SlideShare a Scribd company logo
Monitoring AProject Charter Planning Execution & Milestone Tracking
Design, Governance, Risk,
Compliance & Process
Mapping, Approach
& Budgeting
Mark S Mahre
Aprio Technology Alignment Framework
ASSESSMENTDISCOVERY
Suitability, Remediate,
Test & Implement
CONTROL
CXO s, CISO, Directors, SME s, Analysts, Project Managers & Consultants
Resources , Timeline,
PMO & Gap Analysis
Sponsors & Stakeholders, Business Owners
Strategy, Requirements
& Roadmap
Business Case
Project Scope
Success Criteria
Requirements
Objectives
Approvals
Project Design
Project Tasks
Risk Assessment
As-Is Assessment
Project Financials
Project Scheduling
Project Kick-Off
Resource Scheduling
Gap Assessment
Future State Mapping
Risk Assessment
Identify Required Controls
Governance & Process
Data & Security Mandates
Change Controls
Authentication
Encryption Controls
IncidentManagement
KPI s & Metrics Goals
GRC & Readiness
Employee Training
Controls Mapping
Systems & Infrastructure
SOP s & Alignment
Operational Effectiveness
Risk Mgmt. Controls Testing
Data Security Monitoring
Ops Review & Enhancements
Dashboards, KPI s & Analytics
Quarterly Leadership Meetings
DESIGN & BUILD TEST & EXECUTE
Controls, Analytics &
Sustainability
Risk Mitigations
Suitability of Design
Data RPO/RTO
DR/BCP Strategy
Remediation Testing
Cloud / Co-Lo Contracts
Mahre 2017
ALIGNMENT
Operations / Cloud
Task % Task % Task % Task % Task % Task % Task %
Business Case Project Requirements Confirm Milestones Project Execution Kickoff Governance Framework Governance Execution Operations Mgmt.
Project Scope of Work Project Plan & Budgets Create Templates Assessment Meeting Critical Controls Testing Critical Controls in Place Risk Mgmt. Controls
Data Security Mandates Risk Assessment Approach Identify Partnerships Employee SOC Intro Meeting Change Controls Tested Change MGMG. Controls Network Monitoring
Success Criteria Defined As-Is Assessment (Gaps) To-Be (Targets) Change Control Process Network Penetration Testing Help Desk System in Place Data Security Monitoring
Road Map (Milestones) Project Financials People/Resources Critical Controls Accuracy Client Data Security Testing System Uptime Reporting SW License Management
Security Mandates Schedule Quarterly Mtg. Readiness Assessment Security Governance Process Network Monitoring Results Cybersecurity & Risk Contracts Management
Approval Signoffs Resource Scheduling System Description Risk Avoidance Governance Cloud Testing Results Data Encryption Reporting DR / BCP Testing
Resources Identified PMO – New Project Information Security Cyber Risk Analysis/Metrics Cloud Monitoring Results Client Satisfaction Surveys Help Desk Mgmt.
Blackout Dates Identified Status Meeting Schedule Employee Handbook Infrastructure & Network Security Awareness Education Final PMO Meetings Provisioning Mgmt.
Project Budget Plan Timeline-Milestones Plan Asset Inventory - CMDB Cloud Stack Review Incident Response Testing DR/BCP 2018 Plan in Place Decommissioning Mgmt.
Contact Legal Rep. Operations Hand-Off Plan Change MGMT. Strategy End-2-End Data Encryption DR/BCP Testing Next Year Planning Cloud / TAM Mgmt.
Identify Stakeholders Communications Plan Building Security Plan HIPAA / PHI Mandates Readiness Reviews Breach Communication Plan FY Budgeting
Technology Strategy Cost Optimization Plan Policies & Procedures Regulations Policies Change Mgmt. Process Availability Mgmt Framework Compliance Readiness
Operations Strategy Project Org. Chart Strategic Sourcing Portfolio Mgmt. Framework Application Mgmt. CMDB Operations Hand-Off Notice IT Finance Analytics
CXO & Leadership CISO CIO COO Legal CFO PMO
Aprio Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants
Month 1 Month 2 Month 3 Month 4 & 5 Month 6 & 7 Month 8 - 11 Month 12
Aprio | Version 25.1 | September 2019

