SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
Industry Day Objective

Today’s goal is to inform and seek feedback from industry on 
T d ’       li t i f        d    k f db k f        i d t
the Email Transformation Initiative. This includes:
• Providing an overview and expected business outcomes for
  Providing an overview and expected business outcomes for 
  the Email Transformation Initiative; 

• Assessing the level of interest from industry in providing a 
  solution for the modern email platform for the Government 
  of Canada; and 
  of Canada; and
• Gathering input  on the procurement approach for the 
  Initiative. 

                                                                  2
Industry Engagement Day Agenda
  Time                        Presenter                                  Description

1:30-1:35                     Moderator                      Industry Day Objectives


1:35 – 1:50       President,
                  President Shared Services Canada           Welcome

              ADM, Acquisitions Branch, Public Works and
1:50 – 2:00                                                  Procurement Opening Remarks
                    Government Services Canada

                        Shared Services Canada:              Email Transformation Initiative
                   Senior Assistant Deputy Minister of        Description and Objectives
2:00 – 3:00   Transformation, Service Strategy and Design    Current State
                                                             Scope and Requirements
                 Director General, Email Transformation      Solution Options being Considered

3:00 – 3:15                                          Break

                Communications Security Establishment        Cyber and Supply Threats to the
3:15 – 3:35
                             Canada                           Government of Canada
                         Acquisitions Branch                 Industry Engagement
3:35 – 3:50     Public Works and Government Services         Overview of the Collaborative
                               Canada                         Procurement Solutions Approach
3:50 – 4:45                                  Questions and Answers
4:45 – 5:00                               Recap and Closing Remarks                               3
Shared Services Canada




          Liseanne Forand,
President of Shared Services Canada
                                      4
Public Works and Government Services Canada




                   Tom Ring
 Assistant Deputy Minister, Acquisitions Branch
Email Transformation Initiative
        Industry Engagement Day Briefing
        I d      E          D B i fi

                   Benoît Long,
                   Senior Assistant Deputy Minister,
                   Transformation, Services
                   Strategy and Design




Gail E
G il Eagen
Director General
Email Transformation Initiative
                                                       6
Email Transformation I iti ti
E il T     f    ti Initiative




                                7
Email Transformation Initiative Overview
•   Project Objective
•   Business Drivers
       i        i
•   Desired Business Outcomes
•   Current State
•   Project Scope
•   Email Service Delivery Options
•   Key Requirements
•   Other Considerations 
•   Areas we need your input …

                                           8
Email Transformation Initiative (ETI)
       Overall Project Objective

The Email Transformation Initiative (ETI) will consolidate and 
modernize Shared Services Canada (SSC) mandated email 
services to reduce costs, increase security, and enhance 
program delivery to Canadian citizens and businesses.

Shared Services Canada will offer the new service to rest of 
Government of Canada.




                                                                  9
Business Drivers
Industry benchmarks for email have identified significant cost 
savings potential for the Government of Canada 
savings potential for the Government of Canada

Complexity
 100 different email system configurations across the 
  Government of Canada
 Within the 43 SSC Partner Departments and Agencies:
  Within the 43 SSC Partner Departments and Agencies:
     81% using Microsoft Exchange 
     13% Novell GroupWise 
     6% IBM Lotus Notes –
     A range of software versions installed 
 Increasing demand for mobile access (Blackberry Tablets etc )
  Increasing demand for mobile access (Blackberry, Tablets, etc.) 
                                                                     10
Business Drivers
Security Pressures
   Citizens and private sector 
    organizations rely on on‐line services 
          i i       l        li       i
    to communicate with the Government of Canada 
   Email is a key channel 
   Email security has been implemented using different 
    strategies to meet departmental requirements
   Cyber‐threats are on the rise
    Cyber threats are on the rise 

                  Service Delivery Consistency
                      Varied service levels are in place across the 
                       partner organizations 
                      Complex email naming conventions are in
                       Complex email naming conventions are in 
                       place 
                                                                        11
Desired Business Outcomes
• Establishment of a consolidated email solution for the 
  Government of Canada, starting with our partners and then 
  Government of Canada starting with our partners and then
  offering to other departments and agencies
• Reduction in costs to deliver email services
  Reduction in costs to deliver email services 
• Continuous improvement to the security posture of email services 
  so that programs and services can be delivered securely and 
  reliably to Canadians
• Consistent naming standards 
• Common service levels for all users 
• Secure and reliable email service that can process emails ‐
  Classified up to Secret and Designated up to Protected C 
                                                                 12
Current State
Access for Canadian Citizens & Business            Effectiveness – Productivity Tool
• Email is a channel of communications for     • The GC could make better use of email by  y
  citizens/business to access GC programs        segmenting users into groups based on 
  but not used extensively for transactions      the functions they need (i.e. Civilian and 
• Current state is complicated by                Military, or mobile and non‐mobile users)
  numerous departmental naming                 • Current systems do not promote
                                                 Current systems do not promote 
  conventions, security and privacy              collaboration among departments and 
  concerns                                       agencies (i.e. Non‐integrated calendaring)

                  Costs                               Security and Performance
• Benchmarks show the GC has                   • Current systems are complex:
  significant opportunity for cost savings        • Different technologies 
• 63
  63 email systems in 43 SSC partners
          il t      i 43 SSC      t               • At least 700 email directories
                                                    At least 700 email directories 
                                                  • Distributed and centralized systems in place
• 377,804 employees, 637,000 mailboxes 
                                               • High diversity ‐ difficult to standardize
  and 70,000+ Blackberries
                                               • Systems require standardization for 
• 1700+ email servers
                                                 records management, retention policy and 
                                                      d                 t t ti         li  d
                                                 privacy 
                                                                                              13
ETI: What is in Scope?
            Functional                                Other
• Email 
                                         Classified up to Secret and Designated 
                                       • Classified up to Secret and Designated
• Instant messaging                      up to Protected C
• Calendar 
                                       • All SSC Partner Locations in Canada, as 
• Personal Contacts
  Personal Contacts                      well as all Embassies and Missions
                                         well as all Embassies and Missions
• Personal and Shared Email Folders 
                                       • Data Migration and Transition 
• Email Fax Service Integration
                                       • Implementation and Training Support
• Historical Email Access (Email
  Historical Email Access (Email 
  Archiving)                           • On‐going Email and User Support
• Email Directory                      • Integration Support for GC ”Corporate”
• Email Anti Virus / Anti Spam
  Email Anti‐Virus / Anti‐Spam           and “Program” applications (via 
                                         and “Program” applications (via
• Mobile Device Management               standard interface toolkits)
  (Blackberry, Smart Phone, Tablet)



