SlideShare a Scribd company logo
<Category>
                                                <Track>




The Role of ITAM in Information Security


                Presented by
          Steve Gerick CISA, CISM, CITAM, PMP

           Associate Director - Protiviti
<Category>
                                                             <Track>




Industry Trends & Drivers
 People
    Mergers and Acquisitions
    Regulatory Compliance
    Reduction of Organizational Silos
    Centralized Model (consolidation and standardization)
 Technology
    Increased computing complexity
    Need for “Active Asset Management”
    Electronic software distribution & Patch Management
    Move to suites instead of point products
    Vendor Consolidation
 Process
    Real-time process model
    Interest in ITIL and CobiT
    Driven more by compliance needs
<Category>
                                                                                    <Track>


Top Five IT Issues*
 Strategic Alignment
    Need to align IT with the business and its goals - providing a flexible,
     integrated information infrastructure to support business strategy.
 Value Delivery
    Places the focus on expenses and proof of value and concerns itself
     with cost-optimization, with ensuring a favorable return on investment
     for IT and a positive bottom-line impact.
 IT Assets
    Targets knowledge and infrastructure. Deals with the selective
     outsourcing of non-core processes to trusted suppliers, to leverage
     knowledge and skills internally and externally
 Risk Management
    Concerns itself with safeguarding assets and preparing for disaster.
 Performance Measurement
    Necessary for any of the other four to be managed appropriately in a
     complex economic and geopolitical environment. ISACA Journal Volume 4, 2002
                                                           Erik Guldentops - ITGI
<Category>
                         <Track>


Typical ITAM Lifecycle
<Category>
                                                     <Track>


IT Security Management Lifecycle




                           * NIST Guide to Information
                           Technology Security Services
<Category>
                                                <Track>




ITAM & Infosec Linkages
 Configuration Management
    Patch Management
    Vulnerability Management
    Data Protection

 Property Accounting
    Active – Inactive Assets
    Asset Disposal
    Theft Prevention
    Move to suites instead of point products

 Compliance
    Software License Compliance
    SOX, GLBA, HIPAA, Basel
    Software Piracy
<Category>
                                                                                               <Track>



ITAM & The ITIL Framework

                   Planning to Implement Service Management
T                                                                                         T
h                                                                                         h
                             Service Management
e                                                                                         e

                                                                     ICT
    The Business                            Service                                       T
B                                                              Infrastructure
                                            Support                                       e
u    Perspective                                                Management
s                                                                                         c
i                                                                                         h
n                                                                                         n
                          Service                                                         o
e
                          Delivery                     Security                           l
s
s                                                     Management                          o
                                                                                          g
                                                                                          y
      Application Management


                                     Suppliers


                                                                   * ITIL Best Practices Services
                                                                   Software Asset Management
<Category>
                                                                                                            <Track>

Relationship between ITAM & Security
                            Overall Management
  Overall management        Processes
                                  Competence, awareness and training
  responsibility                    Performance metrics and continuous improvement
  Risk assessment                   Service continuity and availability management
  Policies and procedures
                            Core Asset Management
  Asset identification      Processes management
                                  Database
  Asset control                    Financial management
  Status accounting

Logistics                    Verification and                          Relationship
Processes                    Compliance Processes                      Processes
Requirements definition      (Governance)                              Contract management
Design                                                                 Supplier management
Evaluation                   Verification and audit
                             License compliance                        Internal business relationship
Procurement                                                            management
Build                        Security compliance
                             Other compliance (software standards)     Outsourcing management
Deployment
Operation
Optimization
                                                                           * ITIL Best Practices Services
Retirement
                                                                           Software Asset Management

More Related Content

What's hot

How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM System
Ana Meskovska
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A Operational
SOA Symposium
 
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsMSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
David Castro
 
M2MSys ITIL Executive Summary
M2MSys ITIL Executive SummaryM2MSys ITIL Executive Summary
M2MSys ITIL Executive Summary
Filipe Pinto
 
SAP REAL ESTATE
SAP REAL ESTATESAP REAL ESTATE
SAP REAL ESTATE
eFM srl
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
Jim Geovedi
 
Rawat Ibm Compliance Webinar
Rawat Ibm Compliance WebinarRawat Ibm Compliance Webinar
Rawat Ibm Compliance Webinar
Rajeev (Raj) Rawat
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
Sasha Nunke
 
