The Secret Sauce of ILM

Size: px
Start display at page:

Download "The Secret Sauce of ILM"

Transcription

1 The Secret Sauce of ILM the ILM Assessment Core LeRoy Budnik, Knowledge Transfer

2 Abstract The Secret Sauce of ILM Assessment Professional Services and internal consulting figure prominently in the success of ILM transformations. Yet, in the midst of success, there can be the sense of hitting the ceiling, a limit, a barrier that you cannot pass. A time-based path allows you to remove the barriers. The path negotiates requirements, capabilities, practices, and maturity. This is the core of the ILM consultative process. It is a blend of techno/business skill, architect-client relations and selecting the appropriate methodology. What is the goal? To create Storage Services as a collection of components provided in support of business processes perceived by Customers and Users as a self-contained, single, coherent entities at lowest cost. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 2

3 Objectives In this session, we focus on the Core of ILM consultative process: the measurement of maturity vs. information disciplines. This core is the foundation of most assessment methodologies. We also consider the assessment strategies that work best at various entry points of maturity. As a customer, when you understand both the process and strategy, you can choose the best strategy for your company today. However, because ILM is a way of life, you will choose a different strategy tomorrow. This may sound dry, but it is the secret sauce of the industry. Understand relationship of maturity to information disciplines Identify key ILM disciplines and process in the context of their execution in the infrastructure Determine the most effective ILM assessment strategy for a given scenario The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 3

4 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA and portions are subject to other copyrights 1. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This specific legal notice shall not be removed. This presentation is a project of the SNIA Education Committee. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 4

5 Initial Positioning Forget what you know the existing standards are becoming obsolete! The information crisis will not go away we need to reengineer the infrastructure to meet requirements, it is the only effective path to success Our personal view of the assessment process may prevent our success we have to change as well The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 5

6 Knowledge Statements The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 6

7 Systematic Approach ILM assessment is a systematic approach to enable diverse requirements, including availability, capacity, cost, compliance and governance to be met over time. The process achieves alignment at best cost by summarizing requirements and matching them to capabilities at each requirement state change. The range of solutions available are limited by the value of information, with the goal of minimizing budgets, both capital and expense. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 7

8 Storage Tier A storage tier is a collection of storage capacity that meets requirements with a consistent set of attributes, capabilities and characteristics which may include: Availability Performance Quality of Service Cost Storage Tier Storage Service For example: it is possible that disks in the same array might be treated as different tiers because of RAID Level, data location on a spindle or other characteristics the choice is yours The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 8

9 Storage Service Business View The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 9

10 Storage Service Technical View The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 10

11 Evaluate against the model that follows This will help you to understand: current state and what can be accomplished in a year, successfully The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 11

12 Storage Service Maturity Storage Services Bill of Materials Cost Optimization Efficiency Business Requirements Customer Satisfaction Cost Optimization Effectiveness Efficiency The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 12

13 ILM Strategy The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 13

14 ILM Strategy The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 14

15 ILM Strategy The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 15

16 Assess Assessment is a control process, responsible for gathering requirements, inventorying information and infrastructure, defining storage strategy, preparing gap and financial analysis, and developing next steps to ensure that the storage infrastructure meets business requirements. Manage Discovery Business Requirements Inventory Information Assets Propose Storage Strategy Risk Assessment Project Priority Set verifiable measures Develop Business Case TCO/ROI Analysis Cost by: Resource Service Business Unit (GB) Investment The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 16

17 Classify Classification is the means whereby we order knowledge about requirements and infrastructure. We develop classes that represent a set of information objects that share a common structure and behavior. Identify Information Assets Gather Requirements Availability Capacity Compliance Governance Retention Security Develop Taxonomy Identify Patterns Ontological Reductionism Classify Information Assets by Requirements The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 17

