SlideShare a Scribd company logo
Webiner: How to design IT services for
achieving business objectives?
Ph.D. Silvana Tomić Rotim, CISA,
PMP, Lead Auditor, Lead Implementer
ITSERVICEDESIGN
1. Aspects of Service Design
• New or changed services
• Service Management systems
and tools (Service Portfolio /
Service Catalogue)
• Technology architecture and
management systems
• The process required
• Measurement methods and
metrics
ITSERVICEDESIGN
Holisticapproachforensuring
consistencyandintegrationwithin
allprocesses
2. Service Design Principles
Guidelines
• Identifying the IT requirements
• Understanding the SD process:
– Service Catalog Management
– Service Level Management
– Capacity Management
– Availability Management
– Information Security Management
– Service Continuity Management
– Supplier Management
• Understanding the SD infrastructure
ITSERVICEDESIGN
2. Service Design Principles
Basic tasks
• Identify customer needs and their business
processes for IT services (functionality,
resources and schedule)
• For each IT service specify the necessary IT
infrastructure: HW, SW, databases,
applications, telecommunication, and all other
parts of the IT assets - especially skills
• Identify supporting services
• Transfer identified IT needs to other parts of
ITSM, so they can be realized
ITSERVICEDESIGN
2. Service Design Principles
Identification of requirements for IT services
ITSERVICEDESIGN
ITSERVICEDESIGN
2. Service Design Principles
ISO 20000-1 requirements
• Define authorities and responsibilities for
service delivery
• Activities to be performed
• New or changed human and financial resources
requirements
• Technology to support service delivery
• Changes to the SMS, SLA...
• Updates to the catalogue of services
• Procedures, measures and information to be
used for the delivery
3. Service Design processes
• Service Catalogue Management
• Service Level Management
• Capacity Management
• Availability Management
• Information Security Management
• Service Continuity Management
• Supplier Management
ITSERVICEDESIGN
3. Service Design processes
3.1.Service Catalog Management (SCM)
The purpose of SCM:
• Made by IT in close cooperation with users
• If an IT service is not in this catalog it may
not be offered or arranged
• If in this catalog is what the user does not
need, it does not make sense
ITSERVICEDESIGN
3.1. Service Catalog Management
The position of the Catalog in SD
ITSERVICEDESIGN
3.1. Service Catalog Management
ITSERVICEDESIGN
3.2. Service Level Management (SLM)
Meaning:
Define, maintain and improve the quality of IT
services through:
• Negotiation towards required service levels
• Arranging User - IT (SLA, OLA, UC)
• Monitoring the performance level of services
in practice
• Reports on their performance
• Checking the agreed levels of IT services
• Initiation of possible improvements
ITSERVICEDESIGN
3.2. Service Level Management
– SLA, OLA i UC
Customer Customer Customer
IT Systems IT Systems
IT Service
Internal External
Customers
IT Service
Department
Supplier &
Maintenance
OLA UC
SLA
ITSERVICEDESIGN
3.2. Service Level Management
• Service Catalog
• Service Level Requirements (SLR) – The level of
availability, response time ...
• Service Level Agreement (SLA) – Document
Client/Supplier
• Operational Level Agreement (OLA) – An
internal document
• Underpinning Contract (UC) – A document with a
third party
• Service Improvement Programme (SIP) – The
program of improving IT services
ITSERVICEDESIGN
1. Review service
catalog
2. Draft SLAs
3. Review and
negotiate SLAs and
contracts
4. Sign SLAs and
contracts
5. Monitor service
levels and gather
data
6. Produce, review
and distribute the
service reports
Operational activities
7. Review service
performance
Meeting agenda
for annual
Service review
meeting
Service interim
review agenda
Service Catalog
SLAs
Contracts
Service Chain matrix
Release
Management Change
management
Incident
Management
Continual
improvement
3.2. Service Level Management
- The contracting process example
ITSERVICEDESIGN
3.3. Capacity Management (CM)
Meaning:
• The purpose of the CM is to ensure the necessary
capacity for the entire IT infrastructure
• If they are insufficient, the agreed level of quality IT
services can not be achieved, and if they are too
large / oversized, money is irrationally spent for
something that is not necessary
• Therefore, it is necessary to plan the necessary IT
capacities – in the present and in the future
ITSERVICEDESIGN
3.3. Capacity Management (CM)
The way to achieve it:
• Make monitoring of current performance of
IT services
• Argue that IT resources are used efficiently
• Compile and maintain a capacity plan to
meet the requirements of the SLA
• Assess the future needs for IT services from
the perspective of new capacity
• Do tuning
ITSERVICEDESIGN
3.3. Capacity Management (CM) –
Discs capacity example
TIME
Disk Space
(in TB)
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov
1
2
3
Used
disk
space
A moment
for action
