SlideShare a Scribd company logo
1 of 28
Identify a law that regulates how employees are treated in the
workplace. Research an example of when a company fell afoul
of that law and detail the consequences. 1-3 pages.
CASE STUDY: IT RISK
MANAGEMENT
HIGH GEAR ENGINE COMPANY
ASSIGNMENT OVERVIEW
Summary: As a team, students should present their proposed
solution to the case. Your
presentation should lay out clear recommendations for how
management should
address the problem.
Presentation
Deliverable1:
Case study presentation (in Microsoft PowerPoint format).
Executive Briefing
Deliverable:
Single page case study executive briefing (in Microsoft
PowerPoint format).
BACKGROUND
High Gear Engine Company (HG) is a global automotive
supplier with operations around the world.
Founded in 1937, HG specializes in engines for all kinds of
automobiles, from high-end sports cars to
farming equipment. HG is split into three business units (BU)
that operate fairly independently and are
marketed under different brand names:
1. Velocity Engines – Focuses on high-end sports cars and
consumer-grade engines. These
products command a premium in the market and
2. Long Haul Motors – Produces diesel and large engines for
semi-trailer trucks. Long haul is known
well known in the market for its durability and is a recognized
leader in the trucking industry.
3. Bigger Digger Power and Motor – Specializes in mining
equipment engines and motors. They
supply to the major mining and industrial equipment
manufacturers and often “white label” their
engines as their customers’ brand.
HG is located in Detroit, Michigan and has over 75 plants,
performance labs and manufacturing facilities
worldwide. Like most automotive suppliers and original
equipment manufacturers (OEM), HG was hit hard
by the economic downturn of 2008. Faced with bankruptcy, HG
was forced to reduce its employee
headcount and close several global locations. However, in the
recent five years business has turned
around and orders have picked up to the point that factories are
re-opening and the company is once
again profitable with global revenues totaling just over $9
billion (US). HG is planning for 17%
compounded annual revenue growth and has a healthy (and
growing) profit margin of 15%. HG is now
ready to begin its path to growth which will require major
change in the technology environment. This
includes upgrading its technology infrastructure and
applications that have been deferred for almost a
decade. Three weeks ago, a new CIO (Sara Miller) was
appointed by the board and has commissioned
two projects:
1 Presentation Deliverables are due only if your team is
assigned this case. All others should read the case and complete
the
Executive Briefing Deliverable assignment.
Professors Matt Stoltz and Meera Kesari Case Study: IT Risk
Management (High Gear Engine Company)
Page 2 Master of Science in Information Systems: IT
Governance, Risk and Controls (IT GRC)
1. IT Strategy and Roadmap – To determine the technology
vision for the future and how the
organization will get there. This strategy is very important since
HG is in growth mode but does
not have the technology resources in place to achieve its goals.
The executive committee (aka c-
suite), the board of directors, and ultimately the shareholders
are all looking to Miller to clearly
lay out a vision and a plan for rapidly elevating HG’s antiquated
technology capabilities.
2. IT Risk Management Analysis – To “uncover the hidden risks
lurking in the technology
environment,” as Miller put it. Miller knows that executing on a
transformative IT strategy of this
scale is fraught with risk, and with systems and applications
this old, there is much work to be
done.
Miller has brought in your team to execute the second initiative,
the IT Risk Management Analysis, to
determine the various IT risks that exist in HG IT and how to
mitigate them. Miller has a presentation to
the executive committee in 3 months and knows the timing will
be tight given the size and global scale of
the organization. She needs to understand the scope and
approach of how you will go about assessing
the risks and managing them to closure. She has emphasized
that the two projects are her biggest
priorities and she needs to know if there are any show-stoppers
preventing her from achieving the goals
as outlined in the strategy. Miller plans to use the IT risk
management analysis to:
initiatives,
the executive committee,
way of HG’s technology modernization
efforts, and
rics for herself, the IT
organization and HG as a whole.
Your team has just arrived on-site and have one week to prepare
a scope and approach document for
how to execute the engagement. Your time line is three months
to get all field work complete and help
Miller present her strategy and risk analysis to the executive
committee and the board of directors. Miller
did an initial scan of the environment and compiled some risks
she saw based on her own inquiry and
observation of the environment. Miller’s preliminary
observations are outlined below with a few key
questions she has as a result of her interviews with key
stakeholders in the organization.
HG INFORMATION TECHNOLOGY
At its peak, the HG IT department was 800 strong with
dedicated teams for each business unit and
centralized team to run the shared corporate IT systems. Long
ago HG IT was a very decentralized
organization with CIOs for each of the business who had dual
reporting lines to the president of each
business unit and to the global CIO of HG. There was a lot of
redundant systems and duplication of effort.
HG had 3 of every system and each business unit was as
different and ran completely differently: three
supply chain systems, three financial systems, three engineering
departments and product lifecycle
management systems, and the list went on. In fact, it took a
mandate from the CEO to get every business
unit on to one email, calendar, instant message system, and
domain name. The leadership knew that
centralizing and consolidating functions would yield cost
savings and efficiencies but it would also remove
autonomy and the freedom to guide their own technology
decisions. But there was little desire to do so
since all business units were growing very fast, beating analyst
estimates and were happy the way things
were. Then, 2008 hit and HG was forced into bankruptcy.
HG was bought by a private equity firm, Velocity Partners, who
instituted austerity measures to reduce
costs and save the core of the business. IT was among the
biggest departments hit with layoffs and cost
Professors Matt Stoltz and Meera Kesari Case Study: IT Risk
Management (High Gear Engine Company)
Page 3 Master of Science in Information Systems: IT
Governance, Risk and Controls (IT GRC)
reduction measures. Headcount plummeted to a skeleton crew of
300 IT personnel. BU IT personnel
were all but eliminated and each plant was given an IT support
manager. In many cases, the IT support
manager served all the plants and office locations within a 100
mile radius causing them to be
overworked and the business units to be generally unhappy with
the level of service it was receiving from
IT. BU CIOs were converted to manager liaisons and every
position was consolidated to the bare
minimum. Times were tough and any non-essential projects and
spend were put on-hold. Only projects
with guaranteed cost savings or revenue generating potential
were approved and every project and key
initiative had to go through a rigorous business case process
approved by the board of directors which
was heavily dominated by the majority owners, Velocity
Partners. Thus, routine upgrades, equipment
maintenance, and application/system enhancements were all
rejected as they did not have a clear benefit
that met Velocity’s project approval criteria.
The turmoil at High Gear eventually settled over time and HG
focused on business recovery and
profitability. The cost reduction and business development
initiatives were successful and HG won
several contracts with new clients that were looking to use the
economic downturn to its benefit and strike
while their competitors were reeling. As the recession subsided,
HG began to grow and expand to meet
its growing demand but nearly a decade had passed since the
