Big Data Analytics; The value of the right action. April 1 st, 2014 Edwin Steenvoorden VP Business Analytics & Information Strategy

Size: px
Start display at page:

Download "Big Data Analytics; The value of the right action. April 1 st, 2014 Edwin Steenvoorden VP Business Analytics & Information Strategy"

Transcription

1 Big Data Analytics; The value of the right action April 1 st, 2014 VP Business Analytics & Information Strategy Better intelligence, smarter decisions

2 Introduction Better intelligence, smarter decisions

3 Big Data Value of the right action 3

4 Einstein (on Analytics??) Everything that can be counted does not necessarily count; everything that counts cannot necessarily be counted. Everything should be made as simple as possible, but not simpler Big Data Value of the right action 4

5 Peter Hinssen / Jer Thorpe It is no longer about technology but about the application More things are becoming data Big Data Value of the right action 5

6 Better intelligence, smarter decisions

7 Big Data Value of the right action 7

8 Big Data Value of the right action 8

9 Big Data Value of the right action 9

10 The BI Landscape Better intelligence, smarter decisions

11 Big Data Analytics, what is all the fuss about? But the hype is over! Better intelligence, smarter decisions

12 Trough of disillusionment. Better intelligence, smarter decisions 12

13 Big Data Value of the right action

14 Putting information to work is an organizational capability! Big Data Value of the right action 14

15 Smarter Decisions Big Data Value of the right action 15

16 The Bat and the Ball A bat and ball cost $ The bat cost one dollar more than the ball. How much does the ball cost? Daniel Kahneman; Thinking Fast and Slow Big Data Value of the right action 16

17 Data and its place in the technology clusters Big Data Value of the right action 17

18 5 (Big) Data trends Big Data Value of the right action 18

19 Better intelligence.smarter Decisions Digital Channels WCM Predictive Analytics DIGITAL CHANNEL SERVICES RADICAL COST REDUCTION BIM Maturity APS Data Science INFORMATION TO BUSINESS VALUE Socail INFORMATION STRATEGY PAM Bay of value ENTERPRISE INFORMATION FOUNDATION INFORMATION AS A SERVICE In memory Databases Business Value Better intelligence, smarter decisions Mainland of Legacy

