IT Risk & Compliance Federal
|
|
- Benedict Boyd
- 5 years ago
- Views:
Transcription
1 Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014
2 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19, 2017 to July 09, 2017, 200 federal government decision makers (100 federal civilian and 100 DoD/military) participated in an online survey that averaged eight minutes in length. Half of respondents work at federal civilian or independent agencies (including federal judicial, legislative and intelligence agencies). The other half work for DoD or military branches. Department of Defense or Military service 52% Federal Civilian or Independent government agency 48% 0% 10% 20% 30% 40% 50% 60% Which of the following best describes your current employer?
3 RESPONDENT CLASSIFICATIONS 3 Organization Role A variety of job roles are represented in the sample, with the highest proportions in executive management/command, and IT/MIS/IRM. Executive Management/Command IT/MIS/IRM Program Management 16% 20% 22% Operations/Administration Engineering Security operations 6% 8% 12% Acquisition Finance and budget Purchasing/Contracting Other 2% 4% 5% 6% 0% 10% 20% 30% Which of the following best describes your role in your organization?
4 RESPONDENT CLASSIFICATIONS 4 Decision Making Involvement More than half of respondents work on a team that makes decisions, or evaluate or recommend contractors offering IT modernization solutions. More than a quarter make the final decision regarding contractors in this area. On a team that makes decisions regarding contractors offering IT modernization management solutions Evaluate or recommend contractors offering IT modernization solutions 55% 54% Develop technical requirements for contractors offering IT modernization solutions Manage or implement contractors IT modernization solutions 42% 45% Make the final decision regarding contractors offering IT modernization solutions 28% Other involvement regarding contractors offering IT modernization solutions 10% 0% 10% 20% 30% 40% 50% 60% Note: Multiple responses allowed How are you involved in your agency s selection and/or management of government contractors that provide IT solutions, services and support to the IT modernization of your agency? (select all that apply)
5 RESOURCE ALLOCATIONS 5 Maintaining Legacy Systems RESOURCE ALLOCATION Opinion is split over the level of manpower and budgetary resources used to maintain their legacy systems. Notably, civilian agencies are significantly more likely than their DoD/military counterparts to believe their agency is understaffed in this area. Half of respondents feel the right amount of staff is devoted to federal network security, but one third believe too few staff are assigned here twice the proportion that think too many staff are involved. In line with this, four in ten think funding for this area is insufficient. As with federal network security, the same proportion of respondents contends not enough staff and not enough budget are being allocated to the security of their agency's critical infrastructure. How much of your agency s resources are being allocated to maintaining legacy systems?
6 CHALLENGES 6 Where in the Lifecycle Do Agencies Face Challenges? Four in ten believe modernization execution and deployment is the stage where they face the greatest difficulty. At the same time, more than a quarter have issues getting started. At the very beginning assessing and developing a high-level roadmap 27% Modernization readiness developing technology and staffing plans 17% Modernization execution & deployment designing, building, testing and implementation 42% Post modernization support after a new system is implemented 11% None of these stages are difficult 2% 0% 10% 20% 30% 40% 50% At what stage of the IT modernization life cycle does your organization face the most difficulty?
7 IT MODERNIZATION EFFORTS 7 IT Modernization Effort Grades PROCESS FACTORS While on average, six in ten graded themselves C or below, no more than one in ten graded their agency an A across eight process-related IT modernization efforts. Thus, there is great room for improvement in this area. F (Poor/not at all achieved) D C B A (Excellent/consistently achieved) Portfolio/asset review and assessment/inventory 6% 14% 40% 30% 10% Leveraging data to drive decisions 6% 16% 37% 32% 9% Proficiency of workforce to attain goals 7% 13% 34% 38% 8% Engagement with industry partners 5% 16% 34% 36% 8% Information sharing and collaboration within the agency 8% 13% 36% 34% 8% Realistic estimate of the scope of work involved Alignment of IT management and governance Quantifying potential impact (ROI) 12% 8% 8% 18% 16% 20% 29% 34% 7% 35% 35% 6% 34% 32% 6% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% <=C 60% 59% 54% 55% 57% 59% 59% 62% Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?