More Related Content

What's hot

ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
Eryk Budi Pratama
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
Midhun Nirmal
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Kris Kimmerle
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
BOC Group
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
Maganathin Veeraragaloo
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
Priyanka Aash
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
PECB
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
Business Beam
 

What's hot (20)

ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 

Similar to Technology Alignment Framework

PRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project ManagementPRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project Management
Cgmcdaniel
 
Experience and Qualifications
Experience and QualificationsExperience and Qualifications
Experience and QualificationsApril_B_White
 
PMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk ManagementPMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk Management
Ahmed Higazi, PMP CSM
 
Project Management
Project ManagementProject Management
Project Management
nitinbagaria
 
PMO & CMMI
PMO & CMMIPMO & CMMI
PMO & CMMI
Shailendra Jain
 
Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5
sandeep sonkusale
 
pmos.pptx
pmos.pptxpmos.pptx
pmos.pptx
ssuserf016f4
 
Usability And Project Management
Usability And Project ManagementUsability And Project Management
Usability And Project Management
Sarah Cortes
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2BMark S. Mahre
 
Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up
Mobi Marketing
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionRishabh Software
 
Managed it services
Managed it servicesManaged it services
Managed it services
Gss America
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
Gss America
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1franktibbs
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1franktibbs
 
PMP ITTOs Quick Review
PMP ITTOs Quick Review PMP ITTOs Quick Review
PMP ITTOs Quick Review
Jamil Faraj , PMP
 
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
GREEN INTERNATIONAL
 
Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)
Peter Steward
 
Paul charife-allen resume-it security
Paul charife-allen resume-it securityPaul charife-allen resume-it security
Paul charife-allen resume-it security
Paul-Charife Allen
 

Similar to Technology Alignment Framework (20)

PRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project ManagementPRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project Management
 
Experience and Qualifications
Experience and QualificationsExperience and Qualifications
Experience and Qualifications
 
PMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk ManagementPMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk Management
 
Project Management
Project ManagementProject Management
Project Management
 
PMO & CMMI
PMO & CMMIPMO & CMMI
PMO & CMMI
 
Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5
 
pmos.pptx
pmos.pptxpmos.pptx
pmos.pptx
 
Usability And Project Management
Usability And Project ManagementUsability And Project Management
Usability And Project Management
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2B
 
Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
David Schroeder Summary
David Schroeder SummaryDavid Schroeder Summary
David Schroeder Summary
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1
 
PMP ITTOs Quick Review
PMP ITTOs Quick Review PMP ITTOs Quick Review
PMP ITTOs Quick Review
 
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
 
Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)
 
Paul charife-allen resume-it security
Paul charife-allen resume-it securityPaul charife-allen resume-it security
Paul charife-allen resume-it security
 

More from Mark S. Mahre

Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment Framework
Mark S. Mahre
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Mark S. Mahre
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional Services
Mark S. Mahre
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0
Mark S. Mahre
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook Template
Mark S. Mahre
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
Mark S. Mahre
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50K
Mark S. Mahre
 
ClearCost
ClearCostClearCost
ClearCost
Mark S. Mahre
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015Mark S. Mahre
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015Mark S. Mahre
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
Mark S. Mahre
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S. Mahre
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4Mark S. Mahre
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2Mark S. Mahre
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process HandbookMark S. Mahre
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33Mark S. Mahre
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03Mark S. Mahre
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Mark S. Mahre
 

More from Mark S. Mahre (18)

Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment Framework
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional Services
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook Template
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50K
 
ClearCost
ClearCostClearCost
ClearCost
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech final
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process Handbook
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Technology Alignment Framework

