Risk-Based IT Change Management
|
|
|
- Esther Flynn
- 10 years ago
- Views:
Transcription
1 PNNL-SA Application for The Northwest Academic Computing Consortium Joanne R. Hugi Excellence Award Risk-Based IT Change Management Pacific Northwest National Laboratory IT Services Division Abstract: In organizations without a formal information technology (IT) change management process, it is estimated that 80% of IT service outage problems are caused by updates and alterations to systems, applications, and infrastructure. Consequently, one of the first areas to address to improve service reliability is to track all changes and systematically manage change with full knowledge of the risks of the change and the potential organizational impact. While tracking change events is fairly well understood and is a common practice, consistently and reliably predicting the impact of change requires a disciplined, standards-based approach to assessing risk and likelihood of impact, a technique not usually found in off-the-shelf change tracking tools. The Pacific Northwest National Laboratory (PNNL) has deployed a method and software tool to assess and track the impact of infrastructure and application changes as part of a formal release management process. The approach evolved from the experience gained from years of formal change management, as well as the influence of standards and the inspiration of service management process benchmarks such as ITIL. Unique to PNNL s process is a graded approach to change control based on intuitive assessments of risk and impact. Description of the Practice: PNNL IT Change Management Process Overview Change Management is an essential part of the overall process to ensure the reliable delivery of information technology services. The PNNL infrastructure consists of over 2,400 highly interdependent applications, devices, and service functions (excluding thousands more user workstations and research project-specific devices and applications). The complexity of the infrastructure increases the difficulty of providing reliable services; change management becomes the pivotal element to manage these resources effectively. PNNL s approach to managing infrastructure changes focuses on controlling the integrity of information systems and resources, including all network devices, computer systems, applications, and databases in the infrastructure. To accomplish this, the change management process tracks all changes and requires reviews and approvals commensurate with the potential impact of the change. To promote thorough consideration of change impact prior to instituting the change, the process is integrated with the PNNL systems and software development lifecycle: change risks are considered before systems are built and tested (Figure 1). Modifications to the change release plan during the build and test phases are allowed, but the plan will be reviewed before implementation is approved. After implementation, a release status report records the success of the change, permitting self-assessment of change effectiveness
2 Figure 1. Integration of change management into PNNL s system development lifecycle process. Looking at System Criticality and Change Risks PNNL s approach differs from many formal IT change approval and tracking methods because it utilizes a standards-based approach to determine and address the risks of changes. Joined with an evaluation of the changed system s criticality to the overall enterprise, the resultant composite risk assessment prescribes mitigation requirements and strategies to be used when the change is implemented. By consistently evaluating system criticality and change risk, the Laboratory is assured of more reliable IT services since all known issues dealing with risk mitigation will be addressed with each proposed change. The process tracks the risk assessments, records change request approvals, and captures change implementation lessons-learned information that is used to influence reduce the impact of future changes. The automated process for determining composite risk assessment is broken into two standardized evaluations: the organizational criticality of the system to be changed and the likelihood of adverse impact resulting from the change. First, on an annual basis, the criticality of the system is appraised in order to establish its relative value to the enterprise. The standardized criteria for this assessment are: Number of users that could be impacted by a service interruption Financial impact of an extended service outage or unrecoverable loss of data Likelihood that a system/service failure could result in: Disclosure of sensitive information that needs to be protected Misuse of client-owned resources Malicious interruption of services or research operations - 2 -
3 Possibility that a system/service failure could result in an event or condition that may have adverse safety, health, security, operational, environmental, or mission implication Potential future impacts based on prior system/service interruption experiences Secondly, when a change is proposed, each request is graded against the following criteria: How many users will be visibly affected by the proposed change? What is the anticipated difficulty for user and support personnel to learn the new or modified system/service? What is the stability and supportability of the technology or vendor products utilized by the system? In the event the change implementation fails or adversely impacts other systems or services, what will be the impact of executing the implementation contingency plan? Based upon past experience, what is the likelihood of failure or adverse problems resulting from the change? The criticality appraisal blends with the change risk evaluation to produce a composite risk assessment that is used to pre-populate an automated release plan that guides the implementation of the change ( Figure 2). Depending on the level of the composite risk, requirements of the release plan such as testing rigor and end-user communications are strengthened to mitigate higher levels of risk. Conversely, a lower risk score results in a reduced scope of change implementation requirements. Likelihood of Impact High Medium Low (Activity-Based) Composite Risk Assessment Risk and Impact of Change Organizational Criticality (Yearly Assessment) Business Essential Potentially Business Essential Not Business Essential High Medium Low Figure 2. Combining organizational criticality and change risks
