Analysis Item 33: Department of Administrative Services Information Technology Procurement Management Program

Size: px
Start display at page:

Download "Analysis Item 33: Department of Administrative Services Information Technology Procurement Management Program"

Transcription

1 Analysis Item 33: Department of Administrative Services Information Technology Procurement Management Program Analyst: Paul Siebert Request: Acknowledge receipt of a report on the status of the information technology procurement management program. Recommendation: Acknowledge receipt of the report. Analysis: SB 5701 (2016) approved a number of budget adjustments related to a multi-part reorganization of the Department of Administrative Services (DAS) and the Oregon State Chief Information Officer (OSCIO) involving the state s information technology (IT) related functions. As part of the IT reorganization, a new structure was proposed for IT procurement and vendor management with dual responsibility between DAS Enterprise Goods and Services and OSCIO. This new structure was reviewed by the Joint Committee on Ways and Means as well as the Joint Legislative Committee on Information Management and Technology (JLCIMT). The JLCIMT recommended approval of the procurement process for the remainder of the biennium with direction that a joint status report on the IT vendor management program be made to the Emergency Board and JLCIMT during the December 2016 Legislative Days. OSCIO reports that its Vendor Management team continues to partner with DAS Procurement Services through a hybrid model where DAS, as required by statute, continues to retain authority over competitive bidding and contract negotiations functions of IT procurement for the state. Due to concerns expressed by the Legislative Fiscal Office of bifurcating IT procurement, vendor management, and oversight between OSCIO and DAS, the agencies were directed to identify and evaluate alternative models for IT procurement used in other states. While this assessment was not completed in time for this report, OSCIO will be reporting the results of this assessment to the JLCIMT during its December 12, 2016 meeting. The Legislative Fiscal Office recommends acknowledging receipt of the report. Legislative Fiscal Office Emergency Board December 2016

2 33 Department of Administrative Services Heath Request: Report on the Office of the State Chief Information Officer s IT Vendor Management initiative. Recommendation: Acknowledge receipt of the report. Discussion: The Office of the State Chief Information Officer (OSCIO) is reporting on its IT Vendor Management strategy in accordance with a request from the Joint Legislative Committee on Information Management and Technology (JLCIMT) in the February 2016 Session to jointly present the assessment report and status report on IT vendor management program progress to the Joint Legislative Committee on Information Management and Technology and the Emergency Board during the December 2016 Legislative Days. Assessment Report: Based on OSCIO s review of the literature and comparison with other states, there does not appear to be a clear industry best practice or standard with regard to where ultimate responsibility for managing information technology procurements should reside. Based on a survey, six states leave this responsibility to their central purchasing office, 29 states have some degree of overlap in responsibilities between central purchasing offices and their chief information officer, and 14 states have the chief information officer as the lead procurement agency for IT procurements. For a survey conducted by the OSCIO, the 13 respondents varied widely in terms of budget, staff, and responsibility dedicated to managing IT procurements. Status Report: In order to implement the Basecamp model of IT Vendor Management, OSCIO has hired three Strategic Sourcing Specialists (at the same time, DAS Procurement has added 4 positions to their IT team). The team has: established a grading criteria and tool for enterprise IT investments, mapped roles and responsibilities in the procurement process, developed performance measures for future IT projects, reached out to state agencies, local governments, and the vendor community, developed a website to promote the Basecamp contracts, linked Basecamp to the state s existing purchasing system (ORPIN), and promoted Basecamp through other channels, including lists and Strategic Technology Officers. The staff for this project were approved as limited duration during the biennium. The Governor s Recommended Budget keeps two positions in OSCIO and four positions in Enterprise Goods and Services Procurement as permanent, full-time positions to manage this new function. As this letter was also addressed to the Joint Legislative Committee on Information Management and Technology, the letter covers a number of other topics that the OSCIO is currently working on, including an update on the implementation of Executive Order 16-13, which unifies the state s cybersecurity under the OSCIO, the status of the Oracle settlement, and progress being made in implementing House Bill 3099, which established separate statutory authority for the Chief Information Officer. Department of Administrative Services 33-i December 14, 2016

