SlideShare a Scribd company logo
1 of 5
Provide a simple, business-facing description of the available services (description)
Identify a service owner (technician, groups)
Service availability (publish to relevant user groups)
Mention service level targets (SLAs)
Define authorization, escalation, and notification policies (Approval details, notification rules)
Efficiency, with a goal of ability to redirect additional resources to projects
Job satisfaction for IT staff
ITSM Goals
Move From: To:
Chaos
Reactive
Unplanned
Random Efforts
Best Efforts
Order
Proactive
Planned
Predictable quality
Optimization
Structured IT Services
Key dimensions in digital transformation
www.worldskillcenter.org
STRATEGY
o Procurement/ Sourcing Plan
o O&M
o Risk Mgmt.
APPLICATIONS
o Campus ERP
o Learning Mgmt. System
o Library Mgmt. System
o AR/ VR
o Portal
o Call Centre
o Salon Mgmt. System
INFRASTRUCTURE
o N/w Infra
o AV Systems
o Bandwidth
o Projectors
o Servers
o Desktops
o Printers
SECURITY
o SD WAN
o NGFW
o Security Audit
o Security Controls
o Security Policy
o DR Plan
o Trainings
CAPACITY BUILDING
o Document Baseline
o Conduct TNA
o Design Curriculum, Content and
Approach
o Deliver Training
o Sustain Learning
o Exposure Visits
Digital Transformation
Framework for
WSC
Key dimensions in digital transformation - Infrastructure
www.worldskillcenter.org
Design Principal
Outcomes
 State-of-the-Art IT Infrastructure: Multi ISP Redundancy with Gigabit Capable Connectivity, Structure Network infrastructure, Network Load Balancer. On
Prem Server AD with Azure AD Integration with features like WDS(Standard Image),WSUS(Centralized Patch management) etc., MFP with TGA(Total Guaranty
Assurance), Audio Visual Technical Consultancy & Commissioning for Smart Classroom, Data Center Infrastructure Management (DCIM),O365 & one
drive, Digital Inclusion and Support, VoIP, IT Infrastructure for Précision engineering building with Hostel and auditorium
 ITIL Compilent Process and Procédure and with Enterprise Help desk and SLA Standard
 IT Infrastructure Policy Bundles(IT Infra use Policy, BYOD Policy, Patch Management Policy, Cloud Policy, MDM Policy etc)
 Enterprise SLA and Helpdesk Management
 Soft aspects of Digital Transformation - people, organization and change management
 State-of-the-Art IT Infrastructure will help for collaborative and learning experience, to maximize utilization IT and uptime, Improve Capacity Planning &
Utilization human resource, Best Solution with Lowest TCO.
 ITIL Compliant process for Better management of risk and service disruption and Stronger alignment between IT and the business
 IT Infrastructure Policy to combat threats and manage risk while also ensuring efficient, effective, and consistent operations
 SLA and Helpdesk(ITSM), will identify and resolve misalignments and weaknesses and ensure that the business gets optimal IT service and support
 Digital Transformation by people, organization and change management: Digital Transformation starts with people, not technology, Transformation with
a strong focus on the people aspects: changing employee mindsets, behaviours and the organizational culture
Key dimensions in digital transformation – Enterprise Security & Operation
Center
www.worldskillcenter.org
Design Principal
Outcomes
 Default deny principle: The default setting for a security control should be to deny access to a resource. Furthermore, a configuration is to be required to
specifically grant access.
 Control automation principle: Wherever possible, automatic controls should be used rather than controls that depend on human vigilance and human
behaviour
 Defence in depth principle: Using layers of security increases the level of effort required by an attacker to gain unauthorised access to a system or
application. Controls should be layered such that if one layer of control should fail, there is another different type of control at the next layer that will prevent
a security breach
 Resiliency principle: Systems shall be designed and managed so that in the event of breakdown or compromise the least possible damage and inconvenience
is caused,(Failover Mechanism)
 KISS - Keep it simple & stupid: By reducing the complexity and diversity of security controls, less mistakes and errors should occur. This will help prompt
resolution of security-related issues
 Default deny principle: To block all inbound and outbound traffic that has not been expressly permitted by NGFW firewall policy.
 Control automation principle: This will help threats like malware, phishing, and endpoint vulnerabilities will be detected immediately by the security system,
and won't require any audits to be identified and treated
 Defence in depth principle: This layered concept provides multiple redundancies in the event systems and data are compromised, like Prevent
DDOS attack.
 Resiliency principle: Cyber resilience's primary benefits are reduced downtime and financial losses can be minimized through timely and accurate incident
response – ITSM and Helpdesk Management
 KISS - Keep it simple & stupid: As simplicity guarantees the greatest levels of user acceptance and interaction less mistakes and errors should occur.
This will help prompt resolution of security-related issues

More Related Content

Similar to ITSM Goals and Digital Transformation Framework

New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integrationMichael Nickle
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqriteseo
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 

