Managing Information Technology Service Delivery

Slides:



Advertisements
Similar presentations
INTRODUCTION TO IT SERVICE MANAGEMENT
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Analisa Proses. Terjemahan model analisis menjadi desain software.
Chapter 10 Accounting Information Systems and Internal Controls
Control and Accounting Information Systems
IT Governance Infocom India Presentation December 6, 2006.
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
Title Slide Higher Education Office of Information Technology Management Methodology By James M. Dutcher.
Comparative Analysis of IT Control Frameworks in the Context of SOX By: Malik Datardina, CA, CISA University of Waterloo.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
TI BISNIS ITG using COBIT &
COBIT - II.
Roger Southgate Past President of ISACA London Chapter Member of the BSI Committees for Service Management and IT Governance Leader.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Security Controls – What Works
Demystifying ITIL Greg Charles, Ph.D. Area Principal Consultant, CA
Improving IT Governance Through Formal Change Management
IT Governance – Leveraging ITIL® v2/v3 for Governance Success
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Leveraging ITIL Challenges and Successes Greg Charles, Ph.D. Area Principal Consultant February 2006.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Leveraging ITIL Using Best Practices to face Real-World Business Challenges Greg Charles, Ph.D. Area Principal Consultant July 2006.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Information Systems Controls for System Reliability -Information Security-
Information Technology Service Management
Understanding ITIL. The Legislation Minefield  Privacy & Security  Personal Information Protection Electronic Document Act (PIPEDA)  US Patriot Act.
Introduction to IT Auditing
The Problem Solutions: Standards & Frameworks
A NASSCOM ® Initiative Security and Quality Kamlesh Bajaj CEO, DSCI May 23, 2009 NASSCOM Quality Summit Hyderabad 1.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Optimize ITIL ® Implementations With processes automation ITIL is a Registered Trademark by the OGC Dimitri Mizernik
The Evergreen, Background, Methodology and IT Service Management Model
Evolving IT Framework Standards (Compliance and IT)
Continual Service Improvement Process
Collin County’s Doing More with Less How Collin County’s ITIL Framework has worked to do more with less.
The Sarbanes-Oxley Act of PricewaterhouseCoopers Introduction of Panel Members The Sarbanes-Oxley Act of 2002 What Companies Should Be Doing Now.
ISA 562 Internet Security Theory & Practice
Chapter Three IT Risks and Controls.
LECTURE 1  The Problem  Solutions: Standards & Frameworks.
Roles and Responsibilities
Challenges in Infosecurity Practices at IT Organizations
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
IT Governance – Leveraging Best Practices for Governance Success
ITIL Awareness UC JDCMG Discussion 4/26/2017.
C OBI T and slides © 2007 IT Governance Institute. Used with permission. An Overview of C OBI T ®
#325 - CobiT and Service Delivery Debra Mallette, CISA, CSSBB Kaiser Permanente IT.
IT Auditor’s Role in IT Governance Fred C. Roth, CISA MIS Training Institute Session 425.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
ISACA Willamette Valley Chapter Luncheon Thursday, March 20, 2008 Practical Auditors Guide for CobiT Steve Balough, CISA.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Managing Information Technology Service Delivery
EITS Planning & Decision Support
Understanding ITIL.
INTRODUCTION TO IT SERVICE MANAGEMENT
IS4680 Security Auditing for Compliance
ITIL Awareness UC JDCMG Discussion 9/22/2018.
Alignment of COBIT to Botswana IT Audit Methodology
Demystifying ITIL Greg Charles, Ph.D. Area Principal Consultant, CA
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Managing Information Technology Service Delivery Greg Charles, Ph.D. Principal Consultant Computer Associates June 2005

Today’s Objective To provide information on the latest trends in service management as seen in government data centers around the country

Ever-Increasing Complexity

Approaches Currently In Use Business As Usual - “Firefighting” Legislation - “Forced” Best Practice Focused

