Regulatory control functions, such as Operational Risk, Compliance and Audit, increasingly raise questions around the scope, management, and clarity of entitlements within distributed and mainframe application environments
This document provides an overview of entitlement management and identity management concepts. It discusses different access control models like access control lists, role-based access control, attribute-based access control and policy-based access control using XACML. The presenter Chamath Gunawardana is a technical lead at WSO2 who works on their identity server. WSO2 provides open source identity and access management solutions.
- The document provides information about the Project Management Professional (PMP) certification, including details about the exam, eligibility requirements, fees, scheduling the exam, tips for passing, and benefits of becoming PMP certified.
- It outlines the components of the 4-hour, 200 question PMP exam and lists eligibility criteria as either 5 years of project management experience with a high school diploma or 3 years with a bachelor's degree.
- The document recommends preparing for the challenging exam by choosing a training program from an experienced provider that offers practice tests, real-world case studies, and a study group.
The survey found that while 60% of respondents have adopted ISO 22301 in some form such as certification (10%), compliance (11%) or alignment (39%), top management commitment is still lacking in many organizations. Organizations with strong top management commitment were over 4 times more likely to adopt ISO 22301. The main benefits of certification were assurance of continued services (61%), protecting reputation (48%) and reducing risk of interruptions (48%). However, challenges included resource constraints (25%) and complexity of implementation (19%). Most organizations validated their ISO 22301 implementation through checking plans (54%) and audits (51%). Surprisingly, 82% of respondents did not require ISO 22301 certification from suppliers.
Governance of IT
COBIT Background
COBIT and Other frameworks
COBIT Principles
COBIT Goals
COBIT Objectives
COBIT Components
COBIT Design factors
COBIT Focus areas
COBIT Performance management
Designing and implementing a governance system
Effective Financial closing & Management reporting is one of the must have Capabilities of a Finance professional and CFO which is very important for "Optimizing Finance Operation" to lead the Finance head and company to a world Class Finance Performance
This document provides an outline for a training course to prepare for the PMP certification exam. The course covers 5 modules: creating a high-performing team, starting the project, doing the work, keeping the team on track, and keeping the business in mind. Module 1 focuses on building the team through defining ground rules, empowering members, and establishing virtual teams.
This document provides an overview of the ServiceNow ITSM platform. It discusses ServiceNow's architecture, features, modules, users and licensing model. ServiceNow is a leading cloud-based ITSM solution founded in 2003. It has a web-based interface and supports over 7400 enterprise customers. The architecture includes ServiceNow datacenters, firewalls, and interfaces with customer systems. Key modules include service desk, change management, asset management and more. The document also reviews ServiceNow's backup/recovery process and some important tables.
This document provides an overview of entitlement management and identity management concepts. It discusses different access control models like access control lists, role-based access control, attribute-based access control and policy-based access control using XACML. The presenter Chamath Gunawardana is a technical lead at WSO2 who works on their identity server. WSO2 provides open source identity and access management solutions.
- The document provides information about the Project Management Professional (PMP) certification, including details about the exam, eligibility requirements, fees, scheduling the exam, tips for passing, and benefits of becoming PMP certified.
- It outlines the components of the 4-hour, 200 question PMP exam and lists eligibility criteria as either 5 years of project management experience with a high school diploma or 3 years with a bachelor's degree.
- The document recommends preparing for the challenging exam by choosing a training program from an experienced provider that offers practice tests, real-world case studies, and a study group.
The survey found that while 60% of respondents have adopted ISO 22301 in some form such as certification (10%), compliance (11%) or alignment (39%), top management commitment is still lacking in many organizations. Organizations with strong top management commitment were over 4 times more likely to adopt ISO 22301. The main benefits of certification were assurance of continued services (61%), protecting reputation (48%) and reducing risk of interruptions (48%). However, challenges included resource constraints (25%) and complexity of implementation (19%). Most organizations validated their ISO 22301 implementation through checking plans (54%) and audits (51%). Surprisingly, 82% of respondents did not require ISO 22301 certification from suppliers.
Governance of IT
COBIT Background
COBIT and Other frameworks
COBIT Principles
COBIT Goals
COBIT Objectives
COBIT Components
COBIT Design factors
COBIT Focus areas
COBIT Performance management
Designing and implementing a governance system
Effective Financial closing & Management reporting is one of the must have Capabilities of a Finance professional and CFO which is very important for "Optimizing Finance Operation" to lead the Finance head and company to a world Class Finance Performance
This document provides an outline for a training course to prepare for the PMP certification exam. The course covers 5 modules: creating a high-performing team, starting the project, doing the work, keeping the team on track, and keeping the business in mind. Module 1 focuses on building the team through defining ground rules, empowering members, and establishing virtual teams.
This document provides an overview of the ServiceNow ITSM platform. It discusses ServiceNow's architecture, features, modules, users and licensing model. ServiceNow is a leading cloud-based ITSM solution founded in 2003. It has a web-based interface and supports over 7400 enterprise customers. The architecture includes ServiceNow datacenters, firewalls, and interfaces with customer systems. Key modules include service desk, change management, asset management and more. The document also reviews ServiceNow's backup/recovery process and some important tables.
