NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

Size: px
Start display at page:

Download "NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives"

Transcription

1 NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information Technology Services Enterprise Security and Risk Management Office

2 Executive Summary In , the State of North Carolina (NC) faced many challenges as it tried to improve the State s continuity of Information Technology (IT) operations. In the summer of 2008, the brand new Western Data Center came online, giving the state two data centers. Legislative support and funding for the construction of this new data center were predicated on cost savings by conducting IT disaster recovery (DR) and business continuity activities in-state. NC was letting most of its outsourced recovery activity vendor contracts expire. The State essentially had to determine how to best maximize the use of both data centers to support ongoing operations and in-house disaster recovery and business continuity functions. As the planning for this major shift in the entire enterprise approach to IT Business Continuity Planning (BCP) progressed, we realized we did not have the information necessary from the agencies to perform analysis and make wise decisions on the optimization of State IT recovery resources. We desperately needed a way to collect and analyze data on critical IT systems and infrastructure from all State agencies. To better understand and address the business recovery needs of our IT community, we had to determine if there were common gaps impeding the recovery of critical applications. We asked ourselves if all processes and relationships were identified and properly prioritized with known contingencies. This approach highlighted weaknesses in our infrastructure. Recognizing this data only partially supported a comprehensive business continuity planning strategy, we partnered with the NC Division of Emergency Management and the US Department of Homeland Security to fully understand the risk universe that could impact our State and data centers. Prior to 2009, the 30 Executive Branch Agencies submitted annual business continuity plans (BCPs) to the State Chief Information Officer, as required by General Statute ; however, while viable at the agency level, they lacked a standardized enterprise approach. The plans were a disparate collection with little common ground for an enterprise-wide analysis to reach an understanding of statewide strengths and weaknesses. Compiling an enterprise view to identify priorities and gaps was nearly impossible. North Carolina needed a universal toolset and risk management methodology to produce a cohesive solution while retaining independent plan administration at the agency level. By March 2010, NC MRITE accomplished the following: improved, standardized and centrally managed business continuity planning tools; evaluated the data from a new enterprise toolset to identify common gaps in BCPs for the recovery of critical applications; identified a means to track critical dependencies to plan for adequate support infrastructure; partnered with the US Department of Homeland Security and the NC Division of Emergency Management on security measures for both data centers; and provided agencies with the opportunity to conduct four formal business continuity tests at the new data center. State agencies successfully completed their 2009 BCPs using a standardized approach and enterprise toolset. NC now has a solid IT recovery infrastructure. We count on improving our approach year after year. - 2-

3 Description of the Business Problem and Solution: Business Problem: The State needed to transition from an outsourced disaster recovery vendor to the new Western Data Center; however, good information on IT needs at the enterprise level was lacking because agencies were following their own business continuity approaches. NC did not have a strategy for migrating agencies from independent methodologies to a singular functional planning approach to support enterprise-wide analysis of strengths and weaknesses in the State s readiness to prepare for and respond to IT crises. Successfully addressing this challenge would require a common toolset and statewide standards and policies for developing and maintaining BCPs while meeting the individual needs of 30 executive branch agencies. State agencies were preparing business continuity plans with disparate methodologies and lacked a standardized approach. These inconsistencies across the State made identification of critical IT infrastructure and application dependencies difficult to identify and placed a burden on statewide IT service support. When the existing business continuity planning software was due for renewal, the client-server version agencies were familiar with was no longer available. An upgrade to a web-based version was necessary. The upgraded BCP application qualified for hosting in a virtual machine environment. North Carolina began embracing virtualization in 2008 and wanted to leverage this technology option. The State had to decide between upgrading 30 individual agency licenses or converting to an enterprise-wide concurrent user license for all agencies. Agencies favored upgrading the individual licenses; however, this option came with a projected cost exceeding $1 million for 30 separate installations of the required three-tier web, application and database server environment. Converting to an enterprise-wide concurrent user license required a single version of the three-tier environment plus standardized policies and rule sets. This opportunity for standardization meant addressing security and access controls to keep agencies data separate while providing flexibility to meet the needs of small and large size agencies, both consolidated and non-consolidated. Business Solution: A small team of subject matter experts within the State s Enterprise Security and Risk Management Office led the way with the identification and implementation of five key IT goals to improve the State s approach to business continuity planning and promote critical IT service continuity management. Goal 1: Improve, standardize and centrally manage business continuity planning tools. Standardization and cost reductions were recognized by converting from 30 agencies individually hosting the business continuity planning application to one enterprise-wide virtual installation of the software. If hosting remained at the agency level, a minimum of 90 servers would have been necessary with an implementation cost exceeding $1 million in the first year. A proof of concept pilot for virtual hosting was completed in November Based on the positive results of the pilot, the State chose to proceed with a more cost effective virtual hosted solution. The virtual hosting solution is $42,000-3-

