SlideShare uma empresa Scribd logo
1 de 52
CIO’s Guide to Risk Management
Agenda


•   Introductions
•   IT Management Basics
•   IT Risk Management
•   Managing Application Support Risks
•   Application Management Case Study
•   Managing Project Risks
Introductions
           Agenda
Computer Aid, Inc
•   30 Years in IT Consulting Services Business
•   Privately Held Entrepreneurial Organization
•   3,000 Associates Worldwide
•   $300 Plus Million in Revenue in 2011
•   Offices in 34 U.S. Metropolitan Areas
•   Global offices in Toronto, London, Sydney, and
    Kuwait, Singapore
•   Off-shore delivery: Philippines, China, Argentina,
    Ethiopia, and India
•   Headquarters: Allentown, Pa.
CAI Managed Services
• Application Support Outsourcing
  –   Assume full responsibility for support
  –   Fixed Price
  –   Service Level Commitments
  –   Continuous Improvement Commitments

• Application Development
  – Fixed Price Proposals
  – On-Time, On-Budget, High Quality, Warranty

• Help Desk Outsourcing
  – Service Level Commitments
  – Fixed Price
CAI Clients
Manufacturing                                             Government




Retail          Financials   Transportation / Logistics




Services
                                                          Education

Insurance                     Utilities
Agenda


•   Introductions
•   IT Management Basics
•   IT Risk Management
•   Managing Application Support Risks
•   Application Management Case Study
•   Managing Project Risks
IT Management
    Basics
What is the mission of IT?
 Deliver the Information Processing
Capability required by the business at
     a cost that represents value
IT Services
• Implement, operate, and support
   – Infrastructure (servers, mainframes, networks)
   – System software and Tools
      •   Operating Systems
      •   Data Query and Reporting
      •   E-mail and Internet Access
      •   Application design, development, and support tools
• Design, build/purchase, install, operate and support
  application software to support the business
• Store, protect and provide secure access to business
  information
• Provide consulting services to the business
Dimensions of IT Management
• Strategy and Business Alignment
   –   Strategic Planning: Management Vision, Philosophy, and Objectives
   –   Business Planning: Identify Business Needs
   –   Portfolio Management: Initiate and prioritize projects
   –   Budgeting: Authorize with budgets and funding
• IT Services
   –   Technology Architecture: Languages, DBMS, Network
   –   Infrastructure Operation: Operations Processes
   –   Application Development: SDLC, Project Management, Standards
   –   User Support and Services: Help Desk, SLA’s
• Administration and Control
   – Human Resource Management: HR Policies, Training
   – Supplier Management: Purchasing
Dimensions of Project
        Management
•   Cost       •   Integration
•   Schedule   •   Communication
•   Scope      •   Human Resources
•   Quality    •   Procurement
•   Risk       •   Methodology
Dimensions of Operations &
   Support Management
  •   Reliability
  •   Availability
  •   Capability
  •   Timely
  •   Responsive/Performance
  •   Flexibility/Adaptability
IT Risk
Management
What is an IT Risk?

The possibility that IT will not be able
  to deliver the required capability
SEI Service CMMI
• Identify the “Commitment to Deliver”
• Establish the “Ability to Deliver”
• Deliver

Note: Risk identification and mitigation are ongoing
activities … requirements change which results in
new commitments.
Risk Management Impact on Project Success
Risk Management (NASA)
•   Identify - scenarios for failure
•   Analyse - likelihood and consequence of failure
•   Plan - actions required to track and control risks
•   Track - program performance against plan
•   Control - risk issues and verify effectiveness
•   Communicate and Document
Identify & Analyse Risks
• Strategic
  – Does the business strategic plan address information
    processing capabilities?
  – Is there a reasonable budget?
  – Does the Information Processing strategy directly link
    to business goals and objectives?
Identify & Analyse Risks
• Service Management Processes
  – Do the services management processes adequately address the
    following areas?
     • Change and Quality Management
     • Incident and Problem Management
     • Availability and Capacity Management


• Service Level Commitments
  – What type of commitments does IT make (by area)?
  – Are they reasonable?
  – What scenarios would prevent IT from meeting the
    commitments?
  – Can IT respond to changing requirements?
Identify & Analyse Risks
• Application Architecture
  – Is the technology obsolete?
  – Does the application provide flexibility to respond to changing
    business requirements?
  – Is the application reliable and available when needed?
  – Does it handle spikes in processing volumes?
• Hardware and System Software
  –   What scenarios would impact this area?
  –   What is the required capacity, availability, and security?
  –   Do we have visibility of availability, reliability, and performance?
  –   Can faulty components be replaced?
  –   Can we identify trends?
Identify & Analyse Risks
• Application Operations and Support
  – Do the applications provide the required capabilities?
  – How often to they need to be enhanced?
  – How often do they need to be fixed?
  – What knowledge is required to operate and support?
  – Are they reliable, flexible, easy to use?
  – Is the technology obsolete?
  – Can they be easily updated to support changing
    requirements?
  – What do they cost and what value is provided?
Risk Planning
• Define success or the “commitment to deliver”
  (SLA’s, dates, estimates, scope)
• Analyse the “ability to deliver” including
  processes, tools, infrastructure, applications,
  staff, and knowledge
• Identify gaps or scenarios where the ability to
  deliver will not be able to meet the commitment
• Identify prevention or response actions
Track Progress
• Is the available capacity for processing and
  services aligned with the demand to meet
  business needs without wasting resources?
• Are SLA’s being met?
• Are processes being followed?
• What is the level of quality and the reason for
  defects?
• Is the staff size and their knowledge level
  adequate to meet the service demand?
Control
• Is there a formal risk management process?
• Are all risks logged?
• Who owns the responsibility for ownership for
  mitigation or prevention been assigned?
• Are problems analyzed to determine the risks
  that have not been addressed?
• Is there a problem management process for
  permanently fixing problems and eliminating
  risk?
Communicate
• Is there a formal risk management plan?
• Are known risks communicated to the staff so
  they can be aware of the risks?
• Does the business participate in the prioritization
  and mitigation of risks?
• Are the causes and impacts of problems
  communicated?
Scenario:

