MDM and Data Governance

Size: px
Start display at page:

Download "MDM and Data Governance"

Transcription

1 Amadeus I T Group SA MDM and Data Governance June 2015 Jean-Michel Collomb

2 Agenda _ Overview of Amadeus _ History of MDM and DG in Amadeus _ The Data Governance Committee _ The MDM Program _ Conclusion and advices 21 Page 2

3 1 Overview of Amadeus

4 Amadeus I T Group SA Amadeus in a few words 1 _ Introduction Amadeus is a technology company dedicated to the global travel industry. We are present in 195 countries with a worldwide team of more than 12,000 people. Our solutions help improve the business performance of travel agencies, corporations, airlines, airports, hotels, railways and more. Page 4

5 A 2 0 madeus 1 5 Amadeus I T Group I T Group SA SA A history of shaping the future of travel 2 _ Amadeus history 1987 Amadeus is founded 1995 World leader in number of travel agency locations MILLION bookings made on a single day for the first time 2010 Amadeus diversifies into IT for hotel, rail and airport 1992 First booking made through Amadeus 1996 e-commerce division launched 2000 Partnership with BA and Qantas to launch Amadeus Altéa our core Airline IT offering 2014 Contracts with Ryanair and Southwest Airlines and a strategic technology relationship with IHG Page 5

6 Amadeus I T Group SA Connecting the entire travel ecosystem Cruiselines 1 _ Introduction Airlines Hotels Insurance companies Car rental Travel agencies Ground handlers Airports Ferry operators Ground transportation Page 6

7 Amadeus I T Group SA Supporting the entire traveller life cycle 1 _ Introduction Post-trip Inspire On trip Search Pre-trip Buy/Purchase Page 7

8 Amadeus I T Group SA We have a clear purpose 1 _ Introduction Our solutions facilitate journeys and enrich the travel experience for hundreds of millions of people every year. We are working together with our customers and partners to shape the future of travel Page 8

9 2 Master Data Management And Data Governance

10 History of Data Governance in Amadeus Jan 2012 Launch of GBS MDM Program, starting with Workforce MDM and Product & Service MDM Weakness in Data Governance identified as a major issue. Jul 2014 Launch of the Data Governance Committee for: Management of Data related requests Launch of new initiatives Jan 2014 TI & GBS launched a Data Governance Assessment study with EY and proposed: - A Data Governance Structure - A portfolio of projects to address data related issues Oct 2014 The Data Governance Committee approved the launch of 3 new initiatives: - Geography/Airport/Airline MDM - Travel Agency MDM - Air Inventory MDM Page 10

11 What is the Data Governance Committee Data Governance Committee Structure, Role & Scope Chairman Leading component of the Corporate Amadeus Data Governance DIS Member AIT Member CISO Group Privacy Decision-making authority, whose purpose is to approve data-related policies and to ensure execution NBU Member R&D Member Data Governance Committee LEGAL Member HR Member Exercises overview and authority over data-related activities GOPS Member GBS Member FIN Member Corp. Strategy Member Covers both Master Data & Transactional Data, Internal & External Data Gov Office Meets on a quarterly basis Page 11

12 Results realisation speed MDM Program Prioritisation matrix + Opportunistic initiatives (quick fixes) Fast business results (quick wins) Airline Inventory MDM Lowest priority or don t do Airline / Geo Reference MDM High business value in the long term Airline Customer MDM Workforce MDM Products & Services MDM - - Business Value Delivered Travel Agency MDM + Page 12 *Size of the initiative represents required effort: High (biggest), Medium or Low (smallest)

13 Portfolio of Data Related Initiatives Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q MDM initiatives Workforce MDM Basic employee data External Resources Products & Services MDM Product referential Airline & Geo ref MDM Airline & Airport Geo data Other data Travel Agency MDM TA MDM TA MNA TA Groupings Inventory MDM cabin class mappings Flight schedules aircraft capacity Transactions Transactional data management Overarching initiatives Data Governance support / Information Management capability Page 13