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
David O'Dowd
 
Business Governance Of Enterprise It
Business Governance Of Enterprise ItBusiness Governance Of Enterprise It
Business Governance Of Enterprise It
jponnoly
 
About graycon
About grayconAbout graycon
About graycon
martyrj
 
Combining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To ImproveCombining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To Improve
Ahmad Refai
 
eHOM (enhanced Hospital Operations Map)
eHOM (enhanced Hospital Operations Map)eHOM (enhanced Hospital Operations Map)
eHOM (enhanced Hospital Operations Map)
IBM Global Healthcare Consumerism Leader
 
Military Critical Infrastructure: GeoReadiness
Military Critical Infrastructure: GeoReadinessMilitary Critical Infrastructure: GeoReadiness
Military Critical Infrastructure: GeoReadiness
California Wildlife Conservation Board
 
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
Kaseya
 
Powerpoint tom
Powerpoint   tomPowerpoint   tom
Powerpoint tom
aiimnevada
 
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarIntegrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
ITSM Academy, Inc.
 
Enrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEnrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdf
Einat Shimoni
 
Kylie Dunn
Kylie DunnKylie Dunn
How to implement interoperability
How to implement interoperabilityHow to implement interoperability
How to implement interoperability
E-Government Center Moldova
 

What's hot (20)

How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM System
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A Operational
 
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsMSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
 
M2MSys ITIL Executive Summary
M2MSys ITIL Executive SummaryM2MSys ITIL Executive Summary
M2MSys ITIL Executive Summary
 
SAP REAL ESTATE
SAP REAL ESTATESAP REAL ESTATE
SAP REAL ESTATE
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
Rawat Ibm Compliance Webinar
Rawat Ibm Compliance WebinarRawat Ibm Compliance Webinar
Rawat Ibm Compliance Webinar
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
 
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
 
Business Governance Of Enterprise It
Business Governance Of Enterprise ItBusiness Governance Of Enterprise It
Business Governance Of Enterprise It
 
About graycon
About grayconAbout graycon
About graycon
 
Combining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To ImproveCombining Itil And Six Sigma To Improve
Combining Itil And Six Sigma To Improve
 
eHOM (enhanced Hospital Operations Map)
eHOM (enhanced Hospital Operations Map)eHOM (enhanced Hospital Operations Map)
eHOM (enhanced Hospital Operations Map)
 
Military Critical Infrastructure: GeoReadiness
Military Critical Infrastructure: GeoReadinessMilitary Critical Infrastructure: GeoReadiness
Military Critical Infrastructure: GeoReadiness
 
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
 
Powerpoint tom
Powerpoint   tomPowerpoint   tom
Powerpoint tom
 
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarIntegrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
 
Enrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEnrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdf
 
Kylie Dunn
Kylie DunnKylie Dunn
Kylie Dunn
 
How to implement interoperability
How to implement interoperabilityHow to implement interoperability
How to implement interoperability
 

Viewers also liked

Watch your head!
Watch your head!Watch your head!
Watch your head!
Elena Marinelli Friio
 
My future (1)
My future (1)My future (1)
Простая CRM система для управление отделом продаж
Простая CRM система для управление отделом продажПростая CRM система для управление отделом продаж
Простая CRM система для управление отделом продаж
Svyatoslav Tkachev
 
English project
English project English project
English project
Daniel Felipe Muñoz Aragon
 
Jade paul knedle edited
Jade paul knedle editedJade paul knedle edited
Jade paul knedle edited
Daisie Mathias
 
My future (1)
My future (1)My future (1)
My future (1)
My future (1)My future (1)
Enchanted lake g1
Enchanted lake g1Enchanted lake g1
Enchanted lake g1
Alvaro Javier Caicedo Moreno
 
Webinar
WebinarWebinar
Webinar
euroyen99
 
Кредитный конвейер - Step Integrator
Кредитный конвейер - Step IntegratorКредитный конвейер - Step Integrator
Кредитный конвейер - Step Integrator
Svyatoslav Tkachev
 
Системный интегратор Avaya
Системный интегратор AvayaСистемный интегратор Avaya
Системный интегратор Avaya
Svyatoslav Tkachev
 
Chlamydia trachomatis
Chlamydia trachomatisChlamydia trachomatis
Chlamydia trachomatis
Nicolas Cuevas
 