4 per year. The BCP software contract was renegotiated in November 2008 to convert the 30 individual application licenses to one enterprise-wide concurrent user license for use by all agencies. The contract renegotiation resulted in a cost reduction of $36,725 at contract year-end December 31, 2008, and a further reduction of $10,000 at contract year-end December 31, A pilot test with a small group of agencies was conducted between December 2008 and February Full on-boarding to the new standardized BCP application was completed between February and June Executive branch agencies submitted their first business continuity plans following the standardized enterprise format in September Enhanced application security allows BCP Administrators the ability to grant/restrict users specific privileges via roles that define access to screens, features, plans, data, documents and reports. Conditional plan and record access can be set for individuals, meaning the users will automatically only see the information that is pertinent to their plan building, such as all plans and employees associated with a specific department. Goal 2: Use the data from enterprise business continuity planning tools to help identify common gaps in BCPs for the recovery of critical applications. Starting in 2009, plans were standardized using Crystal reports; all agency BCPs followed the same table of content structure, resulting in all plans having the same look and feel. This common approach makes it easier to locate critical plan elements and compile statewide results. Agencies were asked to capture critical application data in the enterprise Application Portfolio Management (APM) tool. APM tool data was identified as another key resource in our toolset which produced valuable new metrics for senior State managers including Agency Heads. Reports were provided to the Legislature on application prioritization. See recovery metrics below. - 4-

5 Goal 3: Identify critical dependencies and plan for adequate support infrastructure. The numbers of factors in a continuity plan are staggering. Even the most complete continuity plans can suffer if one process is not properly prioritized, creating a chain effect that can seriously impact an organization s downtime. Understanding the relationships between BCP elements specifically processes, applications and hardware, and how each element depends on another greatly reduces the likelihood of leaving important contingencies out of a plan. It avoids issues caused by overlapping priorities, over-allocation of resources and under utilization of space. This enterprise approach provides better integration and capability to roll up agency BCPs within an agency as well as statewide views. The enhanced web-based business continuity application provides graphical dependency mappings, allowing the data center IT management to see the connections between the data center infrastructure and the agency s applications. Agencies have the means to identify their critical application dependencies using the new planning tools, paving the way for IT Operations to use these dependency maps to refine infrastructure support services. For example, the network, Internet access and hosting environment need to be restored before a critical web-based application can be restored. This infrastructure order is hard to identify at all levels. The more intricate the dependency relationships for critical applications that are not fully documented, the greater the service restoration risk. The first baseline view of critical dependencies was completed with the September 2009 BCP submissions. Goal 4: Work with the US Department of Homeland Security and the Division of Emergency Management on security measures at the Eastern Data Center and Western Data Center. We invited the US Department of Homeland Security to help us assess our security measures in place at both of our data center facilities during April We have documented our infrastructure strengths and are focusing on opportunities for improvement. We continue to work closely with the NC Division of Emergency Management to stay abreast of regional risks that could adversely impact our State. Planning for the continuity of critical IT systems operations and security measures is now an integral part of the State s continuity planning process. Goal 5: Provide agencies with the opportunity to conduct both informal and formal business continuity tests and maintain records of agency critical application BCP tests. Semi-annual formal test cycles are in place and agencies may request alternate test windows. The first formal disaster recovery test was conducted at the new Western Data Center in June Formal testing cycles were also conducted in December 2008 and June and December The Western Data Center is poised to host the next disaster recovery exercise in June Tracking of business continuity and disaster recovery testing is now more robust with standardized plan structures and test plans. Test results are documented in the BCP application for use in plan analysis and - 5-