Disk
space
required
ITSERVICEDESIGN
3.4. Availability Management (AM)
Meaning:
• Availability is a condition in which IT
services are available when the user needs
them
• There are different levels of availability, as
this level is higher, its price is higher also
• The level of availability comes from the
demand of a business process
• The user and the provider of IT services
should agree / align the level of availability
for each IT service and each business
process
ITSERVICEDESIGN
3.4. Availability Management (AM)
• Purpose of AM is to ensure that the level of service
availability delivered in all services is matched to or
exceeds the current and future agreed needs of the
business, in a cost-effective manner
• How:
– Produce and maintain the Availability Plan
– Provide advice to other areas on all availability-related issues
– Ensure that service availability achievements meet all their
agreed targets
– Assist with the diagnosis and resolution of availability-related
incidents
– Asses the impact of all changes on the Availability Plan
– Provide the proactive measures to improve the availability
ITSERVICEDESIGN
3.4. Availability Management (AM) -
example
AST Agreed Service Time - Downtime
• Availability = ----------------------------- x100 %
AST
AST in hours
• Reliability = ------------------------------
Number of breaks
ITSERVICEDESIGN
3.4. Availability Management (AM)
Example of measurement
ApplicationX
Web Server
Citrix Server
Databases
LAN
J2EE Server
Availability
- what the
user sees
99.5%
99.5%
99.5%
99.5%
99.5%
99.5%
< 97%
Availability (%)
ITSERVICEDESIGN
3.5. Information Security Management
• Information is a crucial business resource and
because of that it has to be protected
• We protect the confidentiality, availability and
integrity of information
• There are numerous threats to breach the
information security, so that is why security
controls are set up
• The lack of a security control is vulnerability of IS
• Information security system is based on connecting
IT asset, threat, vulnerability, risk assessment and
the necessary security controls
ITSERVICEDESIGN
3.5. Information Security Management
ITSERVICEDESIGN
3.5. Information Security Management
Security Management Process
Security Monitoring
Determination of
indicators and
trend analysis
Indicators
Security controlsOverview of
Security and
Control
IT Security
Analysis
Identification and
classification of
information assets
Risk Management
Security policy
Service level
management
Release
management
Change
management
Incident
management
Incident
management
Service level
management
Continual
improvement
Problem
management
Change
management
ITSERVICEDESIGN
3.6. IT Service Continuity Management
(CM)
Meaning:
• For many reasons the business processes supported
by IT may be interrupted and for such situations
one should be prepared
• This is done through the development of IT Service
Continuity Management system (ITSCM))
• Its basis is the consideration of threats,
vulnerabilities, risk levels and controls that are
implemented in ITSCM
• Price of ITSCM grows with its level
ITSERVICEDESIGN
3.6. Continuity Management (CM)
• There are a lot of threats that can cause disruption
of IT support and as a consequence disruption of
business process
• ITSCM is a way of ensuring the recovery of business
/ IT activities
• The purpose of the ITSCM is to reduce the risk of
disruption of the IT support with the elaboration of
continuity and recovery plans
• The starting-points of the ITSCM are RTO and
RPO
ITSERVICEDESIGN
3.6. Continuity Management
RTO – Recovery Time Objective
Data recovery
INCIDENT
Time
The recovery of
critical processes
RTO
Renewal of IT infrastructure
Renewal of operating
resources
ITSERVICEDESIGN
3.6. Continuity Management
RPO – Recovery Point Objective
INCIDENT
Time
Regul
ar
back-
up
Therecoveryof
criticalprocesses
RPO RTO
Regul
ar
back-
up
Regul
ar
back-
up
Data recovery
ITSERVICEDESIGN
3.6. Continuity Management
Levels of response to deadlock
Recovery Time Objective (RTO)
15 Min. 1-4 H.. 4 -8 H.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Dani
Level 4
Level 3
Level 2
Level 7
Level 6
Level 5
Level 1
Costs
ITSERVICEDESIGN
3.7. Supplier Management
• Goal – manage suppliers and the services they
supply, to provide seamless quality of IT service to
the business, ensuring value for money is obtained
• How:
– Ensure that underpinning contracts are aligned to
business needs and support agreed targets in SLAs
– Manage supplier performance
– Manage relationships with suppliers
– Negotiate and agree contracts and manage them through
their lifecycle
– Manage a supplier policy and database
ITSERVICEDESIGN
4. A FRAMEWORK FOR SD
REALIZATION
Other important factors
• In a similar way other factors that influence
the successful implementation of SD are
considered:
– An organization that does support to SD
– The technology to support SD
– Possible risks
– Impact on the key success factors
ITSERVICEDESIGN