IT Project Governance Overview
IT Project Governance OverviewIT Project Governance Overview
IT Project Governance Overview
Steve Gerick
 
Ab genel sekreterlik
Ab genel sekreterlikAb genel sekreterlik
Ab genel sekreterlikzakbas
 
Leveraging Distribution Network Convergence to Maximize M&A Value
Leveraging Distribution Network Convergence to Maximize M&A ValueLeveraging Distribution Network Convergence to Maximize M&A Value
Leveraging Distribution Network Convergence to Maximize M&A Value
Tata Consultancy Services
 

Viewers also liked (15)

Watch your head!
Watch your head!Watch your head!
Watch your head!
 
My future (1)
My future (1)My future (1)
My future (1)
 
Простая CRM система для управление отделом продаж
Простая CRM система для управление отделом продажПростая CRM система для управление отделом продаж
Простая CRM система для управление отделом продаж
 
English project
English project English project
English project
 
Jade paul knedle edited
Jade paul knedle editedJade paul knedle edited
Jade paul knedle edited
 
My future (1)
My future (1)My future (1)
My future (1)
 
My future (1)
My future (1)My future (1)
My future (1)
 
Enchanted lake g1
Enchanted lake g1Enchanted lake g1
Enchanted lake g1
 
Webinar
WebinarWebinar
Webinar
 
Кредитный конвейер - Step Integrator
Кредитный конвейер - Step IntegratorКредитный конвейер - Step Integrator
Кредитный конвейер - Step Integrator
 
Системный интегратор Avaya
Системный интегратор AvayaСистемный интегратор Avaya
Системный интегратор Avaya
 
Chlamydia trachomatis
Chlamydia trachomatisChlamydia trachomatis
Chlamydia trachomatis
 
IT Project Governance Overview
IT Project Governance OverviewIT Project Governance Overview
IT Project Governance Overview
 
Ab genel sekreterlik
Ab genel sekreterlikAb genel sekreterlik
Ab genel sekreterlik
 
Leveraging Distribution Network Convergence to Maximize M&A Value
Leveraging Distribution Network Convergence to Maximize M&A ValueLeveraging Distribution Network Convergence to Maximize M&A Value
Leveraging Distribution Network Convergence to Maximize M&A Value
 

Similar to 2005 Presentation - Annual ITAM Conference

Lean IT
Lean ITLean IT
ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBM
Zyma Arsalan
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security Architecture
Leo de Sousa
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
Arul Nambi
 
IT Governance - OpenThinking Day
IT Governance - OpenThinking DayIT Governance - OpenThinking Day
IT Governance - OpenThinking Day
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
Lilian Schaffer
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
Lilian Schaffer
 
DHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise ArchitectureDHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise Architecture
Harry Strover
 
Service Integration in 20 minutes
Service Integration in 20 minutesService Integration in 20 minutes
Service Integration in 20 minutes
Capgemini
 
Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney Davis
Cydney Davis
 
ITIL Benefits
ITIL BenefitsITIL Benefits
ITIL Benefits
QAI
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine app
EPM Live
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
nooralmousa
 
10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance
Telecosm
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto Solution
HPDutchWorld
 
Omnitech Corporate Overview
Omnitech Corporate OverviewOmnitech Corporate Overview
Omnitech Corporate Overview
fonsjanssen
 
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
IS Unified Digital Enterprise Management ERP for IT
 
Dev ops intro
Dev ops  introDev ops  intro
Dev ops intro
Lilian Schaffer
 
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOOctober 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
IT Service and Support
 
9sept2009 iiruc
9sept2009 iiruc9sept2009 iiruc
9sept2009 iiruc
Agora Group
 

Similar to 2005 Presentation - Annual ITAM Conference (20)

Lean IT
Lean ITLean IT
Lean IT
 
ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBM
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security Architecture
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
IT Governance - OpenThinking Day
IT Governance - OpenThinking DayIT Governance - OpenThinking Day
IT Governance - OpenThinking Day
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
DHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise ArchitectureDHL Logistics - Enterprise Architecture
DHL Logistics - Enterprise Architecture
 
Service Integration in 20 minutes
Service Integration in 20 minutesService Integration in 20 minutes
Service Integration in 20 minutes
 
Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney Davis
 
ITIL Benefits
ITIL BenefitsITIL Benefits
ITIL Benefits
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine app
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto Solution
 
Omnitech Corporate Overview
Omnitech Corporate OverviewOmnitech Corporate Overview
Omnitech Corporate Overview
 
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
IS Unified "Digital Enterprise Management System" (ERP for IT, ITIL, CMMI,PMI...
 
