Consolidation Committee Final Report

Size: px
Start display at page:

Download "Consolidation Committee Final Report"

Transcription

1 Committee Details Date: 11/20/2015 Committee Name: 36-7 Network Telecom Video Surveillance Committee Co- Chairs: Noel Small and Chris Burge Functional Area: Information Technology Functional Area Coordinator: Phil Ventimiglia List the major tasks your committee will need to take to accomplish your deliverables. Please provide more details for the tasks leading up to the SACSCOC Prospectus development. Major Tasks for Committee Tracker from Final Planning Document and Recommendations Task: Plan then design Network Integration two (2) 10gig circuits 2) Test and insure proper routing between campuses/and firewalls are in place. This task is in progress. Task: Investigate network account needs based on department access requirements two (2) 10gig circuits 2) Test and insure proper routing between campuses/and firewalls are in place. 3) Redefine Protocol Routing 4) Test and Implement configuration changes. This task is in progress. Task: Develop firewall requirements Page 1 of 5

2 two (2) 10gig circuits 2) Test connectivity 3) Insure proper routing between campuses/and firewalls are in place. This task is in progress. Task: Identify connectivity requirements Once connectivity is established between institutions, GSU & GPC can then utilize both campus locations for Business Continuity and/or Disaster Recovery sites in the event of an internet connectivity outage. There are anticipated charges necessary to enable internet resilience. Establishing a link between Georgia State University and Georgia Perimeter College to enable data transport needed for seamless communication. This link will allow for software application and hardware access of various resources. The assessment needed for this task to proceed is completed. This task is in progress as part of the Network Integration Task. Task: Determine total bandwidth requirements Based on our desired outcome, it was determined the installing 2 10Gigs circuits would adequately serve the new university connectivity needs and that relates to acceptable bandwidth. This task has been completed. Task: Work with Peachnet to explore connectivity options Once connectivity is established between institutions, GSU & GPC can then utilize both campus locations for Business Continuity and/or Disaster Recovery sites in the event of an internet connectivity outage. There are anticipated charges necessary to enable internet resilience. Establishing a link between Georgia State University and Georgia Perimeter College to enable data transport needed for seamless communication. This link will allow for software application and hardware access of various resources. The background work/assessment needed for this task to Page 2 of 5

3 proceed is completed. The connectivity options obtained from Peachnet is as follows: Option 1 - Increase GPC's connectivity within the Peachnet cloud.(from 50Mbps - 150Mbps) Completed Option 2 - Pending further analysis and design based on actual long term requirements. This task is in progress as part of the Network Integration Task. Task: Identify dark Fiber availability at each core site We have received three (3) quotes from authorized vendors and will determine a way forward should we decided to terminate fiber at one of our desired data centers. The background work/assessment for this task has been completed. There may be future activity under this task, if the need to terminate fiber is required. Task: Identify Ocularis Version and add- on components (including 3 rd party) Georgia Perimeter College to enable video data transport for camera viewing and video retrieval 2. Consolidate video surveillance network architectures into one (1) logical 3. GSU Police Department should remain primary customer/authority having view controls of ALL cameras connected throughout both campus Today GSU and GPC both use the same video surveillance management system. The team has now identified the current versions of Ocularis being used on each campus. The activities associated with this task include: 1) Conduct GPC VSS assessment 2) Define routing and firewall ACL s 3) Write Config script 4) test and implement ensuring viewing capability by all campuses and necessary personnel. 5) Upgrade GPC system equipment 6) Sync version compatibility. This task is in progress. Task: Identify IP address ranges used The team has identified and shared IP addresses used by both institutions today. The background work/assessment of this task has been completed. Task: Network Design of video surveillance system Page 3 of 5