6 validation, audit assessments, and reporting to management. Agencies are encouraged to conduct table-top exercises at any time throughout the year. Significance of the Project: The State now operates from a position of strength because we have the knowledge gained from a unified functional approach for guiding State agencies in business continuity plan preparation, application criticality ranking, and dependency mapping. Statewide critical infrastructure dependencies are now documented in a common toolset, allowing State IT management the much needed insight to provide the best IT service solutions. Statewide standards and policies for developing and maintaining BCPs have been developed and are being followed. The State now functions under one congruent enterprise-wide business continuity approach, replacing disparate practices at the agency level. Secure access to business continuity plans from any location via the web supports plan exercises, relocation to alternate sites, travel, and the expanding teleworking community within NC government. Disaster recovery was brought in-state during utilizing the new Western Data Center, removing the dependency on an outsourced vendor. Our understanding of enterprise risks that could impact IT has been strengthened by our partnering with the NC Division of Emergency Management and the US Department of Homeland Security. Completion of these goals and ongoing support are considered key IT initiatives for NC. Achieving these goals was supported by continuous open dialogues with the agencies. Formal communications announcing the projects and detailing key dates and deliverables for the goals were sent to Agency Heads, Chief Information Officers (CIOs) and BCP Administrators in advance. Hands-on training and awareness meetings were held five times starting in late 2008 through April A communications listserv is utilized to distribute FAQs, address concerns, and maintain a sense of open communication at all times throughout the project. Benefit of the Project: North Carolina recognized an immediate benefit by discontinuing disaster recovery services through an outsourced vendor. The millions of dollars sent out of state for this service and related travel now remains in-state and new jobs were created to support the Western Data Center. The risk of potentially being bumped out of the vendor s disaster recovery center is no longer a factor. The State initiated a new virtual hosting solution for all executive branch agencies business continuity planning application. This eliminated the need for each agency to purchase a three-tier server environment and responsibility for IT support and application administration. This approach provides homogeneous application administration with a common toolset complete with over 100 standardized reports, allowing each agency to maintain independence in their plan development as well as the capability for a statewide view. The standardized plan content structure provides a consistent look and feel to all agency plans which facilitates plan reviews, training, auditing, application and infrastructure support. - 6-