14 Workforce MDM Problem statement Workforce data cannot be used globally for analysis and decision making because of poor quality. Main quality issues with Workforce Data: Heterogeneous data: ACOs/Sites/Regions are using different definitions, different values for the same data. Example: Employee Group/SubGroup used to categorize employee activity/inactivity Incomplete data: ACOs/Sites/Regions are not always filling and maintaining all workforce data Example: Birth date, gender, nationality is missing Inconsistent data: ACOs/Sites/Regions do not always follow the same rules for data maintenance Example: Retired employee still seen as active Top down approach for a global MDM and Data Governance process : Define the Workforce data globally at company level Improve and Measure the quality of the data Page 14

15 Workforce MDM Data Governance Data Maintenance The Data Dictionary is the result of the Data Governance process, it contains the definition of all Workforce related data approved by all stakeholders. It also include data quality rules and metrics. _ The Data Quality Dashboard reflects the level of compliance of data against the quality rules defined by the Data Governance. The Data Manager is driving the data stewardship (maintenance) activities. The Data Stewards (Businesses, R&D, ) are either correcting the data to comply with the data Dictionary, or providing the necessary information to align the data with the data Dictionary Page 15

16 Product & Service MDM Problem Statement _ Multiple ways and granularities for looking at Product and Services currently exist within Amadeus: Each Business Unit is maintaining their own Product and Service lists. Within each Business Unit, there is no consistent product view across the full Product Value Chain _ The multiple Product and Service lists are maintained in XLS documents: Limited Data Management capabilities Lack of consistencies between Product and Service lists _ Product and Service profitability analysis is complex and manual Product Management Product Cycle Sales Operations Training Help Desk Billing / Revenue Page 16

17 Product & Service MDM A common Product & Services Referential is beneficial to many business processes within Amadeus Setup a Data Governance process to build a common understanding of the multiple facets of Products and enforce the changes in business processes and solutions to align with it. Deploy a solution that can rapidly improve the quality of Product data, guaranteeing its integrity over time and organizational changes, and provide a unique referential for all businesses. Make the Product data available to enable the full Amadeus Organisation to base their decisions regarding Product on reliable facts. Page 17

18 Reference Data Management Problem Statement _ Multiple Geography/Airport/Airline Referential in the company Official data sources for Airlines, Airports, Locations (IATA, ICAO, ) not always accurate nor complete No single version of the truth, no unique identifier Duplicated effort in maintenance process _ Multiple definition of Amadeus geographical structure (Regions ) Commercial structure Financial structure HR structure No clear ownership _ External Data procurement process not centralized Same data bought several times by different BUs Data not always shared internally Page 18

19 Reference Data Management Take the best of every data source (Official, open source) Centralized data management and distribution Centralized data procurement Central Data Management team Page 19

20 Information Management End-to-End Data Governance process support Manage Data Dictionary: - Business Glossary - Data Ownership Monitor Data Quality - KPI reporting to data owners and DGC Enforce Data Quality rules - DQ Management Manage Data Quality issues - Data Stewardship Page 20

21 Conclusion and advices 1. Start small and achieve significant business value, get buy-in and expend MDM usage. Start with a business case that is visible and achievable in a reasonable timeframe and budget Mitigate risks of disruption on existing products / processes 2. High level (exec) sponsorship is mandatory for the success of any MDM Project Do not under estimate resistance to change 3. Bottom up initiatives (Proto, PoC), focusing on small use case, can contribute on Data Quality and MDM awareness. Help stakeholder understand how their DQ problems can be solved by MDM, get their buy in. Switch to a Top down approach when awareness is there. 4. Manage expectations carefully Data Quality of often the root cause of wider problems MDM is often just an enabler for other projects that bring the real value to the Business stakeholders Page 21

22 2015 Amadeus IT Group SA A madeus I T Group SA Thank you You can follow us on: AmadeusITGroup amadeus.com/blog amadeus.com

University of Texas Arlington Data Governance Program Charter

University of Texas Arlington Data Governance Program Charter University of Texas Arlington Data Governance Program Charter Document Version: 1.0 Version/Published Date: 11/2016 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE OF THIS DOCUMENT... 3 1.2 SCOPE...

More information

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?

