Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

Size: px
Start display at page:

Download "Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan"

Transcription

1 Identity & Access Management Case Study & Lessons Learned Prepared by Tariq Jan

2 Investment Bank Case Study Top 5 leading global financial services firm $116 billion in revenue $2 trillion in assets 220k + employees operating in 60 countries

3 Client Profile: Top 5 leading global financial services firm $116 billion in revenue $2 trillion in assets 220k + employees operating in 60 countries Case Study Problem Statement/Key Pain Points: Failed provisioning, leavers & transfers process and tools Ongoing exposure to audit deficiencies Heavy reliance on Inconsistent, ad-hoc & manual processes and multiple homegrown tools Cost of maintaining a compliant environment; Lines of business within the firm proceeding down different paths and making respective investments in certification tools, processes and support teams Inability to enforce preventive controls No control / visibility on privileged users; orphan or rogue accounts Huge gaps between business and IT groups leading to inconsistent and disjointed business user experience

4 Case Study Approach: Engagement of key stakeholders within the firm Requirements agreed for a 3 year strategy and roadmap 9 month firm-wide proof of concept to evaluate internal and external tools Buy vs. build analysis to select strategic tool Off shore team established to support product implementation and operate tasks Implementation / Achievements Loaded user data for 220k+ users (employees and contractors) Aggregated user entitlements by building feeds to 60% of application estate 400 application instances (1,200 data sources) with corresponding infrastructure (DB, Platform) certified Over 104k deletes raised for inappropriate access within 9 months 40% reduction in user support calls due to friendly user interface and ease of certification 60% reduction in operational cost and increase of number of applications certified by 150% Internal and external audit approval on process and implementation RBAC rollout of M&A applications Automating and consolidating compliance controls including: access recertification and SoD Policy enforcement and risk management by using policy violations and rules

5 Lessons Learned - What went well Project Sponsorship Engagement of a steering committee and working group consisting of LOB, Audit and other key stakeholders across the firm. Proof of Concept and Tool Selection Requirements evaluated against a 3 year road map & strategy. Governance Internal Audit team engaged during POC and governance audit on program delivery. Sign-off from audit prior to go-live and at the end of each recertification cycle. Weekly status reports to AD teams for on-boarding status of applications. Real-time dashboards / reports to LOB / Audit on certification status. 100% close out on each certification cycle. Program team / Vendor relationship 1 team, 1 goal mentality from internal and external resources. Vendors helpful and flexible in accommodating last minute changes, customization requests and providing support for infrastructure set up. Pilots 5 pilots to ensure all process related, customization, reporting and dashboard bugs and issues captured and resolved prior to Go-Live.

6 Lessons Learned - What went well Clean-Up Substantial number of deletes identified as part of recertification cycle. Application change management Create a tracker on status of all incoming feeds and identify / communicate breaks to appropriate parties. Process / Cert experience Well defined, robust and scalable process for on boarding, testing and roll-out to production. Data presented at entitlement level with clear English descriptions. S.O.D /policy violations identified upfront as part of cert cycle. Knowledge Gain Knowledge transfer during program roll out allowed internal team to take on responsibility of all activities from a build, test and operate perspective. Schedule & Delivery Exceeded expectations of LOB by delivering 20% applications above forecast and delivered within timelines and allocated budget. Reduction in calls to support team during cert cycles.

7 Lessons Learned - What didn t go well External factors Reduction in project funding due to financial crisis led to freeze on headcount hire. Internal resources utilized did not have appropriate skill set. Due to merger priorities for AD and other teams changed leading to a delay in turning around program requests. Application & Environment complexities Underestimated complexities of applications, internal infrastructure support processes and AD build team effort. Addition of db and os layers within the cert added additional dependencies and complexities to the overall program. Infrastructure set up Time taken to install and set-up infrastructure to meet program and tool requirements. Removal of inappropriate access Huge dependency on provisioning teams to remove inappropriate access within the required window of time and accuracy. Required program team to very closely manage and track status of deletes through the end to end process. Scope Management Applications prioritized for on-boarding constantly changing due to AD teams not being able to supply information on time; applications on-boarded decommissioned without notice; new merger applications added with RBAC complexities, LOB driven last minute inclusions.

