A NASSCOM ® Initiative Security and Quality Kamlesh Bajaj CEO, DSCI May 23, 2009 NASSCOM Quality Summit Hyderabad 1.

Slides:



Advertisements
Similar presentations
Formal Process of QA and quality related certifications Formal Process of QA and quality related certifications MIM 3 rd year – Sem V Abhishek Mishra –
Advertisements

Leverage MarkITS for agile solutions delivery that balances strategic thinking with tactical execution for “Business & Technology Convergence” MarkITS.
© 2006 itSMF USA. All rights reserved. ITIL v3 – Familiar Ground, New Territory David Cannon ITSM Practice Principal - HP.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
Bill McClanahan – Principal Business Consultant LPS Integration.
IT Governance Infocom India Presentation December 6, 2006.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Roger Southgate Past President of ISACA London Chapter Member of the BSI Committees for Service Management and IT Governance Leader.
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
Global Information Systems
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Dr. Julian Lo Consulting Director ITIL v3 Expert
IT Infrastructure Library ITIL vs COBIT. ANDRIAN EDUARD BANGGA IKHSAN BASKARA JOOVANNY PASUHUK RANGGA FAJARULLAH TEAM.
Security Controls – What Works
Improving IT Governance Through Formal Change Management
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
Integrating ITIL with the Software Development Process Dhiraj Gupta IT Manager Mark Stehlik IT Director.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Getting Smarter with Information An Information Agenda Approach
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
DSCI Framework- Pilot Implementation. Operational Locations Different project groups Different client Geographies Different services Exposes PI through.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ITIL & COBIT O6PLM Kevin Lisay – Rendy Winarta –
© IT Management Consulting Ltd., London, Implementing IT Governance Frameworks within Regulated Institutions.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Roles and Responsibilities
Challenges in Infosecurity Practices at IT Organizations
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Overview of COBIT5 and Impact on Local Content for IT By Mrs Tokunbo Martins Director Banking Supervision (Central Bank of Nigeria)
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Holistic Approach to Security
IS Methodologies. Systems Development Life Cycle - SDLC Planning Planning define the system to be developed define the system to be developed Set the.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Sustain your business with IT Governance Grow your business with IT Service Management Parry McGill Competitive in our pricing through comparable industry.
UK Link Programme Update to PNUNC June 17 th 2013.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
Example Incident Mgmt Initiation No recording of Incidents Users can approach different departments Solutions of previous incidents are not available.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
ITIL VS COBIT 06 PLM - Group 9
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Oracle’s EPM System and Strategy
Project Management Strategies Hidden in the CMMI Rick Hefner, Northrop Grumman CMMI Technology Conference & User Group November.
An Introduction to CobiT 4.1 & Mapping CobiT to other Frameworks and Standards Jimmy Heschl [Senior Manager, KPMG Austria]
© | Hansan Global | All Rights Reserved 1 INTRODUCTION TO IT SERVICE MANAGEMENT Hansan Global Pte Ltd.
by: Er. Manu Bansal Deptt of IT Software Quality Assurance.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Profile of Vishnu varthanan Moorthy, Program Manager– Quality Assurance Role: Strategic Partner for Group Quality Center of Excellence & Strategic lead.
Role of CSPA in the INEGI’s ICT Strategic Plan
Dr. Yeffry Handoko Putra, M.T
Software Quality Control and Quality Assurance: Introduction
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
EITS Planning & Decision Support
Sustain your business with IT Governance
IT and Project Management Best Practice Training
IS4680 Security Auditing for Compliance
CMMI – Staged Representation
Quantifying Quality in DevOps
همسویی چارچوب‏هاو به‏روشهای حاکمیت و مدیریت فناوری اطلاعات
Collaboration Oriented Architecture COA Position Paper An Overview
Data Governance & Management Skills and Experience
Presentation transcript:

A NASSCOM ® Initiative Security and Quality Kamlesh Bajaj CEO, DSCI May 23, 2009 NASSCOM Quality Summit Hyderabad 1