bankruptcy and layoffs and still IT had
remained relatively the same: same headcount, same systems,
same applications and a growing list of
concerns that they were falling behind their competitors.
Even after all the cost-saving measures, HG still operated as
three independent business units with one
corporate function sitting atop. The BUs dictated the budget and
all costs were charged back to each of
the three business units in proportion to headcount or revenue
percentage; it was a fairly loose and
undefined chargeback model. Corporate IT attended to some of
the shared functions such as:
Strategy
Management
unications
The business units were responsible for the following IT
functions:
elationship Management
Systems
Management
-Floor Systems
The lists above are not exhaustive but do represent the majority
of the division of responsibility between
corporate IT and the business units.
Miller has her work cut out for her. She knows that she will
need to centralize core functions of IT for cost-
savings, efficiency purposes and to elevate HG’s capabilities
but she also does not want a cultural coup
on her hands if the business units get the sense that they are
losing control and autonomy. Miller is a
Professors Matt Stoltz and Meera Kesari Case Study: IT Risk
Management (High Gear Engine Company)
Page 4 Master of Science in Information Systems: IT
Governance, Risk and Controls (IT GRC)
seasoned executive and was brought into HG from another
automotive company and has a track record
of transforming IT into a leader and business enabler rather than
a support function. Because cost is
under a microscope, the office of the CIO reports to the CFO
(John Vargas). Miller told Vargas her plan
and he agreed she was on the right track approaching this from
a two-pronged approach: IT strategy and
IT risk. Vargas informed the board about Miller’s strategy and
risk initiatives and gave her the next board
meeting to brief them on the findings and recommendations.
The board must see a clear path forward
and understand how to get there. Vargas and the executive
committee know that they must spend money
over the next three years to modernize and upgrade HG’s IT
capabilities but they want to be smart about
it. They know they will never get back up to 800 IT personnel
but also know that incremental headcount,
restructuring and a substantial capital investment will be
required.
MILLER’S PRELIMINARY OBSERVATIONS
Miller’s first three weeks were spent interviewing all the major
business and IT stakeholders in the
company. She managed to talk to a good cross section of people
with knowledge and background on the
company and came up with some preliminary observations to
consider when putting together your plan of
attack:
information security function is viewed as
a part time job and is bundled together with IT Audit, IT
Compliance and IT Risk Management. No
one seems to be formally thinking about the threats to HG’s
information assets such as
engineering designs, new product information, sensitive
employee/customer information, and
confidential legal, strategy and merger/acquisition information.
web-based and internet-based,
they have put a strain on the infrastructure and internet
bandwidth. Peak hours of traffic are the
worst and several company executives have complained that
their email took one hour to
download during peak hours of 8:00 AM – 10:00 AM.
Something has to be done, especially if
more cloud-based applications are to be adopted.
are expensive to maintain.
The application portfolio
consists of roughly 235 ERP systems when you count the
different versions, instances and
regional implementations. This number only includes formal
ERP systems and not any of the
supporting business support systems, spreadsheets, transactional
systems or databases that
feed the ERP systems. If you could those, the number has been
estimated as high as 3,000 but
no one really knows. These ERP systems frequently go down
and troubleshooting them takes
precious personnel away from their core responsibilities. And
because enhancements, upgrades
and changes have not been made in years, many of the processes
that would automate simple
tasks (such as approvals, workflow and task management) are
done manually outside the
system. No one really knows how much this is costing the
company but everyone knows they are
unhappy with the current state.
reduction years ago, much of the
process maturity was lost. Users are informally provisioned and
de-provisioned access,
developers have access to the production environment and no
one is quite sure if there is a
formal disaster recovery (DR) plan in place. The person who
wrote the DR plan is long-gone and
HG IT has not found time or resources to dedicate to fixing it.
The external auditor has indicated
that if these issues are not fixed before the financial year-end,
HG is at risk of a “Significant
Deficiency” on their IT General Controls related to their
financial reports. This would have a
potential impact on stock price and investor confidence in the
HG brand.
Professors Matt Stoltz and Meera Kesari Case Study: IT Risk
Management (High Gear Engine Company)
Page 5 Master of Science in Information Systems: IT
Governance, Risk and Controls (IT GRC)
production line to stop.
The manufacturing and shop floor systems have been neglected
for over a decade. Even when
HG was at its peak, patches were not applied and systems were
left to run on their own.
Preventive maintenance did not exist and the systems were not
touched unless something went
wrong. Recently, three production lines went down for two days
each (two Velocity lines and one
Bigger Digger line) for various reasons. In the case of Velocity,
a vendor mandated patch had
been pushed out to the robotics system but it was not
compatible with Windows 2000, which is
widely used in production facilities despite the fact it is no
longer supported. When the patch was
pushed out, the line simply came to a halt. It was estimated that
HG lost $5 million per day in
revenue and contractual fines because they were not able to ship
the orders for the just-in-time
manufacturing required by its customers. Bigger Digger’s
production line outage is still unknown
and no one can explain why it happened. They have been
noticing their production line computer
systems “acting up” and doing strange things (e.g. restarting,
going to strange websites, and
popping up with adware, etc.) but no one yet understands the
root cause. Eventually, the plant
manager just went to Best Buy, bought a new computer, had the
IT support manager install the
necessary software and the line went back up again. The plant
manager was praised for his quick
thinking and troubleshooting but Miller knows this cannot
happen again.
company still runs on Windows XP
and most computers are over 5 years old. Employees regularly
complain about the slowness of
their PCs, especially as new corporate IT mandated software is
installed. Windows XP is no
longer supported by Microsoft so HG is paying expensive third-
party fees to support it while they
get their strategy together to upgrade the PCs and the operating
systems at the same time. Miller
even found out that some of the executive team went out and
bought Apple Macs and Microsoft
Surfaces just so they didn’t have to deal with the sluggish
corporate PCs.
systems work except the vendor.
When the austerity measures were put in place, Velocity
Partners brought in an off-shore vendor
to take over application development and maintenance. Most of
the internal IT resources who
understood how the applications and systems worked were let
go. Now that the vendor has been
in place, HG is at their mercy for any fixes or enhancements.
These are often done incorrectly or
with little quality assurance. Additionally, the vendor has
admitted they are short-staffed so there
is a large back-log of changes and enhancements that only they
can make. The vendor has also
raised their rates several times over the years. What started as a
cost savings measure is now
proving to be expensive and all HG can do is pay whatever they
ask because they are the only
ones who know how it works.
The observations list is not meant to be exhaustive; Miller
