Deep Dive into Managing RFIs, RFPs, and Proofs of Concepts

Size: px
Start display at page:

Download "Deep Dive into Managing RFIs, RFPs, and Proofs of Concepts"

Transcription

1

2 Deep Dive into Managing RFIs, RFPs, and Proofs of Concepts Presenter: Bruce Benson, VP Technology & Development Eagle Technology Management, Inc. March 17,

3 About the Presenter Bruce Benson Vice President of Technology and Development Eagle Technology Management, Inc. Bruce is one of the original founders of Eagle Technology Management, Inc. (2001) and the Freedom Group (1986). He has devoted his career to regulatory filing software. Bruce has been with the industry since the days when his software was used to print bound annual statement books and he has remained focused on improving the process of regulatory submission and preparation. With these changes, Bruce has seen an increased demand for network and data security. ETM is a SOCcertified service organization, a Microsoft Gold Partner, and a provider of service organization standards. As Vice President of Technology and Development at ETM, Bruce ensures Wings clients use a product that meets the highest security and data standards. Bruce obtained two undergraduate degrees in Computer Science and Business Administration from Coe College in Cedar Rapids, IA. 3

4 Overview RFPs, RFIs, and Proofs of Concept are becoming more valuable as tools to aid in the Software and Systems acquisition process. Vendors commit valuable hours and resources of multiple departments to responses in order to close the deal. Applications, Data Security, Corporate Culture, Business Relationships, Business Continuity, and Disaster Recovery are all topics open to discovery. How do you optimize the response process and understand what it takes to successfully present your solutions? In this deep dive session, we ll explore: Process to ensure buy-in from all stakeholders to the sales process Best practices in streamlining the RFP response process Pricing challenges for proof of concept Evaluation techniques to optimize resources on the best opportunities, and to determine when to just say "no" 4

5 Buy-In From Stakeholders to Sales Process Company should assess strategic fit of the opportunity. Considering all the other opportunities in the sales pipeline, does engaging in this make sense? Key considerations: How aligned is this to your target market? Can your existing client references be utilized? Who are the competitors and what do they say about this opportunity? Do you have a win strategy? Are you equipped, ready to commit, and have the resources? 5

6 Buy-In From Stakeholders to Sales Process Identify departments to participate in completing requests Sales, Product Managers, Development Team, Management Develop a pre-qualification process Determine questions to qualify RFIs and RFPs Company Information Product Information - document which platform used Security Information - provide PII information held/not held Timeframe for completion - develop estimate based on RFP complexity Standardize answers Generate a standard material set for prospects to answer 6

7 Buy-In From Stakeholders to Sales Process - continued Sales Needs help communicating technical details Information Technology Busy with computer systems and IT security cannot always provide assistance Management Wants efficient handling of sales opportunities So, who handles the work? RFP Coordinator Coordinates the process Lead RFP Writer Researches/completes questionnaires Sales Completes non-technical questions Management/IT Answer questions assigned by writer 7

8 Buy-In From Stakeholders to Sales Process - continued HIPAA/HITECH Health-related information GLBA Financial information Privacy Act Fair information practices for PII held by federal agencies COPPA Protects children s privacy by allowing parents to control what information is collected FERPA Students personal information FCRA Collection and use of consumer information 8

9 Buy-In to Streamlining the RFP process Correctly state and determine Risk Classification based on proposed engagement Verify how the prospect determined Vendor Risk Assessment of you as their vendor, get specifics, or even engage business users. High Medium Low The RFP sent is a stock RFP for all vendors some questions may not apply Have business users from prospect assist in verifying risk classification 9

10 Streamlining the RFP Response Process For Core Systems, RFP response process is timeconsuming. Typical RFP questionnaire may have more than 2000 questions requiring manual completion and supporting criteria. Sample RFP Best Practices Database of searchable, indexed, stock answers Consistent set of resources Designate someone to do quality checks Challenges Keeping collaborative work in one document Merging 10

11 Streamlining the RFP Response Process Implement Information Security Policies/Procedures (ISPP) to address security concerns outlined in ISO standards. 11

12 Streamlining the RFP Response Process - continued Most RFP questionnaires use the ISO outline, such as Human Resources Security 12

13 Streamlining the RFP Response Process - continued Sample FAQs for Human Resources Security: Is a background screening performed prior to allowing constituent access to scoped systems and data? Criminal, financial, drugs Are new hires required to sign any agreements upon hire? Acceptable User Policy, Employee Handbook Is there a security awareness training program? Information security awareness, education, training done monthly/annually Is there a disciplinary process for non-compliance with information security policies? Ch. 20 Sanction Policy, Security Violation, Disciplinary Action Is there an integral termination or change of status process? Termination/change of employment, return of assets, access to company resources revoked in timely manner 13

14 Streamlining the RFP Response Process - continued Access Control 14

15 Streamlining the RFP Response Process - continued Sample FAQs for Access Control: Are unique user IDs used for access? Password controls such as number of days, number of alphanumeric or special characters, number of times used in a given timeframe Are user access rights reviewed at least quarterly? Yes Is multi-factor authentication deployed for high-risk environments? Restrictions and access to networks or services applied Are passwords required to access systems transmitting, processing, or storing scoped systems and data? Via management system and user responsibilities Is remote access permitted? Only through company VPN and RSA Tokens are used to secure access 15

