How To Manage An Infrmatin Security Gvernance Prgram
|
|
|
- Virginia Moore
- 5 years ago
- Views:
Transcription
1 CCISO Ttal Duratin: 10 Days, 80 Hurs Dmain 1: Gvernance Qualifying areas under Dmain 1 include (but are nt limited t) the fllwing: Define, implement, manage and maintain an infrmatin security gvernance prgram that includes leadership, rganizatinal structures and prcesses. Align infrmatin security gvernance framewrk with rganizatinal gals and gvernance, i.e., leadership style, philsphy, values, standards and plicies. Establish infrmatin security management structure. Establish a framewrk fr infrmatin security gvernance mnitring (cnsidering cst/benefits analyses f cntrls and ROI). Understand standards, prcedures, directives, plicies, regulatins, and legal issues that affect the infrmatin security prgram. Understand the enterprise infrmatin security cmpliance prgram and manage the cmpliance team. Analyze all the external laws, regulatins, standards, and best practices applicable t the rganizatin. Understand the varius prvisins f the laws that affect the rganizatinal security such as Gramm-Leach-Bliley Act, Family Educatinal Rights and Privacy Act, Health Insurance Prtability and Accuntability Act [HIPAA], Federal Infrmatin Security Management Act [FISMA], Clinger-Chen Act, Privacy Act, Sarbanes-Oxley, etc. Be familiar with the different standards such as ISO series, Federal Infrmatin Prcessing Standards [FIPS]. Understand the federal and rganizatin specific published dcuments t manage peratins in a cmputing envirnment. Assess the majr enterprise risk factrs fr cmpliance. Crdinate the applicatin f infrmatin security strategies, plans, plicies, and prcedures t reduce regulatry risk. Understand the imprtance f regulatry infrmatin security rganizatins and apprpriate industry grups, frums, and stakehlders.
2 Understand the infrmatin security changes, trends, and best practices. Manage enterprise cmpliance prgram cntrls. Understand the infrmatin security cmpliance prcess and prcedures. Cmpile, analyze, and reprt cmpliance prgrams. Understand the cmpliance auditing and certificatin prgrams. Fllw rganizatinal ethics. Dmain 2 Management Cntrls and Auditing Management Infrmatin Security Management Cntrls: Identify the rganizatin s peratinal prcess and bjectives as well as risk tlerance level. Design infrmatin systems cntrls in alignment with the peratinal needs and gals and cnduct testing prir t implementatin t ensure effectiveness and efficiency. Identify and select the resurces required t effectively implement and maintain infrmatin systems cntrls. Such resurces can include human capital, infrmatin, infrastructure, and architecture (e.g., platfrms, perating systems, netwrks, databases, applicatins). Supervise the infrmatin systems cntrl prcess t ensure timely implementatin in accrdance with the utlined budget and scpe, and cmmunicate prgress t stakehlders. Design and implement infrmatin systems cntrls t mitigate risk. Mnitr and dcument the infrmatin systems cntrl perfrmance in meeting rganizatinal bjectives by identifying and measuring metrics and key perfrmance indicatrs (KPIs). Design and cnduct testing f infrmatin security cntrls t ensure effectiveness, discver deficiencies and ensure alignment with rganizatin s plicies, standards and prcedures. Design and implement prcesses t apprpriately remediate deficiencies and evaluate prblem management practices t ensure that errrs are recrded, analyzed and reslved in a timely manner. Assess and implement tls and techniques t autmate infrmatin systems cntrl prcesses. Prduce infrmatin systems cntrl status reprts t ensure that the prcesses fr infrmatin systems peratins, maintenance and supprt meet the rganizatin s strategies and bjectives, and share with relevant stakehlders t supprt executive decisi Auditing Management Understand the IT audit prcess and be familiar with IT audit standards.
