SlideShare a Scribd company logo
1 of 8
<Category>
                                                <Track>




The Role of ITAM in Information Security


                Presented by
          Steve Gerick CISA, CISM, CITAM, PMP

           Associate Director - Protiviti
<Category>
                                                             <Track>




Industry Trends & Drivers
 People
    Mergers and Acquisitions
    Regulatory Compliance
    Reduction of Organizational Silos
    Centralized Model (consolidation and standardization)
 Technology
    Increased computing complexity
    Need for “Active Asset Management”
    Electronic software distribution & Patch Management
    Move to suites instead of point products
    Vendor Consolidation
 Process
    Real-time process model
    Interest in ITIL and CobiT
    Driven more by compliance needs
<Category>
                                                                                    <Track>


Top Five IT Issues*
 Strategic Alignment
    Need to align IT with the business and its goals - providing a flexible,
     integrated information infrastructure to support business strategy.
 Value Delivery
    Places the focus on expenses and proof of value and concerns itself
     with cost-optimization, with ensuring a favorable return on investment
     for IT and a positive bottom-line impact.
 IT Assets
    Targets knowledge and infrastructure. Deals with the selective
     outsourcing of non-core processes to trusted suppliers, to leverage
     knowledge and skills internally and externally
 Risk Management
    Concerns itself with safeguarding assets and preparing for disaster.
 Performance Measurement
    Necessary for any of the other four to be managed appropriately in a
     complex economic and geopolitical environment. ISACA Journal Volume 4, 2002
                                                           Erik Guldentops - ITGI
<Category>
                         <Track>


Typical ITAM Lifecycle
<Category>
                                                     <Track>


IT Security Management Lifecycle




                           * NIST Guide to Information
                           Technology Security Services
<Category>
                                                <Track>




ITAM & Infosec Linkages
 Configuration Management
    Patch Management
    Vulnerability Management
    Data Protection

 Property Accounting
    Active – Inactive Assets
    Asset Disposal
    Theft Prevention
    Move to suites instead of point products

 Compliance
    Software License Compliance
    SOX, GLBA, HIPAA, Basel
    Software Piracy
<Category>
                                                                                               <Track>



ITAM & The ITIL Framework

                   Planning to Implement Service Management
T                                                                                         T
h                                                                                         h
                             Service Management
e                                                                                         e

                                                                     ICT
    The Business                            Service                                       T
B                                                              Infrastructure
                                            Support                                       e
u    Perspective                                                Management
s                                                                                         c
i                                                                                         h
n                                                                                         n
                          Service                                                         o
e
                          Delivery                     Security                           l
s
s                                                     Management                          o
                                                                                          g
                                                                                          y
      Application Management


                                     Suppliers


                                                                   * ITIL Best Practices Services
                                                                   Software Asset Management
<Category>
                                                                                                            <Track>

Relationship between ITAM & Security
                            Overall Management
  Overall management        Processes
                                  Competence, awareness and training
  responsibility                    Performance metrics and continuous improvement
  Risk assessment                   Service continuity and availability management
  Policies and procedures
                            Core Asset Management
  Asset identification      Processes management
                                  Database
  Asset control                    Financial management
  Status accounting

Logistics                    Verification and                          Relationship
Processes                    Compliance Processes                      Processes
Requirements definition      (Governance)                              Contract management
Design                                                                 Supplier management
Evaluation                   Verification and audit
                             License compliance                        Internal business relationship
Procurement                                                            management
Build                        Security compliance
                             Other compliance (software standards)     Outsourcing management
Deployment
Operation
Optimization
                                                                           * ITIL Best Practices Services
Retirement
                                                                           Software Asset Management

More Related Content

What's hot

How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM SystemAna Meskovska
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A OperationalSOA Symposium
 
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsMSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsDavid Castro
 
M2MSys ITIL Executive Summary
M2MSys ITIL Executive SummaryM2MSys ITIL Executive Summary
M2MSys ITIL Executive SummaryFilipe Pinto
 
SAP REAL ESTATE
SAP REAL ESTATESAP REAL ESTATE
SAP REAL ESTATEeFM srl
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid ThemSasha Nunke
 
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieDavid O'Dowd
 
Business Governance Of Enterprise It
Business Governance Of Enterprise ItBusiness Governance Of Enterprise It
Business Governance Of Enterprise Itjponnoly
 
About graycon
About grayconAbout graycon
About grayconmartyrj
 
Combining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To ImproveCombining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To ImproveAhmad Refai
 
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...Kaseya
 
Powerpoint tom
Powerpoint   tomPowerpoint   tom
Powerpoint tomaiimnevada
 
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarIntegrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarITSM Academy, Inc.
 
Enrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEnrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEinat Shimoni
 

What's hot (20)

How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM System
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A Operational
 
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsMSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
 
M2MSys ITIL Executive Summary
M2MSys ITIL Executive SummaryM2MSys ITIL Executive Summary
M2MSys ITIL Executive Summary
 
SAP REAL ESTATE
SAP REAL ESTATESAP REAL ESTATE
SAP REAL ESTATE
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
Rawat Ibm Compliance Webinar
Rawat Ibm Compliance WebinarRawat Ibm Compliance Webinar
Rawat Ibm Compliance Webinar
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
 
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
 
Business Governance Of Enterprise It
Business Governance Of Enterprise ItBusiness Governance Of Enterprise It
Business Governance Of Enterprise It
 
About graycon
About grayconAbout graycon
About graycon
 
Combining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To ImproveCombining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To Improve
 
eHOM (enhanced Hospital Operations Map)
eHOM (enhanced Hospital Operations Map)eHOM (enhanced Hospital Operations Map)
eHOM (enhanced Hospital Operations Map)
 
Military Critical Infrastructure: GeoReadiness
Military Critical Infrastructure: GeoReadinessMilitary Critical Infrastructure: GeoReadiness
Military Critical Infrastructure: GeoReadiness
 
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
 
Powerpoint tom
Powerpoint   tomPowerpoint   tom
Powerpoint tom
 
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarIntegrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
 
Enrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEnrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdf
 
Kylie Dunn
Kylie DunnKylie Dunn
Kylie Dunn
 
How to implement interoperability
How to implement interoperabilityHow to implement interoperability
How to implement interoperability
 

Viewers also liked

Viewers also liked (15)

Watch your head!
Watch your head!Watch your head!
Watch your head!
 
My future (1)
My future (1)My future (1)
My future (1)
 
Простая CRM система для управление отделом продаж
Простая CRM система для управление отделом продажПростая CRM система для управление отделом продаж
Простая CRM система для управление отделом продаж
 
English project
English project English project
English project
 
Jade paul knedle edited
Jade paul knedle editedJade paul knedle edited
Jade paul knedle edited
 
My future (1)
My future (1)My future (1)
My future (1)
 
My future (1)
My future (1)My future (1)
My future (1)
 
Enchanted lake g1
Enchanted lake g1Enchanted lake g1
Enchanted lake g1
 
Webinar
WebinarWebinar
Webinar
 
Кредитный конвейер - Step Integrator
Кредитный конвейер - Step IntegratorКредитный конвейер - Step Integrator
Кредитный конвейер - Step Integrator
 
Системный интегратор Avaya
Системный интегратор AvayaСистемный интегратор Avaya
Системный интегратор Avaya
 
Chlamydia trachomatis
Chlamydia trachomatisChlamydia trachomatis
Chlamydia trachomatis
 
IT Project Governance Overview
IT Project Governance OverviewIT Project Governance Overview
IT Project Governance Overview
 
Ab genel sekreterlik
Ab genel sekreterlikAb genel sekreterlik
Ab genel sekreterlik
 
Leveraging Distribution Network Convergence to Maximize M&A Value
Leveraging Distribution Network Convergence to Maximize M&A ValueLeveraging Distribution Network Convergence to Maximize M&A Value
Leveraging Distribution Network Convergence to Maximize M&A Value
 

Similar to 2005 Presentation - Annual ITAM Conference

ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMZyma Arsalan
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security ArchitectureLeo de Sousa
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate PresentationArul Nambi
 
DHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise ArchitectureDHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise ArchitectureHarry Strover
 
Service Integration in 20 minutes
Service Integration in 20 minutesService Integration in 20 minutes
Service Integration in 20 minutesCapgemini
 
Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney DavisCydney Davis
 
ITIL Benefits
ITIL BenefitsITIL Benefits
ITIL BenefitsQAI
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appEPM Live
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance10 steps to_4_g_service_assurance
10 steps to_4_g_service_assuranceTelecosm
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto SolutionHPDutchWorld
 
Omnitech Corporate Overview
Omnitech Corporate OverviewOmnitech Corporate Overview
Omnitech Corporate Overviewfonsjanssen
 
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOOctober 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOIT Service and Support
 

Similar to 2005 Presentation - Annual ITAM Conference (20)