20 Product Development & Maintenance SAS CLS BI AUI BI CLS AUI Policy Data Capture Customer Information Mgmt Channels (Exclusive Agents, Independent Agents, Direct, Affinity) Underwriting Rules / Exceptions (Reg & Comp) Policy Editing & Validation Rules Forms Management Rate Development & Maintenance / Rate Algorithm Dev Regulatory Approval Management Actuarial Support Inquiry Customer Information Maintenance CLS CLS MIS Customer Servicing Regulatory Compliance BI Product & Policy Audit Audit Repository Statutory Reporting Marketing & Sales Support BI Distribution Channel Management Marketing & Sales Support CLS Actionable Insight Report Development CLS AUI AUI Underwriting Quote Inspection & Audit Tier Placement Underwriting Rule Execution Case Review CAT Exposure Management CLS Management & Control (Business Intelligence) CAT Exposure Development Mgmt Policy Life-Cycle Management AUI CLS Policy Validation Policy Storage & Retrieval Policy Updates Rating Execution Policy Issuance Document Production Scheduled Activity BI AUI External Business Relationships CLS MIS Report Production Business Integration AUI Bill Issuance & Payment Collection 3 rd Party Interaction Payment Plan Development Payment Collection & Application Bill Calculation and Summarization Commission Calculation and Summarization Bill Format & Production Cash Disbursement CLS BI Claims / Benefits Disbursement Operations AUI AUI BI Business Activity Monitoring Operational Statistics Notification & Intake Fraud Identification & Investigation Policy & Coverage Verification Product & Bus. Rules Management Settlement Loss Cost Management Loss Estimation Recovery End of CY 2007 H H H Initial ING Access infrastructure E2E element monitoring events, requirement thresholds and s defined responses (tools, identified events, thresholds, responses, people) Org training & communications plan defined Create a repository Procedures for for creating monitored Procedures and events, and templates maintaining thresholds for E2E inventory of and requirements monitored threshold gathering events, responses developed thresholds and threshold responses E2E monitoring requirements defined for top 20 apps (tools, events, thresholds, responses, people) Correlation relationship definitions for top 20 apps defined (including Top 5 apps) Execution of E2E plan, build and run processes (people, process & technology) E2E requirements and standards refreshed to align with tool portfolio E2E activities integrated with SDLC Command Center Operational for E2E Run H Processes updated to map to new E2E tool suite E2E design, build and test checkpoints established for all new Wave deployment E2E integrated projects of 20 apps into with future E2E tools & plan state Svc Mgt for future apps in processes 2009 Enterprise correlation engine implemented End User monitoring implemented Domain-level correlation implemented OLA requirements and E2E activities integrated 3 rd party implications with existing Service defined Implement E2E Mgmt processes tool (HW & SW) E2E integrated into Top 5 Apps Deployed on Tower and app team security & risk review E2E (interim state) accountability established for process E2E (interim OLA definitions) E2E tool suite training developed Governance process for managing tool & initiated portfolio implemented E2E controls Decide on and purchase E2E tool portfolio established in PAR new E2E tool suite E2E Manager E2E Support Team rationalized Hired/Appointed Established Interim tool standards defined Financial Accounting Control Infrastructure Performance Management Talent Development Budgeting & Forecasting Realign OOMC controller reporting relationship Define financial and operating reporting requirements to identify data requirements Define OOMC finance competency model Establish 360 review process, policies, and questionnaire. Define joint HRB and OOMC Forecasting & Budgeting Requirements and identify data requirements Input (Artifacts) Offer Letter Trading 407 Letter Accounts Report Holdings Report Process Output (Artifacts) Owner: HR Owner: HR Owner: HR Offer Letter Owner: Compliance Owner: Brokerage /IT STRUCTURE AND STABILIZE OPERATIONALIZE AND STANDARDIZE CONTINOUS IMPROVEMENT Business Complete data map Define & implement data ownership structure Define process control mechanisms and accountabilities Create and source OOMC performance management role Conduct 360 review of OOMC finance employees and complete gap analysis Define talent acquisition/development strategies Design supporting process Implement manual process fixes where feasible Implement process control mechanisms Implement standardized reporting Identify required control & diagnostic metrics for FA processes Assign accountabilities for control & diagnostic metrics for FA processes Define strategic process/product metric model Define career path options & succession planning Create and communicate a targeted development plan for each employee Hyperion Implementation Identify process improvement projects Define baseline and target metrics for FA processes Define strategic process/ product metrics Assign accountabilities for process / product metrics Design individual performance measurement model Assign performance metrics Ongoing continuous improvement Implement individual performance management model within Finance Owner: Compliance Owner: LOB Mgr YES Trading Policy Sign-Off Owner: Compliance 407 Letter Accounts Report Holdings Report Owner: LOB Mgr Holdings Non- Compliance Report Auditable Process /Artifact Location HR Employee File PeopleSoft HR HR Employee File Dataware Compliance Employee File Validate Employee Record in PeopleSoft HR & Employee Folder Owner: HR Owner: Compliance Validate disclosure Reports in HR Employee File and /against Brokerage Holdings data In Dataware Reports Owner: Compliance The Intelligence Enterprise Roadmap Intelligent Enterprise (IE) Roadmaps allow us to ensure that information management capabilities and initiatives are aligned with an organization s strategic business objectives. Needs of the Business Architecture Documentation Stakeholder Interviews Decision Support Reports Process Documentation Inputs Large volume of Error Logs information logs 41 % 130 MB prevent events from being sent to MLIF database Informational Logs in a timely 12 % Warning Logs manner. Impacts 47 % 38 MB troubleshooting 151 MB efficiency. Statistics are based upon provided Application event logs which are sent to MLIF database Level 3 Workflow Processes are Elaborated into Auditable Level 4 Input /Output Controls & Deliverables Policy Sign-Off Current State Assessment Future State Definition Blueprint & Roadmap Outputs Needs Analysis Quick Hits & Tactical Improvements CLS Documerge Service Point WAG Actuarial Workstation Excel ecms-c eagent / WAG Truck and Work Comp Mainfiles AION Field Data iaccess CLS Documerge Std Billing Pred Model Pred Model SQL,SAS Report New Billing System CLS ACS EASYPAY / Std Billing ACE EASYPAY/Std Billing Target Environment Definition CRN/FACT ( no work comp) WCS Requirements Definition Process Development Process Integration Organization & Governance Technology Transformation Roadmap Initiative Priorities & Dependencies 30 Days* 90 Days* 180 Days* 9 Months* One Year* Case Governance Model Implementation Plan Big Data Value of the right action 20