                                                                                14
ETI: What is out of scope?
            Functional                                          Other
• Integrated Inbox (e.g. Voicemail               • Top Secret Email Systems
  Integration)
                                                 • Email services for mobile physical 
• Collaborative Workspaces
  Collaborative Workspaces                         platforms (i.e. DND Naval Ships)
• Wikis, Blogs and Forums
                                                 • Desktop Management (excluding email 
• Office Productivity Suites (except for
  Office Productivity Suites (except for           client)
                                                    li t)
  the email client)




                                            15                                           15
Where we need more industry feedback…
                            y
     Options            Descriptions                     Details
                                           Vendor would design, build and 
Managed Service     Crown Owned, Vendor 
                                           operate the new email system on GC 
                                           operate the new email system on GC
(Hybrid)
( b id)             Operated
                           d
                                           managed premise.

Fully Outsourced    Vendor Owned &         Vendor would design, build and 
Service
     i              Operated
                           d               provide an email service to the GC.  
                                               id        il     i       h


1. SSC recognizes that there is a  continuum of infrastructure
1 SSC recognizes that there is a “continuum” of infrastructure 
   sourcing options for Managed Services and Full Outsourcing.
2. SSC  is interested in hearing about any other options that 
   industry considers viable and cost effective to meet SSC’s needs.
                          bl            ff                  ’
3. SSC has made significant investments in hardware, software, 
   training and application integration.  SSC is interested in hearing 
   training and application integration SSC is interested in hearing
   how industry would leverage this investment as Government 
   Furnished Equipment (GFE).                                          16
Key Requirements
                             y   q
BUSINESS AND FUNCTIONAL REQUIREMENTS

1.   CONSOLIDATED EMAIL ‐ The email solution must consolidate and modernize Shared Services 
     Canada (SSC) mandated email services for SSC and its Partners. The new solution must be 
     Canada (SSC) mandated email services for SSC and its Partners The new solution must be
     made available to the rest of the Government of Canada. 

2.   USER FRIENDLY ‐ The email service must be user‐friendly and intuitive, requiring limited 
     formal training.  
     formal training

3.   ACCESSIBLE – The service must be available to all SSC partner locations in Canada, as well as 
     all Embassies and Missions abroad.  The system must be available in both official languages. 
     The email solution must meet the standards on accessibility, and accommodate those with 
     special needs, e.g. interoperability with applications to support visually and hearing impaired 
     employees.

4.   MOBILITY SUPPORT ‐ The service must provide Mobile Device Management capabilities for 
     platforms such as Research in Motion (RIM) Blackberries, Apple iPhones and iPads, and 
     Android/Windows smart phones and tablets.

5.   AVAILABLE AND RELIABLE ‐ The email service has a target of 100% uptime for users, on a 
     24/7/365 basis.
                                                                                                 17
Key Requirements
BUSINESS AND FUNCTIONAL REQUIREMENTS

6.
6     BROAD INTELLIGENT SEARCH ‐ The service must support end‐user email message 
      BROAD INTELLIGENT SEARCH The service must support end user email message
      and content search.

7.    LOCAL EMAIL ADMINISTRATION SUPPORT – The service must allow for SSC and 
      partner personnel to perform email administrative functions such as adding and 
      removing accounts, and resetting passwords. 

8.
8     LEGISLATIVE AND POLICY ALIGNMENT – The service must adhere to existing 
      LEGISLATIVE AND POLICY ALIGNMENT Th               i       t dh     t    i ti
      Legislation and Treasury Board instruments (e.g. policies, standards, guidelines).   
      Note: Treasury Board Secretariat is addressing any policy gaps resulting from the 
      implementation of a “cross government” email service. 
        p                        g

9.    TIME SENSITIVE ‐ The end date for the implementation (including migration) is 
      targeted for March 31, 2015.  

10.   COST EFFECTIVE – This initiative must enable the Government of Canada to deliver 
      email services at costs that are on par with industry and peer groups.          18
Key Requirements
SECURITY  and PRIVACY REQUIREMENTS
1.   SECURE ‐ The new email service must be certified to accommodate emails: 
     Classified up to Secret and Designated up to Protected C. 
     Classified up to Secret and Designated up to Protected C

2.   LAYERED SECURITY ‐ The service must support layered security controls, such as: 
     ‐    Perimeter security services (e.g. firewall, anti‐virus, anti‐spam)
     ‐    Protection from threats to the data at rest (e.g. access control)
     ‐    Protection for data in motion (e.g. encryption)

3.   TRUSTED SUPPLY CHAIN – Please reference CSEC Presentation “Cyber and Supply 
     Threats to the Government of Canada” for more information on this requirement.


4.   PRIVACY ‐ The service must ensure that information is accessible only to those 
     authorized. The service must comply with the statutory obligations under the 
     Privacy Act and the Access to Information Act.

5.   NATIONAL SECURITY EXCEPTION (NSE) – The Email Transformation Initiative falls 
     under the NSE recently invoked by PWGSC on behalf of SSC.                          19
Key Requirement: Vendor Security Profile
• SSC will be finalizing the Vendor Security Profile requirements after 
  the Industry Engagement phase. 
  the Industry Engagement phase

• Our objective is to provide as much time as possible for companies
  Our objective is to provide as much time as possible for companies 
  to arrange their security clearance. 
       Please go to http://ssi-iss.tpsgc-pwgsc.gc.ca/questions/esosp-psos-eng.html
       for more information
                information.


• Companies should expect that personnel assigned after the industry 
  engagement phase will be required to be security cleared to Secret. 
  Companies can expect that at the RFP stage, all bidders must satisfy 
  all security requirements. 
  all security requirements

                                                                                  20
Key Requirement: Data Sovereignty
Principle
Pi i l
SSC will safeguard the security and privacy of all data for which it is responsible and will 
ensure the Government of Canada’s requirements with respect to data sovereignty are met. 
Vendors will be required to demonstrate their ability to maintain Government of Canada data 
Vendors will be required to demonstrate their ability to maintain Government of Canada data
sovereignty.