    Managing
   Application
Maintenance Risks
Application Risk Areas
• Do the applications provide the required capabilities?
• How often to they need to be enhanced?
• How often do they need to be fixed?
• What knowledge is required to operate and support?
• Are they reliable, flexible, easy to use?
• Is the technology obsolete?
• Can they be easily updated to support changing
  requirements?
• What do they cost and what value is provided?
Plan and Manage
• Inventory applications and their capabilities, availability
  requirements, and redundancies.
• Implement application management processes to track
  costs, changes, quality, and value to business.
• Identify missing or deficient capabilities and how
  often they need to be enhanced. Initiate enhancements
  to provide user-controlled configuration.
• Eliminate recurring problems by implementing fixes.
• Document required knowledge and facilitate
  orientation or cross-training of staff.
• Identify solutions for replacing obsolete technologies.
• Develop a retirement strategy.
Management Capability
Visibility
•   What services are needed?
•   What services are provided?
•   When are they provided?
•   How often?
•   Why are they provided?
•   How much do they cost?
Management Capability
Control
• Were the services authorized?
• Did they deliver the correct result?
• Were standard processes followed?
• Were the services delivered on-time and on-
  budget?
• Did the customer receive value?
Management Capability
Optimization
•   Reduce Risks and Costs
•   Improve Quality
•   Improve Processes
•   Improve Customer Satisfaction
•   Increase Value to the Business
Case Study:

Highmark Service
Excellence Project
Service Excellence Project
Objective:
  Improve IT’s ability to meet or exceed commitments to the business
Year 1 Goal:
  Increase value to the business by increasing time spent on
  enhancements from 4% to 18%
Achievements
•   Time spent on enhancements increased to 22.5% in 9 months and 36%
    after 18 months
•   Enhancement backlog was eliminated
•   Application Problems and Support costs were reduced
•   Business management received increased visibility and control of their
    requested services, required hours, and cost
•   Increased Customer Satisfaction
Risk Assessment Results
 • Service requests were not logged
 • Service Level Goals are not formally defined
 • Most of the available resource hours are spent resolving
   incidents resulting in a large backlog of projects
 • Customer satisfaction was not measured but it was assessed
   as poor based on informal feedback
 • Most of the support management processes were informal
   and team specific
 • Knowledge was undocumented resulting in a dependence on
   “hero experts for each application
 • “Reactive” management because of limited visibility and
   control
Solution Framework
                                     Optimise
                                     •Improve Processes
                                     •Reduce/Prevent Problems
                                     •Increase Value




                   Control
                   •Implement Processes
                   •Commitments/SLA’s
                   •Enforce Processes
                   •Authorize Services



    Visibility
    •Services
    •Resources
    •Performance
    •Metrics
Resulting Business Value
 • Increased quality, reduced rework and application problems, and
   reduced support costs
 • Improved process maturity
 • Implemented metrics to support ongoing improvement initiatives
 • Increased staff effectiveness and productivity
 • Reduced risk
 • Improved performance against commitments which improved
   customer satisfaction
Case Study

Pa. Department of Transportation

  Application Management and
          Outsourcing
PennDOT Introduction
 Provides Transportation Management for
  the Commonwealth of Pennsylvania

     Created in 1970 to streamline transportation management
     Annual budget of over $6 bn of state and federal funds
     Total 121,000 miles of state and local highways
     Total 55,000 state and local bridges
     Manage 40,000 miles of highway and 25,000 bridges
     12,000 employees
     11.3 Million vehicle registrations
     8.7 Million driving licenses
     Safety and Emissions control inspection programmes
Commonwealth Directive
                   “Do more with less”

 Commonwealth Budget 2011-12

    Balance budget with no tax increases
    Refocus investment in core functions of government
    Reduce general fund budget by 4% ($1.17 billion)
    State spending overall reset to near 2008-09 levels
    State agencies are directed to focus on delivery and reduce
     administrative overhead
Success




          76,500 Function Points added
                0.2% defect rate
Scenario:

Managing Project Risks
Risk Analysis: Why Projects Fail?
              Standish Chaos Report
 •   Incomplete Requirements     13.1%
 •   Lack of User Involvement    12.4%
 •   Lack of Resources           10.6%
 •   Unrealistic Expectations     9.9%
 •   Lack of Executive Support    9.3%
 •   Changing Requirements        8.7%
 •   Lack of Planning             8.1%
 •   Didn't Need It Any Longer    7.5%
 •   Lack of IT Management        6.2%
 •   Technology Illiteracy        4.3%
 •   Other                        9.9%
The solution begins with accountability