21 5 Critical Deliverables Vision & Principles Big Data Value of the right action 21

22 Observations on Business Analytics Better intelligence, smarter decisions 22

23 Big Data Value of the right action

24 Big Data Value of the right action 24

25 Big Data Value of the right action 25

26 Big Data Value of the right action 26

27 Big Natural Disasters Big Data Value of the right action 27

28 Big Data Deployment : From Satellite to Mobile device Big Data Value of the right action 28

29 Big Data Deployment : 7 examples Big Data Value of the right action 29

30 Case Study: Bank Cyber Crime ($ 45 mio) Source: Cyberrisk in Banking, SAS Whitepaper Big Data Value of the right action 30

31 Case Study: Target CI Analytics Forbes magazine Big Data Value of the right action 31

32 Conclusion Better intelligence, smarter decisions

33 Twain vs. Einstein "It is difficult to make predictions, especially about the future more than the past I am interested in the future, because that is where I plan to live Big Data Value of the right action 33

34 Change.. With a vision in small increments Big Data Value of the right action 34

35 Change.. With a vision in small increments Wave 1 Fixing the Basics Wave 2 Growing Wave 3 Expanding Business Adoption Business Performance Management Define KPI s, Threats, Rules, etc. Data Catalogue 3.0 Data Catalogue Assess 2.0 satisfaction & awareness Create awareness of Data BI & Analytics Catalogue 1.0 at users and Analytical API Big Data stakeholders Governance setup Capabilities Development Demand Platform & implementation BI Maintenance Business Business Management & Support Enablers Relationship setup setup Data Coherence Management BI Delivery Informatio Engage Enterprise setup Data Integration Development Management n Strategy Architecture Privacy Catalogue setup setup Officer Lifecycle Technical Information Management Design Application Architectu Architecture setup setup Authority Architecture setup re setup setup Information Strategy BI Competency Center BI Service Center BI Technology Big Data Value of the right action 35

36 With: Data, Data & Data Big Data Value of the right action 36

37 Big Data Value of the right action 37

38 The information contained in this presentation is proprietary Capgemini. All rights reserved

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by:

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by: CARLETON UNIVERSITY POSITION DESCRIPTION Position Title: Manager, HR Systems Position No.: 298879 Reports to: Department: Assistant Director HR, Talent Programs Human Resources Approved by: (Incumbent/Date)

More information

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

Presented By: Leah R. Smith, PMP. Ju ly, 2 011 Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Technical Management Strategic Capabilities Statement. Business Solutions for the Future Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

Architecture Description Framework for Enterprise Systems - A Layered Approach

Architecture Description Framework for Enterprise Systems - A Layered Approach Architecture Description Framework for Enterprise Systems - A Layered Approach Ananth Chandramouli, Santonu Sarkar, Riaz Kapadia and Venugopal Subbarao The Open Group s Second Architecture Practitioners'Conference,

More information

Internal audit value optimization for insurance organizations

Internal audit value optimization for insurance organizations Internal audit value optimization for insurance organizations Webinar May 13, 2015 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

More information

04 Executive Summary. 08 What is a BI Strategy. 10 BI Strategy Overview. 24 Getting Started. 28 How SAP Can Help. 33 More Information

04 Executive Summary. 08 What is a BI Strategy. 10 BI Strategy Overview. 24 Getting Started. 28 How SAP Can Help. 33 More Information 1 BI STRATEGY 3 04 Executive Summary 08 What is a BI Strategy 10 BI Strategy Overview 24 Getting Started 28 How SAP Can Help 33 More Information 5 EXECUTIVE SUMMARY EXECUTIVE SUMMARY TOP 10 BUSINESS PRIORITIES

More information

BUSINESS INTELLIGENCE

BUSINESS INTELLIGENCE BUSINESS INTELLIGENCE Enabling Insights Across the Enterprise Patrick Callahan AST Corporation Practice Director Business Intelligence Naperville, Illinois USA 2011 Southern California Public Sector EBS

More information

Making Data Work. Florida Department of Transportation October 24, 2014

Making Data Work. Florida Department of Transportation October 24, 2014 Making Data Work Florida Department of Transportation October 24, 2014 1 2 Data, Data Everywhere. Challenges in organizing this vast amount of data into something actionable: Where to find? How to store?

