El Metodo Managing Risks in Value Chains
|
|
|
- Robyn Thomas
- 10 years ago
- Views:
Transcription
1 El Metodo Managing Risks in Value Chains Maarten Hoeve. Rieks Joosten. Edwin Matthijssen. Caroline van der Weerdt. Reinder Wolthuis TNO Netherls Organization f Applied Research {maarten.hoeve rieks.joosten caroline.verweerdt edwin.matthijssen reinder.wolthuis}@tno.nl Abstract The ability to ganize resource-allocation on the basis of actual need allows a business to become highly flexible, cost efficient robust against crises. Doing so requires that functionalities the associated responsibilities are properly defined, delegated to other parties where needed, checked to ensure that the risks involved remain at an acceptable level. A framewk called El Metodo is presented that helps ganizations do just that. Also, a simple use-case illustrates how El Metodo suppts the construction of an early-warning system that signals risks that become unacceptably high due to causes elsewhere in the resource chain. Finally, we present an overview of what businesses have to say about this method. 1 Introduction Even though there is a lot of guidance with respect to (IT) risk management (e.g. [STGF02], [ISO31000], [ISF11]), its practice is generally still cumbersome. First, a comprehensive overview of (shackles in) value chains within an ganization is rare as businesses become me serviceiented hence complex. Consequently, it is difficult to determine what should be agreed upon in service level agreements (SLA s) between services adjacent in a value chain. When things turn sour, this can easily lead to finger-pointing. Secondly, risk management usually receives management attention when maj incidents have occurred, but this attention wanes when the incident has been solved. Also, ganizations may spend so much time continuously recovering from smaller incidents, that setting up risk management in a structured fashion doesn t seem to be an option. Finally, even when risks may be managed locally, solutions may not be optimal if the risks that adjacent shackles run ( manage) are not properly communicated. Main features of the economy are the specialization the division of wk (e.g. [Sabe82], [PiSa90]). This is usually done by dividing companies into business units, departments teams, each with their own responsibility. It also requires close cooperation codination. A wellknown example is a production chain, where several companies departments contribute until the product is complete. Another example is the supply chain that results in electrical energy being delivered to a wall outlet. Risk management across such value chains requires a clear delineation of the responsibilities between the shackles of value chains, so that risks ( the mitigation N. Pohlmann, H. Reimer, W. Schneider (Edits): Securing Electronic Business Processes, Vieweg (2011), 1-10
2 2 El MetodoManaging Risks in Value Chains thereof) can be explicitly assigned. Also, it requires a clear understing of how the various shackles interoperate cooperate to produce the final product, so that risks related to misunderstings between shackles can be pinpointed. El Metodo is a framewk that helps to st out the shackles, to assign responsibilities in case of disagreement, to provide a clear understing of how shackles interact with one another. Also, it provides managers with a means to do risk management within a shackle relate that to the risks ( the management thereof) of adjacent shackles. When multiple shackles decide to share risk infmation, El Metodo provides the basis f an early warning system that allows managers to be infmed as risks start to line up, which may result in a catastrophe if not treated immediately. This article is built up as follows. First, we introduce the basic concepts of El Metodo illustrate them with examples. Then, using the same examples, we show how risk management is done both within functionalities in value chains. using the same examples. This is followed by a discussion of the method, a specification of wk to be done conclusions. 2 El Metodo - the Method To get a grasp on the division of wk, El Metodo defines a functionality (a shackle in a value chain) as a coherent set of obligations, a manager 1 that is responsible f fulfilling them. Functionalities come in many kinds: a company, a business unit department, an infmation process, an IT system ( application), even a project. Functionalities should be properly scoped, meaning that they should be distinct, manageable. The latter is imptant as managers, like all humans, have physiological limitations that make them err me as the scope grows [Mille56]. Therefe, functionalities with a scope whose size exceeds that what is humanly manageable, should be decomposed, resulting in (subsidiary) functionalities, each with its own obligations its own manager. Outsourcing these functionalities to their respective managers makes the scope of the outsourcing functionality smaller. Splitting of subsidiary functionalities should continue until the remaining scope has become manageable f its manager. 2.1 Designing Functionalities Consider a functionality that provides IP-connectivity between various locations. Its manager defines the functionality by creating a list of its obligation, i.e. criteria rules f the fulfillment of which he is responsible to some other functionality. Examples: IP-connectivity is provided f at least 99.9% of the time. IP-connectivity services comply with the Data Protection Act. Annual revenue of IP-connectivity is at least R annual costs are at most C. A manager can only meet his obligations if he can rely on some expectations to be fulfilled, either within his own scope of control (internal expectations) by some other functionality (external expectations). The method requires that f every obligation of imptance, the manager makes every expectation explicit that need to be fulfilled in der f him to fulfill the obligation. As an 1 We use the term manager to also include a management team.