8 IT MODERNIZATION EFFORTS 8 IT Modernization Effort Grades TECHNOLOGY FACTORS As assessed by respondents, the lowest grades are for leveraging cloud and streamlined systems development, where two-thirds respectively give those dimensions a grade of C or below. F (Poor/not at all achieved) D C B A (Excellent/consistently achieved) Data center consolidation efforts 5% 12% 29% 44% 10% <=C 46% Use of automated management and monitoring tools 4% 15% 36% 36% 10% 55% Implementation of shared services 6% 15% 38% 32% 10% 59% Streamlined systems development 10% 23% 32% 26% 10% 65% Leveraging cloud computing 10% 18% 38% 25% 9% 66% Use of agile methods 6% 21% 31% 36% 6% 58% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?
9 IT MODERNIZATION EFFORTS 9 IT Modernization Effort Grades TECHNOLOGY FACTORS (CONTINUED) Across all technology factors, on average, more than half graded themselves a C or below. Across the 13 technology factors, no more than 16 percent gave a grade of A. F (Poor/not at all achieved) D C B A (Excellent/consistently achieved) Improve cyber security 4% 12% 28% 40% 16% <=C 44% FISMA compliance 4% 6% 33% 44% 14% 43% Improve infrastructure security 4% 12% 30% 40% 13% 46% Overall adherence to NIST s Framework for 5% 11% 35% 36% 13% 51% FedRAMP compliance 4% 9% 38% 35% 13% 51% Critical infrastructure management 4% 16% 35% 33% 12% 55% Use of digital technologies 4% 11% 33% 42% 11% 48% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?
10 IT MODERNIZATION EFFORTS 10 IT Modernization Effort Grades Differences In three instances, defense agencies are significantly more likely than their civilian peers to grade their IT modernization efforts an A/B. These include critical infrastructure management, internal information sharing/collaboration, and streamlined systems development. Grades of As/Bs 60% 50% 54% Defense 51% Civilian 43% 40% 30% 35% 34% 29% 20% 10% 0% Critical infrastructure management Information sharing and collaboration within the agency among the stakeholders involved with the process Streamlined systems development = statistically significant difference Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?
11 PRIORITIES 11 IT Modernization Priorities Agencies top IT modernization priorities over the next 12 months are led by cybersecurity, well ahead of a second tier of mentions including application modernization, cloud computing, and data analytics. Cybersecurity 62% Application modernization Cloud computing 37% 36% Data analytics 32% Digital/mobile solutions Shared services Agile delivery methods Data center consolidation 24% 23% 20% 18% Other 2% 0% 10% 20% 30% 40% 50% 60% 70% Note: Multiple responses allowed What are your agency s top priorities in its journey toward IT modernization in the next 12 months? (select top three)
12 IT MODERNIZATION EFFORTS 12 Other Top Priorities for IT Modernization: Cloud Four in ten believe that embracing cloud is important and significantly higher than those consider cloud adoption not important Amongst all IT Modernization priorities, Cloud services adoption is facing unanticipated difficulties. This is almost twice the proportion indicating Cloud as a priority Agencies with active industry partner engagement have less unanticipated difficulties with cloud adoption by a margin of 2 to 1 Agencies Top Priorities -IT Modernization-Next 12 Months Factor Total Unanticipated difficulties associated with cloud services adoption Yes No Importance of embracing cloud solutions Very/ somewhat Not very/ not at all Cloud Computing 36% 64% 30% 43% 19% = statistically significant difference What are your agency s top priorities in its journey toward IT modernization in the next 12 months? (select top three)
13 CHALLENGES & IMPACT ON IT SECURITY CHALLENGES 13 IT Modernization Efforts Impact on IT Security Challenges Nearly six in ten respondents think their agency's IT modernization efforts have resulted in an increase in the IT security challenges they face this is more than twice the proportion anticipating a decrease. Notably, however, defense agencies are significantly more likely than civilian agencies to cite a decrease in IT security challenges. 59% Defense Civilian 32% 18% 25% 16% Decrease Increase Has had no effect nor change = statistically significant difference In your opinion, do you think your agency s IT modernization efforts have resulted in an increase or decrease in the IT security challenges your agency faces?