More information

ITIL V3 differences from V2

ITIL V3 differences from V2 ITIL V3 differences from V2 Stuart Rance FISM, CISSP 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda Overall differences Brief

More information

Enterprise Data Governance

Enterprise Data Governance DATA GOVERNANCE Enterprise Data Governance Strategies and Approaches for Implementing a Multi-Domain Data Governance Model Mark Allen Sr. Consultant, Enterprise Data Governance WellPoint, Inc. 1 Introduction:

More information

Putting Business Capabilities to Work

Putting Business Capabilities to Work Putting Capabilities to Work Jeff Scott VP/ & Technology Strategy OMG Webinar January 15, 2014 Who is Accelare? Innovative Process Thought Leadership Powerful Technology Experts in strategy execution and

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Measuring Continuity Planning Program. Performance

Measuring Continuity Planning Program. Performance Measuring Continuity Planning Program Performance Carl B Jackson Director Crisis Management & Continuity Planning Resource Center (CMCPRC) Measuring Continuity Planning Program Performance Session Agenda

More information

Business Intelligence (BI) Data Store Project Discussion / Draft Outline for Requirements Document

Business Intelligence (BI) Data Store Project Discussion / Draft Outline for Requirements Document Business Intelligence (BI) Data Store Project Discussion / Draft Outline for Requirements Document Approval Contacts Sign-off Copy Distribution (List of Names) Revision History Definitions (Organization

More information

QA Engagement Models. Managed / Integrated Test Center A Case Study

QA Engagement Models. Managed / Integrated Test Center A Case Study 1 QA Engagement Models Managed / Integrated Test Center A Case Study 2 Today s Agenda» Background» Overview of QA Engagement Models MTC & ITC» The Journey to Steady State» Transition Approach» Challenges

More information

Getting Business Value from Customer Engagement. Chet Geschickter, Research Director Gartner Energy & Utilities Industries Research

Getting Business Value from Customer Engagement. Chet Geschickter, Research Director Gartner Energy & Utilities Industries Research Getting Business Value from Customer Engagement Chet Geschickter, Research Director Gartner Energy & Utilities Industries Research 1 How Gartner Delivers Value Gartner research helps clients review, develop,

More information

<Insert Picture Here> The role of BI in your ERP and Performance Management Initiatives

<Insert Picture Here> The role of BI in your ERP and Performance Management Initiatives The role of BI in your ERP and Performance Management Initiatives Isabel Schuler-Calise, Principal Sales Consultant isabel.schuler-calise@oracle.com Zürich, 17. November 2011 The

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

Data Migration through an Information Development Approach An Executive Overview

Data Migration through an Information Development Approach An Executive Overview Data Migration through an Approach An Executive Overview Introducing MIKE2.0 An Open Source Methodology for http://www.openmethodology.org Management and Technology Consultants Data Migration through an

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

BI STRATEGY FRAMEWORK

BI STRATEGY FRAMEWORK BI STRATEGY FRAMEWORK Overview Organizations have been investing and building their information infrastructure and thereby accounting to massive amount of data. Now with the advent of Smart Phones, Social

More information

Technology Supporting Performance and Quality Leadership

Technology Supporting Performance and Quality Leadership Technology Supporting Performance and Quality Leadership Prepared for: PMIWDC and FAA Program Office Presented by: John Mullins - Director Strategy and People mullins.john@serco-na.com 703-234-6459 Chuck

More information

Foundation. Summary. ITIL and Services. Services - Delivering value to customers in the form of goods and services - End-to-end Service