Business Process Maturity and Centers of ExcellenceSandy Kemsley
The document discusses BPM maturity models, the role of a BPM Center of Excellence (COE) in improving maturity, and how to build an effective COE. It describes the Object Management Group's maturity model and how a COE can help organizations progress from initial to innovative process maturity levels. A COE brings together best practices, training, knowledge sharing, and process governance to increase synergies between BPM projects. The document provides guidance on establishing the framework, methodology, team, and repositories needed for a successful COE.
An Introduction to IT Management with COBIT 2019Gregor Polančič
This document provides an overview of key concepts from COBIT 2019, an enterprise governance of IT framework. It begins with an introduction to IT management and governance, explaining that IT management involves planning, building, running and monitoring IT activities in alignment with governance. Effective enterprise governance of IT (EGIT) helps realize benefits, optimize risks and resources, and improve business/IT alignment. Frameworks like COBIT provide best practices to assist with understanding, designing and implementing EGIT. COBIT 2019 builds on over 25 years of development and aligns with major standards. It defines six principles for effective governance systems and three principles for governance frameworks. The document concludes with an introduction to COBIT 2019 concepts.
It Service Management Implementation OverviewAlan McSweeney
This document describes an IT service management framework and implementation. It discusses ITIL/ITSM and the service management processes including incident and service request management. It provides an overview of the incident and service request management process including its principles, relationships between processes, and detailed processes. The document emphasizes that implementing service management requires understanding why it's being done, what resources are needed, and should be done in phases.
A fragmented governance, risk, and compliance (GRC) landscape leaves organizations to sort through a multitude of visions. Blue Hill identifies basic defining characteristics of GRC and how the changing business environment is leading organizations to pay more attention.
IT Governance – The missing compass in a technology changing worldPECB
Oladapo Ogundeji, CTO of Digital Jewels Ltd, gave a presentation on IT governance and its importance in today's technology changing world. He discussed that IT governance provides a formal process to define IT strategy and oversee its execution to achieve business goals. It also helps balance priorities like maximizing returns, increasing agility, and mitigating risks. Ogundeji covered frameworks like COBIT 5 and ISO 38500 that provide guidance on implementing IT governance and highlighted critical success factors like executive commitment, focus on execution, and competence in resources.
I am Continuously seeking to improve my competencies and skills to provide first class professional Project Management training courses; and develop my scope experience in Project Management functions.
I am confident that my innovative and results-focused approach would make significant contribution to the continued success of your organization.
this is the first presentations uploaded to Slide Share,
For more information do not hesitate to contact me.
Ahmad H. Maharma - PMP®
Ramallah, Palestine
Phone: + (972) (2) 2968644
Mobile: + (972) (599) 001155E-Mail: ahmad.maharma@gmail.com
This document discusses configuration management maturity levels from 0 to 4. Level 0 focuses on basic asset management tracking changes and ownership. Level 0.5 adds some service management. Level 1 introduces separate configuration management databases for different IT domains. Level 2 centralizes all configuration item data in one repository. Level 3 adds modeling, policies, and configuration item control. Level 4 integrates service, asset, and configuration management using the consumer, owner, provider model and reuses configuration management data across processes.
IT Portfolio Management Using Enterprise Architecture and ITIL® Service StrategyNUS-ISS
The document discusses using enterprise architecture and ITIL service strategy for IT portfolio management. It provides examples of how enterprise architecture helped the Singapore government and Procter & Gamble reduce costs and improve processes by standardizing systems and increasing automation and access to real-time information. The definition of enterprise architecture from Gartner is given as translating business vision and strategy into effective enterprise change by defining requirements, principles and models to describe the future state and enable evolution of the enterprise.
HITRUST CSF is a standard built upon other standards and authoritative sources relevant to the information security & privacy industry. The HITRUST CSF:
- Harmonizes existing controls and requirements from standards, regulations, business and third-party requirements.
- Incorporates both compliance and risk management principles
- Defines a process to effectively and efficiently evaluate compliance and security risk
This document discusses challenges in managing aging transmission and distribution assets for electric utilities. It outlines how utilities previously relied on routine-based maintenance schedules rather than advanced analytics. The document proposes building an analytical asset management approach using real-time performance data and predictive models to measure asset health and criticality. This would help utilities prevent failures, target high-priority assets, and lower costs through an optimized maintenance and replacement plan. A case study example on power transformer fleet management is also provided.
Developing an IAM Roadmap that Fits Your BusinessForgeRock
Presented by Jim McDonald, Engagement Manager, Identropy at ForgeRock Open Identity Stack Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
This document provides an overview of IT governance and the system development life cycle (SDLC). It discusses 9 study objectives related to IT governance, strategic management, and the various phases of the SDLC. The phases of the SDLC include systems planning, systems analysis, systems design, systems implementation, and operation and maintenance. Systems planning involves evaluating strategic objectives, prioritizing IT systems, and conducting feasibility studies. The IT governance committee oversees strategic management of IT and the SDLC process.
