This document discusses the importance of IT governance for organizations. It defines IT governance as the processes that ensure effective and efficient use of IT to achieve business goals. The document outlines formal IT governance frameworks like COBIT 5 and ITIL, as well as the importance of informal governance processes like regular stakeholder meetings and transparency. It also discusses challenges like managing shadow IT. The document provides a case study of Toastmasters International and how they implemented COBIT 5 to provide structure for IT project management and auditing.
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways.
However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge with bimodal IT is that it encourages IT management to shift their transformation efforts away from 'slow' IT to 'fast' digital efforts.
As cloud computing becomes a standard part of the IT repertoire, however, the bimodal divide begins to break down. True, 'fast' IT takes the cloud for granted, but even 'slow' IT finds substantial value in the cloud as well.
The result: enterprise cloud efforts become the common platform and frame of reference for all speeds of IT, breaking down the bimodal pattern that is so dangerous for organizations as they become increasingly digital.
What is all the buzz around containers and Docker? This new technology definitely is the solution to all the ills of distributed computing. After all, the combination of instant startup and reliable execution makes Docker containers ideal for delivering and running successful apps at scale.
However, Docker introduces new challenges that require new ways of management. The deployment complexities and security concerns in Docker environments challenge even the most advanced IT teams.
IT personnel need real-time answers to questions like:
How many Docker containers are currently running?
When have these containers been created or stopped?
What are the key operational container metrics (CPU, memory, network usage)?
What are the containers consuming most resources?
We will discuss:
Trends that are driving the explosive adoption of Docker
The pros and the cons of containers
Key challenges in managing Docker environments
How Sumo Logic can provide deep metrics to manage Docker performance and security effectively
DevOps, Digital, and Cloud - Two's Company, Three's a Crowd?Jason Bloomberg
Cloud Computing is unquestionably one of the driving forces of DevOps, as the automation of operations transforms enterprise software development. DevOps, however, is more than a technology trend, as it represents a move toward silo-busting, self-organizing horizontal teams that drive business velocity.
At the same time, enterprise Digital Transformation represents an upheaval across the enterprise, as customer preferences and behavior drive enterprise technology decisions. This transformation extends well beyond technology, however, as companies must rethink their organizational structure, moving toward silo-busting, self-organizing horizontal teams...sound familiar?
DevOps, Digital, Cloud -- three separate transformative trends, or one mega-trend? Or perhaps nothing more than enough buzzwords to win at buzzword bingo?
The big picture here isn't simply a shift in the way companies produce software, a rework of the customer experience, or automated outsourced infrastructure. It's an end-to-end change in the way enterprises work, as they transform into software-driven organizations.
what holds ITIL back from more successful transformation of IT work, and how we can help it succeed, as DevOps and ITSM finally converge on each other in the common ground of service operations.
from shadow IT to empowered IT-asanka 2014 08-gartner catalystWSO2
Project teams often use shadow IT, instead of the more slower moving traditional IT, to facilitate rapidly changing complex business requirements and quick release cycles. As a result an unmanaged, ungoverned set of IT solutions reside in enterprises without ownership. The risks of shadow IT keeps the CIO awake at night: business continuity to data protection to unmanaged costs are just a few of these risks. At the same time, the smart CIO knows not to wage war against shadow IT because that’s what keeps the business innovating rapidly.
In this session Asanka Abeysinghe, VP of Solutions Architecture at WSO2, will present how enterprises can leverage cloud enabled ALM frameworks to build managed and governed empowered IT. Topics to be discussed include, managing quick release cycles, template driven rapid development, empowering developers to develop, test and release apps in a governed secured manner, and providing internal business capabilities as APIs for application development. In addition Asanka will explain how innovative WSO2 clients are already gaining startup speed, reducing project risk, and enabling new business models by adopting WSO2 DevOps PaaS solutions
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways.
However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge with bimodal IT is that it encourages IT management to shift their transformation efforts away from 'slow' IT to 'fast' digital efforts.
As cloud computing becomes a standard part of the IT repertoire, however, the bimodal divide begins to break down. True, 'fast' IT takes the cloud for granted, but even 'slow' IT finds substantial value in the cloud as well.
The result: enterprise cloud efforts become the common platform and frame of reference for all speeds of IT, breaking down the bimodal pattern that is so dangerous for organizations as they become increasingly digital.
What is all the buzz around containers and Docker? This new technology definitely is the solution to all the ills of distributed computing. After all, the combination of instant startup and reliable execution makes Docker containers ideal for delivering and running successful apps at scale.
