Deep Dive into Managing RFIs, RFPs, and Proofs of Concepts
|
|
- Sibyl Bond
- 5 years ago
- Views:
Transcription
1
2 Deep Dive into Managing RFIs, RFPs, and Proofs of Concepts Presenter: Bruce Benson, VP Technology & Development Eagle Technology Management, Inc. March 17,
3 About the Presenter Bruce Benson Vice President of Technology and Development Eagle Technology Management, Inc. Bruce is one of the original founders of Eagle Technology Management, Inc. (2001) and the Freedom Group (1986). He has devoted his career to regulatory filing software. Bruce has been with the industry since the days when his software was used to print bound annual statement books and he has remained focused on improving the process of regulatory submission and preparation. With these changes, Bruce has seen an increased demand for network and data security. ETM is a SOCcertified service organization, a Microsoft Gold Partner, and a provider of service organization standards. As Vice President of Technology and Development at ETM, Bruce ensures Wings clients use a product that meets the highest security and data standards. Bruce obtained two undergraduate degrees in Computer Science and Business Administration from Coe College in Cedar Rapids, IA. 3
4 Overview RFPs, RFIs, and Proofs of Concept are becoming more valuable as tools to aid in the Software and Systems acquisition process. Vendors commit valuable hours and resources of multiple departments to responses in order to close the deal. Applications, Data Security, Corporate Culture, Business Relationships, Business Continuity, and Disaster Recovery are all topics open to discovery. How do you optimize the response process and understand what it takes to successfully present your solutions? In this deep dive session, we ll explore: Process to ensure buy-in from all stakeholders to the sales process Best practices in streamlining the RFP response process Pricing challenges for proof of concept Evaluation techniques to optimize resources on the best opportunities, and to determine when to just say "no" 4
5 Buy-In From Stakeholders to Sales Process Company should assess strategic fit of the opportunity. Considering all the other opportunities in the sales pipeline, does engaging in this make sense? Key considerations: How aligned is this to your target market? Can your existing client references be utilized? Who are the competitors and what do they say about this opportunity? Do you have a win strategy? Are you equipped, ready to commit, and have the resources? 5
6 Buy-In From Stakeholders to Sales Process Identify departments to participate in completing requests Sales, Product Managers, Development Team, Management Develop a pre-qualification process Determine questions to qualify RFIs and RFPs Company Information Product Information - document which platform used Security Information - provide PII information held/not held Timeframe for completion - develop estimate based on RFP complexity Standardize answers Generate a standard material set for prospects to answer 6
7 Buy-In From Stakeholders to Sales Process - continued Sales Needs help communicating technical details Information Technology Busy with computer systems and IT security cannot always provide assistance Management Wants efficient handling of sales opportunities So, who handles the work? RFP Coordinator Coordinates the process Lead RFP Writer Researches/completes questionnaires Sales Completes non-technical questions Management/IT Answer questions assigned by writer 7
8 Buy-In From Stakeholders to Sales Process - continued HIPAA/HITECH Health-related information GLBA Financial information Privacy Act Fair information practices for PII held by federal agencies COPPA Protects children s privacy by allowing parents to control what information is collected FERPA Students personal information FCRA Collection and use of consumer information 8
9 Buy-In to Streamlining the RFP process Correctly state and determine Risk Classification based on proposed engagement Verify how the prospect determined Vendor Risk Assessment of you as their vendor, get specifics, or even engage business users. High Medium Low The RFP sent is a stock RFP for all vendors some questions may not apply Have business users from prospect assist in verifying risk classification 9
10 Streamlining the RFP Response Process For Core Systems, RFP response process is timeconsuming. Typical RFP questionnaire may have more than 2000 questions requiring manual completion and supporting criteria. Sample RFP Best Practices Database of searchable, indexed, stock answers Consistent set of resources Designate someone to do quality checks Challenges Keeping collaborative work in one document Merging 10
11 Streamlining the RFP Response Process Implement Information Security Policies/Procedures (ISPP) to address security concerns outlined in ISO standards. 11
12 Streamlining the RFP Response Process - continued Most RFP questionnaires use the ISO outline, such as Human Resources Security 12
