SM40: Measuring Maturity and Preparedness

Size: px
Start display at page:

Download "SM40: Measuring Maturity and Preparedness"

Transcription

1 SM0: Measuring Maturity and Preparedness Richard Cocchiara IBM Distinguished Engineer and Chief Technology Officer for IBM Business Continuity & Resiliency Services Long Meadow Road Sterling Forest, NY (8)

2 IBM s approach to assessing a company s resiliency preparedness is done using three components Resilience Maturity Assessment Framework (RMAF) Used by business resilience teams for assessing customer resiliency Developed jointly by IBM Research and IBM Business Continuity & Resiliency Services teams Object oriented framework for analyzing a company s resiliency capabilities Resiliency Assessment Methodology (RAM) Used by BCRS consultants for providing a step-by-step approach for assessing overall client business resilience Used by IBM service delivery teams and IBM Research for assessing Global Service Delivery Centers Resilience Maturity Index (RMI) Composite metric of specific components to help identify potential areas of concern

3 Over time, IBM has developed a Resilience Maturity Assessment Framework (RMAF) to comprehensively analyze a company s resilience A holistic approach to evaluate all aspects of business resilience Object oriented framework for risk assessment and supporting method for use in initial phase of business resilience engagements The layers are broken down into IT and Business objects; objects are refined by attributes 200+ objects and over 2000 attributes Linked across layers to provide different resilience views like continuity, compliance, security etc. Evaluated for their current and target levels of business resiliency maturity STRATEGY PEOPLE PROCESS APPLICATIONS & DATA TECHNOLOGY FACILITIES

4 The IBM Resilience Maturity Assessment Framework (RMAF) uses a level maturity rating model to assess client resilience Basic Managed Predictive Adaptive Resilient These attributes or features are ad-hoc in nature and constitute the most basic levels of capability. Little planning for redundancy, failover capability or security are evident and rely heavily on staff expertise. Example: Layer Object Group IT IT These attributes or features have the fundamental automation tools necessary to manage a disruption or opportunity when it occurs. Object Change Change Management Management These attributes or features are centered on establishing thresholds and advanced warning systems that allow the company to take preemptive actions to prevent disruption. Attribute Group Activities Activities Attribute Monitor & Monitor & Report Report These attributes or features focus on the organizations ability to sense and respond to unforeseen circumstances by using contingency plans and adaptive technologies or processes found in a Dynamic Infrastructure to maintain operations. These capabilities focus on the business model itself and leverage the innovation, optimization and capacity management characteristics of a Dynamic Infrastructure. 1 = Basic 2 =Managed 3=Predictive =Adaptive =Resilient Some or all of this activity is slow, manual and/or problematic. Major changes usually have the outcomes documented, Change process is monitored and is effective for major changes. Change process is monitored and is effective for all changes. Change results are always documented, follow consistent codes to indicate the results, and are continually used to improve the process.

5 The framework is used as part of an overall continuous improvement Resilience Assessment Methodology (RAM) to help manage risk, improve governance and enable compliance. Plan Business Imperatives Information Risk Management Regulatory Compliance Inputs: Business objectives, goals, priorities, policies & current capabilities Assess Analyze Evaluate Set Objectives STRATEGY PEOPLE PROCESS APPLICATIONS & DATA TECHNOLOGY FACILITIES Design Deploy Implement Corporate Governance Outputs: Reduced Risk, Improved governance and enabled compliance Monitor Manage Control

6 When IBM attempted to apply the framework and method to our Global Service Delivery Centers, there were several goals Goal: Validate and extend the RMAF based on our own experience Identify new objects/attributes and modifications (can be generic for use elsewhere) Define resiliency maturity levels for relevant attributes Goal: Derive a specialized view of RMAF for infrastructure service delivery Identify objects/attributes relevant for service delivery operations of IBM Develop a composite metric Resiliency Maturity Index for infrastructure service delivery Benefits Robust framework for assessing the resiliency of Global Service Delivery Centers A tool to understand how varying the resiliency of specific objects in the model affects the overall resiliency of the Global Service Delivery Centers IBM differentiator metric for comparison with competitors Common framework for BCRS customers and internal use