16 Streamlining the RFP Response Process - continued or Information Security Incident Management 16

17 Streamlining the RFP Response Process - continued Sample FAQs for Information Security Incident Management: Is there an incident management program or plan? Ch. 24 Breach Notification and Incident Response Procedure Procedures to collect/maintain a chain of custody for evidence during incident investigation? The Employee Handbook details employee responsibilities related to security incidents/breaches Postmortem to include root cause analysis and remediation plan provided to leadership? Reviews are conducted by the Information Security team to revise procedures as necessary to prevent future occurrences Is there a system to continuously monitor error logs and the Incident Response team? Daily operational activities are monitored with separate evaluations using software to monitor both system health and overall environmental security 17

18 Streamlining the RFP Response Process - continued Work towards achieving a certification which will assist i.e. SOC Type II Certification Use 3 rd -party providers who already achieved Information Security certifications Maintain an RFP Matrix of FAQs to answer new RFPs 18

19 Group activity Buy-in & Streamlining Do you have all members involved? How do you pursued company members to be involved? How can you establish cooperation, Benefits to company? Who can drive the buy-in Managements commitment? Liability of company? Is your Company prepared for all the detailed questions? Do you have a Business Continuity Plan (BCP)? Do you have a Disaster Recovery Plan (DR)? Do you need certification, are there benefits? 19

20 Group activity Buy-in & Streamlining Streamlining, preparing, automating Do you have the right material, can you get the right material? Is your company prepared? Develop the right process? Use the right technology to automate, a level which meets your team. Are prepared for an increase in Requests for Information, Now, Future. 20

21 Pricing Challenges for Proof of Concept For Core Systems, POCs range in scope and are difficult to price with multiple candidates still present. Most RFPs expect the vendor to invest in the POC at personal cost. Typical activities of a Core System POC: Configure system to client s specification Build product, rates, documents, and implement business rules Include training, creates buy-in by key people. Some POCs span multiple weeks, merge with online training, etc. chargeable, yet more successful when only one vendor left 21

22 Pricing Challenges for Proof of Concept ETM uses a sandbox environment to allow prospects to test drive applications. ETM creates a project plan to assist the prospect in testing all required components. Key personnel also assist in keeping the project moving forward. Using a specification and a technical spec white paper, prospects can verify and test any security requirements in this environment. Timelines keep project on target and create contact points. If opportunity size and importance exist, then: A specialized testing environment is created for the prospect Commitment, specialized testing, desired length of prospect displayed 22

23 Evaluation Techniques ETM developed a standard RFP document with attachments for potential clients. Prospects can use this information to answer their own RFP questions. 23

24 Optimizing Resources on Opportunities Core Systems evaluation criteria targeting properly qualified opportunities is key Carriers vary in profile sample criteria as follows: Carrier size Are you able to execute a program in the size required to implement technology? Can you deliver what is required? LOB - Does carrier have the right LOBs you support or have done? Do you have reference ability in these LOBs? Budget Is there a clear budget or a path to a budget for the initiative? Sponsors Do you know who the sponsors are or have you talked with them? RFP process execution Who is running the process? What does it mean to you? Relationship? SI? 24

25 Optimizing Resources on Opportunities Before the RFP process: Engage with the customer Offer an RFP template with questions pertaining to ISO Standards During an RFP process: Measure size of opportunity vs time/man hours Present NDA and SaaS agreement for legal/negotiations Have an RFP coordinator to see the process through Have canned responses ready for FAQs Require a signed copy of NDAs before releasing the RFP Sales review RFP completely, evaluate completeness If allowed, schedule a call with prospect to review RFP 25

26 When to Just Say No Size of opportunity versus costs of answering RFP Will opportunity benefit company growth? Would legal or negotiation costs be too high? Contract Requirements: Do contracts meet the actual project or are they canned? Are requirements unreasonable for your company to assume liability or risk? 26

27 Group activity POC & Optimizing How are your current POC activities working? Strengths, weaknesses, how to be effective? Identify obstacles that should be changed to improve POC! Costs, Time effort Identify key criteria to improve your process Criteria and measurements Resource management Are the right internal resources define, reliable Timelines defined, can you handle multiple in parallel? Have you planned for scaling of process? How? 27

28 Thank You! Bruce Benson VP Technology and Development Eagle Technology Management, Inc Time For Questions 28

Auditing Timeline. Top-Line Version

Auditing Timeline. Top-Line Version Auditing Timeline Top-Line Version As a complement to their book Agency Audits: How to Achieve Success, Joanne Davis and Jane Twyon have created a timeline that takes marketers through the auditing journey.

More information

BEST PRACTICES IN Talent Management Article Title Format

BEST PRACTICES IN Talent Management Article Title Format SCHOONOVER ASSOCIATES WHITE PAPER BEST PRACTICES IN Talent Management Article Title Format SCHOONOVER ASSOCIATES, LLC. 2015 Dr. Stephen C. Schoonover President, Schoonover Associates, LLC Contents Executive

More information

Questionnaire. Identity Management Maturity Scan for SWITCHaai. Thomas Lenggenhager, SWITCH Thomas Siegenthaler & Daniela Roesti, CSI Consulting AG

Questionnaire. Identity Management Maturity Scan for SWITCHaai. Thomas Lenggenhager, SWITCH Thomas Siegenthaler & Daniela Roesti, CSI Consulting AG Questionnaire Identity Management Maturity Scan for SWITCHaai Thomas Lenggenhager, SWITCH Thomas Siegenthaler & Daniela Roesti, CSI Consulting AG Version: V2.1 Created: 19. Aug. 2011 Last change: 13. Nov.