13 Streamlining the RFP Response Process - continued Sample FAQs for Human Resources Security: Is a background screening performed prior to allowing constituent access to scoped systems and data? Criminal, financial, drugs Are new hires required to sign any agreements upon hire? Acceptable User Policy, Employee Handbook Is there a security awareness training program? Information security awareness, education, training done monthly/annually Is there a disciplinary process for non-compliance with information security policies? Ch. 20 Sanction Policy, Security Violation, Disciplinary Action Is there an integral termination or change of status process? Termination/change of employment, return of assets, access to company resources revoked in timely manner 13
14 Streamlining the RFP Response Process - continued Access Control 14
15 Streamlining the RFP Response Process - continued Sample FAQs for Access Control: Are unique user IDs used for access? Password controls such as number of days, number of alphanumeric or special characters, number of times used in a given timeframe Are user access rights reviewed at least quarterly? Yes Is multi-factor authentication deployed for high-risk environments? Restrictions and access to networks or services applied Are passwords required to access systems transmitting, processing, or storing scoped systems and data? Via management system and user responsibilities Is remote access permitted? Only through company VPN and RSA Tokens are used to secure access 15
16 Streamlining the RFP Response Process - continued or Information Security Incident Management 16
17 Streamlining the RFP Response Process - continued Sample FAQs for Information Security Incident Management: Is there an incident management program or plan? Ch. 24 Breach Notification and Incident Response Procedure Procedures to collect/maintain a chain of custody for evidence during incident investigation? The Employee Handbook details employee responsibilities related to security incidents/breaches Postmortem to include root cause analysis and remediation plan provided to leadership? Reviews are conducted by the Information Security team to revise procedures as necessary to prevent future occurrences Is there a system to continuously monitor error logs and the Incident Response team? Daily operational activities are monitored with separate evaluations using software to monitor both system health and overall environmental security 17
18 Streamlining the RFP Response Process - continued Work towards achieving a certification which will assist i.e. SOC Type II Certification Use 3 rd -party providers who already achieved Information Security certifications Maintain an RFP Matrix of FAQs to answer new RFPs 18
19 Group activity Buy-in & Streamlining Do you have all members involved? How do you pursued company members to be involved? How can you establish cooperation, Benefits to company? Who can drive the buy-in Managements commitment? Liability of company? Is your Company prepared for all the detailed questions? Do you have a Business Continuity Plan (BCP)? Do you have a Disaster Recovery Plan (DR)? Do you need certification, are there benefits? 19
20 Group activity Buy-in & Streamlining Streamlining, preparing, automating Do you have the right material, can you get the right material? Is your company prepared? Develop the right process? Use the right technology to automate, a level which meets your team. Are prepared for an increase in Requests for Information, Now, Future. 20
21 Pricing Challenges for Proof of Concept For Core Systems, POCs range in scope and are difficult to price with multiple candidates still present. Most RFPs expect the vendor to invest in the POC at personal cost. Typical activities of a Core System POC: Configure system to client s specification Build product, rates, documents, and implement business rules Include training, creates buy-in by key people. Some POCs span multiple weeks, merge with online training, etc. chargeable, yet more successful when only one vendor left 21
22 Pricing Challenges for Proof of Concept ETM uses a sandbox environment to allow prospects to test drive applications. ETM creates a project plan to assist the prospect in testing all required components. Key personnel also assist in keeping the project moving forward. Using a specification and a technical spec white paper, prospects can verify and test any security requirements in this environment. Timelines keep project on target and create contact points. If opportunity size and importance exist, then: A specialized testing environment is created for the prospect Commitment, specialized testing, desired length of prospect displayed 22
23 Evaluation Techniques ETM developed a standard RFP document with attachments for potential clients. Prospects can use this information to answer their own RFP questions. 23