7 Specialized view of RMAF for IBM Global Services Delivery Center resiliency assessment Service availability view for remote delivery of IT infrastructure services Features concerned with maintaining uninterrupted services to remote customer (internal or external) as per agreement Feature Feature relevance relevance indicated indicated by by 1s 1s and and 0s 0s in in the the Service Service Availability Availability column column A separate consultant version is generated for the chosen view The features are marked with a maturity level from 1 to The maturity values are aggregated into a resiliency maturity index

8 Model for computing Resiliency Maturity Index (RMI) Overall GDC Resiliency People (Organization) People (Organization) IT IT Business Business Applications & & Data Data Technology Facilities Facilities People IT & Bus. People Applications & Data People - Technology Dependence Relation Network Operational Business Remote Connectivity Computing Systems Degree of substitution = 30% Organizational Organizational resilience resilience is is an an orthogonal orthogonal entity entity that that cuts cuts across across all all layers. layers. People - Facilities Main facility, backup facility Home Office Utilities Voice network Degree of substitution = 80% Substitution Relation

9 Sample: Application of the approach Facilities Layer Applications and Data Layer Object Raw Net Reason Object Raw Net Reason Main facility, backup facility Home office 3.1 Utilities.. Network Voice network 3 3 Total Score Technology Layer Dependence on People-Facilities 80% substitution of home office by main facility 20% substitution of voice by Remote connectivity Remote Infra Mgmt Collaboration Tools Skills DB Total Score Dependency on n/w, computing mgmt security systems, People-App & Data 30% substitution of by voice 0% substitution of Collaboration by voice Object Raw Net Reason Layer Network Computing sys. Mgmt sys. Security sys. Total Score Dependence on main facility, utilities and network, People- Technology Object Operational Business Total Score Raw 3. Net Reason Dependency on Applications and Data layer objects, People- Overall GDSC Score = 80% IT-process score + 20% Business-process score = 3.9

10 Hindi Hebrew Tesekkurler Turkish Traditional Chinese Thank You English Russian Gracias Spanish Grazie Italian Arabic Japanese Obrigado Brazilian Portuguese Thai Merci French Danke German Tamil Simplified Chinese Korean

Staying Ahead of the Curve: The Latest Stressors, Methodologies, Trends and Directions in Business Resilience

Staying Ahead of the Curve: The Latest Stressors, Methodologies, Trends and Directions in Business Resilience Staying Ahead of the Curve: The Latest Stressors, Methodologies, Trends and Directions in Business Resilience Richard Cocchiara, IBM Distinguished Engineer Chief Technology Officer for IBM BCRS RMCOCCH@us.ibm.com

More information

Advanced Monitoring Asset for IBM Integration Bus

Advanced Monitoring Asset for IBM Integration Bus IBM Cloud Services Advanced Monitoring Asset for IBM Integration Bus Monitoring the business flows of IBM Integration Bus v10 Patrick MARIE IBM Cloud Services consultant pmarie@fr.ibm.com September 2017

More information

IBM Power Systems for SAP HANA Implementations

IBM Power Systems for SAP HANA Implementations IBM Power Systems for SAP HANA Implementations Alfred Freudenberger North America SAP on Power Systems Executive afreude@us.ibm.com 512-659-8059 IBM Internal Use Olnly Blog: SAPonPower.wordpress.com SAP

More information

TELKOM Success Story OSS Adoption Strategy

TELKOM Success Story OSS Adoption Strategy TELKOM Success Story OSS Adoption Strategy Indra Utoyo Direktur IT & Supply (CIO) PT Telekomunikasi Indonesia, Tbk. Jakarta, Juli 2009 Agenda Background OSS Readiness OSS Utilization & Implementation Technology

More information

IBM System z part numbers available for the IBM WebSphere Business Modeler V products

IBM System z part numbers available for the IBM WebSphere Business Modeler V products IBM United States Announcement 207-080, dated April 10, 2007 IBM System z part s available for the IBM WebSphere Business Modeler products Availability of national languages...2 Software services... 3

More information

Key/Value Pair versus hstore - Benchmarking Entity-Attribute-Value Structures in PostgreSQL.