4 Georgia Perimeter College to enable video data transport for camera viewing and video retrieval 2. Consolidate video surveillance network architectures into one (1) logical 3. GSU Police Department should remain primary customer/authority having view controls of ALL cameras connected throughout both campus Today GSU and GPC both use the same video surveillance management system. The team has now identified the current versions of Ocularis being used on each campus. The activities associated with this task include: 1) Conduct GPC VSS assessment 2) Define routing and firewall ACL s 3) Write Config script 4) test and implement ensuring viewing capability by all campuses and necessary personnel. 5) Upgrade GPC system equipment 6) ensure version compatibility. This task is in progress. Task: Determine wireless infrastructure requirements Georgia Perimeter College to enable GSU SSID authentication and wireless access across the campus. 2. Consolidate wireless network architectures into one (1) logical design. Today GSU and GPC both use the IEEE n standard and RADIUS authentication. The assessment of this task has resulted in the rolling out a new SSID name and using certificate based authentication. This will occur in September The activities associated with this task include: 1) Assess GPC SSID s and functionality 2) Map GPC and GSU SSID s/or create new naming convention 3) Test Configuration 4) Launch testing phase 5) Communicate to end users 6) Launch 7) decommission old SSIDs. This task is in progress. Task: Wired and Wireless Authentication for Students and Employees Georgia Perimeter College to enable GSU SSID authentication and wireless access across the campus. 2. Consolidate wireless network architectures into one (1) logical design. Today GSU and GPC both use the IEEE n standard and RADIUS authentication. The assessment of this task has resulted in the rolling out a new SSID name and using certificate based authentication. This will occur in September The activities associated with this task include: 1) Assess GPC SSID s and functionality 2) Map GPC and GSU SSID s/or create new naming convention 3) Test Configuration 4) Launch testing phase 5) Communicate to end users 6) Launch 7) decommission old SSIDs. This task is in progress. Task: Review of IT service and maintenance contracts Page 4 of 5

5 1. Consolidate video surveillance network architectures into one (1) logical 3. Consolidate wireless network architectures into one (1) logical design. GPC and GSU teams are continuing to gather information as it relates to service and maintenance contracts as they work through the major consolidation tasks. All enterprise vendors are to be notified through this fiscal year renewal process (or prior to July 1) of the intent to merge licenses, the effective licensing date for the new institution, any relevant information with regard to projected FTE/Seats required, adjusted standard renewal/anniversary date of July 1 to align with FY budgets (if not already), request any needed legal amendments or contract changes that may be required, and quote for future budgetary purposes. This task is in progress. Task: Inventory and Review of GPC infrastructure 1. Consolidate video surveillance network architectures into one (1) logical 3. Consolidate wireless network architectures into one (1) logical design. GPC and GSU teams are continuing to gather information as it relates to inventory and GPC infrastructure as they work through the major consolidation tasks. This task is in progress. Other/Final Comments (if any): Page 5 of 5

Consolidation Committee Final Report

Consolidation Committee Final Report Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia

More information

ADDENDUM #1 RFP # , Districtwide Network Refresh Design

ADDENDUM #1 RFP # , Districtwide Network Refresh Design ADDENDUM #1 RFP #1718-03, Districtwide Network Refresh Design This Addendum forms a part of the Contract Documents and modifies the original Contract Documents. Acknowledge receipt of this Addendum in

More information

PROJECT PROGRESS REPORT Information Technology Equipment. Chabot- Las Positas CCD October 27, Equipment Categories of Hardware and Software:

PROJECT PROGRESS REPORT Information Technology Equipment. Chabot- Las Positas CCD October 27, Equipment Categories of Hardware and Software: PROJECT PROGRESS REPORT Information Technology Equipment Chabot- Las Positas CCD October 27, 2010 Equipment Categories of Hardware and Software: Desktop & laptops Network switches & routers Network monitoring

More information

HABERSHAM COUNTY BOARD OF COMMISSION EXECUTIVE SUMMARY

HABERSHAM COUNTY BOARD OF COMMISSION EXECUTIVE SUMMARY HABERSHAM COUNTY BOARD OF COMMISSION EXECUTIVE SUMMARY SUBJECT: County Dark Fiber Expansion Project DATE: March 7, 2017 (X) RECOMMENDATION ( ) POLICY DISCUSSION BUDGET INFORMATION: ( ) STATUS REPORT ANNUAL

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Information Technology Procedure IT 3.4 IT Configuration Management

Information Technology Procedure IT 3.4 IT Configuration Management Information Technology Procedure IT Configuration Management Contents Purpose and Scope... 1 Responsibilities... 1 Procedure... 1 Identify and Record Configuration... 2 Document Planned Changes... 3 Evaluating