provided it to your team as background so you
can incorporate these into your plan and approach. As bad as
the problems are, she knows your team will
find more as you interview others and survey the organization.
She is interested in your thoughts on some
quick wins to address the observations but knows we must go
through the formal process and your
team’s recommended methodology for assessing and mitigating
IT risk.
YOUR TASK FOR THIS C ASE
SCOPE AND APPROACH FOR CONDUCTING THE AN
ALYSIS
When your team began the engagement on Monday, you had an
initial introductory meeting with Miller
and her staff where she described her preliminary observations
and gave your team the background. She
Professors Matt Stoltz and Meera Kesari Case Study: IT Risk
Management (High Gear Engine Company)
Page 6 Master of Science in Information Systems: IT
Governance, Risk and Controls (IT GRC)
wanted to know how the next three months would look and what
your team would be doing to get her the
findings and recommendations she needed. Miller is interested
in the:
– Miller wants to know what
risks and frameworks you leverage
and what. What is the list of risks and what will you look at to
conduct the analysis? What
questions will you ask and how will you interpret the results?
What business units and geographic
locations will you cover? What aspects of the business will you
cover and how do we know we
are being complete and now leaving anything out?
– Miller needs a clear plan for how
you will conduct the analysis. What is
the timing? How will you apply the framework to get
meaningful results? What are the phases of
the project? How will you make sure she meets her presentation
commitments to the executive
committee and board?
Fundamentally, Miller would like to see a kick-off deck that
describes the scope of the engagement and
how your team will execute it. Miller has suggested that your
team use the ISACA RiskIT framework
(found on the Canvas site) as the basis for your approach;
however, she has cautioned you: she does not
simply want screenshots of RiskIT. Miller needs to understand
how you will apply this methodology and
approach to her business circumstance.
THREE “QUICK WIN” RECOMMENDATIONS
Based on Miller’s preliminary observations, she would like to
see an example of three risks and hear your
recommendations for how to mitigate them. This is more so that
Miller can get a sense for what she will
get as a final work product at the end of the three months. She
would rather see a preview of three risks
now given the limited information she provided than wait until
the end of the engagement only to be
surprised or fall short of expectations. Once again, the ISACA
RiskIT framework will be integral in your
analysis.
Miller has shared that the HG executive team are “very visual”
and the more you can summarize your
results and recommendations in a visual format, the better this
will go. Charts, graphs, infographics, and
dashboards have all been well received in the past.
A PROCESS FOR MANAGI NG IT RISK ONCE THE
ANALYSIS IS COMPLETE
Finally, once the initial inventory and analysis of the IT risks is
complete, Miller would like to know how
she and the IT organization can manage and govern the risks
going forward. Miller would like to see a
process flow of how new risks will be identified, analyzed and
treated so that this activity can continue in
the future. She also needs to understand what she should do
with the existing risks that your team will
identify so that she can manage them and address them. Again,
a process flow describing how existing
risks are managed will be key here. To summarize, Miller has
specifically asked you to cover the people,
process and technology recommendations for how to manage IT
risk going forward.
– What resources are necessary to run the IT risk
management process? She has asked
you to keep it “reasonable” given the cost pressures on the
organization.
– What does the process look like for identifying,
analyzing treating and managing risk?
Process flow diagrams (aka swim-lane diagrams) are helpful
tools to show how the process and
people fit together.
– What tools and systems are required to
automate the IT risk management
process? Miller has heard a lot about new GRC technology from
companies like Archer,
Professors Matt Stoltz and Meera Kesari Case Study: IT Risk
Management (High Gear Engine Company)
Page 7 Master of Science in Information Systems: IT
Governance, Risk and Controls (IT GRC)
MetricStream, ServiceNow, OpenPages and many others. She is
not sure what she needs but
does not want to “lead with the technology.” She has indicated
that if she can manage the risks
through Microsoft SharePoint, Surveys and/or Microsoft Excel
spreadsheets until a more robust
tool can be procured, that is fine with her. The key is to
understand the processes and which tools
may be a good fit in the future to help run those processes.
YOUR TASK FOR THIS C ASE – PRESENTING TEAMS
MILLER’S CHALLENGE
Miller’s career is riding on this project. If successful, this
project will solidify her as a leader in the
organization, set the tone for her transformation efforts and
establish credibility for your team in the eyes
of the board. Miller has shared with you that, “if your team does
a good job here, it will mean big things for
you in the future!”
You don’t want to let her down so you immediately get to work
on laying out her asks described above.
Remember, this should consist of one deliverable in MS
PowerPoint format and concisely address the
points described above.
You have one week to present your work and Miller is anxious
to hear what you have to say!
YOUR TASK FOR THIS C ASE – ALL OTHER TEAMS
CASE STUDY EXECUTIVE BRIEFING
With the decentralized environment at HG, Miller is expected to
present a single slide to the other
members of the Executive Committee (i.e., C-suite) to promote
discussion / insights around the planned
key stages of the IT risk management lifecycle. Your task is to
provide Miller with a single slide graphic
depicting the key stages of the IT risk management lifecycle
and that addresses the following:
tages
developing and rolling out a centralized IT
risk management program (such as getting buy-in from various
key stakeholders across HG to
consistently adopt a centralized IT risk management regime)
GENERAL CASE STUDY G UIDANCE
At a minimum, the solution to your case study should include
the criteria below. Though not mandatory,
you may use this as a format and general flow for your case
study.
of the case.
contribute to the root cause business
problem at hand.
solution should address the key tasks
outlined for you in the case.
your solution.
implemented or deployed.
Professors Matt Stoltz and Meera Kesari Case Study: IT Risk
Management (High Gear Engine Company)
Page 8 Master of Science in Information Systems: IT
Governance, Risk and Controls (IT GRC)
plementing your solutions. Be
sure to include the cost to build and
deploy your solution and the cost to run and operate your
solution after it is built.
mitigating factors you will employ to
minimize the likelihood and/or impact.
You have been asked for a lot of detailed information to solve
this case. The trick will be to package this
up into a digestible executive presentation your audience can
understand. Detailed supporting information
can be included in an exhibit in the appendix of your
presentation.
Your case study solution should also include:
appendix.
lp to
inform your solution.
Canvas.com.
Canvas.com.
A few tips and tricks for solving this case:
our conclusions.
Be sure to state your assumptions
in an exhibit in your appendix. Your assumptions should not
significantly alter the facts of the
case; rather, they should support the recommendations by filling
in the missing pieces of
information in the case.
the other standards. The key is to use
the standards to help you solve the case. Remember: standards
are NEVER the answer on their
own; they must be applied to the business problem.
classes. For example, please
incorporate lessons from your IT strategy and case analysis
class. This will be critical to your
success in all your MSIS classes.
Identify a law that regulates how employees are treated in t.docx