7 Significant financial benefit was realized with the cost avoidance at the individual agency level. A typical three-tier (web, application, and database) server installation was estimated to cost each of the 30 agencies over $16,000 annually for hosting above initial setup costs. Cost reduction to the State with centralized hosting, reduced licensing fees and the standardization of the BCP resulted in a net savings exceeding $1 million the first year. Savings for the first three years are projected to exceed $1.9 million. Actual savings through May 2010 are $1,796, BCP Application Hosting Options 3 Year Cost Projections Licenses Servers Option 1 Individual $419, $2,082, = $2,502, Option 2 Enterprise $383, $126, = $509, Projected cost savings over 3 years = $1,993, The scope of this statewide IT initiative received high-level visibility and generated interest from the Office of the Governor, Agency Heads, and the Legislature. Enterprise Risk Management included bringing a new data center online, conducting a statewide critical application gap analysis, and running a pilot hosting solution from proof of concept to full implementation in a virtualized environment. The State provided a solid management structure, including training for agency BCP Administrators on how to use the new BCP toolset to prepare their plans and procedures following a standardized approach, and provided a formal test environment at the new State data center to conduct their continuity and disaster recovery scenarios. The State CIO is now recognized as a valuable asset to the State s Business Continuity Planning team. NC MRITE improved, standardized and centrally managed business continuity planning tools; evaluated the data from this enterprise toolset to identify common gaps in BCPs for the recovery of critical applications; identified critical dependencies to plan for adequate support infrastructure; partnered with the US Department of Homeland Security and the NC Division of Emergency Management on security measures for both data centers; and provided agencies with the opportunity to conduct four formal business continuity tests to-date at the new data center. State agencies successfully completed their 2009 BCPs using a standardized approach and enterprise toolset. Agencies have taken tours of the new data center to see advanced technologies in operation, and are embracing it as their alternate IT processing and DR facility. NC MRITE aligns with many of NASCIO s 2010 State CIO priorities. These include budget and cost control, consolidation, shared services, security, infrastructure, governance, virtualization, broadband and connectivity. Ultimately, the citizens of NC will benefit from the State s ability to sustain IT support for critical services in an emergency. - 7-

North Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts

North Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts North Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts Paul Embley Chief Information Officer National Center for State Courts January

More information

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report. Status of Actions Recommended # of Actions Recommended

Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report. Status of Actions Recommended # of Actions Recommended Chapter 3 Section 3.05 Metrolinx Regional Transportation Planning Standing Committee on Public Accounts Follow-Up on Section 4.08, 2014 Annual Report In November 2015, the Standing Committee on Public

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Kentucky IT Consolidation

Kentucky IT Consolidation 2007 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Consolidation Commonwealth Office of Technology The Commonwealth of Kentucky is nearing completion of

More information

How Switching to the Cloud Drives Employee and Agency Growth

How Switching to the Cloud Drives Employee and Agency Growth State & Local Government How Switching to the Cloud Drives Employee and Agency Growth Switching to the Cloud Is Top Priority for State CIOs According to the National Association of State Chief Information

More information

NC Education Cloud Feasibility Report

NC Education Cloud Feasibility Report 1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most

More information

General Information Technology Controls Follow-up Review

General Information Technology Controls Follow-up Review Office of Internal Audit General Information Technology Controls Follow-up Review May 19, 2015 Internal Audit Team Shannon B. Henry Chief Audit Executive Stacy Sneed Audit Manager Rod Isom Auditor Winston-Salem

More information

Governing Body 313th Session, Geneva, March 2012

Governing Body 313th Session, Geneva, March 2012 INTERNATIONAL LABOUR OFFICE Governing Body 313th Session, Geneva, 15 30 March 2012 Programme, Financial and Administrative Section PFA FOR INFORMATION Information and communications technology questions

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED. Assistant Deputy Minister (Review Services) Reviewed by in accordance with the Access to Information Act. Information UNCLASSIFIED. Security Audits: Management Action Plan Follow-up December 2015 1850-3-003

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS)

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS) APPENDI 2 ommendation () () 1. The City Manager in consultation with the Chief Information Officer give consideration to the establishment of an IBMS governance model which provides for senior management

More information

Public Safety Canada. Audit of the Business Continuity Planning Program

Public Safety Canada. Audit of the Business Continuity Planning Program Public Safety Canada Audit of the Business Continuity Planning Program October 2016 Her Majesty the Queen in Right of Canada, 2016 Cat: PS4-208/2016E-PDF ISBN: 978-0-660-06766-7 This material may be freely

More information

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams

More information

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY INFORMATION TECHNOLOGY GENERAL CONTROLS INFORMATION SYSTEMS AUDIT JANUARY 2016 EXECUTIVE SUMMARY PURPOSE