3 Apply infrmatin systems audit principles, skills and techniques in reviewing and testing infrmatin systems technlgy and applicatins t design and implement a thrugh risk-based IT audit strategy. Execute the audit prcess in accrdance with established standards and interpret results against defined criteria t ensure that the infrmatin systems are prtected, cntrlled and effective in supprting rganizatin s bjectives. Effectively evaluate audit results, weighing the relevancy, accuracy, and perspective f cnclusins against the accumulated audit evidence. Assess the expsures resulting frm ineffective r missing cntrl practices and frmulate a practical and cst-effective plan t imprve thse areas. Develp an IT audit dcumentatin prcess and share reprts with relevant stakehlders as the basis fr decisin-making. Ensure that the necessary changes based n the audit findings are effectively implemented in a timely manner. n-making. Dmain 3 Management Prjects and Operatins. Qualifying areas under Dmain 3 include (but are nt limited t) the fllwing: Fr each infrmatin systems prject develp a clear prject scpe statement in alignment with rganizatinal bjectives. Define activities needed t successfully execute the infrmatin systems prgram, estimate activity duratin, and develp a schedule and staffing plan. Develp, manage and mnitr the infrmatin systems prgram budget, estimate and cntrl csts f individual prjects. Identify, negtiate, acquire and manage the resurces needed fr successful design and implementatin f the infrmatin systems prgram (e.g., peple, infrastructure, and architecture). Acquire, develp and manage infrmatin security prject team. Assign clear infrmatin security persnnel jb functins and prvide cntinuus training t ensure effective perfrmance and accuntability. Direct infrmatin security persnnel and establish cmmunicatins, and team activities, between the infrmatin systems team and ther security-related persnnel (e.g., technical supprt, incident management, security engineering). Reslve persnnel and teamwrk issues within time, cst, and quality cnstraints. Identify, negtiate and manage vendr agreement and cmmunicatin. Participate with vendrs and stakehlders t review/assess recmmended slutins; identify incmpatibilities, challenges, r issues with prpsed slutins.
4 Evaluate the prject management practices and cntrls t determine whether business requirements are achieved in a cst-effective manner while managing risks t the rganizatin. Develp a plan t cntinuusly measure the effectiveness f the infrmatin systems prjects t ensure ptimal system perfrmance. Identify stakehlders, manage stakehlders expectatins and cmmunicate effectively t reprt prgress and perfrmance. Ensure that necessary changes and imprvements t the infrmatin systems prcesses are implemented as required. Dmain 4 Infrmatin Security Cre Cmpetence Access Cntrl Identify the criteria fr mandatry and discretinary access cntrl, understand the different factrs that help in implementatin f access cntrls and design an access cntrl plan. Implement and manage an access cntrl plan in alignment with the basic principles that gvern the access cntrl systems such as need-t-knw. Identify different access cntrl systems such as ID cards and bimetrics. Understand the imprtance f warning banners fr implementing access rules. Develp prcedures t ensure system users are aware f their IA respnsibilities befre granting access t the infrmatin systems. Scial Engineering, Phishing Attacks, Identity Theft Understand varius scial engineering cncepts and their rle in insider attacks and develp best practices t cunter scial engineering attacks. Design a respnse plan t identity theft incidences. Identify and design a plan t vercme phishing attacks. Physical Security Identify standards, prcedures, directives, plicies, regulatins and laws fr physical security. Determine the value f physical assets and the impact if unavailable. Identify resurces needed t effectively implement a physical security plan. Design, implement and manage a cherent, crdinated, and hlistic physical security plan t ensure verall rganizatinal security. Establish bjectives fr persnnel security t ensure alignment with verall security gals fr the enterprise. Design and manage the physical security audit and update issues.