3 Kate Brown, Governor Department of Administrative Services DAS Business Services 155 Cottage Street NE Salem, OR PHONE: FAX: The Honorable Senator Peter Courtney, Co-Chair The Honorable Representative Tina Kotek, Co-Chair State Emergency Board 900 Court Street NE H-178 State Capitol Salem, OR RE: The Office of the State CIO s Request to Report to the Joint Legislative Committee on Information Management and Technology (JLCIMT) on the Status of Current Initiatives Dear Co-Chairpersons: The Office of the State CIO (OSCIO) respectfully requests that the JLCIMT acknowledge receipt of a report on the following initiatives: Executive Order (EO 16-13), Unifying Cyber Security in Oregon. Report on status of EO implementation and transfer of information technology (IT) security staffing functions. Oracle Settlement. Provide settlement overview and report on agency use and/or evaluation of products contained under within the unlimited deployment agreement (ULA). IT Vendor Management. Report on implementation status of joint-information technology (IT) strategic sourcing group, and assessment of alternative state IT procurement organizational/operational models in used by other states throughout the nation. HB 3099 Implementation. Report on agency compliance with statewide IT policies, rules and standards; the results of a biannual market analysis of the state data center; and the status of recommended enterprise or shared information systems. Executive Order 16-13, Unifying Cyber Security in Oregon The OSCIO is currently working to implement the transfer of cybersecurity staffing functions into our Office from across the Executive department pursuant to the Governor Kate Brown s Executive Order No (EO 16-13), Unifying Cyber Security in Oregon. Recent IT security breaches, persistent vulnerabilities, non-compliance with IT security-related OARs and statute and the anticipated audit findings from a statewide IT security audit demonstrate that the current decentralized model for IT security needs to improve drastically. In some agencies, there are fundamental capacity gaps and a legacy of disinvestment. More executive support for cybersecurity is needed. More problematic however is the asymmetric nature of IT security risk, where the vulnerabilities of smaller and under-resourced agencies put larger state agencies and local governments at risk; e.g., the breach at the Construction Contractor s Board which made the Oregon Department of Transportation and Multnomah County vulnerable (among others). EO is the first step in addressing these persistent IT security vulnerabilities. It applies to agencies within the Executive department, as defined in ORS but excluding the Secretary of State, State Treasurer, Attorney General, Bureau of Labor and Industries, State Lottery, and public universities. EO requires the OSCIO to conduct the following activities:

4 Page 2 Unify information technology (IT) security functions and personnel within the Executive department and bring them under the direction of our Office; Conduct a statewide agency-by-agency risk-based security assessment and remediation program; Conduct and document the completion of (IT) security awareness training by all state employees; and Establish and track security metrics for all agencies within the Executive department. In furtherance of EO 16-13, our Office has worked with the DAS Chief Human Resource Office and the Department of Justice to develop an Interagency Agreement that will facilitate the transfer of IT security functions and personnel from November 1, 2016 until June 30, Additionally, our Office has initiated a statewide IT security survey, initiated public procurements to obtain thirdparty risk assessments and security awareness training. The IT security survey data and third-party risk assessments will inform the development of an Enterprise Risk Report in the coming months that will be provided both to you, the Governor and Legislative Leadership. Furthermore, our Office is seeking to introduce a legislative concept (LC) that would make the unification of cybersecurity in Oregon permanent and establish a Cybersecurity Center of Excellence (CCoE) through partnerships with the private sector and universities. The CCoE would provide a public-private state-civilian interface for information sharing, coordination of cyber incident response, development of a statewide cyber strategy, identification of best practices and to further the development of the cyber-security workforce in Oregon. The LC would also establish a Cybersecurity Fund within the CCoE, and enable it to accept federal and grant funds and enter into public-private partnerships. The position of our Office is that the State of Oregon should transition from a decentralized and diffused cybersecurity model to a unified model that will bring all IT security functions into a single organization directly accountable for the security of agency and state data center operations, realtime security monitoring and incident response, implementation of enterprise security policy and enterprise security architecture. Furthermore, the establishment of a CCoE, would enable the state to draw on the expertise and capabilities of the private sector and develop a long-term multi-sector cyber strategy for preventing future threats, responding to cyber disruptions and building capacity across the state and with our local government partners and school districts. Oracle Settlement The state of Oregon s settlement with Oracle included both cash and in-kind elements ending protracted litigation that had already cost the state nearly $25 million, providing $10 million in grant funding to support Science, Technology, Engineering and Math (STEM) initiatives within K-12 through the Oregon Community Foundation and providing the State of Oregon a unique opportunity to upgrade many of its business capabilities through a 5-year and 10-month unlimited license agreement (ULA) and customer support services valued at over $65 million. While the ULA certainly provides the Oregon Legislature a way to save a significant portion of the estimated $500 million it would take to modernize Oregon s business capabilities, the decision as to whether or not to implement any of the more than 200 product components available is ultimately a business decision. It is also worth noting that the ULA represents a substantial subset of the Oracle catalog and includes: Customer Relationship Management (CRM) Procurement (Supply Chain Management)