More Related Content

Viewers also liked

Light weighted it service management whitepaper -
Light weighted it service management   whitepaper -Light weighted it service management   whitepaper -
Light weighted it service management whitepaper -
Koichiro Toda
 
Конспект для учеников 11-А класа
Конспект для учеников 11-А класаКонспект для учеников 11-А класа
Конспект для учеников 11-А класа
Алексей Ткаченко
 
A41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPCA41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPCNoni McGuire
 
ITP journal Geospatial data in the Telecoms Industry
ITP journal   Geospatial data in the Telecoms IndustryITP journal   Geospatial data in the Telecoms Industry
ITP journal Geospatial data in the Telecoms Industry
Ben Nduva
 
Siva
SivaSiva
Romero brito
Romero britoRomero brito
Romero brito
Cassiane Vargas
 
DanielStefanescu_ro_
DanielStefanescu_ro_DanielStefanescu_ro_
DanielStefanescu_ro_Xm Anul
 
Que es bit locker
Que es bit lockerQue es bit locker
Que es bit locker
Anthony Valdiviezo
 
Mapa mental ITIL
Mapa mental ITILMapa mental ITIL
Mapa mental ITIL
Fernando Palma
 
Tics
TicsTics
Complicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosisComplicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosis
Angel Daniel (Kely) Corona
 
Presentación de Ecologia
Presentación de EcologiaPresentación de Ecologia
Presentación de Ecologiaaracely
 
Presentaciones electrónicas
Presentaciones electrónicasPresentaciones electrónicas
Presentaciones electrónicas
RicharMedina43
 
Marketing online camara de comercio de málaga
Marketing online  camara de comercio de málagaMarketing online  camara de comercio de málaga
Marketing online camara de comercio de málaga
mgarciav
 

Viewers also liked (14)

Light weighted it service management whitepaper -
Light weighted it service management   whitepaper -Light weighted it service management   whitepaper -
Light weighted it service management whitepaper -
 
Конспект для учеников 11-А класа
Конспект для учеников 11-А класаКонспект для учеников 11-А класа
Конспект для учеников 11-А класа
 
A41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPCA41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPC
 
ITP journal Geospatial data in the Telecoms Industry
ITP journal   Geospatial data in the Telecoms IndustryITP journal   Geospatial data in the Telecoms Industry
ITP journal Geospatial data in the Telecoms Industry
 