4 Automating the Process The change request and change risk assessment process is conducted through an automated system that tracks and records reviews and approvals. The keystone to the automated system is PNNL s Information Resource Inventory (IRI), a custom built, web-based configuration management database. PNNL had invested in the IRI well before automating our change management process. The IRI was seen as a keystone not only to this process, but others such as establishing and managing service level agreements, resource and application cost reporting, cyber security compliance tracking, property administration, business continuity, and customer relationship management. To support change management, the IRI contains system criticality information as well as owner, operational contact, and service function information. In the future, the central configuration management database will provide system interdependency information critical to determining change impact of the Laboratory s highly interconnected systems and services. The change request form (Figure 3) is used to the assess risk of the change through a consistent and objective set of questions, and to document the release plan, covering topics such as communications, training needs, ongoing operational support requirements, and release contingency plans. The form was implemented using Microsoft InfoPath. Change forms are stored and managed in a Microsoft SharePointbased document repository. Using these tools, PNNL developers were able to deploy the new system in 12 person-weeks, and have been able to easily and quickly modify the forms as we ve evolved our process through experience. Process Success Factors The PNNL change management practice combines the composite risk assessment method with an automated process for proposing the change, obtaining approval, and recording post-implementation lessons learned. The overall process met critical success factors for the deployment of changes into the organization s crucial IT infrastructure. The success factors were: Implementing changes is a repeatable process. Changes are made quickly and accurately, driven by business needs. Services are protected when changes are made to optimize risk exposure. Utilizing the process delivers efficiency and effectiveness benefits. By prescribing a consistent approach to evaluate change risk, the overall change review cycle is shortened. Prior to this method, 35% to 50% of all proposed changes required Change Management Board (CMB) approval, a face-to-face presentation and discussion where the change proposal author was subjected to questions from infrastructure leadership and system owners concerned about change impact. In this forum, the questions were seldom consistent; occasionally key issues were not effectively addressed as a result. The risk-based process now provides the missing consistency and allows many change requests to be reviewed and approved outside of the traditional, once-a-week CMB meeting. The number of proposals requiring full board review and approval has dropped to 6.5% of all proposed changes, improving approval cycle time accordingly. Many change requests that used to require the author to wait a week for the next CMB meeting are now approved the same day as the submittal. Additionally, the risk-based change process is moving the overall IT organization s service delivery maturity from reactive actions to those that are well defined and repeatable (Figure 4). The standardized approach to assessing risk and tracking change release assures repeatability. Self-assessment after change completion will assist the organization to more accurately predict change risk and impact, eventually leading to managing the risk of change when systems are built, rather than after they are deployed
5 Figure 3. The Change Request form
6 Service Management Process Maturity Framework 1 5 Optimized 4 Managed 3 Defined 2 Repeatable 1 Initial Figure 4. The Service Management Process Maturity Framework is a useful tool for evaluating IT service delivery method development effectiveness and for benchmarking against industry best practices. ( 1 Office of Government Commerce, ITIL Best Practice for Planning to Implement Service Management, p. 44.) Responses to Evaluation Criteria: Innovation The change approval and tracking methods utilize a standards-based approach to determine and address the risks of changes. The change risk assessment is tightly integrated with the central configuration management database that assesses, records, and applies the system s organizational value to the determination of risk and resultant release plan. Benefits The Laboratory is now assured of more reliable IT services because system criticality and change risk assessments are standardized, encompass known issues, and evolve as experience matures. Change implementation impacts are known before systems are built and tested because the change management process is integrated with a standard systems and software development lifecycle. The overall change review cycle has shortened significantly since there is a high level of confidence that change impact issues are properly and consistently evaluated. Committee review and approval of change requests dropped by more than a factor of five. Most requests are now approved the same day rather than collecting and reviewing weekly. Overall service delivery improved and is better defined and more repeatable. Self-assessment after change completion contributed to evolution of the change risk assessment as well as improvements to the overall change management process
7 Replicability This process is applicable to any organization managing change of its IT infrastructure devices, systems, and services. A versatile, central configuration management database is an essential element of this process, used for measuring and recording overall risk and impact to the enterprise. Costs Process administrative costs remain approximately the same, but higher reliability and shorter approval cycle times has benefited Laboratory productivity. Links: None. Principle Contact: Jan E. Goolsbey [email protected] (509) Other Key Contributors: Frank Carr [email protected] (509) Wendy D. VanArsdale [email protected] (509)
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C.
Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C. Burget September 14, 2014 1 Agenda Information Assurance
GAO. Year 2000 Computing Crisis: Business Continuity and Contingency Planning
GAO United States General Accounting Office Accounting and Information Management Division August 1998 Year 2000 Computing Crisis: Business Continuity and Contingency Planning GAO/AIMD-10.1.19 Preface
CA CMDB Connector for z/os version 2.0
PRODUCT SHEET CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os is the final piece in the puzzle to create an enterprise CMDB, providing you the ability
Internal Audit Report ITS CHANGE MANAGEMENT PROCESS. Report No. SC-11-11
Internal Audit Report ITS CHANGE MANAGEMENT PROCESS Report No. SC-11-11 March 2011 SANTA CRUZ: INTERNAL AUDIT March 31, 2011 MARY DOYLE Vice Chancellor Information Technology Re: Internal Audit Report
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
CA Configuration Management Database (CMDB)
PRODUCT BRIEF: CA CMDB CA Configuration Management Database (CMDB) CA CONFIGURATION MANAGEMENT DATABASE (CMDB) HELPS YOU IDENTIFY AND UNDERSTAND THE DEPENDENCIES AND RELATIONSHIPS AMONG AND BETWEEN YOUR
ITIL V3 Application Support Volume 1
ITIL V3 Application Support Volume 1 Service Management For Application Support ITIL is a Registered Trade Mark and Community Trademark of the Office of Government and Commerce. This document may contain
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in
Negotiating Vendor Contracts. Key Initiative Overview
Christopher Ambrose Research Vice President This overview provides a high-level description of the Negotiating Vendor Contracts Key Initiative. IT leaders can use this overview to understand how to improve
Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED
Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major
Practical IT Service Management: Rapid ITIL Without Compromise
W H I T E P A P E R Practical IT Service : Rapid ITIL Without Compromise John Custy IT Service Consultant and Managing Consutant JPC Group Executive Summary All businesses face challenges providing the
Configuration Management System:
True Knowledge of IT infrastructure Part of the SunView Software White Paper Series: Service Catalog Service Desk Change Management Configuration Management 1 Contents Executive Summary... 1 Challenges
BEYOND DIAGRAMS AND SPREADSHEETS DATA CENTER INFRASTRUCTURE MANAGEMENT (DCIM)
BEYOND DIAGRAMS AND SPREADSHEETS DATA CENTER INFRASTRUCTURE MANAGEMENT (DCIM) THE CHALLENGE. Solve complexity The trend for consolidation and construction of ever- larger data centers has been basically
How Cisco IT Uses Software Configuration Management to Minimize Business Risk
How Cisco IT Uses to Minimize Business Risk Application change management process improves software quality and developer productivity. Cisco IT Case Study / Business Management / : This case study describes
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper
Protecting Business Information With A SharePoint Data Governance Model TITUS White Paper Information in this document is subject to change without notice. Complying with all applicable copyright laws
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Science/Safeguards and Security. Funding Profile by Subprogram
Safeguards and Security Safeguards and Security Funding Profile by Subprogram (dollars in thousands) Protective Forces 35,059 37,147 Security Systems 11,896 10,435 Information Security 4,655 4,595 Cyber
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Dealer Member Cyber-security
Administrative Notice General Please distribute internally to: Legal and Compliance Senior Management Contact: Wendy Rudd Senior Vice President, Member Regulation and Strategic Initiatives 416 646-7216
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
Problem Management Overview HDI Capital Area Chapter September 16, 2009 Hugo Mendoza, Column Technologies
Problem Management Overview HDI Capital Area Chapter September 16, 2009 Hugo Mendoza, Column Technologies Problem Management Overview Agenda Overview of the ITIL framework Overview of Problem Management
Integrating Physical Protection and Cyber Security Vulnerability Assessments
Integrating Physical Protection and Cyber Security Vulnerability Assessments Presented by Doug MacDonald Information Release # PNNL-SA-99462 Definition Wikipedia defines Vulnerability Assessments as the
CHAPTER 7 Software Configuration Management
CHAPTER 7 Software Configuration Management ACRONYMS CCB CM FCA MTBF PCA SCCB SCI SCM SCMP SCR SCSA SEI/CMMI SQA SRS USNRC INTRODUCTION Configuration Control Board Configuration Management Functional Configuration
SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012
SACM and CMDB Strategy and Roadmap David Lowe ActionableITSM.com March 20, 2012 Disclaimer The strategy and roadmap information presented here is generic by nature and based on a highly hypothetical use
