ENTERPRISE ARCHITECTURE

Size: px
Start display at page:

Download "ENTERPRISE ARCHITECTURE"

Transcription

1 ENTERPRISE ARCHITECTURE Executive Summary With more than $1 billion in information technology investments annually, the Commonwealth of Pennsylvania has evolved into the equivalent of a Fortune 20 organization, providing a diverse cross section of IT services and solutions to its 12.3 million citizens and business customers worldwide. The Commonwealth s ongoing technology success rests with its ability to leverage the strengths and assets of the entire enterprise to attain solutions and deliver services in the most cost-effective and efficient manner. The Commonwealth s Bureau of Enterprise Architecture (EA) has design and governance responsibility for information technology solutions and standards utilized by agencies under the governor s jurisdiction. The goal of Enterprise Architecture is to support the governor s office by providing enterprise-wide technology policies and standards. Partnering with agencies, the goal is achieved by understanding key business drivers, leveraging appropriate, existing technology, sharing IT resources across the Commonwealth, and making sound technology investments. Enterprise Architecture leverages the NASCIO framework and has established a collaborative governance structure that leverages the skills and experiences of the Office for Information Technology (OIT) as well as key resources in various Commonwealth agencies. The Enterprise Governance Council (EGC) and the Enterprise Architecture Standards Committee (EASC), both comprised of senior agency directors and CIOs, provide leadership, prioritization of initiatives, and recommendations of standards. Domain teams, comprised of agency technologists, architects, and thought-leaders, realize these initiatives and create Commonwealth standards, IT policies, and Enterprise Architecture models. Over the past year focus areas and accomplishments of EA include: Baseline and Target Model Specification. The Commonwealth s Target Architecture has continued to evolve in response to business drivers prioritized by the IT governance structure. Key Target Architecture specifications include the creation of a common Citizen Information Model, establishment of a common portal architecture, expansion of the Business Solutions Center of Excellence (BSCoE), and the creation of a Grants Management Architecture. The Baseline Architecture has been elaborated to map existing applications to the key functions realized in the Business Architecture. This mapping is used to identify where redundant services are being provided and serve as input for business streamlining and technical consolidation. Specification Enterprise Security Architecture and Policies. The Commonwealth, through Enterprise Architecture, has developed a baseline security architecture that includes all aspects of cyber security and identity protection and access management. Enterprise Architecture is responsible for several far-reaching, critical security initiatives that specify standard security approaches and blueprints for all aspects of cyber security, monitoring, escalation, and identity protection and access management. Security assessments have to be put in place to identify threats, vulnerabilities and risks to Commonwealth IT resources. Additionally, the Commonwealth s Chief Information Security Officer (CISO) has implemented several security awareness and communication initiatives including a CISO Roundtable to provide agency security officers multi-directional information sharing among agencies and a Pennsylvania Information Sharing and Analysis Center (PA-ISAC) to disseminate warnings and share information among the state and different levels of local government. Architecture Compliance Process. A Technical Architecture Review (TAR) Board has been established and is fully operational. The TAR regularly reviews key agency initiatives, to assess compliance with Enterprise Architecture and standards and to grant waivers based on business justification. The TAR has been active, reviewing over 100 projects in the first five months of Enterprise Architecture has brought many advantages, both tangible and intangible, to the Commonwealth of Pennsylvania. It is now an institutionalized agent for innovation and standardization across the Commonwealth and has also evolved into a communication clearinghouse for sharing information about key agency technology initiatives. Significant cost savings have been achieved through enterprise purchasing agreements for product standards. The Domain Teams and other collaborative EA mechanisms have begun to foster an attitude and mindset of cooperation, communication, and sharing throughout Commonwealth agencies. 8/28/ EA NASCIO

2 Description of Project Enterprise Architecture (EA) was formally introduced in to the Commonwealth of Pennsylvania in late Previously the Commonwealth had centralized several key architecture components: , telecom services, desktop operating systems, PCs, and SAP as the back office system. It is upon this infrastructure that EA initiatives were built, and with this foundation, have constructed a collaborative approach to EA governance and standards. The EA governance structure is part of a broader IT governance model that reports to the IT Governance Board. The purpose of the IT Governance Board is to oversee the investment and performance of information solutions across Commonwealth's agencies and to advise and counsel the governor on the development, operation, and management of the Commonwealth's IT investments, resources and systems. Governance continues to be an important part of Commonwealth initiatives. The Enterprise Governance Council (EGC) and the Enterprise Architecture Standards Committee (EASC), both comprised of senior agency Directors and CIOs, provide leadership, prioritization of initiatives and recommendations of standards. Domain teams, comprised of agency technologists, architects, and thought-leaders, realize these initiatives by creating Commonwealth standards, establishing IT policies, and specifying Enterprise Architecture models and blueprints. This governance structure ensures support and the rapid adoption of enterprise strategic initiatives that meet the diverse needs of Commonwealth agencies. Additionally, with the establishment of ten domain teams (see diagram below), participation has been solicited from all agencies and levels of staff. This has established a new way of doing business for the Commonwealth. Enterprise Architecture is now an institutionalized agent for both innovation and standardization across the Commonwealth. The Enterprise Architecture Governance Model was formed using the NASCIO framework for Enterprise Architecture. 8/28/ EA NASCIO