5 Page 3 Asset Management Financials Human Capital Management (HCM) Enterprise Learning Management Business Intelligence Database Data Integration Middleware Security And a variety of Development, Application and Portfolio Tools While the ultimate value of the ULA will be determined by what the state of Oregon is capable of implementing over the next five-years, the ULA represents a major opportunity in terms of cost avoidance. A 10-year modernization plan prepared by KPMG estimated that the state would need to spend between $ million to implement a fraction of the software contained in the ULA. Furthermore, repositioning current in-flight projects to take advantage of the ULA could result in substantial cost avoidance. That said, it will require legislative action to realize the in-kind value of the settlement. Though the ULA represents a major opportunity for the state of Oregon, it will require a substantial investment to realize its value. Beyond new business capabilities, the ULA will enable the state of Oregon to upgrade and enhance its existing Oracle base. Many of the programs and services our citizens rely on were developed on the Oracle platform. The Oregon Legislative Information System (OLIS), Medicaid Management and Information System (MMIS) and the Oregon Election System and Tracking and Reporting System (ORESTAR) are just a few examples of systems that rely on Oracle. Going forward, our first priority will be the identification of opportunities to upgrade our existing Oracle portfolio. This uplift will not only enhance existing capabilities, it will also improve the security posture of the state by moving agencies off of long-unsupported database platforms preventing the type of breach that occurred at the Construction Contractors Board earlier this year. Notwithstanding the potential value of the ULA, the OSCIO is and remains committed to working with agency business leads through the Stage Gate process as they evaluate the appropriateness and feasibility of implementing products contained in the ULA. After agencies have identified their business requirements for a particular IT initiative, they will be required to evaluate products contained in the ULA as part of the alternatives analysis in their detailed business case (as currently required for Stage 2 endorsement) considering benefits, costs, and risk. In addition to a detailed business case, agencies will be required to conduct an Enterprise Fit-Gap analysis that considers products currently available within the enterprise IT portfolio, including the ULA, existing statewide agreements and current systems in production. In conducting the analysis, agencies will be asked to evaluate each of their business requirements and makes one of three determinations: 1. Fulfills with configuration. Products within the enterprise IT portfolio fulfill the business requirement with configuration. 2. Development required. Products within the enterprise IT portfolio fulfill the business requirement with development tools that do not sacrifice the ability to upgrade the system; i.e., still commercial off the shelf (COTS). 3. Customization required. Products within the enterprise IT portfolio fulfill the business requirement but the extent of modifications required would eliminate future upgrade paths.