8 Lessons Learned - What I would do differently Project Resourcing Ensure resources with appropriate skill set and experience are assigned to deliver program. Infrastructure Sizing Ensure infrastructure is sized to accommodate minimum of 12 months requirements upfront and performance tested with all reports / dashboards / cert loads prior to Go-Live. Identify all external factors and internal dependencies. Outsourced IT, hardware delivery or internal processes that may delay roll-out. Work more actively with Infra support teams to ensure timely availability of infra requirements and support Scope / Escalation Keep it contained and push back if required to ensure success of program. Ensure you have a contingency of applications in pipeline. Reduce number of reports / custom requests for initial stages of program. Reach out to senior management sooner regarding concerns with non-timely or lack of response from stakeholders.

9 Lessons Learned - What I would do differently AD Commitment & Engagement Considering the complexity and dependencies involved in this space, full engagement of AD teams with a committed completion date would be a great benefit. Maintain a better application inventory by ensuring AD teams provide accurate and accountable status of applications to be on-boarded. Funding Continuous program of work and funding. This is not a one off program with a start stop date. This will require funding and commitment from senior stakeholders and we need to ensure our steering committee members have the support to maintain the momentum of the program throughout the delivery of the defined program against the roadmap / strategy. Other Centralise the security admin team and ensure increase in accountability and reporting to key stakeholders. Ensure provisioning and movers & leavers program of works are governed by 1 program office. Look to move towards user centric view from app centric view as part of roadmap. Allow more time in schedule to test patches / bug fixes.

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Identity Lifecycle Management. Lessons Learned

Identity Lifecycle Management. Lessons Learned Identity Lifecycle Management Lessons Learned Who is Advancive Pasadena, CA Bangalore, India Established in May 2009 Headquartered in Southern California, with additional delivery center in Bangalore and

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

Establishing a Mature Identity and Access Management Program for a Financial Services Provider

Establishing a Mature Identity and Access Management Program for a Financial Services Provider Customer Success Stories TEKsystems Global Services Establishing a Mature Identity and Access Management Program for a Financial Services Provider FINANCIAL SERVICES NETWORK INFRASTRUCTURE SERVICES INFORMATION

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

RSA enables rapid transformation of Identity and Access Governance processes

RSA enables rapid transformation of Identity and Access Governance processes RSA enables rapid transformation of Identity and Access Governance processes Sean Peasley, Principal Laxman Tathireddy, Senior Manager Deloitte & Touche LLP Cyber Risk Services Identity and Access Governance

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Identity Access Management Challenges and Best Practices

Identity Access Management Challenges and Best Practices Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December

More information

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud Terrorist Sabotage Theft Credit Card Fraud Theft Corporate Malfeasance HCL Information Security Practice Why to go for IAM? Terrorist sabotage. theft. Credit card fraud. Corporate malfeasance. Privacy

More information

Training Programs for Enterprise-Wide Change

Training Programs for Enterprise-Wide Change Training Programs for Enterprise-Wide Change Top Five Requirements for Programs that Deliver Prepared by VisionCor, Inc. 1 Contents Summary... 3 Before We Get Started... 3 Program Principles... 4 Business

More information

Transforming FP&A: Combining Process Redesign & Technology to Deliver Insights

Transforming FP&A: Combining Process Redesign & Technology to Deliver Insights Transforming FP&A: Combining Process Redesign & Technology to Deliver Insights Session 602 IASA 86 TH ANNUAL EDUCATIONAL CONFERENCE & BUSINESS SHOW Project Overview The Hanover Insurance Group (THG) is

More information

Supply Chains: From Inside-Out to Outside-In

Supply Chains: From Inside-Out to Outside-In Supply Chains: From Inside-Out to Outside-In Table of Contents Big Data and the Supply Chains of the Process Industries The Inter-Enterprise System of Record Inside-Out vs. Outside-In Supply Chain How

More information

Best Practices Report

Best Practices Report Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT OMADA IDENTITY SUITE - Adaptable Identity Management and Access Governance Governance Compliance Identity Management Cloud Self-Service Security Complete control of who has access to what is an essential