3 Enterprise Architecture communicates its standards and policies through Information Technology Bulletins (ITBs). ITBs provide a consistent format for standards and are published in a common location that is publicly available for agency use. Before an ITB is published, it undergoes several types of review. After the organizations in the governance structure have reviewed an ITB, it is subject to a broader agency review before publication. Standard, broadcast communication channels are in place to keep agencies educated of new or changing standards. A feedback and query mechanism is in place, enabling agency personnel to ask questions or comment on published EA standards. Additionally, EA members attend agency or Community of Practice meetings and share information on EA standards and plans on a regular basis. During the past year, EA has been actively advancing Enterprise Architecture Blueprints and Processes throughout the Commonwealth. Key focus areas and accomplishments of EA include: continued evolution and documentation of the baseline and target models, specification of comprehensive security architecture and processes, and roll-out of an architecture compliance process. Each is described below. Baseline and Target Model Specification The Commonwealth s Target Architecture has continued to evolve in response to business drivers prioritized by the EA Governance structure. Key aspects of the target architecture specified recently include: Creation of a Citizen Information Model. A conceptual citizen information model has been created and promulgated providing standards to Commonwealth agencies pertaining to citizen-related entities and data elements. This common citizen model is a critical step towards implementing integrated processes and shared information repositories. It has improved communication among agencies by establishing a common language related to the citizen and is enabling a key Commonwealth objective of providing improved services to citizens by promoting a higher quality of information. Establishment of a Common Portal Architecture. The Commonwealth has adopted a single, standard portal platform for both internally and externally facing web-sites. The common portal architecture provides a consistent look and feel for citizens and Commonwealth users alike. Additionally, implementing the common portal architecture improves the interoperability of agency applications via portlet technology and, in conjunction with the Enterprise Security Architecture, provides a consistent, robust web access and authentication vehicle across the Commonwealth. Continued expansion of the BSCoE frameworks. Enterprise Architecture initially conceived and served as an incubator for the Business Solutions Center of Excellence (BSCoE). BSCOE consists of standardized software engineering processes, service components, and application framework components. It promotes cross agency development efforts and fosters a common approach to training and education for all development teams. It provides uniformity of approach, process and results, allowing projects to leverage the broad pool of resources and assets that currently exist within the Commonwealth. BSCoE has emerged during the last year and EA remains an important member of the BSCoE governance structure helping to guide its ongoing roll-out and evolution. Creation of a Grants Management Architecture. Building on both the Common Portal Architecture and BSCoE, a Commonwealth-wide grants management architecture has been created. This architecture simplifies and automates the funding process associated with over $17 billion in federal and state grants. The architecture streamlines the underlying business process pertaining to grants processing, establishes a centralized portal to allow grant recipients to find and apply for grant opportunities in the Commonwealth, and establishes an enterprise business intelligence engine that support the reporting needs of the governor s office and federal and state agencies. 8/28/ EA NASCIO