5 Establish a physical security perfrmance measurement system. Risk Management Identify the risk mitigatin and risk treatment prcesses and understand the cncept f acceptable risk. Identify resurce requirements fr risk management plan implementatin. Design a systematic and structured risk assessment prcess and establish, in crdinatin with stakehlders, an IT security risk management prgram based n standards and prcedures and ensure alignment with rganizatinal gals and bjectives. Develp, crdinate and manage risk management teams. Establish relatinships between the incident respnse team and ther grups, bth internal (e.g., legal department) and external (e.g., law enfrcement agencies, vendrs, and public relatins prfessinals) Develp an incident management measurement prgram and manage the risk management tls and techniques. Understand the residual risk in the infrmatin infrastructure. Assess threats and vulnerabilities t identify security risks, and regularly update applicable security cntrls. Identify changes t risk management plicies and prcesses and ensure the risk management prgram remains current with the emerging risk and threat envirnment and in alignment with the rganizatinal gals and bjectives. Determine if security cntrls and prcesses are adequately integrated int the investment planning prcess based n IT prtfli and security reprting. Disaster Recvery and Business Cntinuity Planning Develp, implement and mnitr business cntinuity plans in case f disruptive events and ensure alignment with rganizatinal gals and bjectives. Define the scpe f the enterprise cntinuity f peratins prgram t address business cntinuity, business recvery, cntingency planning, and disaster recvery/related activities. Identify the resurces and rles f different stakehlders in business cntinuity prgrams. Identify and priritize critical business functins and cnsequently design emergency delegatins f authrity, rders f successin fr key psitins, the enterprise cntinuity f peratins rganizatinal structure and staffing mdel. Direct cntingency planning, peratins, and prgrams t manage risk. Understand the imprtance f lessns learned frm test, training and exercise, and crisis events. Design dcumentatin prcess as part f the cntinuity f peratins prgram.
6 Design and execute a testing and updating plan fr the cntinuity f peratins prgram. Understand the imprtance f integratin f IA requirements int the Cntinuity f Operatins Plan (COOP). Identify the measures t increase the level f emergency preparedness such as backup and recvery slutins and design standard perating prcedures fr implementatin during disasters. Firewall, IDS/IPS and Netwrk Defense Systems Identify the apprpriate intrusin detectin and preventin systems fr rganizatinal infrmatin security. Design and develp a prgram t mnitr firewalls and identify firewall cnfiguratin issues. Understand perimeter defense systems such as grid sensrs and access cntrl lists n ruters, firewalls, and ther netwrk devices. Identify the basic netwrk architecture, mdels, prtcls and cmpnents such as ruters and hubs that play a rle in netwrk security. Understand the cncept f netwrk segmentatin. Manage DMZs, VPN and telecmmunicatin technlgies such as PBX and VIP. Identify netwrk vulnerabilities and explre netwrk security cntrls such as use f SSL and TLS fr transmissin security. Supprt, mnitr, test, and trublesht issues with hardware and sftware. Manage accunts, netwrk rights, and access t systems and equipment. Wireless Security Identify vulnerability and attacks assciated with wireless netwrks and manage different wireless netwrk security tls. Virus, Trjans and Malware Threats Assess the threat f virus, Trjan and malware t rganizatinal security and identify surces and mediums f malware infectin. Deply and manage anti-virus systems. Develp prcess t cunter virus, Trjan, and malware threats. Secure Cding Best Practices and Securing Web Applicatins Develp and maintain sftware assurance prgrams in alignment with the secure cding principles and each phase f System Develpment Life Cycle (SDLC). Understand varius system-engineering practices.