More information

PART II: Generate Awareness: Marketing and Lead Generation SafeNet Authentication Service: Benefits for Your Customers

PART II: Generate Awareness: Marketing and Lead Generation SafeNet Authentication Service: Benefits for Your Customers Authentication SERVICE SafeNet Authentication Service Partner Welcome Kit PART I: PART II: Building an Innovative Business with SafeNet Authentication Service Selling SafeNet Authentication Service to

More information

Developing an Integrated Anti-Fraud, Compliance, and Ethics Program

Developing an Integrated Anti-Fraud, Compliance, and Ethics Program Developing an Integrated Anti-Fraud, Compliance, and Ethics Program Performing Due Diligence 2018 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. How does your organization ensure

More information

ACA COMPLIANCE PROVIDER REQUEST FOR PROPOSAL (RFP)

ACA COMPLIANCE PROVIDER REQUEST FOR PROPOSAL (RFP) ACA COMPLIANCE PROVIDER REQUEST FOR PROPOSAL (RFP) SEPTEMBER 2016 The purpose of this RFP is to identify and engage an outsourcing solution partner to provide ACA Compliance services to CLIENT with efficiency,

More information

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Professor PhD. Constantin MILITARU Polytechnic University of Bucharest, Romania

More information

Creating a Computer Security Incident Response Team Action Plan

Creating a Computer Security Incident Response Team Action Plan Creating a Computer Security Incident Response Team CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University This material is approved for public

More information

Collaboration with Business Associates on Compliance

Collaboration with Business Associates on Compliance Collaboration with Business Associates on Compliance HCCA Compliance Institute April 19, 2016 Balancing risk management, compliance responsibility and business growth Responsibility of entities as they

More information

Support Services Review Template

Support Services Review Template Update Year: 2012 Unit Name: Office of Internal Audit Today s Date: June 28, 2012 Unit Review Leader: Imad Mouchayleh Five Fundamental Questions 1. What are the primary services or outcomes provided by

More information

ForeScout Forward Partner Program. Guidelines for ForeScout Value Added Resellers

ForeScout Forward Partner Program. Guidelines for ForeScout Value Added Resellers ForeScout Forward Partner Program Guidelines for ForeScout Value Added Resellers Effective August 1, 2017 Table of Contents Welcome 3 Two-Tier Channel Model 4 Program Overview...........................................................

More information

ADDENDUM N. 3. Information Technology Outsourcing Services TSC RFP 19-03

ADDENDUM N. 3. Information Technology Outsourcing Services TSC RFP 19-03 ADDENDUM N. 3 Information Technology Outsourcing Services TSC RFP 19-03 The following changes are hereby incorporated into the Request for Proposal Information Technology Outsourcing Services All proposal

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

Key Stakeholders that benefit from video interviewing

Key Stakeholders that benefit from video interviewing Key Stakeholders that benefit from video interviewing When exploring options for a new talent acquisition tool, whether you're a talent professional at a small recruiting agency or a large corporation,

More information

The SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT

The SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT The Optimization Model Control. Optimize. Grow The Optimization Model In an ever-changing global marketplace, your company is looking for every opportunity to gain a competitive advantage and simultaneously

More information

Information Technology Independent Verification and Validation

Information Technology Independent Verification and Validation Florida Department of Management Services Information Technology Independent Verification and Validation RFP No. Work Plan and Methodology ; 2:30 PM EST 2150 River Plaza Drive Suite 380 Sacramento California

More information

Salesforce Governance: A New Hope

Salesforce Governance: A New Hope The purpose of governance is to provide a framework of policies, procedures & standards to ensure effective execution of projects / programs and provide strategic decision support & alignment bridging

More information

State of Oklahoma CIO Assessment Study

State of Oklahoma CIO Assessment Study in collaboration with State of Oklahoma CIO Assessment Study October 21, 2010 Government Modernization Committee Alex Z. Pettit Chief Information Officer State of Oklahoma Table of Contents Confirmation

More information

How to Stand Up a Privacy Program: Privacy in a Box

How to Stand Up a Privacy Program: Privacy in a Box How to Stand Up a Privacy Program: Privacy in a Box Part III of III: Maturing a Privacy Program Presented by the IT, Privacy, & ecommerce global committee of ACC Thanks to: Nick Holland, Fieldfisher (ITPEC

More information

Background Verification. Request for Proposal Guide

Background Verification. Request for Proposal Guide Background Verification Request for Proposal Guide A Guide for Organizations to submit a Request for Proposal for Background Screening. This Guide was developed for employers and other organizations, such

More information

Enterprise Availability Management

Enterprise Availability Management Statement of Work Enterprise Availability Management This Statement of Work ( SOW ) is between the Customer (also called you and your ) and the IBM legal entity referenced below ( IBM ). This SOW is subject