Dev ops intro
Dev ops  introDev ops  intro
Dev ops intro
 
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOOctober 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
 
9sept2009 iiruc
9sept2009 iiruc9sept2009 iiruc
9sept2009 iiruc
 

Recently uploaded

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 

Recently uploaded (20)

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 

2005 Presentation - Annual ITAM Conference

  • 1. <Category> <Track> The Role of ITAM in Information Security Presented by Steve Gerick CISA, CISM, CITAM, PMP Associate Director - Protiviti
  • 2. <Category> <Track> Industry Trends & Drivers  People  Mergers and Acquisitions  Regulatory Compliance  Reduction of Organizational Silos  Centralized Model (consolidation and standardization)  Technology  Increased computing complexity  Need for “Active Asset Management”  Electronic software distribution & Patch Management  Move to suites instead of point products  Vendor Consolidation  Process  Real-time process model  Interest in ITIL and CobiT  Driven more by compliance needs
  • 3. <Category> <Track> Top Five IT Issues*  Strategic Alignment  Need to align IT with the business and its goals - providing a flexible, integrated information infrastructure to support business strategy.  Value Delivery  Places the focus on expenses and proof of value and concerns itself with cost-optimization, with ensuring a favorable return on investment for IT and a positive bottom-line impact.  IT Assets  Targets knowledge and infrastructure. Deals with the selective outsourcing of non-core processes to trusted suppliers, to leverage knowledge and skills internally and externally  Risk Management  Concerns itself with safeguarding assets and preparing for disaster.  Performance Measurement  Necessary for any of the other four to be managed appropriately in a complex economic and geopolitical environment. ISACA Journal Volume 4, 2002 Erik Guldentops - ITGI
  • 4. <Category> <Track> Typical ITAM Lifecycle
  • 5. <Category> <Track> IT Security Management Lifecycle * NIST Guide to Information Technology Security Services
  • 6. <Category> <Track> ITAM & Infosec Linkages  Configuration Management  Patch Management  Vulnerability Management  Data Protection  Property Accounting  Active – Inactive Assets  Asset Disposal  Theft Prevention  Move to suites instead of point products  Compliance  Software License Compliance  SOX, GLBA, HIPAA, Basel  Software Piracy
  • 7. <Category> <Track> ITAM & The ITIL Framework Planning to Implement Service Management T T h h Service Management e e ICT The Business Service T B Infrastructure Support e u Perspective Management s c i h n n Service o e Delivery Security l s s Management o g y Application Management Suppliers * ITIL Best Practices Services Software Asset Management
  • 8. <Category> <Track> Relationship between ITAM & Security Overall Management Overall management Processes Competence, awareness and training responsibility Performance metrics and continuous improvement Risk assessment Service continuity and availability management Policies and procedures Core Asset Management Asset identification Processes management Database Asset control Financial management Status accounting Logistics Verification and Relationship Processes Compliance Processes Processes Requirements definition (Governance) Contract management Design Supplier management Evaluation Verification and audit License compliance Internal business relationship Procurement management Build Security compliance Other compliance (software standards) Outsourcing management Deployment Operation Optimization * ITIL Best Practices Services Retirement Software Asset Management