18 Organize Organizing is the process of aligning discovered requirements, patterns and values with current, new and replacement storage capabilities, over time. We develop standardized, reusable infrastructure patterns supported by process to meet enterprise level goals. Match requirements to capabilities Inventory existing capabilities Gap analysis Standardize Storage Services Develop Storage Service Catalog Develop: Operations policies Cookbook (recipes) SWT/AWT Apply automation Minimize cost Maximize service The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 18

19 Educate Education reinforces commitment and skill to support and use the reorganized storage infrastructure. Technical and process standards reduce cost. The storage team shows leadership as an advisor and resource steward. Service design becomes the most valued skill. Crisis is reduced. Skills Alignment Business Impact Awareness Results Based Training Storage Service Culture Identified Responsibility Management Staff Effective, Predictable Performance Partnership Link to business requirement Measured results Satisfaction Perceived Actual The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 19

20 Assessment Process The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 20

21 ILM Assessment Phases The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 21

22 Prepare 0 Firms manage many assets, people, money, plant and customer relationships. Before we work on the information that underpins business process and often causes the business the most frustration, we need to learn as much as we can from external and internal sources SEC 10K Governance Structure Industry/Sector Compliance Asset History Human Financial Physical IP Information and IT Relationship Placement of Responsibility Who will have input to decisions? Who will make the decision? Decisions Principles Architecture Strategy Business Requirements Investment The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 22

23 Set Storage Goal 1 We work with the project sponsor and designated staff members to determine the prioritized goals of the ILM assessment, planning and design efforts. This includes capturing their belief in what the end-result is. Effective use of Storage Cost Control Compliance/Governance Utilization Scalability Service Level Common Measures Profit Return on Equity (ROE) Return on Investment (ROI) Asset utilization Return on Assets (ROA) t Growth / t Cost The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 23

24 Set Perspective 2 We guide the project sponsor to select a primary view and essential infrastructure characteristics of significance to the business owners or users. This allows us to suppress other views, for the moment, as immaterial or diversionary. As a result, we can focus on capturing expected behavior and requirements, rather than implementation. The objects defined in the view will be associated with all requirements and aggregated metrics over time. Perspectives: Application Business Process Business Object Logical State Physical State The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 24

25 Collect Data & Requirements 3 We use the perspective to identify requirements, yet avoid physical discovery. We discover core business processes and their relationships to the information that drives the them. We also note information centric process opportunities. This is start of formal data classification. Availability Business availability requirements Business Impact Assessment Definition of Unavailability Risk Identification Regulatory Compliance Capacity Business Strategy and Plans IT Strategy and Plans Business requirements Transaction volumes Financial Governance The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 25

26 Sources of Requirements The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 26

27 Develop Storage Strategy 4 We specify and map current and future requirements to storage capabilities. The requirements are the tangible need or intangible want, and the capabilities are the tangible method of meeting need. In its first form, the map enables selection of storage capabilities to meet requirements Map Storage capabilities to requirements Alternative capabilities to requirements Develop Parts list with high-level attributes Bill of materials that summarizes the required capabilities Preliminary catalogue of storage services (portfolio) The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 27

28 Storage Strategy Demonstrates Alignment The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 28

29 Alignment over Time and Instantiation The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 29

30 Strategy is Constructed from Capabilities The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 30

31 Consolidate & Assign 5 We perform discovery at system level, developing findings using the vendor neutral, object language developed in the previous phase. We assigned data collect to the future state categories and then consolidate. Discover Current Storage Capabilities What do they own? Current Storage Services Consumed What do they use? Validate previous work Consolidate and Assign Metrics Capabilities Assign to Perspective Consolidate and aggregate numbers by Perspective The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 31

32 Gap Analysis 6 We document the difference between the required and current storage capabilities. We calculate the difference between required and consumed capabilities. The result is a list of capabilities to acquire or suspend and a list of capabilities that need implementation. An impact and priority statement should accompany the found gaps. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 32