3 El MetodoManaging Risks in Value Chains 3 example, the manager of the IP-connectivity functionality may associate the following expectations to the obligation that IP-connectivity is provided f at least 99.9% of the time: Every router has an availability of > 99.95%. At any time, every router is either powered by Energy Co, by its UPS Routers X Y are connected with two glassfiber netwks (the A-net B-net) At any time, either the A-net the B-net is operational ( both). IP-connect Routers 99,95% IP-net 99,9% UPS wks Supply of electricity A-net wks B-net wks Fig. 1: Linking Expectations Obligations From the overview that the manager gets by linking expectations obligations, he can judge whether not he can fulfill his obligations. Besides managing single functionalities, the method also helps to get a grip on the value chain by linking obligations expectations of different functionalities. Every expectation of one functionality to another must crespond with an obligation of that other functionality to the expecting one. Signaling any lack of such crespondence allows the managers to take appropriate action align their functionalities. Thus, there is no confusion later on about who is responsible f what. IP-Connect GLASS IP-net 99,9% Routers 99,95% UPS wks Supply of electricity Optical transponders A-net wk A-net wks A-net wks Glassinfra A-net wks Supply of electricity B-net wks B-net wks Glassinfra B-net wks UPS wks Optical transponders B-net wk Fig. 2: Linking Obligations Expectations Between Functionalities
4 4 El MetodoManaging Risks in Value Chains Figure 2 illustrates the linking of expectations of the functionality IP-connect with obligations of the functionality Glass. Not only does this provide insight in functional dependencies, it also helps to (partly) automate risk management, as we shall see in the next section. 2.2 Managing Risk in Functionalities Within ganizations, risk management may take different fms, depending on the subject (financial, infmation, environment, health safety, continuity), the time hizon (longterm, medium term sht term) hierarchical levels (e.g. ganization, business unit division). Many stard process models framewks provide guidance, such as ISO31000, MoR, ISO27001, BS25999 etc. Roughly speaking, traditional risk management consists of determining the scope within which to manage risks make an inventy of the (most imptant) risks within that scope. This is done by identifying threats, estimating the probability of occurrence computing the risk using Risk = Probability x Impact (R=PxI). Then, the nature of these risks is assessed upon which it is decided to either accept them choose implement controls to mitigate them 2. As this modifies the threats, probabilities thus risks, the cycle starts again, until all remaining risks are accepted. El Metodo equates functionalities with risk management scopes. Thus, every manager of a functionality runs his own risk management process. The idea behind this is that risks are limited to this scope, the manager has the best knowledge f this. Once the expectations, obligations their interdependencies have been identified, they can be used to identify risks. Failure to fulfill a particular obligation constitutes a threat to a scope. F example, failure to fulfill compliance with the Data Protection Act is a threat as it may cause the government to impose a fine. Also, any expectation that is not fulfilled constitutes a threat to every obligation to which it is imptant. Thus, the charted obligations expectations allows managers to estimate the probability of non-fulfillment, associate a risk to each of them using the traditional fmula R=PxI. Completeness of the risk assessment depends on completeness of the lists of obligations, expectations their dependencies. Changes in environmental conditions, customer numbers, laws regulations all may cause changes in the list of obligations, expectations dependencies. Therefe, it is necessary to update such lists every once in a while, which is readily complemented with an update of the estimates of likelihoods risks. Once obligations, expectations dependencies are charted, risks can be computed using the traditional fmula R=PxI. Determining probabilities impacts is different f obligations expectations. The probability associated with an expectation of a manager is an estimate of the expectation not being fulfilled. F an internal expectation this is the probability something is wrong within the scope itself should be readily assessable by the manager. F an external expectation, we may assume that there is an obligation of another functionality that cresponds with the expectation. Then, the probability associated with the expectation equals the probability of the other 2 Strictly speaking there are 2 other options, but they are not relevant f our purpose.