• Who is responsible for managing project risk?
• Who is responsible for project success?
• Who is to blame for project failures?
• Does the IT project team have unrealistic
  expectations of the business?
• Does the business have unrealistic
  expectations of the IT project team?
Mitigating Project Risks
• Cleary defining Requirements minimizes changes and
  re-work
• Establish an achievable Scope based on available
  resources, budgets, and expected completion date
• Plan the project to avoid Resource downtime and
  minimize schedule disruptions
• Identify Issues early to prevent problems and avoid the
  resulting re-work
Will you be successful?
        Effective Risk Management answers this question
• Required Information
   – Timely and accurate project performance data
   – Opinions/feedback from all participants
   – Status of all open issues
• Risk Analysis
   – Is the project on-time and on-budget for completed tasks?
   – Is the project on-time and on-budget for active tasks?
   – Has anything changed (scope, resource availability,
     customer satisfaction, levels of overtime)?
   – What is the reason and impact of the change?
   – What is the impact of open issues?
Information Requirements
• Stakeholder and Team Communications
   – Requirements
   – Status
   – Issues/Concerns

• Project Performance data
   – Actual effort/cost vs. estimates
   – Total Changes and the impact of changes
   – Total Re-Work by reason (requirements changes vs. errors)
   – Lost time due to schedule disruptions
Solutions
• Improve communications with all project
  participants without disrupting progress
• Ensure compliance with processes
• Collect and analyze project performance metrics
  to identify trends and new risks
• Efficient staff orientation to the project and the
  management processes to enable agile staffing
• Establish accountability
How does CAI succeed?
• Repeatable Processes are used to manage requirements,
  scope, schedules, risk, issues, changes, quality, and resources
• Tracer Service Management Tool provides visibility (metrics)
  and status into all assigned activities across projects and
  support
• Automated Project Office Answers the question “Will we
  succeed?”
    – Early identification of risks by conducting project health
      assessments to analyze project performance metrics and
      surveys of participants and stakeholders
    – Validates compliance with processes
Automated Project Office
    Visibility of Issues
Automated Project Office
    Visibility of Issues
How can CAI help you?
• Fixed price Application Development services
• Application Support Outsourcing to allow your staff
  to work on projects
• Project Management and Transformation consulting
  to improve effectiveness
• Automated Project Office tool to enable a rapid
  project office implementation
• ITMPI – IT Metrics and Productivity Institute provides
  access to resources and knowledge from world-
  renowned experts in various fields
Thank You.

Mais conteúdo relacionado

Mais procurados

How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskMighty Guides, Inc.
 
Business impact assessment (bia)
Business impact assessment (bia)Business impact assessment (bia)
Business impact assessment (bia)Shashwat Shankar
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDPranav Shah
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksHernan Huwyler, MBA CPA
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance BOC Group
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Barry Caplin
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 

Mais procurados (20)

IT Governance
IT GovernanceIT Governance
IT Governance
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Business impact assessment (bia)
Business impact assessment (bia)Business impact assessment (bia)
Business impact assessment (bia)
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 

Destaque

Emperor Digital Portfolio
Emperor Digital PortfolioEmperor Digital Portfolio
Emperor Digital PortfolioNadaZbirek
 
LIT0070 - Brigade Corporate Brochure
LIT0070 - Brigade Corporate BrochureLIT0070 - Brigade Corporate Brochure
LIT0070 - Brigade Corporate BrochureEmily Hardy
 
Unidad 12 13 y 14
Unidad 12 13 y 14Unidad 12 13 y 14
Unidad 12 13 y 14Carlos
 
Día 13 - Vida Cristiana
Día 13 - Vida CristianaDía 13 - Vida Cristiana
Día 13 - Vida CristianaJuan Ignacio B.
 
Tecnología, tendencias y oportunidades de negocio
Tecnología, tendencias y oportunidades de negocioTecnología, tendencias y oportunidades de negocio
Tecnología, tendencias y oportunidades de negocioCelestino Güemes Seoane
 
Feature Sheet - channelPay
Feature Sheet - channelPayFeature Sheet - channelPay
Feature Sheet - channelPayAnna Walczak
 
Kars pegasus ucuz uçak bileti telefon
Kars pegasus ucuz  uçak bileti telefonKars pegasus ucuz  uçak bileti telefon
Kars pegasus ucuz uçak bileti telefonhasan ahmet
 
Actas terpel otros
Actas  terpel otrosActas  terpel otros
Actas terpel otrosjohnjalopez
 
Examen 2 lopez castellanos estefania
Examen 2 lopez castellanos estefaniaExamen 2 lopez castellanos estefania
Examen 2 lopez castellanos estefaniaarmendia539
 
Arrival Card
Arrival CardArrival Card
Arrival Cardambcw
 
Fitoplancton y Zooplancton en Humedal Cordoba
Fitoplancton y Zooplancton en Humedal CordobaFitoplancton y Zooplancton en Humedal Cordoba
Fitoplancton y Zooplancton en Humedal CordobaTeodoro Chivata
 
Educación y gestión ambiental 6-2-12
Educación y  gestión ambiental  6-2-12Educación y  gestión ambiental  6-2-12
Educación y gestión ambiental 6-2-12ProCiencia
 
Paco Martínez Soria
Paco Martínez SoriaPaco Martínez Soria
Paco Martínez Soriajal94
 
Huawei Modular UPS Systems UPS5000E Sereis
Huawei Modular UPS Systems UPS5000E SereisHuawei Modular UPS Systems UPS5000E Sereis
Huawei Modular UPS Systems UPS5000E SereisRobin Koffler MBA CDCEP
 