24 Optimizing Resources on Opportunities Core Systems evaluation criteria targeting properly qualified opportunities is key Carriers vary in profile sample criteria as follows: Carrier size Are you able to execute a program in the size required to implement technology? Can you deliver what is required? LOB - Does carrier have the right LOBs you support or have done? Do you have reference ability in these LOBs? Budget Is there a clear budget or a path to a budget for the initiative? Sponsors Do you know who the sponsors are or have you talked with them? RFP process execution Who is running the process? What does it mean to you? Relationship? SI? 24
25 Optimizing Resources on Opportunities Before the RFP process: Engage with the customer Offer an RFP template with questions pertaining to ISO Standards During an RFP process: Measure size of opportunity vs time/man hours Present NDA and SaaS agreement for legal/negotiations Have an RFP coordinator to see the process through Have canned responses ready for FAQs Require a signed copy of NDAs before releasing the RFP Sales review RFP completely, evaluate completeness If allowed, schedule a call with prospect to review RFP 25
26 When to Just Say No Size of opportunity versus costs of answering RFP Will opportunity benefit company growth? Would legal or negotiation costs be too high? Contract Requirements: Do contracts meet the actual project or are they canned? Are requirements unreasonable for your company to assume liability or risk? 26
27 Group activity POC & Optimizing How are your current POC activities working? Strengths, weaknesses, how to be effective? Identify obstacles that should be changed to improve POC! Costs, Time effort Identify key criteria to improve your process Criteria and measurements Resource management Are the right internal resources define, reliable Timelines defined, can you handle multiple in parallel? Have you planned for scaling of process? How? 27
28 Thank You! Bruce Benson VP Technology and Development Eagle Technology Management, Inc Time For Questions 28
Auditing Timeline. Top-Line Version
Auditing Timeline Top-Line Version As a complement to their book Agency Audits: How to Achieve Success, Joanne Davis and Jane Twyon have created a timeline that takes marketers through the auditing journey.
More informationBEST PRACTICES IN Talent Management Article Title Format
SCHOONOVER ASSOCIATES WHITE PAPER BEST PRACTICES IN Talent Management Article Title Format SCHOONOVER ASSOCIATES, LLC. 2015 Dr. Stephen C. Schoonover President, Schoonover Associates, LLC Contents Executive
More informationQuestionnaire. Identity Management Maturity Scan for SWITCHaai. Thomas Lenggenhager, SWITCH Thomas Siegenthaler & Daniela Roesti, CSI Consulting AG
Questionnaire Identity Management Maturity Scan for SWITCHaai Thomas Lenggenhager, SWITCH Thomas Siegenthaler & Daniela Roesti, CSI Consulting AG Version: V2.1 Created: 19. Aug. 2011 Last change: 13. Nov.
More informationPART II: Generate Awareness: Marketing and Lead Generation SafeNet Authentication Service: Benefits for Your Customers
Authentication SERVICE SafeNet Authentication Service Partner Welcome Kit PART I: PART II: Building an Innovative Business with SafeNet Authentication Service Selling SafeNet Authentication Service to
More informationDeveloping an Integrated Anti-Fraud, Compliance, and Ethics Program
Developing an Integrated Anti-Fraud, Compliance, and Ethics Program Performing Due Diligence 2018 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. How does your organization ensure
More informationACA COMPLIANCE PROVIDER REQUEST FOR PROPOSAL (RFP)
ACA COMPLIANCE PROVIDER REQUEST FOR PROPOSAL (RFP) SEPTEMBER 2016 The purpose of this RFP is to identify and engage an outsourcing solution partner to provide ACA Compliance services to CLIENT with efficiency,
More informationHuman Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System
Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Professor PhD. Constantin MILITARU Polytechnic University of Bucharest, Romania
More informationCreating a Computer Security Incident Response Team Action Plan
Creating a Computer Security Incident Response Team CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University This material is approved for public
More informationCollaboration with Business Associates on Compliance
Collaboration with Business Associates on Compliance HCCA Compliance Institute April 19, 2016 Balancing risk management, compliance responsibility and business growth Responsibility of entities as they
More informationSupport Services Review Template
Update Year: 2012 Unit Name: Office of Internal Audit Today s Date: June 28, 2012 Unit Review Leader: Imad Mouchayleh Five Fundamental Questions 1. What are the primary services or outcomes provided by
More informationForeScout Forward Partner Program. Guidelines for ForeScout Value Added Resellers
ForeScout Forward Partner Program Guidelines for ForeScout Value Added Resellers Effective August 1, 2017 Table of Contents Welcome 3 Two-Tier Channel Model 4 Program Overview...........................................................