Key/Value Pair versus hstore - Benchmarking Entity-Attribute-Value Structures in PostgreSQL. Key/Value Pair versus hstore - Benchmarking Entity-Attribute-Value Structures in PostgreSQL. Michel Ott June 17, 2011 University of Applied Science Rapperswil 1 What is KVP? A key-value pair (KVP) is a

More information

Architecting the Right SOA Infrastructure

Architecting the Right SOA Infrastructure Infrastructure Architecture: Architecting the Right SOA Infrastructure Robert Insley Principal SOA Global Technology Services 2007 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA

More information

Managing Linux for Control and Performance

Managing Linux for Control and Performance IBM Software Group Tivoli Software Managing Linux for Control and Performance Laura Knapp ljknapp@us.ibm.com 2005 IBM Corporation Agenda Introduction and background Performance Methodologies 6 Common Problems

More information

Key/Value Pair versus hstore - Benchmarking Entity-Attribute-Value Structures in PostgreSQL.

Key/Value Pair versus hstore - Benchmarking Entity-Attribute-Value Structures in PostgreSQL. Key/Value Pair versus hstore - Benchmarking Entity-Attribute-Value Structures in PostgreSQL. Michel Ott June 7, 2011 University of Applied Science Rapperswil 1 What is KVP? A key-value pair (KVP) is a

More information

CCNA Routing. & Switching (1-4) PT. CCNP Routing. & Switching (1-3) Networking Essentials

CCNA Routing. & Switching (1-4) PT. CCNP Routing. & Switching (1-3) Networking Essentials Why Networking? As our world becomes increasingly reliant on computer networks and networking technologies, there s a growing need for professionals who can design, build, manage, and secure networks.

More information

Open Systems Virtualization and Enterprise-Class De-duplication for Your Information Infrastructure

Open Systems Virtualization and Enterprise-Class De-duplication for Your Information Infrastructure Open Systems Virtualization and Enterprise-Class De-duplication for Your Information Infrastructure Technology Day IBM Paris 10 mars 2009 Marc-Audic Landreau MA.Landreau@fr.ibm.com Four Client Pain Points

More information

IBM Full Width Quiet Touch Keyboards now available on IBM System p servers and selected IntelliStation workstations

IBM Full Width Quiet Touch Keyboards now available on IBM System p servers and selected IntelliStation workstations Hardware Announcement September 12, 2006 IBM Full Width Quiet Touch Keyboards now available on IBM System p servers and selected IntelliStation workstations Overview New IBM Full Width Quiet Touch Keyboards

More information

The Future of Business Continuity & Resiliency

The Future of Business Continuity & Resiliency The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services

More information

Visualizing PI System Data with Dashboards and Reports

Visualizing PI System Data with Dashboards and Reports Visualizing PI System Data with Dashboards and Reports Presented by Mike Wood Product Manager Experience COLLECT HISTORIZE FIND ANALYZE DELIVER VISUALIZE What s New with Visualization in PI System 2010?

More information

VMware BCDR Accelerator Service

VMware BCDR Accelerator Service AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Cisco Certified Entry Networking Technician (CCENT)

Cisco Certified Entry Networking Technician (CCENT) Cisco Certified Entry Networking Technician (CCENT) University of Moratuwa Cisco Networking Center CCNA R&S: Introduction to Networks Career Ready Networking Course Overview The first course in the Cisco

More information

IBM Software. IBM z/vm Management Software. Introduction. Tracy Dean, IBM April IBM Corporation

IBM Software. IBM z/vm Management Software. Introduction. Tracy Dean, IBM April IBM Corporation IBM z/vm Management Software Introduction Tracy Dean, IBM tld1@us.ibm.com April 2009 Agenda System management Operations Manager for z/vm Storage management Backup and Restore Manager for z/vm Tape Manager

More information

TSC Business Continuity & Disaster Recovery Session

TSC Business Continuity & Disaster Recovery Session TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives

More information

Cloud-based data backup: a buyer s guide

Cloud-based data backup: a buyer s guide IBM Global Technology Services IBM SmartCloud IBM Managed Backupi Cloud-based data backup: a buyer s guide How to choose a third-party provider to develop, implement and manage your data backup solution

More information

Towards(Storing(Point(Clouds(in(PostgreSQL!