More Related Content

Similar to Identify a law that regulates how employees are treated in t.docx

IT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal AusterityIT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal AusterityOmar Toor
 
Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Md. Khukan Miah
 
IT Strategy Sample
IT Strategy SampleIT Strategy Sample
IT Strategy SampleGlen Alleman
 
Is the cloud right for your business?
Is the cloud right for your business?Is the cloud right for your business?
Is the cloud right for your business?Grant Thornton LLP
 
The M&A Playbook for IT
The M&A Playbook for ITThe M&A Playbook for IT
The M&A Playbook for ITWGroup
 
SPEED Team Business Plan- Final Draft
SPEED Team Business Plan- Final DraftSPEED Team Business Plan- Final Draft
SPEED Team Business Plan- Final DraftThelma Palmer
 
How operational innovation can transform your company.
How operational innovation can transform  your company.How operational innovation can transform  your company.
How operational innovation can transform your company.Bibek Prajapati
 
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1
 P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1   P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1 MoseStaton39
 
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1   P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1
P g 0 0 0 4 m a y 0 6 , 2 0 1 1 jasmin849794
 
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition StrategyPund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition StrategyMauricio Godoy
 
Whitepaper: Using Technology to Manage and Optimize Incentive Compensation
Whitepaper: Using Technology to Manage and Optimize Incentive CompensationWhitepaper: Using Technology to Manage and Optimize Incentive Compensation
Whitepaper: Using Technology to Manage and Optimize Incentive CompensationIconixx
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...Mark Skilton
 
Agile Program Management: Moving from Principles to Practice
Agile Program Management: Moving from Principles to PracticeAgile Program Management: Moving from Principles to Practice
Agile Program Management: Moving from Principles to PracticeGlen Alleman
 
Piloting procter & gamble from decicion cockpits
Piloting procter & gamble from decicion cockpitsPiloting procter & gamble from decicion cockpits
Piloting procter & gamble from decicion cockpitsniz73
 
The CMDB/CMS in the Digital Age: A Bedrock for IT Transformation
The CMDB/CMS in the Digital Age: A Bedrock for IT TransformationThe CMDB/CMS in the Digital Age: A Bedrock for IT Transformation
The CMDB/CMS in the Digital Age: A Bedrock for IT TransformationEnterprise Management Associates
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6Michael Punzo
 
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom LineKeep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom LineCognizant
 
Genpact Systems of Engagement helps Global electronics firm reimagines order ...
Genpact Systems of Engagement helps Global electronics firm reimagines order ...Genpact Systems of Engagement helps Global electronics firm reimagines order ...
Genpact Systems of Engagement helps Global electronics firm reimagines order ...genysen2015
 

Similar to Identify a law that regulates how employees are treated in t.docx (20)

IT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal AusterityIT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal Austerity
 
Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...
 
IT Strategy Sample
IT Strategy SampleIT Strategy Sample
IT Strategy Sample
 
Is the cloud right for your business?
Is the cloud right for your business?Is the cloud right for your business?
Is the cloud right for your business?
 
Mmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu EssayMmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu Essay
 
The M&A Playbook for IT
The M&A Playbook for ITThe M&A Playbook for IT
The M&A Playbook for IT
 
SPEED Team Business Plan- Final Draft
SPEED Team Business Plan- Final DraftSPEED Team Business Plan- Final Draft
SPEED Team Business Plan- Final Draft
 
How operational innovation can transform your company.
How operational innovation can transform  your company.How operational innovation can transform  your company.
How operational innovation can transform your company.
 
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1
 P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1   P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1
 
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1   P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 
201605 R&P on Digitization
201605 R&P on Digitization201605 R&P on Digitization
201605 R&P on Digitization
 
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition StrategyPund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
 
Whitepaper: Using Technology to Manage and Optimize Incentive Compensation
Whitepaper: Using Technology to Manage and Optimize Incentive CompensationWhitepaper: Using Technology to Manage and Optimize Incentive Compensation
Whitepaper: Using Technology to Manage and Optimize Incentive Compensation
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Agile Program Management: Moving from Principles to Practice
Agile Program Management: Moving from Principles to PracticeAgile Program Management: Moving from Principles to Practice
Agile Program Management: Moving from Principles to Practice
 
Piloting procter & gamble from decicion cockpits
Piloting procter & gamble from decicion cockpitsPiloting procter & gamble from decicion cockpits
Piloting procter & gamble from decicion cockpits
 
The CMDB/CMS in the Digital Age: A Bedrock for IT Transformation
The CMDB/CMS in the Digital Age: A Bedrock for IT TransformationThe CMDB/CMS in the Digital Age: A Bedrock for IT Transformation
The CMDB/CMS in the Digital Age: A Bedrock for IT Transformation
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
 
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom LineKeep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
 
Genpact Systems of Engagement helps Global electronics firm reimagines order ...
Genpact Systems of Engagement helps Global electronics firm reimagines order ...Genpact Systems of Engagement helps Global electronics firm reimagines order ...
Genpact Systems of Engagement helps Global electronics firm reimagines order ...
 

More from alanrgibson41217

Identity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docxIdentity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docxalanrgibson41217
 
If a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docxIf a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docxalanrgibson41217
 
Identity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docxIdentity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docxalanrgibson41217
 
If a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docxIf a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docxalanrgibson41217
 
Identify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docxIdentify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docxalanrgibson41217
 
Identifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docxIdentifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docxalanrgibson41217
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxalanrgibson41217
 
IEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docxIEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docxalanrgibson41217
 
Identifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docxIdentifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docxalanrgibson41217
 
Identifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docxIdentifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docxalanrgibson41217
 
Identify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docxIdentify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docxalanrgibson41217
 
Identify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docxIdentify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docxalanrgibson41217
 
Identify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docxIdentify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docxalanrgibson41217
 
Identify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docxIdentify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docxalanrgibson41217
 
identify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docxidentify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docxalanrgibson41217
 
identify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docxidentify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docxalanrgibson41217
 
Identify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docxIdentify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docxalanrgibson41217
 
Identify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docxIdentify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docxalanrgibson41217
 
Identify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docxIdentify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docxalanrgibson41217
 
Identify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docxIdentify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docxalanrgibson41217
 

More from alanrgibson41217 (20)

Identity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docxIdentity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docx
 
If a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docxIf a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docx
 
Identity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docxIdentity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docx
 
If a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docxIf a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docx
 
Identify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docxIdentify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docx
 
Identifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docxIdentifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docx
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
 
IEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docxIEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docx
 
Identifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docxIdentifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docx
 
Identifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docxIdentifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docx
 
Identify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docxIdentify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docx
 
Identify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docxIdentify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docx
 
Identify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docxIdentify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docx
 
Identify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docxIdentify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docx
 
identify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docxidentify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docx
 
identify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docxidentify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docx
 
Identify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docxIdentify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docx
 
Identify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docxIdentify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docx
 
Identify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docxIdentify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docx
 
Identify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docxIdentify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Identify a law that regulates how employees are treated in t.docx