6 Page 4 As for the being able to access the ULA itself, our Office is currently working with the Department of Justice (DOJ) and DAS Procurement Services to develop an onboarding procedure for agencies to take advantage of the available products. Before agencies can take advantage of the ULA, they will need to work with our office, the DOJ and DAS Procurement Services. As part of the onboarding, each agency will be required to sign the ULA, enter into an interagency agreement with DAS, and commit to conducting periodic inventories as well as certifying the deployment of all Oracle products deployed at the end of the ULA. IT Vendor Management The IT vendor management program was established to develop IT supply chain management capabilities, shared service models, oversight for long-term strategic vendor relationships and to support the Basecamp initiative. Basecamp aims to provide a one-stop shopping portal and IT roadmap for state agencies, local government affiliates and school districts alike, allowing them to quickly identify and efficiently contract trusted IT goods and services. The goal is to ensure our partners are able to focus on what matters most investing in programs that better serve Oregon residents. Basecamp is being built upon a comprehensive and cohesive technology architecture that ensures interoperability, while minimizing cost and disruption to current systems (i.e., a technology reference model) i.e., products that are tried, trusted, verified and secure. Basecamp aims to optimize IT spending and drive enterprise cloud deployment by leveraging statewide purchasing power, reducing IT application and infrastructure complexity and providing a single point reference for legacy, core and leading technology in the state of Oregon. To implement the Basecamp initiative, the vendor management team continues to partner with DAS Procurement Services through what could be characterized as a hybrid model where DAS Procurement Services continues to retain authority over the competitive bidding and contract negotiation side of IT procurement (as required under statute). While there was strong support for the intent of program, it only received conditional, temporary approval for additional limitation and limited duration positions due to concern over the splitting of state IT procurement, vendor management, and oversight between DAS EGS Procurement Services and OSICO (JLCIMT Recommendation to General Government Subcommittee, February 12, 2016). The JLCIMT recommendations further provided the following: The Joint Legislative Committee on Information Management and Technology (JLCIMT) recommends conditional, temporary approval of the request for the remainder of the biennium assuming the funding, spending authority, and personnel resources are made available to the Department of Administrative Services (DAS) and the Office of the State Chief Information Officer (OSCIO) by the Joint Committee on Ways and Means. Specifically, the JLCIMT recommends that DAS and OSCIO: Conduct an assessment to identify and evaluate the alternative State IT procurement related organizational/operating models in use by other states across the nation. The assessment report should provide the raw findings and include (but not be limited to) the roles, responsibilities, accountability, staffing levels, and costs associated with: o The most predominant organizational/operating models in use across the nation as compared to the shared IT vendor management program proposed within this request. o A full transfer of state IT procurement duties, functions, and powers from DAS and the DAS Director to the State Chief Information Officer.

7 Page 5 Submit the assessment report and a status report on IT vendor management program progress to date to the Legislative Fiscal Office in November Jointly present the assessment report and status report on IT vendor management program progress to the Joint Legislative Committee on Information Management and Technology and the Emergency Board during the December 2016 Legislative Days. In response to the JLCIMT recommendation, the OSCIO conducted a national survey of State CIOs and State Procurement Officers. Informed by research on best practices within IT procurement, the survey sought detailed information on the roles, responsibilities, accountability, staffing levels and costs associated with the alternative organizational or operating models throughout the country. The IT assessment report and its findings are still under development and will be submitted to the JLCIMT by November 28, 2016 along with the associated raw findings from the survey. While the survey responses were limited to 13 states, our Office has worked to augment these findings through additional research and document review; e.g., review of similar surveys conducted by the National Association of Procurement Officers and National Association of Chief Information Officers. HB 3099 Implementation As we all know, changing citizen expectations coupled with the failed launch of CoverOregon have increased legislative interest in state IT oversight and service delivery reflected in the passage of HB 3099 (Chapter 807, Oregon Laws 2015) which became fully operative on January 1, Among its many provisions, HB 3099 also directed our Office to conduct several biennial assessments, including: a review of state agencies compliance with the OSCIO s rules, policies and standards; a market analysis of the state data center; and recommendations regarding the establishment of new shared and utility services. Pursuant to ORS (4)(a) our Office will continue to report these findings to the Governor and JLCIMT. OSCIO Statewide IT Survey In support of these reporting requirements, our Office conducted a statewide survey focused on IT asset management with an emphasis on IT infrastructure and IT personnel. These themes were underscored in a memorandum from JCLIMT memorandum, dated February 11, 2016, that specifically identified the following concerns: Apparent or actual agency non-compliance with IT-related statutes, State CIO rules and policies, or stated expectations related to IT Investment Review and Approval and Information Security, and the need for the Office of the State CIO to establish rules, policies, and standards related to IT procurement. (Note: ORS Penalties - is an available remedy) The need to assess and determine how to best reorganize and stabilize the Enterprise Technology Services unit s Service Catalog and associated rates, while incorporating managed services (e.g., the statewide voice services contract) and brokered cloud services (e.g., Infrastructure as a Service - IaaS) offerings into the mix of services that the Office of the State CIO provides to state agencies and other customer organizations. The current distribution/decentralization of responsibility and accountability for information security across the enterprise. Agencies that currently utilize, maintain, support, and who are considering the submission of budget requests to sustain or enhance their own computer rooms (small data centers) at their agency s.