Towards(Storing(Point(Clouds(in(PostgreSQL! Towards(Storing(Point(Clouds(in(PostgreSQL MichelO) 1 WhatisPointCloud? A#point#cloud#is#just#a#bunch#of#points.#Although#it#is#some7mes#useful# to#talk#about#point#clouds#in#any#dimensional#space,#but#usually#we#talk#

More information

IBM United States Announcement , dated October 9, 2007

IBM United States Announcement , dated October 9, 2007 IBM United States Announcement 207-234, dated October 9, 2007 IBM WebSphere Business Monitor with business activity monitoring provides greater visibility into your business processes, data, and other

More information

Rational Asset Manager V7.5.1 packaging October, IBM Corporation

Rational Asset Manager V7.5.1 packaging October, IBM Corporation https://jazz.net/projects/rational-asset-manager/ Rational Asset Manager V7.5.1 packaging October, 2011 IBM Corporation 2011 The information contained in this presentation is provided for informational

More information

SHARE in Pittsburgh Session 15801

SHARE in Pittsburgh Session 15801 HMC/SE Publication and Online Help Strategy Changes with Overview of IBM Resource Link Tuesday, August 5th 2014 Jason Stapels HMC Development jstapels@us.ibm.com Agenda Publication Changes Online Strategy

More information

Cisco Jabber IM for iphone

Cisco Jabber IM for iphone Data Sheet Cisco Jabber IM for iphone Cisco Collaboration Solutions improve team and customer experiences to help organizations encourage innovation and improve decision making while building trust and

More information

Information Security Continuous Monitoring (ISCM) Program Evaluation

Information Security Continuous Monitoring (ISCM) Program Evaluation Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda

More information

Microsoft Academic Select Enrollment

Microsoft Academic Select Enrollment Microsoft Academic Select Enrollment Academic Select Agreement number Reseller or Microsoft affiliate to complete Academic Select Agreement Expiration Date Reseller or Microsoft affiliate to complete Enrollment

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Networking for a smarter data center: Getting it right

Networking for a smarter data center: Getting it right IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta Integrating ITIL and COBIT 5 to optimize IT Process and service delivery Johan Muliadi Kerta Measurement is the first step that leads to control and eventually to improvement. If you can t measure something,

More information

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The

More information

New Zealand Government IbM Infrastructure as a service

New Zealand Government IbM Infrastructure as a service New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as

More information

Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej

Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej Robert Michalski, Security Tiger Team, Central & Eastern Europe robert.michalski@pl.ibm.com Agenda 1 2 3 Threats

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

GLOBAL NETFLIX PREFERRED VENDOR (NPV) RATE CARD:

GLOBAL NETFLIX PREFERRED VENDOR (NPV) RATE CARD: Global Rate Card Timed Text Origination Rates Audio Description Rates Netflix Scope of Work Guidelines A/V Materials Timed Text Audio Materials Trailers Forced Narratives NPV SLA & KPIs GLOBAL NETFLIX

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

The case for cloud-based data backup

The case for cloud-based data backup IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

More information

incontact Open Cloud Platform Scalable, Reliable, Extensible, Powering Contact Centers of all Sizes.

incontact Open Cloud Platform Scalable, Reliable, Extensible, Powering Contact Centers of all Sizes. incontact Open Cloud Platform Scalable, Reliable, Extensible, Powering Contact Centers of all Sizes. incontact Open Cloud Platform The trusted enterprise-grade foundation for the incontact Customer Interaction

More information

QuickSpecs. Microsoft Windows Server 2012 R2. Overview

QuickSpecs. Microsoft Windows Server 2012 R2. Overview Overview Windows Server 2012 R2 captures Microsoft's experience of delivering global-scale cloud services to provide an enterprise-class server and cloud platform. It lets you optimize performance for

