Benoit Long, Senior Assistant Deputy Minister, Transformation, Service Strategy and Design at Shared Services Canada (SSC), provides an update on the Department’s transformation initiatives and share information on the SSC transformation model that will enable the government to generate savings, increase security, and improve services to Canadians. Mr. Long explains how engagement, within the Department, the government and with the industry, is intrinsic to harnessing a more effective technology platform for the Government of Canada and to SSC’s ability to achieve the desired outcomes.
“Increase Value of IT Services Through Application Portfolio Management” deli...KBIZEAU
“Increase Value of IT Services Through Application Portfolio Management” delivered by Benoit Long, Senior Assistant Deputy Minister Transformation, Service Strategy and Design, Shared Services Canada.
Information Technology Infrastructure Roundtable Meeting June 11th, 2014: Transformation Initiatives Update given by Grant Westcott of Shared Services Canada.
Benoit Long, Senior Assistant Deputy Minister, Transformation, Service Strategy and Design at Shared Services Canada (SSC), provides an update on the Department’s transformation initiatives and share information on the SSC transformation model that will enable the government to generate savings, increase security, and improve services to Canadians. Mr. Long explains how engagement, within the Department, the government and with the industry, is intrinsic to harnessing a more effective technology platform for the Government of Canada and to SSC’s ability to achieve the desired outcomes.
“Increase Value of IT Services Through Application Portfolio Management” deli...KBIZEAU
“Increase Value of IT Services Through Application Portfolio Management” delivered by Benoit Long, Senior Assistant Deputy Minister Transformation, Service Strategy and Design, Shared Services Canada.
Information Technology Infrastructure Roundtable Meeting June 11th, 2014: Transformation Initiatives Update given by Grant Westcott of Shared Services Canada.
Transformation through Innovation: A Strategy for Service Provider SuccessCisco Service Provider
Service providers seek technology partners that can transform their businesses, helping them to move faster, with more security, greater flexibility, and less risk. Cisco offers a comprehensive strategy that creates an environment for services providers to advance innovation while enhancing profitability.
CenturyLink - Life Lock Call Center Case StudyJake Weaver
Hyper growth stretched the company’s
existing communications infrastructure
to its scalability limits. Managers
needed to find a tier-one vendor
who could provide a comprehensive,
expandable service portfolio to securely
connect multiple locations and support
a busy call center.
Enterprises are investing in cloud computing to manage their IT budgets more efficiently. Gartner predicts that the public cloud revenue for SaaS application service will be $73.6 billion in 2018, a 22% increase as compared to the previous years. This has led organizations to look for offerings that are specifically engineered to deliver their expected business outcomes.
The ease of adoption of cloud SaaS applications is promising greater flexibility and reduced cost to the business. At the same time due to the increase in adoption of SaaS applications, the information silos have increased which has created the need for integration across the cloud and enterprise.
Join us for the webinar to learn how you can resolve your integration challenges. We will also help you with how to:
Accelerate time to market and connect to SaaS applications in just minutes
Free up IT resources to do more innovative, customer-focused work
Improve and automate business processes via the sharing of data across applications
Extend investments in legacy systems and applications
Your LAN can now be delivered as a cloud-orchestrated service. Learn about key benefits, differentiators and business outcomes, while we deep dive into the Network as a Service (NaaS) concept, end-user experience and analytics.
- What is and Why NaaS?
- NaaS Utility Model
- Analytics to Optimize Your Cloud Network
- Live Q&A
How to avoid Pitfalls of FTTx Nework Laying - Cyient Solutions (A Case study)
Read our latest paper publication that was presented in APAC FTTH Conference, 2014. Our paper provides innovative solutions to avoid common pitfalls of network deployment. Please click on below link for the presentation.
This paper presents container technology with a particular focus on Docker®, the company, its technology, comparing containers with the VM approach, its involvement in the DevOPs and Platform as a service model, and partnerships with other IT players. It also touches upon the emergence of microservices architecture along with challenges to enterprise adoption.
Ken Ko's presentation from the 2017 Open Networking Summit discussing recent innovation and activity in the NFV and SDN space among broadband providers.
Shared Services in Health IT (based on SOA principles)paneja
Shared Services in Health IT (based on SOA principles). What are some of common business services that most Health IT appliocations need? How do we change the paradigm from developing seperate silo applications to the one based on shared services?
Presentation by Paul Aneja.