The document discusses Sarbanes-Oxley (SOX) compliance and the role of IT in designing and implementing internal controls over financial reporting. It defines key terms like COSO, internal controls, and the five components of an internal control system. It then outlines an IT compliance roadmap and describes how to document entity-level controls, IT policies and procedures, control narratives, flowcharts, and completed questionnaires.
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here
http://flevy.com/browse/business-document/itil-incident-management-workflow--process-guide-3020
DOCUMENT DESCRIPTION
This document establishes an Incident Management (IM) process according to ITIL v3 best practice and ISO 20000. (Word document including Visio diagram of the process)
This document introduces the Incident Management process Framework; the workflow, roles and responsibilities, RACI Matrix, KPIs, metrics, procedures, and policies needed to implement a high quality process.
Document contains suggested templates for:
Incident Life-cycle stages
Prioritization Matrix
Categorization
Incident Closure codes
Functional and Hierarchic Escalation Matrix
Major Incident Procedure
Reporting
How To Drive A Successful ServiceNow ImplementationAspire Systems
The webinar discusses how to drive a successful ServiceNow implementation. It covers prerequisites for implementation like getting stakeholder buy-in and defining processes and metrics. An effective roadmap is key and should visualize requirements and effort against value. Pitfalls to avoid include over-reliance on out-of-box features and poor process definition. A case study details how ServiceNow helped a Fortune 100 company standardize global processes, increase metrics tracking, and reduce costs.
Creating Enterprise Value from Business Architectureiasaglobal
This presentation will cover the Why (Value) and How (Execution) of a Business Architecture program. You will understand how you can lead your enterprise towards its vision by planning for key Business Capabilities that will get you there.
This document provides an overview of project management certification and the Project Management Professional (PMP) designation. It discusses the requirements to become PMP certified, including education, experience, and passing a 200 question exam. The exam covers five process groups: initiation, planning, execution, monitoring and controlling, and closing. Maintaining the PMP certification requires ongoing professional development. The document also introduces key project management concepts like the project management lifecycle, differences between projects and operations, and the role of the project manager.
The CFO Guide to Data with Deloitte & WorkdayWorkday, Inc.
A recent explosion of data and rapidly evolving tools and techniques for managing it have made it difficult to turn data into value.
View this deck to hear how Deloitte and Workday are helping organizations get a handle on their data, deploying automated, analytics-based planning models, streamlining finance operations, and becoming truly decision ready.
Establishing a Business Process Management Center of Excellence - Impact 2012Prolifics
This document discusses establishing a Business Process Management (BPM) Center of Excellence. It outlines why organizations need to coordinate BPM initiatives across departments to ensure business strategies are executed properly. A BPM Center of Excellence acts as a central hub for all BPM activities, providing methods, standards and linking strategy to execution. The document includes a case study of how Horizon Healthcare Services established a BPM Center of Excellence to help achieve operational excellence goals.
The document outlines the key steps in information technology auditing:
1. Planning - Identifying risks, business processes, and systems to audit.
2. Testing - Examining security controls, backups, resources, and vulnerabilities on systems like servers, printers, routers, workstations and laptops.
3. Reporting - Documenting the audit findings, conclusions, and recommendations in a report that is sent to the intended recipients like the Board of Visitors.
The document discusses an entitlement management strategy to streamline entitlement provisioning and review processes. It proposes assigning sets of entitlements based on employee roles and enabling managers to request and review entitlements through an online system. This would address issues of over-entitlement, lack of standard processes, and managers spending days reviewing entitlements without fully understanding them. The strategy includes creating a process guide, implementing role-based entitlement sets across the enterprise, and building online review and provisioning systems to manage access rights.
Business Process Maturity and Centers of ExcellenceSandy Kemsley
The document discusses BPM maturity models, the role of a BPM Center of Excellence (COE) in improving maturity, and how to build an effective COE. It describes the Object Management Group's maturity model and how a COE can help organizations progress from initial to innovative process maturity levels. A COE brings together best practices, training, knowledge sharing, and process governance to increase synergies between BPM projects. The document provides guidance on establishing the framework, methodology, team, and repositories needed for a successful COE.
An Introduction to IT Management with COBIT 2019Gregor Polančič
This document provides an overview of key concepts from COBIT 2019, an enterprise governance of IT framework. It begins with an introduction to IT management and governance, explaining that IT management involves planning, building, running and monitoring IT activities in alignment with governance. Effective enterprise governance of IT (EGIT) helps realize benefits, optimize risks and resources, and improve business/IT alignment. Frameworks like COBIT provide best practices to assist with understanding, designing and implementing EGIT. COBIT 2019 builds on over 25 years of development and aligns with major standards. It defines six principles for effective governance systems and three principles for governance frameworks. The document concludes with an introduction to COBIT 2019 concepts.
