Lessons from Y2K for Strategic Management of IT

Slides:



Advertisements
Similar presentations
Organizational Governance
Advertisements

Federal IT Project Manager Guidance Matrix
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
Training for Organizations
Series 2: Project Management Advanced Project Management for Behavioral Health Electronic Health Records (EHRs) 9/2013 From the CIHS Video Series “Ten.
IEEE Systems Council VP Technical Operations Status; April 9, 2010 ieeesystemscouncil.org The SC has established a distinguished lecturer program. AESS.
Information Systems Planning
FY2010 PEMP Notable Outcomes October 15, FRA, LLC Board of Directors 10/15-16/2009 Office of Quality and Best Practices Performance Evaluation Management.
Best Practices: Aligning Process, Culture and Tools Michael Jordan Senior Project Manager - Microsoft Consulting Services
Hazards Risk Management Course Revision Project Update George Haddow June 2012.
Mission, Vision and Work Plans
IT Specialist Profession © 2009 IBM Corporation 9/10/2015 IT Specialist Certification A coaching program for certification candidates and their mentors.
A National approach to Cyber security/CIIP: Raising awareness.
Financing for National Communications UNFCCC Workshop, Manila Ravi Sharma United Nations Environment Programme – Global Environment Facility.
Alter – Information Systems © 2002 Prentice Hall 1 The Process of Information System Planning.
QA Methodology By Rajib Roy Independent Consultant Qcon.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Department of Defense Human Resources Career Program
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
LAND POLICY AND LAND ADMINISTRATION Mark Marquardt Best Practices for Land Tenure and Natural Resource Governance in Africa October 2012.
PUBLIC–PRIVATE PARTNERSHIP (PPP) FRAMEWORK AND GUIDELINES Syed M. Ali Zaidi, P.Eng. PM(Stanford), Ph.D. Director, Strategic Partnerships Alberta Infrastructure.
Day 6 – TC520 Technical Communication Systems: Understanding and Improving the Role of Information & Communication Systems (ICS) in Humanitarian Relief.
Day 8 – TC520 Technical Communication Systems: Understanding and Improving the Role of Information & Communication Systems (ICS) in Humanitarian Relief.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
SEN 460 Software Quality Assurance. Bahria University Karachi Campus Waseem Akhtar Mufti B.E(C.S.E) UIT, M.S(S.E) AAU Denmark Assistant Professor Department.
Implementing Program Management Standards at Duke Energy.
The NIST Special Publications for Security Management By: Waylon Coulter.
Focus for the Future Technology-Related Proposals Daniel Ewart, CIO.
BIS 375 Entire Course BIS 375 Entire Course And Final Guide  BIS 375 Week 1 Discussion Question 1  BIS 375 Week 1 Discussion Question 2  BIS 375 Week.
BIS 375 Entire Course And Final Guide FOR MORE CLASSES VISIT BIS 375 Entire Course And Final Guide You can find Here.
PRESENTATION TO THE PORTFOLIO COMMITTEE ON RURAL DEVELOPMENT AND LAND REFORM 16 APRIL
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
CJA 234 MART The power of possibility/cja234martdotcom BIS 375 Entire Course FOR MORE CLASSES VISIT BIS 375 Week 1 Discussion Question.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
2017 Performance Management Changes

IT: Be the Change and Culture You Want IT to Be
Procurement- Lecture 3 Customer service and logistics
Cyber Security – An Existential Threat? (IIC, Singapore)
Data Access and the Administrative Data Research Network David J
Current Plant Performance
Ontario Health Coalition, Toronto, October 28, 2016
Strategic Planning Process
Strategic Importance of Human Resource Management
Strategic Planning Process
Identify the Risk of Not Doing BA
Conducting Foreign Relations pgs
Secondary school admissions in England : Changing legislation, policy and practice Professor Anne West Education Research Group, Department of.
AACSB’s Standard 9: Curriculum content
DOE Nuclear Safety Research and Development Program
THE PATH TO EVIDENCE-BASED POLICY
Chapter 4 Systems Planning and Selection
BIS 375 Education for Service-- tutorialrank.com
Ocean Observatories Initiative
By Jeff Burklo, Director
An Urgent National Imperative
ORCGA’s Geographic Council Meeting November 30, 2017
AM Business Model Wargame Working Team Documentation
AM Business Model Wargame Working Team Documentation
SOFTWARE PROJECT MANAGEMENT
Organizational Transformation
Conducting Foreign Relations
MetaVista Consulting Group
Business Organization
Managing ICS Complexity
The GEF Public Involvement Policy
Portfolio Committee on Communications
Key Challenges Strategic Advisor For Data Resources
Central New York HEALTH EMERGENCY PREPAREDNESS COALITION
Presentation transcript:

Lessons from Y2K for Strategic Management of IT Mark P. Haselkorn Professor and Founding Chair Department of Technical Communication University of Washington Prepared for World Congress of the International Society for the Systems Sciences Toronto, Canada July 21, 2000

“Managing Vulnerabilities Arising from Global Infrastructure Interdependencies: Learning from Y2K” A National Research Council Project Conducted for the Department of Defense With the support of IEEE and the University of Washington Final Report anticipated October 2000

Overview How Y2K changed How the problem changed Initial Observations Managing IT Complexity Aligning IT with the Organization Minimizing Risk Future Issues

How Y2K Changed Software to Chips Fix to Continuity Technology to Mission Technology to Political and Legal

How the Problem Changed From a study of fundamental flaws and cascading effects to a test of the overall strategic management of information and communication technology. For example, maintenance and modernization life cycle management of systems and software functional interdependency and continuity guidance policies and certification system ownership and responsibility training and organizational roles security and information assurance

Observations Managing IT Complexity Difficulty from pervasiveness of IT Difficulty from dynamic nature of IT Difficulty addressing system of systems Difficulty in stratifying specific responses

Observations Aligning IT with the Organization Unclear ownership, responsibility, and guidance Special groups and cross-functional matrixing Return to business as usual Central standards and guidance versus local flexibility and execution Higher levels of oversight and certification Version control/configuration management issues Funding issues Training and job position issues

Observations Minimizing Risk Things fail all the time Lower tolerance for risk Considerable redundancy Growing reliance Unclear role of ORM Importance of continuity plans Aligning security and information flow needs

Future Issues Clearer understanding of why Y2K was different Appropriateness of response Clarifying system robustness Hidden impacts Applications to information assurance and security Recommendations for improving strategic management of IT