33 Actionable Recommendations 7 The result of developing a plan to get from the current state to the proposed state over some unit of time. There is no expectation that time is immediate, in fact, it is preferable to have a stepped program, with immediate or prioritized improvements. An actionable recommendation differs from a simple recommendation by being a tangible step/benefit pair, accomplished in a reasonable (short) period. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 33

34 Detailed Design 8 Produced on acceptance of the recommendations or on a decision to proceed with specific recommendations. It is probable that a proof of concept design using a hardware subset may be required as part of an assessment. Detailed discovery is a requirement. Detailed design should be close to implementation to avoid rework. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 34

35 Implement 9 Install/Configure technical components, implement new processes, procedures and organizational components, including pilot solution, and rollout to client organization. This step is executed consistent with local consulting methodology and new storage practices. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 35

36 ILM, the Catalyst for Change The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 36

37 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: trackdatamgmt@snia.org Many thanks to the following individuals for their contributions to this tutorial. SNIA Education Committee LeRoy Budnik, Knowledge Transfer Phil Huml, Knowledge Transfer Bob Rogers, Application Matrix Edgar St. Pierre, EMC Nagina Daneker, HP Gary Zasman, NetApps Adam Mendoza The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 37

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Data Governance. Mark Plessinger / Julie Evans December /7/2017 Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

Data Warehousing Fundamentals by Mark Peco

Data Warehousing Fundamentals by Mark Peco Data Warehousing Fundamentals by Mark Peco All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks of their

More information

How To Reduce the IT Budget and Still Keep the Lights On

How To Reduce the IT Budget and Still Keep the Lights On How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,

More information

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The

More information

Controlling the Project Pipeline: Managing Constraints to Maximize Outputs

Controlling the Project Pipeline: Managing Constraints to Maximize Outputs Washington, DC Metro Office Controlling the Project Pipeline: Managing Constraints to Maximize Outputs David Lendry, PMP Director, Project Solutions TenStep of Metro DC, Federal, Maryland & Eastern New

More information

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy. Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations

More information

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of

More information

Symantec Data Center Migration Service

Symantec Data Center Migration Service Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration

More information

Navigating the Clouds Fortifying ITIL for Cloud Governance

Navigating the Clouds Fortifying ITIL for Cloud Governance Navigating the Clouds Fortifying ITIL for Cloud Governance DECEMBER 2011 Cloud adoption promises to be an interesting journey for an enterprise with its luring benefits of on-demand models enabling faster

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Data Governance Central to Data Management Success

Data Governance Central to Data Management Success Data Governance Central to Data Success International Anne Marie Smith, Ph.D. DAMA International DMBOK Editorial Review Board Primary Contributor EWSolutions, Inc Principal Consultant and Director of Education

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?

More information

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets. REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Planning and Implementing ITIL in ICT Organisations

Planning and Implementing ITIL in ICT Organisations CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to

More information

TSC Business Continuity & Disaster Recovery Session

TSC Business Continuity & Disaster Recovery Session TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Mo n t a n a S t a te Fu n d. FY 2011 Business Plan Performance September 23, 2011

Mo n t a n a S t a te Fu n d. FY 2011 Business Plan Performance September 23, 2011 Mo n t a n a S t a te Fu n d FY 2011 Business Plan Performance September 23, 2011 Up to the Challenge September 23, 2011 FY 2011 Business Plan Performance 2 Agenda Introduction Business Plan Key Success

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Ben Vickery Senior Technical Analyst NIST MEP September

More information

EY s data privacy service offering

EY s data privacy service offering EY s data privacy service offering How to transform your data privacy capabilities for an EU General Data Protection Regulation (GDPR) world Introduction Data privacy encompasses the rights and obligations

More information

DATACENTER SERVICES DATACENTER

DATACENTER SERVICES DATACENTER SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new

More information

Importance of the Data Management process in setting up the GDPR within a company CREOBIS