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned Discussion Overview Company Background IAM Inertia IAM Value Proposition IAM at Chase IAM Team Scope and Mission IAM Program Functional Structure IAM Team Functional Structure IAM Program Progress IAM

More information

Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014

Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014 Managed Service Solutions Catalogue MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014 1 MANAGED SERVICES SOLUTIONS CATALOGUE Managed Services Solutions Catalogue Managed Service Solutions

More information

Sarbanes-Oxley Compliance for Cloud Applications

Sarbanes-Oxley Compliance for Cloud Applications Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this

More information

How To Transform Treasury

How To Transform Treasury Treasury Transformation How BAT achieved treasury efficiency Jaap Nooij (BAT) Judith van Paassen (Zanders) November 2013 Agenda Introducing BAT and Zanders Triggers for treasury transformation Zanders

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Complete Cloud Lifecycle Management Optimize Plan Meter & Charge Manage Applications and Business

More information

Building a sustainable CMDB

Building a sustainable CMDB Building a sustainable CMDB Alvin Deen 7 th June 2016 Agenda The Changing Landscape What is a CMDB vs CMS? Building a Sustainable CMDB CMDB in the Changing Landscape Traditional IT Efficiently host workloads

More information

Enabling Agile, Efficient and Reliable Global HCM Through Integrated Payroll

Enabling Agile, Efficient and Reliable Global HCM Through Integrated Payroll ADP STREAMLINE SM Enabling Agile, Efficient and Reliable Global HCM Through Integrated Payroll HR. Payroll. Benefits. Complex legal and tax mazes, cultural differences and labor laws - the complexity of

More information

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing 1 Introduction to Identity Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications An overview of business drivers and technology solutions. 2 Identity and Access Needs

More information

TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR

TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR (BUY VS BUILD) APRIL 17, 2015 LEVERAGING TECHNOLOGY FOR AUDIT Utilizing Software to Administrate Audit Process 40% 35% 30% 37% Tools Leveraged 32% 36% Yes

More information

Continuous Controls Monitoring. Virginia ISACA January Meeting 19 January 2010

Continuous Controls Monitoring. Virginia ISACA January Meeting 19 January 2010 Continuous Controls Monitoring Virginia ISACA January Meeting 19 January 2010 Today s Agenda What We Are Hearing About Risk Internal Controls Continuous Control Monitoring What is CCM? Framework EY Point

More information

Qlik UKI Consulting Services Catalogue

Qlik UKI Consulting Services Catalogue Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction

More information

BI STRATEGY FRAMEWORK

BI STRATEGY FRAMEWORK BI STRATEGY FRAMEWORK Overview Organizations have been investing and building their information infrastructure and thereby accounting to massive amount of data. Now with the advent of Smart Phones, Social

More information

Oracle Value Chain Execution

Oracle Value Chain Execution Oracle Value Chain Execution Hotel Grand Hyatt, Santa Cruz 26 th April -2011 Shirish Gariba CIO @ DIESL DIESL Evolution 2003 2006 2011 Business Trading Business 3PL Integrated Logistics Service Provider

More information

MAXIMIZING VALUE FROM SAP WITH SUPPLY CHAIN COLLABORATION IN A SOFTWARE-AS-A-SERVICE MODEL. An E2open White Paper. Contents.

MAXIMIZING VALUE FROM SAP WITH SUPPLY CHAIN COLLABORATION IN A SOFTWARE-AS-A-SERVICE MODEL. An E2open White Paper. Contents. White Paper MAXIMIZING VALUE FROM SAP WITH SUPPLY CHAIN COLLABORATION IN A SOFTWARE-AS-A-SERVICE MODEL An E2open White Paper 2 2 4 6 Contents Executive Overview Issues and Challenges Resolution Plan for

More information

SIEM Implementation Approach Discussion. April 2012

SIEM Implementation Approach Discussion. April 2012 SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual

More information

Obtaining Enterprise Cybersituational

Obtaining Enterprise Cybersituational SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational

More information

Architecting BPM Through a Center of Excellence at Wells Fargo Bank Paul Tazbaz, Enterprise Architect, Wells Fargo, California, USA