At a minimum:
1. All data are the property of the Government of Canada
2. All data infrastructure components for the email system must reside in Canada
   a. All email servers and data repositories must be housed in Canada
   b. Off site storage must be housed within secure approved location(s) in Canada
   b Off‐site storage must be housed within secure approved location(s) in Canada
   c. All GC internal emails sent from government users located in Canada  or abroad  to 
       other government users located in Canada or abroad must travel through appropriately 
       secured networks;  Any redirections of emails by vendors not expressly following these 
       two circumstances will not be accepted. No data in transit will be saved or stored 
                               ll   b           d     d                ll b   d         d
       between the starting and end‐point.
3. The email solution must contain access controls and/or monitors on data repositories and 
               p      y       ,                   y,                ,       ,      ,    /
   other computer systems, such that SSC may, at its discretion, restrict, monitor, and/or 
   audit access to the government’s data
4. No limitation of liability in the event of a security or privacy breach
                                                                                          21
Key Requirements
TECHNOLOGY PLATFORM REQUIREMENTS

1.   OPEN STANDARDS SUPPORT – The service must be compliant with industry 
     standards using open, non‐proprietary standard interfaces.

2.   LEGACY SYSTEM INTEGRATION TOOLKIT – The service must provide an integration 
     toolkit for partners to leverage in order to integrate their business applications into 
     the new email service. 

3.   ACCESS MANAGEMENT – The service must manage user profiles, credentials, 
     authentication, and authorization. 




                                                                                            22
Key Requirements

IMPLEMENTATION AND MIGRATION REQUIREMENTS

1.   EMAIL MIGRATION – Existing email content/data must be migrated to the new 
     service, including file attachments.  

2.   SMOOTH TRANSITION – Existing functionality must be in place during the transition 
     wherever possible. Minimal impacts to users are expected.  Minimal training will be 
     required.


IT SERVICE MANAGEMENT REQUIREMENTS

1.   SSC IT SERVICE MANAGEMENT INTEGRATION – The vendor will be expected to 
     integrate with the IT Service Management processes and tools of SSC and its 
     Partners.  The level of integration may vary depending on service delivery sourcing 
     option. 
     option

                                                                                            23
Areas we need your input…
1. Email Service Delivery options and considerations?
2. Email Application Platform options? How can GC leverage 
   Government Furnished Equipment (GFE)?
   G           tF i h dE i          t (GFE)?
3. Alternatives for the underlying Infrastructure Services?  
4. Options for a user friendly identity, credential and access 
   management?
5. Strategies to meet the security requirements of Secret email and 
5 Strategies to meet the security requirements of Secret email and
   the GC’s requirements for data sovereignty?
6. Minimizing costs, complexity and business impacts for:
6 Minimizing costs complexity and business impacts for:
  I.     Data Migration?
  II.    Application Integration?
  III.   User Training?
7. Emerging technologies? Lessons Learned? Case Studies?           24
Communications Security Establishment Canada
                      y
         Cyber and Supply Threats to the GC




                     Carey Frey
   Director of the Strategic Relationships Office
                                                    25
Cyber and Supply Chain Threats to the GC

       E-mail Transformation Initiative
       E   il T    f    ti I iti ti
                     Industry Day




                    June 12, 2012
Carey Frey, Communications Security Establishment Canada



                                                       26
UNCLASSIFIED




               CSEC: What We Do

• CSEC C
  CSEC: Canada’s national cryptologic agency
            d ’    ti   l     t l i

• Our Mandate
   – Signals Intelligence
   – IT Security
   – S
     Support to Lawful Access
            tt L f lA


• ‘B’ Mandate
   B
   – To provide advice, guidance and services to help ensure the
     protection of electronic information and of information
     infrastructures of importance to the Government of Canada
                                                          Canada.


                                                                    27
UNCLASSIFIED




        CSEC: IT Security Program

• W help prevent, d t t and d f d against IT security
  We h l          t detect d defend  i t          it
  threats and vulnerabilities.

• CSEC provides unique technical expertise, capabilities
  and classified information that we use to complement
  commercial security technologies available to IT
  security practitioners.

• We use our own methods and operations to detect and
  defend against threats that are not in the public domain.


                                                              28
UNCLASSIFIED




Effects of Market Forces on Technology

•   Market forces favour commercial and personal technologies over
    requirements for security features

•   Our society is almost totally dependent on software and hardware
              y                 y p
    commercial technology providers from global markets

•   New products and new versions of products are rapidly produced

•   No regulatory framework exists for hardware/software safety and security

•   Traditional government policies and processes impose security
    requirements after products and systems have been developed

•   Few incentives for commercial technology developers to invest in security
                                          gy                                y



                                                                                29
UNCLASSIFIED




                 Technology Vulnerabilities

•   “People write software sloppily Nobody checks it for mistakes before it gets sold”
     People                sloppily.                                             sold
     –   Peiter Zatko (Mudge), WhiteHouse Cyber-Security Summit (2000)



•   Unintentional vulnerabilities or weaknesses
     –   Design flaws
     –   Implementation errors

•   Cyber Threat – A threat actor, using the Internet, takes advantage of a known
    vulnerability in a product for the purpose of exploiting a network and the information
    the network carries

•   Intentional vulnerabilities or weaknesses
     –   Predetermined deliverables can be implanted in a product with or without knowledge of
         company

•   Supply Chain Threat – a product can be easily tampered with in the supply chain to
    later facilitate a cyber-intrusion against that product in order to exploit a network and
    the information the network carries




                                                                                                 30
UNCLASSIFIED




        The Evolving Cyber-Threat
                     Cyber Threat

• O l af
  Only few years ago the situation was very different
                     th it ti               diff    t

• Today, cyber attacks occur daily against Canada and
          cyber-attacks
  our closest allies

• Threat actors range in sophistication from malfeasant
  hackers to organized crime groups, to terrorists to
  nation states

• Canadians trust the GC to defend Canada’s cyber
  sovereignty and p
          g y     protect and advance our national
  security and economic interests
                                                          31
UNCLASSIFIED




          An Issue of National Security

•   Risks from vulnerable technologies
     – Persistent, covert access by cyber threat actors to GC e-mail systems
       threatens the sovereignty of GC information and the integrity of government
       operations
     – C b th t actors are effective at exploiting both e-mail t h l i and
       Cyber threat t           ff ti    t    l iti b th       il technologies d
       human behaviours through the use of e-mail systems

•   Risks from complexity
     – Consolidation of the GC e-mail systems are a prerequisite for manageable
       cyber protection & defence
     – Security through obscurity is not a viable long-term strategy to deter cyber
       threat actors

•   Risks from the supply chain
     – Increases opportunities for threat actors to compromise systems that have
       been hardened against cyber intrusions
                                cyber-intrusions
     – More difficult for the GC to detect and remediate


                                                                                      32
UNCLASSIFIED




            Counterfeit Cisco Equipment **

  •   An FBI investigation res lted in the disco er of 3500 co nterfeit
             in estigation resulted        discovery        counterfeit
      Cisco components in networks of US military agencies, military
      contractors and electric power companies

  •   “…a number of industry executives and technologists said that the
      threat of secretly added circuitry intended to subvert computer and
      network gear is real.”