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

How Cisco IT Deployed Enterprise Messaging on Cisco UCS

How Cisco IT Deployed Enterprise Messaging on Cisco UCS Cisco IT Case Study July 2012 Enterprise Messaging on Cisco UCS How Cisco IT Deployed Enterprise Messaging on Cisco UCS Messaging platform upgrade and new servers reduce costs and improve management, availability,

More information

6/5/ Michael Hojnicki Chief of Technology and Administrative Services

6/5/ Michael Hojnicki Chief of Technology and Administrative Services Technology Update 6/5/2018 - Michael Hojnicki Chief of Technology and Administrative Services Projects Completed in 2017 Open Checkbook Published Network & Phone Upgrade High Level Design Competitive Bid

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Technology Master Plan Proposal

Technology Master Plan Proposal Fort Bend Independent School District Technology Master Plan Proposal As of May 1, 2018 Infrastructure Only INTRODUCTION AND BACKGROUND Fort Bend ISD (FBISD) has witnessed a tremendous increase in the

More information

IT Disaster Recovery Services Program

IT Disaster Recovery Services Program Q4-2017 ISAC Update v.20171107 IT Disaster Recovery Strategy Implementation 2008 Data Center Strategic Plan Part 1 Part 2 Disaster Recovery Strategic Plan Part 1 Part 2 2016 2019 Implementation Goals Decouple

More information

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

The Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft

The Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft The Project Charter Project Title: VDI Data Center Design and Build Project Sponsor: South Alberta Data Centers Inc. (SADC Inc.) Project Customer: The City of Calgary Project Manager: Moe Yousof Document

More information

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce

More information

CompTIA Mobility+ Certification

CompTIA Mobility+ Certification CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,

More information

Designing Windows Server 2008 Network and Applications Infrastructure

Designing Windows Server 2008 Network and Applications Infrastructure Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of

More information

Council, 26 March Information Technology Report. Executive summary and recommendations. Introduction

Council, 26 March Information Technology Report. Executive summary and recommendations. Introduction Council, 26 March 2014 Information Technology Report Executive summary and recommendations Introduction This report sets out the main activities of the Information Technology Department since the last

More information

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Why You Should Choose Cox Metro Ethernet To meet the critical demands of better supporting local emergency

More information

Broward County RFP TEC P1

Broward County RFP TEC P1 Broward County RFP TEC2115735P1 John Burns - SVP Sales & Marketing Paul Leppert - VP & Managing Director (TLC Denver) Don West - CARL Strategic Account Consultant CARL X Questions Hosted from Solution

More information

NU Cloud Terms of Service

NU Cloud Terms of Service Overview This document represents the Terms of Service among Northwestern Information Technology (IT) and participating tenants in the NUCloud private cloud environment at Northwestern. The goal of these

More information

Request for Proposal. I. Introduction. II. Scope of Work. IT Managed Services Support. IT Environment. Main Facility

Request for Proposal. I. Introduction. II. Scope of Work. IT Managed Services Support. IT Environment. Main Facility Request for Proposal IT Managed Services Support I. Introduction The Hoh Indian Tribe ( Tribe or Hoh Tribe ) is located in western Washington State in Jefferson County, 28 miles South of Forks, Washington.

More information

2014 NASCIO Recognition Award Nomination

2014 NASCIO Recognition Award Nomination 2014 NASCIO Recognition Award Nomination TITLE: Network Communication Partnerships for Public Safety and Economic Opportunity CATEGORY: Cross Boundary Collaboration and Partnerships CONTACT: Shannon Barnes

More information

Technology Services. FY Budget Presentation

Technology Services. FY Budget Presentation FY 2018-19 Budget Presentation Goals and Accomplishments Overall, completed 74 projects, fulfilled 8,676 service/incident requests, and held uptime of 99.96% Application Consolidation/Reduction initiative-

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

Audit Challenges and Best Practices in a Research University Environment

Audit Challenges and Best Practices in a Research University Environment NSAA Annual Conference Jeffrey Huskamp Vice President and CIO University of Maryland, College Park Carnegie Doctoral/Research University Extensive 18 th ranked public university (US News) Celebrated 150

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

Texas Commission on Fire Protection

Texas Commission on Fire Protection 2017 Texas Commission on Fire Protection OVERVIEW, REVENUE, DATA MANAGEMENT PROJECT, PERFORMANCE MEASURES Page 1 of 9 Overview The Commission on Fire Protection is charged with developing and enforcing