However, Docker introduces new challenges that require new ways of management. The deployment complexities and security concerns in Docker environments challenge even the most advanced IT teams.
IT personnel need real-time answers to questions like:
How many Docker containers are currently running?
When have these containers been created or stopped?
What are the key operational container metrics (CPU, memory, network usage)?
What are the containers consuming most resources?
We will discuss:
Trends that are driving the explosive adoption of Docker
The pros and the cons of containers
Key challenges in managing Docker environments
How Sumo Logic can provide deep metrics to manage Docker performance and security effectively
DevOps, Digital, and Cloud - Two's Company, Three's a Crowd?Jason Bloomberg
Cloud Computing is unquestionably one of the driving forces of DevOps, as the automation of operations transforms enterprise software development. DevOps, however, is more than a technology trend, as it represents a move toward silo-busting, self-organizing horizontal teams that drive business velocity.
At the same time, enterprise Digital Transformation represents an upheaval across the enterprise, as customer preferences and behavior drive enterprise technology decisions. This transformation extends well beyond technology, however, as companies must rethink their organizational structure, moving toward silo-busting, self-organizing horizontal teams...sound familiar?
DevOps, Digital, Cloud -- three separate transformative trends, or one mega-trend? Or perhaps nothing more than enough buzzwords to win at buzzword bingo?
The big picture here isn't simply a shift in the way companies produce software, a rework of the customer experience, or automated outsourced infrastructure. It's an end-to-end change in the way enterprises work, as they transform into software-driven organizations.
what holds ITIL back from more successful transformation of IT work, and how we can help it succeed, as DevOps and ITSM finally converge on each other in the common ground of service operations.
from shadow IT to empowered IT-asanka 2014 08-gartner catalystWSO2
Project teams often use shadow IT, instead of the more slower moving traditional IT, to facilitate rapidly changing complex business requirements and quick release cycles. As a result an unmanaged, ungoverned set of IT solutions reside in enterprises without ownership. The risks of shadow IT keeps the CIO awake at night: business continuity to data protection to unmanaged costs are just a few of these risks. At the same time, the smart CIO knows not to wage war against shadow IT because that’s what keeps the business innovating rapidly.
In this session Asanka Abeysinghe, VP of Solutions Architecture at WSO2, will present how enterprises can leverage cloud enabled ALM frameworks to build managed and governed empowered IT. Topics to be discussed include, managing quick release cycles, template driven rapid development, empowering developers to develop, test and release apps in a governed secured manner, and providing internal business capabilities as APIs for application development. In addition Asanka will explain how innovative WSO2 clients are already gaining startup speed, reducing project risk, and enabling new business models by adopting WSO2 DevOps PaaS solutions
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
Unleashing the power of machine learning for it ops managementJason Bloomberg
Now that virtualization is a must-have across all modern IT shops, data center operations require comprehensive, real-time insights in order to manage these high-performance production environments.
First-generation operational analytics tools fall short. They are based on static or some form of dynamic thresholds derived from trending and averaging analytical approaches. But in today’s dynamic, high-velocity environments, false positives are far too common and important information is lost in the noise.
Next generation analytic tools should leverage self-learning models powered by machine learning in order to deliver personalized, faster, more accurate operational insights.
While some emerging tools are leveraging self-learning models to identify the anomalies in the individual object behaviors based on reported statistics. However capturing the anomalies alone of individual metrics is not sufficient enough for two major reasons:
• First, it does not capture the interplay between the data and therefore learn those behaviors (such as IOPS, latencies, CPU).
• Second, it does not provide the actionable insight but rather identifies some anomaly that may or may not require attention.
Learn now next generation approach is addressing this gap using machine learning principals that incorporate the notion the topology and the interplay between the data to to derive root causes in order to identify actual issues and provide meaningful recommendations.
Join industry analyst Jason Bloomberg, president of Intellyx, who will discuss the challenges facing IT operations today and why advanced machine learning, graph technology, and topological data analysis are now critical elements needed by today’s IT operations analytics technology. Next, Jim Shocrylas, Product Manager, SIOS Technology will explain how next-generation machine learning is enabling IT analytics tools to help IT managers resolve performance issues, ensure resource optimization, and meet service level agreements for mission critical applications in VMware environments. He will then walk through common use cases for the practical application of this advanced technology.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security PitfallsDaniel Rivas
T security has become more of a concern to organizations big and small. Major security breaches or hacks are frequently reported in the media, and for every reported hack, dozens more are unreported. Small and medium-sized nonprofits are not immune to potential security breaches. Many nonprofit leaders consider the work they do of little or no value to hackers, since they’re not a bank or major retailer. Hackers prey on this naïve perception.