More information

HR Service Delivery Townhall

HR Service Delivery Townhall HR Service Delivery Townhall Nov. 13, 2018 Kristi Darr, Interim Vice President for Human Resources 1 What Everyone Wants to Know How will this impact me? Will my job change? How will this work? When will

More information

Modernization and Migration Management (M3) Playbook GSA, Unified Shared Services Management

Modernization and Migration Management (M3) Playbook GSA, Unified Shared Services Management Modernization and Migration Management (M3) Playbook GSA, Unified Shared Services Management Introduction How to Read an Activity Description Objective: Provides the overall objective of the activity :

More information

Request for Proposal. Request for Proposal for IT Services RFP Number: CRDF-IT0418 Date of Issue: May 8, 2018 Closing: May 25, 2018

Request for Proposal. Request for Proposal for IT Services RFP Number: CRDF-IT0418 Date of Issue: May 8, 2018 Closing: May 25, 2018 Request for Proposal Request for Proposal for IT Services RFP Number: CRDF-IT0418 Date of Issue: May 8, 2018 Closing: May 25, 2018 RFP Coordinator: J. Todd Jennings (tjennings@crdfglobal.com) 1 Contents

More information

Mid-Market Recruitment Technology 5 Essentials Companies Should Look for When Evaluating Talent Acquisition Software

Mid-Market Recruitment Technology 5 Essentials Companies Should Look for When Evaluating Talent Acquisition Software White Paper Mid-Market Recruitment Technology 5 Essentials Companies Should Look for When Evaluating Talent Acquisition Software Growing organizations have growing needs. When medium-sized businesses start

More information

Temporary, contract and interim recruitment services Permanent and fixed term selection recruitment services Retained & executive recruitment services

Temporary, contract and interim recruitment services Permanent and fixed term selection recruitment services Retained & executive recruitment services QUALITY MANAGEMENT POLICY & PROCEDURES Policy Statement CDS Recruitment Limited specialises in the recruitment of Engineering, Technical and Scientific personnel in the Chemical and Pharmaceutical, Oil

More information

NAPBS Background Verification Request for Proposal Guide

NAPBS Background Verification Request for Proposal Guide NAPBS Background Verification Request for Proposal Guide A Guide for Organizations to submit a Request for Proposal for Background Screening This Guide was developed for employers and other organizations,

More information

American Well Hosting Operations Guide for AmWell Customers. Version 7.0

American Well Hosting Operations Guide for AmWell Customers. Version 7.0 American Well Hosting Operations Guide for AmWell Customers Version 7.0 October 31, 2016 Contents Introduction... 4 Scope and Purpose... 4 Document Change Control... 4 Description of Services... 5 Data

More information

Step-by-step instructions to help Microsoft and Microsoft partner users navigate and perform tasks on the FastTrack site.

Step-by-step instructions to help Microsoft and Microsoft partner users navigate and perform tasks on the FastTrack site. Microsoft FastTrack Microsoft and Microsoft Partner User Guide Updated July, 2017 Step-by-step instructions to help Microsoft and Microsoft partner users navigate and perform tasks on the FastTrack site.

More information

TENDER, BID & PROPOSAL SERVICES

TENDER, BID & PROPOSAL SERVICES Julian Midwinter & Associates tender, bid, and proposal services are tailored to suit each client s budget and inhouse capacity. Be it hand holding for a first time tenderer, boosting an experienced team

More information

Testing and Monitoring Vendors

Testing and Monitoring Vendors Testing and Monitoring Vendors SCCE Regional Conference Boston March 24 th, 2017 Introducing our team Name Pascal Marat Bill Cameron Titles BT Global Services Security Compliance and Assurance Director

More information

ADP Workforce Now Talent Management

ADP Workforce Now Talent Management ADP Workforce Now Talent Management 1 ADP Workforce Now Talent Management provides the tools you need to recruit, develop, engage and retain employees. Win the war for talent and get the most out of your

More information

UTS Position Description UTS:HUMAN RESOURCES

UTS Position Description UTS:HUMAN RESOURCES UTS Position Description UTS:HUMAN RESOURCES Position Title Manager, Advancement Services Unit/Division or Faculty Advancement Position Number (if known) HEW Level HEW 9 Date 5 th October 2017 POSITION

More information

Summary of Function. Duties and Responsibilities

Summary of Function. Duties and Responsibilities Posting Title: Purchasing & Contract Officer Job ID #: 4677 Status: Regular Salary: $76,181 - $86,182 Hours: 35.00 Location: Department: Toronto Police Headquarters Purchasing Services Vacancies: 1 Opening

More information

Information Technology Services Project Management Office Operations Guide

Information Technology Services Project Management Office Operations Guide Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...

More information

As an example of an IT consultant career we are going to have a short look at business systems analysts.