8 Page 6 Unlike previous assessment and benchmarking efforts, such as the 2012 Hackett Group study, the intent of the survey was to capture the current state of IT from the vantage point of a typical agency CIO. In adopting this stance, we hoped to reduce the reporting burden and gain greater insight into the opportunities and challenges faced by the IT organizations within each agency. A high-level overview of statewide IT survey and associated raw findings will be submitted to the JLCIMT by November 28, Additionally, the findings of the survey will continue to inform the development of policy area Information Resource Management (IRM) plans. The policy area IRM plans will build on agency IT strategic plans and proposed project portfolios for and align with the Governors initiatives. The policy-area IRM plans will be presented during the 2017 Legislative Session. Utility and Shared Services With respect to recommendations for shared or utility services, the case of is illustrative of the challenges associated with establishing the capacity to offer a centrally provisioned service under a voluntary adoption model there has been discussion about standardizing onto a single system for more than a decade. At present the state of Oregon currently operates 39 separate s system for 65 agencies and 53,594 separate user accounts, down from the 54 systems that were being operated just a few years ago. In large measure, this reduction was facilitated by the establishment of the Enterprise service offering from ETS, which currently serves 10,235 using Microsoft Exchange. While this represents a substantial reduction in the overall number of systems, the Enterprise system was original scoped to accommodate up to 20,000 users and has operated at a loss since it was established requiring three dedicated positions, professional services, hardware, software and licensing. Given that the cloud-version of Office 365 will soon be available to state agencies, the ETS service offering will likely never reach full capacity. Given this financial reality, our Office is currently evaluating the feasibility and potential timing of a pivot towards a cloud-based service. However, such a transition would have important financial implications. Under the current model, ETS owns its Microsoft licenses in perpetuity and can defer maintenance on hardware and reduce professional services costs; e.g., eliminating Microsoft Premier Support (training and technical assistance). Under a cloud-based subscription model, services become a fixed cost and there is no budgetary flexibility if you don t pay Microsoft you no longer have . Furthermore, absent a coordinated pivot towards cloud-based services, the state of Oregon will end up paying higher prices per user as each agency negotiates individual pricing agreements. Similar to , the challenges associated with centrally provisioning a service can be extended to the state data center (SDC) itself albeit, with far higher fixed costs. Regardless of how many agencies choose to use the SDC, the fixed costs remain the same. With the current rate methodology, many of these fixed costs are embedded within the rates for individual lines of service. Embedded fix costs coupled with an opt-in service model create have created a vicious cycle, wherein the rates of the SDC will never be competitive with similar services that are widely available within the private sector. Consequently, the SDC will increasingly become the service provider of last resort supporting end-of-life legacy systems that cannot obtain services in the private market.

9 Page 7 Furthermore, under the current model service rates are based on utilization estimates that attempt to forecast demand three to four years in advance invariably, underestimating and overestimating the demand for particular services. When the SDC underestimates demand it may end up overcollecting and be required to pay a refund (e.g., the refund to DHS/OHA for network loadbalancing). Contrarily, the SDC may overestimate demand and be forced to absorb the costs. These challenges are further compounded by the inability to utilize existing floor space due to power limitations. In order to limit initial capital outlay, the design of the SDC facility was such that the core mechanical infrastructure (generators, electrical switchgear, cooling infrastructure) of the building was only deployed at 50 percent of its total capability, with the intent to double that capacity to accommodate increasing demand. Absent additional data center capacity, IT infrastructure will either need to remain within existing agency facilities or relocated using thirdparty data center space using brokered agreements underutilizing the capabilities of the state s own purpose built data center. Given our ability to broker these services and maturity of cloud-service offerings, there are increasing opportunities to transition core business functions such as human resources (HR) to software-as-a-service models. However, just as with there are major financial implications in terms of transitioning capital expenses into operating expenses we lose whatever budgetary flexibility we now have and surrender control over our systems of record. Fundamentally, our state s leadership needs to determine the path forward. Do we optimize the existing the capabilities of the state data center or do we simultaneously embrace a pivot towards the cloud while becoming the service provider of last resort. Market Analysis of the State Data Center In fulfilling the biannual requirement to submit a market analysis of the State Data Center, our Office is working with Gartner Consulting and their benchmarking team. The assessment will review the current ETS service portfolio, provide benchmarking against peer states and private infrastructure providers, evaluate the service model in light of industry best practices, evaluate alternative service options and develop recommendations. The data center market analysis and assessment will be submitted to the JLCIMT by November 28, Sincerely, Alex Z. Pettit, Ph.D. Chief Information Officer Cc: Paul Siebert, Legislative Fiscal Office Sean, McSpaden, Legislative Fiscal Office Ken Rocco, Legislative Fiscal Office Patrick Heath, Chief Financial Office