If you’re storing and working with data regarding members, donors, volunteers, clients or patrons, or credit cards, you could be at risk. Any breach could have severe ramifications, including loss of trust among your community or possible financial penalties.
Bad IT habits and practices make smaller nonprofits prime targets for hackers. Management, IT controls, and procedures introduce security risks to the organization. Hackers know that most small and medium-sized nonprofits don’t have the financial capacity or technical resources to implement security controls rivaling those of large organizations. Still, there are some basic sound IT practices and controls that can be put in place to provide a comfortable measure of control.
We’ll walk through the seven commonly-found bad habits and consider the potential IT security risk within each practice. We’ll also discuss effective IT policies, procedures, and tools to minimize security risks and transform bad habits into good ones.
This session is appropriate for any small or medium-sized nonprofit staff member responsible for making technology decisions, as well as nonprofit leaders influencing IT operations.
Lot has changed in the last 20 yrs. We have evolved from handcrafted server deployments to managing tens of thousands of devices programmatically, from monolithic architectures to distributed async-microservices, from waterfall to continuous delivery, from siloed culture to collaborative Dev*Ops culture and from hierarchical resource management to outcome-oriented structures.
Still, organisations & teams struggle to keep up. In this talk, I explore why this happens and what organisations should do to build MUST required capabilities to run infrastructure operations at scale.
Outline :
* History, 20 yrs of change!
* What does Infra-Ops Agility mean ?
* Why organisations & particularly ops teams struggle?
* What cultural, structural & skill aspects makes a great engineering org. ?
* How to manage priorities ?
In IT we have too many data sources, not enough resources, and too many discourses about what to do about it. We love to talk about Unified IT at Ivanti, but what does that look like? Come see the future of IT with Ivanti Cloud.
In this webinar, we’ll have short discussions with the Ivanti Cloud Product Team around topics like: 1) The state of IT in the Cloud, 2) How Unified IT has to start with unified data, 3) Instant data vs. trending data vs. aggregated data, 4) Interesting customer use cases we’ve seen so far using Ivanti Cloud. Join us and discover what you can do for IT in the Cloud.
MT99Dell OCIO: How we're integrating IT for the largest merger in tech historyDell EMC World
Executing the largest integration in high-tech history is not something that either Dell or EMC expect will be easy. But we didn’t do it because it was going to be easy, we did it because of the huge value it adds to our customers and employees. From the outset, we set about to achieve our integration through flawless IT execution and develop a platform for future project success This presentation will share the frameworks we applied to the integration, our tenants, our decision making processes, and of course our learnings as we brought these two great companies together. See what we have achieved thus far and the value in the plan we are executing as we share these learnings with our most valued partners, you.
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
Beyond the PC: Combating Unmanaged Threats Security
Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.
How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...Agile India
Lot has changed in the last 20 yrs. We have evolved from handcrafted server deployments to managing tens of thousands of devices programmatically, from monolithic architectures to distributed async-microservices, from waterfall to continuous deployment, from siloed culture to collaborative DevOps culture and from hierarchical resource management to outcome-oriented structures.
In this talk, I will review the key shifts in technology, culture, and people during the last 20 years that enabled us to stand where we are. I will share my experience on why many teams struggle to keep up and how leaders in those organisations can help such teams achieve InfraOps Agility.
More details:
https://confengine.com/agile-india-2019/proposal/9631/infraops-agility-a-sysads-perspective
Conference link: https://2019.agileindia.org
Join RES Software and other industry guests as we discuss the trends and obstacles that IT organizations should be prepared to face in the coming year. Get insight into what you can do today to prepared for future changes within your organization.
Unleashing the power of machine learning for it ops managementJason Bloomberg
Now that virtualization is a must-have across all modern IT shops, data center operations require comprehensive, real-time insights in order to manage these high-performance production environments.
First-generation operational analytics tools fall short. They are based on static or some form of dynamic thresholds derived from trending and averaging analytical approaches. But in today’s dynamic, high-velocity environments, false positives are far too common and important information is lost in the noise.
Next generation analytic tools should leverage self-learning models powered by machine learning in order to deliver personalized, faster, more accurate operational insights.
