SlideShare a Scribd company logo
Leverage Your Security System to Operationalize Your
Business and Improve Processes to Impact Bottom Line
2
Agenda
Introductions
What drives an organization to make an operational
change?
How can an organization operationalize their business to
improve business processes?
Case Study – Comcast
Case Study – Northwestern Mutual
Q&A
3
Panelists and Subject Matter Experts:
AMAG Technology
President
Kurt Takahashi
Guidepost Solutions
Regional Vice President
LEED, AP, BD+C
Nick Miller
Comcast
Senior Director of Security
Andrew Campion
Northwest Mutual
Corporate Security
Bret DuChateau
4
Why make an operational change?
Processes &
Policies
Multiple Systems &
Complexity
Regulations &
Compliance
■ Manual paper processes
■ Outdated policies
■ Smaller teams
Globalization &
Consolidation
Assessing RiskInternal Procedures
■ Multiple systems
■ Legacy systems
■ Emerging technology
■ Lots of data & complexity
■ Tighter spending
■ Lack of data coloration
■ No event tracking
■ Increase in external
& internal threats
What are Possible Challenges in ALL Scenarios?
1
Access Control
Video
Management
2
Incident &
Alarm
Management
3
Asset
Management
Training
4
HR, AD, IDM
5
Risk Management
Emergency
Preparedness
Physical SecurityHR, LegalRisk & ComplianceITFinance
6 7 8 9 10
User Community
Technical Infrastructure
Buildings / People
Employees, Visitors, Contractors Increased Risk
6
Mitigate Risk
•Automate manual processes
to reduce risk of errors and
policy breaches.
7
•Meet internal audit requirements to
set high standards for organization
•Meet government compliance
regulations and save money, SOX, PCI,
HIPAA and NERC/CIP, etc.
•Advanced reporting
Audit and Compliance Requirements
8
Reduce Costs
●Integrate multiple data sources into a
single dashboard
●Reduce headcount
●Streamline operations
9
Getting Started – Complex Opportunities
10
Where are the areas of improvement?
• Email driven workflow
• Paper records – Visitors – Keys
• Cumbersome compliance reporting
• High labor costs or hidden soft costs
• Adding people to solve problems
• Slow processes – dissatisfied users
• Non enterprise systems
• Disparate systems in function and location
• Department silos
11
Steps to Insure Success
D
• Problem
• Target
• Business Needs
• Boundary
Define
• Gap
• Data
• Process
• Baseline
Measure
M
• Root cause
• Prioritize
• Inputs &
Outputs
Analyze
A
• Solutions
• Scope of Work
• Specifications
• Implementation
Improve
I
• Monitor
• Control plan
• Documentation
• Sustainability
• Test
Environment
Control
C
12
Fundamental Steps
1. Have a Vision of what you want to accomplish or processes to
improve – Create your Mission Statement
2. Engage your key stakeholders and participants to identify the
issues and map the data fields between systems *
3. Create a complete scope of work with software implementation
documentation before engaging professional services*
4. Require an implementation schedule from vendor
5. Create or use a non-production test environment
6. Require comprehensive documentation and testing
7. Track and report your success
*Hard
Work
13
Comcast brings together the best in media and
technology. We drive innovation to create the world’s
best entertainment and online experiences.
Comcast Corporation (NASDAQ: CMCSA) is a global
media and technology company with two primary
businesses, Comcast Cable and NBCUniversal.
Comcast Cable is one of the nation's largest video,
high-speed Internet and phone providers to
residential customers under the XFINITY brand and
also provides these services to businesses.
Case Study - Comcast
13
14
Business Alignment
• Customer Experience
• Critical Network
• Innovative Products
Employee Experience
• Secure
• Simple
• Enabled
Value Proposition
• Manage Risk
• Role Clarity
• Business Partners
Accountable Results
• Execution
• Innovation
• Sustainable
• Leverage Technology
Our Challenge – Why Transformation?
Case Study - Comcast
15
Reset
Strategy
• Mature Systems
• Integrated Tech
• Smart
Investment
Align Team
• Internal Skills
• Embraced
Integrators
• Clarified Roles
Gain Support
• Budget
• IT Partners
• Enhanced
Programs
Our Vision – How did we Transform?
Case Study - Comcast
16
Our Results – Where are we now?
● Documented
Policies and
Procedures
● Simplified
Operations
● Communication to
Business
Clarified
Responsibilities
● Single Systems:
PACS, VMS
● Centralized
Operations: SOC
● Identity
Management
● Visitor
Management
Leveraged
Technology
● Equipped Internal
Team
● Improved
Relationships with
Vendors
● Sustainable
Operations
Build Expertise
Bottom Line: More effectively protected company assets, and in turn marketed
security’s value proposition
Case Study - Comcast
17
▪ For nearly 160 years, Northwestern Mutual has
been helping clients plan for their financial
security with confidence
▪ Recognized by FORTUNE magazine as one of
the “World’s Most Admired” life insurance
companies in 2016
▪ $238.5 billion in assets. $27.9 billion in revenue.
Ranked 109 on the 2015 FORTUNE 500 list.
▪ Two corporate campuses: Downtown Milwaukee,
WI and Franklin, WI (suburb)
www.northwesternmutual.com
Case Study – Northwestern Mutual
18
• 2.5 million square feet;
5 buildings
• 3100 workforce
• 1.1 million square feet;
2 buildings
• 2,400 workforce
• 1.2 mile walking path
Milwaukee, WI Campus Franklin, WI Campus
Case Study – Northwestern Mutual
19
Major building project at the Downtown Milwaukee
Campus
• Looking to future state – working smarter and not
harder, working agile, leveraging technology to
reduce risk
Overall Goals:
Enterprise-wide platforms, integration opportunities,
risk reduction, operational efficiency, improved
business processes and resiliency.
Case Study – Northwestern Mutual
20
FR access
control
FR patrol tour
Incident
Reporting
FR visitor logs
Dispatch Logs
LEVERAGE
TECHNOLOGY
MIL access
control
MIL patrol
tour
Incident
Reporting
MIL visitor
logs
Dispatch Logs
LEVERAGE
TECHNOLOGY
Case Study – Northwestern Mutual
Leverage
enterprise
technology to
reduce manual
processes,
risk, and
mistakes !!
21
Documentation Standards – Before & After
Current State
1 Month snapshot
Alarm/Activity Log Entries (June 2016)
▪ Forced Access, Timed Access,
Prop, Duress
▪ FR Control Center: 65 per day
▪ MIL Control Center: 59 per day
▪ MIL – Special Events - 193 in a
month
2,921 processes total/month
Future State
Same Month snapshot
Alarm/Activity Log Entries (June 2016)
▪ Forced Access, Timed Access,
Prop, Duress
▪ FR Control Center: 10 per day
▪ MIL Control Center: 8 per day
▪ MIL – Special Event - Zero
396 processes total/month
2,525 eliminated entries = 86% reduction in number of processes
Time savings of 14 hours/month
Case Study – Northwestern Mutual
22
Case Study – Northwestern Mutual
From This:
To This:
23
Questions? Thank you!
AMAG Technology
President
O: 310-518-2380, ext 270
C: 310-483-5443
Kurt.takahashi@amag.com
Kurt Takahashi
Guidepost Solutions
Regional Vice President
LEED, AP, BD+C
O: 510-250-6234
C: 510-529-5416
Nmiller@guidepostsolutions.com
Nick Miller
Comcast
Senior Director of Security
O: 720-267-2021
C: 720-233-1243
Andrew_Campion@cable.comcast.com
Andrew Campion
Northwestern Mutual
Corporate Security
O: 414-661-6752
bretduchateau@northwesternmutual.com
Bret DuChateau