14 CHALLENGES & IMPACT ON IT SECURITY CHALLENGES 14 Reasons IT Security Challenges Have Decreased First, more than half of those citing a decrease in their agency's IT security challenges point to the replacement of both legacy equipment and software. They also cite the simplicity to be gained through standardization, a reason far more commonly mentioned by civilian agencies. Reasons Challenges Have Decreased Legacy software replaced with new software 56% Legacy equipment replaced with new Standardization simplifies administration Cloud services adoption 40% 56% 56% Defense Civilian 44% 78% Fewer configurations to manage and support 36% Reduced number of devices to support Reduced need and time for training 22% 26% Other 4% 0% 10% 20% 30% 40% 50% 60% Note: Multiple responses allowed = statistically significant difference [IF DECREASE IS SELECTED] What are the reasons you believe IT security challenges have decreased as a result of your agency s IT modernization efforts? (select all that apply)
15 BENEFITS & IMPACT ON IT SECURITY CHALLENGES 15 Reasons IT Security Challenges Have Increased More than half of those citing an increase in their agency's IT security challenges feel it difficult for their IT staff to support and complete all transitions. Issues related to increased compliance reporting, complex management tools, and learning new systems, are other top factors. Reasons Challenges Have Increased Difficult for IT staff to support and complete all transitions Increased compliance reporting Complex management tools Lack of familiarity with new systems Organizational changes have disrupted IT processes Unanticipated difficulties associated with cloud services Too much consolidation has occurred Other 5% 16% 42% 41% 41% 37% 33% 53% 0% 10% 20% 30% 40% 50% 60% Note: Multiple responses allowed [IF INCREASE IS SELECTED] What are the reasons you believe IT security challenges have increased as a result of your agency s IT modernization efforts? (select all that apply)
16 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 16 Greatest Benefits of IT Modernization Respondents most commonly cited benefit of IT modernization for their agency is enhanced security, followed by operational efficiency, and helping to meet mission goals. Boosts operational efficiency Complies with mandates/regulations Eliminates duplicative processes Makes operations more agile Improves citizen/customer experience 26% 26% 24% 22% 20% 18% 18% 38% 35% 33% 0% 10% 20% 30% 40% Note: Multiple responses allowed Overall, what do you see as the greatest benefits of IT modernization for your agency? (select top three)
17 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 17 Benefits of IT Modernization Differences Defense respondents are significantly more likely to feel IT modernization enhances the security of their agency, while their civilian peers are twice as likely to indicate it promotes innovation. By Agency Type 50% 46% Defense Civilian 40% 30% 30% 25% 20% 12% 10% 0% Enhances security Promotes innovation where otherwise there would be little = statistically significant difference Overall, what do you see as the greatest benefits of IT modernization for your agency? (select top three)
18 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 18 Important Factors to IT Modernization Efforts The factors deemed very/somewhat important to agencies IT modernization efforts are led by having sufficient funds, aligning the project with the mission, having skilled technical staff, and leadership commitment. Other factors here and on the following slide are also widely important. Not at all important Not very important Somewhat important Very important Very/ Somewhat Important Leadership commitment 4% 6% 27% 64% 90% Sufficient funds/budget 4% 4% 30% 62% 92% Skilled technical staff 4% 4% 32% 60% 91% Aligning project with agency mission 3% 6% 36% 55% 91% Setting realistic goals and timelines 5% 6% 34% 54% 88% Strong project management 5% 8% 37% 50% 86% Stakeholder communication 4% 12% 42% 42% 84% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Overall, how important are the following factors to your agency s IT modernization efforts?
