Performance Computing $60,000 Y Provide researchers ability to post research opportunities and students to apply for them Quest for Distinction funded project to be developed by Nihar Sheth $60,000
6 6 Non- Discretionary Portfolio Project Cost Funded Benefits Description 1. Security Camera Upgrade / VCU Police $ 1,200,000 Y Upgrade existing cameras and install 300 additional ones Improve surveillance and the ability to identify suspects $1,200,000 Other Issues for ELT: No issues identified.
2014 HIMSS Analytics Cloud Survey
2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation
University of North Carolina at Greensboro
University of North Carolina at Greensboro 2008-2009 Information Technology Services Annual Report Executive Summary In the 2008 2009 fiscal year, ITS focused on technology enhancements that broadened
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
Personal Security Practices of the CAO
Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within
Information Technology Strategic Plan 2013 9/23/2013
Information Technology Strategic Plan 2013 9/23/2013 Unit Mission Statement: Information Technology Shared Services is dedicated to providing unparalleled service and support to the UC Davis College of
The ABCs of DaaS. Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting.
The ABCs of DaaS Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting White Paper The ABCs of DaaS Enabling Data as a Service Application Delivery, Business
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Picasso Recommendation
Picasso Recommendation Mission The School of Dentistry for the University at Buffalo (UB) uses a custom application called Picasso to manage their clinic operations. Developed by two engineers in 1997,
Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions
Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,
How Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
ISAAC Risk Assessment Training
ISAAC Risk Assessment Training v2013 Information Technology Risk Management 1 Agenda Why Assess? Information Security Standards Risk Assessment Process Using ISAAC Information Technology Risk Management
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society
Enabling Storage Services in Virtualized Cloud Environments
Cloud Environments Contents 1. Multi-Tenant Architecture... 4 2. Server Groups, Attributes, and Aggregation... 4 3. Capacity Planning as a Service... 6 4. Chargeback as a Service... 9 4.1. Storage Chargeback...
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
ITIL's IT Service Lifecycle - The Five New Silos of IT
The workable, practical guide to Do IT Yourself Vol. 4.01 January 1, 2008 ITIL's IT Service Lifecycle - The Five New Silos of IT By Rick Lemieux In my last article I spoke about IT s evolution from its
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
CONTENTS. Abstract... 2. Need for Desktop Management... 2. What should typical Desktop Management Software do?... 2. Securing Desktops...
CONTENTS Abstract... 2 Need for Desktop Management... 2 What should typical Desktop Management Software do?... 2 Securing Desktops... 3 Standardization... 4 Troubleshooting... 4 Auditing IT Assets... 5
The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development
The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards
IBM Enterprise Asset Management
IBM Enterprise Asset November 14 th, 2012 Daniel STAN Tivoli Software Sales, IBM Romania IBM Tivoli 2012 Strategic Capabilities VISIBILITY CONTROL AUTOMATION See and understand your business in real time
Summary of Current ITMP Projects by Status. Summary of All ITMP Projects by Status (136 current plus 18 new initiatives)
Attachment "A" Summary of Current ITMP Projects by Status Percent of Projects by Status Type Abreviation No. of Projects 27% Ongoing O 36 35% Complete Com 47 6% Project Started PS 8 7% Budgeted B 10 15%
Technology Services Strategic Direction
Technology Services Strategic Direction 2014-2016 Update If we are not serving the student directly, we are serving someone who is Who we are: Technology Services currently reports to the Vice Chancellor
Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC
Secure Cloud Computing Concepts Supporting Big Data in Healthcare Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Learning Objectives After this session, the learner should
Enabling Compliance Requirements using ISMS Framework (ISO27001)
Enabling Compliance Requirements using ISMS Framework (ISO27001) Shankar Subramaniyan Manager (GRC) Wipro Consulting Services [email protected] 10/21/09 1 Key Objectives Overview on ISO27001
Designing and Deploying Cloud Solutions for Small and Medium Business
Designing and Deploying Cloud Solutions for Small and Medium Business HPATA Cloud Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common virtualization technologies and products and their
SOFTWARE AS A SERVICE (SaaS)
SOFTWARE AS A SERVICE (SaaS) Definition, Benefits and Vendor Selection An NCR white paper Looking for a faster time-to-market solution with a lower investment? Today s customers are tech-savvy and want
Infrastructure Technical Support Services. Request for Proposal
Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable
Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission
Program Summary DoIT provides support for 1,200 virtual and 150 physical servers. Housed in DoIT data centers to take advantage of climate control, power conditioning and redundancy, fire suppression systems,
STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) AGENDA WEDNESDAY, JUNE 15, 2011 2:30 3:30 p.m. STARK LIBRARY
STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) AGENDA WEDNESDAY, JUNE 15, 2011 2:30 3:30 p.m. STARK LIBRARY Attendees: William Powers Alex Albright, Jay Boisseau, Pat Clubb, Brad Englert, Rod Hart, Kevin Hegarty,
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Information Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
Appendix B7. Master Data Management Business and Technical Requirements Solicitation No.: YH12 0023. Page 229