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

FOLLOW-UP REVIEW OF RISK MANAGEMENT ETC RISK MANAGEMENT FRAMEWORK

FOLLOW-UP REVIEW OF RISK MANAGEMENT ETC RISK MANAGEMENT FRAMEWORK 2017 FOLLOW-UP REVIEW OF RISK MANAGEMENT ETC RISK MANAGEMENT FRAMEWORK MA. LUISA JASA-LOQUE IMAAN HIGHER COLLEGE OF TECHNOLOGY Educational Technology Center DISTRIBUTION LIST ETC QA CORDINATOR Report Distribution

More information

Continuity Insights Presentation. April 28, Stephen Forte CEO

Continuity Insights Presentation. April 28, Stephen Forte CEO Continuity Insights Presentation April 28, 2004 2004 Stephen Forte CEO 818-728-2040 sforte@ascendenttelecom.com The Role of Wireless Communications for Business Continuity Mobility What Problems are Solved?

More information

Perfigo Design Comparison Overview

Perfigo Design Comparison Overview Perfigo Design Comparison Overview The University of Utah has chosen the Cisco Perfigo product to provide a replacement for the University WANA product. The Perfigo initial implementation will replace

More information

HRSD Position Description: UNIX Systems Administrator

HRSD Position Description: UNIX Systems Administrator HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position

More information

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 Design Objective Business Requirement Why do you want to build a network? Too often people build networks based on technological,

More information

Groton Data Center Migration Project

Groton Data Center Migration Project Groton Data Center Migration Project Category Enterprise IT Management Initiatives State Connecticut Contact Mark Raymond, Chief Information Officer mark.raymond@ct.gov Project May 2014 Initiation End

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access

More information

Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Page 1 Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 4 days;

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course No.10233B 5 Days Instructor-led, Hands-on Introduction This five-day, instructor-led course provides you with the

More information

ADDENDUM #2 TO REQUEST FOR PROPOSAL (RFP) #2252 Institutional Network Service, Data Center Co-location Service, and High-Speed Internet Service

ADDENDUM #2 TO REQUEST FOR PROPOSAL (RFP) #2252 Institutional Network Service, Data Center Co-location Service, and High-Speed Internet Service CITY OF CONCORD, CALIFORNIA March 13, 2013 ADDENDUM #2 TO REQUEST FOR PROPOSAL (RFP) #2252 Institutional Network Service, Data Center Co-location Service, and High-Speed Internet Service NOTICE TO PROPOSERS

More information

Campus Network Design

Campus Network Design Modular Network Design Campus Network Design Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions Designing one of these

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Maximize Your Assets Securely and Cost Effectively

Maximize Your Assets Securely and Cost Effectively S E N T I N E L P O I N T S E R V I C E S Maximize Your Assets Securely and Cost Effectively Competently track and manage your communication system and network through Altura Sentinel Point Services. We

More information

One Hospital s Cybersecurity Journey

One Hospital s Cybersecurity Journey MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital

More information

Technology Meeting Agenda: [Client Name]

Technology Meeting Agenda: [Client Name] Attendees: Status: Meeting Items Meeting Date/Time: Nov 12 Attendees: [client] [names] Attendees: [name] Next Meeting Dec 10 Agenda: 1. Below items and determine next steps Open Items: Item: Security Firewall

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

Sony Customer Journey

Sony Customer Journey Sony Customer Journey A declining market share due to new market entrants, Apple and Samsung, meant that cost reduction was a critical issue. The CIO was tasked with reducing the European IT budget by

More information

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No PROPOSAL FORM Cyber Insurance Underwritten by The Hollard Insurance Co. Ltd, an authorised Financial Services Provider www.itoo.co.za @itooexpert ITOO is an Authorised Financial Services Provider. FSP.

More information

STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010

STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010 STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010 Attendees: Tony Ambler, Jay Boisseau, Pat Clubb, Andrew Dillon, Brad Englert, Greg Fenves, Rod Hart, Steve Leslie, David

More information

INTRODUCTION EXISTING DESIGN

INTRODUCTION EXISTING DESIGN INTRODUCTION Syringa Networks clearly sees the Idaho Education Network as a valuable educational asset. Like any asset, the network must be well managed in order to maximize its value for all Stakeholders.