Wilhelmenia Ravenell IT Manager Eli Lilly and Company
Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience
Systems Development Life Cycle (SDLC)
DEPARTMENT OF BUDGET & MANAGEMENT (SDLC) Volume 1 Introduction to the SDLC August 2006 Table of Contents Introduction... 3 Overview... 4 Page 2 of 17 INTRODUCTION 1.0 STRUCTURE The SDLC Manual consists
Software Asset Management on System z
Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager [email protected] Agenda Why Software Asset Management (SAM) The Discipline of Software
Baldrige Excellence Builder
manufacturing service small business nonprofit government education health care Baldrige Excellence Builder Key questions for improving your organization s performance Improve Your Performance The Baldrige
Maximize the synergies between ITIL and DevOps
BEST PRACTICES WHITE PAPER Maximize the synergies between ITIL and DevOps By Anthony Orr, Director of Service Management, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
Customer Relationship Management Software Package G-Cloud Service Definition
Customer Relationship Management Software Package G-Cloud Service Definition 2014 General Dynamics Information Technology. All rights reserved 1 Delivering consistent multi-channel (telephony, e-mail,
Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to
INTRODUCTION This book offers a systematic, ten-step approach, from the decision to validate to the assessment of the validation outcome, for validating configurable off-the-shelf (COTS) computer software
Confidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
Q: What is CVSS? Q: Who developed CVSS?
CVSS FAQ Q: What is CVSS? Q: Who developed CVSS? Q: What does CVSS not do? Q: What is involved in CVSS? Q: What are the details of the Base Metrics? Q: What are the details of the Temporal Metrics? Q:
Address IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY
IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined
The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC
Network Configuration Management
Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library
Spreading the Word on Nuclear Cyber Security
Spreading the Word on Nuclear Cyber Security Clifford Glantz, Guy Landine, Philip Craig, and Robert Bass Pacific Northwest National Laboratory (PNNL) PO Box 999; 902 Battelle Blvd Richland, WA 99352 USA
Datacenter Migration Think, Plan, Execute
Datacenter Migration Think, Plan, Execute Datacenter migration is often regarded as a purely technical, almost trivial side-project, to be delivered by existing IT staff alongside their day jobs. With
Managing successful change: IT service transformation at HMRC. AXELOS.com. The Stationery Office 2012
Managing successful change: IT service transformation at HMRC AXELOS.com Case Study October 2012 Contents Introduction 3 Background 3 Aims 3 The approach 3 Challenges 5 Successes 5 Conclusion 6 The future
TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews cannot be printed. TDWI strives to provide
ITSM 101. Patrick Connelly and Sandeep Narang. Gartner. www.it.ufl.edu
ITSM 101 Patrick Connelly and Sandeep Narang Gartner 1 IT Service Management 101 Agenda What is IT Service Management? Why is IT Service Management Important? Speaking a Common Language: Overview of Key
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
14 TRUTHS: How To Prepare For, Select, Implement And Optimize Your ERP Solution
2015 ERP GUIDE 14 TRUTHS: How To Prepare For, Select, Implement And Optimize Your ERP Solution Some ERP implementations can be described as transformational, company-changing events. Others are big disappointments
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Basel Committee on Banking Supervision. Working Paper No. 17
Basel Committee on Banking Supervision Working Paper No. 17 Vendor models for credit risk measurement and management Observations from a review of selected models February 2010 The Working Papers of the
Creating and Maturing a Service Catalog
Creating and Maturing a Service Catalog By Wendy Kuhn and Pam Erskine Third Sky, Inc. Introduction Developing a service catalog can seem like a simple marketing and communications activity or a daunting
How To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
Baldrige Core Values and Concepts Customer-Driven Excellence Visionary Leadership
Baldrige Core Values and Concepts These beliefs and behaviors are embedded in high-performing organizations. They are the foundation for integrating key performance and operational requirements within
DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I 050 07010 002
DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN April 2009 SLAC I 050 07010 002 Risk Management Plan Contents 1.0 INTRODUCTION... 1 1.1 Scope... 1 2.0 MANAGEMENT
The Asset Management Landscape