7 Cnfigure and run tls that help in develping secure prgrams. Understand the sftware vulnerability analysis techniques. Install and perate the IT systems in a test cnfiguratin manner that des nt alter the prgram cde r cmprmise security safeguards. Identify web applicatin vulnerabilities and attacks and web applicatin security tls t cunter attacks. Hardening OS Identify varius OS vulnerabilities and attacks and develp a plan fr hardening OS systems. Understand system lgs, patch management prcess and cnfiguratin management fr infrmatin system security. Encryptin Technlgies Understand the cncept f encryptin and decryptin, digital certificates, public key infrastructure and the key differences between cryptgraphy and stegangraphy. Identify the different cmpnents f a cryptsystem. Develp a plan fr infrmatin security encryptin techniques. Vulnerability Assessment And Penetratin Testing Design, develp and implement a penetratin testing prgram based n penetratin testing methdlgy t ensure rganizatinal security. Identify different vulnerabilities assciated with infrmatin systems and legal issues invlved in penetratin testing. Develp pre and pst testing prcedures. Develp a plan fr pen test reprting and implementatin f technical vulnerability crrectins. Develp vulnerability management systems. Cmputer Frensics And Incident Respnse Develp a plan t identify a ptential security vilatin and take apprpriate actin t reprt the incident. Cmply with system terminatin prcedures and incident reprting requirements related t ptential security incidents r actual breaches. Assess ptential security vilatins t determine if the netwrk security plicies have been breached, assess the impact, and preserve evidence. Diagnse and reslve IA prblems in respnse t reprted incidents. Design incident respnse prcedures.
8 Develp guidelines t determine whether a security incident is indicative f a vilatin f law that requires specific legal actin. Identify the vlatile and persistent system infrmatin. Set up and manage frensic labs and prgrams. Understand varius digital media devices, e-discvery principles and practices and different file systems. Develp and manage an rganizatinal digital frensic prgram. Establish, develp and manage frensic investigatin teams. Design investigatin prcesses such as evidence cllectin, imaging, data acquisitin, and analysis. Identify the best practices t acquire, stre and prcess digital evidence. Cnfigure and use varius frensic investigatin tls. Design anti-frensic techniques. Dmain 5 Strategic Planning and Finance. Strategic Planning Design, develp and maintain enterprise infrmatin security architecture (EISA) by aligning business prcesses, IT sftware and hardware, lcal and wide area netwrks, peple, peratins, and prjects with the rganizatin s verall security strategy. Perfrm external analysis f the rganizatin (e.g., analysis f custmers, cmpetitrs, markets and industry envirnment) and internal analysis (risk management, rganizatinal capabilities, perfrmance measurement etc.) and utilize them t align infrmatin security prgram with rganizatin s bjectives. Identify and cnsult with key stakehlders t ensure understanding f rganizatin s bjectives. Define a frward-lking, visinary and innvative strategic plan fr the rle f the infrmatin security prgram with clear gals, bjectives and targets that supprt the peratinal needs f the rganizatin. Define key perfrmance indicatrs and measure effectiveness n cntinuus basis. Assess and adjust IT investments t ensure they are n track t supprt rganizatin s strategic bjectives. Mnitr and update activities t ensure accuntability and prgress. Finance Analyze, frecast and develp the peratinal budget f the IT department.
9 Acquire and manage the necessary resurces fr implementatin and management f infrmatin security plan. Allcate financial resurces t prjects, prcesses and units within infrmatin security prgram. Mnitr and versee cst management f infrmatin security prjects, return n investment (ROI) f key purchases related t IT infrastructure and security and ensure alignment with the strategic plan. Identify and reprt financial metrics t stakehlders. Balance the IT security investment prtfli based n EISA cnsideratins and enterprise security pririties. Understand the acquisitin life cycle and determine the imprtance f prcurement by perfrming Business Impact Analysis. Identify different prcurement strategies and understand the imprtance f cstbenefit analysis during prcurement f an infrmatin system. Understand the basic prcurement cncepts such as Statement f Objectives (SOO), Statement f Wrk (SOW), and Ttal Cst f Ownership (TCO). Cllabrate with varius stakehlders (which may include internal client, lawyers, IT security prfessinals, privacy prfessinals, security engineers, suppliers, and thers) n the prcurement f IT security prducts and services. Ensure the inclusin f risk-based IT security requirements in acquisitin plans, cst estimates, statements f wrk, cntracts, and evaluatin factrs fr award, service level agreements, and ther pertinent prcurement dcuments. Design vendr selectin prcess and management plicy. Develp cntract administratin plicies that direct the evaluatin and acceptance f delivered IT security prducts and services under a cntract, as well as the security evaluatin f IT and sftware being prcured. Develp measures and reprting standards t measure and reprt n key bjectives in prcurements aligned with IT security plicies and prcedures. Understand the IA security requirements t be included in statements f wrk and ther apprpriate prcurement dcuments.