Architecting BPM Through a Center of Excellence at Wells Fargo Bank Paul Tazbaz, Enterprise Architect, Wells Fargo, California, USA Building & Managing a Successful BPM CoE 11:00-11:30 Architecting BPM Through a Center of Excellence at Wells Fargo Bank Paul Tazbaz, Enterprise Architect, Wells Fargo, California, USA Architecting BPM

More information

Introduction to Change

Introduction to Change Introduction to Management and SDLC Steve Owyoung Sr. Manager KPMG LLP, IT Advisory Doug Mohrland Audit Manager Oracle Corporation Discussiontopics o significance o o s o o o o Software (SDLC) s Organization

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for

More information

Critical Database. Oracle Enterprise Manager Oracle Open World 2010 Presented dby Venkat Tekkalur. Prem Venkatasamy. Principal Technical Architect

Critical Database. Oracle Enterprise Manager Oracle Open World 2010 Presented dby Venkat Tekkalur. Prem Venkatasamy. Principal Technical Architect Real World Mission Critical Database Monitoring i at AT&T with Oracle Enterprise Manager Oracle Open World 2010 Presented dby Venkat Tekkalur Principal Technical Architect Prem Venkatasamy Director IT

More information

Best Practices for Implementing Software Asset Management

Best Practices for Implementing Software Asset Management Best Practices for Implementing Software Asset Management Table of Contents I. The Case for Software Asset Management (SAM)............................ 2 II. Laying the Groundwork for SAM............................................

More information

IFRS 15: Implementation challenges

IFRS 15: Implementation challenges www.pwc.ru/ IFRS 15: Implementation challenges 29 Christoph Cruss Partner, Germany Agenda Revenue Impacts the Entire Organization Impact Study of various Industries Key aspects to consider implementing

More information

Distributed Agile Development in the Cloud

Distributed Agile Development in the Cloud W H I T E PA P E R Distributed Agile Development in the Cloud A new development process using the Power of Cloud and combining the merits of Agile, Feature Branching, Continuous Integration, Continuous

More information

Automated User Provisioning

Automated User Provisioning Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110

More information

Field Service in the Cloud: Solving the 5 Biggest Challenges of Field Service Delivery

Field Service in the Cloud: Solving the 5 Biggest Challenges of Field Service Delivery Field Service in the Cloud: Solving the 5 Biggest Challenges of Field Service Delivery The ServiceMax Whitepaper Executive Summary The time has come for field service organizations to also reap the benefits

More information

Service Integration &

Service Integration & This is a DRAFT document, being published for review & comment The content is therefore subject to change & revision This document is part of the XGOV Strategic SIAM reference set Service Integration &

More information

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM Toby Emden Vice President Strategy and Practices 2014 CONTENTS Evolution Business Drivers Provisioning

More information

Key USP s. Multiple PCI level GRC tool

Key USP s. Multiple PCI level GRC tool PCI GRC tool Introduction GP history Visa level 1 approved hosting facility Niche product for a specific problem Reduce BAU cost and cost of PCI compliance Reduce cost in managing 3rd parties PCI stakeholder

More information

June 2008 Report No. 08-038. An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers

June 2008 Report No. 08-038. An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers John Keel, CPA State Auditor An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers Report No. 08-038 An Audit Report on The Department of Information

More information

Oracle Fusion Project Portfolio Management CLOUD SERVICE. The New Standard for Project Portfolio Management

Oracle Fusion Project Portfolio Management CLOUD SERVICE. The New Standard for Project Portfolio Management Oracle Fusion Project Portfolio Management CLOUD SERVICE The New Standard for Project Portfolio Management Key Features. Complete History tracking End-to-end enterprise PPM for a single source of project

More information

RSA Identity Management & Governance (Aveksa)

RSA Identity Management & Governance (Aveksa) RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity

More information

Auditing the Software Development Lifecycle ISACA Geek Week. Mike Van Stone Sekou Kamara August 2014

Auditing the Software Development Lifecycle ISACA Geek Week. Mike Van Stone Sekou Kamara August 2014 Auditing the Software Development Lifecycle ISACA Geek Week Mike Van Stone Sekou Kamara August 2014 Agenda Introduction Audit Scope Project Initiation SDLC Processes Stakeholders Common Development Methodologies