Oregon Legislative Fiscal Office. Presenters: Date:

Oregon Legislative Fiscal Office. Presenters: Date: Oregon Legislative Fiscal Office NCSL Cybersecurity Task Force Meeting April 21, 2017 Presenters: Date: Sean McSpaden Principle Legislative IT Analyst & JLCIMT Committee Administrator Presentation April

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

Oregon Fire Service Conference Enterprise Security Office Update. October 26, 2018

Oregon Fire Service Conference Enterprise Security Office Update. October 26, 2018 Oregon Fire Service Conference Enterprise Security Office Update October 26, 2018 2 State CIO Update Terrence Woods Interim State CIO Slide presented at August OAGTIM 3 Information Security Unify cybersecurity

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

1997 Minna Laws Chap. February 1, The Honorable Jesse Ventura Governor 130 State Capitol Building

1997 Minna Laws Chap. February 1, The Honorable Jesse Ventura Governor 130 State Capitol Building This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp Department of Administration

More information

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets. REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January

More information

Department of Administrative Services - Phase II Ways & Means Subcommittee on General Government

Department of Administrative Services - Phase II Ways & Means Subcommittee on General Government Department of Administrative Services - Phase II Ways & Means Subcommittee on General Government April 29 & 30, 2013 Overview of DAS Phase II Agenda 1. Review GBB Policy Packages 2. Review current vacancy

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

SB 90 (2017) Implementation Update. JLCIMT. 14 November 2017

SB 90 (2017) Implementation Update. JLCIMT. 14 November 2017 SB 90 (2017) Implementation Update. JLCIMT 14 November 2017 Oregon Security Risk Landscape IT ecosystem and vulnerability awareness and risk-based governance 2 Enterprise Security Strategic Roadmap 2017-19

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

NC Education Cloud Feasibility Report

NC Education Cloud Feasibility Report 1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most

More information

Turning Risk into Advantage

Turning Risk into Advantage Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview

More information

SUBJECT: PRESTO operating agreement renewal update. Committee of the Whole. Transit Department. Recommendation: Purpose: Page 1 of Report TR-01-17

SUBJECT: PRESTO operating agreement renewal update. Committee of the Whole. Transit Department. Recommendation: Purpose: Page 1 of Report TR-01-17 Page 1 of Report TR-01-17 SUBJECT: PRESTO operating agreement renewal update TO: FROM: Committee of the Whole Transit Department Report Number: TR-01-17 Wards Affected: All File Numbers: 465-12, 770-11

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

Enterprise Information Resource Management Strategy (EIRM) Accountable, Customer-centered, Collaborative and Innovative.

Enterprise Information Resource Management Strategy (EIRM) Accountable, Customer-centered, Collaborative and Innovative. 155 Cottage St., Salem, OR Tel 503.378.3175 Fax 503.378.3795 www.oregon.gov/das/oscio Enterprise Information Resource Management Strategy (EIRM) 2017-2022 February 2018 Accountable, Customer-centered,

More information

Executive Summary and Overview

Executive Summary and Overview A Cross-Sector Capabilities, Resources, and Needs Assessment: Research to Support the Drafting of the Oregon Cybersecurity Center of Excellence Proposal Executive Summary and Overview Updated April 2018

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Florida Board of Governors General Office Legislative Budget Request

Florida Board of Governors General Office Legislative Budget Request Florida Board of Governors General Office 2018-2019 Legislative Budget Request Funding of $9.16 million is needed to support the 65 authorized positions and associated operating expense for the Board Office.