More information

Implementing a Successful Data Governance Program

Implementing a Successful Data Governance Program Implementing a Successful Data Governance Program Mary Anne Hopper Data Management Consulting Manager SAS #AnalyticsX Data Stewardship #analyticsx SAS Data Management Framework BUSINESS DRIVERS DATA GOVERNANCE

More information

DATA GOVERNANCE LEADS TO DATA QUALITY

DATA GOVERNANCE LEADS TO DATA QUALITY DATA GOVERNANCE LEADS TO DATA QUALITY Trending. Kash Mehdi Senior Product Specialist and Instructor May 3, 2017 1 Collibra 2017 2017 Collibra Inc How Many of Your Reports Have Good Data Quality? What would

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

OSLiC & OSCAd2. Free license advice for all. Kristian Schuhmacher Amadeus IT Group LinuxCon, Düsseldorf 14th October Amadeus IT Group SA

OSLiC & OSCAd2. Free license advice for all. Kristian Schuhmacher Amadeus IT Group LinuxCon, Düsseldorf 14th October Amadeus IT Group SA OSLiC & OSCAd2 Free license advice for all Kristian Schuhmacher Amadeus IT Group LinuxCon, Düsseldorf 14th October 2014 A Story in 5 Chapters _ Background 1 _ OSLiC 2 _ OSCAd2 3 _ Collaboration 4 _ The

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,

More information

THE ESSENCE OF DATA GOVERNANCE ARTICLE

THE ESSENCE OF DATA GOVERNANCE ARTICLE THE ESSENCE OF ARTICLE OVERVIEW The availability of timely and accurate data is an essential element of the everyday operations of many organizations. Equally, an inability to capitalize on data assets

More information

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

ICB Industry Consultation Body

ICB Industry Consultation Body ICB Industry Consultation Body Evolution of network management 17/11/2016 Issue Position Paper Long-term evolution of Network Management This position paper is intended to form the basis of advice to the

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

GDPR: The Day After. Pierre-Luc REFALO

GDPR: The Day After. Pierre-Luc REFALO GDPR: The Day After Pierre-Luc REFALO The speaker: Pierre-Luc REFALO Global Head of Strategic Cybersecurity Consulting 25+ years in Information & Cyber Security consultancy CISO for SFR & Vivendi Universal

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

How to choose the right Data Governance resources. by First San Francisco Partners

How to choose the right Data Governance resources. by First San Francisco Partners How to choose the right Data Governance resources by First San Francisco Partners 2 Your organization is unique. It has its own strengths, opportunities, products, services and customer base. Your culture

More information

InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0. User s Guide GI

InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0. User s Guide GI InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0 User s Guide GI13-2637-00 InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0 User

More information

Trillium Consulting. Data Governance. Optimizing Business Outcomes through Data and Information Assets

Trillium Consulting. Data Governance. Optimizing Business Outcomes through Data and Information Assets Trillium Consulting Data Governance Optimizing Business Outcomes through Data and Information Assets DAMA Indiana Winter Meeting Indianapolis, Indiana January 20, 2011 Jim Orr, Global Director Enterprise

More information

How to Derive Value from Business Continuity Planning

How to Derive Value from Business Continuity Planning How to Derive Value from Continuity Planning Presented by Randall J. Till, Principal Till Continuity Group Spring World 2011 Disaster Recovery Journal March 28, 2011 1 BCM Challenges BCM funding is limited

More information

INTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP

INTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP INTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP Best Practices to Improve the Quality of Your Customer Data Why Data Governance and Stewardship? 3 Devoting resources to data quality pays dividends 1: Assess

More information

STEP Data Governance: At a Glance

STEP Data Governance: At a Glance STEP Data Governance: At a Glance Master data is the heart of business optimization and refers to organizational data, such as product, asset, location, supplier and customer information. Companies today

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips

More information

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen

More information

WHITE PAPER. The truth about data MASTER DATA IS YOUR KEY TO SUCCESS

WHITE PAPER. The truth about data MASTER DATA IS YOUR KEY TO SUCCESS WHITE PAPER The truth about data MASTER DATA IS YOUR KEY TO SUCCESS Master Data is your key to success SO HOW DO YOU KNOW WHAT S TRUE AMONG ALL THE DIFFER- ENT DATA SOURCES AND ACROSS ALL YOUR ORGANIZATIONAL

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER Audio Configuration Configure your audio settings. The Audio Setup Wizard allows you to configure your volume level, default microphone and recording