5 El MetodoManaging Risks in Value Chains 5 functionality not fulfilling its (cresponding) obligation. Ideally, this probability would be communicated so that the probability of the external expectation going sour is automatic. However, if the manager of the other functionality is reluctant to share this infmation, the manager can estimate the likelihood himself basing it on trust, past experience, perfmance repts / audits. The probability associated with an obligation of a manager is an estimate of the obligation not being fulfilled. When the dependencies between obligations expectations are well-charted, the probability of not fulfilling an obligation can be derived using the probabilities of the expectations of which it depends, using dependency functions resembling those of Fault Tree Analysis. The impact of an obligation is a measure of the maximum severity of the consequences of noncompliance with that obligation (disregarding any implementation knowledge). Managers assess the impact themselves; they may relate this e.g. to penalties as specified by law, penalties agreed in SLA s with customers, male. The impact of an expectation is an indicat of the imptance of the expectation to the scope as it is derived from the impacts of all obligations to which the expectation is relevant. Risks f every obligation expectation can be computed based on their respective impacts probabilities. Note that f management, qualitative measures such as Low/Medium/High, number ranges (as done by the ISF) are useable. However, we also envisage that quantitative measures can be used in conjunction with qualitative assessments. After all, every scope will be able to produce a mapping between quantitative qualitative measures as this mapping is, remains, particular to that scope. We will use the characters L, M H to denote Low, Medium High respectively as we proceed with an example. 3 Putting El Metodo to Use - an Example Looking back to the IP department of which the expectations obligations have been linked, we see that failure of the 99.9% availability obligation would have maj consequences. Thus, the manager estimates the impact of this obligation as H. The manager knows that the routers UPS are very reliable, hence sets the cresponding probabilities to L. Since power is know to fail sometimes, he sets the probability to M. Finally, the department Glass, which provides the physical connection between the routers, provides probabilities f all expectations towards that department. This results in the following overview:
6 6 El MetodoManaging Risks in Value Chains I Impact P Probability R Risk L Low M Medium H High I:H IP-net 99,9% P:H R:H IP-connect I:H P:L R:M Routers 99,95% P:L R:L UPS wks P:M R:M P:H R:H P:H R:H Supply of electricity A-net wks B-net wks Fig 3: Computation of probability associated with an obligation I P R Impact Probability Risk IP-connect L Low M Medium H High I:H IP-net 99,9% P:H R:H Helpdesk P:L R:L P:L R:L UPS wks P:M R:M Supply of electricity Fig 4: Computation of an impact associated to an expectation. When a manager has computed the risks finds one me unacceptably high, he must take measures. If a risk associated with an external expectation is too high, he may decide to find a second supplier, a replacement supplier, voice additional expectations to the supplier that will enhance its trust in the expectation being met. If a risk is associated with an internal expectation, the manager must reganize the wk within its own scope of control. If the risk associated with an obligation is too high, he may either search f causes - to be found in the set of expectations of which the obligation depends - adding modifying this set until the risk becomes acceptable. Alternatively, he may do some expectations management with the parties to which he has the obligation. The manager is free to choose between all of these options, as that is what his job consists of: taking responsibility f compliance with its obligations. Also, it helps to structure the negotiations between (managers of) different scopes.
7 El MetodoManaging Risks in Value Chains 7 In the example, the risk that the obligation can not be realized is unacceptably high. The manager sees that the problem is caused in the department Glass. He will first consult with its manager to see if the problem can be solved. If not, he may look f another supplier f the glass netwk, he manage the expectations of the customers of the IP netwk. Ideally, scope managers communicate the probabilities of their obligations to the scopes that depend on them. Then, a chain ( better: web) of functionalities can be modeled cresponding risks computed automatically. Especially f scopes within a single company this should be feasible because the required transparency is readily achievable. Communication of probabilities between scopes in different companies may not be that easy. However, the method still wks, although scope managers will need to assess the probabilities of external expectations themselves. Note that if all managers in a value chain really cooperate, they could see the effects that their risk treatment decisions have in other scopes. Also, risk mitigation can be optimized as risks that are run in a specific scope might well be mitigated by controls implemented in another scope. El Metodo itself is oblivious to the decisions of managers to the extent they wish to cooperate. Business Unit A Department 1 Department GLAS 2 Department 3 Fig 5: Risk Management across a value chain By repeating the process over time determining the effects of implemented measures environmental conditions, an overview of the actual risks can be obtained relatively easy. Also, in the event that the implementation of an action takes a long time (long-term project), the progress of the project its effects on reducing the risk have to be monited. 4 Discussion Starting to use the method requires ganizations to change the way they do risk management. Rather than having a small group of risk managers responsible f managing all risks in an ganization, this responsibility should be transferred to the people that already bear the responsibility of the business functionality from which the risk stems: line managers, product managers, project managers, as well as owners of processes, applications, systems, netwks etc. After all, they should be running the risks, so that they decide which risks to mitigate, how to invest their resources, if necessary, what additional resourcing to request f from higher management. Currently, despite various effts to quantify risks, such decisions are still often based on gut