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

PM Services. Portfolio Strategy, Design and Build

PM Services. Portfolio Strategy, Design and Build PM Services Portfolio Strategy, Design and Build Portfolio Strategy, Design and Build PM Services consultants will design an effective portfolio management system and works closely with client management

More information

Request for Information Integrated Portfolio, Project & Management Information System Technical Assistance Unit RFI: TAU/01

Request for Information Integrated Portfolio, Project & Management Information System Technical Assistance Unit RFI: TAU/01 Integrated Portfolio, Project & Management Information System Technical Assistance Unit RFI: TAU/01 TABLE OF CONTENT 1 Disclaimer... 4 2 Purpose... 4 3 Background... 4 4 Specific Objectives of this Document...

More information

Building a Business Case for Supply Chain Execution in the Cloud

Building a Business Case for Supply Chain Execution in the Cloud Building a Business Case for Supply Chain Execution in the Cloud Add Strategic Value to Your Business Getting your products to your customers is critical to business success. Yet often, supply chain execution,

More information

Project Implementation Process (PIP)

Project Implementation Process (PIP) Vanderbilt University Medical Center Project Implementation Process (PIP).......... Project Implementation Process OVERVIEW...4 PROJECT PLANNING PHASE...5 PHASE PURPOSE... 5 TASK: TRANSITION FROM PEP TO

More information

NetSuite The Sarbanes-Oxley Compliance Engine

NetSuite The Sarbanes-Oxley Compliance Engine NetSuite The Sarbanes-Oxley The elephant in the room is that Sarbanes-Oxley doesn t directly specify the key role of technology and its support of corporate compliance. The reality is that all roads to

More information

2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky

2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky 2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative Improving State Operations: Kentucky Kevin Moore 6/1/2011 Executive Summary: Accounts Payable was a time consuming, inefficient

More information

Success Factors for Global Alignment and Targeting Platform. Pranav Lele

Success Factors for Global Alignment and Targeting Platform. Pranav Lele Success Factors for Global Alignment and Targeting Platform Pranav Lele Success Factors for Global Alignment and Targeting Platform Pranav Lele Increasing complexity and the globalization of pharma business

More information

Minimizing ITSM cost of entry: HP Service Anywhere

Minimizing ITSM cost of entry: HP Service Anywhere Minimizing ITSM cost of entry: HP Service Anywhere Simple. Scalable. SaaS. Ioannis Mangos Senior Business Consutant HP Software Greece & Cyprus Fundamental question: On-Premise or SaaS Key factors affecting

More information

QUICK FACTS. Consolidating Service Desks Post-Merger for a Leading U.S. Energy Supplier TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Consolidating Service Desks Post-Merger for a Leading U.S. Energy Supplier TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Energy Services, Managed Services Offering/IT Support Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Energy Revenue: $23.5 billion Employees: Approximately 26,000

More information

Consolidated Edison Company of New York, Inc. Gas Supply Testimony of Peter Carnavos. Index of Exhibits and White Papers

Consolidated Edison Company of New York, Inc. Gas Supply Testimony of Peter Carnavos. Index of Exhibits and White Papers Consolidated Edison Company of New York, Inc Gas Supply Testimony of Peter Carnavos Index of Exhibits and White Papers Exhibit (PTC-2) Part 1 IGS Project One Changes - White Paper Part 2 IGS Phase 3 Enhancements-

More information

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA RSA, The Security Division of EMC Zamanta Anguiano Sales Manager RSA The Age of the Hyperextended Enterprise BUSINESS ISSUES IMPACT Innovation Collaboration Exploding Information Supply Chain Customer

More information

Module 6 Essentials of Enterprise Architecture Tools

Module 6 Essentials of Enterprise Architecture Tools Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade

More information

WHY ISN T EXCEL GOOD ENOUGH INTRODUCTION THE COMPARISON: EXCEL VS. PRIMAVERA S CONTRACT MANAGER EXECUTIVE SUMMARY MICROSOFT OFFICE EXCEL OPTION

WHY ISN T EXCEL GOOD ENOUGH INTRODUCTION THE COMPARISON: EXCEL VS. PRIMAVERA S CONTRACT MANAGER EXECUTIVE SUMMARY MICROSOFT OFFICE EXCEL OPTION WHY ISN T EXCEL GOOD ENOUGH INTRODUCTION was asked to support a biotech Owner on a significant scale-up project to take their drug from clinical trial manufacturing to full production levels. This project