More information

CONTENT DELIVERED SCALABLE, ROBUST DIGITAL SIGNAGE SOLUTIONS VISUAL SOLUTIONS DIGITAL SIGNAGE VISUAL COMMUNICATIONS CONTENT MANAGEMENT VIDEO WALLS

CONTENT DELIVERED SCALABLE, ROBUST DIGITAL SIGNAGE SOLUTIONS VISUAL SOLUTIONS DIGITAL SIGNAGE VISUAL COMMUNICATIONS CONTENT MANAGEMENT VIDEO WALLS CONTENT DELIVERED SCALABLE, ROBUST DIGITAL SIGNAGE SOLUTIONS VISUAL SOLUTIONS DIGITAL SIGNAGE VISUAL COMMUNICATIONS CONTENT MANAGEMENT VIDEO WALLS 00800-22552269 (CALLBBOX) BLACK-BOX.EU/ICOMPEL 1 Deliver

More information

Retired. HP Windows Server 2008R2 OEM licenses are available for purchase from HP or your local authorized reseller.

Retired. HP Windows Server 2008R2 OEM licenses are available for purchase from HP or your local authorized reseller. Overview Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable organizations to increase the reliability

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

Dell helps you to simplify IT

Dell helps you to simplify IT Dell helps you to simplify IT Workshops the first step Reduce desktop and data centre complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2010 Introduction How can you protect

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Competency Definition

Competency Definition Adult Children's Outreach Technical Teen Acquisition Adaptability The ability to effectively process library material orders; knowledge of vendor software, processes, products, and updates x x The ability

More information

Networking for a dynamic infrastructure: getting it right.

Networking for a dynamic infrastructure: getting it right. IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for

More information

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction 29 February 2016 The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction 2015-2030 The Sendai Framework for Disaster Risk Reduction 2015-2030

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

CARED Safety Confirmation System Training Module. Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015

CARED Safety Confirmation System Training Module. Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015 CARED Safety Confirmation System Training Module Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015 Table of Contents Introduction... 3 Who are we?... 3 Our Programs and Experience... 3

More information

SIMPLIFY IT. Transform IT with VCE and Vblock TM Infrastructure Platforms. Copyright 2011 VCE Company LLC, All rights reserved.

SIMPLIFY IT. Transform IT with VCE and Vblock TM Infrastructure Platforms. Copyright 2011 VCE Company LLC, All rights reserved. SIMPLIFY IT Transform IT with VCE and Vblock TM Infrastructure Platforms I.T. BUDGET DILEMMA 73% Maintain 27% Invest Source: Forrester Research, Inc., IT Budget Allocations: Planning For 2011, December

More information

IBM zenterprise System Unified Resource Manager Overview and Update

IBM zenterprise System Unified Resource Manager Overview and Update Romney White, System z Architecture and Technology SHARE in Orlando August 7-12, 2011 IBM zenterprise System Unified Resource Manager Overview and Update Agenda Introduction Management Enablement Levels

More information

Cybersecurity Risk Management:

Cybersecurity Risk Management: Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

Intel USB 3.0 extensible Host Controller Driver

Intel USB 3.0 extensible Host Controller Driver Intel USB 3.0 extensible Host Controller Driver Release Notes (5.0.4.43) Unified driver September 2018 Revision 1.2 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Image Capture Mobile. Operator s Guide

Image Capture Mobile. Operator s Guide Image Capture Mobile Operator s Guide Contents 1. Summary... 3 2. Supported Models... 3 3. Features... 4 4. Compatibility... 4 5. Languages... 4 6. Connection of Scanner... 5 7. Function... 6 7.1 Execution...