Transformation through Innovation: A Strategy for Service Provider SuccessCisco Service Provider
Service providers seek technology partners that can transform their businesses, helping them to move faster, with more security, greater flexibility, and less risk. Cisco offers a comprehensive strategy that creates an environment for services providers to advance innovation while enhancing profitability.
CenturyLink - Life Lock Call Center Case StudyJake Weaver
Hyper growth stretched the company’s
existing communications infrastructure
to its scalability limits. Managers
needed to find a tier-one vendor
who could provide a comprehensive,
expandable service portfolio to securely
connect multiple locations and support
a busy call center.
Enterprises are investing in cloud computing to manage their IT budgets more efficiently. Gartner predicts that the public cloud revenue for SaaS application service will be $73.6 billion in 2018, a 22% increase as compared to the previous years. This has led organizations to look for offerings that are specifically engineered to deliver their expected business outcomes.
The ease of adoption of cloud SaaS applications is promising greater flexibility and reduced cost to the business. At the same time due to the increase in adoption of SaaS applications, the information silos have increased which has created the need for integration across the cloud and enterprise.
Join us for the webinar to learn how you can resolve your integration challenges. We will also help you with how to:
Accelerate time to market and connect to SaaS applications in just minutes
Free up IT resources to do more innovative, customer-focused work
Improve and automate business processes via the sharing of data across applications
Extend investments in legacy systems and applications
Your LAN can now be delivered as a cloud-orchestrated service. Learn about key benefits, differentiators and business outcomes, while we deep dive into the Network as a Service (NaaS) concept, end-user experience and analytics.
- What is and Why NaaS?
- NaaS Utility Model
- Analytics to Optimize Your Cloud Network
- Live Q&A
How to avoid Pitfalls of FTTx Nework Laying - Cyient Solutions (A Case study)
Read our latest paper publication that was presented in APAC FTTH Conference, 2014. Our paper provides innovative solutions to avoid common pitfalls of network deployment. Please click on below link for the presentation.
This paper presents container technology with a particular focus on Docker®, the company, its technology, comparing containers with the VM approach, its involvement in the DevOPs and Platform as a service model, and partnerships with other IT players. It also touches upon the emergence of microservices architecture along with challenges to enterprise adoption.
Ken Ko's presentation from the 2017 Open Networking Summit discussing recent innovation and activity in the NFV and SDN space among broadband providers.
Shared Services in Health IT (based on SOA principles)paneja
Shared Services in Health IT (based on SOA principles). What are some of common business services that most Health IT appliocations need? How do we change the paradigm from developing seperate silo applications to the one based on shared services?
Presentation by Paul Aneja.
A solid business case provides the foundation for implementing a successful shared services organization. This is the first session in an HR Shared Services learning series that ScottMadden presented in conjunction with SSON. In this session, we covered the elements of a good business case including examining current costs, projecting costs and savings based on your future design, and conducting sensitivity analysis to understand possible outcomes. This presentation provides detailed guidelines and lessons learned for developing a sound business case.
For more information, please visit www.scottmadden.com.
Companies are looking forward for single Operation center for entire IT stack, This preso summarize the design components for ESOC which will cater entire IT infrastructure and application stack from a single facility.
Multi-function Shared Services center - an emerging trendZinnov
Shared services organizations are built on a foundation of reducing cost, promoting efficiencies and, ultimately, in achieving high performance. The evolution curve demonstrates that the shared services model has come a long way from the 70s when the focus was on centralizing non-core business processes to the current model of a portfolio approach based on establishing multi-shore, multi-delivery operations with best in breed solution offering. A variety of business functions are currently being outsourced/globalized with IT, F&A and HRO achieving significant maturity. In terms of locations, Indian cities (Bangalore, NCR and Pune) lead the way as the preferred destinations for most of the F&A, HRO and Inside Sales souring. Locations in Eastern Europe and Latin America offer viable alternatives.
Last week, I visited University of New South Wales, in Australia, and gave a talk providing an overview on research work over the past couple of years to establish a framework for Cognitive Enterprise services, specifically on how the lifecycle of enterprise services from sales to delivery and operation is transformed in the cognitive era. I provided an overview of the research assets we have produced, some of which is in industry or the company in various ways.
SSC will collaborate with the 106 organizations listed in Schedule I, I.1 or II of the Financial Administration Act, other than Agents of Parliament, who will be part of this initiative to consolidate contracts where possible, to identify the best procurement options, and to ensure competitive and fair service arrangements are put in place with the private sector.