While some emerging tools are leveraging self-learning models to identify the anomalies in the individual object behaviors based on reported statistics. However capturing the anomalies alone of individual metrics is not sufficient enough for two major reasons:
• First, it does not capture the interplay between the data and therefore learn those behaviors (such as IOPS, latencies, CPU).
• Second, it does not provide the actionable insight but rather identifies some anomaly that may or may not require attention.
Learn now next generation approach is addressing this gap using machine learning principals that incorporate the notion the topology and the interplay between the data to to derive root causes in order to identify actual issues and provide meaningful recommendations.
Join industry analyst Jason Bloomberg, president of Intellyx, who will discuss the challenges facing IT operations today and why advanced machine learning, graph technology, and topological data analysis are now critical elements needed by today’s IT operations analytics technology. Next, Jim Shocrylas, Product Manager, SIOS Technology will explain how next-generation machine learning is enabling IT analytics tools to help IT managers resolve performance issues, ensure resource optimization, and meet service level agreements for mission critical applications in VMware environments. He will then walk through common use cases for the practical application of this advanced technology.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security PitfallsDaniel Rivas
T security has become more of a concern to organizations big and small. Major security breaches or hacks are frequently reported in the media, and for every reported hack, dozens more are unreported. Small and medium-sized nonprofits are not immune to potential security breaches. Many nonprofit leaders consider the work they do of little or no value to hackers, since they’re not a bank or major retailer. Hackers prey on this naïve perception.
If you’re storing and working with data regarding members, donors, volunteers, clients or patrons, or credit cards, you could be at risk. Any breach could have severe ramifications, including loss of trust among your community or possible financial penalties.
Bad IT habits and practices make smaller nonprofits prime targets for hackers. Management, IT controls, and procedures introduce security risks to the organization. Hackers know that most small and medium-sized nonprofits don’t have the financial capacity or technical resources to implement security controls rivaling those of large organizations. Still, there are some basic sound IT practices and controls that can be put in place to provide a comfortable measure of control.
We’ll walk through the seven commonly-found bad habits and consider the potential IT security risk within each practice. We’ll also discuss effective IT policies, procedures, and tools to minimize security risks and transform bad habits into good ones.
This session is appropriate for any small or medium-sized nonprofit staff member responsible for making technology decisions, as well as nonprofit leaders influencing IT operations.
Lot has changed in the last 20 yrs. We have evolved from handcrafted server deployments to managing tens of thousands of devices programmatically, from monolithic architectures to distributed async-microservices, from waterfall to continuous delivery, from siloed culture to collaborative Dev*Ops culture and from hierarchical resource management to outcome-oriented structures.
Still, organisations & teams struggle to keep up. In this talk, I explore why this happens and what organisations should do to build MUST required capabilities to run infrastructure operations at scale.
Outline :
* History, 20 yrs of change!
* What does Infra-Ops Agility mean ?
* Why organisations & particularly ops teams struggle?
* What cultural, structural & skill aspects makes a great engineering org. ?
* How to manage priorities ?
In IT we have too many data sources, not enough resources, and too many discourses about what to do about it. We love to talk about Unified IT at Ivanti, but what does that look like? Come see the future of IT with Ivanti Cloud.
In this webinar, we’ll have short discussions with the Ivanti Cloud Product Team around topics like: 1) The state of IT in the Cloud, 2) How Unified IT has to start with unified data, 3) Instant data vs. trending data vs. aggregated data, 4) Interesting customer use cases we’ve seen so far using Ivanti Cloud. Join us and discover what you can do for IT in the Cloud.
MT99Dell OCIO: How we're integrating IT for the largest merger in tech historyDell EMC World
Executing the largest integration in high-tech history is not something that either Dell or EMC expect will be easy. But we didn’t do it because it was going to be easy, we did it because of the huge value it adds to our customers and employees. From the outset, we set about to achieve our integration through flawless IT execution and develop a platform for future project success This presentation will share the frameworks we applied to the integration, our tenants, our decision making processes, and of course our learnings as we brought these two great companies together. See what we have achieved thus far and the value in the plan we are executing as we share these learnings with our most valued partners, you.
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
Beyond the PC: Combating Unmanaged Threats Security
Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.
How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...Agile India
Lot has changed in the last 20 yrs. We have evolved from handcrafted server deployments to managing tens of thousands of devices programmatically, from monolithic architectures to distributed async-microservices, from waterfall to continuous deployment, from siloed culture to collaborative DevOps culture and from hierarchical resource management to outcome-oriented structures.