10
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
Help Desk Level Competencies
Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
Internal Audit Charter and operating standards
Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw
ENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT POLICY Plicy N. 10014 Review Date Octber 1, 2014 Effective Date March 1, 2014 Crss- Respnsibility Vice President, Reference Administratin Apprver Executive Cuncil 1. 1. Plicy
OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager
JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE
Professional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
Chapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
Enterprise Security Management CIS 259
Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
Process Improvement Center of Excellence Service Proposal Recommendation. Operational Oversight Committee Report Submission
Prcess Imprvement Center f Excellence Service Prpsal Recmmendatin Operatinal Oversight Cmmittee Reprt Submissin INTRODUCTION This Prpsal prvides initial infrmatin regarding a pssible additin t a service.
VACANCY. SENIOR MANAGER: SPECIAL PROJECTS AND STAKEHOLDER MANAGEMENT x1 3 YEAR CONTRACT (WITH A POSSIBILITY OF BEING EXTENDED TO 5 YEARS) JOB LEVEL: 5
VACANCY POSITION: DURATION REGION: PORTFOLIO: SENIOR MANAGER: SPECIAL PROJECTS AND STAKEHOLDER MANAGEMENT x1 3 YEAR CONTRACT (WITH A POSSIBILITY OF BEING EXTENDED TO 5 YEARS) NATIONAL OFFICE OCEO JOB LEVEL:
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
Independent Development Trust JOB DESCRIPTION
Independent Develpment Trust SECTION A: JOB INFORMATION SUMMARY JOB DESCRIPTION POST IDENTIFICATION Jb Title: Indicative PEROMNES / EXECEVAL Pst level: Name f Business Unit: Lcatin: Pst Reprts t: Duratin:
POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position
Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin
Business Continuity Management Policy
Business Cntinuity Management Plicy Versin: 1.0 Last Amendment: Apprved by: Library Cuncil f New Suth Wales Plicy wner/spnsr: Directr, Operatins and Chief Financial Officer Plicy Cntact Officer: Senir
South Australia Police POSITION INFORMATION DOCUMENT
Suth Australia Plice POSITION INFORMATION DOCUMENT Stream: Career Grup: Discipline: Classificatin: Service: Branch: Psitin Title: Administrative Services Cnsultancy and Infrmatin AO ASO-6 Infrmatin Systems
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
Change Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
CMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN
Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins
Risk Management Policy AGL Energy Limited
Risk Management Plicy AGL Energy Limited AUGUST 2014 Table f Cntents 1. Abut this Dcument... 2 2. Plicy Statement... 2 3. Purpse... 2 4. AGL Risk Cntext... 3 5. Scpe... 3 6. Objectives... 3 7. Accuntabilities...
Vulnerability Management:
Vulnerability Management: Creating a Prcess fr Results Kyle Snavely Veris Grup, LLC Summary Organizatins increasingly rely n vulnerability scanning t identify risks and fllw up with remediatin f thse risks.