More informationADDENDUM N. 3. Information Technology Outsourcing Services TSC RFP 19-03
ADDENDUM N. 3 Information Technology Outsourcing Services TSC RFP 19-03 The following changes are hereby incorporated into the Request for Proposal Information Technology Outsourcing Services All proposal
More informationGOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.
GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,
More informationKey Stakeholders that benefit from video interviewing
Key Stakeholders that benefit from video interviewing When exploring options for a new talent acquisition tool, whether you're a talent professional at a small recruiting agency or a large corporation,
More informationThe SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT
The Optimization Model Control. Optimize. Grow The Optimization Model In an ever-changing global marketplace, your company is looking for every opportunity to gain a competitive advantage and simultaneously
More informationInformation Technology Independent Verification and Validation
Florida Department of Management Services Information Technology Independent Verification and Validation RFP No. Work Plan and Methodology ; 2:30 PM EST 2150 River Plaza Drive Suite 380 Sacramento California
More informationSalesforce Governance: A New Hope
The purpose of governance is to provide a framework of policies, procedures & standards to ensure effective execution of projects / programs and provide strategic decision support & alignment bridging
More informationState of Oklahoma CIO Assessment Study
in collaboration with State of Oklahoma CIO Assessment Study October 21, 2010 Government Modernization Committee Alex Z. Pettit Chief Information Officer State of Oklahoma Table of Contents Confirmation
More informationHow to Stand Up a Privacy Program: Privacy in a Box
How to Stand Up a Privacy Program: Privacy in a Box Part III of III: Maturing a Privacy Program Presented by the IT, Privacy, & ecommerce global committee of ACC Thanks to: Nick Holland, Fieldfisher (ITPEC
More informationBackground Verification. Request for Proposal Guide
Background Verification Request for Proposal Guide A Guide for Organizations to submit a Request for Proposal for Background Screening. This Guide was developed for employers and other organizations, such
More informationEnterprise Availability Management
Statement of Work Enterprise Availability Management This Statement of Work ( SOW ) is between the Customer (also called you and your ) and the IBM legal entity referenced below ( IBM ). This SOW is subject
More informationHR Service Delivery Townhall
HR Service Delivery Townhall Nov. 13, 2018 Kristi Darr, Interim Vice President for Human Resources 1 What Everyone Wants to Know How will this impact me? Will my job change? How will this work? When will
More informationModernization and Migration Management (M3) Playbook GSA, Unified Shared Services Management
Modernization and Migration Management (M3) Playbook GSA, Unified Shared Services Management Introduction How to Read an Activity Description Objective: Provides the overall objective of the activity :
More informationRequest for Proposal. Request for Proposal for IT Services RFP Number: CRDF-IT0418 Date of Issue: May 8, 2018 Closing: May 25, 2018
Request for Proposal Request for Proposal for IT Services RFP Number: CRDF-IT0418 Date of Issue: May 8, 2018 Closing: May 25, 2018 RFP Coordinator: J. Todd Jennings (tjennings@crdfglobal.com) 1 Contents
More informationMid-Market Recruitment Technology 5 Essentials Companies Should Look for When Evaluating Talent Acquisition Software
White Paper Mid-Market Recruitment Technology 5 Essentials Companies Should Look for When Evaluating Talent Acquisition Software Growing organizations have growing needs. When medium-sized businesses start
More informationTemporary, contract and interim recruitment services Permanent and fixed term selection recruitment services Retained & executive recruitment services
QUALITY MANAGEMENT POLICY & PROCEDURES Policy Statement CDS Recruitment Limited specialises in the recruitment of Engineering, Technical and Scientific personnel in the Chemical and Pharmaceutical, Oil
More informationNAPBS Background Verification Request for Proposal Guide
NAPBS Background Verification Request for Proposal Guide A Guide for Organizations to submit a Request for Proposal for Background Screening This Guide was developed for employers and other organizations,
More informationAmerican Well Hosting Operations Guide for AmWell Customers. Version 7.0
American Well Hosting Operations Guide for AmWell Customers Version 7.0 October 31, 2016 Contents Introduction... 4 Scope and Purpose... 4 Document Change Control... 4 Description of Services... 5 Data
More informationStep-by-step instructions to help Microsoft and Microsoft partner users navigate and perform tasks on the FastTrack site.