More information

Quick Guide: Booking

Quick Guide: Booking Guide This Guide will take you through the basic steps for the online booking of flights, rental cars and hotels. Accessing Concur 1. Go to Travel.ouhsc.edu and login with your HSC credentials. Travel

More information

Ian Speller CISM PCIP MBCS. Head of Corporate Security at Sopra Steria

Ian Speller CISM PCIP MBCS. Head of Corporate Security at Sopra Steria Ian Speller CISM PCIP MBCS Head of Corporate Security at Sopra Steria Information Risk in the Real World Realistic security management on a tight budget Or some things I have done to make the security

More information

Turning partnership into success

Turning partnership into success Turning partnership into success Into the future with intelligent solutions IT infrastructure: Flexible. Standardised. A perfect fit. Why Rittal? As a global leader in the supply of IT infrastructure,

More information

PCO Data Protection and Privacy Policy

PCO Data Protection and Privacy Policy PCO Data Protection and Privacy Policy [MCI Group Holding SA, 9, Rue du Pré-Bouvier, 1242 Satigny, Geneva, Switzerlandor relevant MCI entity] ( MCI ) is an event and association management company with

More information

Using ITIL to Measure Your BCP

Using ITIL to Measure Your BCP Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP

More information

Data ownership within governance: getting it right

Data ownership within governance: getting it right Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data

More information

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan Ready, Willing & Able Michael Cover, Manager, Blue Cross Blue Shield of Michigan Agenda 1. Organization Overview 2. GRC Journey Story 3. GRC Program Roadmap 4. Program Objectives and Guiding Principals

More information

Accenture Amadeus Digital Experience

Accenture Amadeus Digital Experience : Page 1 Page 2 Page 7 Page 8 Accenture Amadeus Digital Experience Page 3 Page 4 Page 5 Page 6 Page 9 Page 10 Page 11 The Digital Audit is considered the initial step in a service journey. Here we aim

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Data Governance. Mark Plessinger / Julie Evans December /7/2017 Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements

More information

Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2

Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2 GRC3386BUS GDPR Readiness with IBM Cloud Secure Virtualization Raghu Yeluri, Intel Corporation Shantu Roy, IBM Bill Hackenberger, Hytrust #VMworld #GRC3386BUS Agenda GDPR Overview & Requirements IBM Secure

More information

EXIN BCS SIAM Foundation. Sample Exam. Edition

EXIN BCS SIAM Foundation. Sample Exam. Edition EXIN BCS SIAM Foundation Sample Exam Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark. SIAM is a registered trademark. ITIL is a registered

More information

The Road to a Secure, Compliant Cloud

The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation

More information

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise February 11 14, 2018 Gaylord Opryland Resort and Convention Center, Nashville #DRI2018 Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise Tejas Katwala CEO

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Smartsheet for Jira Visibility is the Key to Velocity

Smartsheet for Jira Visibility is the Key to Velocity Smartsheet for Jira Visibility is the Key to Velocity Joe Stanfill Sr. Manager, Marketing Smartsheet Benita Howe VP, PMO and Business Operations IgniteTech Certain information set forth in this presentation

More information

EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING

EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING BUSINESS CONTINUITY EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES The key to every successful Business Continuity Solution

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

CISO as Change Agent: Getting to Yes

CISO as Change Agent: Getting to Yes SESSION ID: CXO-W02F CISO as Change Agent: Getting to Yes Frank Kim Chief Information Security Officer SANS Institute @fykim Outline Catch the Culture Shape the Strategy Build the Business Case 2 #1 Catch

More information

Bringing Cybersecurity to the Boardroom Bret Arsenault

Bringing Cybersecurity to the Boardroom Bret Arsenault SESSION ID: CXO-T11 Bringing Cybersecurity to the Boardroom Bret Arsenault Corporate Vice President & CISO Microsoft Security has Transcended from to a an 3 How Microsoft Approaches Security Reinventproductivity

More information

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product. Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This

More information

Session 5: Business Continuity, with Business Impact Analysis

Session 5: Business Continuity, with Business Impact Analysis Session 5: Business Continuity, with Business Impact Analysis By: Tuncay Efendioglu, Acting Director Internal Oversight Division, WIPO Pierre-François Gadpaille, Audit Specialist (Information Systems),