  •   Counterfeit equipment is sold over the Internet and then resold to
      government as legitimate equipment at the full price

  •   Government procurement processes which use layers of
      contractors and subcontractors adds to the problem

** New York Times (May 9, 2008)

                                                                            33
UNCLASSIFIED




      US Military Bans Disks USB Drives **
                       Disks,

  •    A virus called Agent bt spread b cop ing itself to th mb dri es
          ir s        Agent.btz       by copying          thumb drives
       and other removable computer media

  •    The most significant incident ever acknowledged by the Pentagon

  •    “Someone was able to get past the firewalls and encryption
       devices of the US military and sit there for days they could read
                                                    days…they
       documents…the could interfere with things”

  •    “(Jim) Lewis believes it was done by foreign spies who left
        (Jim)
       corrupted thumbnail drives…around…in places where…personnel
       were likely to pick them up.”


** 60 Minutes (Nov 8, 2009)

                                                                           34
UNCLASSIFIED




     GC Shared Services Procurements

•   Shared Services Canada CSEC & PWGSC are working in partnership to
                      Canada,
    mitigate the risks to the GC from cyber threats & global supply chain
    vulnerabilities.

•   CSEC will provide follow up briefings on supply chain risk mitigation to
                       follow-up
    interested suppliers for GC shared services.
     – Companies must be willing to sign a CSEC non-disclosure agreement to
       receive this information

•   Security requirements for cyber-protection, cyber-defence and supply
    chain risk mitigation must be met by suppliers in order to successfully bid
    on GC shared services initiatives.
     – As the IT Security authority for the GC CSEC will seek long-term partnerships
                                            GC,               long term
       with successful suppliers.

•   Examples of these requirements can be found on CSEC’s website under
    Technology Supply Chain Guidance.



                                                                                       35
Email Transformation Initiative
             Procurement Approach

Normand Masse
          Masse,                Photo to be
                                 inserted
Director General,
Services and Technology
                     gy
Acquisition Management Sector



                                              36
Industry Engagement Phase

               Industry
  Industry                                              Responses    RFI Clarifications
             Engagement    RFI Posting   RFI Industry
Engagement                                              to the RFI   and One-on-One
             One-on-One                   Workshop
    Day                                                                  meetings
              meetings



 12 June     13 -15 June    22 June        5 –6 July      18 July      27 -31 July
  2012          2012         2012*          2012*         2012*          2012*




*Dates are tentative


                                                                                      37
Procurement Approach
Collaborative Procurement Solution (CPS)


             Request for
  Industry   Responses     Review & Refine       Bid
Engagement      for         Requirements     Solicitation    Award     Implementation
   Phase
   Ph                           Phase          Phase
                                                 h          Contract       Phase
             Evaluation
               Phase




                                                                                         38
                                                                                        38
Request for Response for
          Evaluation (RFRE)
• Identify respondents to advance to the Review and
  Refine Requirements phase
• RFRE evaluation could b b
             l ti        ld be based on:
                                   d
    Capability and experience to deliver email
     services in a secure and timely manner
    Financial Viability
    Security clearance
• Your input on these elements will be sought during
  the RFI portion of the engagement phase


                                                       39
Review and Refine Requirements
• Successful respondents from the RFRE will
  work jointly with Canada to review and
  finalize the technical and solicitation
  requirements
• The successful respondents may be asked to
  demonstrate how their solution will meet
  specific requirements
    p        q
• The results will be used to finalize the formal
  Request for Proposal (
      q            p      (RFP) document
                               )

                                                    40
Bid Solicitation
• Formal RFP issued to the successful
  respondents that have completed the Review
  and Refine Requirements phase
• Each successful respondent to formally
  respond to the full set of requirements
• Canada will conduct a comprehensive
  evaluation and select the proposal which
  provides the best value to Canada


                                               41
Contract Award and Implementation

 • Contract Award
 • Implementation / migration period estimated
   at 18 to 24 months
 • The new solution is expected to be fully
   in-service by the end of March 2015




                                                 42
43
44

Mais conteúdo relacionado

Semelhante a Email Transformation Industry Engagement Day Briefing

Shared Services Canada - A Transformational Journey Through Enterprise Initia...
Shared Services Canada - A Transformational Journey Through Enterprise Initia...Shared Services Canada - A Transformational Journey Through Enterprise Initia...
Shared Services Canada - A Transformational Journey Through Enterprise Initia...KBIZEAU
 
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...AIIM International
 
Partnering Conf Presentations
Partnering Conf PresentationsPartnering Conf Presentations
Partnering Conf Presentationsaztechcouncil
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentationJames Sutter
 
Partners in Technology 11Oct2013 DSDIP DLGCRR Mark Cushing
Partners in Technology 11Oct2013 DSDIP DLGCRR Mark CushingPartners in Technology 11Oct2013 DSDIP DLGCRR Mark Cushing
Partners in Technology 11Oct2013 DSDIP DLGCRR Mark CushingDigital Queensland
 
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government Tim Willoughby
 
Who Made This Mess?
Who Made This Mess?Who Made This Mess?
Who Made This Mess?mmiddaugh
 
Digital Transformation Map
Digital Transformation MapDigital Transformation Map
Digital Transformation Maposcarallejandro
 
Transitioning projTransitioning Projects and Services into Production - by Ms...
Transitioning projTransitioning Projects and Services into Production - by Ms...Transitioning projTransitioning Projects and Services into Production - by Ms...
Transitioning projTransitioning Projects and Services into Production - by Ms...NUS-ISS
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura StanfordIdentityNorthEvents
 