  • 1. Identify a law that regulates how employees are treated in the workplace. Research an example of when a company fell afoul of that law and detail the consequences. 1-3 pages. CASE STUDY: IT RISK MANAGEMENT HIGH GEAR ENGINE COMPANY ASSIGNMENT OVERVIEW Summary: As a team, students should present their proposed solution to the case. Your presentation should lay out clear recommendations for how management should address the problem. Presentation Deliverable1: Case study presentation (in Microsoft PowerPoint format). Executive Briefing
  • 2. Deliverable: Single page case study executive briefing (in Microsoft PowerPoint format). BACKGROUND High Gear Engine Company (HG) is a global automotive supplier with operations around the world. Founded in 1937, HG specializes in engines for all kinds of automobiles, from high-end sports cars to farming equipment. HG is split into three business units (BU) that operate fairly independently and are marketed under different brand names: 1. Velocity Engines – Focuses on high-end sports cars and consumer-grade engines. These products command a premium in the market and 2. Long Haul Motors – Produces diesel and large engines for semi-trailer trucks. Long haul is known well known in the market for its durability and is a recognized leader in the trucking industry. 3. Bigger Digger Power and Motor – Specializes in mining equipment engines and motors. They supply to the major mining and industrial equipment manufacturers and often “white label” their engines as their customers’ brand.
  • 3. HG is located in Detroit, Michigan and has over 75 plants, performance labs and manufacturing facilities worldwide. Like most automotive suppliers and original equipment manufacturers (OEM), HG was hit hard by the economic downturn of 2008. Faced with bankruptcy, HG was forced to reduce its employee headcount and close several global locations. However, in the recent five years business has turned around and orders have picked up to the point that factories are re-opening and the company is once again profitable with global revenues totaling just over $9 billion (US). HG is planning for 17% compounded annual revenue growth and has a healthy (and growing) profit margin of 15%. HG is now ready to begin its path to growth which will require major change in the technology environment. This includes upgrading its technology infrastructure and applications that have been deferred for almost a decade. Three weeks ago, a new CIO (Sara Miller) was appointed by the board and has commissioned two projects: 1 Presentation Deliverables are due only if your team is assigned this case. All others should read the case and complete
  • 4. the Executive Briefing Deliverable assignment. Professors Matt Stoltz and Meera Kesari Case Study: IT Risk Management (High Gear Engine Company) Page 2 Master of Science in Information Systems: IT Governance, Risk and Controls (IT GRC) 1. IT Strategy and Roadmap – To determine the technology vision for the future and how the organization will get there. This strategy is very important since HG is in growth mode but does not have the technology resources in place to achieve its goals. The executive committee (aka c- suite), the board of directors, and ultimately the shareholders are all looking to Miller to clearly lay out a vision and a plan for rapidly elevating HG’s antiquated technology capabilities. 2. IT Risk Management Analysis – To “uncover the hidden risks lurking in the technology environment,” as Miller put it. Miller knows that executing on a transformative IT strategy of this scale is fraught with risk, and with systems and applications this old, there is much work to be
  • 5. done. Miller has brought in your team to execute the second initiative, the IT Risk Management Analysis, to determine the various IT risks that exist in HG IT and how to mitigate them. Miller has a presentation to the executive committee in 3 months and knows the timing will be tight given the size and global scale of the organization. She needs to understand the scope and approach of how you will go about assessing the risks and managing them to closure. She has emphasized that the two projects are her biggest priorities and she needs to know if there are any show-stoppers preventing her from achieving the goals as outlined in the strategy. Miller plans to use the IT risk management analysis to: initiatives, the executive committee, way of HG’s technology modernization efforts, and rics for herself, the IT organization and HG as a whole.
  • 6. Your team has just arrived on-site and have one week to prepare a scope and approach document for how to execute the engagement. Your time line is three months to get all field work complete and help Miller present her strategy and risk analysis to the executive committee and the board of directors. Miller did an initial scan of the environment and compiled some risks she saw based on her own inquiry and observation of the environment. Miller’s preliminary observations are outlined below with a few key questions she has as a result of her interviews with key stakeholders in the organization. HG INFORMATION TECHNOLOGY At its peak, the HG IT department was 800 strong with dedicated teams for each business unit and centralized team to run the shared corporate IT systems. Long ago HG IT was a very decentralized organization with CIOs for each of the business who had dual reporting lines to the president of each business unit and to the global CIO of HG. There was a lot of redundant systems and duplication of effort. HG had 3 of every system and each business unit was as different and ran completely differently: three
  • 7. supply chain systems, three financial systems, three engineering departments and product lifecycle management systems, and the list went on. In fact, it took a mandate from the CEO to get every business unit on to one email, calendar, instant message system, and domain name. The leadership knew that centralizing and consolidating functions would yield cost savings and efficiencies but it would also remove autonomy and the freedom to guide their own technology decisions. But there was little desire to do so since all business units were growing very fast, beating analyst estimates and were happy the way things were. Then, 2008 hit and HG was forced into bankruptcy. HG was bought by a private equity firm, Velocity Partners, who instituted austerity measures to reduce costs and save the core of the business. IT was among the biggest departments hit with layoffs and cost Professors Matt Stoltz and Meera Kesari Case Study: IT Risk Management (High Gear Engine Company) Page 3 Master of Science in Information Systems: IT Governance, Risk and Controls (IT GRC)
  • 8. reduction measures. Headcount plummeted to a skeleton crew of 300 IT personnel. BU IT personnel were all but eliminated and each plant was given an IT support manager. In many cases, the IT support manager served all the plants and office locations within a 100 mile radius causing them to be overworked and the business units to be generally unhappy with the level of service it was receiving from IT. BU CIOs were converted to manager liaisons and every position was consolidated to the bare minimum. Times were tough and any non-essential projects and spend were put on-hold. Only projects with guaranteed cost savings or revenue generating potential were approved and every project and key initiative had to go through a rigorous business case process approved by the board of directors which was heavily dominated by the majority owners, Velocity Partners. Thus, routine upgrades, equipment maintenance, and application/system enhancements were all rejected as they did not have a clear benefit that met Velocity’s project approval criteria. The turmoil at High Gear eventually settled over time and HG focused on business recovery and profitability. The cost reduction and business development