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

Memorandum APPENDIX 2. April 3, Audit Committee

Memorandum APPENDIX 2. April 3, Audit Committee APPENDI 2 Information & Technology Dave Wallace, Chief Information Officer Metro Hall 55 John Street 15th Floor Toronto, Ontario M5V 3C6 Memorandum Tel: 416 392-8421 Fax: 416 696-4244 dwwallace@toronto.ca

More information

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014 UNITED NATIONS DEVELOPMENT PROGRAMME AUDIT OF UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY Report No. 1173 Issue Date: 8 January 2014 Table of Contents Executive Summary

More information

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets. REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments 5 Challenges to Government IT Modernization: In Brief Quick tips & facts about IT modernization across federal, state and local governments Executive Summary Information technology (IT) modernization can

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA AUDIT OF THE INFORMATION SYSTEMS GENERAL CONTROLS ELIZABETH CITY STATE UNIVERSITY JULY 2006 OFFICE OF THE STATE AUDITOR LESLIE MERRITT, JR., CPA, CFP STATE AUDITOR AUDIT OF THE

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Hazard Management Cayman Islands

Hazard Management Cayman Islands Hazard Management Cayman Islands Strategic Plan 2012 2016 Executive Summary HMCI strategic plan outlines the agency s outlook in the next five years and illustrates the main strategies as goals that will

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

12 Approval of a New PRESTO Agreement Between York Region and Metrolinx

12 Approval of a New PRESTO Agreement Between York Region and Metrolinx Clause 12 in Report No. 7 of Committee of the Whole was adopted, without amendment, by the Council of The Regional Municipality of York at its meeting held on April 20, 2017. 12 Approval of a New PRESTO

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings

More information

Office of the City Auditor 2014 Third Quarter Activity Report November 25, 2014

Office of the City Auditor 2014 Third Quarter Activity Report November 25, 2014 2014 Third Quarter Activity Report November 25, 2014 This page is intentionally blank. 1. Audit Plan Progress Monitoring Bylaw 16097, Audit Committee Bylaw, Section 5 states that the Committee assists

More information

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT?

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT? CATEGORY MANAGEMENT IN THE Federal Government Each fiscal year the Federal Government is challenged to accomplish strategic goals while reducing spend and operating more efficiently. In 2014, the Federal

More information

The next generation of knowledge and expertise

The next generation of knowledge and expertise The next generation of knowledge and expertise UNDERSTANDING FISMA REPORTING REQUIREMENTS 1 HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404

More information

2014 NASCIO Recognition Award Nomination

2014 NASCIO Recognition Award Nomination 2014 NASCIO Recognition Award Nomination TITLE: Network Communication Partnerships for Public Safety and Economic Opportunity CATEGORY: Cross Boundary Collaboration and Partnerships CONTACT: Shannon Barnes

More information

INFORMATION NOTE. United Nations/Germany International Conference

INFORMATION NOTE. United Nations/Germany International Conference INFORMATION NOTE United Nations/Germany International Conference Earth Observation: Global solutions for the challenges of sustainable development in societies at risk Organized by The United Nations Office

More information

IT Disaster Recovery Services Program

IT Disaster Recovery Services Program Q4-2017 ISAC Update v.20171107 IT Disaster Recovery Strategy Implementation 2008 Data Center Strategic Plan Part 1 Part 2 Disaster Recovery Strategic Plan Part 1 Part 2 2016 2019 Implementation Goals Decouple

More information

INFORMATION TECHNOLOGY CYBERSECURITY CLOUD COMPUTING

INFORMATION TECHNOLOGY CYBERSECURITY CLOUD COMPUTING INFORMATION TECHNOLOGY CYBERSECURITY CLOUD COMPUTING PRESENTED TO HOUSE APPROPRIATIONS COMMITTEE LEGISLATIVE BUDGET BOARD STAFF APRIL 2018 Statement of Interim Charge Monitor the ongoing implementation