Peritus Infogain Connect for Google Workspace-Partnership V1.pptx
Peritus Infogain Connect for Google Workspace-Partnership V1.pptxPeritus Infogain Connect for Google Workspace-Partnership V1.pptx
Peritus Infogain Connect for Google Workspace-Partnership V1.pptxVishalBajpai37
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsNandita Nityanandam
 
debashish adhikari
debashish adhikaridebashish adhikari
debashish adhikariTere Deb
 
e-Government Solutions by The Digital Group
e-Government Solutions by The Digital Groupe-Government Solutions by The Digital Group
e-Government Solutions by The Digital GroupThe Digital Group
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
The wessex colleges_partnership_why_choose_cloud
The wessex colleges_partnership_why_choose_cloudThe wessex colleges_partnership_why_choose_cloud
The wessex colleges_partnership_why_choose_cloudAssociation of Colleges
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010AITPHouston
 
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...Ameur BENTOUTA
 

Semelhante a Email Transformation Industry Engagement Day Briefing (20)

Shared Services Canada - A Transformational Journey Through Enterprise Initia...
Shared Services Canada - A Transformational Journey Through Enterprise Initia...Shared Services Canada - A Transformational Journey Through Enterprise Initia...
Shared Services Canada - A Transformational Journey Through Enterprise Initia...
 
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
 
Partnering Conf Presentations
Partnering Conf PresentationsPartnering Conf Presentations
Partnering Conf Presentations
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentation
 
Partners in Technology 11Oct2013 DSDIP DLGCRR Mark Cushing
Partners in Technology 11Oct2013 DSDIP DLGCRR Mark CushingPartners in Technology 11Oct2013 DSDIP DLGCRR Mark Cushing
Partners in Technology 11Oct2013 DSDIP DLGCRR Mark Cushing
 
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
 
Who Made This Mess?
Who Made This Mess?Who Made This Mess?
Who Made This Mess?
 
Digital Transformation Map
Digital Transformation MapDigital Transformation Map
Digital Transformation Map
 
Transitioning projTransitioning Projects and Services into Production - by Ms...
Transitioning projTransitioning Projects and Services into Production - by Ms...Transitioning projTransitioning Projects and Services into Production - by Ms...
Transitioning projTransitioning Projects and Services into Production - by Ms...
 
rob5pcopynow
rob5pcopynowrob5pcopynow
rob5pcopynow
 
EH CV Dec 15
EH CV Dec 15EH CV Dec 15
EH CV Dec 15
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura Stanford
 
Peritus Infogain Connect for Google Workspace-Partnership V1.pptx
Peritus Infogain Connect for Google Workspace-Partnership V1.pptxPeritus Infogain Connect for Google Workspace-Partnership V1.pptx
Peritus Infogain Connect for Google Workspace-Partnership V1.pptx
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common Confusions
 
debashish adhikari
debashish adhikaridebashish adhikari
debashish adhikari
 
e-Government Solutions by The Digital Group
e-Government Solutions by The Digital Groupe-Government Solutions by The Digital Group
e-Government Solutions by The Digital Group
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
The wessex colleges_partnership_why_choose_cloud
The wessex colleges_partnership_why_choose_cloudThe wessex colleges_partnership_why_choose_cloud
The wessex colleges_partnership_why_choose_cloud
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010
 
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
 

Mais de KBIZEAU

Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...KBIZEAU
 
Review of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessReview of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessKBIZEAU
 
Delivering Public Sector Innovation
Delivering Public Sector InnovationDelivering Public Sector Innovation
Delivering Public Sector InnovationKBIZEAU
 
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...KBIZEAU
 
Government of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationGovernment of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationKBIZEAU
 
Hill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaHill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaKBIZEAU
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
Itir oct0714-afac report-en
Itir oct0714-afac report-enItir oct0714-afac report-en
Itir oct0714-afac report-enKBIZEAU
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-enKBIZEAU
 
Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014KBIZEAU
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-enKBIZEAU
 
2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canadaKBIZEAU
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
Ssc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planSsc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planKBIZEAU
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2KBIZEAU
 
2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-enKBIZEAU
 
2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-enKBIZEAU
 
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...KBIZEAU
 
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedNetwork Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedKBIZEAU
 
Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015KBIZEAU
 

Mais de KBIZEAU (20)

Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
 
Review of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessReview of the Collaborative Procurement Process
Review of the Collaborative Procurement Process
 
Delivering Public Sector Innovation
Delivering Public Sector InnovationDelivering Public Sector Innovation
Delivering Public Sector Innovation
 
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
 
Government of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationGovernment of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning Presetation
 
Hill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaHill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanada
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Itir oct0714-afac report-en
Itir oct0714-afac report-enItir oct0714-afac report-en
Itir oct0714-afac report-en
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Ssc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planSsc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business plan
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en
 
2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en
 
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
 
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedNetwork Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
 
Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015
 

Último

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 

Último (20)