Importance of the Data Management process in setting up the GDPR within a company CREOBIS Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different

More information

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) Release 2.2 August 2013. This document was created in collaboration of the leading experts and educators in the field and members of the Certified Data Steward

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17 iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface vi viii ix x xi 2.7 ITIL conformance or compliance practice adaptation 13 2.8 Getting started Service Lifecycle

More information

To ITIL and Beyond: Operational Discipline via Process

To ITIL and Beyond: Operational Discipline via Process To ITIL and Beyond: Operational Discipline via Process Glenn O Donnell 1 To ITIL and Beyond: Operational Discipline via Process Building IT credibility with structured process discipline ITIL as a basis

More information

San Francisco Chapter. Cassius Downs Network Edge LLC

San Francisco Chapter. Cassius Downs Network Edge LLC Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

Quality Assurance and IT Risk Management

Quality Assurance and IT Risk Management Quality Assurance and IT Risk Deutsche Bank s QA and Testing Transformation Journey Michael Venditti Head of Enterprise Testing Services, Deutsche Bank IT RISK - REGULATORY GOVERNANCE Major shifts in the

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

The Storage Networking Industry Association (SNIA) Data Preservation and Metadata Projects. Bob Rogers, Application Matrix

The Storage Networking Industry Association (SNIA) Data Preservation and Metadata Projects. Bob Rogers, Application Matrix The Storage Networking Industry Association (SNIA) Data Preservation and Metadata Projects Bob Rogers, Application Matrix Overview The Self Contained Information Retention Format Rationale & Objectives

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Pave the way: Build a value driven SAP GRC roadmap March 2015

Pave the way: Build a value driven SAP GRC roadmap March 2015 www.pwc.be/erp Pave the way: Build a value driven SAP GRC roadmap March 2015 Agenda Introduction Measuring GRC Progression & Benchmarking GRC Program Roadmap Building a Business Case 2 Introduction Pave

More information

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE Luanne Dauber, Pure Storage Author: Matt Kixmoeller, Pure Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft Notes & Lessons Learned from a Field Engineer Robert M. Smith, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may

More information

WAN Application Infrastructure Fueling Storage Networks

WAN Application Infrastructure Fueling Storage Networks WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member

More information

Data Virtualization Implementation Methodology and Best Practices

Data Virtualization Implementation Methodology and Best Practices White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

What is ITIL. Contents

What is ITIL. Contents What is ITIL Contents What is ITIL and what are its origins?... 1 Services and Service Management... 2 Service Providers... 3 Stakeholders in Service Management... 3 Utility and Warranty... 4 Best Practices

More information

Cloud Archive and Long Term Preservation Challenges and Best Practices

Cloud Archive and Long Term Preservation Challenges and Best Practices Cloud Archive and Long Term Preservation Challenges and Best Practices Chad Thibodeau, Cleversafe Inc. Sebastian Zangaro, HP Author: Chad Thibodeau, Cleversafe Inc. SNIA Legal Notice The material contained

More information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles

More information

ITIL FOUNDATION NON-TECHNICAL & CERTIFIED TRAINING COURSE SECTOR / IT. Tel: Fax:

ITIL FOUNDATION NON-TECHNICAL & CERTIFIED TRAINING COURSE SECTOR / IT.  Tel: Fax: SECTOR / IT NON-TECHNICAL & CERTIFIED TRAINING COURSE In this 3 Days exciting and dynamic course, you will get an introduction to the lifecycle of managing IT services to deliver to business expectations.

More information

RightNow Technologies Best Practices Implementation Guide. RightNow Technologies, Inc.