Microsoft FastTrack Microsoft and Microsoft Partner User Guide Updated July, 2017 Step-by-step instructions to help Microsoft and Microsoft partner users navigate and perform tasks on the FastTrack site.
More informationTENDER, BID & PROPOSAL SERVICES
Julian Midwinter & Associates tender, bid, and proposal services are tailored to suit each client s budget and inhouse capacity. Be it hand holding for a first time tenderer, boosting an experienced team
More informationTesting and Monitoring Vendors
Testing and Monitoring Vendors SCCE Regional Conference Boston March 24 th, 2017 Introducing our team Name Pascal Marat Bill Cameron Titles BT Global Services Security Compliance and Assurance Director
More informationADP Workforce Now Talent Management
ADP Workforce Now Talent Management 1 ADP Workforce Now Talent Management provides the tools you need to recruit, develop, engage and retain employees. Win the war for talent and get the most out of your
More informationUTS Position Description UTS:HUMAN RESOURCES
UTS Position Description UTS:HUMAN RESOURCES Position Title Manager, Advancement Services Unit/Division or Faculty Advancement Position Number (if known) HEW Level HEW 9 Date 5 th October 2017 POSITION
More informationSummary of Function. Duties and Responsibilities
Posting Title: Purchasing & Contract Officer Job ID #: 4677 Status: Regular Salary: $76,181 - $86,182 Hours: 35.00 Location: Department: Toronto Police Headquarters Purchasing Services Vacancies: 1 Opening
More informationInformation Technology Services Project Management Office Operations Guide
Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...
More informationAs an example of an IT consultant career we are going to have a short look at business systems analysts.
1 An Information Technology consultant or analyst is someone who partners with clients to help them use information technology to improve the structure and efficiency of their IT systems, in order to meet
More informationIBM Enterprise Asset Management on Cloud for US Federal (Maximo)
Service Description IBM Enterprise Asset Management on Cloud for US Federal (Maximo) This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of
More informationDEVELOP YOUR ABILITY TO NEGOTIATE AND WORK WITH IT VENDORS
DEVELOP YOUR ABILITY TO NEGOTIATE AND WORK WITH IT VENDORS Tips and Tricks to Navigate You Through the Process #ILTAG138 PAM SINGLETON Director of Procurement Holland & Knight, LLP Pamela.singleton@ hklaw.com
More informationACTION Agenda Item I ANNUAL AUDIT REPORT December 6, 2002
ACTION Agenda Item I-2 2001-02 ANNUAL AUDIT REPORT December 6, 2002 Recommendation That the KCTCS Board of Regents receive the financial audit results for the 2001-02 fiscal year. Rationale The resolution
More informationITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE. Sample Paper 2, version 5.1. To be used with Case Study 1 QUESTION BOOKLET
ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE Sample Paper 2, version 5.1 To be used with Case Study 1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style, Complex
More informationITSM Process Description
ITSM Process Description Office of Information Technology Service Catalog Management ITSM Process Description Service Catalog Management Page 1 Table of Contents Table of Contents 1. Introduction 2. Service
More informationInformation Security Education and Awareness Training