More Related Content

What's hot

Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Citrin Cooperman
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
Bill Clark
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
Rui Miguel Feio
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
MichaelSadeghiPhDABD
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
Mackenzie Starcevich
 

What's hot (6)

Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 

Similar to Leveraging Your Security System to Impact Your Bottom line

Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
ManageEngine
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
Ignyte Assurance Platform
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
Safe Software
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
Elkouri Abdelali
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
360factors
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
Muneesh Batra
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
Muneesh Batra
 
lcm cv 19042016 v01
lcm cv 19042016 v01lcm cv 19042016 v01
lcm cv 19042016 v01
Lou Murphy
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
Resilient Systems
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
Tuan Phan
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
Performance Tuning Corporation
 
It assessment case study
It assessment case studyIt assessment case study
It assessment case study
Nandita Nityanandam
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
TheAnfieldGroup
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
stacybre
 
UAT for a Major US Banking Conglomerate
UAT for a Major US Banking ConglomerateUAT for a Major US Banking Conglomerate
UAT for a Major US Banking Conglomerate
Thinksoft Global
 
Chief Inofrmation / Technology Summit
Chief Inofrmation / Technology SummitChief Inofrmation / Technology Summit
Chief Inofrmation / Technology Summit
guested3c50
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
Ahmadi Madi
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
goreankush1
 