It Service Management Implementation OverviewAlan McSweeney
This document describes an IT service management framework and implementation. It discusses ITIL/ITSM and the service management processes including incident and service request management. It provides an overview of the incident and service request management process including its principles, relationships between processes, and detailed processes. The document emphasizes that implementing service management requires understanding why it's being done, what resources are needed, and should be done in phases.
A fragmented governance, risk, and compliance (GRC) landscape leaves organizations to sort through a multitude of visions. Blue Hill identifies basic defining characteristics of GRC and how the changing business environment is leading organizations to pay more attention.
IT Governance – The missing compass in a technology changing worldPECB
Oladapo Ogundeji, CTO of Digital Jewels Ltd, gave a presentation on IT governance and its importance in today's technology changing world. He discussed that IT governance provides a formal process to define IT strategy and oversee its execution to achieve business goals. It also helps balance priorities like maximizing returns, increasing agility, and mitigating risks. Ogundeji covered frameworks like COBIT 5 and ISO 38500 that provide guidance on implementing IT governance and highlighted critical success factors like executive commitment, focus on execution, and competence in resources.
I am Continuously seeking to improve my competencies and skills to provide first class professional Project Management training courses; and develop my scope experience in Project Management functions.
I am confident that my innovative and results-focused approach would make significant contribution to the continued success of your organization.
this is the first presentations uploaded to Slide Share,
For more information do not hesitate to contact me.
Ahmad H. Maharma - PMP®
Ramallah, Palestine
Phone: + (972) (2) 2968644
Mobile: + (972) (599) 001155E-Mail: ahmad.maharma@gmail.com
This document discusses configuration management maturity levels from 0 to 4. Level 0 focuses on basic asset management tracking changes and ownership. Level 0.5 adds some service management. Level 1 introduces separate configuration management databases for different IT domains. Level 2 centralizes all configuration item data in one repository. Level 3 adds modeling, policies, and configuration item control. Level 4 integrates service, asset, and configuration management using the consumer, owner, provider model and reuses configuration management data across processes.
IT Portfolio Management Using Enterprise Architecture and ITIL® Service StrategyNUS-ISS
The document discusses using enterprise architecture and ITIL service strategy for IT portfolio management. It provides examples of how enterprise architecture helped the Singapore government and Procter & Gamble reduce costs and improve processes by standardizing systems and increasing automation and access to real-time information. The definition of enterprise architecture from Gartner is given as translating business vision and strategy into effective enterprise change by defining requirements, principles and models to describe the future state and enable evolution of the enterprise.
HITRUST CSF is a standard built upon other standards and authoritative sources relevant to the information security & privacy industry. The HITRUST CSF:
- Harmonizes existing controls and requirements from standards, regulations, business and third-party requirements.
- Incorporates both compliance and risk management principles
- Defines a process to effectively and efficiently evaluate compliance and security risk
This document discusses challenges in managing aging transmission and distribution assets for electric utilities. It outlines how utilities previously relied on routine-based maintenance schedules rather than advanced analytics. The document proposes building an analytical asset management approach using real-time performance data and predictive models to measure asset health and criticality. This would help utilities prevent failures, target high-priority assets, and lower costs through an optimized maintenance and replacement plan. A case study example on power transformer fleet management is also provided.
Developing an IAM Roadmap that Fits Your BusinessForgeRock
Presented by Jim McDonald, Engagement Manager, Identropy at ForgeRock Open Identity Stack Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
This document provides an overview of IT governance and the system development life cycle (SDLC). It discusses 9 study objectives related to IT governance, strategic management, and the various phases of the SDLC. The phases of the SDLC include systems planning, systems analysis, systems design, systems implementation, and operation and maintenance. Systems planning involves evaluating strategic objectives, prioritizing IT systems, and conducting feasibility studies. The IT governance committee oversees strategic management of IT and the SDLC process.
The document discusses Sarbanes-Oxley (SOX) compliance and the role of IT in designing and implementing internal controls over financial reporting. It defines key terms like COSO, internal controls, and the five components of an internal control system. It then outlines an IT compliance roadmap and describes how to document entity-level controls, IT policies and procedures, control narratives, flowcharts, and completed questionnaires.
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here
http://flevy.com/browse/business-document/itil-incident-management-workflow--process-guide-3020
DOCUMENT DESCRIPTION
This document establishes an Incident Management (IM) process according to ITIL v3 best practice and ISO 20000. (Word document including Visio diagram of the process)
This document introduces the Incident Management process Framework; the workflow, roles and responsibilities, RACI Matrix, KPIs, metrics, procedures, and policies needed to implement a high quality process.
Document contains suggested templates for:
Incident Life-cycle stages
Prioritization Matrix
Categorization
Incident Closure codes
Functional and Hierarchic Escalation Matrix
Major Incident Procedure
Reporting
How To Drive A Successful ServiceNow ImplementationAspire Systems
The webinar discusses how to drive a successful ServiceNow implementation. It covers prerequisites for implementation like getting stakeholder buy-in and defining processes and metrics. An effective roadmap is key and should visualize requirements and effort against value. Pitfalls to avoid include over-reliance on out-of-box features and poor process definition. A case study details how ServiceNow helped a Fortune 100 company standardize global processes, increase metrics tracking, and reduce costs.