More information

RELEASE NOTES UFED ANALYTICS DESKTOP SAVE TIME AND RESOURCES WITH ADVANCED IMAGE ANALYTICS HIGHLIGHTS

RELEASE NOTES UFED ANALYTICS DESKTOP SAVE TIME AND RESOURCES WITH ADVANCED IMAGE ANALYTICS HIGHLIGHTS RELEASE NOTES Version 5.2 September 2016 UFED ANALYTICS DESKTOP HIGHLIGHTS UFED Analytics Desktop version 5.2 serves as your virtual partner, saving precious time in the investigative process. Designed

More information

Get Connected. IT Essentials. NDG Linux Essentials. NDG Introduction to Linux I. NDG Introduction to Linux II

Get Connected. IT Essentials. NDG Linux Essentials. NDG Introduction to Linux I. NDG Introduction to Linux II Why OS & IT? A basic understanding of computer operating systems and information technologies provides the foundational knowledge needed for students to connect to the Internet and understand how systems

More information

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE

More information

CONTENT DELIVERED SCALABLE, ROBUST DIGITAL SIGNAGE SOLUTIONS BLACKBOX.COM / ICOMPEL BLACKBOX.COM

CONTENT DELIVERED SCALABLE, ROBUST DIGITAL SIGNAGE SOLUTIONS BLACKBOX.COM / ICOMPEL BLACKBOX.COM VISUAL SOLUTIONS DIGITAL SIGNAGE VISUAL COMMUNICATIONS CONTENT MANAGEMENT VIDEO WALLS CONTENT DELIVERED SCALABLE, ROBUST DIGITAL SIGNAGE SOLUTIONS BLACKBOX.COM / ICOMPEL 1.877.877.2269 BLACKBOX.COM Deliver

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Your Notes and Domino in the Cloud

Your Notes and Domino in the Cloud Your Notes and Domino in the Cloud ibmcloud.com/social m@nl.ibm.com Maurice Teeuwe Tech. Sales Lead, Europe Page 1 Please Note IBM s statements regarding its plans, directions, and intent are subject to

More information

SUSE LINUX Openexchange Server 4.1 Installation Kit Strong Encryption (128+ bit) German $ % 92.65

SUSE LINUX Openexchange Server 4.1 Installation Kit Strong Encryption (128+ bit) German $ % 92.65 While every effort is made to ensure the price list is as current as possible at time of publication, Novell Product Announcements (NPAs) may be issued which supersede information found within the price

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

I. Contact Information: Lynn Herrick Director, Technology Integration and Project Management Wayne County Department of Technology

I. Contact Information: Lynn Herrick Director, Technology Integration and Project Management Wayne County Department of Technology CySAFE Security Assessment Tool Wayne County, Michigan P a g e 1 I. Contact Information: Lynn Herrick Director, Technology Integration and Project Management Wayne County Department of Technology 313.224.6006

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

www.locwaydtp.com locway@locwaydtp.com We are and this is our Company Presentation Brief About Us LocWay is a localization company focused on projects coordination, Translation and Desktop Publishing (DTP)

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

ICAO Instructor Qualification Process

ICAO Instructor Qualification Process ICAO Instructor Qualification Process 1. Objective and scope 1.1 This document details the ICAO instructor qualification process, in order to establish and maintain a roster of ICAO instructors for the

More information

Our key considerations include:

Our key considerations include: October 2017 We recognize that our ability to continue to function as an organization is critical to our clients, who rely heavily on our firm and our people to keep their own real estate functioning properly.

More information

Customer Experiences:

Customer Experiences: Customer Experiences: Monitoring and Managing z/vm, Linux on z Sytems and LinuxONE Tracy Dean IBM tld1@us.ibm.com June 2016 Agenda A little fun What does managing include? What tools or products can you

More information

High Availability WAN

High Availability WAN High Availability WAN How Cisco IT Achieved a High Availability WAN A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Achieve high availability for CAPNet, Cisco s global backbone WAN

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

Cisco Agent Desktop for Cisco Unified Contact Center 7.X

Cisco Agent Desktop for Cisco Unified Contact Center 7.X Cisco Agent Desktop for Cisco Unified Contact Center 7.X Cisco Agent Desktop Overview Cisco Agent Desktop is a powerful team productivity and management suite of software solutions for the Cisco Unified

More information

CounterPath Bria Stretto Solution. Solution Brief.