  • 9. initiatives were successful and HG won several contracts with new clients that were looking to use the economic downturn to its benefit and strike while their competitors were reeling. As the recession subsided, HG began to grow and expand to meet its growing demand but nearly a decade had passed since the bankruptcy and layoffs and still IT had remained relatively the same: same headcount, same systems, same applications and a growing list of concerns that they were falling behind their competitors. Even after all the cost-saving measures, HG still operated as three independent business units with one corporate function sitting atop. The BUs dictated the budget and all costs were charged back to each of the three business units in proportion to headcount or revenue percentage; it was a fairly loose and undefined chargeback model. Corporate IT attended to some of the shared functions such as:
  • 10. Strategy Management unications The business units were responsible for the following IT functions:
  • 11. elationship Management Systems Management -Floor Systems The lists above are not exhaustive but do represent the majority of the division of responsibility between corporate IT and the business units. Miller has her work cut out for her. She knows that she will need to centralize core functions of IT for cost- savings, efficiency purposes and to elevate HG’s capabilities but she also does not want a cultural coup on her hands if the business units get the sense that they are losing control and autonomy. Miller is a Professors Matt Stoltz and Meera Kesari Case Study: IT Risk Management (High Gear Engine Company)
  • 12. Page 4 Master of Science in Information Systems: IT Governance, Risk and Controls (IT GRC) seasoned executive and was brought into HG from another automotive company and has a track record of transforming IT into a leader and business enabler rather than a support function. Because cost is under a microscope, the office of the CIO reports to the CFO (John Vargas). Miller told Vargas her plan and he agreed she was on the right track approaching this from a two-pronged approach: IT strategy and IT risk. Vargas informed the board about Miller’s strategy and risk initiatives and gave her the next board meeting to brief them on the findings and recommendations. The board must see a clear path forward and understand how to get there. Vargas and the executive committee know that they must spend money over the next three years to modernize and upgrade HG’s IT capabilities but they want to be smart about it. They know they will never get back up to 800 IT personnel but also know that incremental headcount, restructuring and a substantial capital investment will be required. MILLER’S PRELIMINARY OBSERVATIONS Miller’s first three weeks were spent interviewing all the major
  • 13. business and IT stakeholders in the company. She managed to talk to a good cross section of people with knowledge and background on the company and came up with some preliminary observations to consider when putting together your plan of attack: information security function is viewed as a part time job and is bundled together with IT Audit, IT Compliance and IT Risk Management. No one seems to be formally thinking about the threats to HG’s information assets such as engineering designs, new product information, sensitive employee/customer information, and confidential legal, strategy and merger/acquisition information. web-based and internet-based, they have put a strain on the infrastructure and internet bandwidth. Peak hours of traffic are the worst and several company executives have complained that their email took one hour to download during peak hours of 8:00 AM – 10:00 AM. Something has to be done, especially if
  • 14. more cloud-based applications are to be adopted. are expensive to maintain. The application portfolio consists of roughly 235 ERP systems when you count the different versions, instances and regional implementations. This number only includes formal ERP systems and not any of the supporting business support systems, spreadsheets, transactional systems or databases that feed the ERP systems. If you could those, the number has been estimated as high as 3,000 but no one really knows. These ERP systems frequently go down and troubleshooting them takes precious personnel away from their core responsibilities. And because enhancements, upgrades and changes have not been made in years, many of the processes that would automate simple tasks (such as approvals, workflow and task management) are done manually outside the system. No one really knows how much this is costing the company but everyone knows they are unhappy with the current state. reduction years ago, much of the
  • 15. process maturity was lost. Users are informally provisioned and de-provisioned access, developers have access to the production environment and no one is quite sure if there is a formal disaster recovery (DR) plan in place. The person who wrote the DR plan is long-gone and HG IT has not found time or resources to dedicate to fixing it. The external auditor has indicated that if these issues are not fixed before the financial year-end, HG is at risk of a “Significant Deficiency” on their IT General Controls related to their financial reports. This would have a potential impact on stock price and investor confidence in the HG brand. Professors Matt Stoltz and Meera Kesari Case Study: IT Risk Management (High Gear Engine Company) Page 5 Master of Science in Information Systems: IT Governance, Risk and Controls (IT GRC) production line to stop. The manufacturing and shop floor systems have been neglected
  • 16. for over a decade. Even when HG was at its peak, patches were not applied and systems were left to run on their own. Preventive maintenance did not exist and the systems were not touched unless something went wrong. Recently, three production lines went down for two days each (two Velocity lines and one Bigger Digger line) for various reasons. In the case of Velocity, a vendor mandated patch had been pushed out to the robotics system but it was not compatible with Windows 2000, which is widely used in production facilities despite the fact it is no longer supported. When the patch was pushed out, the line simply came to a halt. It was estimated that HG lost $5 million per day in revenue and contractual fines because they were not able to ship the orders for the just-in-time manufacturing required by its customers. Bigger Digger’s production line outage is still unknown and no one can explain why it happened. They have been noticing their production line computer systems “acting up” and doing strange things (e.g. restarting, going to strange websites, and popping up with adware, etc.) but no one yet understands the
  • 17. root cause. Eventually, the plant manager just went to Best Buy, bought a new computer, had the IT support manager install the necessary software and the line went back up again. The plant manager was praised for his quick thinking and troubleshooting but Miller knows this cannot happen again. company still runs on Windows XP and most computers are over 5 years old. Employees regularly complain about the slowness of their PCs, especially as new corporate IT mandated software is installed. Windows XP is no longer supported by Microsoft so HG is paying expensive third- party fees to support it while they get their strategy together to upgrade the PCs and the operating systems at the same time. Miller even found out that some of the executive team went out and bought Apple Macs and Microsoft Surfaces just so they didn’t have to deal with the sluggish corporate PCs. systems work except the vendor. When the austerity measures were put in place, Velocity
  • 18. Partners brought in an off-shore vendor to take over application development and maintenance. Most of the internal IT resources who understood how the applications and systems worked were let go. Now that the vendor has been in place, HG is at their mercy for any fixes or enhancements. These are often done incorrectly or with little quality assurance. Additionally, the vendor has admitted they are short-staffed so there is a large back-log of changes and enhancements that only they can make. The vendor has also raised their rates several times over the years. What started as a cost savings measure is now proving to be expensive and all HG can do is pay whatever they ask because they are the only ones who know how it works. The observations list is not meant to be exhaustive; Miller provided it to your team as background so you can incorporate these into your plan and approach. As bad as the problems are, she knows your team will find more as you interview others and survey the organization. She is interested in your thoughts on some quick wins to address the observations but knows we must go through the formal process and your