Creating Enterprise Value from Business Architectureiasaglobal
This presentation will cover the Why (Value) and How (Execution) of a Business Architecture program. You will understand how you can lead your enterprise towards its vision by planning for key Business Capabilities that will get you there.
This document provides an overview of project management certification and the Project Management Professional (PMP) designation. It discusses the requirements to become PMP certified, including education, experience, and passing a 200 question exam. The exam covers five process groups: initiation, planning, execution, monitoring and controlling, and closing. Maintaining the PMP certification requires ongoing professional development. The document also introduces key project management concepts like the project management lifecycle, differences between projects and operations, and the role of the project manager.
The CFO Guide to Data with Deloitte & WorkdayWorkday, Inc.
A recent explosion of data and rapidly evolving tools and techniques for managing it have made it difficult to turn data into value.
View this deck to hear how Deloitte and Workday are helping organizations get a handle on their data, deploying automated, analytics-based planning models, streamlining finance operations, and becoming truly decision ready.
Establishing a Business Process Management Center of Excellence - Impact 2012Prolifics
This document discusses establishing a Business Process Management (BPM) Center of Excellence. It outlines why organizations need to coordinate BPM initiatives across departments to ensure business strategies are executed properly. A BPM Center of Excellence acts as a central hub for all BPM activities, providing methods, standards and linking strategy to execution. The document includes a case study of how Horizon Healthcare Services established a BPM Center of Excellence to help achieve operational excellence goals.
The document outlines the key steps in information technology auditing:
1. Planning - Identifying risks, business processes, and systems to audit.
2. Testing - Examining security controls, backups, resources, and vulnerabilities on systems like servers, printers, routers, workstations and laptops.
3. Reporting - Documenting the audit findings, conclusions, and recommendations in a report that is sent to the intended recipients like the Board of Visitors.
The document discusses an entitlement management strategy to streamline entitlement provisioning and review processes. It proposes assigning sets of entitlements based on employee roles and enabling managers to request and review entitlements through an online system. This would address issues of over-entitlement, lack of standard processes, and managers spending days reviewing entitlements without fully understanding them. The strategy includes creating a process guide, implementing role-based entitlement sets across the enterprise, and building online review and provisioning systems to manage access rights.
Adam boczek 2015 agile architecture in 10 steps v1.0iasaglobal
This document outlines a 10 step process for developing agile architecture. It begins by discussing how innovation drives business and the need for supporting IT architecture. The 10 steps include: identifying business domains; creating a business entity model; defining a ubiquitous language; defining an initial process architecture; modeling core business processes; defining vertical requirements; defining bounded contexts; creating a BD/QA relevancy matrix; defining solution strategies; and defining building blocks. The goal is to develop an architecture that reduces risks, supports business agility, and focuses on simplicity through transparency, abstractions and partitioning.
Why We Need Architects (and Architecture) on Agile ProjectsRebecca Wirfs-Brock
This is an updated version of this talk which I will present at Agile 2013.
The rhythm of agile software development is to always be working on the next known, small batch of work. Is there a place for software architecture in this style of development? Some people think that software architecture should simply emerge and doesn’t require ongoing attention. But it isn’t always prudent to let the software architecture emerge at the speed of the next iteration. Complex software systems have lots of moving parts, dependencies, challenges, and unknowns. Counting on the software architecture to spontaneously emerge without any planning or architectural investigation is at best risky.
So how should architecting be done on agile projects? It varies from project to project. But there are effective techniques for incorporating architectural activities into agile projects. This talk explains how architecture can be done on agile projects and what an agile architect does.
Java 9 is expected to include several new features and changes, including:
- New collection factory methods like Set.of() and Map.of() that provide immutable collections.
- Enhancements to the Stream API such as takeWhile() and dropWhile().
- Syntax changes like allowing effectively final variables in try-with-resources and @SafeVarargs for private methods.
- The addition of JShell to provide a Java REPL.
- Garbage First (G1) garbage collector becoming the default collector.
- Various performance and logging improvements.
The slides of my talk at PUGRoma.
Here, a complete sample code
https://github.com/leopro/trip-planner
Presentation is also here: http://t.co/5EK56yYBmQ
Structured Approach to Solution ArchitectureAlan McSweeney
The role of solution architecture is to identify answer to a business problem and set of solution options and their components. There will be many potential solutions to a problem with varying degrees of suitability to the underlying business need. Solution options are derived from a combination of Solution Architecture Dimensions/Views which describe characteristics, features, qualities, requirements and Solution Design Factors, Limitations And Boundaries which delineate limitations. Use of structured approach can assist with solution design to create consistency. The TOGAF approach to enterprise architecture can be adapted to perform some of the analysis and design for elements of Solution Architecture Dimensions/Views.