8 8 El MetodoManaging Risks in Value Chains feeling rather than on knowledge of causes consequences. The method aims to have a risk management process in every scope sets out to provide results of sufficient value to their managers that they will actually use it. This is very much in line with the list of practices from [FrAn11]. The method only wks if the scope managers see the purpose of systematically identifying assessing risks. They should be structural honest with respect to filling in their part of the obligations expectations. After all, it is in their own interest, because they will face the consequences of not living up to their obligations. But f many managers it may feel like an extra responsibility extra bureaucracy. Meover, it can be very confronting f a manager to make its obligations explicit. It will take time resources to implement the method. Scope managers must learn how the method wks obtain skills in keeping obligations expectations. Also, after everything is set up, maintenance of the overview, even if it is only their own scope, will take efft. If the method is used, it has a great advantage: risks are assessed by people who do this the best, namely the scope managers. The method ensures that the entire ganization becomes aware of the risks be responsible f managing those risks. The method gives scope managers the tools to manage their own risks. They will identify assess risks systematically, will see the consequences of their choices. Also: the me complete the list of obligations expectations, the me complete the overview of risks will be. They can compute probabilities, risks impacts in a relatively straightfward way, tooling that automates this process is readily thinkable. Also, they may confer with their colleague managers using a common risk language. Thus the method helps managers make decisions better cooperate with one another. The wk of risk managers is simplified by the method. By using the method, an overview of value chains is created ( maintained) by the participants of that chain; risk managers only need to look f signals such as unaccepted risks, expectations that are not matched with obligations, which is easy when the method is used with a suppting system. Every signal relates to a task that managers of the associated scopes need to do. We have talked to the security officers (which also bear risk management responsibility) of a number of Dutch cpations to verify the ideas of our methodology. They recognize the problems that are sketched in section one. All security officers have to deal with a struggle f management attention, the companies do have to deal with risks stemming from their suppliers they do not have a coherent overview of current risks. They appreciate our methodology to provide a structured manner to deal with risks. Although they do not consider the presented method to be a completely new way of thinking, they do see the usefulness of method, in which several useful elements are combined into one comprehensive structural approach. Currently, we are developing a tool f risk managers scope managers so that they can get a quick overview of obligations, expectations, their dependencies the associated impacts, probabilities risks. F now, it will only provide them with a better understing of where risks come from. In the future, this tool may automatically generate a risk register that keeps track of risks as they dynamically change.
9 El MetodoManaging Risks in Value Chains 9 5 A Look into the Future At this moment the method provides a unifm manner at the operational level f understing risks. This is useful f individual scope managers, as they get insight in their own scope in the relations with other scopes, in terms of obligations expectations. Managers also get insight in risks, what their impact is what the probability is, since there is one f every obligation expectation. Suppting such managers with a single tool would be beneficial f them, as they could then simply write down remove any obligation expectation as when necessary, see the effects as they do so. We believe that this could be a valuable asset not only to managers, but also to others, e.g. marketeers SLA managers. Also, we think that (drawing) techniques used in e.g. fault tree analysis could be useful f having managers specify the functions that compute the probability of obligations not being met from the cresponding probabilities of the expectations on which such obligation depend. A suppting system would even be me beneficial if multiple scopes started using the same system. This would not imply that everyone has access to everyone else s infmation, but it could mean that managers that trust each other s infmation, in particular the probability estimates, will be relieved of tasks that can be computed from such shared infmation. F example, if a manager trusts the probabilities computed in another scope, such probabilities are shared, then the probability of every expectation to that scope can be computed from the probability of the cresponding obligation in that other scope. Such cooperation on risk issues in a value chain would facilitate the propagation of risk estimates through a value chain. Consequently, if risks line up, i.e. if selected risks from various shackles in a chain become so high that delivery of the final product of the chain becomes risky, this will automatically be signalled provided each manager signals his own risk dynamically. Eventually, a system might even provide advice with respect to measures to be taken in der to prevent catastrophes taking place. What should be further investigated is the added value of the method f chains with scopes in different ganizations. The feeling is that this method offers advantages, but this depends largely on whether the ganizations are willing to share infmation what infmation it is. 6 Conclusion In this article we presented a new way of treating risk in value chains. The method combines several existing elements into a new structured method. This method can be automated very easily. The method does not use stard threat lists, but takes obligations of ganizations their expectations put upon themselves others (e.g. suppliers) as a basis. In the method, completeness of the risk assessment depends on completeness of the lists of obligations, expectations their dependencies. An advantage of the method is that it brings risk assessment to the flo. Rather than having a small group of risk managers (often on staff level) responsible f managing all risks in an ganization, this responsibility can be transferred to the people that already bear the responsibility of
10 10 El MetodoManaging Risks in Value Chains the business functionality from which the risk stems: line managers, product managers, project managers, as well as owners of processes, applications, systems, netwks etc. The method offers clear advantages f scopes within an ganization. The idea is that this method also offers advantages to cross ganization risk assessment (in value chains), but this depends largely on whether ganizations are willing to share infmation. Even if ganizations are not willing to share infmation, the method can still be used by estimating the necessary parameters based on trust, past experience, perfmance repts / audits. We will continue to perfm research in this area. We have checked the method with a number of Dutch cpations they do see the advantages of this method have indicated they want to be involved in infmed about the future development of the method. References [FrAn11] Frigo, M.L, Anderson, R.J.: Strategic Risk Management: A Foundation f Improving Enterprise Risk Management Governance. Journal of Cpate Accounting & Finance, Volume 22, Issue 3, pages 81 88, March/April [ISF11] International Security Fum: The 2011 Stard of Good Practice f Infmation Security. ISF, June [ISO31000] ISO 31000:2009: Risk management -- Principles guidelines, November [Mille56] Miller, Gege A.: The Magical Number Seven, Plus Minus Two: Some Limits on Our Capacity f Processing Infmation. In: The Psychological Review. 1956, vol. 63, p [PiSa90] Pie, M.J, Sabel, C.F: Second Industrial Divide: Possibilities f Prosperity. Basic Books, [Sabe82] Sabel, C.F: Wk politics: the division of lab in industry. Cambridge University Press, [StGF02] Stoneburner, G, Goguen, A Feringa, A: Risk Management Guide f Infmation Technology Systems. NIST Special Publication National Institute of Stards Technology, July 2002.