In this talk, I will review the key shifts in technology, culture, and people during the last 20 years that enabled us to stand where we are. I will share my experience on why many teams struggle to keep up and how leaders in those organisations can help such teams achieve InfraOps Agility.
More details:
https://confengine.com/agile-india-2019/proposal/9631/infraops-agility-a-sysads-perspective
Conference link: https://2019.agileindia.org
Join RES Software and other industry guests as we discuss the trends and obstacles that IT organizations should be prepared to face in the coming year. Get insight into what you can do today to prepared for future changes within your organization.
Community IT monthly webinar series discusses the basics of IT governance, management, prioritization and decision making. We review a framework for defining and achieving IT success.
Good data is like good water: best served fresh, and ideally well-filtered. Data Management strategies can produce tremendous procedural improvements and increased profit margins across the board, but only if the data being managed is of high quality. Determining how Data Quality should be engineered provides a useful framework for utilizing Data Quality management effectively in support of business strategy. This, in turn, allows for speedy identification of business problems, delineation between structural and practice-oriented defects in Data Management, and proactive prevention of future issues. Organizations must realize what it means to utilize Data Quality engineering in support of business strategy. This webinar will illustrate how organizations with chronic business challenges can often trace the root of the problem to poor Data Quality. Showing how Data Quality should be engineered provides a useful framework in which to develop an effective approach. This in turn allows organizations to more quickly identify business problems as well as data problems caused by structural issues versus practice-oriented defects and prevent these from reoccurring.
Learning objectives:
-Help you understand foundational Data Quality concepts for improving Data Quality at your organization
-Demonstrate how chronic business challenges for organizations are often rooted in poor Data Quality
-Share case studies illustrating the hallmarks and benefits of Data Quality success
7 Habits of Highly Secure OrganizationsHelpSystems
We all want “best-practice” security, but what are top organizations doing to achieve and maintain it?
View this slideshow to learn the details about how to develop the seven habits that are part of daily life for secure organizations.
You’ll learn how to:
- Break the Ostrich Syndrome
- Develop a Security Policy
- Assess Current Standing
- Perform Security Event Logging and Review
- Use “Best of Breed” Technologies
- Monitor for Ongoing Compliance
- Plan For The Future
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
The Briefing Room with Malcolm Chisholm and Druva
Live Webcast on June 9, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=baf82d3835c5dfa63202dcbe322a3ad7
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
Visit InsideAnalysis.com for more information.
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
The Briefing Room with Malcolm Chisholm and Druva
Live
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
From the early days of IT, organizations have grappled with the challenges of understanding how well their infrastructure is performing in support of the business. They have used a plethora of tools to detect, manage, and resolve problems that are causing disruption of services, but still struggle to achieve a unified, cross-domain understanding of what is happening across their IT infrastructure. Fortunately, over the past few years analytics platforms like Splunk, Elastic, and others have emerged to address requirements around IT Operations Analytics (ITOA). Now today the buzz is around AIOps – Artificial Intelligence Operations. But what is AIOps, and what can it do to help organizations address IT challenges. In this presentation you will get a better understanding of:
What is Artificial Intelligence for IT Operations
What are the required technologies for success at AIOps
What challenges exist for achieving AIOPs
Atlassian Executive Business Forum - LinkedIn HQServiceRocket
Presentation from September 2014 at LinkedIn Headquarters in Mountain View. The slides detail how LinkedIn is transforming their business with tools from Atlassian Software.
ServiceRocket is Atlassian's first and longest-serving Platinum Expert Partner.
The national Scot-Secure Summit is the largest annual Cyber Security Conference in Scotland: the event brings together senior IT leaders and Information Security personnel, providing a unique forum for knowledge exchange, discussion and high-level networking.
The conference programme is focussed on promoting best-practice cyber security; looking at the current trends, the key threats - and offering practical advice on improving resilience and implementing effective security measures.
Best Practices for Managing SaaS ApplicationsCorrelsense
The proliferation of SaaS applications like Salesforce.com is creating a host of new management challenges. For example, how do you measure the performance of applications you don’t host? What real-time data do you have to communicate with business stakeholders? How will you know if SLA commitments are being met?