19 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 19 Important Factors to IT Modernization Efforts (Cont.) Though less important relative to the other factors, three quarters of respondents nevertheless consider embracing cloud solutions to be very/somewhat important. Not at all important Not very important Somewhat important Very important Shared accountability across IT and non-it executives 7% 14% 38% 40% Very/ Somewhat Important 79% Agile implementation 5% 16% 48% 32% 79% Governance approach 4% 16% 52% 28% 80% Mandated deadlines 4% 20% 48% 28% 76% Embracing cloud solutions 6% 20% 47% 27% 74% Effective engagement with partners in industry 6% 16% 52% 26% 78% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Overall, how important are the following factors to your agency s IT modernization efforts?
20 IT MODERNIZATION SENTIMENT STATEMENTS 20 IT Modernization Journey: Coded Top Comments Six in ten of those agreeing IT modernization is a unique journey believe that the agencies themselves are unique. Those that disagree are more likely to feel that even if unique in some ways, agencies have some similarities and/or must collaborate IT Modernization Is a Unique Journey for Each Agency and Should Be Approached That Way Agree Agencies are unique/different 61% Unique, but also similarities Disagree 21% Unique but with common needs Depends on training, mission, etc. Stakeholder buy-in important Culture can drive requirements 8% 6% 6% 5% Agencies should collaborate Agencies unique/distinct Agencies should standardize 17% 17% 12% Consequences to not modernizing 3% Know agency culture 5% What are the reasons behind your answer? (open end) 0% 20% 40% 60% 80% N= [Agree N = 109, Disagree N = 42] Note: Multiple responses allowed. Includes all mentions 3% or higher. 0% 20% 40% 60% 80%
21 IT MODERNIZATION SENTIMENT STATEMENTS 21 IT Modernization Journey Selected Quotes AGREE: IT Modernization Is a Unique Journey for Each Agency and Should Be Approached That Way Every Each agency is different. Nothing is cookie cutter. Our agency has specific challenges and goals that are not the same in all agencies. We need a custom tailored solution and not an off the peg solution. While the bureaucracy is similar, each agency has to deal with its unique culture and resistance to change. Each is starting its journey from a unique place in terms of measured risk and risk appetite. agency's mission, stakeholders, customers, and data requirements are unique. Their IT modernization should use the most efficient and effective hardware/software that allows for scalability and usability, while being tailored to the specific needs/mission of the agency. What are the reasons behind your answer? (open end)
22 22 Top Key Takeaways from Research Survey Results 1. Agencies see greater security, operational efficiency and mission fulfilment as top benefits of IT modernization and it seems abundantly clear that there is buy-in to the idea of IT modernization. 2. Agencies are facing increased Cyber challenges and unanticipated difficulties with Cloud adoption 3. There is evidently a shortage both of personnel and funding to increase the security of federal networks and critical infrastructure; and especially among federal civilian agencies, the manpower to maintain legacy systems. Only 10-16% grade their agency an A! 4. An IT Modernization revolution is underway, and the president s budget, new IT Modernization Report and MGT act will empower agency leaders to take quick action to focus on modernization efforts, especially with High-Risk High Value Assets (HVAs)
23 23 Join the Modernization Revolution and learn more at UNISYS MODERNIZATION REVOLUTION SURVEY SUMMARY REPORT MARKET CONNECTIONS, INC
MOVING MISSION IT SERVICES TO THE CLOUD
MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights
More informationCYBERSECURITY RESILIENCE
CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,
More informationCLOSING IN FEDERAL ENDPOINT SECURITY
CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage
More informationRocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency
Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities
More informationHOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI
HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI Federal agencies have made significant strides in adopting cloud technologies. But a new survey of government IT leaders
More informationFederal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011
Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case
More informationAdvanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin
Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity
More information5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments
5 Challenges to Government IT Modernization: In Brief Quick tips & facts about IT modernization across federal, state and local governments Executive Summary Information technology (IT) modernization can