More information

PISMO BEACH COUNCIL AGENDA REPORT

PISMO BEACH COUNCIL AGENDA REPORT PISMO BEACH COUNCIL AGENDA REPORT SUBJECT/TITLE: REVIEW OF INFORMATION TECHNOLOGY (IT) STATUS AND IT STRATEGIC PLAN IMPLEMENTATION UPDATE. RECOMMENDATION: 1. Receive the IT Status and Implementation Update.

More information

Disaster Recovery and Mitigation: Is your business prepared when disaster hits?

Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since

More information

UNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017

UNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017 UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment

More information

Facilities. Western Illinois University Quad Cities. Consolidated Fiscal-Year 2011 Annual Report and Fiscal-Year 2012 Planning Document

Facilities. Western Illinois University Quad Cities. Consolidated Fiscal-Year 2011 Annual Report and Fiscal-Year 2012 Planning Document Mission statement: Western Illinois University Quad Cities Facilities Consolidated Fiscal-Year 2011 Annual Report and Fiscal-Year 2012 Planning Document Submitted by: William Brewer University Architect

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Introduction to Juniper Networks Wireless LANs (IJWL)

Introduction to Juniper Networks Wireless LANs (IJWL) Introduction to Juniper Networks Wireless LANs (IJWL) Course No: EDU-JUN-IJWL Length: Four Days Cost: $2800 (US) Schedule and Registration Course Overview This course is a four-day technical training course

More information

Contents. 1 General Terms. Page 1 of 8

Contents. 1 General Terms. Page 1 of 8 Page 1 of 8 Service Description: Advanced Services --- Fixed Price Secure Agile Exchange Advise and Implement (Quick Start) (ASF-CORE-SAI-QS) This document describes Cisco s Secure Agile Exchange Advise

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Bicycle Access & Parking Plan Project List Review

Bicycle Access & Parking Plan Project List Review Bicycle Access & Parking Plan Project List Review Bicycle Advisory Committee September 19th, 2013 Strategy Overview New Bicycle Issues and Ideas (BAC, staff, public) Funding External Agency Lead BAPP s

More information

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Presentation Overview What is BTOP? Making BTOP work for our state What

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

University Network Policies

University Network Policies BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these

More information

Marshall University Information Technology Council. Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE

Marshall University Information Technology Council. Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE Marshall University Information Technology Council Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE General Information: 1.1 Scope: This procedure applies to all University employees, including

More information

Disaster Recovery and Business Continuity Planning (Mile2)

Disaster Recovery and Business Continuity Planning (Mile2) Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity

More information

How Cisco Expedites IT Integration of an Acquisition

How Cisco Expedites IT Integration of an Acquisition How Cisco Expedites IT Integration of an Acquisition Streamlined, cross-functional processes accelerate how new employees work productively and minimize the transition impact on customers Cisco IT Case

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

IT Managed Services. Schedule 1 Specification 11/07/18

IT Managed Services. Schedule 1 Specification 11/07/18 ` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...

More information

Is there a preferred vendor (Cisco? ShoreTel? Etc) or a vendor that you wish to avoid?

Is there a preferred vendor (Cisco? ShoreTel? Etc) or a vendor that you wish to avoid? MVWIB TELECOM RFP QUESTIONS AND ANSWERS AS OF 2 NOV 2016 Is there a preferred vendor (Cisco? ShoreTel? Etc) or a vendor that you wish to avoid? Our preference would be Cisco, but it is not a requirement.

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: Fall 2011 PROGRAM: AUTHOR: Computer Engineering Technologist - Networking Dan Kachur

More information

Request for Proposals. Information Technology Consultant and Network & Information Technology Support Services

Request for Proposals. Information Technology Consultant and Network & Information Technology Support Services Request for Proposals Information Technology Consultant and Network & Information Technology Support Services July 18, 2018 General Description The City of Greenville is looking to select a qualified firm

More information

NAC Institutional Committee Meeting

NAC Institutional Committee Meeting Meeting Jet Propulsion Lab July 28-29, 2015 Kathryn Schmoll Chair Membership Committee Members Current Employer Current Position 1 CHAIR: Kathryn (Katy) Schmoll Kathryn Schmoll and Associates, LLC 2 James