More information

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit Internal Audit Report Electronic Bidding and Contract Letting TxDOT Office of Internal Audit Objective Review of process controls and service delivery of the TxDOT electronic bidding process. Opinion Based

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial

More information

Disaster Recovery and Business Continuity Planning (Mile2)

Disaster Recovery and Business Continuity Planning (Mile2) Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

MOVING MISSION IT SERVICES TO THE CLOUD

MOVING MISSION IT SERVICES TO THE CLOUD MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Document Details Title Description Version 1.1 Author Classification Technical Vulnerability and Patch Management Policy

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Office of MN.IT Services Data Centers

Office of MN.IT Services Data Centers Office of MN.IT Services Data Centers Information Technology Controls and Compliance Audit As of November 2016 March 2, 2017 REPORT 17-06 Financial Audit Division Office of the Legislative Auditor State

More information

The J100 RAMCAP Method

The J100 RAMCAP Method The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health

More information

NHS Fife. 2015/16 Audit Computer Service Review Follow Up

NHS Fife. 2015/16 Audit Computer Service Review Follow Up NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Abstract: Data Protection Cloud Strategies

Abstract: Data Protection Cloud Strategies Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

The Deloitte-NASCIO Cybersecurity Study Insights from

The Deloitte-NASCIO Cybersecurity Study Insights from The Deloitte-NASCIO Cybersecurity Study Insights from 2010-2016 August 21, 2018 Srini Subramanian State Government Sector Leader Deloitte Erik Avakian CISO Pennsylvania Michael Roling CISO Missouri Meredith

More information

Build a viable plan for disaster recovery and crisis management.

Build a viable plan for disaster recovery and crisis management. Disaster recovery and crisis management solutions To support your IT objectives Build a viable plan for disaster recovery and crisis management. Highlights Build a plan to help respond to and recover from

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency

State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency NCSL Communications, Financial Services and Interstate Commerce Committee December 10, 2010 Doug Robinson, Executive Director

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

Federal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan

Federal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan Federal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan June 04, 2010 FDCCI Workshop I Agenda for June 4, 2010 1. Welcome Katie Lewin GSA Director Cloud

More information

FedRAMP: Understanding Agency and Cloud Provider Responsibilities

FedRAMP: Understanding Agency and Cloud Provider Responsibilities May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration

More information

Criminal Case Information System for Public Defenders [Section 18B.10 of S. L , as amended by Section 18A.2 of S.L.

Criminal Case Information System for Public Defenders [Section 18B.10 of S. L , as amended by Section 18A.2 of S.L. Criminal Case Information System for Public Defenders [Section 18B.10 of S. L. 2013-360, as amended by Section 18A.2 of S.L. 2014-100] Technology Services Division July 1, 2015 Introduction Section 18B.10

More information

Avoid a DCIM Procurement Disaster

Avoid a DCIM Procurement Disaster Avoid a DCIM Procurement Disaster Matt Stansberry Senior Director, Uptime Institute 7 December 2016 2016 Uptime Institute, LLC Many organizations struggle with DCIM decisions Process takes too long, software

More information

Business Continuity Management Standards A Side-by-Side Comparison

Business Continuity Management Standards A Side-by-Side Comparison Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan

More information

U.S. Department of Homeland Security Office of Cybersecurity & Communications

U.S. Department of Homeland Security Office of Cybersecurity & Communications U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure

More information

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting

More information

Long-Term Power Outage Response and Recovery Tabletop Exercise

Long-Term Power Outage Response and Recovery Tabletop Exercise 1 Long-Term Power Outage Response and Recovery Tabletop Exercise After Action Report [Template] The After-Action Report/Improvement Plan (AAR/IP) aligns exercise objectives with preparedness doctrine to

More information

To Audit Your IAM Program

To Audit Your IAM Program Top Five Reasons To Audit Your IAM Program Best-in-class organizations are auditing their IAM programs - are you? focal-point.com Introduction Stolen credentials are the bread and butter of today s hacker.