Information Technology Information Security Education and Awareness Training Standard Identifier: IT-STND-002 Revision Date: 9/1/2016 Effective Date: 3/1/2015 Approved by: BOR CIO Approved on date: 10/17/2014
More informationExciting career opportunity
Exciting career opportunity General Manager ICT Our client, a financial service provider, seeks to recruit an experienced General Manager ICT who will be responsible for developing organizational aligned
More informationSoftware review Evaluating campaign management or MRM vendors: A business view point Received: 11th October, 2006
Evaluating campaign management or MRM vendors: A business view point Received: 11th October, 2006 Shaun Doyle is CEO of Cognitive Box, an analytical CRM consulting company. He has been involved in over
More informationIBM Maximo for Oil and Gas Asset management solutions for the oil and gas industry
Operational Excellence improving safety, reliability, and compliance performance while reducing costs through standardization, collaboration and the adoption of better operational practices. Highlights
More informationIT Strategic Plan Portland Community College 2017 Office of the CIO
IT Strategic Plan Portland Community College 2017 Office of the CIO 1 Our Vision Information Technology To be a nationally recognized standard for Higher Education Information Technology organizations
More informationGlobal HR. Build your end-to-end HR strategy
Global HR Build your end-to-end HR strategy Are you a global company with presence in several countries? Do you have multiple systems for HR functions that don t talk to each other? If your answer is yes
More informationChannels Methodology: Feasibility Study Internal Analysis
Channels Methodology: Feasibility Study Internal Analysis Use this document as a guiding tool to facilitate assessment of internal capacity Commercial in Confidence Accion International Overview of Internal
More informationAppendix A Technical Specifications ITN Managed Services Provider (MSP) and Vendor Management Solution (VMS)
Appendix A Technical Specifications ITN 142-18 Managed Services Provider (MSP) and Vendor Management Solution (VMS) JEA has identified the need to better manage all aspects of contingent labor including
More informationPatrick Malloy Communities Quality Assurance System
Patrick Malloy Communities Quality Assurance System Page 1 of 83 Log of Quality Manual Revisions Version Number Revision Date Type of Revision 1 April 9, 2007 1 st release 1 April 13, 2007 Sec 1.10 removed
More informationAbove the Funnel How to Measure (and Grow) Your Lead Pipeline Sales Readiness Series
Above the Funnel How to Measure (and Grow) Your Lead Pipeline Hosts Dan Hudson 3FORWARD President, Co-Founder Dan.Hudson@ Matt Smith 3FORWARD Exec VP, Co-Founder Matt.Smith@ 2 Lead Ready tm from 3FORWARD
More informationSearch Committee Training
Search Committee Training Training Objectives Following participation in Search Committee Training, participants will: Understand the roles & responsibilities of the search committee chair, members and
More informationREGULATORY HOT TOPIC Third Party IT Vendor Management
REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And
More informationGDPR. WHO WE ARE Founded in 2016 with the vision to be THE company that organisations turn to for data privacy and governance solutions globally.