CPA Practical Experience Requirements
CPA Practical Experience Requirements Does my job qualify f experience verification? The qualifying period of practical experience can begin when future CPAs attain three conditions: 1. You start wking
Major in Business Administration: Structure and Contents
Leuphana University of Lüneburg International Office Infmation Package Leuphana Bachel Maj in Business Administration Maj in Business Administration: Structure and Overview Sem. 6 Bachel s Thesis (Ma-BW-23)
Cloud Computing Risks
ISSA PREEMINENT TRUSTED GLOBAL INFORMATION SECURITY COMMUNITY Cloud Computing Risks By Richard Mosher ISSA member, Kansas City, USA Chapter Cloud computing risks still include data privacy, availability,
Final. Mark Scheme. Business Studies BUSS3. (Specification 2130) Unit 3: Strategies for Success. General Certificate of Education (A-level) June 2013
Version 1.0 General Certificate of Education (A-level) June 2013 Business Studies BUSS3 (Specification 2130) Unit 3: Strategies f Success Final Mark Scheme Mark schemes are prepared by the Principal Examiner
I.1 SERVICE LEVEL AGREEMENT MATRIX. Bidders must complete the following SLA Matrix as applicable to category bid.
I.1 SERVICE LEVEL AGREEMENT MATRI Bidders must complete the following SLA Matrix as applicable to categy bid. SERVICE LEVELS, BY CLASS of SERVICE Unless otherwise specified, all classes of Voice, Connectivity
Procurement Capability Assessment
Procurement Capability Assessment Procurement Capability Assessment The Scottish Government, Edinburgh 2009 Crown copyright 2009 ISBN: 978-0-7559-9024-5 (web only) The Scottish Government St Andrew s House
Non-Destructive Test (NDT) and Non-Destructive Evaluation (NDE) Requirements
Table of Contents 1.0 Purpose/Scope/Timing... 2 1.1 Scope... 2 1.2 Communication... 2 1.3 Compliance Date... 2 2.0 Procedure / Quality Recd Requirements... 2 2.1 General Requirements... 2 2.2 Requirements
PROJECT MANAGEMENT PROGRAM
PROJECT MANAGEMENT PROGRAM Managing projects are fundamentally different from other management specialties. That is the projects nmally have multiple stakeholders each with differing requirements and objectives.
ISO 19600: The development
1 Baltzer Science Publishers ISO 19600: The development of a global standard on compliance management By Sylvie Bleker and Dick Hortensius* It has been a traditional complaint of the global compliance
Tab 19 Page 1 of 1. DiRAD Technologies, Inc. 9 Corporate Drive Clifton Park, New York 12065
Tab 19 Page 1 of 1 DiRAD Technologies, Inc. 9 Cpate Drive Clifton Park, New Yk 12065 Comprehensive Telecommunications s RFP 20268 Bid opening date: May 5, 2009 11:00 a.m. Level Agreement s Included is:
Managed Solution Center s TSM Managed Services FAQ
Managed Solution Center s TSM Managed Services FAQ Frequently Asked Questions 1. Will this invalidate our IBM Warranty / Maintenance? No. IBM warranty will not be affected as TSM code is not being modified
Project Risk Management Using the Project Risk FMEA
Project Risk Management Using the Project Risk FMEA Thomas A. Carbone, Fairchild Semiconduct Cpation Donald D. Tippett, The University of Alabama in Huntsville Abstract: Identifying and mitigating project
Strategic wealth management for entrepreneurs and business owners
Wealth and Investment Management Strategic wealth management f entrepreneurs and business owners A snapshot of Volume 4: Pre-IPO planning Who should be on the IPO advisy team and what specific roles do
Quality Management Systems. Compliance Driven or Quality Driven?
