National Australia Group (UK) With Hindsight!. Rules of Engagement If you have a question… raise your hand. If you are shy… speak to me later or drop.

Slides:



Advertisements
Similar presentations
Manage your technology for optimal return on investment (ROI) The Tivoli ® Configuration & Operations management solution from IBM.
Advertisements

ICT Services Suppliers Briefing Thursday, 17 September 2009.
Making it easier… ServiceOntario Showcase Ontario 2006.
Strategic Value of the HR Function Presentation by
How Global Can Testing Really Be? BCS – 11 th February 2008.
Presentationto BPM Partners Conference Tim Swindell 19 th April 2005.
11/05/99 1 eBusiness Overview. 11/05/99 2 eBusiness - Definition eBusiness is a framework for seamless integration of critical business systems and their.
Viewpoint Consulting – Committed to your success.
Realising the Potential of Service Oriented Architecture Kris Horrocks Connected Systems Division Microsoft.
Services Flexible Workstyle and People-Centric IT Windows Accelerate: Deployment Windows 8.1 Proof of Concept (Window 8.1 PoC) will demonstrate how the.
CRM Deployment. GROWTH Growth in CRM markets Deploymen t Types.
Is Your IT Out of Alignment? Chargeback and Billing with Parallels Automation Brian Shellabarger, Chief Architect - SaaS.
Peformax an introduction and case studies. peformax: Agenda Introduction Key Principles An Enterprise Solution Case Studies Western Australia Institute.
© IBE....doing business ethically makes for better business…. Business Ethics: the essential components Philippa Foster Back OBE Director Institute of.
HIGH QUALITY LOW COST FAST DELIVERY - ONE SOLUTION WALTRUMP TECHNOLOGY.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Delivering Business Value WebDirector. Personal Productivity Disconnected Business Processes Disconnected Information Disconnected People Forms LOB.
Information Security as a Business Enabler Panos Dimitriou, MSc InfoSec, CISSP,CISM Director, Managed Security Services 2007.
Presentation to the Chinese Institute of Certified Public Accountants Beijing September 2012 Supporting International Development by China’s Corporate.
IBM Software Group - IBM Systems Group © 2006 IBM Corporation IBM Software Group | IBM Systems Grouppage 1 Team Collaboration Software Selling Strategy.
Meet the Management AIB Investor Day London, 8 th November 2006 Robbie Henneberry Managing Director – AIB Group (UK) p.l.c.
Supporting tools in an IT Project & Portfolio Management environment Ann Van Belle -
Cloud Computing for the UK Public Sector Andy Tait VMware UK VMware Copyright © 2009 VMware, Inc. All rights reserved.
Leveraging Oracle Data for Web- Based Reporting Northern California Oracle Users Group May 2001.
When BPM is not the only option? Tarun Gauri Basys Australia Pty Ltd Total Operational Excellence 2012 Melbourne August 2012.
Introduction to izmocars Innovative Internet business solutions provider to the automotive industry Industry leader in interactive automotive content.
New Generation Core Banking System For Sustained Growth
SOA Management Packs & Governance Cheat Sheet (Shared under OPN NDA - Last Updated: 8/3/2009)OPN NDA Target Account Profile Enterprises that: Have IT infrastructure.
Why clients might want to invest in OBASHI. Two simple reasons why every business needs OBASHI.
Project 2003 Presentation Ben Howard 15 th July 2003.
CRM Buzzword or Tangible Business Benefit? David Pinches Marketing Director, Sage CRM.
Corporate Support PPSO Gez Keating, Serco Plc. AGENDA Portfolio Management Role of Corporate PPSO Processes Where to Start Benefits.
CommSee - a client service systems development strategy using .NET
1 MIIS IAM Nationwide Journey - MIIS & IAM. 2 Agenda 1.Introduction Original objectives Definition of terms 2.MIIS 3.IAM Introduction Definition Approach.
Towards a Virtual Institute for Research into eGovernment Prof. Zahir Irani & Dr Tony Elliman Information Systems Evaluation and Integration Group School.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
From Red to Green: the role of Enterprise Architecture in the ONS Corporate IT Strategy Simon Field Chief Technology Officer.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Industry Resources and Tools for CMU Communications, Media & Utilities Industry Business Unit.
Identity Management and Enterprise Single Sign-On (ESSO)
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
1 © ONS Eurostat- January, 2002 / D. Joshua ‘Modernising the Information Management Infrastructure’ Dayantha Joshua Director, Information Management Office.
Windows SharePoint Services. Overview Windows SharePoint Services (WSS) Information Worker Infrastructure component delivered in Windows Server 2003 Enables.
© Project One Consulting Limited All rights reserved. 0 Introduction to Project One Slides.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Adopt a large-scale Organisation – Research activity Westpac.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Money for life. Why are Lloyds Banking Group supporting this Our aims Money for Life aims to improve the knowledge, confidence and skills of UK communities.
Building and Implementing An Identity Management Roadmap John Taylor Manager, IT Security & Service Continuity Phil Hall Security Consultant Apologies.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Alain Bethuyne Web Security Architect BNPParibas Fortis
Identity and Access Management
NU Technology Capability Overview
Phase 4: Manage Deployment
Challenges and opportunities for the CFO
Integrated Management System and Certification
IT Governance at the SCO
Continuous Intelligence for Microsoft Office 365 Deployments That Reduces Risk, Raises Visibility “As more and more organizations leverage modern-day,
Global Project Controls and System Implementation
Transforming IT at HM Revenue & Customs
IT Security Solutions for Banking
Project Certification Planning Phase August 27, 2014
Presentation transcript:

National Australia Group (UK) With Hindsight!