Destaque (20)

Gps ppt
Gps pptGps ppt
Gps ppt
 
Emperor Digital Portfolio
Emperor Digital PortfolioEmperor Digital Portfolio
Emperor Digital Portfolio
 
Mahmoud turkey
Mahmoud turkeyMahmoud turkey
Mahmoud turkey
 
LIT0070 - Brigade Corporate Brochure
LIT0070 - Brigade Corporate BrochureLIT0070 - Brigade Corporate Brochure
LIT0070 - Brigade Corporate Brochure
 
Unidad 12 13 y 14
Unidad 12 13 y 14Unidad 12 13 y 14
Unidad 12 13 y 14
 
articulo de economia
articulo de economia articulo de economia
articulo de economia
 
Día 13 - Vida Cristiana
Día 13 - Vida CristianaDía 13 - Vida Cristiana
Día 13 - Vida Cristiana
 
JPOBRIEN_CV[1][1]
JPOBRIEN_CV[1][1]JPOBRIEN_CV[1][1]
JPOBRIEN_CV[1][1]
 
Tecnología, tendencias y oportunidades de negocio
Tecnología, tendencias y oportunidades de negocioTecnología, tendencias y oportunidades de negocio
Tecnología, tendencias y oportunidades de negocio
 
Feature Sheet - channelPay
Feature Sheet - channelPayFeature Sheet - channelPay
Feature Sheet - channelPay
 
Kars pegasus ucuz uçak bileti telefon
Kars pegasus ucuz  uçak bileti telefonKars pegasus ucuz  uçak bileti telefon
Kars pegasus ucuz uçak bileti telefon
 
Actas terpel otros
Actas  terpel otrosActas  terpel otros
Actas terpel otros
 
Examen 2 lopez castellanos estefania
Examen 2 lopez castellanos estefaniaExamen 2 lopez castellanos estefania
Examen 2 lopez castellanos estefania
 
Arrival Card
Arrival CardArrival Card
Arrival Card
 
Exemple cv 2
Exemple cv 2Exemple cv 2
Exemple cv 2
 
Fitoplancton y Zooplancton en Humedal Cordoba
Fitoplancton y Zooplancton en Humedal CordobaFitoplancton y Zooplancton en Humedal Cordoba
Fitoplancton y Zooplancton en Humedal Cordoba
 
Educación y gestión ambiental 6-2-12
Educación y  gestión ambiental  6-2-12Educación y  gestión ambiental  6-2-12
Educación y gestión ambiental 6-2-12
 
Paco Martínez Soria
Paco Martínez SoriaPaco Martínez Soria
Paco Martínez Soria
 
Huawei Modular UPS Systems UPS5000E Sereis
Huawei Modular UPS Systems UPS5000E SereisHuawei Modular UPS Systems UPS5000E Sereis
Huawei Modular UPS Systems UPS5000E Sereis
 
Tráfico de personas
Tráfico de personasTráfico de personas
Tráfico de personas
 

Semelhante a IT Risk Management

Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and InfosecFehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and InfosecFehmida Sayed
 
Fusion 09 PPT -Kirch Final
Fusion 09 PPT -Kirch FinalFusion 09 PPT -Kirch Final
Fusion 09 PPT -Kirch FinalCathy Kirch
 
Vinan Softech_Presentation
Vinan Softech_PresentationVinan Softech_Presentation
Vinan Softech_PresentationRujuta Joshi
 
Agile metrics - Agile KC Meeting 9/26/13
Agile metrics - Agile KC Meeting 9/26/13Agile metrics - Agile KC Meeting 9/26/13
Agile metrics - Agile KC Meeting 9/26/13molsonkc
 
Adopting ITIL framework
Adopting ITIL frameworkAdopting ITIL framework
Adopting ITIL frameworkVinayak Ghadi
 
Resume - Sanjit Mitra
Resume - Sanjit MitraResume - Sanjit Mitra
Resume - Sanjit MitraSanjit Mitra
 
ITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationPrudentialSolutions
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case studyNandita Nityanandam
 
Aequor technologies - Global IT Company NJ
Aequor technologies - Global IT Company NJAequor technologies - Global IT Company NJ
Aequor technologies - Global IT Company NJAequor Technologies
 
Welingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLikeWelingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLikePrinceTrivedi4
 
Lean Kanban India 2016 - Digital Transformation
Lean Kanban India 2016 - Digital TransformationLean Kanban India 2016 - Digital Transformation
Lean Kanban India 2016 - Digital TransformationMike Leber
 
Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...
Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...
Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...LeanKanbanIndia
 
Digital economy by Mike Leber
Digital economy by Mike Leber Digital economy by Mike Leber
Digital economy by Mike Leber Innovation Roots
 
PeopleSoft Can Do That?
PeopleSoft Can Do That? PeopleSoft Can Do That?
PeopleSoft Can Do That? Emtec Inc.
 