Quality Management Systems Compliance Driven or Quality Driven? Written by N. Richard Puglielli Page 1 of 7 Overview ISO standards have been around for quite some time now and the concept behind these
Answer Question No. 1 which is compulsory and any five from the rest. a) What are the various components of electronic commerce applications?
E-Commerce Questions:- Question Paper 1 Full Marks 70 Time: 3 Hours Answer Question No. 1 which is compulsy and any five from the rest. The figures in the right-hand margin indicate marks. 1) Answer the
Appendix 3 (normative) High level structure, identical core text, common terms and core definitions
Appendix 3 (normative) High level structure, identical core text, common terms and core definitions NOTE In the Identical text proposals, XXX = an MSS discipline specific qualifier (e.g. energy, road traffic
Final. Mark Scheme. Business Studies BUSS2. (Specification 2130) Unit 2: Managing a Business. General Certificate of Education (A-level) June 2013
Version 1.0 General Certificate of Education (A-level) June 2013 Business Studies BUSS2 (Specification 2130) Unit 2: Managing a Business. Final Mark Scheme Mark schemes are prepared by the Principal Examiner
Residential Heating and Cooling Systems
Constium f Energy Efficiency Residential Heating Cooling Systems Initiative Description F infmation, contact: Lauren Liecau, Program Manager [email protected] 617-337-9277 Gege M. Chapman, Seni Program Manager
The following is a list of some of the more critical compliance objectives required to be NIMS compliant.
Page 1 John A. Logan College in codination with Homeland Security, local and state emergency management is providing free opptunities to the community to meet many of the requirements to become NIMS compliant.
IRIS International Railway Industry Standard GUIDELINE 1 : 2011 KPIs
IRIS International Railway Industry Standard GUIDELINE 1 : 2011 KPIs English We would like to thank the following people f the excellent cooperation and contribution, without which this Guideline would
ASL 2, An introduction
ASL 2, An introduction Machteld Meijer and Louk Peters - Introduction - Why ASL? - What is ASL? - ASL framework - What can you do with ASL? - ASL in relation to other frameworks - More Info Introduction
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
ISO 9001 Quality Management Systems Professional
ISO 9001 Quality Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. The non-fulfillment of a specified requirement is called a: A. Concession B. Nonconformity
Clustering for Load Balancing and Fail Over
Clustering f Balancing and Fail Over Last updated: 16/07/2015 Table of contents 1 Introduction...3 2 HTTP-Based Scenarios...5 2.1 Leverage LB Stickiness Options 1.A...5 2.1.1 Option 1.A.1 IP- Based...5
GAO CORE FINANCIAL SYSTEM REQUIREMENTS. Checklist for Reviewing Systems under the Federal Financial Management Improvement Act
GAO United States Government Accountability Office Financial Management Series February 2005 CORE FINANCIAL SYSTEM REQUIREMENTS Checklist f Reviewing Systems under the Federal Financial Management Improvement
SERVICE LEVEL AGREEMENT MATRIX
SERVICE LEVEL AGREEMENT MATRI SERVICE LEVELS, VoIP CnerStone Telephone s Level agreement provided herein is limited to the scope of services it is proposing in this response to the RFP. Specifically, our
What makes a good process?
Rob Davis Everyone wants a good process. Our businesses would be more profitable if we had them. But do we know what a good process is? Would we recognized one if we saw it? And how do we ensure we can
A-LEVEL BUSINESS STUDIES
A-LEVEL BUSINESS STUDIES BUSS3 Strategies f Success Mark scheme 2130 June 2014 Version V1.0: Final Mark schemes are prepared by the Lead Assessment Writer and considered, together with the relevant questions,
NOTICE OF EXAMINATION
BILL DE BLASIO May STACEY CUMBERBATCH Commissioner THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATION UNIT 1 CENTRE STREET, 14 TH FLOOR NEW YORK, NY 10007 NOTICE OF EXAMINATION
COMPUTER INFORMATION SYSTEMS (CIS)
computer infmation systems (CIS) 117 COMPUTER INFORMATION SYSTEMS (CIS) Computer Infmation, and why you should study CIS. Computer Infmation enhances computer literacy. Computer literacy is having knowledge
Advanced Degree Options & General Education
Ranken s flexible evening programs allow you to advance your career without slowing down at wk. Whether you are seeking a degree, attaining a new certification, attending an industry seminar, Ranken offers
Quality Risk Management
PS/INF 1/2010 * * Quality Risk Management Quality Risk Management Implementation of ICH Q9 in the pharmaceutical field an example of methodology from PIC/S Document > Authors: L. Viornery (AFSSAPS) Ph.