4 Additionally, key aspects of the baseline architecture continue to be elaborated. During the past year, the Commonwealth has expanded the specification of the existing Business Architecture. Utilizing the Federal Enterprise Architecture (FEA) Business Reference Model (BRM), the Commonwealth has mapped agencies and applications to their relevant lines of businesses and sub-functions in the Services for Citizens Business Area. This mapping is used to identify where redundant services are being provided across agencies and applications to serve as input for business streamlining and technical consolidation. Specification Enterprise Security Architecture and Policies. One of the most important Commonwealth initiatives is security. Enterprise Architecture is responsible for several far-reaching, critical security initiatives. These initiatives specify standard security approaches and blueprints for many aspects of cyber security and identity protection and access management. Each is described below: Identity Protection and Access Management (IPAM). An interagency Identity Management initiative was launched to establish the Commonwealth approach and architecture pertaining to identity management and to align with federal and industry standards such as the Federal Information Processing Standard (FIPS) and Security Assertion Markup Language (SAML). IPAM is a comprehensive effort that covers many aspects of identity management including: Enterprise Directory Services Provides for consolidation, synchronization and aggregation of shared identity information for retrieval and user authentication; Access Management and Control Provides standards and policies for accessing Commonwealth facilities and information systems; Enrollment, Identity Proofing and Vetting Outlines the processes for validating and verifying an individual s identity for the purpose of establishing credentials, such as log-in identifications and identity cards; Identity Card Production, Personalization and Issuance Outlines the standards for creating, delivering and activating an individual s unique identity card; Enterprise Public Key Infrastructure (PKI) Outlines the standards for use of secure mechanisms (cryptography) to verify established identities, support digital signatures and encrypt sensitive data. Specification for a Commonwealth Personal Identification Verification (PIV) Card Provides the physical and logical layout for the components of the Commonwealth PIV card, (e.g. magnetic strip, smart chip, photograph). During the past year, the IPAM Initiative has made significant progress towards a Commonwealth-wide, identity management architecture and process. Some key accomplishments include: Specification of the Enterprise Directory Blueprint; Creation of a standard Web Access and Authentication architecture; Creation of a FIPS-compliant, Personal Identification Verification (PIV) card specification; Creation of a Commonwealth Digital Certificate Policy; and Selection of a Commonwealth-wide Digital Certificate Provider. Operation Secure Enterprise (OSE). OSE addresses the increasing security risks associated with technology based delivery of business services. OSE, led by the newly appointed EA Chief Information Security Officer (CISO), creates enterprise plans, approaches, and architectural blueprints to provide enhanced cyber security to the Commonwealth. OSE has established enterprise technology standards for critical areas of cyber security, including network intrusion detection and protection systems and Internet access control and content filtering. A consolidated Security Information Management solution has been established to provide an enterprise level view regarding the condition of security in the Commonwealth s IT environment. Additionally, security assessments have been put in place to identify threats, vulnerabilities and risks to Commonwealth IT resources. 8/28/ EA NASCIO

5 Security Awareness and Information Sharing. An organization depends on more than technology for implementing IT Security. Raising awareness of security and communications are equally as important. EA has implemented a security architecture communication process to address awareness and communication. In addition to standardized security awareness training, the Commonwealth has established a CISO roundtable. The CISO roundtable is comprised of agency CISOs and professionals and is chaired by the EA Commonwealth CISO. This provides a forum for multi-directional information sharing among agencies. Additionally, a Pennsylvania Information Sharing and Analysis Center (PA- ISAC) has been established to disseminate warnings and share information with state and various levels of local government. Roll-out of an Architecture Compliance Process As the Commonwealth s Enterprise Architecture grows and involves, it is vital that a process be established and executed to assess agency projects compliance with Enterprise Architecture standards. A Technical Architecture Review (TAR) Board has been established and is fully operational. The TAR is comprised of Enterprise Architecture resources as well as members from other cross-cutting, technology organizations within the Commonwealth. The TAR reviews select agency initiatives, based on objective criteria, to ascertain compliance with established enterprise architecture standards and to grant waivers based on business justification. The TAR has dramatically increased Enterprise Architecture visibility and compliance among Commonwealth agencies and has been extremely active, reviewing over 100 projects in the first five months of Significance to the improvement of the Operation of Government Enterprise Architecture has improved the Commonwealth s ability to interact with other government agencies and positions the Commonwealth to align with federal recommendations while also championing interstate communications. This is possible due to the implementation of standard technology solutions, a focus on standards-based solutions, and communication of the role that EA plays across all agencies. Vendor interaction has also improved as a result of identifying one group responsible for establishing enterprise-wide standards. The Commonwealth can now negotiate lower costs across the enterprise by implementing common technology solutions, leveraging its purchasing power. Enterprise Architecture is serving as a communication vehicle for technology initiatives within the Commonwealth. Through the TAR Board and the various groups in the governance structure (EGC, EASC and domain teams), agencies constantly interact in ways and at levels they previously did not. This has resulted in greater awareness of technology initiatives among the agencies. Another key change within the Commonwealth is a shifting from an agency-centric thought process to one that is Commonwealth-wide. EA serves as the focal point for defining and communicating a shared Commonwealth vision. As enterprise standards become more prevalent, agencies within the Commonwealth have realized the benefit of shared architecture and standards. The EA governance structure now relies heavily upon the EA organization to set standards and policies in technology areas. In the past, each agency would perform their own research and establish their own standards and policies. This change in thinking is particularly evident in the realm of security where consolidated Security Information Management and the CISO roundtable have led to holistic, enterprise security planning, monitoring, and cooperation. Additionally, with the expanded baseline architecture model that has been created, it is much more straightforward to identify improvements and streamlining opportunities for the target architecture. 8/28/ EA NASCIO