Operating costs decrease and agility increases, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/simplifying-operations/index.html?KeyCode=000947566
Deployment of scalable reliable and collaborative technologyGGR Communications
Increasing employee/customer satisfaction and competitive advantage through the deployment of scalable, reliable and collaborative technology. This presentation goes into more detail regarding the solutions available from GGR Communications.
The advantages of UC for businesses, employees, customers and busuiness partners are well-known. UC empoweer them to communicate anytime, anywhere, using any device. However, many companies beleive that implementing a unified communications solution will prove too expensive for their limited budget and require replacing their whole infrastructure.
Information Technology Infrastructure Roundtable Meeting on June 11th, 2014: Update on priorities and activities presentation given by Liseanne Forand, President of Shared Services Canada.
GTEC Presentation: “Future Role of the CIO” delivered by Sharon Squire, Executive Director, Service and GC 2.0 Policy and Community Enablement Division, Chief Information Officer Branch, Treasury Board Secretariat.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
2014 sept-9-shared-services-canada
1. Information Technology Association of Canada (ITAC) Dancing with Departments Shared Services Canada (SSC) Update
Peter Bruce, Senior Assistant Deputy Minister Projects and Client Relationships
September 9, 2014
2. 2
Cyber Threats
Target end state: Streamlined networks
•
Connecting 377,000 public servants to each other and to Canadians
•
Linking 3,580 Government of Canada–occupied buildings Key components include:
•
Single enterprise-wide network with enhanced capacity and robustness
•
Ultra-high speed, no-fail connectivity between data centres
•
Greater, more secure Internet connectivity
•
Streamlined and wireless telecom infrastructure inside buildings
•
Voice services (VoIP) (wired and wireless)
•
More desktop videoconferencing services
•
Contact centre infrastructure services
•
Enhanced security through consolidated security services and increased perimeter security
Government of Canada
Network (GCNet)
Regional and international carriers (377,000 users; 3,580 buildings)
Internet
Public Servants
Government of Canada Offices
Businesses
Governments
Canadians
Virtual Private Cloud
Development
Sensitive Data Enclaves
Allies (+International)
Business Continuity
Supercomputer
Production X
Production Y
Target end state: Seven data centres
•
Established in pairs for redundancy
•
Mostly private sector-owned
•
Most outside of the National Capital Region (NCR) First pair: Development data centres
•
Bell Canada in Gatineau
•
Government of Canada– owned Macdonald-Cartier in Ottawa Second pair: First set of production data centres
•
Government of Canada– owned facility on the Canadian Forces Base Borden
•
Site located within 100 km of Borden Third pair: Final set of production data centres
•
If required (to be confirmed)
•
Located outside of NCR and Ontario Specialized supercomputing facility
Enhanced Enterprise Security
Data Centre and Network Consolidation Overview Target End State
3. SSC Service Delivery Transition
“One Way of Working”, leveraging the people, tools and services to improve our operations and provide more value for money.
Enterprise-wide approach to service delivery will build agility, capacity, and our operational foundation for change and new services.
ECONOMIC AND INTERNATIONAL
NATIONAL SECURITY
GOVERNMENT OPERATIONS
FINANCE
SCIENCE
43 PARTNERS
6 OPERATIONS PORTFOLIOS
Grouped by Business Affinity
Economic and International
Finance
Government Operations
National Security
Science
Social
TILTING HORIZONTALLY Towards Enterprise Lines of Business
SOCIAL
3
5. Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
FY 2013/2014
FY2014/2015
FY 2015/2016
FY 18/19
FY 19/20
TELECOMM- UNICATIONS
Contract Awards
Migration Complete
Project Authority Approved
DATA CENTRE
Enterprise Data Centre (EDC) Gatineau Complete
EDC Borden Twin - Established
EDC Ottawa Refurbishment Complete
EDC Borden Expansion Complete
EDC Borden - Interim Established
Production 4 Established
Production 3 Established
Building-by building migration begins
CYBER AND
IT SECURITY
FY 2016/2017
FY 17/18
Security Operations Centre Release 1
Network Security Transformation Plan