Professional Organization Checklist for the Computer Information Systems Curriculum
Professional Organization Checklist f the Computer Infmation Systems Curriculum Association of Computing Machinery and Association of Infmation Systems IS 2002 Model Curriculum and Guidelines f Undergraduate
COOMBE WOMEN AND INFANTS UNIVERSITY HOSPITAL JOB DESCRIPTION Staff Grade Medical Scientist
COOMBE WOMEN AND INFANTS UNIVERSITY HOSPITAL JOB DESCRIPTION Staff Grade Medical Scientist Repts to: Departmental Chief Medical Scientist, Chief Medical Scientist (Lab Manager), Consultant Head of Department
POL ENTERPRISE RISK MANAGEMENT SC51. Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT:
POL ENTERPRISE RISK MANAGEMENT SC51 POLICY CODE: SC51 DIRECTORATE: Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT: Executive Support Services RESPONSIBLE OFFICER:
SOUTH INFIRMARY VICTORIA UNIVERSITY HOSPITAL, CORK Old Blackrock Road, Cork
SOUTH INFIRMARY VICTORIA UNIVERSITY HOSPITAL, CORK Old Blackrock Road, Ck The South Infirmary Victia University Hospital invites applications f the post of: Section Officer (Grade VI) Personal Assistant
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
TsB2BUA Back-to-Back User Agent Server Overview
Ts2 ack-to-ack User gent Server Overview Source Code SDK Ts2 from TeleSoft International is a highly ptable, highly scalable software ack-to-ack User gent ackto-acksession Initiation Protocol server (
The most important agreements in the Double Master Degree Programme
The most imptant agreements in the Double Master Degree Programme f the study programmes Economics, Business Management, Management Science and Engineering, Accounting, and Professional MBA at the China
Data Communications Company (DCC) price control guidance: process and procedures
Guidance document Contact: Tricia Quinn, Senior Economist Publication date: 27 July 2015 Team: Smarter Metering Email: [email protected] Overview: The Data and Communications Company (DCC) is required
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14
Outsourcing and Information Security
IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
ACCOUNTING/BOOKKEEPING AS A CAREER Program Instructor/Advisor: James Halstead, (360) 538-4173 [email protected]
ACCOUNTING/BOOKKEEPING AS A CAREER Program Instruct/Advis: James Halstead, (360) 538-4173 [email protected] F me infmation about our graduation rates, the median debt of students who completed the
Business Continuity Planning. Presentation and. Direction
Business Continuity Planning Presentation and Direction Thomas Bronack, president Data Center Assistance Group, Inc. 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Email: [email protected]
ENGINEERING COUNCIL. Guidance on Risk for the Engineering Profession. www.engc.org.uk/risk
ENGINEERING COUNCIL Guidance on Risk for the Engineering Profession www.engc.org.uk/risk This guidance describes the role of professional engineers and technicians in dealing with risk, and their responsibilities
NCOVER THE LEADING.NET CODE QUALITY PLATFORM
THE LEADING.NET CODE QUALITY PLATFORM Extends Your Microsoft Visual Studio September 2009 Tayls, Extends Your Microsoft Extend Your Development Environment and Reduce Risk The emergence of team-based development
FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements
GHTF/SG4/N28R4:2008 FINAL DOCUMENT Title: Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Authoring Group: GHTF Study Group 4 Endorsed by: The Global Harmonization
The key to success: Enterprise social collaboration fuels innovative sales & operations planning
Manufacturing The key to success: Enterprise social collaboration fuels innovative sales & operations planning As the sales and operations planning leader, you have a few principal responsibilities: setting
Disaster Recovery Policy
Disaster Recovery Policy INTRODUCTION This policy provides a framework for the ongoing process of planning, developing and implementing disaster recovery management for IT Services at UCD. A disaster is
I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
Supporting Effective Evaluations: A Guide to Developing Performance Measurement Strategies
Home > Centre of Excellence for Evaluation Supporting Effective Evaluations: A Guide to Developing Performance Measurement Strategies 6.0 Performance Measurement Strategy Framework 6.1 Overview of the
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
International Association of Oil & Gas Producers Process Safety Recommended Practice on Key Performance Indicators. Report No.