A NASSCOM ® Initiative 2 IT OperationsShifting from a technology-led siloed structure into a process-centric service- oriented organization Organizing FrameworkTo link technology components in infrastructure to the process steps that exist within IT Guiding FrameworkLink IT Processes to business activities and create service-level metrics IT Management frameworks ISO; CMMI; ITIL Generic FWs; must be tailored to the specific needs of a company Improve the management of IT Allow for the systematic and least disruptive path to adoption Support IT Governance imperatives Integrate new technologies and architectures into a service-oriented operation 1. ISO CMM 3. CMMI 4. ITIL 1. Focus on certification 2. Describes process maturity 3. Emphasizes process improvements 4. Defines & leverages best practices for management and operations of IT org IT Management Frameworks organized into 5 logical subject areas 1. Project Management (PMBOK, PRINCE2...) 2. Software development (TickIT, Agile, MSF, IT CMM...) 3. Process management (Software CMM, CobIT, ISO 15504, Six Sigma, TOGAF..) 4. Service management (ISO 20000, ISO/IEC 38500, ITIL, MOF, eTOM...) 5. Security management (ISO ) 6. Strategy (Balanced Scorecard...) IT Services Management

A NASSCOM ® Initiative 3 Six Sigma and ITIL1.Facilitate Business and IT alignment through quality 2.Helps deliver high-quality IT services at min cost to business 3.Provide both process and performance improvements 4.Six Sigma focus on process; ITIL on best practices for delivery and support of IT services CMM and ITIL1.Help streamline infrastructure and development processes 2.ITIL focus on service management (Operations); CMM focus on maturity of the organization that develops and maintains software 3.Interdependencies through three key processes: change management, configuration management, and release management CoBIT and ITIL1.To measure ITIL in which ‘how’ of detailed tasks and steps absent 2.CobIT defines 34 processes; its performance measures define key performance indicators that ITIL processes must deliver against IT Frameworks benefit both business and IT

A NASSCOM ® Initiative 4 SOX Compliance1.Controls and monitoring practices required not new to QA 2.Companies with strong QA groups ahead in SOX compliance QA’s independence1.From applications development and the checks and balances performed by QA groups ensure adherence to best practices. 2.Implementing formal QA to standardize and document current processes for improvement and leveraging those practices for continued SOX compliance Restructuring of organizations 1.IT shops making testers part of centralized testing teams; not of development teams 2.Moving testing out of development and into operations. 3.Similar to Security Organization and IT Operations independence 4.Many IT functions, including quality assurance, security, architecture, and compliance, need some level of independence to avoid conflicts of interest. Security and QA in SOX Compliance

A NASSCOM ® Initiative 5 QA important for compliance 1.Adds value through formal process 2.Audit not a one-time exercise, process helps culture change 3.Continual verification, validation, and audit processes via QA assist in changing culture while improving overall delivery practices 4.Nature of QA is to develop, review, and document: test plans or SDLC practices, the essence of QA is in the auditability of processes 5.Leveraging QA practices provides assistance in ensuring IT compliance Section 404 of SOX or in COBIT requires that internal controls be in place ; but does not specify 1. QA's primary role is to validate processes and document findings in SDLC 2. Employing similar QA practices to validate compliance with SOX can gain additional value. 3. Using existing QA processes brings visibility to detect potential risks of noncompliance, as well as planning strategies for correction and validation. QA Role expansionApp Dev and delivery processes expanded to include compliance-related issues, such as risk, change control, and release management. QA and Security groups: synergize for Compliance

A NASSCOM ® Initiative 6 Triumph of Quality Management Frameworks

A NASSCOM ® Initiative Framework for a Systematic, Comprehensive Approach to Information Security 7

A NASSCOM ® Initiative Security Management ISO IT Governance CoBIT Security Standards ITU-T X.1051 Security Practices NIST SP 800 Risk Management OCTAVE | COSO | FMEA Infrastructure Mgmt ITIL | ISO EU Privacy Directives US- FTC directives, Patriot Act GLBA HIPAA Aus- Privacy Act 1988, APAC Canada- PIPEDA IT (Amendment) Act, 2008 UK- Data Protection Act 1998 PCI-DSS Privacy Regulations Compliance Regulations Security Market Research Academic Collaborations Industry best practices Data Protection Authorities Legal & Regulatory Requirements Knowledge Collaboration Legal Forums Architecture Principles Product, solution trends Vendor forums, interactions Technology advancement Solution Categories Security Technology Trends Security Vendor Collaboration Technology and Vendor interactions DSCI- Best Practices Data Security Data Privacy Technology Forums DSCI- Data Protection Practices Mapping to compliance regulations Adoption of leading practices Micro level & customized Easy of implementation 8

A NASSCOM ® Initiative Best Practices: Data Security and Privacy 9

A NASSCOM ® Initiative Thank You 10