2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls Factory2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls FactoryNathan Anderson
 

Semelhante a IT Risk Management (20)

PMI Event
PMI EventPMI Event
PMI Event
 
09.consulting collaboration innovation imc thailand_dr_montri_v
09.consulting collaboration innovation imc thailand_dr_montri_v09.consulting collaboration innovation imc thailand_dr_montri_v
09.consulting collaboration innovation imc thailand_dr_montri_v
 
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and InfosecFehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
 
Fusion 09 PPT -Kirch Final
Fusion 09 PPT -Kirch FinalFusion 09 PPT -Kirch Final
Fusion 09 PPT -Kirch Final
 
Vinan Softech_Presentation
Vinan Softech_PresentationVinan Softech_Presentation
Vinan Softech_Presentation
 
Agile metrics - Agile KC Meeting 9/26/13
Agile metrics - Agile KC Meeting 9/26/13Agile metrics - Agile KC Meeting 9/26/13
Agile metrics - Agile KC Meeting 9/26/13
 
Itilv3
Itilv3Itilv3
Itilv3
 
Adopting ITIL framework
Adopting ITIL frameworkAdopting ITIL framework
Adopting ITIL framework
 
Resume - Sanjit Mitra
Resume - Sanjit MitraResume - Sanjit Mitra
Resume - Sanjit Mitra
 
ITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 Foundation
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case study
 
Aequor technologies - Global IT Company NJ
Aequor technologies - Global IT Company NJAequor technologies - Global IT Company NJ
Aequor technologies - Global IT Company NJ
 
Welingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLikeWelingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLike
 
Lean Kanban India 2016 - Digital Transformation
Lean Kanban India 2016 - Digital TransformationLean Kanban India 2016 - Digital Transformation
Lean Kanban India 2016 - Digital Transformation
 
Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...
Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...
Lean Kanban India 2016 | Digital Transformation – Challenge for Change, Call ...
 
Digital economy by Mike Leber
Digital economy by Mike Leber Digital economy by Mike Leber
Digital economy by Mike Leber
 
PeopleSoft Can Do That?
PeopleSoft Can Do That? PeopleSoft Can Do That?
PeopleSoft Can Do That?
 
Goutam_Resume
Goutam_ResumeGoutam_Resume
Goutam_Resume
 
2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls Factory2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls Factory
 
NGA Application Maintenance
NGA Application MaintenanceNGA Application Maintenance
NGA Application Maintenance
 

Mais de Computer Aid, Inc

A Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI PulseA Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI PulseComputer Aid, Inc
 
Management by Walking Around
Management by Walking AroundManagement by Walking Around
Management by Walking AroundComputer Aid, Inc
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) SecurityComputer Aid, Inc
 
Knowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerKnowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerComputer Aid, Inc
 
Why Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe HessmillerWhy Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe HessmillerComputer Aid, Inc
 
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...Computer Aid, Inc
 
Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)Computer Aid, Inc
 
APO State Government Business Brief
APO State Government Business BriefAPO State Government Business Brief
APO State Government Business BriefComputer Aid, Inc
 
White paper-management-by-walking-around
White paper-management-by-walking-aroundWhite paper-management-by-walking-around
White paper-management-by-walking-aroundComputer Aid, Inc
 
Leadership, Presented at Lehigh University
Leadership, Presented at Lehigh UniversityLeadership, Presented at Lehigh University
Leadership, Presented at Lehigh UniversityComputer Aid, Inc
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st CenturyComputer Aid, Inc
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st CenturyComputer Aid, Inc
 
APO IT Buzz Overview and Screenshots
APO IT Buzz Overview and ScreenshotsAPO IT Buzz Overview and Screenshots
APO IT Buzz Overview and ScreenshotsComputer Aid, Inc
 
Interview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert CharetteInterview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert CharetteComputer Aid, Inc
 

Mais de Computer Aid, Inc (20)

A Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI PulseA Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI Pulse
 
Management by Walking Around
Management by Walking AroundManagement by Walking Around
Management by Walking Around
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) Security
 
Knowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerKnowledge Management - By Joe Hessmiller
Knowledge Management - By Joe Hessmiller
 
Why Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe HessmillerWhy Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe Hessmiller
 
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
 
Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)
 
APO State Government Business Brief
APO State Government Business BriefAPO State Government Business Brief
APO State Government Business Brief
 
White paper-management-by-walking-around
White paper-management-by-walking-aroundWhite paper-management-by-walking-around
White paper-management-by-walking-around
 
Leadership, Presented at Lehigh University
Leadership, Presented at Lehigh UniversityLeadership, Presented at Lehigh University
Leadership, Presented at Lehigh University
 
APO ITBuzz Overview
APO ITBuzz OverviewAPO ITBuzz Overview
APO ITBuzz Overview
 
Introduction to CAI
Introduction to CAIIntroduction to CAI
Introduction to CAI
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st Century
 
State of Georgia
State of GeorgiaState of Georgia
State of Georgia
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st Century
 
APO IT Buzz Overview and Screenshots
APO IT Buzz Overview and ScreenshotsAPO IT Buzz Overview and Screenshots
APO IT Buzz Overview and Screenshots
 
AmeriHealth Case Study
AmeriHealth Case StudyAmeriHealth Case Study
AmeriHealth Case Study
 
APO Presentation
APO PresentationAPO Presentation
APO Presentation
 
Interview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert CharetteInterview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert Charette
 
APO 2.0
APO 2.0APO 2.0
APO 2.0
 

Último

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 

Último (20)