Lean IT
Lean ITLean IT
Lean IT
 
ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBM
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security Architecture
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
IT Governance - OpenThinking Day
IT Governance - OpenThinking DayIT Governance - OpenThinking Day
IT Governance - OpenThinking Day
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
DHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise ArchitectureDHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise Architecture
 
Service Integration in 20 minutes
Service Integration in 20 minutesService Integration in 20 minutes
Service Integration in 20 minutes
 
Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney Davis
 
ITIL Benefits
ITIL BenefitsITIL Benefits
ITIL Benefits
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine app
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto Solution
 
Omnitech Corporate Overview
Omnitech Corporate OverviewOmnitech Corporate Overview
Omnitech Corporate Overview
 
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
 
Dev ops intro
Dev ops  introDev ops  intro
Dev ops intro
 
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOOctober 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
 
9sept2009 iiruc
9sept2009 iiruc9sept2009 iiruc
9sept2009 iiruc
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

2005 Presentation - Annual ITAM Conference

  • 1. <Category> <Track> The Role of ITAM in Information Security Presented by Steve Gerick CISA, CISM, CITAM, PMP Associate Director - Protiviti
  • 2. <Category> <Track> Industry Trends & Drivers  People  Mergers and Acquisitions  Regulatory Compliance  Reduction of Organizational Silos  Centralized Model (consolidation and standardization)  Technology  Increased computing complexity  Need for “Active Asset Management”  Electronic software distribution & Patch Management  Move to suites instead of point products  Vendor Consolidation  Process  Real-time process model  Interest in ITIL and CobiT  Driven more by compliance needs
  • 3. <Category> <Track> Top Five IT Issues*  Strategic Alignment  Need to align IT with the business and its goals - providing a flexible, integrated information infrastructure to support business strategy.  Value Delivery  Places the focus on expenses and proof of value and concerns itself with cost-optimization, with ensuring a favorable return on investment for IT and a positive bottom-line impact.  IT Assets  Targets knowledge and infrastructure. Deals with the selective outsourcing of non-core processes to trusted suppliers, to leverage knowledge and skills internally and externally  Risk Management  Concerns itself with safeguarding assets and preparing for disaster.  Performance Measurement  Necessary for any of the other four to be managed appropriately in a complex economic and geopolitical environment. ISACA Journal Volume 4, 2002 Erik Guldentops - ITGI
  • 4. <Category> <Track> Typical ITAM Lifecycle
  • 5. <Category> <Track> IT Security Management Lifecycle * NIST Guide to Information Technology Security Services
  • 6. <Category> <Track> ITAM & Infosec Linkages  Configuration Management  Patch Management  Vulnerability Management  Data Protection  Property Accounting  Active – Inactive Assets  Asset Disposal  Theft Prevention  Move to suites instead of point products  Compliance  Software License Compliance  SOX, GLBA, HIPAA, Basel  Software Piracy
  • 7. <Category> <Track> ITAM & The ITIL Framework Planning to Implement Service Management T T h h Service Management e e ICT The Business Service T B Infrastructure Support e u Perspective Management s c i h n n Service o e Delivery Security l s s Management o g y Application Management Suppliers * ITIL Best Practices Services Software Asset Management
  • 8. <Category> <Track> Relationship between ITAM & Security Overall Management Overall management Processes Competence, awareness and training responsibility Performance metrics and continuous improvement Risk assessment Service continuity and availability management Policies and procedures Core Asset Management Asset identification Processes management Database Asset control Financial management Status accounting Logistics Verification and Relationship Processes Compliance Processes Processes Requirements definition (Governance) Contract management Design Supplier management Evaluation Verification and audit License compliance Internal business relationship Procurement management Build Security compliance Other compliance (software standards) Outsourcing management Deployment Operation Optimization * ITIL Best Practices Services Retirement Software Asset Management