Join us for a webinar exploring the best practices for managing SaaS applications, including:
*Important ways that the management of SaaS and hosted application management differ
*The unique challenges of supporting enterprise SaaS applications
*Case studies demonstrating new techniques and tools for measuring the performance of hosted applications like Salesforce.com
5. Only four
years ago we
were
wondering if
we should let
people bring
their own
devices
http://kaboompics.com/one_foto/1000/smartphone-acer-jade-s-in-the-hands-of-a-man-on-a-background-of-yellow-flowers#
Thad Lurie, COO, Educause
“
6. You make the
business decisions
and we make the
technology decisions
“
audi r8 spider Maria Georgieva CC https://www.flickr.com/photos/mimoza291/8105102478/in/photostream/
8. IT Governance is
defined as the
processes that
ensure the effective
and efficient use of
IT in enabling an
organization to
achieve its goals.
(Gartner)
https://www.flickr.com/photos/pagedooley/3042418642/sizes/l/in/set-72157603419233445/
9. ITSG - how IT should do
what it does - is
concerned with ensuring
that the IT organization
operates in an effective,
efficient and compliant
fashion, and it is primarily
a CIO responsibility.
IT Supply-side
Governance
https://www.flickr.com/photos/dumbledad/3276756426/sizes/l/in/photostream/
10. ITDG - what IT should work on - is the
process by which organizations ensure the
effective evaluation, selection, prioritization,
and funding of competing IT investments;
oversee their implementation; and extract
(measurable) business benefits.
IT Demand Governance
11. ITDG is a business investment decision-
making and oversight process, and it is a
business management responsibility.
http://startupstockphotos.com/post/100854640206/gravitate-des-moines-ia-check-out-their-website
12. Tailored to Fit
• People: Culture of the organization,
organizational structure
• Processes: Complexity of IT and services,
complexity of the organizational offerings
• Resources: Current level of IT Governance,
IT staff, skills, leadership
14. • COBIT 5 (Control Objectives for
Information and Related Technology)
• ITIL (Information Technology Infrastructure
Library)
• ISO (International Organization for
Standardization) 27002
Formal
16. Toastmasters International
• We empower individuals to become more
effective communicators and leaders.
• Since 1924 (90 Years)
• 350,000 members
• 16,000 Clubs
• 135 Countries
18. Providing the Structure
• Wanted to adopt a framework
• Selected COBIT5
– ISACA (Information System Audit and Control Association)
• Boiled the Ocean
• Start Small, But Start
25. BAI 09: Manage Assets
• Purpose:
Account for all IT assets and optimize the value they provide.
• Process Description:
Manage IT assets through their life-cycle to make sure they:
– deliver value at optimal cost
– remain operational
– are accounted for & physically protected
– are reliable and available, particularly those that are critical
Manage software licenses to ensure:
– optimal number are acquired, retained and deployed as dictated by
business need
– software is installed in compliance with license agreements.
26. BAI 09: Manage Assets
Key Management Practices
BAI09.01 Identify and record current assets
BAI09.02 Manage critical assets
BAI09.03 Manage the asset life cycle
BAI09.04 Optimize asset costs
BAI09.05 Manage licenses
27. BAI09.01: Identify and record current assets
Activities
Maintain up-to-date and accurate record of all IT assets required to deliver
services.
1. Identify all owned assets in a register that records current status.
2. Identify legal, regulatory or contractual requirements that need to be
addressed when managing this asset.
3. Perform regular physical and logical inventory checks and reconciliation,
including use of software discovery tools.
4. Verify that assets are fit for purpose (i.e. in a usable and useful condition)
5. Review on a regular basis to determine if each asset provides value and if
so, expected useful life.
6. Ensure accounting for all assets.
28.
29. • Don’t lose sight of your goals.
• It’s not about doing everything
listed, do what’s right, and
excluding that which doesn’t
make sense or apply.
• The advantage of COBIT 5 is
that when used as a resource,
you don’t have to worry about
missing anything.
• Its about being EFFECTIVE!
COBIT5
5 principles
7 enablers
2 domains
37 processes
17 goals
31. What worked well
• Helping the organization how to initiate a
project
• Build our first Roadmap
• Proper documentation
– Business Case
– Program Charter
– Project Plan
37. • Involve senior people
• Have regular meetings
• Avoid existing meetings
• Reach out broadly for the details
• Build relationships one-on-one
An Informal Framework
46. Summary
• Technology and business are intertwined
• Formal methods are needed to manage
great complexity
• Informal methods help build trust
• Collaboration and transparency are key in
both approaches
49. Sam Soheil Farajian
Chief Information Officer
Toastmasters International
sfarajian@toastmasters.org
Moira H. Edwards, MS, CAE
President
Ellipsis Partners LLC
medwards@ellipsispartners.com
Contact Us