aster Data anagement Business and Technical Requirements Solicitation No.: YH12 0023 Page 229 OFFEROR NAE: ASTER DATA ANAGEENT REQUIREENTS B.7 ASTER DATA ANAGEENT The following sections identify the major
Service Catalog Bootcamp
Click to edit Master title style Taming the Dragon Getting your Services Under Control September 20 th, 2013 Service Catalog Bootcamp Session Evaluation: bit.ly/nercomp_dragon ITIL is a Registered Trade
Swansea University. ICT Infrastructure Strategic Plan: 2015 2017
Swansea University ICT Infrastructure Strategic Plan: 2015 2017 Context ICT is essential for the University to achieve its ambitious expansion plans and to operate on a day today basis. IT underpins our
DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE
SOLUTION PLAN REQUIREMENTS ANALYSIS DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE Executive Summary The project will document campus requirements for IAM functionality and select and procure one or more technology
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan and execute a strategy to protect 100 percent of your
Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC [email protected]
Cloud Computing Risks & Reality Sandra Liepkalns, CRISC [email protected] What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
General HIPAA Implementation FAQ
General HIPAA Implementation FAQ What is HIPAA? Signed into law in August 1996, the Health Insurance Portability and Accountability Act ( HIPAA ) was created to provide better access to health insurance,
DELIVERING CUSTOMER COMMUNICATIONS IN A DYNAMIC MARKETPLACE. A Madison Advisors White Paper June 2013
DELIVERING CUSTOMER COMMUNICATIONS IN A DYNAMIC MARKETPLACE A Madison Advisors White Paper June 2013 TABLE OF CONTENTS Executive Summary............................................... 3 Managing Customer
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
Citrus College. Technology Master Plan 2009-2014 Adopted 2011
Citrus College Technology Master Plan 2009-2014 Adopted 2011 Citrus College District Information Technology Master Plan 2009-2014 2011 Update Table of Contents Planning Overview... 3 Background... 4 Factors
Strategic Plan FY 2014-2016
Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
Software Asset Management (SAM) and ITIL Service Management - together driving efficiency
Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Ian Preskett MIET C.Eng. MBCS CITP Software Asset Management Consultant [email protected] Agenda
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business
TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment
Security at Your Fingertips.
Security at Your Fingertips. Enjoy greater peace of mind and convenience knowing that your business is safe, and operations are running smoothly. Stratocast is a modern approach to security, providing
Transformation of POS Operations at
Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail
QRadar Security Management Appliances
QRadar Security Management Appliances Q1 Labs QRadar network security management appliances and related software provide enterprises with an integrated framework that combines typically disparate network
Subject: Overview of Information Technology Services and the Strategic Technology Plan. Proposed Committee Action No Action Required Information Only.
AGENDA ITEM: IV Florida Polytechnic University Board of Trustees Technology Committee Subject: Overview of Information Technology Services and the Strategic Technology Plan Proposed Committee Action No
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
AUSTIN PEAY STATE UNIVERSITY RFQ 16-037 Web Conferencing and Collaborative Classroom Questions & Answers
1) I see that you have 200,000 students and 15,000 full-time staff Can you please confirm the number of concurrent users you foresee using the meeting and collaborative classroom sessions. I need to understand
Software Licensing and Pricing Best Practices. Stewart Buchanan June 3, 2009 Gartner Webinar
Software Licensing and Pricing Best Practices Stewart Buchanan June 3, 2009 Gartner Webinar How to Participate Today Audio Announcement You have joined the audio muted using your computer s speaker system
Computer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
NET ACCESS HIPAA COMPLIANT FLEXCloud
Page 0 2015 SOLUTION BRIEF NET ACCESS HIPAA COMPLIANT FLEXCloud A Managed Infrastructure Solution that Meets the Regulatory Demands of the Health Care Industry NET ACCESS LLC 9 Wing Drive Cedar Knolls,
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
Symantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
8 Key Requirements of an IT Governance, Risk and Compliance Solution
8 Key Requirements of an IT Governance, Risk and Compliance Solution White Paper: IT Compliance 8 Key Requirements of an IT Governance, Risk and Compliance Solution Contents Introduction............................................................................................
Enterprise Information Technology Security Assessment RFP Answers to Questions
Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
The Push and Pull of the Cloud. TPI Cloud Computing Overview. April 5 th 2011
0 The Push and Pull of the Cloud. TPI Cloud Computing Overview April 5 th 2011. No part of this document may be reproduced in any form or by any electronic or mechanical Copyright means, 2011 Technology
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
How To Manage A Shared Server Management Service At Texas Tech University
TOSM Shared Server Management Memorandum of Understanding DOCUMENT REVISION HISTORY: 6/12/2015 Replaced Red Hat Linux with Oracle Linux 6/17/2015 Item 7.4, a single 1gb network connection per server is
Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.
Payment Card Industry Security Standards Over the past years, a series of new rules and regulations regarding consumer safety and identify theft have been enacted by both the government and the PCI Security
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014 Agenda Introduction / Session Overview HIT Budgeting 101 Security and Compliance EHR budgeting HIT Where Are We Going Q & A 2 Copyright
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