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

Email Transformation Industry Engagement Day Briefing

  • 1.
  • 2. Industry Day Objective Today’s goal is to inform and seek feedback from industry on  T d ’ li t i f d k f db k f i d t the Email Transformation Initiative. This includes: • Providing an overview and expected business outcomes for Providing an overview and expected business outcomes for  the Email Transformation Initiative;  • Assessing the level of interest from industry in providing a  solution for the modern email platform for the Government  of Canada; and  of Canada; and • Gathering input  on the procurement approach for the  Initiative.  2
  • 3. Industry Engagement Day Agenda Time Presenter Description 1:30-1:35 Moderator  Industry Day Objectives 1:35 – 1:50 President, President Shared Services Canada  Welcome ADM, Acquisitions Branch, Public Works and 1:50 – 2:00  Procurement Opening Remarks Government Services Canada Shared Services Canada:  Email Transformation Initiative Senior Assistant Deputy Minister of Description and Objectives 2:00 – 3:00 Transformation, Service Strategy and Design  Current State  Scope and Requirements Director General, Email Transformation  Solution Options being Considered 3:00 – 3:15 Break Communications Security Establishment  Cyber and Supply Threats to the 3:15 – 3:35 Canada Government of Canada Acquisitions Branch  Industry Engagement 3:35 – 3:50 Public Works and Government Services  Overview of the Collaborative Canada Procurement Solutions Approach 3:50 – 4:45 Questions and Answers 4:45 – 5:00 Recap and Closing Remarks 3
  • 4. Shared Services Canada Liseanne Forand, President of Shared Services Canada 4
  • 5. Public Works and Government Services Canada Tom Ring Assistant Deputy Minister, Acquisitions Branch
  • 6. Email Transformation Initiative Industry Engagement Day Briefing I d E D B i fi Benoît Long, Senior Assistant Deputy Minister, Transformation, Services Strategy and Design Gail E G il Eagen Director General Email Transformation Initiative 6
  • 7. Email Transformation I iti ti E il T f ti Initiative 7
  • 8. Email Transformation Initiative Overview • Project Objective • Business Drivers i i • Desired Business Outcomes • Current State • Project Scope • Email Service Delivery Options • Key Requirements • Other Considerations  • Areas we need your input … 8
  • 9. Email Transformation Initiative (ETI) Overall Project Objective The Email Transformation Initiative (ETI) will consolidate and  modernize Shared Services Canada (SSC) mandated email  services to reduce costs, increase security, and enhance  program delivery to Canadian citizens and businesses. Shared Services Canada will offer the new service to rest of  Government of Canada. 9
  • 10. Business Drivers Industry benchmarks for email have identified significant cost  savings potential for the Government of Canada  savings potential for the Government of Canada Complexity  100 different email system configurations across the  Government of Canada  Within the 43 SSC Partner Departments and Agencies: Within the 43 SSC Partner Departments and Agencies:  81% using Microsoft Exchange   13% Novell GroupWise   6% IBM Lotus Notes –  A range of software versions installed   Increasing demand for mobile access (Blackberry Tablets etc ) Increasing demand for mobile access (Blackberry, Tablets, etc.)  10
  • 11. Business Drivers Security Pressures  Citizens and private sector  organizations rely on on‐line services  i i l li i to communicate with the Government of Canada   Email is a key channel   Email security has been implemented using different  strategies to meet departmental requirements  Cyber‐threats are on the rise Cyber threats are on the rise  Service Delivery Consistency  Varied service levels are in place across the  partner organizations   Complex email naming conventions are in Complex email naming conventions are in  place  11
  • 12. Desired Business Outcomes • Establishment of a consolidated email solution for the  Government of Canada, starting with our partners and then  Government of Canada starting with our partners and then offering to other departments and agencies • Reduction in costs to deliver email services Reduction in costs to deliver email services  • Continuous improvement to the security posture of email services  so that programs and services can be delivered securely and  reliably to Canadians • Consistent naming standards  • Common service levels for all users  • Secure and reliable email service that can process emails ‐ Classified up to Secret and Designated up to Protected C  12
  • 13. Current State Access for Canadian Citizens & Business Effectiveness – Productivity Tool • Email is a channel of communications for  • The GC could make better use of email by  y citizens/business to access GC programs  segmenting users into groups based on  but not used extensively for transactions  the functions they need (i.e. Civilian and  • Current state is complicated by  Military, or mobile and non‐mobile users) numerous departmental naming  • Current systems do not promote Current systems do not promote  conventions, security and privacy  collaboration among departments and  concerns agencies (i.e. Non‐integrated calendaring) Costs Security and Performance • Benchmarks show the GC has  • Current systems are complex: significant opportunity for cost savings • Different technologies  • 63 63 email systems in 43 SSC partners il t i 43 SSC t • At least 700 email directories At least 700 email directories  • Distributed and centralized systems in place • 377,804 employees, 637,000 mailboxes  • High diversity ‐ difficult to standardize and 70,000+ Blackberries • Systems require standardization for  • 1700+ email servers records management, retention policy and  d t t ti li d privacy  13
  • 14. ETI: What is in Scope? Functional Other • Email  Classified up to Secret and Designated  • Classified up to Secret and Designated • Instant messaging up to Protected C • Calendar  • All SSC Partner Locations in Canada, as  • Personal Contacts Personal Contacts well as all Embassies and Missions well as all Embassies and Missions • Personal and Shared Email Folders  • Data Migration and Transition  • Email Fax Service Integration • Implementation and Training Support • Historical Email Access (Email Historical Email Access (Email  Archiving) • On‐going Email and User Support • Email Directory • Integration Support for GC ”Corporate” • Email Anti Virus / Anti Spam Email Anti‐Virus / Anti‐Spam and “Program” applications (via  and “Program” applications (via • Mobile Device Management  standard interface toolkits) (Blackberry, Smart Phone, Tablet) 14
  • 15. ETI: What is out of scope? Functional Other • Integrated Inbox (e.g. Voicemail  • Top Secret Email Systems Integration) • Email services for mobile physical  • Collaborative Workspaces Collaborative Workspaces platforms (i.e. DND Naval Ships) • Wikis, Blogs and Forums • Desktop Management (excluding email  • Office Productivity Suites (except for Office Productivity Suites (except for  client) li t) the email client) 15 15
  • 16. Where we need more industry feedback… y Options Descriptions Details Vendor would design, build and  Managed Service  Crown Owned, Vendor  operate the new email system on GC  operate the new email system on GC (Hybrid) ( b id) Operated d managed premise. Fully Outsourced  Vendor Owned &  Vendor would design, build and  Service i Operated d provide an email service to the GC.   id il i h 1. SSC recognizes that there is a  continuum of infrastructure 1 SSC recognizes that there is a “continuum” of infrastructure  sourcing options for Managed Services and Full Outsourcing. 2. SSC  is interested in hearing about any other options that  industry considers viable and cost effective to meet SSC’s needs. bl ff ’ 3. SSC has made significant investments in hardware, software,  training and application integration.  SSC is interested in hearing  training and application integration SSC is interested in hearing how industry would leverage this investment as Government  Furnished Equipment (GFE).  16