Editor's Notes

  1. These are the industry trends I have seen from industry pundits and supported by what I ’ve been seeing in the field over the past two years working with over 50 different clients. People Mergers and acquisitions are placing severe strain on operations (IT, HR, Facilities, Finance) functions in organizations since this is an area that is usually cut deeply to help accelerate the financial benefits derived from consolidating operations. Regulatory compliance is placing tremendous burdens of public companies and in the health care sector with privacy concerns. Organizations have put a great deal of effort in promoting HR efforts that have focused on getting different groups within a company to break down organizational barriers. Technology Many organizations have multiple operating systems that drive platforms for business and productivity applications. UNIX, LINUX, Microsoft, OS/400, MVS, etc. Vendors have begun to offer real-time asset configuration and management solutions. Electronic software distribution and patch management solutions had proliferated. Altiris, SMS, Peregrine, CA, etc. Vendor consolidation. Process Technology model processes more closely now – ITIL-compliant ICT Management applications for example IT world more mature. Maturation typically migrates to standard frameworks that help organization integrate ICT functions. SOX, GLBA, HIPAA, Basel, etc.
  2. 1. strategic alignment , refers to aligning IT with the business and collaborative solutions. Alignment is best achieved when cross-functional, collaborative information systems are instituted. This allows IT to be an agent of change, enabling business transformation in a robust and nimble manner. Finally, strategically aligned IT helps educate and connect the c-suite (CIOs, CEOs, COOs, CPOs, CTOs, etc.) while enabling effective communication with information systems users. In other market analysts&apos; lists, the issue of strategic alignment is referred to through terms such as &quot;increasing business demands on IT infrastructure,&quot; &quot;integration of processes,&quot; &quot;systems integration,&quot; &quot;IT serving as an agent of change&quot; and &quot;IT bridging the disconnect with the c-suite. “ 2. value delivery , places the focus on expenses and proof of value. Value delivery concerns itself with cost-optimization, with ensuring a favorable return on investment for IT and a positive bottom-line impact. It takes into account the total cost of ownership of IT services and the quality and effectiveness of enterprise wide service delivery. Most important, it emphasizses keeping users and managers satisfied, thus proving the value of IT. Accountants and auditors traditionally have looked at emerging technology issues from the risk and control point of view. Value, on the other hand, is a more important driver for management. Auditors and accountants should be aware of, and deal with, the management priority. In other market analysts&apos; lists, the value delivery concept is alluded to by the use of such terms as &quot;IT service delivery,&quot; &quot;trust,&quot; &quot;quality of service&quot; and &quot;proving the value of IT. “ 3. IT assets , targets knowledge and infrastructure. Specifically, this issue deals with the selective outsourcing of non-core processes to trusted suppliers, thereby enabling the enterprise to leverage knowledge and skills internally and externally. IT assets ensures that an integrated, economical IT infrastructure is provided, wherein new technology is introduced judiciously and obsolete systems are updated or replaced. It recognizes the importance of people, in addition to hardware and software, and therefore focuses on maintaining availability, providing training, promoting retention and ensuring competence of key IT personnel. Other market analysts make reference to the IT assets issue in terms such as &quot;outsourcing,&quot; &quot;trusted suppliers,&quot; &quot;resource management, &quot;training and competency&quot; and &quot;skills retention. “ 4. risk management , concerns itself with safeguarding assets and preparing for disaster. Risk management establishes IT security to protect assets and enable business recovery from IT failures. It ensures privacy for users and builds resilience into systems. Risk management knows the importance of establishing trust in the enterprise&apos;s services and among its partners. It manages internal and external threats--internal from misuse and errors and external from deliberate attacks, market volatility and the pace of change. Other market analysts&apos; lists include the risk management concept by referring to &quot;safeguarding business assets,&quot; &quot;disaster recovery,&quot; &quot;security&quot; and &quot;resilience. “ 5. performance measurement , is simply, in the opinion of the IT Governance Institute, necessary for any of the other four to be managed appropriately in a complex economic and geopolitical environment. Other analysts include &quot;improving SDLC&quot; in this category.
  3. META recently estimated that some companies are over-licensed by as much as 40% and that the average is 15%
  4. ITAM Relationship to ITIL Framework Software Asset Management is depicted in the framework model. The keys are:
  5. Overview of ITIL Processes Planning to Implement Service Management covers the planning of Service Management Processes, together with the development of organizational and ICT cultures. Service Management consists of two guides: Service Delivery covers the processes associated with the development and improvement of the quality of ICT services such as SLM, Financial Mgt., Capacity Mgt., IT Service Continuity and Availability Management. Service Support describes the function and processes involved in the day-to-day support and maintenance of the ICT services such as Incident Mtg., Problem Mgt. Configuration Mgt., Change and Release Mgt. and the Service Desk function. ICT Infrastructure Management describes all of the processes associated with the management of the OCT infrastructure including overall management, Design and Planning, Deployment, Operations and Technical Support. Application Management includes all of the processes and issues associated with the development and management of applications and software lifecycles. Security Management covers all of the processes and issues associated with the security of ICT services and systems. Business Perspective focuses on the processes of business alignment and communication associated with the ICT systems and services.