Foundation. Summary. ITIL and Services. Services - Delivering value to customers in the form of goods and services - End-to-end Service ITIL ITIL Foundation Summary ITIL and s Design s - Delivering value to customers in the form of goods and services - End-to-end ITIL Best Practice - Scalable and not prescriptive - Gathered from Users,

More information

Effective Utilization of SAP ERP HCM as an Efficient & Cost Saving Tool in Business

Effective Utilization of SAP ERP HCM as an Efficient & Cost Saving Tool in Business Session Effective Utilization of SAP ERP HCM as an Efficient & Cost Saving Tool in Business Janardhan N Lead CoE-SAP HCM Wipro Coverage 1 HR Deliverables Generic View 2 SAP Technology Vital Elements 3

More information

SDLC- Key Areas to Audit in IT Projects ISACA Geek Week 2013 8/21/2013. PwC

SDLC- Key Areas to Audit in IT Projects ISACA Geek Week 2013 8/21/2013. PwC SDLC- Key Areas to Audit in IT Projects ISACA Geek Week 2013 8/21/2013 1 Introductions and Projects Overview Presenters Charlie Miller and Andrew Gerndt The Coca-Cola Company Principal IT Auditors Atlanta,

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

Business Architecture A Balance of Approaches to Implementation. Business Architecture Innovation Summit June 2013 Presenter: Andrew Sommers

Business Architecture A Balance of Approaches to Implementation. Business Architecture Innovation Summit June 2013 Presenter: Andrew Sommers Business Architecture A Balance of Approaches to Implementation Business Architecture Innovation Summit June 2013 Presenter: Andrew Sommers Implementing Business Architecture at Capital Group Positioning

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

Innovation Conference Cloud based intelligent future services an IBM perspective

Innovation Conference Cloud based intelligent future services an IBM perspective Innovation Conference Cloud based intelligent future services an IBM perspective Veszprém, 2011. March 30th Pongrácz, Ferenc COO, IBM Magyarország IT Industry growth is recovering with high growth areas

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

Why Location Matters in Insurance - Business Analytics

Why Location Matters in Insurance - Business Analytics Esri EMEAUC13 Why Location Matters in Insurance - Business Analytics Location has intrinsically been a part of insurance since the beginning - at Lloyd's Coffee Shop one of the first questions would be

More information

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely

More information

Enterprise Project Management Buyer s Guide

Enterprise Project Management Buyer s Guide Considerations for Tools and Features Enterprise Project Buyer s Guide Heather Champoux, PMP hchampoux@uplandsoftware.com Agenda Introduction to EPM SaaS vs. On Premise SaaS Benefits SaaS Candidates SaaS

More information

Aligning CMMI & ITIL. Where Am I and Which Way Do I Go? 2006 - cognence, inc.

Aligning CMMI & ITIL. Where Am I and Which Way Do I Go? 2006 - cognence, inc. Aligning CMMI & ITIL Where Am I and Which Way Do I Go? 2006 - cognence, inc. Agenda Where Am I? Current Situation Process Improvement Objectives How Do I Get There? CMMI ITIL Mapping, Commonalities, Differences

More information

EMC PERSPECTIVE. Information Management Shared Services Framework

EMC PERSPECTIVE. Information Management Shared Services Framework EMC PERSPECTIVE Information Management Shared Services Framework Reader ROI Information management shared services can benefit life sciences businesses by improving decision making by increasing organizational

More information

Where are my savings? Best Practices in Project Benefit Validation

Where are my savings? Best Practices in Project Benefit Validation Where are my savings? Best Practices in Project Benefit Validation Julie Brignac, Principal November 2013 Brighton Landing West 10 Guest Street Boston, MA USA 02135 www.vantagepartners.com This publication

More information

Oracle Daily Business Intelligence. PDF created with pdffactory trial version www.pdffactory.com

Oracle Daily Business Intelligence. PDF created with pdffactory trial version www.pdffactory.com Oracle Daily Business Intelligence User Reporting Requirements and Daily Business Intelligence Historical Business Analysts (Warehouse,see trends, drill from detailed information to summaries and back

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Fermilab Computing Division Service Level Management Process & Procedures Document

Fermilab Computing Division Service Level Management Process & Procedures Document BMC Software Consulting Services Fermilab Computing Division Process & Procedures Document Client: Fermilab Date : 07/07/2009 Version : 1.0 1. GENERAL Description Purpose Applicable to Supersedes This

More information

Today s webcast will begin shortly.