The Legislation Minefield Privacy & Security Personal Information Protection Electronic Document Act (PIPEDA) US Patriot Act \ Homeland Security (Critical Infrastructure) Personal Health Information Protection Act (PHIPA) Health Insurance Portability and Accountability Act (HIPAA) SEC Rules 17a-3 & 17a-4 re: Securities Transaction Retention Gramm-Leach Bliley Act (GLBA) privacy of financial information Children’s Online Privacy Protection Act Clinger-Cohen Act (US Gov.) Federal Information Security Mgmt. Act (FISMA) Freedom of Information & Protection of Privacy (FOIPOP) BC Gov FDA Regulated IT Systems Freedom Of Information Act Americans with Disabilities Act, Sec. 508 (website accessibility) Finance Sarbanes Oxley (US) FFIEC US Banking Standards Basel II (World Bank) Turnbull Report (UK) Canadian Bill 198 (MI 52-109 & 52-111) Washington State Laws relating to IT Policy 403-R1, 400-P1, 401-S1, 402-G1; Executive Order 00-03; RCW 9A.52.110,120,130; RCW 9A.48.070, 080, 090; RCW 9A.105.041 and many more Other International IT Models Corporate Governance for ICT DR 04198 (Australia) Intragob Quality Effort (Mexico) Medical Information System Development (Medis-DC) (Japan) Authority for IT in the Public Administration (AIPA) (Italy) Principles of accurate data processing supported accounting systems (GDPdu & GoBS) (Germany) European Privacy Directive (Safe Harbor Framework)

Best Practices Quality & Control Models ISO 900x COBIT TQM EFQM Six Sigma COSO Deming etc.. Process Frameworks IT Infrastructure Library Application Service Library Gartner CSD IBM Processes EDS Digital Workflow Microsoft MOF Telecom Ops Map etc.. •What is not defined cannot be controlled •What is not controlled cannot be measured •What is not measured cannot be improved Define -- Improve Measure -- Control And Stabilize

Information Technology Infrastructure Library What Is ITIL? ITIL is a seven book series that guides business users through the planning, delivery and management of quality IT services Information Technology Infrastructure Library

The ITIL Books T Planning To Implement Service Management h T e h e T e c h n o l o g y Planning To Implement Service Management T h e B u s i n Service Management Service Support The Business Perspective ICT Infrastructure Management Service Delivery Security Management Application Management

Complete ITIL Process Model

ITIL Service Support Model The Business, Customers or Users Monitoring Tools Difficulties Queries Enquiries Communications Updates Work-arounds Incidents Incidents Service Desk Customer Survey reports Changes Incident Management Customer Survey reports Problem Management Releases Service reports Incident statistics Audit reports Change Management Problem statistics Problem reports Problem reviews Diagnostic aids Audit reports Change schedule CAB minutes Change statistics Change reviews Audit reports Release Management Release schedule Release statistics Release reviews Secure library’ Testing standards Audit reports Configuration Management CMDB reports CMDB statistics Policy standards Audit reports Problems Known Errors Cls Relationships Incidents Changes Releases CMDB

ITIL Service Delivery Model Business, Customers and Users Queries Enquiries Communications Updates Reports Availability Management Service Level Management Availability plan AMDB Design criteria Targets/Thresholds Reports Audit reports Capacity Management SLAs, SLRs OLAs Service reports Service catalogue SIP Exception reports Audit reports Requirements Targets Achievements Capacity plan CDV Targets/thresholds Capacity reports Schedules Audit reports Financial Management For IT Services Financial plan Types and models Costs and charges Reports Budgets and forecasts Audit reports IT Service Continuity Management IT continuity plans BIS and risk analysis Requirements def’n Control centers DR contracts Reports Audit reports Alerts and Exceptions Changes Management Tools

What Is ITIL All About? Aligning IT services with business requirements A set of best practices, not a methodology Providing guidance, not a step-by-step, how-to manual; the implementation of ITIL processes will vary from organization to organization Providing optimal service provision at a justifiable cost A non-proprietary, vendor-neutral, technology-agnostic set of best practices.

US Securities & Exchange Commission IT Governance Model CobIT Sarbanes- Oxley US Securities & Exchange Commission Audit Models COSO Service Mgmt. App. Dev. (SDLC) Project Mgmt. IT Planning IT Security Quality System Quality Systems & Mgmt. Frameworks ISO CMM Six Sigma ITIL BS 15000 AS 8018 ASL ISO 17799 PMI TSO IS Strategy IT OPERATIONS

CobIT CobIT is an open standard control framework for IT Governance with a focus on IT Standards and Audit Based on over 40 International standards and is supported by a network of 150 IT Governance Chapters operating in over 100 countries CobIT describes standards, controls and maturity guidelines for four domains, and 34 control processes

The CobiT Cube 4 Domains 34 Processes 318 Control Objectives (Business Requirements) 4 Domains 34 Processes 318 Control Objectives

CobiT Domains Plan & Acquire & Implement Organize Monitor (AI Process Domain) Plan & Organize (PO Process Domain) Monitor (M Process Domain) Deliver & Support (DS Process Domain)

