Richard Steel, MBA CIO, London Borough of Newham & SocITM President A CIO’s Perspective on Architecture - Newham’s 10 Strategic Principles.

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

CRICOS Provider Code: 00113B AUPN – SUSTAINABLE PROCUREMENT IN UNIVERSITIES Developing a Sustainable Procurement Strategy for your University.
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP TRIM HP Information Management.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
HR Manager – HR Business Partners Role Description
RISK ADVISORY SERVICES Green State IT Strictly Private and Confidential 29 September 2014 An initiative towards higher maturity for managing software.
Senior Fiscal Officer Meeting Thursday, November 17, 2011.
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Graffiti Reporting A partnership of Local and State Government; My Local Services App enhancements.
IBM Energy & Environment © 2008 IBM Corporation Energy Efficiency in the Data Centre … and beyond Peter Richardson UK Green Marketing Leader.
Customer Service & Customer Protection in MANSELL
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Enterprise Architecture. 2 Agenda What is Enterprise Architecture (EA)? Roles in EA? Why is EA Important? Tangible Benefits from EA? What Do We Need to.
Security Controls – What Works
Viewpoint Consulting – Committed to your success.
Managing the Information Technology Resource Jerry N. Luftman
The Information Systems Audit Process
Session 3 – Information Security Policies
Information Technology Audit
Facilities Management Category Management Plan Synopsis Version 1.1 (March 2015)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
New Procurement & Delivery Arrangements for the Schools’ Estate Presentation to Strategic Advisory Group 18 April 2005.
SEC835 Database and Web application security Information Security Architecture.
1 “Once we can deal with customers electronically, - then what?” A presentation to the RMAA, 30 May 2001 Mark Rogers, Director, Information Policy & Strategy.
MINERAL RESOURCES DEVELOPMENT POLICY(2013) 14 th February 2014 MINISTRY OF MINES, ENERGY AND WATER DEVELOPMENT 1.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
1 COMPASS Common Processes and Shared Services Setting a Direction for IT.
DEVELOPING SUSTAINABLE ICT INFRASTRUCTURE. Start Feasibility assessment – Understanding our core business In 1998 it was clear that a disproportionate.
1 1 BRANCH: CORPORATE AFFAIRS 1. CORPORATE MANAGEMENT SERVICES To provide financial and strategic support services that enhance service delivery by the.
Climate Change Council November 2011 draft ACT Planning Strategy.
Implementation of the Essential Standards The Australian Quality Framework (AQTF) is the national set of standards which assures nationally consistent,
STRATEGIC DIRECTION UPDATE JANUARY THE VISION AND MISSION THE VISION: ENRICHING LIVES AND CREATING SUCCESSFUL FUTURES. THE MISSION: EDUCATION EXCELLENCE.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
General Principles for the Procurement of Goods and Services Asst. Prof. Muhammad Abu Sadah.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Working with HIT Systems
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Enterprise Cybersecurity Strategy
F&P Policy and Scrutiny Panel Property Strategy Lyndon Watkins 20 th April 2009.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Kathy Corbiere Service Delivery and Performance Commission
Chapter 8 Auditing in an E-commerce Environment
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
19 October 2004Enterprise Architecture in WSRP Portal 1 Foreword: Building Enterprise Architecture Through WSRP in Sample EPA Regional Portal FEA Goals:
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
MANAGED LAN SERVICES How will you benefit? Managed LAN service  Full LAN service (hardware, operation, other services)  Per-port pricing  International.
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Paperless University Initiative  Timeline of our progression as a Paperless University  Implementing our Paperless University  Supporting our Paperless.
Improving performance, reducing risk Dr Apostolos Noulis, Lead Assessor, Business Development Mgr Thessaloniki, 02 June 2014 ISO Energy Management.
GSA IT Strategic Plan 2009 – 2011 August 2007 US General Services Administration 1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
ICT POLICY Donna Varney Autumn 2005 Adapted from the Becta requirements.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Social Value: The Social Value in Health and Care programme in Salford.
Midland DHBs Board Development
Information, Communication & Technology Strategy
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Integrated Management System and Certification
Steering Policy and Steering Systems
Information and Communications Technology, Knowledge Management & Enterprise Data and Records Management.
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Purchasing and Supply Chain Management
Presentation transcript:

Richard Steel, MBA CIO, London Borough of Newham & SocITM President A CIO’s Perspective on Architecture - Newham’s 10 Strategic Principles

Issues around “One Council” Data Quality Shared Services – Internal/ external Information Governance IT literacy Flexible working & accommodation strategy Background

1. Infrastructure The ICT infrastructure is optimised for Newham Council as a whole, not for individual Council businesses. The objective is to achieve the greatest possible economies of scale and efficiency through a standardised infrastructure and shared systems. It is recognised that, in a few cases, this may not represent the most effective approach for an individual business, but it should always facilitate consistent, efficient and joined-up service for all Council Service Users.