More information

Global Statement of Business Continuity

Global Statement of Business Continuity Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program

More information

Security Metrics Framework

Security Metrics Framework HP Enterprise Services Metrics Framework Richard Archdeacon October 2012 Effective Spending: Better metrics allow intelligent spending on security that matters The current primary focus of information

More information

Selling Platform Connect

Selling Platform Connect Selling Platform Connect Nalin Chaminda June 2015 Index _ Welcome to Amadeus _ Log in _ Help Pages _ Retrieve Booking file _ Claim Booking File _ Profile _ Retrieve E-Ticket or EMD _ Queue _ Tools _ Personalisation

More information

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT?

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT? CATEGORY MANAGEMENT IN THE Federal Government Each fiscal year the Federal Government is challenged to accomplish strategic goals while reducing spend and operating more efficiently. In 2014, the Federal

More information

Enabling efficiency through Data Governance: a phased approach

Enabling efficiency through Data Governance: a phased approach Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

Metadata Management as a Key Component to Data Governance, Data Stewardship, and Data Quality Management. Wednesday, July 20 th 2016

Metadata Management as a Key Component to Data Governance, Data Stewardship, and Data Quality Management. Wednesday, July 20 th 2016 Metadata Management as a Key Component to Data Governance, Data Stewardship, and Data Quality Management Wednesday, July 20 th 2016 Confidential, Datasource Consulting, LLC 2 Multi-Domain Master Data Management

More information

1.1 Levels of qualification

1.1 Levels of qualification 1 The ITIL Qualification Scheme ITIL (formerly known as the Information Technology Infrastructure Library) is best-practice guidance for IT Service Management, which is used by many hundreds of organizations

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region

ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region An overview on Pan European Network Service - PENS Lima, Peru 10 to 12 Septiembre de

More information

Agenda. Introduction Power Of Visuals Introduction to Visio

Agenda. Introduction Power Of Visuals Introduction to Visio Agenda Introduction Power Of Visuals Introduction to Visio Using PBI and Visio for Monitoring Integrated Monitoring with Visio and Power BI aka Unified Dashboard How to create Unified Dashboards end-to-end

More information

The next generation of knowledge and expertise

The next generation of knowledge and expertise The next generation of knowledge and expertise UNDERSTANDING FISMA REPORTING REQUIREMENTS 1 HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Nomination Form Architecture Excellence Awards 2018

Nomination Form Architecture Excellence Awards 2018 Nomination Form Architecture Excellence Awards 2018 Presented by: [Presenter's name] Company Overview 1. Name of the Company: 2. Name of the CEO (Chief Executive Officer): 3. Name of the CIO (Chief Information

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security Adopting Modern Practices for Improved Cloud Security Cox Automotive - Enterprise Risk & Security 1 About Cox Automotive Cox Automotive is a leading provider of products and services that span the automotive

More information

La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA

La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA Filippo Silvestri Sales Manager PS&S Intergraph Italia Security Government & Infrastructure

More information

Connected vehicle cloud

Connected vehicle cloud Connected vehicle cloud Commercial presentation 2018.05.17 Ericsson Connected Vehicle Cloud Commercial Presentation 2018-05-17 Page 1 The evolution of the automotive industry 2017 2020 2025 2030 A vehicle

More information

Vendor: Cisco. Exam Code: Exam Name: Advanced Collaboration Architecture Sales Engineer. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Advanced Collaboration Architecture Sales Engineer. Version: Demo Vendor: Cisco Exam Code: 700-039 Exam Name: Advanced Collaboration Architecture Sales Engineer Version: Demo QUESTION 1 Which three statements are reasons why customers consider Cisco as their collaboration

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

For Performance and Scalability, Amadeus Chooses Data Center

For Performance and Scalability, Amadeus Chooses Data Center For Performance and Scalability, Amadeus Chooses Data Center Amadeus is the leader in technology solutions for the global travel and tourism industry. Through its flagship product Altéa Customer Management