Planning & Organization Plan & Organize Planning & Organization Acquire & Implement Define Strategic IT Plan Define IT Organization & Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Manage Human Resource Ensure Compliance With External Standards Projects Quality Identify Automated Solutions Develop & Maintain IT Procedures Educate Train Users Monitor The Process Assess Internal Control Adequacy Obtain Independent Assurance Provide Audit Information Architecture Install & Accredit Systems Manage Change Assist & Advise IT Customers Configuration Problems & Incidents Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Manage Data Facilities Operations Assess Risks Manage Performance & Capacity Ensure Continuous Service System Security Identify & Allocate Costs Third-Party Services Define & Levels Monitor Deliver & Support

Information and Communication COSO Components Monitoring Assess control system performance over time Ongoing and separate evaluations Management and supervisory activities Control Activities Policies that ensure management directives are carried out Approval and authorizations, verifications, evaluations, safeguarding assets security and segregation of duties Information and Communication Relevant information identified, captured and communicated timely Access to internal and externally generated information Information flow allows for management action Risk Assessment Identify and analyze relevant risks to achieving the entity’s objectives Control Environment Sets “tone at the top” Foundation for all other components of control Integrity, ethical values, competence, authority, responsibility

COSO, CobiT & SOX Components

Putting COSO, CobiT, and ITIL together COSO defines the high level policies of a well governed IT organization CobiT defines the control structures for evaluating the organization conforms to COSO policies. ITIL defines the practices that will satisfy the CobiT controls.

Theory – CobIT/ITIL/COSO Technology – CA and others How to Make it a Reality? Key Success Factors Theory – CobIT/ITIL/COSO Process Guidelines for Best Practices Provides the theory but not the process Education is an important component Convert theory to process that is applicable to the unique needs of the organization Training & Education Tool configuration Technology – CA and others Provide the technology that enables and automates the process Repeatability, compliance and notifications Implement processes impossible without technology

Making IT Easier Customer maturity isolates appropriate transition point, blueprint & ROI

Next Steps - Focus on Customer Needs EIM • Complete • Integrated • Open • Proven Best Practices • High Quality • Comprehensive • People Process • Technology • Partners Business Flows Solutions • Enabling • Evolutionary • Efficient Enabling Foundation = Integrated product strategy Deliver end-to-end (Product / Services & Education / Partner) solutions Maximize competitive differentiation through CA value add Evolutionary Integrate and enhance existing CATS processes and tools Project  engagement  lifecycle Leverage existing field skills, practice and brand domain expertise Logical ‘next-step’ to Q2 assessment focus Efficient Standards base (ITIL, etc) Reusable IP (Code / Architecture / Pkg Svcs) Flexibility to support strategic, tactical & operational campaigns

Typical Survey Section features… Respondent Scoring Proven Practice “Statements” CA offers free online surveys called CA Profilers to help you determine those areas where you have the greatest gap between your capabilities and those processes you believe to be most important for your environment. This is a capture of a typical screen from the ITIL Service Management survey. There are five sections in this survey including Service Support and Service Delivery. There are also more detailed surveys available for the processes included in Service Support and Service Delivery. Each section usually contains 5-7 Best Practice statements. You rate these statements on a scale of 1 (low) to 5 (high) in terms of how important they are to your organization and your capability to perform them. If you are interested in a free analysis, please make sure you indicate this on your post event seminar evaluation survey and CA will provide you with a login and password. Typical Survey Section features…

Comparison Charts 3 Sets of Scores Industry Comparison Role Overall Your Score One advantage of conducting the survey online is that you receive results immediately. Results are presented graphically so you can immediately recognize the areas of most importance, least capability, and therefore, the sections with the largest “gap” that are most likely your biggest concerns. If you are interested, results can be compared to others in your industry or with your same job title.

Meeting Customer Needs – Best Practices Industry and CA best practices are applied to all of our solutions to maximize standardization and quality Best Practices To this end, CA has developed an approach to defining each processes for each level of maturity and has created a methodology for customers to continually evolve through each phase. This approach includes a process where the customer assesses their current level, designs a target process, implements the process, and optimizes the processes of focus. To aid the customers in their journey CA has created “Blue Prints” which help to describe the entire solution required to evolve including but not limited to what the target process should look like. This method goes way beyond ITIL in that ITIL tells you what to do but does not focus at all on how you get there.

Thank You gregory.charles@ca.com Questions? Thank You gregory.charles@ca.com