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

IT Risk Management

  • 1. CIO’s Guide to Risk Management
  • 2. Agenda • Introductions • IT Management Basics • IT Risk Management • Managing Application Support Risks • Application Management Case Study • Managing Project Risks
  • 3. Introductions Agenda Computer Aid, Inc • 30 Years in IT Consulting Services Business • Privately Held Entrepreneurial Organization • 3,000 Associates Worldwide • $300 Plus Million in Revenue in 2011 • Offices in 34 U.S. Metropolitan Areas • Global offices in Toronto, London, Sydney, and Kuwait, Singapore • Off-shore delivery: Philippines, China, Argentina, Ethiopia, and India • Headquarters: Allentown, Pa.
  • 4. CAI Managed Services • Application Support Outsourcing – Assume full responsibility for support – Fixed Price – Service Level Commitments – Continuous Improvement Commitments • Application Development – Fixed Price Proposals – On-Time, On-Budget, High Quality, Warranty • Help Desk Outsourcing – Service Level Commitments – Fixed Price
  • 5. CAI Clients Manufacturing Government Retail Financials Transportation / Logistics Services Education Insurance Utilities
  • 6. Agenda • Introductions • IT Management Basics • IT Risk Management • Managing Application Support Risks • Application Management Case Study • Managing Project Risks
  • 7. IT Management Basics
  • 8. What is the mission of IT? Deliver the Information Processing Capability required by the business at a cost that represents value
  • 9. IT Services • Implement, operate, and support – Infrastructure (servers, mainframes, networks) – System software and Tools • Operating Systems • Data Query and Reporting • E-mail and Internet Access • Application design, development, and support tools • Design, build/purchase, install, operate and support application software to support the business • Store, protect and provide secure access to business information • Provide consulting services to the business
  • 10. Dimensions of IT Management • Strategy and Business Alignment – Strategic Planning: Management Vision, Philosophy, and Objectives – Business Planning: Identify Business Needs – Portfolio Management: Initiate and prioritize projects – Budgeting: Authorize with budgets and funding • IT Services – Technology Architecture: Languages, DBMS, Network – Infrastructure Operation: Operations Processes – Application Development: SDLC, Project Management, Standards – User Support and Services: Help Desk, SLA’s • Administration and Control – Human Resource Management: HR Policies, Training – Supplier Management: Purchasing
  • 11. Dimensions of Project Management • Cost • Integration • Schedule • Communication • Scope • Human Resources • Quality • Procurement • Risk • Methodology
  • 12. Dimensions of Operations & Support Management • Reliability • Availability • Capability • Timely • Responsive/Performance • Flexibility/Adaptability
  • 14. What is an IT Risk? The possibility that IT will not be able to deliver the required capability
  • 15. SEI Service CMMI • Identify the “Commitment to Deliver” • Establish the “Ability to Deliver” • Deliver Note: Risk identification and mitigation are ongoing activities … requirements change which results in new commitments.
  • 16. Risk Management Impact on Project Success
  • 17. Risk Management (NASA) • Identify - scenarios for failure • Analyse - likelihood and consequence of failure • Plan - actions required to track and control risks • Track - program performance against plan • Control - risk issues and verify effectiveness • Communicate and Document
  • 18. Identify & Analyse Risks • Strategic – Does the business strategic plan address information processing capabilities? – Is there a reasonable budget? – Does the Information Processing strategy directly link to business goals and objectives?
  • 19. Identify & Analyse Risks • Service Management Processes – Do the services management processes adequately address the following areas? • Change and Quality Management • Incident and Problem Management • Availability and Capacity Management • Service Level Commitments – What type of commitments does IT make (by area)? – Are they reasonable? – What scenarios would prevent IT from meeting the commitments? – Can IT respond to changing requirements?
  • 20. Identify & Analyse Risks • Application Architecture – Is the technology obsolete? – Does the application provide flexibility to respond to changing business requirements? – Is the application reliable and available when needed? – Does it handle spikes in processing volumes? • Hardware and System Software – What scenarios would impact this area? – What is the required capacity, availability, and security? – Do we have visibility of availability, reliability, and performance? – Can faulty components be replaced? – Can we identify trends?
  • 21. Identify & Analyse Risks • Application Operations and Support – Do the applications provide the required capabilities? – How often to they need to be enhanced? – How often do they need to be fixed? – What knowledge is required to operate and support? – Are they reliable, flexible, easy to use? – Is the technology obsolete? – Can they be easily updated to support changing requirements? – What do they cost and what value is provided?
  • 22. Risk Planning • Define success or the “commitment to deliver” (SLA’s, dates, estimates, scope) • Analyse the “ability to deliver” including processes, tools, infrastructure, applications, staff, and knowledge • Identify gaps or scenarios where the ability to deliver will not be able to meet the commitment • Identify prevention or response actions
  • 23. Track Progress • Is the available capacity for processing and services aligned with the demand to meet business needs without wasting resources? • Are SLA’s being met? • Are processes being followed? • What is the level of quality and the reason for defects? • Is the staff size and their knowledge level adequate to meet the service demand?
  • 24. Control • Is there a formal risk management process? • Are all risks logged? • Who owns the responsibility for ownership for mitigation or prevention been assigned? • Are problems analyzed to determine the risks that have not been addressed? • Is there a problem management process for permanently fixing problems and eliminating risk?
  • 25. Communicate • Is there a formal risk management plan? • Are known risks communicated to the staff so they can be aware of the risks? • Does the business participate in the prioritization and mitigation of risks? • Are the causes and impacts of problems communicated?
  • 26. Scenario: Managing Application Maintenance Risks
  • 27. Application Risk Areas • Do the applications provide the required capabilities? • How often to they need to be enhanced? • How often do they need to be fixed? • What knowledge is required to operate and support? • Are they reliable, flexible, easy to use? • Is the technology obsolete? • Can they be easily updated to support changing requirements? • What do they cost and what value is provided?