Editor's Notes

  1. These are the industry trends I have seen from industry pundits and supported by what I ’ve been seeing in the field over the past two years working with over 50 different clients. People Mergers and acquisitions are placing severe strain on operations (IT, HR, Facilities, Finance) functions in organizations since this is an area that is usually cut deeply to help accelerate the financial benefits derived from consolidating operations. Regulatory compliance is placing tremendous burdens of public companies and in the health care sector with privacy concerns. Organizations have put a great deal of effort in promoting HR efforts that have focused on getting different groups within a company to break down organizational barriers. Technology Many organizations have multiple operating systems that drive platforms for business and productivity applications. UNIX, LINUX, Microsoft, OS/400, MVS, etc. Vendors have begun to offer real-time asset configuration and management solutions. Electronic software distribution and patch management solutions had proliferated. Altiris, SMS, Peregrine, CA, etc. Vendor consolidation. Process Technology model processes more closely now – ITIL-compliant ICT Management applications for example IT world more mature. Maturation typically migrates to standard frameworks that help organization integrate ICT functions. SOX, GLBA, HIPAA, Basel, etc.
  2. 1. strategic alignment , refers to aligning IT with the business and collaborative solutions. Alignment is best achieved when cross-functional, collaborative information systems are instituted. This allows IT to be an agent of change, enabling business transformation in a robust and nimble manner. Finally, strategically aligned IT helps educate and connect the c-suite (CIOs, CEOs, COOs, CPOs, CTOs, etc.) while enabling effective communication with information systems users. In other market analysts&apos; lists, the issue of strategic alignment is referred to through terms such as &quot;increasing business demands on IT infrastructure,&quot; &quot;integration of processes,&quot; &quot;systems integration,&quot; &quot;IT serving as an agent of change&quot; and &quot;IT bridging the disconnect with the c-suite. “ 2. value delivery , places the focus on expenses and proof of value. Value delivery concerns itself with cost-optimization, with ensuring a favorable return on investment for IT and a positive bottom-line impact. It takes into account the total cost of ownership of IT services and the quality and effectiveness of enterprise wide service delivery. Most important, it emphasizses keeping users and managers satisfied, thus proving the value of IT. Accountants and auditors traditionally have looked at emerging technology issues from the risk and control point of view. Value, on the other hand, is a more important driver for management. Auditors and accountants should be aware of, and deal with, the management priority. In other market analysts&apos; lists, the value delivery concept is alluded to by the use of such terms as &quot;IT service delivery,&quot; &quot;trust,&quot; &quot;quality of service&quot; and &quot;proving the value of IT. “ 3. IT assets , targets knowledge and infrastructure. Specifically, this issue deals with the selective outsourcing of non-core processes to trusted suppliers, thereby enabling the enterprise to leverage knowledge and skills internally and externally. IT assets ensures that an integrated, economical IT infrastructure is provided, wherein new technology is introduced judiciously and obsolete systems are updated or replaced. It recognizes the importance of people, in addition to hardware and software, and therefore focuses on maintaining availability, providing training, promoting retention and ensuring competence of key IT personnel. Other market analysts make reference to the IT assets issue in terms such as &quot;outsourcing,&quot; &quot;trusted suppliers,&quot; &quot;resource management, &quot;training and competency&quot; and &quot;skills retention. “ 4. risk management , concerns itself with safeguarding assets and preparing for disaster. Risk management establishes IT security to protect assets and enable business recovery from IT failures. It ensures privacy for users and builds resilience into systems. Risk management knows the importance of establishing trust in the enterprise&apos;s services and among its partners. It manages internal and external threats--internal from misuse and errors and external from deliberate attacks, market volatility and the pace of change. Other market analysts&apos; lists include the risk management concept by referring to &quot;safeguarding business assets,&quot; &quot;disaster recovery,&quot; &quot;security&quot; and &quot;resilience. “ 5. performance measurement , is simply, in the opinion of the IT Governance Institute, necessary for any of the other four to be managed appropriately in a complex economic and geopolitical environment. Other analysts include &quot;improving SDLC&quot; in this category.
  3. META recently estimated that some companies are over-licensed by as much as 40% and that the average is 15%
  4. ITAM Relationship to ITIL Framework Software Asset Management is depicted in the framework model. The keys are:
  5. Overview of ITIL Processes Planning to Implement Service Management covers the planning of Service Management Processes, together with the development of organizational and ICT cultures. Service Management consists of two guides: Service Delivery covers the processes associated with the development and improvement of the quality of ICT services such as SLM, Financial Mgt., Capacity Mgt., IT Service Continuity and Availability Management. Service Support describes the function and processes involved in the day-to-day support and maintenance of the ICT services such as Incident Mtg., Problem Mgt. Configuration Mgt., Change and Release Mgt. and the Service Desk function. ICT Infrastructure Management describes all of the processes associated with the management of the OCT infrastructure including overall management, Design and Planning, Deployment, Operations and Technical Support. Application Management includes all of the processes and issues associated with the development and management of applications and software lifecycles. Security Management covers all of the processes and issues associated with the security of ICT services and systems. Business Perspective focuses on the processes of business alignment and communication associated with the ICT systems and services.