Security Operations Centre Release 2
Security Operations Centre Release 3
FACILITIES
INFRASTRUCTURE
AS A SERVICE
EDC Dorval - Replacement Complete
GCNET WAN
WIFI/LAN
VIDEOCONFERENCE
AND BOARDROOMS
VC Service 1.0 Established
(ongoing service improvements; releases as required)
Complete GC Commitments
Strategy for Multi-Tenant buildings
Pilot Complete
Managed Security Service Contract Award
Release 3 - Business Case
CYBER SECURITY
IT SECURITY
GC SECRET INFRASTRUCTURE
EDC Dorval Consolidation Complete
EDC Borden and EDC Borden Twin establishment
Migration Complete
Building-by building migration begins
Migration to enterprise services (Contact Centre Infrastructure and Toll Free Services)
CONTACT CENTRE
Migration Complete
Contract Award(s)
Consolidation Complete
Contract Award
WORKPLACE
COMMUNICATIONS
Migration Complete
Building-by building migration begins
WORKPLACE TECHNOLOGY DEVICES
Software Service Design
Hardware Service Design
Software Sourcing Strategy
Hardware Sourcing Strategy
PROVISIONING SERVICES
WORKPLACE TECHNOLOGY SERVICES
Initiate and Develop Pilot
Updated Business Case
Enterprise Business Case
Incremental Transition to Enterprise
EMAIL AND BB10
Contract Award
Wave 0
Wave 1
Wave 2
Wave 3
EMAIL
BB10
Execute in Waves (Break/Fix)
BB10 rollout complete
Migration
Release 1 (tactical)
Release 2 – C5 Upgrade
Release 3
Release 3 – Implementation
Pilot (SSC, TBS, Foreign Affairs and
Trade Development Canada)
VC Service 2.0
Data Centre Supply Chain Established
PLATFORM
AS A SERVICE
Basic Application Hosting Service Established
Mission Critical Application Hosting Service Release
(ongoing service improvement releases)
SSC Transformation Program Key Milestones (as at May 2, 2014)
5
6. 6
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Fiscal Year (FY) 13/14
FY 14/15
FY 15/16
FY 18/19
FY 19/20
NETWORKS
EMAIL & BB10
Wave 0 complete
Wave 1 complete
Wave 2 complete
Wave 3 complete
Migration Complete
DATA CENTRE
Centre de données de l’ Ouest du Québec / Development 1 Complete
Production 2 Established
Macdonald Cartier Data Centre / Development 2 Refurbishment Complete
Borden / Production 1 Expansion Complete
Borden /Production 1 Interim Established
Building-by-building migration begins
CYBER & IT SECURITY
WORKPLACE TECHNOLOGY DEVICES
Pilot Business Case
Software Service Design
Hardware Service Design
Software Sourcing Strategy
Hardware Sourcing Strategy
FY 16/17
FY 17/18
Security Operations Centre Release 1
Network Security Transformation Plan
Identity Credential Access Management Release 1
Security Operations Centre Release 3
EMAIL
BB10
Pilot (SSC, TBS, DFATD)
Execute Wave 1
PRODUCTION
DEVELOPMENT
SCIENTIFIC
Science Data Centre Replacement Complete
GCNET WAN
WIFI / LAN
VIDEO- CONFERENCE
GC Service Established
Strategy for Multi-Tenant buildings & trusted source guests
Pilot
Wifi
Managed Security Service Contract Award & Migration
Release 2 / Initiate Consolidation
Consolidate / Migrate
CYBER SECURITY
IT SECURITY
GC SECURE INFRASTRUCTURE
PROVISIONING SERVICES
SUPPORT SERVICES
CONTACT CENTRE
HOST. IP - VOICE
BB10 rollout complete
Supercomputing Consolidation Complete
Building-by-building migration begins
Consolidation Complete
Migration Complete
Migration Complete
Building-by-building migration begins
Pilot Contract Award
Contract Awards
Contract Award
Security Operations Centre Release 2
Contract Award (s)
Migration to enterprise services (Contact Centre Infrastructure and Toll Free Services)
Migration Complete
Production 3 Established
Production 4 Established
1.
Department Priority Name
2.
Department Priority Name
3.
Department Priority Name
4.
Department Priority Name
Partner Priorities
Email
Transformation Alignment - <DEPT>
5.
Department Priority Name
6.
Department Priority Name
7.
Department Priority Name
3
5
2
1
2
3
2
2
7
7
Iteration 2 - view as of January 2014 GOC Priorities Partner Priorities
10. Delivering on the GC IT Agenda – A Balancing Act
TRANSFORMATION
Fundamentally changing the delivery of IT Infrastructure Services
Challenge: Re- allocating resources and capacity to make it happen
PROJECTS
Building excellence and project execution with Partners
Challenge: Meeting business expectations during times of massive parallel change
OPERATIONS
Ensuring quality and continuity of IT Infrastructure Services
Challenge: Keeping the lights on during massive change while avoiding getting locked into a legacy environment
10