As an example of an IT consultant career we are going to have a short look at business systems analysts. 1 An Information Technology consultant or analyst is someone who partners with clients to help them use information technology to improve the structure and efficiency of their IT systems, in order to meet

More information

IBM Enterprise Asset Management on Cloud for US Federal (Maximo)

IBM Enterprise Asset Management on Cloud for US Federal (Maximo) Service Description IBM Enterprise Asset Management on Cloud for US Federal (Maximo) This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of

More information

DEVELOP YOUR ABILITY TO NEGOTIATE AND WORK WITH IT VENDORS

DEVELOP YOUR ABILITY TO NEGOTIATE AND WORK WITH IT VENDORS DEVELOP YOUR ABILITY TO NEGOTIATE AND WORK WITH IT VENDORS Tips and Tricks to Navigate You Through the Process #ILTAG138 PAM SINGLETON Director of Procurement Holland & Knight, LLP Pamela.singleton@ hklaw.com

More information

ACTION Agenda Item I ANNUAL AUDIT REPORT December 6, 2002

ACTION Agenda Item I ANNUAL AUDIT REPORT December 6, 2002 ACTION Agenda Item I-2 2001-02 ANNUAL AUDIT REPORT December 6, 2002 Recommendation That the KCTCS Board of Regents receive the financial audit results for the 2001-02 fiscal year. Rationale The resolution

More information

ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE. Sample Paper 2, version 5.1. To be used with Case Study 1 QUESTION BOOKLET

ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE. Sample Paper 2, version 5.1. To be used with Case Study 1 QUESTION BOOKLET ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE Sample Paper 2, version 5.1 To be used with Case Study 1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style, Complex

More information

ITSM Process Description

ITSM Process Description ITSM Process Description Office of Information Technology Service Catalog Management ITSM Process Description Service Catalog Management Page 1 Table of Contents Table of Contents 1. Introduction 2. Service

More information

Information Security Education and Awareness Training

Information Security Education and Awareness Training Information Technology Information Security Education and Awareness Training Standard Identifier: IT-STND-002 Revision Date: 9/1/2016 Effective Date: 3/1/2015 Approved by: BOR CIO Approved on date: 10/17/2014

More information

Exciting career opportunity

Exciting career opportunity Exciting career opportunity General Manager ICT Our client, a financial service provider, seeks to recruit an experienced General Manager ICT who will be responsible for developing organizational aligned

More information

Software review Evaluating campaign management or MRM vendors: A business view point Received: 11th October, 2006

Software review Evaluating campaign management or MRM vendors: A business view point Received: 11th October, 2006 Evaluating campaign management or MRM vendors: A business view point Received: 11th October, 2006 Shaun Doyle is CEO of Cognitive Box, an analytical CRM consulting company. He has been involved in over

More information

IBM Maximo for Oil and Gas Asset management solutions for the oil and gas industry

IBM Maximo for Oil and Gas Asset management solutions for the oil and gas industry Operational Excellence improving safety, reliability, and compliance performance while reducing costs through standardization, collaboration and the adoption of better operational practices. Highlights

More information

IT Strategic Plan Portland Community College 2017 Office of the CIO

IT Strategic Plan Portland Community College 2017 Office of the CIO IT Strategic Plan Portland Community College 2017 Office of the CIO 1 Our Vision Information Technology To be a nationally recognized standard for Higher Education Information Technology organizations

More information

Global HR. Build your end-to-end HR strategy

Global HR. Build your end-to-end HR strategy Global HR Build your end-to-end HR strategy Are you a global company with presence in several countries? Do you have multiple systems for HR functions that don t talk to each other? If your answer is yes

More information

Channels Methodology: Feasibility Study Internal Analysis

Channels Methodology: Feasibility Study Internal Analysis Channels Methodology: Feasibility Study Internal Analysis Use this document as a guiding tool to facilitate assessment of internal capacity Commercial in Confidence Accion International Overview of Internal

More information

Appendix A Technical Specifications ITN Managed Services Provider (MSP) and Vendor Management Solution (VMS)

Appendix A Technical Specifications ITN Managed Services Provider (MSP) and Vendor Management Solution (VMS) Appendix A Technical Specifications ITN 142-18 Managed Services Provider (MSP) and Vendor Management Solution (VMS) JEA has identified the need to better manage all aspects of contingent labor including

More information

Patrick Malloy Communities Quality Assurance System

Patrick Malloy Communities Quality Assurance System Patrick Malloy Communities Quality Assurance System Page 1 of 83 Log of Quality Manual Revisions Version Number Revision Date Type of Revision 1 April 9, 2007 1 st release 1 April 13, 2007 Sec 1.10 removed

More information

Above the Funnel How to Measure (and Grow) Your Lead Pipeline Sales Readiness Series

Above the Funnel How to Measure (and Grow) Your Lead Pipeline Sales Readiness Series Above the Funnel How to Measure (and Grow) Your Lead Pipeline Hosts Dan Hudson 3FORWARD President, Co-Founder Dan.Hudson@ Matt Smith 3FORWARD Exec VP, Co-Founder Matt.Smith@ 2 Lead Ready tm from 3FORWARD

More information

Search Committee Training

Search Committee Training Search Committee Training Training Objectives Following participation in Search Committee Training, participants will: Understand the roles & responsibilities of the search committee chair, members and

More information

REGULATORY HOT TOPIC Third Party IT Vendor Management

REGULATORY HOT TOPIC Third Party IT Vendor Management REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And

More information

GDPR. WHO WE ARE Founded in 2016 with the vision to be THE company that organisations turn to for data privacy and governance solutions globally.