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

TACOMA PUBLIC UTILITIES CYBERSECURITY PROGRAM NIAC WORKSHOP JUNE 2017

TACOMA PUBLIC UTILITIES CYBERSECURITY PROGRAM NIAC WORKSHOP JUNE 2017 TACOMA PUBLIC UTILITIES CYBERSECURITY PROGRAM NIAC WORKSHOP JUNE 2017 AGENDA TPU Cybersecurity Program Overview Document Management & Program Governance Compliance Driven Best Practices Protect, Detect,

More information

TAF-TAP TSI Steering Committee Agenda item..: Presentation of the activities of the sector TAP TSI. Brussels, 24 June 2015

TAF-TAP TSI Steering Committee Agenda item..: Presentation of the activities of the sector TAP TSI. Brussels, 24 June 2015 TAF-TAP TSI Steering Committee Agenda item..: Presentation of the activities of the sector TAP TSI Brussels, TAP/TAF SteCo 24 June 2016 1 INDEX The Rail Sector complexity EU Approaches for a new framework

More information

Demystifying GRC. Abstract

Demystifying GRC. Abstract White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over

More information

IT Audit Process. Prof. Mike Romeu. January 30, IT Audit Process. Prof. Mike Romeu

IT Audit Process. Prof. Mike Romeu. January 30, IT Audit Process. Prof. Mike Romeu January 30, 2017 1 Corporate Structures Shareholders Governance Level: Board of Directors External Director CFO CEO Legal Counsel External Director Responsible for: Evaluate Direct Monitor Internal Directors

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

Integrated Assurance Across the Three Lines of #CW2017

Integrated Assurance Across the Three Lines of #CW2017 Integrated Assurance Across the Three Lines of Defence @ComplianceWeek #CW2017 Speaker Panel Liv Watson Sr. Director of Strategic Customer Initiatives Workiva, Inc. Valeria Locatelli Audit Director M&G

More information

Achieving Best in Class Software Savings through Optimization not Negotiation

Achieving Best in Class Software Savings through Optimization not Negotiation Achieving Best in Class Software Savings through Optimization not Negotiation August 10, 2012 Agenda Introduction Industry Trends Best in Class Software Asset Management How good is best in class? How

More information

CANADA S FUTURE BUILT ENVIRONMENT: SUSTAINABLE, INNOVATIVE AND RESILIENT. August 3, 2016

CANADA S FUTURE BUILT ENVIRONMENT: SUSTAINABLE, INNOVATIVE AND RESILIENT. August 3, 2016 DR CANADA S FUTURE BUILT ENVIRONMENT: SUSTAINABLE, INNOVATIVE AND RESILIENT CCI Recommendations for Federal Budget 2017 August 3, 2016 Executive Summary Canadian Construction Innovations (CCI) welcomes

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Redefining travel industry tech

Redefining travel industry tech Redefining travel industry tech How software defined networking and data centers move millions of people every day Rashesh Jethi SVP and Head of R&D for Americas, Amadeus IT Group 2016 Amadeus IT Group

More information

Data Governance using SAP MDM Part 2

Data Governance using SAP MDM Part 2 Data Governance using SAP MDM Part 2 Applies to: SAP MDM Summary Part 2 of the Data Governance using SAP MDM series elaborates on SAP MDM can be used to model master data administration, data quality and

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Views on the Framework for Improving Critical Infrastructure Cybersecurity

Views on the Framework for Improving Critical Infrastructure Cybersecurity This document is scheduled to be published in the Federal Register on 12/11/2015 and available online at http://federalregister.gov/a/2015-31217, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

Financing resilience at the subnational 22 JUNE 2014 STANDING COMMITTEE ON FINANCE FORUM, MONTEGO BAY, JAMAICA

Financing resilience at the subnational 22 JUNE 2014 STANDING COMMITTEE ON FINANCE FORUM, MONTEGO BAY, JAMAICA Financing resilience at the subnational level in South Africa 22 JUNE 2014 STANDING COMMITTEE ON FINANCE FORUM, MONTEGO BAY, JAMAICA My key takeaways from 21 June 2014 1. Improve access to finance through

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Are your data ready for GDPR Compliance?

Are your data ready for GDPR Compliance? Are your data ready for GDPR Compliance? USING A DATA HUB TO PROTECT PERSONAL DATA Track & Trace Capture & Connect Secure & Protect Certify & Curate Publish & Share 2017 Talend 1 Rémi Forest Solution Engineer

More information