Today s webcast will begin shortly. WorkForce Software Webcast Today s webcast will begin shortly. Join in on the conversation after the webinar! Follow us on Twitter: @WorkForceSW Visit our blog at http://workforcesoftware.com/blog Getting

More information

How To Implement An Enterprise Resource Planning Program

How To Implement An Enterprise Resource Planning Program ERP Implementation Program Key phases of ERP implementation: Analysis of the company existing or designing new business process descriptions Inventory of the company s existing formal workflows or designing

More information

Certified Information Professional 2016 Update Outline

Certified Information Professional 2016 Update Outline Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability

More information

JDE/ERP Strategy & Roadmap. C r a i g T h i e l e n

JDE/ERP Strategy & Roadmap. C r a i g T h i e l e n JDE/ERP Strategy & Roadmap C r a i g T h i e l e n 2011 Trissential. All Rights Reserved. 1 2011 Trissential. All Rights Reserved. 2 2011 Trissential. All Rights Reserved. 3 Oracle Investment in JDE Past

More information

Building for the future

Building for the future Building for the future Why predictive analytics matter now William Gaker Goals for today Growth and establishment of the people analytics field Best practices for building a people analytics function

More information

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer

Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer Terry Bouziotis: Director, IT Enterprise Master Data Management JJHCS Bob Delp: Sr. MDM Program Manager

More information

www.pwc.com Tax technology Megatrends and the impact on tax functions January 2014

www.pwc.com Tax technology Megatrends and the impact on tax functions January 2014 www.pwc.com Tax technology Megatrends and the impact on tax functions Megatrends Competitive and Regulatory pressures Focus Areas Virtual teams enabled by technology Document management platforms Shift

More information

Wilhelmenia Ravenell IT Manager Eli Lilly and Company

Wilhelmenia Ravenell IT Manager Eli Lilly and Company Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience

More information

Accenture cloud application migration services

Accenture cloud application migration services Accenture cloud application migration services A smarter way to get to the cloud Cloud computing can help make your apps extraordinarily agile and scalable. You know this. Your competitors know this. And

More information

PMP Examination Tasks Puzzle game

PMP Examination Tasks Puzzle game PMP Examination Tasks Puzzle game Here is a great game to play to test your knowledge of the tasks you will be tested on in the actual examination. What we have done is take each of the domain tasks in

More information

iapps Consulting DWC LLC Fixed Scope Offering (FSO) For Taleo Recruit and On-Boarding Drive Transformation Create Value

iapps Consulting DWC LLC Fixed Scope Offering (FSO) For Taleo Recruit and On-Boarding Drive Transformation Create Value iapps Consulting DWC LLC Fixed Scope Offering (FSO) For Taleo Recruit and On-Boarding Drive Transformation Create Value 18-05-2015 1 About Us We are a technology and business consulting firm, focused on

More information

EMA Service Catalog Assessment Service

EMA Service Catalog Assessment Service MORE INFORMATION: To learn more about the EMA Service Catalog, please contact the EMA Business Development team at +1.303.543.9500 or enterpriseit@enterprisemanagement.com The IT Service Catalog Aligning

More information

How to measure your business resiliency

How to measure your business resiliency How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic krzysztof.pulkiewicz@bcmlogic.com

More information

best practices guide

best practices guide BUSINESS INTELLIGENCE COMPETENCY CENTER best practices guide 2015 SAP SE or an SAP affiliate company. All rights reserved. TABLE OF CONTENTS 04 Executive Summary 08 BICC Defined 12 BICC Organizational

More information

Visual Enterprise Architecture

Visual Enterprise Architecture Business Process Management & Enterprise Architecture Services and Solutions October 2012 VEA: Click About to edit Us Master title style Global Presence Service and Solution Delivery in 22 Countries and

More information

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Ian Preskett MIET C.Eng. MBCS CITP Software Asset Management Consultant ian.preskett@ipassociatesltd.co.uk Agenda

More information

Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation

Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation Susan Duffy Scotiabank Robert Stone Experian Christopher