RightNow Technologies Best Practices Implementation Guide. RightNow Technologies, Inc. RightNow Technologies Best Practices Implementation Guide RightNow Technologies, Inc. www.rightnow.com http://rightnow.custhelp.com Welcome Welcome to the RightNow Technologies Best Practice Implementation

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

The Need for a Terminology Bridge. May 2009

The Need for a Terminology Bridge. May 2009 May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the

More information

Trends in Data Protection CDP and VTL

Trends in Data Protection CDP and VTL Trends in Data Protection CDP and VTL Agnes Lamont, TimeSpring Jason Iehl, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Deploying Public, Private, and Hybrid. Storage Cloud Environments

Deploying Public, Private, and Hybrid. Storage Cloud Environments Deploying Public, Private, and Hybrid PRESENTATION TITLE GOES HERE Storage Cloud Environments Marty Stogsdill, Oracle Greg Kleiman, NetApp SNIA Legal Notice! The material contained in this tutorial is

More information

Professional Services for Cloud Management Solutions

Professional Services for Cloud Management Solutions Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their

More information

Convergence of BCM and Information Security at Direct Energy

Convergence of BCM and Information Security at Direct Energy Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

State of Security Operations

State of Security Operations State of Security Operations Roberto Sandoval / September 2014 Security Intelligence & Operations Consulting Founded: 2007 The best in the world at building state of the art security operations capabilities/cyber

More information

What s a BA to do with Data? Discover and define standard data elements in business terms

What s a BA to do with Data? Discover and define standard data elements in business terms What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data

More information

The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications

The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications By Donna Burbank Managing Director, Global Data Strategy, Ltd www.globaldatastrategy.com Sponsored

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

Data Stewardship Core by Maria C Villar and Dave Wells

Data Stewardship Core by Maria C Villar and Dave Wells Data Stewardship Core by Maria C Villar and Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks

More information

PAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..

PAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away.. PAGE - 16 PAGE - 1 Sometimes, the solution is just a benchmark away.. Post Box 301532, Riyadh 11372, Kingdom Of Saudi Arabia. Tel: +966 1 229 1819 Fax: +966 1 229 1801 PAGE - 2 PAGE - 3 The base of automation

More information

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER Audio Configuration Configure your audio settings. The Audio Setup Wizard allows you to configure your volume level, default microphone and recording

More information

Simplifying IT through Virtualization

Simplifying IT through Virtualization E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while

More information

Building ITSM Beyond ITIL

Building ITSM Beyond ITIL Building ITSM Beyond ITIL Glenn O Donnell Principal Product Marketing Manager EMC Corporation 1 ITSM is More Than ITIL ITIL is a great innovation for building IT discipline and business alignment ITIL

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives

More information

Establishing Enterprise-Wide Data Governance

Establishing Enterprise-Wide Data Governance Establishing Enterprise-Wide Data Governance Dave Blackstone ODOT - Office of Technical Services Greg Yarbrough Data Transfer Solutions LLC. ODOT s Definition of Data Governance (DG) What is it? Governance

More information

Competency Definition

Competency Definition Adult Children's Outreach Technical Teen Acquisition Adaptability The ability to effectively process library material orders; knowledge of vendor software, processes, products, and updates x x The ability

More information

Consolidation Committee Final Report

Consolidation Committee Final Report Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia

More information

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

VMware BCDR Accelerator Service

VMware BCDR Accelerator Service AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution

More information

Cloud Disaster Recovery: Public, Private or Hybrid Cloud Solutions Supporting Disaster Recovery

Cloud Disaster Recovery: Public, Private or Hybrid Cloud Solutions Supporting Disaster Recovery White Paper Cloud Disaster Recovery: Public, Private or Hybrid Cloud Solutions Supporting Disaster Recovery Table of Contents Introduction... 2 Business continuity and disaster recovery development flow...

More information

Better skilled workforce

Better skilled workforce Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

ITSM20F_Umang.   Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:

More information

National Open Source Strategy

National Open Source Strategy National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

Determining Best Fit for ITIL Implementation

Determining Best Fit for ITIL Implementation Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

FROM TACTIC TO STRATEGY:

FROM TACTIC TO STRATEGY: FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix

More information