International Association of Oil & Gas Producers Process Safety Recommended Practice on Key Perfmance Indicats Rept No. 456 November 2011 Table of Contents Section 1 The need f process safety Key Perfmance
WORKING DRAFT. Chapter 5 - Transfer Pricing Methods (Transactional Profit Methods) 1. Introduction
This is a working draft of a Chapter of the Practical Manual on Transfer Pricing for Developing Countries and should not at this stage be regarded as necessarily reflecting finalised views of the UN Committee
Configuring Optional Re-Registration on Failover Behavior
Engineering Advisy 66546 Configuring Optional Re-Registration on Failover Behavi This engineering advisy describes optional failover behavis that you can set up to enhance server redundancy technologies
Fund or Managed Account?
whitepaper n? Befe Launching A Hedge, Managers May Consider A Program Instead One of the first decisions a prospective money manager should make is whether it would be better, given their particular circumstances,
Time Series Clustering for Demand Response An Online Algorithmic Approach
Time Series Clustering f Demand Response An Online Algithmic Approach Ranjan Pal, Student Member, IEEE, Charalampos Chelmis, Member, IEEE, Marc Frincu, Member, IEEE, Vikt Prasanna, Fellow, IEEE 1 Abstract
ITIL V3 and ASL Sound Guidance for Application Management and Application Development
For IT V3 and Sound Guidance for Application and Application Development Machteld Meijer, Mark Smalley & Sharon Taylor Alignment White Paper January 2008 V3 & : A Comparison Abstract In May 2007, the Office
UBIS International Study Abroad Program
UBIS Study Abroad Program Program Description: The UBIS Bachel in Administration (BBA) provides students with the necessary knowledge and practical skills f a career in the private sect in all domains,
Office Systems Administration
Catalog 2004-2006 Page 1 O ffice Systems Administration Direct Prof. Luz M. Vega Orozco HISTORY AND OBJECTIVES In 1967, the Secretarial Sciences Department opened its dos to the community at the University
Policy 10.105: Enterprise Risk Management Policy
Name: Responsibility: Complements: Enterprise Risk Management Framework Coordinator, Enterprise Risk Management Policy 10.105: Enterprise Risk Management Policy Date: November 2006 Revision Date(s): January
Doctorate Degrees by Research
Doctate Degrees by Research Doct of Philosophy (PhD) 2014 Calendar The University of Adelaide These Program Rules should be read in conjunction with the University s policies (http://www.adelaide.edu.au/policies)
Outsourcing Risk Guidance Note for Banks
Outsourcing Risk Guidance Note for Banks Part 1: Definitions Guideline 1 For the purposes of these guidelines, the following is meant by: a) outsourcing: an authorised entity s use of a third party (the
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena
University of New England Compliance Management Framework and Procedures
University of New England Compliance Management Framework and Procedures Document data: Document type: Administering entity: Framework and Procedures Audit and Risk Directorate Records management system
Require2015 Academic Requirements for students at Massey University who wish to become a
Require2015 Academic Requirements f students at Massey University who wish to become a Chartered Accountant (CA) Associate Chartered Accountant (ACA) Accounting Technician (AT) 2015 Academic requirements
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION
14 December 2006 GUIDELINES ON OUTSOURCING
14 December 2006 GUIDELINES ON OUTSOURCING CEBS presents its Guidelines on Outsourcing. The proposed guidelines are based on current practices and also take into account international, such as the Joint
Outcome Based Education Performance Evaluation on Final Year Degree Project
Outcome Based Education Perfmance Evaluation on Final Year Degree Project NORAZLAN HASHIM, HADZLI HASHIM Faculty of Electrical Engineering, Universiti Teknologi MARA, 40450 Shah Alam, MALAYSIA. [email protected],
Implementing a Quality Management System for an Engineering and Services Company
Roope Seppälä Implementing a Quality Management System for an Engineering and Services Company Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Industrial Management Thesis 23
Methodological Issues for Interdisciplinary Research
J. T. M. Miller, Department of Philosophy, University of Durham 1 Methodological Issues for Interdisciplinary Research Much of the apparent difficulty of interdisciplinary research stems from the nature
Intelligent Contact Center Telephone Administration Guide. Avaya Business Communications Manager Release 6.0
Intelligent Contact Center Telephone Administration Guide Avaya Business Communications Manager Release 6.0 Document Status: Standard Document Number: NN40170-600 Document Version: 02.02 Date: October
METROPOLITAN WASHINGTON AIRPORTS AUTHORITY HUMAN RESOURCES MANAGEMENT SYSTEM (HRMS)
METROPOLITAN WASHINGTON AIRPORTS AUTHORITY HUMAN RESOURCES MANAGEMENT SYSTEM (HRMS) STATEMENT OF WORK CONTRACT NUMBER: 1-16-C006 AUGUST 2015 Contents 1. Purpose and Background... 1 1.1 BACKGROUND... 1
SUMMARY OF CATEGORIES 2007 STATEWIDE PRESERVATION PROGRAM (SPP) _MAINTAIN IT_
2007 STATEWIDE PRESERVATION (SPP) _MAINTAIN IT_ 1 Preventive Maintenance and Rehabilitation MING AUTHORITY allocation by fmula. Projects selected by districts. State % 0% State Districts RANKING INDEX