  • 28. Plan and Manage • Inventory applications and their capabilities, availability requirements, and redundancies. • Implement application management processes to track costs, changes, quality, and value to business. • Identify missing or deficient capabilities and how often they need to be enhanced. Initiate enhancements to provide user-controlled configuration. • Eliminate recurring problems by implementing fixes. • Document required knowledge and facilitate orientation or cross-training of staff. • Identify solutions for replacing obsolete technologies. • Develop a retirement strategy.
  • 29. Management Capability Visibility • What services are needed? • What services are provided? • When are they provided? • How often? • Why are they provided? • How much do they cost?
  • 30. Management Capability Control • Were the services authorized? • Did they deliver the correct result? • Were standard processes followed? • Were the services delivered on-time and on- budget? • Did the customer receive value?
  • 31. Management Capability Optimization • Reduce Risks and Costs • Improve Quality • Improve Processes • Improve Customer Satisfaction • Increase Value to the Business
  • 33. Service Excellence Project Objective: Improve IT’s ability to meet or exceed commitments to the business Year 1 Goal: Increase value to the business by increasing time spent on enhancements from 4% to 18% Achievements • Time spent on enhancements increased to 22.5% in 9 months and 36% after 18 months • Enhancement backlog was eliminated • Application Problems and Support costs were reduced • Business management received increased visibility and control of their requested services, required hours, and cost • Increased Customer Satisfaction
  • 34. Risk Assessment Results • Service requests were not logged • Service Level Goals are not formally defined • Most of the available resource hours are spent resolving incidents resulting in a large backlog of projects • Customer satisfaction was not measured but it was assessed as poor based on informal feedback • Most of the support management processes were informal and team specific • Knowledge was undocumented resulting in a dependence on “hero experts for each application • “Reactive” management because of limited visibility and control
  • 35. Solution Framework Optimise •Improve Processes •Reduce/Prevent Problems •Increase Value Control •Implement Processes •Commitments/SLA’s •Enforce Processes •Authorize Services Visibility •Services •Resources •Performance •Metrics
  • 36. Resulting Business Value • Increased quality, reduced rework and application problems, and reduced support costs • Improved process maturity • Implemented metrics to support ongoing improvement initiatives • Increased staff effectiveness and productivity • Reduced risk • Improved performance against commitments which improved customer satisfaction
  • 37. Case Study Pa. Department of Transportation Application Management and Outsourcing
  • 38. PennDOT Introduction  Provides Transportation Management for the Commonwealth of Pennsylvania  Created in 1970 to streamline transportation management  Annual budget of over $6 bn of state and federal funds  Total 121,000 miles of state and local highways  Total 55,000 state and local bridges  Manage 40,000 miles of highway and 25,000 bridges  12,000 employees  11.3 Million vehicle registrations  8.7 Million driving licenses  Safety and Emissions control inspection programmes
  • 39. Commonwealth Directive “Do more with less”  Commonwealth Budget 2011-12  Balance budget with no tax increases  Refocus investment in core functions of government  Reduce general fund budget by 4% ($1.17 billion)  State spending overall reset to near 2008-09 levels  State agencies are directed to focus on delivery and reduce administrative overhead
  • 40. Success 76,500 Function Points added 0.2% defect rate
  • 42. Risk Analysis: Why Projects Fail? Standish Chaos Report • Incomplete Requirements 13.1% • Lack of User Involvement 12.4% • Lack of Resources 10.6% • Unrealistic Expectations 9.9% • Lack of Executive Support 9.3% • Changing Requirements 8.7% • Lack of Planning 8.1% • Didn't Need It Any Longer 7.5% • Lack of IT Management 6.2% • Technology Illiteracy 4.3% • Other 9.9%
  • 43. The solution begins with accountability • Who is responsible for managing project risk? • Who is responsible for project success? • Who is to blame for project failures? • Does the IT project team have unrealistic expectations of the business? • Does the business have unrealistic expectations of the IT project team?
  • 44. Mitigating Project Risks • Cleary defining Requirements minimizes changes and re-work • Establish an achievable Scope based on available resources, budgets, and expected completion date • Plan the project to avoid Resource downtime and minimize schedule disruptions • Identify Issues early to prevent problems and avoid the resulting re-work
  • 45. Will you be successful? Effective Risk Management answers this question • Required Information – Timely and accurate project performance data – Opinions/feedback from all participants – Status of all open issues • Risk Analysis – Is the project on-time and on-budget for completed tasks? – Is the project on-time and on-budget for active tasks? – Has anything changed (scope, resource availability, customer satisfaction, levels of overtime)? – What is the reason and impact of the change? – What is the impact of open issues?
  • 46. Information Requirements • Stakeholder and Team Communications – Requirements – Status – Issues/Concerns • Project Performance data – Actual effort/cost vs. estimates – Total Changes and the impact of changes – Total Re-Work by reason (requirements changes vs. errors) – Lost time due to schedule disruptions
  • 47. Solutions • Improve communications with all project participants without disrupting progress • Ensure compliance with processes • Collect and analyze project performance metrics to identify trends and new risks • Efficient staff orientation to the project and the management processes to enable agile staffing • Establish accountability
  • 48. How does CAI succeed? • Repeatable Processes are used to manage requirements, scope, schedules, risk, issues, changes, quality, and resources • Tracer Service Management Tool provides visibility (metrics) and status into all assigned activities across projects and support • Automated Project Office Answers the question “Will we succeed?” – Early identification of risks by conducting project health assessments to analyze project performance metrics and surveys of participants and stakeholders – Validates compliance with processes
  • 49. Automated Project Office Visibility of Issues
  • 50. Automated Project Office Visibility of Issues
  • 51. How can CAI help you? • Fixed price Application Development services • Application Support Outsourcing to allow your staff to work on projects • Project Management and Transformation consulting to improve effectiveness • Automated Project Office tool to enable a rapid project office implementation • ITMPI – IT Metrics and Productivity Institute provides access to resources and knowledge from world- renowned experts in various fields