Siva
SivaSiva
Siva
 
Romero brito
Romero britoRomero brito
Romero brito
 
DanielStefanescu_ro_
DanielStefanescu_ro_DanielStefanescu_ro_
DanielStefanescu_ro_
 
Que es bit locker
Que es bit lockerQue es bit locker
Que es bit locker
 
Mapa mental ITIL
Mapa mental ITILMapa mental ITIL
Mapa mental ITIL
 
Tics
TicsTics
Tics
 
Complicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosisComplicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosis
 
Presentación de Ecologia
Presentación de EcologiaPresentación de Ecologia
Presentación de Ecologia
 
Presentaciones electrónicas
Presentaciones electrónicasPresentaciones electrónicas
Presentaciones electrónicas
 
Marketing online camara de comercio de málaga
Marketing online  camara de comercio de málagaMarketing online  camara de comercio de málaga
Marketing online camara de comercio de málaga
 

Similar to PECB Webinar: How to design IT Services for achieving business objectives?

Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
Kadimil
 
ITIL service design
ITIL service designITIL service design
ITIL service design
Rasha Ragab
 
IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)
Darshan Khant
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
Patricia NENZI
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
Patricia NENZI
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
Happiest Minds Technologies
 
Itilv3
Itilv3Itilv3
Itilv3
ahmet durak
 
Itilv3
Itilv3Itilv3
Itilv3
Markus Yaldu
 
U2 chap1 itsm service design
U2 chap1 itsm service designU2 chap1 itsm service design
U2 chap1 itsm service design
MusTufa Nullwala
 
ITSM Overview
ITSM OverviewITSM Overview
ITIL - introduction to ITIL
ITIL - introduction to ITILITIL - introduction to ITIL
ITIL - introduction to ITIL
Vibrant Technologies & Computers
 
About itil v3
About itil v3About itil v3
About itil v3
Abdulfattah Awajah
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaJisu Dasgupta
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and Functions
Prasad Deshpande
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
Marvin Sirait
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
ITIL Indonesia
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers Guide
Md. Rezaul Islam
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
Yusuf Hadiwinata Sutandar
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
miket60
 
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.pptL2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
ThirumalainambiMurug
 

Similar to PECB Webinar: How to design IT Services for achieving business objectives? (20)

Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
ITIL service design
ITIL service designITIL service design
ITIL service design
 
IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
Itilv3
Itilv3Itilv3
Itilv3
 
Itilv3
Itilv3Itilv3
Itilv3
 
U2 chap1 itsm service design
U2 chap1 itsm service designU2 chap1 itsm service design
U2 chap1 itsm service design
 
ITSM Overview
ITSM OverviewITSM Overview
ITSM Overview
 
ITIL - introduction to ITIL
ITIL - introduction to ITILITIL - introduction to ITIL
ITIL - introduction to ITIL
 
About itil v3
About itil v3About itil v3
About itil v3
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu Dasgupta
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and Functions
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers Guide
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
 
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.pptL2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

PECB Webinar: How to design IT Services for achieving business objectives?