GDPR. WHO WE ARE Founded in 2016 with the vision to be THE company that organisations turn to for data privacy and governance solutions globally. GDPR ACCELERATOR WHO WE ARE Founded in 2016 with the vision to be THE company that organisations turn to for data privacy and governance solutions globally. GDPR ACCELERATOR The Wrangu GDPR Accelerator

More information

JAS Job Approval System. The way it works

JAS Job Approval System. The way it works JAS Job Approval System The way it works JAS is a smart, intelligent and intuitive online job approval and tracking system that is designed to work the way you work. JAS instantly adds enormous productivity,

More information

HOW TO AVOID THE DANGER OF WEAK CONTROLS IN THIRD-PARTY RISK MANAGEMENT

HOW TO AVOID THE DANGER OF WEAK CONTROLS IN THIRD-PARTY RISK MANAGEMENT E-Guide HOW TO AVOID THE DANGER OF WEAK CONTROLS IN THIRD-PARTY RISK MANAGEMENT SearchSecurity S ecurity expert Michael Cobb explains how to put in place additional safeguards to protect the system and

More information

City of Markham. Report of the Auditor General Human Resources Information System ( HRIS ) Implementation Audit. Presented to:

City of Markham. Report of the Auditor General Human Resources Information System ( HRIS ) Implementation Audit. Presented to: City of Markham Report of the Auditor General Human Resources Information System ( HRIS ) Implementation Audit Presented to: General Committee of Council, City of Markham Date: June 18, 2018 AGENDA Background

More information

Oman LNG LLC. Pre-Qualification Questionnaire. IT Integrity Management System (IMS) Implementation

Oman LNG LLC. Pre-Qualification Questionnaire. IT Integrity Management System (IMS) Implementation Oman LNG LLC Pre-Qualification Questionnaire IT-18-933 Integrity Management System (IMS) Implementation Pre-Qualification Questionnaire Page 1 of 10 1. GUIDELINES Response to this questionnaire shall be

More information

Assessments for Certified and Non-Certified Vendors

Assessments for Certified and Non-Certified Vendors Assessments for Certified and Non-Certified Vendors 3rd party Vendors Security Risk Profile 63% of all 2016 data breaches resulted from third party vendor s risk Small companies are high risk - security

More information

Fixed Scope Offering For Oracle Fusion HCM SaaS Implementation

Fixed Scope Offering For Oracle Fusion HCM SaaS Implementation Fixed Scope Offering For Oracle Fusion HCM SaaS Implementation Agenda Company Profile Business Objectives Business Challenges Solution Proposal Scope - Business Process Scope - Application Implementation

More information

ITIL/ITSM PROJECT ITSM Project Update 6/15/2015

ITIL/ITSM PROJECT ITSM Project Update 6/15/2015 ITSM Project Update The Big Picture W e have our EasyVista application configuration items complete, including Incident Catalog ( categories), Request Catalog, LANDesk and AD fields to sync, Working Hours,

More information

Workforce. Strategic Planning. Request for Proposals

Workforce. Strategic Planning. Request for Proposals Workforce Request for Proposals Strategic Planning Worksystems, in concert with the Columbia-Willamette Workforce Collaborative, is seeking a qualified and experienced contractor to support the development

More information

Powered Industrial Truck/Forklift Operations Standards and Procedures. Disaster Cycle Services Standards & Procedures DCS SP DMWT

Powered Industrial Truck/Forklift Operations Standards and Procedures. Disaster Cycle Services Standards & Procedures DCS SP DMWT Powered Industrial Truck/Forklift Operations Standards and Procedures Disaster Cycle Services Standards & Procedures DCS SP DMWT April 2015 Change Log Date Page(s) Section Change Author: Deploy Materials,

More information

Execute Smart MANAS CHAKRABORTY SENIOR VICE PRESIDENT

Execute Smart MANAS CHAKRABORTY SENIOR VICE PRESIDENT Execute Smart MANAS CHAKRABORTY SENIOR VICE PRESIDENT Key industry trends that are shaping IT services sourcing 54% 60%.executives will be spending on Business Apps with bundled spend on Cloud and Analytics

More information

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution

More information

Owner s Representative SCOPE OF SERVICES

Owner s Representative SCOPE OF SERVICES Owner s Representative SCOPE OF SERVICES Scope of Services DeMaria s steady growth has enabled the construction of more sophisticated buildings through various methods and services. As your Owners Representative,

More information

Objectives. On-boarding the New Provider. Successful On-Boarding: Integrating Newly Acquired Physician Practices Into Your Compliance Program

Objectives. On-boarding the New Provider. Successful On-Boarding: Integrating Newly Acquired Physician Practices Into Your Compliance Program Successful On-Boarding: Integrating Newly Acquired Physician Practices Into Your Compliance Program 2012 HCCA Clinical Practice Compliance Conference Session 601 1:00 p.m. 2:00 p.m. Objectives 1. Assess

More information

IBM Clinical Trial Management System for Sites

IBM Clinical Trial Management System for Sites Service Description IBM Clinical Trial Management System for Sites This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users

More information

Fixed scope offering. Oracle Fusion HCM Cloud Service. 22 February 2016 A DIVISION OF DIMENSION DATA

Fixed scope offering. Oracle Fusion HCM Cloud Service. 22 February 2016 A DIVISION OF DIMENSION DATA Fixed scope offering Oracle Fusion HCM Cloud Service 22 February 2016 A DIVISION OF DIMENSION DATA 2015 1 Oracle Fusion HCM Cloud Service Business objectives The solution Scope Methodology Project plan