  • 17. Key Requirements y q BUSINESS AND FUNCTIONAL REQUIREMENTS 1. CONSOLIDATED EMAIL ‐ The email solution must consolidate and modernize Shared Services  Canada (SSC) mandated email services for SSC and its Partners. The new solution must be  Canada (SSC) mandated email services for SSC and its Partners The new solution must be made available to the rest of the Government of Canada.  2. USER FRIENDLY ‐ The email service must be user‐friendly and intuitive, requiring limited  formal training.   formal training 3. ACCESSIBLE – The service must be available to all SSC partner locations in Canada, as well as  all Embassies and Missions abroad.  The system must be available in both official languages.  The email solution must meet the standards on accessibility, and accommodate those with  special needs, e.g. interoperability with applications to support visually and hearing impaired  employees. 4. MOBILITY SUPPORT ‐ The service must provide Mobile Device Management capabilities for  platforms such as Research in Motion (RIM) Blackberries, Apple iPhones and iPads, and  Android/Windows smart phones and tablets. 5. AVAILABLE AND RELIABLE ‐ The email service has a target of 100% uptime for users, on a  24/7/365 basis. 17
  • 18. Key Requirements BUSINESS AND FUNCTIONAL REQUIREMENTS 6. 6 BROAD INTELLIGENT SEARCH ‐ The service must support end‐user email message  BROAD INTELLIGENT SEARCH The service must support end user email message and content search. 7. LOCAL EMAIL ADMINISTRATION SUPPORT – The service must allow for SSC and  partner personnel to perform email administrative functions such as adding and  removing accounts, and resetting passwords.  8. 8 LEGISLATIVE AND POLICY ALIGNMENT – The service must adhere to existing  LEGISLATIVE AND POLICY ALIGNMENT Th i t dh t i ti Legislation and Treasury Board instruments (e.g. policies, standards, guidelines).    Note: Treasury Board Secretariat is addressing any policy gaps resulting from the  implementation of a “cross government” email service.  p g 9. TIME SENSITIVE ‐ The end date for the implementation (including migration) is  targeted for March 31, 2015.   10. COST EFFECTIVE – This initiative must enable the Government of Canada to deliver  email services at costs that are on par with industry and peer groups.  18
  • 19. Key Requirements SECURITY  and PRIVACY REQUIREMENTS 1. SECURE ‐ The new email service must be certified to accommodate emails:  Classified up to Secret and Designated up to Protected C.  Classified up to Secret and Designated up to Protected C 2. LAYERED SECURITY ‐ The service must support layered security controls, such as:  ‐ Perimeter security services (e.g. firewall, anti‐virus, anti‐spam) ‐ Protection from threats to the data at rest (e.g. access control) ‐ Protection for data in motion (e.g. encryption) 3. TRUSTED SUPPLY CHAIN – Please reference CSEC Presentation “Cyber and Supply  Threats to the Government of Canada” for more information on this requirement. 4. PRIVACY ‐ The service must ensure that information is accessible only to those  authorized. The service must comply with the statutory obligations under the  Privacy Act and the Access to Information Act. 5. NATIONAL SECURITY EXCEPTION (NSE) – The Email Transformation Initiative falls  under the NSE recently invoked by PWGSC on behalf of SSC.  19
  • 20. Key Requirement: Vendor Security Profile • SSC will be finalizing the Vendor Security Profile requirements after  the Industry Engagement phase.  the Industry Engagement phase • Our objective is to provide as much time as possible for companies Our objective is to provide as much time as possible for companies  to arrange their security clearance.   Please go to http://ssi-iss.tpsgc-pwgsc.gc.ca/questions/esosp-psos-eng.html for more information information. • Companies should expect that personnel assigned after the industry  engagement phase will be required to be security cleared to Secret.  Companies can expect that at the RFP stage, all bidders must satisfy  all security requirements.  all security requirements 20
  • 21. Key Requirement: Data Sovereignty Principle Pi i l SSC will safeguard the security and privacy of all data for which it is responsible and will  ensure the Government of Canada’s requirements with respect to data sovereignty are met.  Vendors will be required to demonstrate their ability to maintain Government of Canada data  Vendors will be required to demonstrate their ability to maintain Government of Canada data sovereignty. At a minimum: 1. All data are the property of the Government of Canada 2. All data infrastructure components for the email system must reside in Canada a. All email servers and data repositories must be housed in Canada b. Off site storage must be housed within secure approved location(s) in Canada b Off‐site storage must be housed within secure approved location(s) in Canada c. All GC internal emails sent from government users located in Canada  or abroad  to  other government users located in Canada or abroad must travel through appropriately  secured networks;  Any redirections of emails by vendors not expressly following these  two circumstances will not be accepted. No data in transit will be saved or stored  ll b d d ll b d d between the starting and end‐point. 3. The email solution must contain access controls and/or monitors on data repositories and  p y , y, , , , / other computer systems, such that SSC may, at its discretion, restrict, monitor, and/or  audit access to the government’s data 4. No limitation of liability in the event of a security or privacy breach 21
  • 22. Key Requirements TECHNOLOGY PLATFORM REQUIREMENTS 1. OPEN STANDARDS SUPPORT – The service must be compliant with industry  standards using open, non‐proprietary standard interfaces. 2. LEGACY SYSTEM INTEGRATION TOOLKIT – The service must provide an integration  toolkit for partners to leverage in order to integrate their business applications into  the new email service.  3. ACCESS MANAGEMENT – The service must manage user profiles, credentials,  authentication, and authorization.  22
  • 23. Key Requirements IMPLEMENTATION AND MIGRATION REQUIREMENTS 1. EMAIL MIGRATION – Existing email content/data must be migrated to the new  service, including file attachments.   2. SMOOTH TRANSITION – Existing functionality must be in place during the transition  wherever possible. Minimal impacts to users are expected.  Minimal training will be  required. IT SERVICE MANAGEMENT REQUIREMENTS 1. SSC IT SERVICE MANAGEMENT INTEGRATION – The vendor will be expected to  integrate with the IT Service Management processes and tools of SSC and its  Partners.  The level of integration may vary depending on service delivery sourcing  option.  option 23
  • 24. Areas we need your input… 1. Email Service Delivery options and considerations? 2. Email Application Platform options? How can GC leverage  Government Furnished Equipment (GFE)? G tF i h dE i t (GFE)? 3. Alternatives for the underlying Infrastructure Services?   4. Options for a user friendly identity, credential and access  management? 5. Strategies to meet the security requirements of Secret email and  5 Strategies to meet the security requirements of Secret email and the GC’s requirements for data sovereignty? 6. Minimizing costs, complexity and business impacts for: 6 Minimizing costs complexity and business impacts for: I. Data Migration? II. Application Integration? III. User Training? 7. Emerging technologies? Lessons Learned? Case Studies? 24
  • 25. Communications Security Establishment Canada y Cyber and Supply Threats to the GC Carey Frey Director of the Strategic Relationships Office 25
  • 26. Cyber and Supply Chain Threats to the GC E-mail Transformation Initiative E il T f ti I iti ti Industry Day June 12, 2012 Carey Frey, Communications Security Establishment Canada 26