Developing End State Vision
Advice and Planning Strategy
Driving a Business Architecture
Provisioning a Portfolio of Projects
eGRC Operation Control
Minimizing Financial Risk
Aggregating Financial Risk
Managing Mainframe Entitlements
Implementing Data Governance
Understanding Data Lineage
Defining Global Customer Strategy
The document discusses several case studies from Axis Technology Consulting. Each case study outlines a business challenge, the solution developed by Axis, and the impact. Examples of challenges addressed include implementing a global customer strategy, defining an end state vision, and provisioning a portfolio of projects. The solutions developed comprehensive strategies, established governance, and improved processes. The impacts included better alignment with business needs, increased efficiency, and enhanced decision making.
Con8154 controlling for multiple erp systems with oracle advanced controlsOracle
This document summarizes a presentation about Oracle GRC Advanced Controls. It discusses how Intercontinental Exchange (ICE) implemented Oracle Advanced Controls to gain visibility into risks across its two ERP systems - PeopleSoft and Oracle EBS - after acquiring NYSE. The implementation involved over 200 security, configuration and transactional controls across both systems to improve auditability, operational efficiency and compliance. Benefits included increased automation and analytics capabilities.
Customers talk about controlling access for multiple erp systems with oracle ...Oracle
Customer discuss using Oracle GRC Advanced Controls to help manager access to Multiple ERP's.
Eugene Hugh from InterContinental Exchange and Stephen D’Arcy from PWC explain how ICE and NYSE managed operational controls and met compliance requirements in a challenging ERP environment by using Oracle Advanced Controls. You can learn more about this by downloading the presentations from here.
Phillip E. Lucier has over 25 years of experience in consulting, project management, business analysis and software development. He has worked in a variety of industries and has extensive experience implementing business solutions through requirements gathering, system selection, customization and testing. He is proficient in various technical skills including Microsoft Office, financial systems, databases and programming languages.
“The organizing logic for business processes and IT infrastructure reflecting the integration and standardization requirements of the firm’s operating model.” [1]
“A conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to determine how an organization can most effectively achieve its current and future objectives.”[2]
ARCHIBUS White Paper - Creating an IWMS Implementation PlanMichael Willette
The document discusses creating an implementation plan for an Integrated Workplace Management System (IWMS). It describes conducting an IWMS needs analysis to identify an organization's requirements and optimal approaches for automating real estate and facilities management tasks. Typical phases of an IWMS implementation include a needs analysis, solution design, implementation, and post-implementation support. The needs analysis identifies objectives, priorities, resources, and produces an implementation plan to provide a clear roadmap.
The document provides a summary of John Tzanetakis's professional experience and qualifications. He has over 20 years of experience in business and systems analysis, team leadership, architecture, and systems development across multiple platforms. He has successfully designed and implemented numerous projects on time and on budget. His areas of expertise include business analysis, system design, application development, process improvements, and issue resolution.
Ramachandra Reddy has 8 years of experience as a Test Lead. He has expertise in test planning, test execution, defect reporting, test automation, and agile methodologies. He is proficient with tools like Selenium, JMeter, Jira, and others. He has experience testing insurance, banking, and other domains. His responsibilities include test estimation, case preparation, execution, defect tracking, and ensuring quality delivery of projects.
The document discusses Flexera Software's Operational Model Design consulting service. It helps organizations understand the complexity of entitlement management system design by cataloging business processes from prospect to support. Through workshops, Flexera analyzes the organization's operations and designs a blueprint architecture and operational model document detailing use cases. This provides requirements for developing a robust entitlement management solution and addresses issues causing high costs or limiting new products.
Jagadeesh Babu has over 5 years of experience in software testing, including functional testing, agile testing, test planning, and test execution. He has expertise in testing mainframe, web, and mobile applications for clients in banking, insurance, and healthcare. Jagadeesh is proficient with testing tools like ALM, QTP, and Selenium and databases like Oracle, DB2, and SQL. He is certified in ISTQB foundations and agile testing methodologies.
This document provides a summary of Cedric D. Green's qualifications, including over 20 years of experience in quality assurance roles. He has a bachelor's degree in business administration and has worked at several companies in QA lead and analyst roles testing software applications. His experience includes testing web, client-server, and mainframe applications across different industries.
This resume summarizes Juedienne Gordon's over 20 years of experience in business analysis, with a focus on healthcare, financial services, and web applications. She has extensive experience gathering requirements, documenting processes, and facilitating projects through all phases of the software development lifecycle. Key skills include business analysis, quality assurance testing, and experience with technologies such as Java, .NET, SQL, and relational databases.
The document describes Quick-Start Advantage, a 10-week program by The Summit Point Group to design, develop, and deliver a functioning Business Rules Management System prototype. The program includes defining requirements, designing and constructing a prototype rules engine, and validating the prototype with stakeholders. At the end, clients will have a pilot system and roadmap to full implementation.
Alexander Lee Rhea is a Major Incident Manager and Change Manager with over 20 years of experience in IT service management roles. He has a Bachelor's Degree in Computer Information Systems and various ITIL certifications. He has extensive experience implementing and supporting ITSM tools like HP Service Manager, Remedy, Maximo, and IBM ManageNow. His experience includes roles managing incidents, problems, changes, releases and knowledge at Deutsche Bank, State Farm Insurance, and Bloomberg LP.