More information

Managing Third-Party. Service Providers. An Astea White Paper WHITEPAPER

Managing Third-Party. Service Providers. An Astea White Paper WHITEPAPER Managing Third-Party WHITEPAPER Service Providers An Astea White Paper Introduction For companies with a rapidly growing customer base, meeting an expanding demand for field service can be daunting. You

More information

Smart Choice Business Consulting Data Centre Migration Story Board

Smart Choice Business Consulting Data Centre Migration Story Board Smart Choice Business Consulting Data Centre Migration Story Board Introduction A data center relocation can be best described as a controlled disaster that involves high risk and requires a minute to

More information

Security and HIPAA Compliance

Security and HIPAA Compliance Contents Meeting the Challenge of HIPAA...3 Key areas of risk...3 Solutions for meeting the challenge of HIPAA...5 Mapping to HIPAA...5 Conclusion...7 About NetIQ...7 About Attachmate...7 Security and

More information

How To Be Successful At Workday

How To Be Successful At Workday VMware Global HR Application in the Cloud March 2012 VMware HR System Replacement: Key Drivers for Change HR systems footprint was not optimized or scalable to support VMware s growth. Original core HR

More information

BUSINESS INTELLIGENCE

BUSINESS INTELLIGENCE BUSINESS INTELLIGENCE Enabling Insights Across the Enterprise Patrick Callahan AST Corporation Practice Director Business Intelligence Naperville, Illinois USA 2011 Southern California Public Sector EBS

More information

Implementing End-to-End agile Portfolio Management. Thomas Haas [email protected]

Implementing End-to-End agile Portfolio Management. Thomas Haas thomas@inventique.net Implementing End-to-End agile Portfolio Management Thomas Haas [email protected] My Reference INVENTIQUE.NET End-to-End Portfolio Management 2014-02-26 2 Implementing End-to-End Portfolio Management

More information

HR Technology Strategies that Work in Healthcare. Background

HR Technology Strategies that Work in Healthcare. Background HR Technology Strategies that Work in Healthcare Shawn Davis Intermountain Healthcare Background Shawn Davis Director, HR Workforce Solutions & Analytics IHRIM Board of Directors (2009-2011) HRIP Certification

More information

Identity and Access Management Point of View

Identity and Access Management Point of View Identity and Access Management Point of View Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation

More information

National IT Project Management Methodology

National IT Project Management Methodology NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA National IT Project Management Methodology Project Reporting Support Guide Version 0.5 Project Reporting Support Guide version 0.5 Page 1 Document Version

More information

Planning and Budgeting Cloud Service

Planning and Budgeting Cloud Service Planning and Budgeting Cloud Service You don t know what you don t know Andrew Mason Qubix International Ltd 1 Today s Topics The Challenges 5 Steps To Planning Brilliance Planning and Budgeting Cloud

More information

Project Risk and Pre/Post Implementation Reviews

Project Risk and Pre/Post Implementation Reviews Project Risk and Pre/Post Implementation Reviews Material Changes to the System of Internal Control VGFOA Conference (Virginia Beach, VA) May 20, 2015 Agenda/Objectives Understand why system implementations

More information

www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015

www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015 www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle Partner Agenda 1. Introduction 2. Overview of ERP security architecture 3. Key ERP security models 4. Building and executing

More information

Managing Open Source Code Best Practices

Managing Open Source Code Best Practices Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate

More information

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Paul

More information

How To Improve Your Business

How To Improve Your Business Information Technology Software Services Council Committee May 7, 2013 Technology Software Presentation Identify stakeholder software demands. Challenges (requirements) and vision (outcomes). Timeline

More information

IAM Open Discussion. Todd Rossin Managing Director 610.329.3276 [email protected]

IAM Open Discussion. Todd Rossin Managing Director 610.329.3276 todd@idmworks.com Identity & Access Management, Managed Services, Custom Application Development and Data Center Solutions IAM Open Discussion Leave it to us Todd Rossin Managing Director 610.329.3276 [email protected]

More information