CounterPath Bria Stretto Solution. Solution Brief. Solution Brief Introduction Bria Stretto TM is CounterPath s off-the-shelf softphone solution for enterprise customers, to complement the enterprise s existing VoIP service. Bria Stretto combines CounterPath

More information

WECC Internal Controls Evaluation Process WECC Compliance Oversight Effective date: October 15, 2017

WECC Internal Controls Evaluation Process WECC Compliance Oversight Effective date: October 15, 2017 WECC Internal Controls Evaluation Process WECC Compliance Oversight Effective date: October 15, 2017 155 North 400 West, Suite 200 Salt Lake City, Utah 84103-1114 WECC Internal Controls Evaluation Process

More information

Perceptive Intelligent Capture Visibility

Perceptive Intelligent Capture Visibility Perceptive Intelligent Capture Visibility Technical Specifications Version: 3.1.x Written by: Product Knowledge, R&D Date: August 2018 2015 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

POWER DCS with Vendita: IOUG Presentation

POWER DCS with Vendita: IOUG Presentation Place photo here POWER DCS with Vendita: IOUG Presentation March 2017 What is the DCS? Why run Oracle database on POWER? How does the DCS make DBAs life easier? How does the DCS stack up to other solutions?

More information

IBM WebSphere Business Monitor V6.0.2 adds productivity enhancements

IBM WebSphere Business Monitor V6.0.2 adds productivity enhancements Software Announcement October 10, 2006 IBM WebSphere Business Monitor V6.0.2 adds productivity enhancements Overview IBM WebSphere Business Monitor lets you monitor business events in real-time by providing

More information

KVM / QEMU Storage Stack Performance Discussion

KVM / QEMU Storage Stack Performance Discussion 2010 Linux Plumbers Conference KVM / QEMU Storage Stack Performance Discussion Speakers: Khoa Huynh khoa@us.ibm.com Stefan Hajnoczi stefan.hajnoczi@uk.ibm.com IBM Linux Technology Center 2010 IBM Corporation

More information

1.1 Create a New Survey: Getting Started. To create a new survey, you can use one of two methods: a) Click Author on the navigation bar.

1.1 Create a New Survey: Getting Started. To create a new survey, you can use one of two methods: a) Click Author on the navigation bar. 1. Survey Authoring Section 1 of this User Guide provides step-by-step instructions on how to author your survey. Surveys can be created using questions and response choices you develop; copying content

More information

The Modern Mainframe At the Heart of Your Business

The Modern Mainframe At the Heart of Your Business The Modern Mainframe At the Heart of Your Business IT Service Management Service Oriented Finance Needs to Satisfy Service Levels For Their Critical Applications I must make sure to meet my service levels.

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Enhancing applications with Cognitive APIs IBM Corporation

Enhancing applications with Cognitive APIs IBM Corporation Enhancing applications with Cognitive APIs After you complete this section, you should understand: The Watson Developer Cloud offerings and APIs The benefits of commonly used Cognitive services 2 Watson

More information

1.1 February B

1.1 February B RELEASE NOTES 1.1 February 2019 3725-61900-001B Polycom Companion Polycom announces the release of the Polycom Companion software version 1.1. This document includes the latest information about new and

More information

Cybersecurity Essentials

Cybersecurity Essentials Cybersecurity Essentials University of Moratuwa Cisco Networking Center Cybersecurity Essentials Foundational Security Course Overview Cybersecurity Essentials covers foundational knowledge and essential

More information

White Paper. View cyber and mission-critical data in one dashboard

White Paper. View cyber and mission-critical data in one dashboard View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland

More information

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009 Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009

More information

Demystifying GRC. Abstract

Demystifying GRC. Abstract White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

DISCOVERY. Thuraya SatSleeve Expand your iphone s horizons

DISCOVERY. Thuraya SatSleeve Expand your iphone s horizons DISCOVERY telecom Thuraya SatSleeve Expand your iphone s horizons The perfect blend of mobility and simplicity, the Thuraya SatSleeve is the smartest, fastest and simplest way to transform your iphone

More information