More information

Today, the world s leading insurers

Today, the world s leading insurers analytic model management FICO Central Solution for Insurance Complete model management and rapid deployment Consistent precision in insurers predictive models, and the ability to deploy new and retuned

More information

BI Strategy: Getting to Where You Want to Go with a Business-Driven Strategy

BI Strategy: Getting to Where You Want to Go with a Business-Driven Strategy BI Strategy: Getting to Where You Want to Go with a Business-Driven Strategy ASUG IL Chicago Chapter Meeting, Nov. 1, 2013 Pat Saporito, Global Center of Excellence Agenda Business Challenges Importance

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

<Insert Picture Here> Increasing the Effectiveness and Efficiency of SOA through Governance

<Insert Picture Here> Increasing the Effectiveness and Efficiency of SOA through Governance Increasing the Effectiveness and Efficiency of SOA through Governance Enrique Martín MW Presales Manager. Oracle Agenda Challenges Solved with SOA Governance Oracle s SOA Governance:

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Eng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg

Eng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg Ministry of Health and Population Egypt Eng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg Without planning Disease Surv. Health Unit HIS, EIS GIS Apps. Data Center

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

SOA Executive Overview Achieve Business Agility, October 23, 2012. Ray Daniel, Connectivity and Integration Executive

SOA Executive Overview Achieve Business Agility, October 23, 2012. Ray Daniel, Connectivity and Integration Executive SOA Executive Overview Achieve Business Agility, October 23, 2012 Ray Daniel, Connectivity and Integration Executive 1 2 These trends are changing entire industries Mobile 2 Cloud Big Data Social 3 3 4

More information

TalOp s End-to-End Employee Life Cycle Process. HowattHR 2011-13

TalOp s End-to-End Employee Life Cycle Process. HowattHR 2011-13 TalOp s End-to-End Employee Life Cycle Process HowattHR 2011-13 Contents Overview of Integrated Performance System Position Profiling & Analysis Aligning Competencies for Talent & Operations Competency-Driven

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

Session 0905 ASUG SBOUC Align your Business and IT with a Solid BI Strategy. Deepa Sankar Pat Saporito

Session 0905 ASUG SBOUC Align your Business and IT with a Solid BI Strategy. Deepa Sankar Pat Saporito Session 0905 ASUG SBOUC Align your Business and IT with a Solid BI Strategy Deepa Sankar Pat Saporito Agenda Business Challenges The Importance of a BI Strategy How SAP Can Help in Defining Your BI Strategy

More information

Applying Business Architecture to the Cloud

Applying Business Architecture to the Cloud Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support

More information

Best Practices for Consolidation Projects

Best Practices for Consolidation Projects Best Practices for Consolidation Projects Lynne Glickman Solution Architect Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Datacenter Migration Think, Plan, Execute

Datacenter Migration Think, Plan, Execute Datacenter Migration Think, Plan, Execute Datacenter migration is often regarded as a purely technical, almost trivial side-project, to be delivered by existing IT staff alongside their day jobs. With

More information

ITIL Roles Descriptions

ITIL Roles Descriptions ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test

More information

Governance, Risk, Compliance and Beyond: The Emergence of Strategic IT Risk Management

Governance, Risk, Compliance and Beyond: The Emergence of Strategic IT Risk Management Brochure More information from http://www.researchandmarkets.com/reports/585854/ Governance, Risk, Compliance and Beyond: The Emergence of Strategic IT Risk Management Description: In recent years, the

More information

Advanced Topics for TOGAF Integrated Management Framework

Advanced Topics for TOGAF Integrated Management Framework Instructor: Robert Weisman MSc, PEng, PMP CD Robert.weisman@buildthevision.ca Advanced Topics for TOGAF Integrated Management Framework ROBERT WEISMAN CEO BUILD THE VISION, INC. WWW.BUILDTHEVISION.CA EMAIL:

More information

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Request for Proposal for Application Development and Maintenance Services for XML Store platforms Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...