More information

FAQ. From: Christine Curtis Director of Security GOM. REF: Request to Clarify Contactor Background Screen. Date: October 31, 2014

FAQ. From: Christine Curtis Director of Security GOM. REF: Request to Clarify Contactor Background Screen. Date: October 31, 2014 FAQ From: Christine Curtis Director of Security GOM REF: Request to Clarify Contactor Background Screen Date: October 31, 2014 What is the reason/objective for this request? The BP Background Screening

More information

A Guide to IT Risk Assessment for Financial Institutions. March 2, 2011

A Guide to IT Risk Assessment for Financial Institutions. March 2, 2011 A Guide to IT Risk Assessment for Financial Institutions March 2, 2011 Welcome! Housekeeping Control panel on the right side of your screen. Audio Telephone VoIP Submit Questions in the pane on the control

More information

SAP Fieldglass White Paper ESSENTIAL QUESTIONS TO INCLUDE IN A VENDOR MANAGEMENT SYSTEM RFP

SAP Fieldglass White Paper ESSENTIAL QUESTIONS TO INCLUDE IN A VENDOR MANAGEMENT SYSTEM RFP SAP Fieldglass White Paper ESSENTIAL QUESTIONS TO INCLUDE IN A VENDOR MANAGEMENT SYSTEM RFP UNDERSTANDING EACH PHASE OF THE PROCESS Evaluating a Vendor Management System (VMS) can be an overwhelming process

More information

Request for Information 18-RFP-004-LAJ WOTC Application Management System. Questions and Answers

Request for Information 18-RFP-004-LAJ WOTC Application Management System. Questions and Answers Request for Information 18-RFP-004-LAJ WOTC Application Management System Questions and Answers The Department s responses to timely submitted questions are provided below: Question Number 1. All 2. All

More information

RBA Validated Audit Program (VAP) Operations Manual Revision January 2018

RBA Validated Audit Program (VAP) Operations Manual Revision January 2018 RBA Validated Audit Program (VAP) Operations Manual Revision 6.0.0 January 2018 Organizations working with and in the Responsible Business Alliance (RBA) www.responsiblebusiness.org are working to improve

More information

uottawa.ca Architecture Review Board (ARB)

uottawa.ca Architecture Review Board (ARB) Architecture Review Board (ARB) Presentation Outline ARB Goals ARB Big Picture ARB Membership ARB 3 Steps Gate 1: Initiation Gate 2: Solution Review Gate 3: Architecture Review ARB - Goals Support Client

More information

QUALITY and ENVIRONMENTAL, HEALTH & SAFETY MANAGEMENT SYSTEM MANUAL

QUALITY and ENVIRONMENTAL, HEALTH & SAFETY MANAGEMENT SYSTEM MANUAL 00 Revision E February 009 ECOM OUTSIDE PLANT & QUALITY and ENVIRONMENTAL, HEALTH & SAFETY MANAGEMENT SYSTEM MANUAL 00 www.tycoelectronics.com www.telecomosp.com www.ampnetconnect.com 00 DCR TQ09/005 Revision

More information

umantis Successful talent management begins with people

umantis Successful talent management begins with people HR Software Index Successful talent management begins with people Talent Management accompanies and supports the entire life cycle of the company's employees. The HR department obviously uses the solution,

More information

Kuali Research. Simplify administration and compliance, maximize funding, and make more informed decisions.

Kuali Research. Simplify administration and compliance, maximize funding, and make more informed decisions. Kuali Research Simplify administration and compliance, maximize funding, and make more informed decisions. OVERVIEW Kuali provides full online research administration and compliance management to simplify

More information

NERC CIP Version 6 - Robert Koziy Director Cyber Security Compliance Open Systems International

NERC CIP Version 6 - Robert Koziy Director Cyber Security Compliance Open Systems International NERC CIP Version 6 - Robert Koziy Director Cyber Security Compliance Open Systems International NERC CIP 6 Agenda CIP version 3/5 vs 6 Vendor Challenges CIP-013 Supply Chain Security Version 5 vs 6 Version

More information

An Overview of the AWS Cloud Adoption Framework

An Overview of the AWS Cloud Adoption Framework An Overview of the AWS Cloud Adoption Framework Version 2 February 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes

More information

LAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS LAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS

LAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS LAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS Design Like A Pro Boost Your Skills in HMI/SCADA Project Development LAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS How important is a solid foundation to the success of your project? A good foundation

More information

Third Sector Capital Partners, Inc. & Actionable Intelligence for Social Policy Social Innovation Fund Pay for Success Youth Development Competition

Third Sector Capital Partners, Inc. & Actionable Intelligence for Social Policy Social Innovation Fund Pay for Success Youth Development Competition Third Sector Capital Partners, Inc. & Actionable Intelligence for Social Policy Social Innovation Fund Pay for Success Youth Development Competition FREQUENTLY ASKED QUESTIONS Where is the RFP posted?