Similar to ITSM Goals and Digital Transformation Framework (20)

New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

ITSM Goals and Digital Transformation Framework

  • 1. Provide a simple, business-facing description of the available services (description) Identify a service owner (technician, groups) Service availability (publish to relevant user groups) Mention service level targets (SLAs) Define authorization, escalation, and notification policies (Approval details, notification rules) Efficiency, with a goal of ability to redirect additional resources to projects Job satisfaction for IT staff ITSM Goals
  • 2. Move From: To: Chaos Reactive Unplanned Random Efforts Best Efforts Order Proactive Planned Predictable quality Optimization Structured IT Services
  • 3. Key dimensions in digital transformation www.worldskillcenter.org STRATEGY o Procurement/ Sourcing Plan o O&M o Risk Mgmt. APPLICATIONS o Campus ERP o Learning Mgmt. System o Library Mgmt. System o AR/ VR o Portal o Call Centre o Salon Mgmt. System INFRASTRUCTURE o N/w Infra o AV Systems o Bandwidth o Projectors o Servers o Desktops o Printers SECURITY o SD WAN o NGFW o Security Audit o Security Controls o Security Policy o DR Plan o Trainings CAPACITY BUILDING o Document Baseline o Conduct TNA o Design Curriculum, Content and Approach o Deliver Training o Sustain Learning o Exposure Visits Digital Transformation Framework for WSC
  • 4. Key dimensions in digital transformation - Infrastructure www.worldskillcenter.org Design Principal Outcomes  State-of-the-Art IT Infrastructure: Multi ISP Redundancy with Gigabit Capable Connectivity, Structure Network infrastructure, Network Load Balancer. On Prem Server AD with Azure AD Integration with features like WDS(Standard Image),WSUS(Centralized Patch management) etc., MFP with TGA(Total Guaranty Assurance), Audio Visual Technical Consultancy & Commissioning for Smart Classroom, Data Center Infrastructure Management (DCIM),O365 & one drive, Digital Inclusion and Support, VoIP, IT Infrastructure for Précision engineering building with Hostel and auditorium  ITIL Compilent Process and Procédure and with Enterprise Help desk and SLA Standard  IT Infrastructure Policy Bundles(IT Infra use Policy, BYOD Policy, Patch Management Policy, Cloud Policy, MDM Policy etc)  Enterprise SLA and Helpdesk Management  Soft aspects of Digital Transformation - people, organization and change management  State-of-the-Art IT Infrastructure will help for collaborative and learning experience, to maximize utilization IT and uptime, Improve Capacity Planning & Utilization human resource, Best Solution with Lowest TCO.  ITIL Compliant process for Better management of risk and service disruption and Stronger alignment between IT and the business  IT Infrastructure Policy to combat threats and manage risk while also ensuring efficient, effective, and consistent operations  SLA and Helpdesk(ITSM), will identify and resolve misalignments and weaknesses and ensure that the business gets optimal IT service and support  Digital Transformation by people, organization and change management: Digital Transformation starts with people, not technology, Transformation with a strong focus on the people aspects: changing employee mindsets, behaviours and the organizational culture
  • 5. Key dimensions in digital transformation – Enterprise Security & Operation Center www.worldskillcenter.org Design Principal Outcomes  Default deny principle: The default setting for a security control should be to deny access to a resource. Furthermore, a configuration is to be required to specifically grant access.  Control automation principle: Wherever possible, automatic controls should be used rather than controls that depend on human vigilance and human behaviour  Defence in depth principle: Using layers of security increases the level of effort required by an attacker to gain unauthorised access to a system or application. Controls should be layered such that if one layer of control should fail, there is another different type of control at the next layer that will prevent a security breach  Resiliency principle: Systems shall be designed and managed so that in the event of breakdown or compromise the least possible damage and inconvenience is caused,(Failover Mechanism)  KISS - Keep it simple & stupid: By reducing the complexity and diversity of security controls, less mistakes and errors should occur. This will help prompt resolution of security-related issues  Default deny principle: To block all inbound and outbound traffic that has not been expressly permitted by NGFW firewall policy.  Control automation principle: This will help threats like malware, phishing, and endpoint vulnerabilities will be detected immediately by the security system, and won't require any audits to be identified and treated  Defence in depth principle: This layered concept provides multiple redundancies in the event systems and data are compromised, like Prevent DDOS attack.  Resiliency principle: Cyber resilience's primary benefits are reduced downtime and financial losses can be minimized through timely and accurate incident response – ITSM and Helpdesk Management  KISS - Keep it simple & stupid: As simplicity guarantees the greatest levels of user acceptance and interaction less mistakes and errors should occur. This will help prompt resolution of security-related issues

Editor's Notes

  1. ITIL® Version 3 Foundation Course
  2. To be revamped - Existing content to be deleted. 2 boxes to be included: 1. Design principles – Scalability, Reliability, High Availability, (pl add more). 2. Key Features/Outcomes (around 5 nos.)
  3. A Security Architecture to be added