Notas do Editor

  1. In order to provide the required processing capability, IT provides the following services:Implement, operate and support hardware (servers, networks, printers) Implement support and utilize variety of general purpose tools such as E-mail, Query software, and tools for developing and supporting applications.Design, build/purchase, install, operate, and support applicationsStore and protect informationIT also provides a wide variety of consulting and planning services to the business
  2. IT management consists of three major categories and 10 dimensions. It is important to note that IT is a young profession and standard management frameworks are still evolving. In order to ensure success, each of the management frameworks must address these common areas.
  3. Delivery of IT services consists of scheduled activities and on-demand services. Scheduled activities are typically managed as projects and success requires management of the following areas:
  4. Delivery of IT services consists of scheduled activities and on-demand services. Scheduled activities are typically managed as projects and success requires management of the following areas:
  5. SEI defines provides a process maturity framework and they have defined a Capability Maturity model for services. This framework says that service organizations must first “Identify their commitment to deliver” and then “establish the ability to deliver”Commitments can be tactical (short-term) or strategic and business requirements may require new commitments. As a result, Risk identification and mitigation are ongoing activities.Keep in mind: Business expectations may be unreasonable and they may be impossible to meet. The mission of IT is to manage expectations and meet their commitments.
  6. According to this study by Interlink consulting, Risk Management has the biggest impact on project success.
  7. Let us discuss some risk management theory. NASA specializes in managing risk. Their missions are some of the riskiest endeavors ever attempted by man. NASA identifies the following activities for identifying and managing risk:Identify failure scenarios. Analyse the likelihood that the scenario will occur. There is a possibility that you will leave your house and be struck by a meteor but the likelihood of such an event is so remote that you would not take any precautions. On the other hand, if it is cloudy and humid, it is likely there will be rain so you should mitigate the risk by taking an umbrella.Planning includes defining the activities required to track risks and control their impact through mitigation or recovery actions.If you choose not to mitigate the risk, it is important to track the frequency and impact if problems when they occur. Effective Risk Management also includes communication and awareness
  8. The next step is to Analyse the risks. If we agree that a risk is the possibility of not meeting commitments then we should analyse the scenarios that may cause us to meet commitments.Identify the types of commitments, how they align with expectations, determine if they are reasonable, and how to ensure they are met. We must also recognize that requirements will change which will require new commitments.Finally, management processes should be analysed to determine if they are adequate.
  9. The next step is to Analyse the risks. If we agree that a risk is the possibility of not meeting commitments then we should analyse the scenarios that may cause us to meet commitments.Identify the types of commitments, how they align with expectations, determine if they are reasonable, and how to ensure they are met. We must also recognize that requirements will change which will require new commitments.Finally, management processes should be analysed to determine if they are adequate.
  10. The next step is to Analyse the risks. If we agree that a risk is the possibility of not meeting commitments then we should analyse the scenarios that may cause us to meet commitments.Identify the types of commitments, how they align with expectations, determine if they are reasonable, and how to ensure they are met. We must also recognize that requirements will change which will require new commitments.Finally, management processes should be analysed to determine if they are adequate.
  11. Application management is one of the highest risk areas for IT. Applications provide the direct link to the business. They are difficult/expensive to develop or purchase and they also require extensive support. Application inventories should be assessed based on the following criteria:
  12. In order to identify risk scenarios, we need to define success based on commitments. Then we need to address issues with our ability to deliver on these commitments,
  13. Tracking progress is a proactive step. If we do not track progress then we cannot identify trends and anticipate and prevent problems. Examples of progress tracking include:
  14. Control cannot be achieved without a formal risk management process that includes logging risks and issues and assigning ownership for mitigation or resolution. This includes an analysis of problems to identify new risks. This requires incident tracking and problem management capabilities.
  15. If the Risk Management Team does not communicate risks and implement processes to mitigate risks, then they will have to react to the resulting problems without the ability to prevent them. A formal Risk Management Plan provides an excellent mechanism for communicating risks. This also makes it easier for the business to participate in the prioritization and mitigation of risks and the identification of problems.
  16. The following questions should be answered for each application, gaps should be identified, and a plan should be prepared to address the gaps.
  17. A plan should be created to address the following areas. Each of these activities should be repeated on a periodic basis. Changes to business requirements or technology may introduce new risks or problems.
  18. The transformation involved three phases:We ran queries to collect metrics to identify the types of support services, frequency, priority, and cost. Processes were implemented to enhance the ability to manage the support services, establish commitments, authorise work, and enforce processes.Finally, we trained the team to look for new risks or opportunities for improvement. This included implementing permanent solutions to recurring problems to reduce support costs.