  • 1. Webiner: How to design IT services for achieving business objectives? Ph.D. Silvana Tomić Rotim, CISA, PMP, Lead Auditor, Lead Implementer ITSERVICEDESIGN
  • 2. 1. Aspects of Service Design • New or changed services • Service Management systems and tools (Service Portfolio / Service Catalogue) • Technology architecture and management systems • The process required • Measurement methods and metrics ITSERVICEDESIGN Holisticapproachforensuring consistencyandintegrationwithin allprocesses
  • 3. 2. Service Design Principles Guidelines • Identifying the IT requirements • Understanding the SD process: – Service Catalog Management – Service Level Management – Capacity Management – Availability Management – Information Security Management – Service Continuity Management – Supplier Management • Understanding the SD infrastructure ITSERVICEDESIGN
  • 4. 2. Service Design Principles Basic tasks • Identify customer needs and their business processes for IT services (functionality, resources and schedule) • For each IT service specify the necessary IT infrastructure: HW, SW, databases, applications, telecommunication, and all other parts of the IT assets - especially skills • Identify supporting services • Transfer identified IT needs to other parts of ITSM, so they can be realized ITSERVICEDESIGN
  • 5. 2. Service Design Principles Identification of requirements for IT services ITSERVICEDESIGN
  • 6. ITSERVICEDESIGN 2. Service Design Principles ISO 20000-1 requirements • Define authorities and responsibilities for service delivery • Activities to be performed • New or changed human and financial resources requirements • Technology to support service delivery • Changes to the SMS, SLA... • Updates to the catalogue of services • Procedures, measures and information to be used for the delivery
  • 7. 3. Service Design processes • Service Catalogue Management • Service Level Management • Capacity Management • Availability Management • Information Security Management • Service Continuity Management • Supplier Management ITSERVICEDESIGN
  • 8. 3. Service Design processes 3.1.Service Catalog Management (SCM) The purpose of SCM: • Made by IT in close cooperation with users • If an IT service is not in this catalog it may not be offered or arranged • If in this catalog is what the user does not need, it does not make sense ITSERVICEDESIGN
  • 9. 3.1. Service Catalog Management The position of the Catalog in SD ITSERVICEDESIGN
  • 10. 3.1. Service Catalog Management ITSERVICEDESIGN
  • 11. 3.2. Service Level Management (SLM) Meaning: Define, maintain and improve the quality of IT services through: • Negotiation towards required service levels • Arranging User - IT (SLA, OLA, UC) • Monitoring the performance level of services in practice • Reports on their performance • Checking the agreed levels of IT services • Initiation of possible improvements ITSERVICEDESIGN
  • 12. 3.2. Service Level Management – SLA, OLA i UC Customer Customer Customer IT Systems IT Systems IT Service Internal External Customers IT Service Department Supplier & Maintenance OLA UC SLA ITSERVICEDESIGN
  • 13. 3.2. Service Level Management • Service Catalog • Service Level Requirements (SLR) – The level of availability, response time ... • Service Level Agreement (SLA) – Document Client/Supplier • Operational Level Agreement (OLA) – An internal document • Underpinning Contract (UC) – A document with a third party • Service Improvement Programme (SIP) – The program of improving IT services ITSERVICEDESIGN
  • 14. 1. Review service catalog 2. Draft SLAs 3. Review and negotiate SLAs and contracts 4. Sign SLAs and contracts 5. Monitor service levels and gather data 6. Produce, review and distribute the service reports Operational activities 7. Review service performance Meeting agenda for annual Service review meeting Service interim review agenda Service Catalog SLAs Contracts Service Chain matrix Release Management Change management Incident Management Continual improvement 3.2. Service Level Management - The contracting process example ITSERVICEDESIGN
  • 15. 3.3. Capacity Management (CM) Meaning: • The purpose of the CM is to ensure the necessary capacity for the entire IT infrastructure • If they are insufficient, the agreed level of quality IT services can not be achieved, and if they are too large / oversized, money is irrationally spent for something that is not necessary • Therefore, it is necessary to plan the necessary IT capacities – in the present and in the future ITSERVICEDESIGN
  • 16. 3.3. Capacity Management (CM) The way to achieve it: • Make monitoring of current performance of IT services • Argue that IT resources are used efficiently • Compile and maintain a capacity plan to meet the requirements of the SLA • Assess the future needs for IT services from the perspective of new capacity • Do tuning ITSERVICEDESIGN
  • 17. 3.3. Capacity Management (CM) – Discs capacity example TIME Disk Space (in TB) Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov 1 2 3 Used disk space A moment for action Disk space required ITSERVICEDESIGN