Job Profile Data & Reporting Analyst (Grant Fund)
Jb Prfile Data & Reprting Analyst (Grant Fund) Directrate Lcatin Reprts t Hurs Finance Slihull Finance Directr Nminally 37 hurs but peratinally available at all times t meet Cmpany requirements Cntract
BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect
BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitiner Level) Specific Rle Data Architect Grade Directrate Managed by BG13 (TBC) Business Change Senir Infrmatin Systems & Technlgy Architect
Information Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
SERVICE DESK TEAM LEADER
1. PURPOSE OF POSITION The Service Desk Team Leader rle is respnsible fr managing the peratin f the Service Desk. This rle is crucial t ensuring custmer requirements are met in terms f cmmunicatin, priritising,
Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS)
Chief Finance and Operatins Officer IfM Educatin and Cnsultancy Services (IfM ECS) Rle Summary IfM ECS disseminates the research and educatin utputs f the University f Cambridge Institute fr Manufacturing
IT CHANGE MANAGEMENT POLICY
IT CHANGE MANAGEMENT POLICY Effective Date May 19, 2016 Crss-Reference 1. IT Operatins and Maintenance Plicy 2. IT Security Incident Management Plicy Respnsibility Apprver Review Schedule 1. Plicy Statement
Appendix H. Annual Risk Assessment and Audit Plan 2013/14
Annual Risk Assessment and Audit Plan 2013/14 Internal Audit Department September 25, 2013 Table f Cntents Intrductin.. 3 Risk Assessment Prcess... 4 Page 2 Intrductin Each year, the Internal Audit Department
AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
ITIL Release Control & Validation (RCV) Certification Program - 5 Days
ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
INFRASTRUCTURE TECHNICAL LEAD
1. PURPOSE OF POSITION This psitin is respnsible fr the delivery f peratinal supprt and maintenance f the TDHB IT infrastructure envirnment. This rle is als pivtal in the develpment and delivery f infrastructure
Audit Committee Charter
Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm
Independent Development Trust. 27 June 2016 POSITION: SENIOR SPECIALIST: SUPPLY CHAIN MANAGEMENT JOB LEVEL: 7
ADVERT Independent Develpment Trust 27 June 2016 POSITION: SENIOR SPECIALIST: SUPPLY CHAIN MANAGEMENT JOB LEVEL: 7 DURATION REGION LOCATION: PORTFOLIO: 3 year cntract Eastern Cape East Lndn DSU PURPOSE:
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
Job Classification Details Department Job Function Job Family Job Title Job Code Salary Level
Jb Classificatin Details Department Jb Functin Jb Family Jb Title Jb Cde Salary Level Chief Diversity Office Marketing, Cmmunicatins, & Outreach Cmmunicatin/Cnstituent Relatins Cmmunicatins Crdinatr PMP1
Charmaine Brooks CRM (208) 343-1904 [email protected]
Charmaine Brks CRM (208) 343-1904 [email protected] Overview Significant Prjects Ms. Brks is a Certified Recrds Manager and has 25+ years experience in the full lifecycle management f recrds
State of Wisconsin Division of Enterprise Technology (DET) Distributed Database Hosting Service Offering Definition (SOD)
State f Wiscnsin Divisin f Enterprise Technlgy (DET) Distributed Database Hsting Service Offering Definitin (SOD) Distributed Database Hsting SOD Page 1 12/9/2010 Dcument Revisin Histry (Majr Pst Publishing
ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days
ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
CDC UNIFIED PROCESS PRACTICES GUIDE
Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Business Case and t describe the practice verview, requirements, best practices, activities, and key terms related t these
OE PROJECT MANAGEMENT GLOSSARY
OE PROJECT MANAGEMENT GLOSSARY ACCEPTANCE CRITERIA : thse criteria, including perfrmance requirements and essential cnditins that must be met befre the prject deliverables are accepted. ACTIVITY: an actin
How To Write An Ehsms Training, Awareness And Competency Procedure
Envirnmental, Health & Safety Management System (EHSMS) Dcument Number: 00122 Issue Date: 05/07/2014 Training, Awareness and Cmpetency Prcedure Revisin Number: 7 Prepared By: Stalcup, Bryce Apprved By:
ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days
ITIL V3 Planning, Prtectin and Optimizatin (PPO) Certificatin Prgram - 5 Days Prgram Overview The ITIL Intermediate Qualificatin: Planning, Prtectin and Optimizatin (PPO) Certificate is a free-standing
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd
Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew
Basics of Supply Chain Management
The Champlain Valley APICS Chapter is a premier prfessinal assciatin fr supply chain and peratins management and wrking tgether with the APICS rganizatin the leading prvider f research, educatin and certificatin
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
How To Understand The Risks Of A Financial Institutin
Guidance n Managing Outsurcing Risk Divisin f Banking Supervisin and Regulatin Divisin f Cnsumer and Cmmunity Affairs Bard f Gvernrs f the Federal Reserve System December 5, 2013 Table f Cntents I. Purpse
The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
Nuance Healthcare Services Project Delivery Methodology
NUANCE PROFESSIONAL SERVICES Nuance Healthcare Services 2008 Nuance Cmmunicatins, Inc. All rights reserved. Nuance Healthcare Services 1 INTRODUCTION This dcument describes the prject management methdlgy
Sources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM
Audit Manual Sectin J SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM Ref. Plicy and Practice Requirements IIA Standards and Other references J 1 Plicy: The Head f Internal Audit shall develp and maintain
The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment
The Whle f Gvernment Apprach: Mdels and Tls fr EGOV & Alignment Adegbyega Oj (in cllabratin with T. Janwski and E. Estevez) United Natins University [email protected] OVERVIEW 1. THE WG APPROACH 2. APPLICATION
Business Continuity Management Systems Foundation Training Course
Certificatin criteria fr Business Cntinuity Management Systems Fundatin Training Curse CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE
LINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area
Helpdesk Services at the Executive Office of Energy and Environmental Affairs is defined as follows:
5. Helpdesk Services 5.1 Sectin Overview This sectin f the plan defines Helpdesk Services at EOEEA as well as the key ratinale and benefits f cnslidating Helpdesk Services. Descriptins f the baseline current
RESTRUCTURING THE ADDITIONAL DUTY HOURS ALLOWANCE. Part I of Volume II JOB DESCRIPTIONS FOR DIRECTORS
RESTRUCTURING THE ADDITIONAL DUTY HOURS ALLOWANCE Part I f Vlume II JOB DESCRIPTIONS FOR DIRECTORS ACCRA, SEPTEMBER, 2005 Ghana Ministry f Health Ghana Health Services Cnsultants: Cedar Care Trust Internatinal
Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
Training - Quality Manual
Training - Quality Manual 1 st Octber 2010 Babcck Internatinal Grup PLC www.babcck.c.uk/training Key Cntacts... Errr! Bkmark nt defined. Authrities...2 Intrductin t Babcck Internatinal Grup...3 Meeting
MISSION STATEMENT & CUSTOMER SERVICE CHARTER
MISSION STATEMENT & CUSTOMER SERVICE CHARTER FINANCE DIVISON April 2016 FINANCE DIVISION MISSION STATEMENT The divisin aims t prvide ethical and effective management f the Schl s financial resurces, t
GIS Service Provider. GIS Service Management
GIS Service Prvider GIS Service Management Overview What is ITIL? Brief Ottawa GIS Backgrund Prject Request The basis f ur existence in GIS, a need fr GIS service. Where d they cme frm? Service Strategy
System Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
Major Duties and Responsibilities. Accounting
TERMS OF REFERENCE 1. Finance/ Accunts Persnnel Psitin: Finance Assistant (Accuntant)/ Officer Categry: Managerial/ Administrative (Nn-Faculty Staff) Place f Emplyment: FITI Secretariat, Changeney, Thimphu
System Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
Oakland County Department of Information Technology Project Scope and Approach
Oakland Cunty Department f Infrmatin Technlgy Prject Scpe and Apprach Prject Name: Web-Based Permanency Database Prject ID: DB1314PD Leadership Grup: Curts Department: Circuit Curt Divisin: Family Prject