More information

BUSINESS CONTINUITY MANAGEMENT (BCM) INITIATIVES OF THE BANGKO SENTRAL NG PILIPINAS

BUSINESS CONTINUITY MANAGEMENT (BCM) INITIATIVES OF THE BANGKO SENTRAL NG PILIPINAS BUSINESS CONTINUITY MANAGEMENT (BCM) INITIATIVES OF THE BANGKO SENTRAL NG PILIPINAS Dickenson Y. Africa, CPA, CISA, MBA, CBCLA Head of Business Continuity Office Bangko Sentral ng Pilipinas 16 March 2017

More information

TSC Business Continuity & Disaster Recovery Session

TSC Business Continuity & Disaster Recovery Session TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives

More information

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Presentation Overview What is BTOP? Making BTOP work for our state What

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity May 2017 cyberframework@nist.gov Why Cybersecurity Framework? Cybersecurity Framework Uses Identify mission or business cybersecurity dependencies

More information

UNIVERSITY OF NORTH CAROLINA CHAPEL HILL

UNIVERSITY OF NORTH CAROLINA CHAPEL HILL abd STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA UNIVERSITY OF NORTH CAROLINA CHAPEL HILL INFORMATION TECHNOLOGY GENERAL CONTROLS INFORMATION SYSTEMS AUDIT NOVEMBER 2017 EXECUTIVE

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

Important updates to Business Applications competencies

Important updates to Business Applications competencies Important updates to Business Applications competencies April 2019 Maximize the cloud opportunity Worldwide, business is moving to the cloud. We re focused on supporting you through this shift to a thriving

More information

SSC Transformation Initiative Fairness Monitoring Services

SSC  Transformation Initiative Fairness Monitoring Services SSC Email Transformation Initiative Fairness Monitoring Services Fairness Monitoring Final Report Date of Submission: 14 June, 2013 Submitted To: Director General Operational Integrity Sector Departmental

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

MN.IT Services and MNsure

MN.IT Services and MNsure INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT MN.IT Services and MNsure Presentation to Mnsure Executive Board State CIO Carolyn Parnell June 26, 2013 July 2005: Office of Enterprise Technology created.

More information

Integrated Cyber Defense Working Group (ICD WG) Introduction

Integrated Cyber Defense Working Group (ICD WG) Introduction Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative

More information

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment Mitigating Risk with Ongoing Cybersecurity Risk Assessment Scott Moser CISO Caesars Entertainment CSO50 Presentation Caesars Entertainment Cybersecurity Risk Management Scott Moser Chief Information Security

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY Integrating Resiliency into Our Culture and DNA Table of Contents Executive Summary.... 3 Background.... 4 Charter.................................................................4

More information

Retro-Commissioning of Data Centers

Retro-Commissioning of Data Centers Retro-Commissioning of Data Centers Agenda Unique traits of Data Centers (DCs) Benefits of Retro-Cx DCs Suitable candidates for Retro-Cx Phases of Retro-Cx Additional considerations for DCs 2 Unique Traits

More information

Rural Health Care Pilot Program. Program Update October 8, 2009

Rural Health Care Pilot Program. Program Update October 8, 2009 Rural Health Care Pilot Program Program Update October 8, 2009 1 Background September 2006 Pilot Program Order (FCC 06-144) Announces and seeks applications for Pilot Program. Participants eligible to

More information

REPORT 2015/186 INTERNAL AUDIT DIVISION

REPORT 2015/186 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective

More information

SHARED SERVICES - INFORMATION TECHNOLOGY

SHARED SERVICES - INFORMATION TECHNOLOGY Updated: February, 00 EB-00-0 Exhibit D Page of SHARED SERVICES - INFORMATION TECHNOLOGY.0 INTRODUCTION 0 Information Technology ( IT ) refers to computer systems (hardware, software and applications)

More information