Change Management Initiative. Definitions What is a change? – A change is the addition, modification or removal of anything that could have an effect.

Slides:



Advertisements
Similar presentations
Reliability Center Data Request Task Force Report WECC Board Meeting April 2009.
Advertisements

Program design overview Pre-contract to post-program year Office on Volunteerism and Community Service.
Program Management Office (PMO) Design
Change Management (with an IT perspective). MBA Statement of Objective The object of undergoing this study-project is to develop an understanding.
ITIL: Service Transition
Six Steps to Implementing Change Management that Works Arvind Parthiban.
1 LBNL Enterprise Computing (EC) January 2003 LBNL Enterprise Computing.
Improving IT Governance Through Formal Change Management
ECM Project Roles and Responsibilities
Remedyforce Value Enablement Kit – Change Management
Purpose of the Standards
1 Change Management FOR University Medical Group Saint Louis University Click this icon for Audio.
Design, Implementation and Maintenance
Application Security Management Functional Project Manager (s) ERP Project Director ERP Campus Executive University & Campus Administration Security Policy.
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
Release & Deployment ITIL Version 3
Peer Information Security Policies: A Sampling Summer 2015.
Commercial Database Applications Testing. Test Plan Testing Strategy Testing Planning Testing Design (covered in other modules) Unit Testing (covered.
Chesapeake Research Review, Inc. Human Research Protection Experts IRB Services Consultation Education 1 Holding External IRBs Accountable: An Independent.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
Implementing the New Reliability Standards Status of Draft Cyber Security Standards CIP through CIP Larry Bugh ECAR Standard Drafting Team.
SERVICE MANAGER 9.2 CHANGE PRESENTATION JUNE 2011.
1 Public Hearing to Consider Proposed Amendments to the Emission Inventory Criteria and Guidelines Regulation for the AB 2588 Air Toxics “Hot Spots” Program.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Secretary of State Voting System Security Standards Juanita Woods Secretary of State Elections Division HAVA Information Security.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Service Management for CERN Change Management Acceptance Meeting Geneva, Jochen Beuttel.
Planning and Community Development Department Housing Element City Council February 03, 2014.
1 Local Readiness Team Lead Kick-Off Meeting May 16, 2007.
Item 5d Texas RE 2011 Budget Assumptions April 19, Texas RE Preliminary Budget Assumptions Board of Directors and Advisory Committee April 19,
Assessment Workshop Title of the Project (date). Project Title Assessment Workshop October 25, 2015© Company Name All rights reserved2 Agenda Purpose.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
1 Commonwealth Project Management Division Bob Haugh Project Management Division November 15, 2010 Revision of.
Implementation Strategy July 2002 STANDARDS DEVELOPMENT LIFECYCLE PROCESS ORP Publishes & Maintains 8 Standing Committee Recommends Approval / Disapproval.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Transmission Outage Process April Purpose In compliance with the Protocols and the Electric Reliability Council of Texas (ERCOT) Operating Guides,
Presentation at HSPD-12 Workshop Ms. Jeanette Thornton May 4, 2005.
ITPD ISSUE MANAGEMENT PROCESS SEPTEMBER 5, 2008
Maintaining and Sustaining System Integrity Configuration Management for Transportation Management Systems Configuration management (CM) describes a series.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Chapter 8 Auditing in an E-commerce Environment
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
State of Georgia Release Management Training
Introduction to ITSM processes. CONFIDENTIAL Agenda Problem Management  Overview  High Level process Change Management  Overview  High Level process.
Sharing Personal Information Programme Wales Accord on the Sharing of Personal Information (WASPI) for organisations involved in the protection, safety,
Don Petravick November 9, /9/2009Change Advisory Board Training1.
On completion of the scenario, students will be able to: Learning Outcomes 1 Critically analyse and prioritise information security risks. 2 Systematically.
ITIL: Service Transition
IT Service Transition – purpose and processes
Change Management Change Management.
Software Project Configuration Management
Service Management World Class Operations - Impact Workshop.
12.2 Conduct Procurements The process of obtaining seller responses, selecting a seller and awarding the contract The team applies selection criteria.
Implementation Strategy July 2002
Software Configuration Management
Security Awareness Training: System Owners
Assessment Workshop Title of the Project (date)
Margin Management Configuration Management Benchmarking Group
Coordinate Operations Standard
IS Risk Management Report (Template)
Larry Bugh ECAR Standard Drafting Team Chair June 1, 2005
Neopay Practical Guides #2 PSD2 (Should I be worried?)
ISSUE MANAGEMENT PROCESS MONTH DAY, YEAR
Principles of Change Management
(Insert Title of Project Here) Kickoff Meeting
Presentation transcript:

Change Management Initiative

Definitions What is a change? – A change is the addition, modification or removal of anything that could have an effect on a system or IT Service. What is change management? – Change management maximizes the business benefits of making changes while minimizing the risk making changes.

Self-Checklist How do I know if my work is considered a change? – Are you altering the functionality of a system? – Does the work require service downtime? – Are you modifying underlying code that could have an effect on this or other IT services? – Does the work require a higher level of approval or oversight? – How critical is the system/service to Tufts business functions?

Self-Checklist Unsure? – Consult with your manager or the Change Manager (Ellen Fitzpatrick). If your work does not constitute a change, track it using TechConnect.

Change Advisory Board (CAB) Represents the functional TTS directorates Members possess a high level awareness of the changes coming out of their respective directorates as well as impacts to other directorates

CAB Roles and Responsibilities Provides oversight for the management of changes to keep risk to the infrastructure low Ensures that changes are reviewed for accuracy and consistency as well as overall conflicts to the forward schedule of changes Enforces change management policies and procedures Encourages the adoption of best practices

Change Types Minor – minimal coordination, low risk Significant – medium to high level of risk and complexity Major – high risk, cost, and/or complexity Normal Necessitate immediate action to restore a service, protect electronic records/data, product, or IT hardware Are required to address an immediate security threat Ideally intended to be permanent Emergency Repetitive low-risk modifications that are pre-approved After CAB approval, a Request for Change (RFC) template will be created in TechConnect for ease of entry Standard

Change Lifecycle Initiator creates the request for change (RFC) Enters necessary information as it is available Draft All required information (risk assessment, back out plan, dates, etc.) entered & confirmed Functional Manager or Director specified for approval purposes Open Initiator requests approval, approver reviews RFC details & approves or requests more info CAB review is initiated for Significant and Major changes Approval Once approvals are obtained, Initiator/Implementer works on change as planned Implement Once work is complete, Initiator/Implementer enters final RFC details Completed Post Implementation Review (PIR) is completed by Change Advisory Board (CAB) if necessary Change Manager / Coordinator review final details and close RFC Closed

Risk-Based Change Types Part of routine, recurring maintenance and/or support Implementation procedures are well understood and documented. Does not alter baseline business functionality of primary or related service(s) Standard Normal Changes Minor Major R I S K LOW RISKHIGH RISK Approver: CAB (initial approval) / Functional Manager Functional Manager Change Advisory Board (CAB) Change Impact Downtime Requirement Change, Test & Back out Plans Service Criticality Significant CIO