Application Security Management Functional Project Manager (s) ERP Project Director ERP Campus Executive University & Campus Administration Security Policy.

Slides:



Advertisements
Similar presentations
CIP Cyber Security – Security Management Controls
Advertisements

Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
More CMM Part Two : Details.
Effective Involvement of Shareholders in Key Activities SACRAO 2009 February 10, 2009 Session T1.10.
Implementing User’s IT Security Access Control Community College Internal Auditors 2011 Spring Conference Presented by: Emmie Oesterman, IT Auditor Kris.
1 TA Customizer Project—TAC Cheryl M. Lange
MyFloridaMarketPlace
Environmental Management Systems Parks & Recreation Chesterfield County, Virginia 2008 Mark Askin – Chief of Park Operations Chesterfield Parks and Recreation.
Security Controls – What Works
Information Risk Management in the Audit Chapter 9 Presented by Dee Dee Owens, Senior Manager KPMG LLP KPMG LLP.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
ECM Project Roles and Responsibilities
ISO 9000:2000 Quality system standards adopted in 1987 by International Organization for Standardization; revised in 1994 and 2000 Technical specifications.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
April 2, 2013 Longitudinal Data system Governance: Status Report Alan Phillips Deputy Director, Fiscal Affairs, Budgeting and IT Illinois Board of Higher.
RoadTek Business Systems Ownership Briefing Session July 2003.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Update. Where Are We Now?  Executive Steering Team met on February 20th & agreed to shift our go live date back by 12 months to July 2014.
Agenda 1. Definition and Purpose of Data Governance
The Key Process Areas for Level 2: Repeatable Ralph Covington David Wang.
Developing an accessibility policy. In this talk we will discuss What is an accessibility policy Why do we need one? Getting started - steps to consult.
Basics of OHSAS Occupational Health & Safety Management System
Operating as a Hybrid Entity at Cornell John Ruffing – Assistant Director, Center for Advanced Computing (CAC) Cornell.
MyFloridaMarketPlace Roundtable January 21, :00 a.m. – 12:00 p.m. MyFloridaMarketPlace.
Software Project Management
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
OVERVIEW SCC Charter. Content 1.Title – Standards Coordination Committee (SCC) 2.Statement of Purpose 3.Scope 4.List of Deliverables 5.IPR Mode (IDESG.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
BSBPMG505A Manage Project Quality Manage Project Quality Project Quality Processes Diploma of Project Management Qualification Code BSB51507 Unit.
Office of Postdoctoral Affairs February 23, 2011 Rania Sanford, Ed.D. Assistant Dean Postdoctoral Affairs Postdoc PeopleSoft Web Forms Campus Readiness.
1 Local Readiness Team Lead Kick-Off Meeting May 16, 2007.
– Ultranet 3 rd Industry Briefing Tuesday, 19 December 2006 DoE, 2 Treasury Place, Melbourne.
Georgia Institute of Technology CS 4320 Fall 2003.
1 SMART Training Update – May 2011 Michaela Butterworth.
PAYMENT CARD INDUSTRY REMEDIATION PROJECT Cheryl Wenezenki-Yolland, PCI Project Owner Nicholas Krischanowsky, PCI Project Director Public Sector Payment.
E-Michigan Web Development 1. 2 What Is It? A web based collaboration tool that is internal to state government and accessible only from within the state.
Note1 (Admi1) Overview of administering security.
Project Kick-off Meeting Presented By: > > > > Office of the Chief Information Officer.
SMS Planning.  Safety management addresses all of the operational activities of the entire organization.  The four (4) components of an SMS are: 1)
Federal Strategic Sourcing Initiative U.S. General Services Administration FSSI Office Products II “ OS2 in a Box” Implementation Kit.
CAURA Ontario 2013 November 25, 2013 Presented by: Susan Munro, Assistant Director, Research Finance, McMaster University Annie Rémillard, Team Leader,
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Lawson Global Support Our Support Partnership Andrew Stephenson Lawson Global Support Working with Support Copyright ©
Solano County Office of Education Jay Speck Solano County Superintendent of Schools.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Security Training and Awareness Brad Reed, IT Security Analyst OIT – Information Security Office Securing the University – ITSS 2015.
Planning for School Implementation. Choice Programs Requires both district and school level coordination roles The district office establishes guidelines,
VA Connecticut Research and Education Foundation
Developing a Project Management Standard for Your Organization Francine DiMicele, PMP June 08, 2015 NC Piedmont Triad Chapter.
Assessment Entry Module (AEM) Kick-off November 15, 2012 interRAI Preliminary Screener Toronto Central LHIN.
Chapter 8 Auditing in an E-commerce Environment
1 City of Shelby Wastewater Treatment Division Becomes State’s Second Public Agency to Implement a Certified Environmental Management System CERTIFICATION.
State of Georgia Release Management Training
Moving Successfully Toward SACS Reaffirmation: An Introductory Discussion Presenters Dr. Cathy Fleuriet Associate Vice President for Institutional Effectiveness.
MnSCU Audit Committee September 18, 2002 Discussion on the Role of the Audit Committee MnSCU Audit Committee September 18, 2002.
1 TenStep Project Management Process ™ PM00.5 PM00.5 Project Management Preparation for Success * Manage Scope *
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Retha E. Karnes, J.D., General Counsel Tel:
REIMAGINING OUR WORKDAY Workday: A Decision Making Tool for Managers Spring 2012.
UNIVERSITY OF GEORGIA Overview Presented By Chris Wilkins February 23, 2016 OneSource Project Financial/HR Systems.
Identity and Access Management
Red Flags Rule An Introduction County College of Morris
Colorado state university-pueblo policy and administration (PA)
Purchasing & IT Security Originally Presented at Fall ACCBO
HIPAA Security Standards Final Rule
Data, Policy, Stakeholders, and Governance
Presentation transcript:

Application Security Management Functional Project Manager (s) ERP Project Director ERP Campus Executive University & Campus Administration Security Policy & Procedure Adoption Approver of new & modified Role & Permission Lists content Approver of changes to universal security settings Compliance recertification Manager, PeopleSoft Application Security CUNY-CIS InfoSec Team University application security policy & procedure development Security Settings Change Management Exception Request Review Compliance & Certification Program including Review of Security at Campuses Audit of Transaction Logs Peoplesoft Security Training & Awareness Application Security Liaison Campus & Central Office Central point of contact for application security Campus Security Procedures (e.g. Profile maintenance) Document Security Environment Issues & Exception Management Review of Access Compliance, Re-certification Statement User enrollment & De-provisioning Approval of Role & Permission List assignment to Profiles Functional Liaisons Campus & Central Office Key Stakeholders Roles, Responsibilities & Relationships 5 February 2008, V3.1 University Information Security Director CUNY-CIS InfoSec Team

Application Security Liaison (1)Project Expectations Attend CUNYFIRST application security design, implementation and training meetings Build application security community at your College (functional liaisons, campus executives, project managers) Work proactively with the Manager, PeopleSoft Application Security and the CUNYFIRST project teams to build toward and meet go-live dates Participate in project deliverables development as necessary Participate in the testing of application security Work through changing environment and ambiguities as they arise Are significant contributors to CUNYFIRST

Application Security Liaison (2) Operational Expectations Facilitate the management of application security at the Campus as the central point of contact Maintain user profiles based upon approval of functional liaisons ► Individual profile changes ► Bulk user identity data loads Maintain up-to-date documentation of security environment including written operating procedures Fall & Spring security reviews and written compliance certification (working with College VP Administration) Report security violations and non-compliance situations Request and justify exceptions to content of PeopleSoft role definitions and permission lists

Manager, PeopleSoft Application Security (3) High-Priority focus areas Build the application security community and maintain healthy collaboration with the Oracle security team and the application security liaisons Training (for self and application security liaisons) Implement application security governance model Provide baseline operating procedures Collaborate with Oracle on CUNYFIRST application security design and implementation meetings Oracle deliverables review and approval Participate in the testing of application security Participate in CUNYFIRST project status meetings Commitment to successful go-live dates, keep activities on track Participate in addressing network infrastructure security issues if and when they arise