  • 1. Monitoring AProject Charter Planning Execution & Milestone Tracking Design, Governance, Risk, Compliance & Process Mapping, Approach & Budgeting Mark S Mahre Aprio Technology Alignment Framework ASSESSMENTDISCOVERY Suitability, Remediate, Test & Implement CONTROL CXO s, CISO, Directors, SME s, Analysts, Project Managers & Consultants Resources , Timeline, PMO & Gap Analysis Sponsors & Stakeholders, Business Owners Strategy, Requirements & Roadmap Business Case Project Scope Success Criteria Requirements Objectives Approvals Project Design Project Tasks Risk Assessment As-Is Assessment Project Financials Project Scheduling Project Kick-Off Resource Scheduling Gap Assessment Future State Mapping Risk Assessment Identify Required Controls Governance & Process Data & Security Mandates Change Controls Authentication Encryption Controls IncidentManagement KPI s & Metrics Goals GRC & Readiness Employee Training Controls Mapping Systems & Infrastructure SOP s & Alignment Operational Effectiveness Risk Mgmt. Controls Testing Data Security Monitoring Ops Review & Enhancements Dashboards, KPI s & Analytics Quarterly Leadership Meetings DESIGN & BUILD TEST & EXECUTE Controls, Analytics & Sustainability Risk Mitigations Suitability of Design Data RPO/RTO DR/BCP Strategy Remediation Testing Cloud / Co-Lo Contracts Mahre 2017 ALIGNMENT Operations / Cloud Task % Task % Task % Task % Task % Task % Task % Business Case Project Requirements Confirm Milestones Project Execution Kickoff Governance Framework Governance Execution Operations Mgmt. Project Scope of Work Project Plan & Budgets Create Templates Assessment Meeting Critical Controls Testing Critical Controls in Place Risk Mgmt. Controls Data Security Mandates Risk Assessment Approach Identify Partnerships Employee SOC Intro Meeting Change Controls Tested Change MGMG. Controls Network Monitoring Success Criteria Defined As-Is Assessment (Gaps) To-Be (Targets) Change Control Process Network Penetration Testing Help Desk System in Place Data Security Monitoring Road Map (Milestones) Project Financials People/Resources Critical Controls Accuracy Client Data Security Testing System Uptime Reporting SW License Management Security Mandates Schedule Quarterly Mtg. Readiness Assessment Security Governance Process Network Monitoring Results Cybersecurity & Risk Contracts Management Approval Signoffs Resource Scheduling System Description Risk Avoidance Governance Cloud Testing Results Data Encryption Reporting DR / BCP Testing Resources Identified PMO – New Project Information Security Cyber Risk Analysis/Metrics Cloud Monitoring Results Client Satisfaction Surveys Help Desk Mgmt. Blackout Dates Identified Status Meeting Schedule Employee Handbook Infrastructure & Network Security Awareness Education Final PMO Meetings Provisioning Mgmt. Project Budget Plan Timeline-Milestones Plan Asset Inventory - CMDB Cloud Stack Review Incident Response Testing DR/BCP 2018 Plan in Place Decommissioning Mgmt. Contact Legal Rep. Operations Hand-Off Plan Change MGMT. Strategy End-2-End Data Encryption DR/BCP Testing Next Year Planning Cloud / TAM Mgmt. Identify Stakeholders Communications Plan Building Security Plan HIPAA / PHI Mandates Readiness Reviews Breach Communication Plan FY Budgeting Technology Strategy Cost Optimization Plan Policies & Procedures Regulations Policies Change Mgmt. Process Availability Mgmt Framework Compliance Readiness Operations Strategy Project Org. Chart Strategic Sourcing Portfolio Mgmt. Framework Application Mgmt. CMDB Operations Hand-Off Notice IT Finance Analytics CXO & Leadership CISO CIO COO Legal CFO PMO Aprio Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants Month 1 Month 2 Month 3 Month 4 & 5 Month 6 & 7 Month 8 - 11 Month 12 Aprio | Version 25.1 | September 2019