Extending human workflow preparing people and processes for the digital era w...
Extending human workflow preparing people and processes for the digital era w...Extending human workflow preparing people and processes for the digital era w...
Extending human workflow preparing people and processes for the digital era w...
camunda services GmbH
 
Delivering mobile analytics
Delivering mobile analyticsDelivering mobile analytics
Delivering mobile analytics
Doug Melville
 

Similar to Leveraging Your Security System to Impact Your Bottom line (20)

Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
lcm cv 19042016 v01
lcm cv 19042016 v01lcm cv 19042016 v01
lcm cv 19042016 v01
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
It assessment case study
It assessment case studyIt assessment case study
It assessment case study
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
UAT for a Major US Banking Conglomerate
UAT for a Major US Banking ConglomerateUAT for a Major US Banking Conglomerate
UAT for a Major US Banking Conglomerate
 
Chief Inofrmation / Technology Summit
Chief Inofrmation / Technology SummitChief Inofrmation / Technology Summit
Chief Inofrmation / Technology Summit
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Extending human workflow preparing people and processes for the digital era w...
Extending human workflow preparing people and processes for the digital era w...Extending human workflow preparing people and processes for the digital era w...
Extending human workflow preparing people and processes for the digital era w...
 
Delivering mobile analytics
Delivering mobile analyticsDelivering mobile analytics
Delivering mobile analytics
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Leveraging Your Security System to Impact Your Bottom line