  • 19. team’s recommended methodology for assessing and mitigating IT risk. YOUR TASK FOR THIS C ASE SCOPE AND APPROACH FOR CONDUCTING THE AN ALYSIS When your team began the engagement on Monday, you had an initial introductory meeting with Miller and her staff where she described her preliminary observations and gave your team the background. She Professors Matt Stoltz and Meera Kesari Case Study: IT Risk Management (High Gear Engine Company) Page 6 Master of Science in Information Systems: IT Governance, Risk and Controls (IT GRC) wanted to know how the next three months would look and what your team would be doing to get her the findings and recommendations she needed. Miller is interested in the: – Miller wants to know what risks and frameworks you leverage and what. What is the list of risks and what will you look at to conduct the analysis? What
  • 20. questions will you ask and how will you interpret the results? What business units and geographic locations will you cover? What aspects of the business will you cover and how do we know we are being complete and now leaving anything out? – Miller needs a clear plan for how you will conduct the analysis. What is the timing? How will you apply the framework to get meaningful results? What are the phases of the project? How will you make sure she meets her presentation commitments to the executive committee and board? Fundamentally, Miller would like to see a kick-off deck that describes the scope of the engagement and how your team will execute it. Miller has suggested that your team use the ISACA RiskIT framework (found on the Canvas site) as the basis for your approach; however, she has cautioned you: she does not simply want screenshots of RiskIT. Miller needs to understand how you will apply this methodology and approach to her business circumstance. THREE “QUICK WIN” RECOMMENDATIONS
  • 21. Based on Miller’s preliminary observations, she would like to see an example of three risks and hear your recommendations for how to mitigate them. This is more so that Miller can get a sense for what she will get as a final work product at the end of the three months. She would rather see a preview of three risks now given the limited information she provided than wait until the end of the engagement only to be surprised or fall short of expectations. Once again, the ISACA RiskIT framework will be integral in your analysis. Miller has shared that the HG executive team are “very visual” and the more you can summarize your results and recommendations in a visual format, the better this will go. Charts, graphs, infographics, and dashboards have all been well received in the past. A PROCESS FOR MANAGI NG IT RISK ONCE THE ANALYSIS IS COMPLETE Finally, once the initial inventory and analysis of the IT risks is complete, Miller would like to know how she and the IT organization can manage and govern the risks going forward. Miller would like to see a process flow of how new risks will be identified, analyzed and treated so that this activity can continue in
  • 22. the future. She also needs to understand what she should do with the existing risks that your team will identify so that she can manage them and address them. Again, a process flow describing how existing risks are managed will be key here. To summarize, Miller has specifically asked you to cover the people, process and technology recommendations for how to manage IT risk going forward. – What resources are necessary to run the IT risk management process? She has asked you to keep it “reasonable” given the cost pressures on the organization. – What does the process look like for identifying, analyzing treating and managing risk? Process flow diagrams (aka swim-lane diagrams) are helpful tools to show how the process and people fit together. – What tools and systems are required to automate the IT risk management process? Miller has heard a lot about new GRC technology from companies like Archer,
  • 23. Professors Matt Stoltz and Meera Kesari Case Study: IT Risk Management (High Gear Engine Company) Page 7 Master of Science in Information Systems: IT Governance, Risk and Controls (IT GRC) MetricStream, ServiceNow, OpenPages and many others. She is not sure what she needs but does not want to “lead with the technology.” She has indicated that if she can manage the risks through Microsoft SharePoint, Surveys and/or Microsoft Excel spreadsheets until a more robust tool can be procured, that is fine with her. The key is to understand the processes and which tools may be a good fit in the future to help run those processes. YOUR TASK FOR THIS C ASE – PRESENTING TEAMS MILLER’S CHALLENGE Miller’s career is riding on this project. If successful, this project will solidify her as a leader in the organization, set the tone for her transformation efforts and establish credibility for your team in the eyes of the board. Miller has shared with you that, “if your team does a good job here, it will mean big things for you in the future!”
  • 24. You don’t want to let her down so you immediately get to work on laying out her asks described above. Remember, this should consist of one deliverable in MS PowerPoint format and concisely address the points described above. You have one week to present your work and Miller is anxious to hear what you have to say! YOUR TASK FOR THIS C ASE – ALL OTHER TEAMS CASE STUDY EXECUTIVE BRIEFING With the decentralized environment at HG, Miller is expected to present a single slide to the other members of the Executive Committee (i.e., C-suite) to promote discussion / insights around the planned key stages of the IT risk management lifecycle. Your task is to provide Miller with a single slide graphic depicting the key stages of the IT risk management lifecycle and that addresses the following: tages developing and rolling out a centralized IT risk management program (such as getting buy-in from various key stakeholders across HG to consistently adopt a centralized IT risk management regime)
  • 25. GENERAL CASE STUDY G UIDANCE At a minimum, the solution to your case study should include the criteria below. Though not mandatory, you may use this as a format and general flow for your case study. of the case. contribute to the root cause business problem at hand. solution should address the key tasks outlined for you in the case. your solution. implemented or deployed. Professors Matt Stoltz and Meera Kesari Case Study: IT Risk Management (High Gear Engine Company)
  • 26. Page 8 Master of Science in Information Systems: IT Governance, Risk and Controls (IT GRC) plementing your solutions. Be sure to include the cost to build and deploy your solution and the cost to run and operate your solution after it is built. mitigating factors you will employ to minimize the likelihood and/or impact. You have been asked for a lot of detailed information to solve this case. The trick will be to package this up into a digestible executive presentation your audience can understand. Detailed supporting information can be included in an exhibit in the appendix of your presentation. Your case study solution should also include: appendix. lp to inform your solution. Canvas.com.
  • 27. Canvas.com. A few tips and tricks for solving this case: our conclusions. Be sure to state your assumptions in an exhibit in your appendix. Your assumptions should not significantly alter the facts of the case; rather, they should support the recommendations by filling in the missing pieces of information in the case. the other standards. The key is to use the standards to help you solve the case. Remember: standards are NEVER the answer on their own; they must be applied to the business problem. classes. For example, please incorporate lessons from your IT strategy and case analysis class. This will be critical to your success in all your MSIS classes.