More information

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Overview of Sustainability and Environmental Programs Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Mission DHS Organization Getting to Know DHS Mission: Secure

More information

Kentucky IT Consolidation

Kentucky IT Consolidation 2007 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Consolidation Commonwealth Office of Technology The Commonwealth of Kentucky is nearing completion of

More information

Oregon Climate Authority (SB928)

Oregon Climate Authority (SB928) Oregon Climate Authority (SB928) Jason Miner, Director, Governor s Natural Resources Office Office of Governor Kate Brown April 8, 2019 4/8/2019 Oregon Climate Authority 1 Contents 1. Functions: current

More information

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards November 2016 COMMENTARY Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards The Board of Governors of the Federal Reserve System ( Federal Reserve Board ), the Federal Deposit Insurance

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

12 Approval of a New PRESTO Agreement Between York Region and Metrolinx

12 Approval of a New PRESTO Agreement Between York Region and Metrolinx Clause 12 in Report No. 7 of Committee of the Whole was adopted, without amendment, by the Council of The Regional Municipality of York at its meeting held on April 20, 2017. 12 Approval of a New PRESTO

More information

INFORMATION TECHNOLOGY CYBERSECURITY CLOUD COMPUTING

INFORMATION TECHNOLOGY CYBERSECURITY CLOUD COMPUTING INFORMATION TECHNOLOGY CYBERSECURITY CLOUD COMPUTING PRESENTED TO HOUSE APPROPRIATIONS COMMITTEE LEGISLATIVE BUDGET BOARD STAFF APRIL 2018 Statement of Interim Charge Monitor the ongoing implementation

More information

response to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013

response to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013 Description of document: Department of Justice (DOJ) Inspector General (OIG) response to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013 Released date:

More information

AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE

AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE Agenda Report TO: FROM: SUBJECT: Honorable Mayor and City Council Department of Information Technology AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

The Deloitte-NASCIO Cybersecurity Study Insights from

The Deloitte-NASCIO Cybersecurity Study Insights from The Deloitte-NASCIO Cybersecurity Study Insights from 2010-2016 August 21, 2018 Srini Subramanian State Government Sector Leader Deloitte Erik Avakian CISO Pennsylvania Michael Roling CISO Missouri Meredith

More information

Criminal Case Information System for Public Defenders [Section 18B.10 of S. L , as amended by Section 18A.2 of S.L.

Criminal Case Information System for Public Defenders [Section 18B.10 of S. L , as amended by Section 18A.2 of S.L. Criminal Case Information System for Public Defenders [Section 18B.10 of S. L. 2013-360, as amended by Section 18A.2 of S.L. 2014-100] Technology Services Division July 1, 2015 Introduction Section 18B.10

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

SCOTTISH PARLIAMENT WEB AND ONLINE ROADMAP PROJECT (INCLUDING DEVELOPING A NEW IMPROVED WEBSITE PRESENCE FOR THE SCOTTISH PARLIAMENT)

SCOTTISH PARLIAMENT WEB AND ONLINE ROADMAP PROJECT (INCLUDING DEVELOPING A NEW IMPROVED WEBSITE PRESENCE FOR THE SCOTTISH PARLIAMENT) SPCB(2018)Paper 37 3 May 2018 SCOTTISH PARLIAMENT WEB AND ONLINE ROADMAP PROJECT (INCLUDING DEVELOPING A NEW IMPROVED WEBSITE PRESENCE FOR THE SCOTTISH PARLIAMENT) Executive summary 1. The paper has been

More information

Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report. Status of Actions Recommended # of Actions Recommended

Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report. Status of Actions Recommended # of Actions Recommended Chapter 3 Section 3.05 Metrolinx Regional Transportation Planning Standing Committee on Public Accounts Follow-Up on Section 4.08, 2014 Annual Report In November 2015, the Standing Committee on Public

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

State of Florida uses the power of technology to accomplish objectives. Sprint provides state-of-the-art voice and data solutions

State of Florida uses the power of technology to accomplish objectives. Sprint provides state-of-the-art voice and data solutions Case Study State of Florida uses the power of technology to accomplish objectives Sprint provides state-of-the-art voice and data solutions A look inside the State of Florida government Through recent

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Review of the Feasibility Plan for Coordinating Operations of the North Carolina Research and Education Network and the State Network Infrastructure

Review of the Feasibility Plan for Coordinating Operations of the North Carolina Research and Education Network and the State Network Infrastructure Review of the Feasibility Plan for Coordinating Operations of the North Carolina Research and Education Network and the State Network Infrastructure Final Report to the Joint Legislative Program Evaluation

More information

REPORT Bill Bradbury, Secretary of State Cathy Pollino, Director, Audits Division

REPORT Bill Bradbury, Secretary of State Cathy Pollino, Director, Audits Division Secretary of State Report No. 2003-20 June 3, 2003 AUDIT Department of Administrative Services Information Resources Management Division Follow Up REPORT Bill Bradbury, Secretary of State Cathy Pollino,