Corebanking transformation – a wining formulaSupratik Nag
This document discusses the key considerations for a successful core banking system implementation. It begins by outlining common challenges faced by banks during implementation projects. It then covers each phase of the implementation process from product selection and requirement gathering to testing, training, go-live, and post-go live support. For each phase, it provides guidance on best practices such as selecting a product that fits the bank's long-term needs, taking a phased migration approach, and establishing robust testing and support plans. The overall message is that banks must plan thoroughly across all phases of implementation and consider stakeholder buy-in, change management, and post-go-live operations to achieve a smooth transition to a new core banking system.
Madhuri Veldanda seeks a leadership role in quality assurance and software testing with over 12 years of experience as a senior QA lead, technical lead, and QA analyst. She has expertise in manual and automated testing, test planning, requirements analysis, and tools including QTP, Test Director, and LoadRunner. She holds an MCA from Osmania University and training in project leadership and management skills.
This document provides a summary of Joseph R. Williams' experience as an IT Service professional and ServiceNow Administrator with over 20 years of experience implementing and maintaining IT service management tools. He has extensive experience designing and configuring ServiceNow platforms to improve incident, change, problem and asset management processes.
Lakshmi Reddy has over 15 years of experience in quality assurance, project management, and people management for defined benefit pension plans. She has a track record of successfully managing teams, projects, budgets, and client relationships. Her skills include testing strategy, system implementation, process improvement, and developing offshore teams in India.
This document discusses segregation of duties (SOD) and provides an example approach to establishing an SOD program. It explains that SOD is a key internal control that prevents any single person from having too much influence over business transactions. An effective SOD program requires establishing rules and policies, aligning organizational structure and processes, enforcing SOD through appropriate tools, implementing mitigating controls, and ongoing monitoring. The example approach outlines the components needed to define, implement, and manage SOD successfully. It also notes that technology solutions now exist to help companies automate SOD enforcement and monitoring.
The document discusses tile-based navigation and analytics as a solution for business users to intuitively analyze and explore complex quantitative data without needing extensive technical training. It describes how information tiles can densely display multiple dimensions of data and how dynamically rendering tiles in structured sets allows intuitive decision tree-style navigation through hierarchies of data. Tiles represent discrete pieces of information and metadata that compartmentalize and structure large amounts of data in a simple and consistent way for business users to navigate.
1) Rich Internet Applications (RIA) allow for more dynamic and interactive experiences compared to traditional web applications through technologies like AJAX, Flex, and Silverlight. They enable instant feedback, system-initiated interactions, and modular components that can communicate without full page refreshes.
2) Some key benefits of RIA include providing instant feedback to users as they interact, allowing the system to proactively update information for the user, and developing applications as modular components that can independently and dynamically communicate with each other.
3) However, fully realizing the benefits of RIA requires overcoming perceptions that they are only for animations and reconsidering traditional web design approaches which assumed linear interactions. Designers must learn
Axis provides a multi-step process to guide clients from identifying requirements to selecting and implementing software and technology solutions. The process starts by analyzing current state and requirements with the client's business, procurement, and technology teams. Axis then conducts a market survey and develops a shortlist of viable solutions. The final steps involve contacting vendors, organizing requests for information/proposals, and facilitating stakeholder scoring and demos to advise on product selection and implementation.
Axis Technology is a consulting firm that specializes in identifying sensitive data across mainframe and distributed systems through extensive assessment processes and tools. They create an inventory of sensitive data locations and develop an implementation roadmap to address exposures in a phased approach. Sensitive data includes customer information like names, addresses and financial details as well as employee data. Regulations from various government entities and industries require companies to properly manage and protect sensitive information.
Axis provides a multi-step process to develop a holistic eGRC strategy. The process engages stakeholders to analyze the current state, understand eGRC potential benefits, and set strategic goals. Axis then works with clients to envision an optimized eGRC future state and craft a roadmap to efficiently achieve goals. Each step provides insights to inform the next in a tailored approach.
Axis Technology, LLC provides entitlement management consulting services to analyze clients' current entitlement frameworks and implementations. They gather information to determine how entitlements can be improved and provide recommendations. An implementation plan outlines options for redesigning entitlement provisioning processes. The services help clients understand who has access to what resources and ensure entitlements comply with security and audit requirements.
Axis Technology takes a phased, iterative approach to data architecture and warehousing that prioritizes business needs. They identify the 20% of core data needed to meet 80% of business priorities. Their RAID toolset expedites analysis by providing a centralized repository of business and technical information to comprehensively map the current reporting environment and define future state options. They create an executable roadmap with prioritized projects to deliver immediate value at each stage while driving toward long-term objectives.
Axis Technology provides data governance consulting services to help organizations develop and implement customized data governance strategies. They begin by defining the problem and high-level scope, then assess the client's current data and capabilities to identify challenges. Axis designs a solution incorporating best practices tailored to the client's environment. They build and implement a governance roadmap to meet business goals and ensure processes are sustainable through knowledge transfer.
