Sensis proprietary & company confidential information Trends in the government contracting space that have implications on IT capabilities (from the perspective.

Slides:



Advertisements
Similar presentations
May 2007 Global Technology & Operations | Network Computing Group | Global Enterprise Access & Desktop Services | Network Services Document Release Level/Version:
Advertisements

Collaborative Commerce. Electronic CommercePrentice Hall © Collaborative Commerce collaborative commerce (c-commerce) The use of digital technologies.
Incubating Ideas To Optimize Your Business Processes
ENGAGE IN A CAREER IN BUSINESS 8/2/2011. ENGAGE IN A CAREER IN BUSINESS Some Job Descriptions Include: Operations Technology Finance Investment Management.
Operations Management
How do information systems support the major business functions? ONUR ÇELİK U. GÖKHAN KUZUCU MERİÇ OSMANOĞLU KÜRŞAT KAYA VOLKAN.
HR Manager – HR Business Partners Role Description
RISK ADVISORY SERVICES Green State IT Strictly Private and Confidential 29 September 2014 An initiative towards higher maturity for managing software.
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
1 Network Infrastructure & Services Advisory Committee December 5, 2014.
Off shoring From the perspective of a Financial Regulator Jean Moorhouse Financial Services Authority.
Emerging Trends for Jobs in IT Sector & Business IT.
INTERNATIONAL BEST PRACTICES IN ON-SITE INSPECTIONS OF INSURERS Thomas E Power Senior Manager, Emerging Market Practice Bearing Point.
Managerial Accounting
QUALITY MANAGEMENT DEFINITIONS AND CONCEPTS QUALITY MANAGEMENT TOOLS QA / QC PROCESS COMPUTERS AND PROJECT QUALITY.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Principles of Information Systems, Sixth Edition 1 Systems Investigation and Analysis Chapter 12.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Investigation and Analysis Chapter 12.
Sharepoint 2007  An integrated suite of server capabilities can help improve organizational effectiveness by providing various processes.  Provides.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Week 8: IT Portfolio Management MIS5001: Management Information Systems David S. McGettigan Adapted from material by Arnold Kurtz, David Schuff, and Paul.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
1 Key Risk Indicators FIDUCIARY INVESTMENT RISK MANAGEMENT ASSOCIATION NATIONAL CONFERENCE April 6-10, 2008 ORLANDO Presented by Sally Miller, Director,
Globalization and Outsourcing
Purchasing.
You will be responsible for professional and technical work related to network and telecommunications solutions (Local Area Network/ Wireless, Wide Area.
“Business Performance Management” Corporate Performance Management “The Importance of Integrity” Facilitated by: Warren White VP – Change Acceleration.
© Grant Thornton | | | | | Guidance on Monitoring Internal Control Systems COSO Monitoring Project Update FEI - CFIT Meeting September 25, 2008.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
SCSC 311 Information Systems: hardware and software.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Essential Standard 2.00 Understand the nature of business. 1.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
Radar Open Systems Architectures
Executive Invitation – Oracle Data Finder Service Oracle Corporation.
2 Breakout Session #304 Po Collins, CPCM, C.P.M, Fellow Raytheon Company, Senior Manager, Contracts Holly Friedrich, CPCM, Fellow DCMA Contracts Field.
Principles of Information Systems, Sixth Edition Systems Investigation and Analysis Chapter 12.
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Principles of Information Systems, Sixth Edition Systems Investigation and Analysis Chapter 12.
Marv Adams Chief Information Officer November 29, 2001.
Careers in Distribution, Copyright 2005, WERC Careers in Distribution Management Jobs.
Software Building… What’s Your Strategy? Pros & Cons Discussion By: Learning Team B By Tom Yost, Richard Woodham, Tam Truong, Gordon Heeres, Susan Kenney,
Response to Special Education Audit Aaron Fernander, Executive Director Office of Student Programs and Services September 13, 2010 External Core Team Urban.
INFORMATION SYSTEMS IN THE ENTERPRISE
ASIL, Inc. Proprietary Information1 Effective Provider Relationships Powered by ASIL, Inc. “Business Performance Management ”
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
Business Ethics 1 كلية العلوم والدراسات الانسانية بالغاط Chapter 3: Stakeholder Relationships, Social Responsibility, and Corporate Governance.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
ROLE OF ANALYTICS IN ENHANCING BUSINESS RESILIENCY.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
1 Managing Risk in Software Process Improvement: Software Process Improvement: An Action Research Approach Jakob H. Ivesen, Lars Mathiassen, and Peter.
Making Data Work for Your District
Claims Leakage Control
Chapter 1 Computer Technology: Your Need to Know
Lecture 20 Revision class.
Franklin Kramer, Stuart Starr, Larry Wentz
Chapter Three Objectives
The EDM Reference Model A Vendor Perspective
Best Practice in Inventory Management Chapter 9 Procurement
Governance and Audit Oversight for Capital Market
Development of Skepticism: A Regulatory Perspective
Management Information Systems
Best Practices Consortium
IS Risk Management Framework Overview
Safety Self-Inspections
Program Review Presentation March 17th, 2016
Managing Privacy Risk in Your Commercial Practices
Analyzing the Marketing Environment
Presentation transcript:

Sensis proprietary & company confidential information Trends in the government contracting space that have implications on IT capabilities (from the perspective of the contractor/service provider) Tom Uva V.P. & Chief Information Officer – Sensis Corporation Adjunct Professor – Syracuse University, School of Information Studies September 17, 2010

Sensis proprietary & company confidential information Trend #1 - Increased adoption of Earned Value Analysis (EVA) Government entities (military & civilian) are requiring the use of Earned Value Analysis with increasing frequency. Observation: Impacts: Increased performance measurement & reporting requirements Business processes and technology enablement in the following areas: Accounting: Billing/invoicing, fixed assets, A/R, etc. Compliance: Regulatory audits are being conducted with increasing rigor & discipline Operations: Manufacturing, WIP, inventory Project/program management: Schedule mgmt, enhanced performance measurement capabilities, entity specific reporting, etc. Technology: Infrastructure & tools must be in place to satisfy customer requirements in addition to new/changed internal processes

Sensis proprietary & company confidential information Trend #2 - Increased need for collaboration (unclassified environments) Increasing demand for secure, multi-organization extranet/collaboration capabilities which are becoming more complex in nature. Observation: Impacts: Partnerships & collaboration requirements are created, modified & dissolved with increased speed Different degrees of “entity trust” can exist within a single program (implications to infrastructure design – external, DMZ, internal Security requirements have the potential to increase over time, which can be problematic on military programs Teaming agreements and relationships can often be vague during proposal efforts Large volumes of data are typically involved, often requiring various degrees of change control General collaboration capabilities may/may not be the same by program or government entity Implication: A wide range of IT domains come into play