2. Data Control The Council’s strategy is designed to ensure that all data is controlled effectively. Controlled data will reside only in recognised corporate or line-of- business systems, which are fully documented, secured and supported in accordance with ICT best practice. Other data, including extracts in personal databases and spreadsheets will be considered uncontrolled. Uncontrolled data may not be used for service reporting or system updates.

3. Software Environment The Council has adopted a “Why not Microsoft?” policy. This means that Microsoft is the preferred supplier of desktop and software infrastructure products. Where Microsoft has a product, other vendors will only be considered if it can be shown that their alternative(s) offer more effective solutions for the organisation as a whole. The aim is to maximise systems compatibility and ease-of-use.

4. Resources The Council intends to maximise its use of enterprise systems. Enterprise systems are those, such as Human Resources, Finance and Procurement, which can be utilised in all businesses throughout the corporation.

5. Services The Council’s strategy is based upon the development of master datasets that are shared by business systems across the corporation, and compatible with national Government plans to develop “Government Accounts”. The structure of Master Datasets, and the ways in which systems access them cannot be changed without the approval of the CIO.

6. Security & Integrity The Council’s commitment to maintaining the confidentiality, security and integrity of information about the people it services is paramount. It will comply with all regulatory and de-facto information management requirements.

100% security is impossible. Information should only be shared through systems specifically designed for the purpose. The best security is provided by a defence in depth strategy (several layers of security to counter the threats and vulnerabilities). Information Security Principles

7. Knowledge Management The Council aspires to optimise service provision and efficiency by using Knowledge Management techniques to exploit the information at its disposal, subject to regulatory compliance and the Council’s Fair Processing Charter. The Council’s strategy is to develop a corporate Electronic Document Records Management (EDRM) system to promote effective management and use of information throughout its life-cycle. (See Information Governance – Records Management.)

8. Environmental Stewardship The Council is committed to supporting environmental stewardship through its use of ICT by:  Maximising the use of ICT equipment energy management facilities  Exploiting ICT systems for building energy management  Using ICT equipment and systems flexibly to minimise equipment requirements  Minimising printing and paper consumption through a “paperless office”

9. New Ways of Working The Council recognises that the impact of technology is changing the employment paradigm, and it’s changing fast. It espouses an approach to the exploitation of ICT that supports flexible working practices - both for business efficiency and to encourage a harmonious work-life balance - consistent with the evolution of ICT from an organisational to a community asset. The growing integration of personal, social and business computing is a key factor, and the strategy will therefore seek to accommodate developments, provided that usage accords with the Council’s moral and legal requirements, and productivity is not compromised.

10. Personal Development The Council recognises that any modern organisation depends upon the effective deployment of ICT for the conduct of its business. “Computer literacy” is no longer an optional extra! The Council expects its commitment to the provision of effective ICT training and support to be matched by the commitment of all personnel to ensure they are fully equipped to exploit the ICT infrastructure and systems provided, in accordance with the Council’s policy and procedures.

Thank you

Assessing ICT Usage to Optimise Delivery Richard Steel, MBA CIO LB Newham

Issues… ICT – Business Driven, or Business Driver? ICT Service Utilisation Performance Indicators Business Process Review

Some Resulting Themes Single log-on. Role-based log-on. Authenticated log-on. Automation of administrative tasks and workflow. The agreement and implementation of corporate flexible and mobile working policies. Use what we’ve got / Embed effective systems usage – Priority Standardisation / rationalisation

Performance Reporting Metrics don’t just focus on how effective the ICT Service is.. …but also on how effectively the ICT Service is used.

Performance Reporting

ICT Corporate Health – e.g. FOI and Data Protection requests not responded to within proscribed time limits (20/40 days). Passwords not kept secure or shared. The number of systems that share each corporate database. The number of systems that contain unsynchronised data that duplicates data in core datasets. Data Quality per database (% accuracy). Number of password resets (per service).

Use what we’ve got… e.g. 80% of censored data in censored out-of-date Officers in censored “don’t have time” to update censored, but some reporting depends on it! Duplication of activities – censored/ censored Management information on censored sketchy Poor data quality impedes joining-up

Standardisation Usage of different versions of same software –or different equipment for same function drives complexity and inefficient use of resources Greater role for corporate contracts

Summary ICT must be business driven, but is also a business driver! The ICT Service has a responsibility to provide an effective ICT infrastructure, but services have responsibility to exploit it effectively! Shared Services start in-house –Data Quality, Integrity & Security are paramount

Thanks for listening