1) Axis partnered with a top US financial institution to streamline its regulatory technologies and reduce financial and compliance risk related to know-your-customer (KYC) and anti-money laundering (AML) policies and procedures.
2) An analysis found the financial institution had inconsistent KYC and AML risk rating processes across its multiple business lines due to differing account opening processes, standalone databases without linkage, and unguarded entry points between business lines.
3) Axis proposed and helped implement a solution that standardized data collection and storage into a central secure database, streamlined customer onboarding processes, and ensured compliance with evolving money laundering and terrorist financing regulations.
The document describes a case study of a financial services firm that developed a new desktop tool called Client Connections Integrated Desktop to provide a shared view of client information across different business lines. The tool integrated data from various CRM systems, accounts, and sources to give bankers, brokers, and support staff a unified view of client activities, opportunities, accounts, and details. This allowed the different teams to better collaborate and provide more personalized service to clients by having a holistic understanding of the client's full financial picture. The new system improved customer satisfaction and helped the firm gain more client assets.
The document discusses the development of a brokerage executive dashboard by Axis Technology to address the challenges faced by brokerage executives in gaining timely insight into key metrics. The dashboard provides:
1) A consolidated view of important brokerage metrics from areas like trade activity, customer trends, and assets under management in a single interface.
2) Graphical and multidimensional views of daily operational data to help executives monitor and analyze the business through comparison and trend analysis features.
3) Drill-down capabilities to navigate to deeper levels of detail from high-level views for informed strategic decision making based on data.
This document discusses a wealth management platform designed for ultra-high net worth investors and family offices. The platform aims to provide a simple consolidated view of complex financial investments across multiple accounts and advisors. It allows any group of accounts to be displayed together securely. The platform also features integrated secure email messaging between advisors and alerts when investment metrics move outside acceptable bounds. Reporting and data access is customizable so each party involved in managing family wealth can view just the information they need.
This document summarizes a business analysis case study of a financial firm's IRA simplification project. The firm wants to increase its market share in retirement accounts but faces challenges from decentralized processes and long transfer times. The analysis identified key teams and systems involved, interviewed stakeholders, mapped the account opening, monitoring, and funding processes, and found errors, bottlenecks and opportunities for improvement. The proposed solution is a three-generation phased rollout to streamline the process through training, increased automation, and consolidation of tools and support groups. Detailed multi-generational process charts were created to outline the plan for financial advisors, self-directed clients, and full service clients across account opening, monitoring, and funding stages.
The document summarizes a case study of a Property and Casualty Insurance Carrier that engaged an assessment of its data management practices. The assessment found the current practices to be disjointed due to recent acquisitions. It identified a roadmap of initiatives to mature the data management practice across six pillars including data governance. The solution extended the system development lifecycle to implement controls for data quality, profiling, and metadata capture. It also established operational quality audits and a knowledge transfer plan to communicate changes and monitor ongoing performance.
Axis facilitated joint analysis design (JAD) workshops between IT and business groups at a client organization to enhance their global reporting systems. Through interviews and collaborative workgroups, Axis helped surface gaps, interdependencies, and critical issues that had not previously been identified. This process cultivated mutual understanding and consensus across groups. The outcome of the JAD workshops provided an effective basis for the client to make cost-effective decisions on how to move their global reporting systems forward.
The document summarizes a 12-week project by Axis Information Architect to develop an enterprise data architecture for a private education lender. The project involved cataloging current systems, reports, and data flows. Axis created user personas and scenarios to understand how information is used. They defined a future state data flow and prioritized projects into a 24-month roadmap. The strategy effort resulted in consensus across the organization and alignment of IT initiatives with the strategic direction.
The document discusses three case studies of companies that faced challenges managing reference data from multiple sources:
1) A mutual fund company had issues tracking identifiers like CUSIPs as funds changed names through mergers and acquisitions.
2) A student lending institution struggled to quickly create new loan products due to manual spreadsheet processes.
3) The same student lender faced problems reconciling inconsistent account data from seven different loan servicers in different formats.
Axis Technology Consulting is a premier IT consulting firm that bridges business needs and technology investments. Founded in 2000, it is headquartered in Boston with additional offices in New York, Charlotte, and Dallas. Axis provides consulting services across various industries including financial services, insurance, and asset management. Its service offerings include customer engagement, information security, IT strategy, and application development and transformation.
Financial firms face complex data challenges due to fast changing regulations, complicated instruments, and data silos. Traditional methods of modeling data before consumption are expensive and lack agility. The document proposes that a semantic web approach combining structured and unstructured data can help firms increase insight, reduce costs, and improve agility by allowing non-technical users to access any data in familiar terms without complex queries. This solution extends big data practices to corporate structured data and introduces ontologies to integrate disparate sources. The approach involves free seminars and pilots before a priced proof of concept and final engagement.
Regulatory Control functions, such as Operational Risk, Compliance and Audit, increasingly raise questions around the scope, management, and identification of sensitive data within distributed and mainframe application environments.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257