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

How Switching to the Cloud Drives Employee and Agency Growth

How Switching to the Cloud Drives Employee and Agency Growth State & Local Government How Switching to the Cloud Drives Employee and Agency Growth Switching to the Cloud Is Top Priority for State CIOs According to the National Association of State Chief Information

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

State of South Carolina Interim Security Assessment

State of South Carolina Interim Security Assessment State of South Carolina Interim Security Assessment Deloitte & Touche LLP Date: October 28, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

FROM TACTIC TO STRATEGY:

FROM TACTIC TO STRATEGY: FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix

More information

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0 P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

MN.IT Services and MNsure

MN.IT Services and MNsure INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT MN.IT Services and MNsure Presentation to Mnsure Executive Board State CIO Carolyn Parnell June 26, 2013 July 2005: Office of Enterprise Technology created.

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Office of Acquisition Program Management (OAPM)

Office of Acquisition Program Management (OAPM) Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group

More information

W&M General Government. Budget Overview. 16 February 2017

W&M General Government. Budget Overview. 16 February 2017 W&M General Government. Budget Overview 16 February 2017 OSCIO Vision. Enabling state agencies and partner jurisdictions to better serve Oregonians through enterprise technology solutions. OSCIO Mission.

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

Guidance for Exchange and Medicaid Information Technology (IT) Systems

Guidance for Exchange and Medicaid Information Technology (IT) Systems Department of Health and Human Services Office of Consumer Information and Insurance Oversight Centers for Medicare & Medicaid Services Guidance for Exchange and Medicaid Information Technology (IT) Systems

More information

CABINET PLANNING SYSTEM PROCUREMENT

CABINET PLANNING SYSTEM PROCUREMENT Report No: 163/2017 PUBLIC REPORT CABINET 19 September 2017 PLANNING SYSTEM PROCUREMENT Report of the Director for Places (Development & Economy) Strategic Aim: Sustainable Growth Key Decision: Yes Exempt

More information

U.S. Department of Homeland Security Office of Cybersecurity & Communications

U.S. Department of Homeland Security Office of Cybersecurity & Communications U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure

More information

FDIC InTREx What Documentation Are You Expected to Have?

FDIC InTREx What Documentation Are You Expected to Have? FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the

More information

Treasury IT Overview February 14, 2019

Treasury IT Overview February 14, 2019 Treasury IT Overview February 14, 2019 Joint Legislative Committee on Information Management and Technology Our Way is Forward Vision Statement Leading the way for Oregonians to achieve long-term financial

More information

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

Competency Definition

Competency Definition Adult Children's Outreach Technical Teen Acquisition Adaptability The ability to effectively process library material orders; knowledge of vendor software, processes, products, and updates x x The ability

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

ART CENTER AND SATELLITE PLANT

ART CENTER AND SATELLITE PLANT CSU The California State University Office of Audit and Advisory Services CONSTRUCTION California State University, Bakersfield ART CENTER AND SATELLITE PLANT Audit Report 15-09 May 7, 2015 EXECUTIVE SUMMARY

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

Small Towns, Big Tech

Small Towns, Big Tech A Question for Attendees Small Towns, Big Tech What comes to mind when you reflect on the topic for this session? Employees and constituents are increasing the demand for IT resources in state and local

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

AVOIDING HIGH ORACLE DBMS COSTS WITH EDB POSTGRES

AVOIDING HIGH ORACLE DBMS COSTS WITH EDB POSTGRES AVOIDING HIGH ORACLE DBMS COSTS WITH EDB POSTGRES An EDB White Paper For CIOs and IT Directors December 2015 TABLE OF CONTENTS 03 03 03 05 07 07 08 08 09 INTRODUCTION POSTGRES THE WORLD S MOST ADVANCED

More information

Federal Data Center Consolidation Initiative (FDCCI) Workshop III: Final Data Center Consolidation Plan

Federal Data Center Consolidation Initiative (FDCCI) Workshop III: Final Data Center Consolidation Plan Federal Data Center Consolidation Initiative (FDCCI) Workshop III: Final Data Center Consolidation Plan August 10, 2010 FDCCI Agenda August 10 th, 2010 1. Welcome Katie Lewin GSA Director Cloud Computing

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information