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationGovernance for the Public Sector Cloud
Governance for the Public Sector Cloud Managing Cost and Ensuring Compliance Paving the Way to the Cloud Forecasting a potential 30% reduction in data infrastructure spend, the U.S. Government embarked
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationFROM TACTIC TO STRATEGY:
FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix
More information5 Steps to Government IT Modernization
5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower
More informationCyber Security in Timothy Brown Dell Fellow and CTO Dell Security
Cyber Security in 2016 Timothy Brown Dell Fellow and CTO Dell Security 2016 The middle of a perfect storm Technology Driving Innovation Advanced Adversaries Limited Resources Dell Secureworks Underground
More informationTX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark
TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen
More informationAccelerating Cloud Adoption
Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive
More informationIT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection
IT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection Each customer faces a fundamental decision: will technology simply enable,
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationInsider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey
Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com
More informationHelping the Military Integrate, Innovate and Secure Networks across the Enterprise
JANUARY 2016 AGILE AND OPEN C4ISR SYSTEMS Helping the Military Integrate, Innovate and Secure Networks across the Enterprise The U.S. military is tasked with protecting our nation, putting the lives of
More informationProfessional Services for Cloud Management Solutions
Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationTodd Sander Vice President, Research e.republic Inc.
Todd Sander Vice President, Research e.republic Inc. Tsander@erepublic.com Report Background Respondent Type Breakdown Received responses from 74 state elected and appointed officials and 29 staff members
More information10 Considerations for a Cloud Procurement. March 2017
10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationDisaster Unpreparedness June 3, 2013
Disaster Unpreparedness June 3, 2013 Underwritten by: Introduction Government relies on data and information to deliver mission success. Data loss means more than files simply missing from a database it
More informationBetter skilled workforce
Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style
More informationIT Modernization In Brief
IT Modernization In Brief WHAT YOU NEED TO KNOW Quick tips & facts about IT modernization from GovLoop Executive Summary Today, IT modernization the continuous updating of IT and technology infrastructure
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationA Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services
A Working Paper of the EastWest Institute Breakthrough Group Increasing the Global Availability and Use of Secure ICT Products and Services August 5, 2015 The EastWest Institute (EWI) is leading a Global
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationHow Your Organization Can Drive Success in the Age of Digital Disruption
How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationCloud First: Policy Not Aspiration. A techuk Paper April 2017
Cloud First: Policy Not Aspiration A techuk Paper April 2017 2 Cloud First: Policy Not Aspiration Introduction As more organisations begin to use cloud computing as part of the evolution of their business
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationUp in the Air: The state of cloud adoption in local government in 2016
Up in the Air: The state of cloud adoption in local government in 2016 Introduction When a Cloud First policy was announced by the Government Digital Service in 2013, the expectation was that from that
More informationOptimisation drives digital transformation
January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationHow Cisco IT Improved Development Processes with a New Operating Model
How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationthe steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;
Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions
More informationFederal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT?
CATEGORY MANAGEMENT IN THE Federal Government Each fiscal year the Federal Government is challenged to accomplish strategic goals while reducing spend and operating more efficiently. In 2014, the Federal
More informationCASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC
CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National
More informationThe Role of Converged and Hyper-converged Infrastructure in IT Transformation
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational
More informationSection One of the Order: The Cybersecurity of Federal Networks.
Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More informationIT Modernization in State Government Drivers, Challenges and Successes. Bo Reese State Chief Information Officer, Oklahoma NASCIO President
IT Modernization in State Government Drivers, Challenges and Successes Bo Reese State Chief Information Officer, Oklahoma NASCIO President Top 10: State CIO Priorities for 2018 1. Security 2. Cloud Services
More informationFISMA Cybersecurity Performance Metrics and Scoring
DOT Cybersecurity Summit FISMA Cybersecurity Performance Metrics and Scoring Office of the Federal Chief Information Officer, OMB OMB Cyber and National Security Unit, OMBCyber@omb.eop.gov 2. Cybersecurity
More informationData Governance. Mark Plessinger / Julie Evans December /7/2017
Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationTop Priority for Hybrid IT
Make Your Enterprise Network a Top Priority for Hybrid IT Hybrid IT has become a vital element in enterprises digital transformation strategy. But putting in place a hybrid IT framework is one thing, and
More informationInformation Systems Security Requirements for Federal GIS Initiatives
Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationEnterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018
Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk
More informationTHE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS
SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationSAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION
SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION POSITION: CHIEF OPERATING OFFICER FUNCTION: Responsible for all aspects of the SLV POA day-to-day operations. In this capacity,
More informationKentucky IT Consolidation
2007 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Consolidation Commonwealth Office of Technology The Commonwealth of Kentucky is nearing completion of
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationYour Challenge. Our Priority.
Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software
More informationIn 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.
REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January
More informationJune 2017 intel.com schneider-electric.com
DCIM Solution Deployment June 2017 intel.com schneider-electric.com DCIM Solution Deployment Introduction Current state of data center management Do you currently have a solution deployed? 20% 80% The
More informationSELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats
SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationDeveloping a Model for Cyber Security Maturity Assessment
Developing a Model for Cyber Security Maturity Assessment Tariq Al-idrissi, Associate Vice President IT, Trent University Ian Thomson, Information Security Officer, Trent University June 20 th, 2018 (8:45am
More informationProven Integration Strategies for Government
Opening Slide Proven Integration Strategies for Government Larry Singer, Vice President, US State and Local Government and Education Sales Technology for better business outcomes 2007 Hewlett-Packard Development
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationSix Sigma in the datacenter drives a zero-defects culture
Six Sigma in the datacenter drives a zero-defects culture Situation Like many IT organizations, Microsoft IT wants to keep its global infrastructure available at all times. Scope, scale, and an environment
More informationDiscover the power to do more
Cover story Discover the power to do more By Jeff S. Johnson As the line between business and IT strategy vanishes, five transformational imperatives are changing the economics of success in the Virtual
More informationTDWI Data Governance Fundamentals: Managing Data as an Asset
TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationPAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY
WHITEPAPER PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY CONTENTS Executive Summary........................................ 3 The Cybersecurity and Business Risk Survey..........................
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationCOMPANY BROCHURE. About Us. Kinnectiv, LLC. Consulting. Security. Innovation. +1(888)
About Us Serving customers nationwide and abroad, we are an experienced IT Services provider helping a variety of clients maximize the value of their IT initiatives, streamline project management, and
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationIT TRENDS REPORT 2016:
IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION NORTH AMERICA WHAT WE COVER IN THE REPORT IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION Introduction Key Findings Recommendations Full Survey Results INTRODUCTION
More informationRisk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23
Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More informationArcGIS in the Cloud. Andrew Sakowicz & Alec Walker
ArcGIS in the Cloud Andrew Sakowicz & Alec Walker Key Takeaways How to Identify Organizational Strategy & Priorities Esri s Cloud Offerings A Broad Spectrum Successfully Executing Your Strategy The Cloud
More informationCIOs Reveal Their Priorities and Successes in IT Transformation
Sponsored content CIOs Reveal Their Priorities and Successes in IT Transformation Digital business success has become heavily dependent on IT modernization and automation. CIOs point to progress on several
More informationOperationalize Security To Secure Your Data Perimeter
Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.
More informationCybersecurity Risk Management:
Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationService Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division
Service Management DAU Symposium April 4, 2017 What an Acquisition Practitioner Needs to Know Karen Gomez Defense Information Systems Agency Mission Support Division 1 Topics DESMF The DESMF Realized Service
More informationConducted by Vanson Bourne Research
Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA
More informationState of South Carolina Interim Security Assessment
State of South Carolina Interim Security Assessment Deloitte & Touche LLP Date: October 28, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is
More informationReducing Cybersecurity Costs & Risk through Automation Technologies
Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research
More informationKNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals
KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More information