The Asset Management Landscape ISBN 978-0-9871799-1-3 Issued November 2011 www.gfmam.org The Asset Management Landscape www.gfmam.org ISBN 978-0-9871799-1-3 Published November 2011 This version replaces
Change Management Policy
Change Management Policy Change management refers to a formal process for making changes to IT services. The goal of change management is to increase awareness and understanding of proposed changes across
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
University Hospitals. May 2010
University s May 2010 The Organization University s (UH) is a diverse, not-for-profit integrated delivery system serving northeastern Ohio. The UH system consists of UH Case Medical Center, a major academic
IT Service Management
IT Service Management Policy Based IT Service Management White Paper Prepared by: Rick Leopoldi March 23, 2004 Copyright 2001. All rights reserved. Duplication of this document or extraction of content
Risk Management Primer
Risk Management Primer Purpose: To obtain strong project outcomes by implementing an appropriate risk management process Audience: Project managers, project sponsors, team members and other key stakeholders
ITIL in the Cloud. Vernon Lloyd. www.foxit.net www.askthefox.info
ITIL in the Cloud Vernon Lloyd ITIL is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is Registered in the U.S. Patent and Trademark Office www.foxit.net
Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology... Ron Huston Director
Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology.......... June 2010 Ron Huston Director Message from the State Enterprise Portfolio Project
The Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
From Chaos to Clarity: Embedding Security into the SDLC
From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Business Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com [email protected]
Business Continuity Planning 101 Presentation Overview What is business continuity planning Plan Development Plan Testing Plan Maintenance Future advancements in BCP Question & Answer What is a Disaster?
Security Patch Management
The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1
The purpose of this document is to define the Change Management policies for use across UIT.
UNIVERSITY OF UTAH - IT OPERATIONS POLICY UIT CHANGE MANAGEMENT POLICY Chapter or Section: Information Technology ID SOP-CNFM.001 UIT Configuration Management Policy Rev Date Author Change 4.4 9/29/11
Architecting enterprise BPM systems for optimal agility
Architecting enterprise BPM systems for optimal agility Dr Alexander Samarin www.samarin.biz About me An enterprise solutions architect From a programmer to a systems architect Experience in scientific,
Information Technology Infrastructure Library (ITIL )
Information Technology Infrastructure Library (ITIL ) A Case Study on Incident Management February 8, 2006 Tim Shepich Principal, IT Management Consulting, Nouri Associates Inc. itsmf USA San Diego Local
DOE O 226.1A, IMPLEMENTATION OF DEPARTMENT OF ENERGY OVERSIGHT POLICY CONTRACTOR ASSURANCE SYSTEMS CRITERIA ATTACHMENT 1, APPENDIX A
DOE O 226.1A, IMPLEMENTATION OF DEPARTMENT OF ENERGY OVERSIGHT POLICY CONTRACTOR ASSURANCE SYSTEMS CRITERIA ATTACHMENT 1, APPENDIX A DEFINITIONS Assurance systems encompass all aspects of the processes
Dell s SMART Approach to Workload Automation
Dell s SMART Approach to Workload Automation Executive Summary A short time ago, Dell, like many other companies, embarked on a broad initiative to integrate and upgrade its IT services to better satisfy
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
building a business case for governance, risk and compliance
building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building
Subject: 1268-1 Information Technology Configuration Management Manual
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
5 Steps to Choosing the Right BPM Suite
5 Steps to Choosing the Right BPM Suite BPM Suites can deliver significant business benefits and a fast ROI but only if you choose the right one By Laura Mooney, Metastorm Copyright 2009, Metastorm Inc.
Baseline Change Control Procedure
Earned Value Management System (EVMS) Implementing Procedures Baseline Change Control Procedure EVMS-P-7 Revision 0 - October, 2006 Change Log Earned Value Management System Procedure Change Log Revision
Root Cause Analysis Concepts and Best Practices for IT Problem Managers
Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer
Demand-Driven Customer Experience Management: Solutions for US Healthcare Payers
White Paper Demand-Driven Customer Experience Management: Solutions for US Healthcare Payers EXECUTIVE SUMMARY Consumer expectations are changing in every industry and healthcare is not immune to these
ITIL Event Management in the Cloud
ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum July 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