  • 1. Leverage Your Security System to Operationalize Your Business and Improve Processes to Impact Bottom Line
  • 2. 2 Agenda Introductions What drives an organization to make an operational change? How can an organization operationalize their business to improve business processes? Case Study – Comcast Case Study – Northwestern Mutual Q&A
  • 3. 3 Panelists and Subject Matter Experts: AMAG Technology President Kurt Takahashi Guidepost Solutions Regional Vice President LEED, AP, BD+C Nick Miller Comcast Senior Director of Security Andrew Campion Northwest Mutual Corporate Security Bret DuChateau
  • 4. 4 Why make an operational change? Processes & Policies Multiple Systems & Complexity Regulations & Compliance ■ Manual paper processes ■ Outdated policies ■ Smaller teams Globalization & Consolidation Assessing RiskInternal Procedures ■ Multiple systems ■ Legacy systems ■ Emerging technology ■ Lots of data & complexity ■ Tighter spending ■ Lack of data coloration ■ No event tracking ■ Increase in external & internal threats
  • 5. What are Possible Challenges in ALL Scenarios? 1 Access Control Video Management 2 Incident & Alarm Management 3 Asset Management Training 4 HR, AD, IDM 5 Risk Management Emergency Preparedness Physical SecurityHR, LegalRisk & ComplianceITFinance 6 7 8 9 10 User Community Technical Infrastructure Buildings / People Employees, Visitors, Contractors Increased Risk
  • 6. 6 Mitigate Risk •Automate manual processes to reduce risk of errors and policy breaches.
  • 7. 7 •Meet internal audit requirements to set high standards for organization •Meet government compliance regulations and save money, SOX, PCI, HIPAA and NERC/CIP, etc. •Advanced reporting Audit and Compliance Requirements
  • 8. 8 Reduce Costs ●Integrate multiple data sources into a single dashboard ●Reduce headcount ●Streamline operations
  • 9. 9 Getting Started – Complex Opportunities
  • 10. 10 Where are the areas of improvement? • Email driven workflow • Paper records – Visitors – Keys • Cumbersome compliance reporting • High labor costs or hidden soft costs • Adding people to solve problems • Slow processes – dissatisfied users • Non enterprise systems • Disparate systems in function and location • Department silos
  • 11. 11 Steps to Insure Success D • Problem • Target • Business Needs • Boundary Define • Gap • Data • Process • Baseline Measure M • Root cause • Prioritize • Inputs & Outputs Analyze A • Solutions • Scope of Work • Specifications • Implementation Improve I • Monitor • Control plan • Documentation • Sustainability • Test Environment Control C
  • 12. 12 Fundamental Steps 1. Have a Vision of what you want to accomplish or processes to improve – Create your Mission Statement 2. Engage your key stakeholders and participants to identify the issues and map the data fields between systems * 3. Create a complete scope of work with software implementation documentation before engaging professional services* 4. Require an implementation schedule from vendor 5. Create or use a non-production test environment 6. Require comprehensive documentation and testing 7. Track and report your success *Hard Work
  • 13. 13 Comcast brings together the best in media and technology. We drive innovation to create the world’s best entertainment and online experiences. Comcast Corporation (NASDAQ: CMCSA) is a global media and technology company with two primary businesses, Comcast Cable and NBCUniversal. Comcast Cable is one of the nation's largest video, high-speed Internet and phone providers to residential customers under the XFINITY brand and also provides these services to businesses. Case Study - Comcast 13
  • 14. 14 Business Alignment • Customer Experience • Critical Network • Innovative Products Employee Experience • Secure • Simple • Enabled Value Proposition • Manage Risk • Role Clarity • Business Partners Accountable Results • Execution • Innovation • Sustainable • Leverage Technology Our Challenge – Why Transformation? Case Study - Comcast
  • 15. 15 Reset Strategy • Mature Systems • Integrated Tech • Smart Investment Align Team • Internal Skills • Embraced Integrators • Clarified Roles Gain Support • Budget • IT Partners • Enhanced Programs Our Vision – How did we Transform? Case Study - Comcast
  • 16. 16 Our Results – Where are we now? ● Documented Policies and Procedures ● Simplified Operations ● Communication to Business Clarified Responsibilities ● Single Systems: PACS, VMS ● Centralized Operations: SOC ● Identity Management ● Visitor Management Leveraged Technology ● Equipped Internal Team ● Improved Relationships with Vendors ● Sustainable Operations Build Expertise Bottom Line: More effectively protected company assets, and in turn marketed security’s value proposition Case Study - Comcast
  • 17. 17 ▪ For nearly 160 years, Northwestern Mutual has been helping clients plan for their financial security with confidence ▪ Recognized by FORTUNE magazine as one of the “World’s Most Admired” life insurance companies in 2016 ▪ $238.5 billion in assets. $27.9 billion in revenue. Ranked 109 on the 2015 FORTUNE 500 list. ▪ Two corporate campuses: Downtown Milwaukee, WI and Franklin, WI (suburb) www.northwesternmutual.com Case Study – Northwestern Mutual
  • 18. 18 • 2.5 million square feet; 5 buildings • 3100 workforce • 1.1 million square feet; 2 buildings • 2,400 workforce • 1.2 mile walking path Milwaukee, WI Campus Franklin, WI Campus Case Study – Northwestern Mutual
  • 19. 19 Major building project at the Downtown Milwaukee Campus • Looking to future state – working smarter and not harder, working agile, leveraging technology to reduce risk Overall Goals: Enterprise-wide platforms, integration opportunities, risk reduction, operational efficiency, improved business processes and resiliency. Case Study – Northwestern Mutual
  • 20. 20 FR access control FR patrol tour Incident Reporting FR visitor logs Dispatch Logs LEVERAGE TECHNOLOGY MIL access control MIL patrol tour Incident Reporting MIL visitor logs Dispatch Logs LEVERAGE TECHNOLOGY Case Study – Northwestern Mutual Leverage enterprise technology to reduce manual processes, risk, and mistakes !!
  • 21. 21 Documentation Standards – Before & After Current State 1 Month snapshot Alarm/Activity Log Entries (June 2016) ▪ Forced Access, Timed Access, Prop, Duress ▪ FR Control Center: 65 per day ▪ MIL Control Center: 59 per day ▪ MIL – Special Events - 193 in a month 2,921 processes total/month Future State Same Month snapshot Alarm/Activity Log Entries (June 2016) ▪ Forced Access, Timed Access, Prop, Duress ▪ FR Control Center: 10 per day ▪ MIL Control Center: 8 per day ▪ MIL – Special Event - Zero 396 processes total/month 2,525 eliminated entries = 86% reduction in number of processes Time savings of 14 hours/month Case Study – Northwestern Mutual
  • 22. 22 Case Study – Northwestern Mutual From This: To This:
  • 23. 23 Questions? Thank you! AMAG Technology President O: 310-518-2380, ext 270 C: 310-483-5443 Kurt.takahashi@amag.com Kurt Takahashi Guidepost Solutions Regional Vice President LEED, AP, BD+C O: 510-250-6234 C: 510-529-5416 Nmiller@guidepostsolutions.com Nick Miller Comcast Senior Director of Security O: 720-267-2021 C: 720-233-1243 Andrew_Campion@cable.comcast.com Andrew Campion Northwestern Mutual Corporate Security O: 414-661-6752 bretduchateau@northwesternmutual.com Bret DuChateau