  • 27. UNCLASSIFIED CSEC: What We Do • CSEC C CSEC: Canada’s national cryptologic agency d ’ ti l t l i • Our Mandate – Signals Intelligence – IT Security – S Support to Lawful Access tt L f lA • ‘B’ Mandate B – To provide advice, guidance and services to help ensure the protection of electronic information and of information infrastructures of importance to the Government of Canada Canada. 27
  • 28. UNCLASSIFIED CSEC: IT Security Program • W help prevent, d t t and d f d against IT security We h l t detect d defend i t it threats and vulnerabilities. • CSEC provides unique technical expertise, capabilities and classified information that we use to complement commercial security technologies available to IT security practitioners. • We use our own methods and operations to detect and defend against threats that are not in the public domain. 28
  • 29. UNCLASSIFIED Effects of Market Forces on Technology • Market forces favour commercial and personal technologies over requirements for security features • Our society is almost totally dependent on software and hardware y y p commercial technology providers from global markets • New products and new versions of products are rapidly produced • No regulatory framework exists for hardware/software safety and security • Traditional government policies and processes impose security requirements after products and systems have been developed • Few incentives for commercial technology developers to invest in security gy y 29
  • 30. UNCLASSIFIED Technology Vulnerabilities • “People write software sloppily Nobody checks it for mistakes before it gets sold” People sloppily. sold – Peiter Zatko (Mudge), WhiteHouse Cyber-Security Summit (2000) • Unintentional vulnerabilities or weaknesses – Design flaws – Implementation errors • Cyber Threat – A threat actor, using the Internet, takes advantage of a known vulnerability in a product for the purpose of exploiting a network and the information the network carries • Intentional vulnerabilities or weaknesses – Predetermined deliverables can be implanted in a product with or without knowledge of company • Supply Chain Threat – a product can be easily tampered with in the supply chain to later facilitate a cyber-intrusion against that product in order to exploit a network and the information the network carries 30
  • 31. UNCLASSIFIED The Evolving Cyber-Threat Cyber Threat • O l af Only few years ago the situation was very different th it ti diff t • Today, cyber attacks occur daily against Canada and cyber-attacks our closest allies • Threat actors range in sophistication from malfeasant hackers to organized crime groups, to terrorists to nation states • Canadians trust the GC to defend Canada’s cyber sovereignty and p g y protect and advance our national security and economic interests 31
  • 32. UNCLASSIFIED An Issue of National Security • Risks from vulnerable technologies – Persistent, covert access by cyber threat actors to GC e-mail systems threatens the sovereignty of GC information and the integrity of government operations – C b th t actors are effective at exploiting both e-mail t h l i and Cyber threat t ff ti t l iti b th il technologies d human behaviours through the use of e-mail systems • Risks from complexity – Consolidation of the GC e-mail systems are a prerequisite for manageable cyber protection & defence – Security through obscurity is not a viable long-term strategy to deter cyber threat actors • Risks from the supply chain – Increases opportunities for threat actors to compromise systems that have been hardened against cyber intrusions cyber-intrusions – More difficult for the GC to detect and remediate 32
  • 33. UNCLASSIFIED Counterfeit Cisco Equipment ** • An FBI investigation res lted in the disco er of 3500 co nterfeit in estigation resulted discovery counterfeit Cisco components in networks of US military agencies, military contractors and electric power companies • “…a number of industry executives and technologists said that the threat of secretly added circuitry intended to subvert computer and network gear is real.” • Counterfeit equipment is sold over the Internet and then resold to government as legitimate equipment at the full price • Government procurement processes which use layers of contractors and subcontractors adds to the problem ** New York Times (May 9, 2008) 33
  • 34. UNCLASSIFIED US Military Bans Disks USB Drives ** Disks, • A virus called Agent bt spread b cop ing itself to th mb dri es ir s Agent.btz by copying thumb drives and other removable computer media • The most significant incident ever acknowledged by the Pentagon • “Someone was able to get past the firewalls and encryption devices of the US military and sit there for days they could read days…they documents…the could interfere with things” • “(Jim) Lewis believes it was done by foreign spies who left (Jim) corrupted thumbnail drives…around…in places where…personnel were likely to pick them up.” ** 60 Minutes (Nov 8, 2009) 34
  • 35. UNCLASSIFIED GC Shared Services Procurements • Shared Services Canada CSEC & PWGSC are working in partnership to Canada, mitigate the risks to the GC from cyber threats & global supply chain vulnerabilities. • CSEC will provide follow up briefings on supply chain risk mitigation to follow-up interested suppliers for GC shared services. – Companies must be willing to sign a CSEC non-disclosure agreement to receive this information • Security requirements for cyber-protection, cyber-defence and supply chain risk mitigation must be met by suppliers in order to successfully bid on GC shared services initiatives. – As the IT Security authority for the GC CSEC will seek long-term partnerships GC, long term with successful suppliers. • Examples of these requirements can be found on CSEC’s website under Technology Supply Chain Guidance. 35
  • 36. Email Transformation Initiative Procurement Approach Normand Masse Masse, Photo to be inserted Director General, Services and Technology gy Acquisition Management Sector 36
  • 37. Industry Engagement Phase Industry Industry Responses RFI Clarifications Engagement RFI Posting RFI Industry Engagement to the RFI and One-on-One One-on-One Workshop Day meetings meetings 12 June 13 -15 June 22 June 5 –6 July 18 July 27 -31 July 2012 2012 2012* 2012* 2012* 2012* *Dates are tentative 37
  • 38. Procurement Approach Collaborative Procurement Solution (CPS) Request for Industry Responses Review & Refine Bid Engagement for Requirements Solicitation Award Implementation Phase Ph Phase Phase h Contract Phase Evaluation Phase 38 38
  • 39. Request for Response for Evaluation (RFRE) • Identify respondents to advance to the Review and Refine Requirements phase • RFRE evaluation could b b l ti ld be based on: d  Capability and experience to deliver email services in a secure and timely manner  Financial Viability  Security clearance • Your input on these elements will be sought during the RFI portion of the engagement phase 39
  • 40. Review and Refine Requirements • Successful respondents from the RFRE will work jointly with Canada to review and finalize the technical and solicitation requirements • The successful respondents may be asked to demonstrate how their solution will meet specific requirements p q • The results will be used to finalize the formal Request for Proposal ( q p (RFP) document ) 40
  • 41. Bid Solicitation • Formal RFP issued to the successful respondents that have completed the Review and Refine Requirements phase • Each successful respondent to formally respond to the full set of requirements • Canada will conduct a comprehensive evaluation and select the proposal which provides the best value to Canada 41
  • 42. Contract Award and Implementation • Contract Award • Implementation / migration period estimated at 18 to 24 months • The new solution is expected to be fully in-service by the end of March 2015 42
  • 43. 43
  • 44. 44