  • 18. 3.4. Availability Management (AM) Meaning: • Availability is a condition in which IT services are available when the user needs them • There are different levels of availability, as this level is higher, its price is higher also • The level of availability comes from the demand of a business process • The user and the provider of IT services should agree / align the level of availability for each IT service and each business process ITSERVICEDESIGN
  • 19. 3.4. Availability Management (AM) • Purpose of AM is to ensure that the level of service availability delivered in all services is matched to or exceeds the current and future agreed needs of the business, in a cost-effective manner • How: – Produce and maintain the Availability Plan – Provide advice to other areas on all availability-related issues – Ensure that service availability achievements meet all their agreed targets – Assist with the diagnosis and resolution of availability-related incidents – Asses the impact of all changes on the Availability Plan – Provide the proactive measures to improve the availability ITSERVICEDESIGN
  • 20. 3.4. Availability Management (AM) - example AST Agreed Service Time - Downtime • Availability = ----------------------------- x100 % AST AST in hours • Reliability = ------------------------------ Number of breaks ITSERVICEDESIGN
  • 21. 3.4. Availability Management (AM) Example of measurement ApplicationX Web Server Citrix Server Databases LAN J2EE Server Availability - what the user sees 99.5% 99.5% 99.5% 99.5% 99.5% 99.5% < 97% Availability (%) ITSERVICEDESIGN
  • 22. 3.5. Information Security Management • Information is a crucial business resource and because of that it has to be protected • We protect the confidentiality, availability and integrity of information • There are numerous threats to breach the information security, so that is why security controls are set up • The lack of a security control is vulnerability of IS • Information security system is based on connecting IT asset, threat, vulnerability, risk assessment and the necessary security controls ITSERVICEDESIGN
  • 23. 3.5. Information Security Management ITSERVICEDESIGN
  • 24. 3.5. Information Security Management Security Management Process Security Monitoring Determination of indicators and trend analysis Indicators Security controlsOverview of Security and Control IT Security Analysis Identification and classification of information assets Risk Management Security policy Service level management Release management Change management Incident management Incident management Service level management Continual improvement Problem management Change management ITSERVICEDESIGN
  • 25. 3.6. IT Service Continuity Management (CM) Meaning: • For many reasons the business processes supported by IT may be interrupted and for such situations one should be prepared • This is done through the development of IT Service Continuity Management system (ITSCM)) • Its basis is the consideration of threats, vulnerabilities, risk levels and controls that are implemented in ITSCM • Price of ITSCM grows with its level ITSERVICEDESIGN
  • 26. 3.6. Continuity Management (CM) • There are a lot of threats that can cause disruption of IT support and as a consequence disruption of business process • ITSCM is a way of ensuring the recovery of business / IT activities • The purpose of the ITSCM is to reduce the risk of disruption of the IT support with the elaboration of continuity and recovery plans • The starting-points of the ITSCM are RTO and RPO ITSERVICEDESIGN
  • 27. 3.6. Continuity Management RTO – Recovery Time Objective Data recovery INCIDENT Time The recovery of critical processes RTO Renewal of IT infrastructure Renewal of operating resources ITSERVICEDESIGN
  • 28. 3.6. Continuity Management RPO – Recovery Point Objective INCIDENT Time Regul ar back- up Therecoveryof criticalprocesses RPO RTO Regul ar back- up Regul ar back- up Data recovery ITSERVICEDESIGN
  • 29. 3.6. Continuity Management Levels of response to deadlock Recovery Time Objective (RTO) 15 Min. 1-4 H.. 4 -8 H.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Dani Level 4 Level 3 Level 2 Level 7 Level 6 Level 5 Level 1 Costs ITSERVICEDESIGN
  • 30. 3.7. Supplier Management • Goal – manage suppliers and the services they supply, to provide seamless quality of IT service to the business, ensuring value for money is obtained • How: – Ensure that underpinning contracts are aligned to business needs and support agreed targets in SLAs – Manage supplier performance – Manage relationships with suppliers – Negotiate and agree contracts and manage them through their lifecycle – Manage a supplier policy and database ITSERVICEDESIGN
  • 31. 4. A FRAMEWORK FOR SD REALIZATION Other important factors • In a similar way other factors that influence the successful implementation of SD are considered: – An organization that does support to SD – The technology to support SD – Possible risks – Impact on the key success factors ITSERVICEDESIGN