More information

Certified Enterprise Coach (CEC) Application - SAMPLE

Certified Enterprise Coach (CEC) Application - SAMPLE Certified Enterprise Coach (CEC) Application - SAMPLE Application Instructions Download and read the CEC Application Instructions - June 2015 from the Scrum Alliance Website. Application Review Process

More information

CONTROL-SA. The Foundation for Secure Identity Management

CONTROL-SA. The Foundation for Secure Identity Management 0000001000010000001010000000010000100000010100000000100001000000101000000001000010000001010000000010000100 000010100000000100001000000101000000001000010000001010000000010000100000010 1000000001000010000001010000000010000100000010100000000100001000000101000000001000010000001010000000010000

More information

AVEPOINT CLIENT SERVICES

AVEPOINT CLIENT SERVICES Services Catalog AVEPOINT CLIENT SERVICES AvePoint s Client Services teams provide world-class business and technical experts required to fully maximize your enterprise-wide collaboration technology investments.

More information

Corporate Background and Experience: Financial Soundness: Project Staffing and Organization

Corporate Background and Experience: Financial Soundness: Project Staffing and Organization A motion by Kentucky, on behalf of the Certification Committee, to adopt changes to the Governing Board Rules, Appendix C, Criteria and Minimum Standards for CSP Certification: Appendix C (04/07/2015)

More information

SIMPLE FUND 360: AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE.

SIMPLE FUND 360: AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE www.bglcorp.com Prepared by BGL Corporate Solutions Pty Ltd March 2018 CONTENTS 1.0 Overview of BGL s Web Applications 2.0 Data Sources and

More information

Securing Intel s External Online Presence

Securing Intel s External Online Presence IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively

More information

SCCE Compliance & Ethics Institute. Agenda. Trust & Verify: Investigation and Compliance Forensic Tools. September 16, 2014

SCCE Compliance & Ethics Institute. Agenda. Trust & Verify: Investigation and Compliance Forensic Tools. September 16, 2014 SCCE & Ethics Institute Trust & Verify: Investigation and Forensic Tools September 16, 2014 Martin Wolin Chief Risk & Officer Mercer North & Latin America Boston, MA Alan K. Halfenger Chief Officer Bain

More information

Thinking of changing your TMS?

Thinking of changing your TMS? Thinking of changing your TMS? Tips, tricks and some advice ERNST & YOUNG LLP 1 Disclaimer EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global

More information

Making the SoA an Information Security Governance Tool

Making the SoA an Information Security Governance Tool Making the SoA an Information Security Governance Tool Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find the article and click

More information

Invitation to Negotiate (ITN) Statewide Travel Management System ITN No D. Questions and Answers ITN Amendments

Invitation to Negotiate (ITN) Statewide Travel Management System ITN No D. Questions and Answers ITN Amendments Invitation to Negotiate (ITN) ADDENDUM NO. 1 Questions and Answers ITN Amendments September 2016 Contained herein are the responses to the questions submitted to the Department of Management Services (Department).

More information

ITIL Intermediate Capability Stream:

ITIL Intermediate Capability Stream: ITIL Intermediate Capability Stream: OPERATIONAL SUPPORT AND ANALYSIS (OSA) CERTIFICATE Sample Paper 1, version 6.1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style Multiple Choice

More information

Designing a High-Performing Engagement Culture in a Corporate-wide Function

Designing a High-Performing Engagement Culture in a Corporate-wide Function Designing a High-Performing Engagement Culture in a Corporate-wide Function Organization Design Forum May 10, 2011 Beth Ann Johnson, Corporate Export/Import Shared Services Scott Bartlett, Shipbuilding

More information

TalentGuard Overview. The Predictive People Development Company

TalentGuard Overview. The Predictive People Development Company TalentGuard Overview The Predictive People Development Company Company Overview TalentGuard Overview The Predictive People Development Company. About Us Provider of Award-Winning Competency- Based Talent

More information

Organization Conflict of Interest (OCI) Company Process

Organization Conflict of Interest (OCI) Company Process (ISO 9001:2008) ISO 9001:2008 Organization Conflict of Interest (OCI) Company Process 1.0 Introduction New proposal opportunities will be reviewed against the MCL by the Director of Federal Services as

More information

ITSM Process/Change Management

ITSM Process/Change Management ITSM Process/Change Management Process Documentation Revision Date: December 13, 2017 Version Number: 2.0 Document Ownership Document Owner Maury Collins Revision History ITSM Role, Department Service

More information

CUSTOMER AND SUPPLIER ROLES AND RESPONSIBILITIES FOR 21 CFR 11 COMPLIANCE ASSESSMENT. 21 CFR Part 11 FAQ. (Frequently Asked Questions)

CUSTOMER AND SUPPLIER ROLES AND RESPONSIBILITIES FOR 21 CFR 11 COMPLIANCE ASSESSMENT. 21 CFR Part 11 FAQ. (Frequently Asked Questions) 21 CFR Part 11 FAQ (Frequently Asked Questions) Customer and Supplier Roles and Responsibilities for Assessment of METTLER TOLEDO STARe Software Version 16.00, including: - 21 CFR 11 Compliance software

More information

!!!! School Security Get its Head in the Clouds. Deploying Modern Video Surveillance in Educational Institutions. Unlocking the Cloud

!!!! School Security Get its Head in the Clouds. Deploying Modern Video Surveillance in Educational Institutions. Unlocking the Cloud APPLICATION BRIEF School Security Get its Head in the Clouds Deploying Modern Video Surveillance in Educational Institutions Unlocking the Cloud Unlock the all the potential tools of a modern enterprise

More information