Rules of Engagement If you have a question… raise your hand. If you are shy… speak to me later or drop me an at:

About the National The Group is an international financial services organisation that provides a comprehensive and integrated range of financial products and services. Our Purpose Growth through excellent relationships. Our Vision We will be a leading international financial services company which is trusted by you and renowned for getting it right. STRATEGIC OVERVIEW Deliver solutions that help meet customer’s complete financial needs Build and sustain a high level performance culture Build trusted relationships with all stakeholders Build and manage our portfolio of businesses for strong and sustainable total shareholder return Create and leverage strategic assets and capabilities for competitive advantage

So You’re Australian, right? National Australia Group’s UK interests include: Clydesdale Bank Yorkshire Bank. National Australia Bank (London) The UK division has its own Technology team based in development centres in Glasgow (Scotland) Leeds (England) Belfast (Northern Ireland) More information can be found at

NAG’s Applications Retail Internet Banking (J2EE) Branch Teller System (WSBTT) Maintenance/Enquiries System (J2EE) Sales & Illustration System (Siebel) System (iNotes) Provisioning System (ITIM) Adobe Print Servers/Archivers I.M.M.P.s

NAG’s Applications 3270 Access to mainframe Client/Server Applications -Visual Basic -C/C++ -Access -Java

NAG Project Methodology & Success Criteria PhaseBusiness ProcessIM Technology Success Criteria Phase 1 (2003) Front End Replacement Common authentication & authorisation service for J2EE application, Siebel and iNotes Tivoli Access Manager/eTrust Directory Reduction in UserIDs & Passwords Phase 2 (2004) New Application Rollout New applications protected by security architecture Tivoli Access Manager/eTrust Directory Reuse of UserIDs & Passwords Phase 3 (2005) Internet Banking Programme Reuse of security architecture for customer interfaces Tivoli Access Manager/eTrust Directory Creation of internet facing infrastructure Phase 4 (2006) Teller Replacement Account ManagementTivoli Identity Manager Self-Password Reset & Provisioning Phase 5 (2006) 3 rd Party Integration Single Sign-On from company intranet to internet applications hosted by trusted 3 rd Parties Tivoli Federated Identity Manager Reuse of UserIDs & Passwords We are here

The Final Picture

Phase 1 Administrator End Users (500) WebSEAL Application Directory Phase Users -3 Protected Applications -“Manual” Scripted Provisioning

Phase 2 Auditor End Users (260,000) WebSEAL Applications Directory ITIM Phase ,000 Users -Many Protected Applications -Internet Banking Protected -Automated Provisioning

NAG’s User Base & Tivoli Products Web based access control for staff based applications 10,000 staff across hundreds of retail outlets and Head Office locations. Web based access control for customer based applications 250,000 Internet Banking customers ( -> 700,000 by Dec. 06) Applications Protected 14 Web based applications (including Internet Banking) The Tivoli Products in use are: Tivoli Access Manager v5.1Tivoli Identity Manager v4.5.1 Tivoli Directory Server v5.2Tivoli Directory Integrator v6.0

Real World v Utopia IM TEAM Real World Many Project Managers By-Pass Identity Management Major programmes forced to use Identity Management (& pick up cost) Technology Risk & Auditors have limited involvement Service Delivery not involved Utopia Policies & Principles in place; CEO/CIO sponsorhip in place All Project Managers embrace Identity Management Technology Risk & Auditors involved in design process Service Delivery integrated into the process Policies/Principles CEO Mandate Project Managers Tech Risk/Auditor Service Delivery

If We Had It All To Do Again… Identity Management Programme Create an Identity Management programme rather than relying on projects to fund the infrastructure Create strategy for future utilisation of infrastructure (rather than deployment by stealth Create the architectural policies, principles and guidelines up-front Deploy a provisioning solution up-front Enterprise Support Get Leadership Team sponsorship – both Business Sponsorship (CEO?) and Technology (CIO?) Engage Audit and Technology Risk teams earlier in the design phase Management Tools Spend additional time working on Configuration Management; Log File Management; Auditing Capabilities and infrastructure monitoring(!)

If We Had It All To Do Again… Pay our full-time employees a lot more money!

Will We Achieve Our Aims? Tivoli Access Manager for eBusiness YES TAMeb is well integrated into our infrastructure Performance is good & Reliability is good – “despite what they say” Enhances productivity – Java developers no longer need worry about security Tivoli Identity Manager YES Work is required to fully understand the organisational structure Provisioning new target platforms required to fully embed the product in the infrastructure Would greatly enhance productivity; reduce costs and free up resources – benefits, however, still to be realised Other Tivoli Security Products Tivoli Federated Identity Manager is a good fit for us but we are waiting on other 3 rd parties to catch up with the technology!

THANK YOU National Australia Group’s Hindsight