More information

UNIT PLAN PART A Program/Pathway Update

UNIT PLAN PART A Program/Pathway Update UNIT PLAN PART A Program/Pathway Update Program/Pathway: Date: 1/6/2014 Our Mission: Los Angeles Harbor College fosters learning through comprehensive programs that meet the educational needs of the community

More information

Cisco Director Class SAN Planning and Design Service

Cisco Director Class SAN Planning and Design Service Cisco Director Class SAN Planning and Design Service Rapidly Plan and Deploy a Cisco Director Class MDS Solution for More Efficient Storage Networking Service Overview Cisco s intelligent storage networking

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

Security Incident May Student Information System University of Nebraska Nebraska State College System

Security Incident May Student Information System University of Nebraska Nebraska State College System Security Incident May 2012 Student Information System University of Nebraska Nebraska State College System 1 NeSIS Overview NeSIS has been operational for two years and is based on Oracle's PeopleSoft

More information

Faculty and Staff, Student Labs Program Update. Information Technology Fiscal Year 2013

Faculty and Staff, Student Labs Program Update. Information Technology Fiscal Year 2013 Faculty and Staff, Student Labs Program Update Information Technology Fiscal Year 2013 Standardize make/models/configurations of desktop and laptops used on the UMass Lowell campus. Standardize UMass Lowell

More information

Technology Disaster Recovery Plan updated 06/16/16

Technology Disaster Recovery Plan updated 06/16/16 Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education

More information

REQUEST FOR PROPOSALS FOR COMPUTER HARDWARE, SOFTWARE, PERIPHERALS, AND INSTALLATION SERVICES PROPOSAL NO.s PIT & PIT ADDENDUM #4

REQUEST FOR PROPOSALS FOR COMPUTER HARDWARE, SOFTWARE, PERIPHERALS, AND INSTALLATION SERVICES PROPOSAL NO.s PIT & PIT ADDENDUM #4 PURCHASING DEPARTMENT Willowbend Road Peachtree City, GA 3069 Phone: 770-487-767 Fax: 770-63-0 www.peachtree-city.org REQUEST FOR PROPOSALS FOR COMPUTER HARDWARE, SOFTWARE, PERIPHERALS, AND INSTALLATION

More information

Recommendation to Board. Final Action

Recommendation to Board. Final Action MOTION NO. M2017-142 Ratification and contract for Tukwila traction power sub-station repairs MEETING: DATE: TYPE OF ACTION: STAFF CONTACT: Operations and Administration Committee Board 12/7/2017 12/21//2017

More information

Agenda Item No. AGENDA ITEM BRIEFING

Agenda Item No. AGENDA ITEM BRIEFING AGENDA ITEM BRIEFING Submitted by: Billy Hamilton, Executive Vice Chancellor and Chief Financial Officer The Texas A&M University System Subject: Approval to Amend the FY 2016-FY 2020 Texas A&M University

More information

Ethernet Your Technology Partner for the Future

Ethernet Your Technology Partner for the Future Ethernet Your Technology Partner for the Future Working to Redefine Your Business Technology Partnership Choice ETHERNET YOUR TECHNOLOGY PARTNER FOR THE FUTURE RCN Business 1 UPDATING IT INFRASTRUCTURE

More information

OneUConn IT Service Delivery Vision

OneUConn IT Service Delivery Vision OneUConn IT Service Delivery Vision The University s Academic Vision establishes a foundation and high expectations for excellence in research, teaching, learning, and outreach for all of UConn s campuses.

More information

The Windstream Enterprise Advantage for Healthcare

The Windstream Enterprise Advantage for Healthcare The Windstream Enterprise Advantage for Healthcare Creating personalized healthcare experiences with secure and reliable cloud-optimized IT communications so you can focus on providing a connected, interoperable

More information

CCNA Discovery 4.0 Designing and Supporting Computer Networks

CCNA Discovery 4.0 Designing and Supporting Computer Networks CCNA Discovery 4.0 Designing and Supporting Computer Networks Characterizing Existing Network Chapter 3 1 Objectives 2 Creating a Network Diagram Typically, the first step in installing a new network is

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES

ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES 1. INTRODUCTION 1.1 The Office of Information Technology Services ( OITS ) has the responsibility of managing

More information

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &

More information

Appendix 12 Risk Assessment Plan

Appendix 12 Risk Assessment Plan Appendix 12 Risk Assessment Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A12-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information