6 Benefits Enterprise Architecture has brought many advantages, both tangible and intangible, to the Commonwealth of Pennsylvania. The Commonwealth has taken an enterprise approach to standardization, working collaboratively with agencies via the EA domain teams. Ten domain teams were formed using the NASCIO framework for Enterprise Architecture. This has provided many benefits to the Commonwealth including the ability to share assets thus increasing their utilization and driving the use of common tool sets. In turn, this lowers the overall costs by better leveraging people and processes to provide training. We have fostered an enterprise approach to new initiatives, seeking out commonality and the strategic importance in each. With the focus and attention on cyber security and identity protection at a Commonwealth level, the Commonwealth s infrastructure and information is more secure. This increased security benefits taxpayers by making their sensitive data increasingly safer. With the adoption of a common citizen information model, a common language related to the citizen has been established. This in turn promotes a higher quality of citizen information, enabling a key Commonwealth objective of providing improved services to citizens. Return on investment Enterprise Architecture does materially impact the Commonwealth via monetary savings in enterprise license agreements. Over the past year, Enterprise Architecture has named several technology solutions as Commonwealth standards. Consequently, significant license and maintenance fee cost savings (over $34 million) have been realized through enterprise license agreements. This saving alone recoups the investment by the Commonwealth in EA several times over. Another key projected area for savings is in the area of grants management. Upon rollout of the common Grants Management Architecture and Processes, the Commonwealth is projected to achieve $1 million per year in cost savings due to a 25% reduction time for every grant application processed. 8/28/ EA NASCIO

The University of Queensland

The University of Queensland UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

OneUConn IT Service Delivery Vision

OneUConn IT Service Delivery Vision OneUConn IT Service Delivery Vision The University s Academic Vision establishes a foundation and high expectations for excellence in research, teaching, learning, and outreach for all of UConn s campuses.

More information

Five-Year Strategic Plan

Five-Year Strategic Plan Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and

More information

IT Governance Framework at KIT

IT Governance Framework at KIT [unofficial English version; authoritative is the German version] IT Governance Framework at KIT 1. Recent situation and principle objectives Digitalization increasingly influences our everyday life at

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

TEL2813/IS2621 Security Management

TEL2813/IS2621 Security Management TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

NC Education Cloud Feasibility Report

NC Education Cloud Feasibility Report 1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets. REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

Leveraging the LincPass in USDA

Leveraging the LincPass in USDA Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just

More information

Security Architecture

Security Architecture Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to

More information

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT?

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT? CATEGORY MANAGEMENT IN THE Federal Government Each fiscal year the Federal Government is challenged to accomplish strategic goals while reducing spend and operating more efficiently. In 2014, the Federal

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

Networking for a dynamic infrastructure: getting it right.

Networking for a dynamic infrastructure: getting it right. IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for

More information

New Zealand Government IbM Infrastructure as a service

New Zealand Government IbM Infrastructure as a service New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as

More information

Information Systems Security Requirements for Federal GIS Initiatives

Information Systems Security Requirements for Federal GIS Initiatives Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the

More information

10 Considerations for a Cloud Procurement. March 2017

10 Considerations for a Cloud Procurement. March 2017 10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report ii Nationwide Cyber Security Review: Summary Report Acknowledgments The Multi-State Information Sharing

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

IBM Corporation. Global Energy Management System Implementation: Case Study. Global

IBM Corporation. Global Energy Management System Implementation: Case Study. Global Energy Management System Implementation: Case Study IBM Corporation ISO 50001 Registration: Results and Benefits It takes a global team to drive real success. Business case for energy management IBM is

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Digital Health Cyber Security Centre

Digital Health Cyber Security Centre Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Testimony. Senate Communications and Technology Committee Hearing on Information Technology. October 25, Office of Administration

Testimony. Senate Communications and Technology Committee Hearing on Information Technology. October 25, Office of Administration Testimony Senate Communications and Technology Committee Hearing on Information Technology October 25, 2017 Office of Administration Sharon P. Minnich, Secretary Chairman Aument, Chairman Haywood, and

More information

Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019

Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019 Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION - 2017 TO 2019 TELUS Garden Office Tower- LEED Platinum Leadership and Innovation to Make Every Building Greener outlines

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security DOMINICA Last updated date: 7/27/2017 OAS Pillar National Cargo Workshop Civil Aviation Officials and Law Enforcement Officials United States Link web page 6/6/2016 6/10/2016 The CICTE Aviation Program

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Donor Countries Security. Date

Donor Countries Security. Date PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information

More information

Create the ideal conditions for your network to grow.

Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. SBC PremierSERV SM Network Integration and Managed Services. Flexible, end-to-end solutions

More information

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity

More information

Green Treatment Center

Green Treatment Center Green Treatment Center IT Strategic Goals and Objectives: 2017-2019 Technology Plan The Department s IT strategies for the next four years are grounded in legislative and regulatory drivers that inform

More information

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland

More information

STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010

STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010 STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010 Attendees: Tony Ambler, Jay Boisseau, Pat Clubb, Andrew Dillon, Brad Englert, Greg Fenves, Rod Hart, Steve Leslie, David

More information

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs Response to Wood Buffalo Wildfire KPMG Report Alberta Municipal Affairs Background To ensure continuous enhancement and improvement of Alberta s public safety system, the Alberta Emergency Management Agency

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

Symantec Data Center Migration Service

Symantec Data Center Migration Service Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration

More information

Protecting information across government

Protecting information across government Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts

More information

Strategic Plan Report

Strategic Plan Report Strategic Plan Report 2015 2016-2017 The Central Alberta Crime Prevention Centre () Change will not come if we wait for some other person or some other time. We are the ones we ve been waiting for. We

More information

Kentucky IT Consolidation

Kentucky IT Consolidation 2007 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Consolidation Commonwealth Office of Technology The Commonwealth of Kentucky is nearing completion of

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Recommendations of the ad-hoc XML Working Group To the CIO Council s EIEIT Committee May 18, 2000

Recommendations of the ad-hoc XML Working Group To the CIO Council s EIEIT Committee May 18, 2000 Recommendations of the ad-hoc XML Working Group To the CIO Council s EIEIT Committee May 18, 2000 Extensible Markup Language (XML) is being widely implemented and holds great potential to enhance interoperability

More information

National Coordinator - DRR & Disaster Management

National Coordinator - DRR & Disaster Management National Coordinator - DRR & Disaster Management Location: [Africa] [Kenya] [Nairobi] Category: Food Security & Livelihood Purpose of the Position: This position is responsible for coordinating and managing

More information

Donor Countries Security. Date

Donor Countries Security. Date SAINT LUCIA Last updated date: 8/14/2017 OAS Pillar Sub-Regional Access Control Technique Training Civil Aviation Officials and Law Enforcement Officials United States Link to web page Date 2/13/2017 to

More information

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As

More information

White Paper. View cyber and mission-critical data in one dashboard

White Paper. View cyber and mission-critical data in one dashboard View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland

More information

2014 NASCIO Recognition Award Nomination

2014 NASCIO Recognition Award Nomination 2014 NASCIO Recognition Award Nomination TITLE: Network Communication Partnerships for Public Safety and Economic Opportunity CATEGORY: Cross Boundary Collaboration and Partnerships CONTACT: Shannon Barnes

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement; Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions

More information

Data Governance Central to Data Management Success

Data Governance Central to Data Management Success Data Governance Central to Data Success International Anne Marie Smith, Ph.D. DAMA International DMBOK Editorial Review Board Primary Contributor EWSolutions, Inc Principal Consultant and Director of Education

More information

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The

More information

WHO-ITU National ehealth Strategy Toolkit

WHO-ITU National ehealth Strategy Toolkit WHO-ITU National ehealth Strategy Toolkit Context and need for a National Strategy A landscape of isolated islands of small scale applications unable to effectively communicate and to share information

More information

Enterprise SM VOLUME 1, SECTION 5.4: ANTI-VIRUS MANAGEMENT SERVICE

Enterprise SM VOLUME 1, SECTION 5.4: ANTI-VIRUS MANAGEMENT SERVICE VOLUME 1, SECTION 5.4: ANTI-VIRUS MANAGEMENT SERVICE 5.4 ANTI-VIRUS MANAGEMENT SERVICE [C.2.10.4, M.2.1.3] The Level 3 Team s (AVMS) will meet or exceed the Government s requirements for AVMS, as defined

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

How to choose the right Data Governance resources. by First San Francisco Partners

How to choose the right Data Governance resources. by First San Francisco Partners How to choose the right Data Governance resources by First San Francisco Partners 2 Your organization is unique. It has its own strengths, opportunities, products, services and customer base. Your culture

More information