More information

Introduction to Business Intelligence

Introduction to Business Intelligence IBM Software Group Introduction to Business Intelligence Vince Leat ASEAN SW Group 2007 IBM Corporation Discussion IBM Software Group What is Business Intelligence BI Vision Evolution Business Intelligence

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

Career Tracks- Information Technology Family

Career Tracks- Information Technology Family Career Tracks- Information Technology Family FUNCTIONAL AREA Applications Programming AV IT AV IT Engineering Bioinformatics Involved in the development of server/os/desktop/mobile applications and services

More information

The Impact of PaaS on Business Transformation

The Impact of PaaS on Business Transformation The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning

More information

This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA.

This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA. Red River College Course Learning Outcome Alignment with BABOK Version 2 This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Intelligent Customer Function (ICF)

Intelligent Customer Function (ICF) CAPABILITY AUDIT FOR HEIs Higher Education Institutions (HEIs) should organically develop their own to successfully manage the process of strategic sourcing. The capability audit provides an assessment

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization 1/22 As a part of Qlik Consulting, works with Customers to assist in shaping strategic elements related to analytics to ensure adoption and success throughout their analytics journey. Qlik Advisory 2/22

More information

OneShield.com Leadership. Service. Technology. That s our policy.

OneShield.com Leadership. Service. Technology. That s our policy. For all commercial, personal and specialty lines in the P&C Insurance sector, give your business partners agents, brokers, wholesale and program managers, reinsurers, inspection companies and other thirdparties

More information

LAIMS AND BENEFITS MANAGEMENT

LAIMS AND BENEFITS MANAGEMENT LAIMS AND BENEFITS MANAGEMENT CLAIMS AND BENEFITS MANAGEMENT Meet your challenge! Customer-orientation, process efficiency and flexibility In order to make your more effective, efficient and most of all

More information

2011 FileTek, Inc. All rights reserved. 1 QUESTION

2011 FileTek, Inc. All rights reserved. 1 QUESTION 2011 FileTek, Inc. All rights reserved. 1 QUESTION 2011 FileTek, Inc. All rights reserved. 2 HSM - ILM - >>> 2011 FileTek, Inc. All rights reserved. 3 W.O.R.S.E. HOW MANY YEARS 2011 FileTek, Inc. All rights

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

Human Capital Management Mapping a Blueprint to the Cloud. June 25 th, 2 3pm EST

Human Capital Management Mapping a Blueprint to the Cloud. June 25 th, 2 3pm EST Human Capital Management Mapping a Blueprint to the Cloud June 25 th, 2 3pm EST Today s Presenters Stacey Harris VP Research & Analytics @StaceyHarrisHR www.linkedin.com/in/staceyharris/ Richard George

More information

Corporate Challenges in Model Risk Management : Moving Beyond Model Inventory. Iain Wright Ian Francis, IBM 4 June 2015

Corporate Challenges in Model Risk Management : Moving Beyond Model Inventory. Iain Wright Ian Francis, IBM 4 June 2015 Corporate Challenges in Model Risk Management : Moving Beyond Model Inventory Iain Wright Ian Francis, IBM 4 June 2015 Corporate Challenges in the Development and Implementation of Effective Model Risk

More information

DIGITAL STRATEGY SUMMARY 2014-2015

DIGITAL STRATEGY SUMMARY 2014-2015 DIGITAL STRATEGY SUMMARY 2014-2015 Maria MacGunigal, CIO OUR STORY: We are at an important point in history where technology is pervasive in almost all aspects of our lives. Government is expected more

More information

7 Practical insights for IT Asset Management

7 Practical insights for IT Asset Management 7 Practical insights for IT Asset Management Tauneel McKay Director Swiss Reinsurance Company Ltd Subbarao Chaganty Principal Consultant Infosys Ltd RELATE MANAGE.. Context KNOW. Consolidate the IT Asset

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

What We Will Cover In This Module

What We Will Cover In This Module ITIL Considerations What We Will Cover In This Module General Concepts Around ITIL (V3) Supporting Processes Principles ITIL Implementation Life Cycle Getting Started With A Practical Approach Why Service?

More information

ERP IMPLEMENTATION BOOT CAMP

ERP IMPLEMENTATION BOOT CAMP ERP IMPLEMENTATION BOOT CAMP The Manufacturing ERP Experience Sponsored by MetalForming Magazine April 8-9, 2014 Eric Kimberling Managing Partner and Founder Panorama Consulting Solutions www.panorama-consulting.com

More information