GDPR ACCELERATOR WHO WE ARE Founded in 2016 with the vision to be THE company that organisations turn to for data privacy and governance solutions globally. GDPR ACCELERATOR The Wrangu GDPR Accelerator
More informationJAS Job Approval System. The way it works
JAS Job Approval System The way it works JAS is a smart, intelligent and intuitive online job approval and tracking system that is designed to work the way you work. JAS instantly adds enormous productivity,
More informationHOW TO AVOID THE DANGER OF WEAK CONTROLS IN THIRD-PARTY RISK MANAGEMENT
E-Guide HOW TO AVOID THE DANGER OF WEAK CONTROLS IN THIRD-PARTY RISK MANAGEMENT SearchSecurity S ecurity expert Michael Cobb explains how to put in place additional safeguards to protect the system and
More informationCity of Markham. Report of the Auditor General Human Resources Information System ( HRIS ) Implementation Audit. Presented to:
City of Markham Report of the Auditor General Human Resources Information System ( HRIS ) Implementation Audit Presented to: General Committee of Council, City of Markham Date: June 18, 2018 AGENDA Background
More informationOman LNG LLC. Pre-Qualification Questionnaire. IT Integrity Management System (IMS) Implementation
Oman LNG LLC Pre-Qualification Questionnaire IT-18-933 Integrity Management System (IMS) Implementation Pre-Qualification Questionnaire Page 1 of 10 1. GUIDELINES Response to this questionnaire shall be
More informationAssessments for Certified and Non-Certified Vendors
Assessments for Certified and Non-Certified Vendors 3rd party Vendors Security Risk Profile 63% of all 2016 data breaches resulted from third party vendor s risk Small companies are high risk - security
More informationFixed Scope Offering For Oracle Fusion HCM SaaS Implementation
Fixed Scope Offering For Oracle Fusion HCM SaaS Implementation Agenda Company Profile Business Objectives Business Challenges Solution Proposal Scope - Business Process Scope - Application Implementation
More informationITIL/ITSM PROJECT ITSM Project Update 6/15/2015
ITSM Project Update The Big Picture W e have our EasyVista application configuration items complete, including Incident Catalog ( categories), Request Catalog, LANDesk and AD fields to sync, Working Hours,
More informationWorkforce. Strategic Planning. Request for Proposals
Workforce Request for Proposals Strategic Planning Worksystems, in concert with the Columbia-Willamette Workforce Collaborative, is seeking a qualified and experienced contractor to support the development
More informationPowered Industrial Truck/Forklift Operations Standards and Procedures. Disaster Cycle Services Standards & Procedures DCS SP DMWT
Powered Industrial Truck/Forklift Operations Standards and Procedures Disaster Cycle Services Standards & Procedures DCS SP DMWT April 2015 Change Log Date Page(s) Section Change Author: Deploy Materials,
More informationExecute Smart MANAS CHAKRABORTY SENIOR VICE PRESIDENT
Execute Smart MANAS CHAKRABORTY SENIOR VICE PRESIDENT Key industry trends that are shaping IT services sourcing 54% 60%.executives will be spending on Business Apps with bundled spend on Cloud and Analytics
More informationTHE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE
THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution
More informationOwner s Representative SCOPE OF SERVICES
Owner s Representative SCOPE OF SERVICES Scope of Services DeMaria s steady growth has enabled the construction of more sophisticated buildings through various methods and services. As your Owners Representative,
More informationObjectives. On-boarding the New Provider. Successful On-Boarding: Integrating Newly Acquired Physician Practices Into Your Compliance Program
Successful On-Boarding: Integrating Newly Acquired Physician Practices Into Your Compliance Program 2012 HCCA Clinical Practice Compliance Conference Session 601 1:00 p.m. 2:00 p.m. Objectives 1. Assess
More informationIBM Clinical Trial Management System for Sites
Service Description IBM Clinical Trial Management System for Sites This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users
More informationFixed scope offering. Oracle Fusion HCM Cloud Service. 22 February 2016 A DIVISION OF DIMENSION DATA
Fixed scope offering Oracle Fusion HCM Cloud Service 22 February 2016 A DIVISION OF DIMENSION DATA 2015 1 Oracle Fusion HCM Cloud Service Business objectives The solution Scope Methodology Project plan
More informationFAQ. From: Christine Curtis Director of Security GOM. REF: Request to Clarify Contactor Background Screen. Date: October 31, 2014
FAQ From: Christine Curtis Director of Security GOM REF: Request to Clarify Contactor Background Screen Date: October 31, 2014 What is the reason/objective for this request? The BP Background Screening
More informationA Guide to IT Risk Assessment for Financial Institutions. March 2, 2011
A Guide to IT Risk Assessment for Financial Institutions March 2, 2011 Welcome! Housekeeping Control panel on the right side of your screen. Audio Telephone VoIP Submit Questions in the pane on the control
More informationSAP Fieldglass White Paper ESSENTIAL QUESTIONS TO INCLUDE IN A VENDOR MANAGEMENT SYSTEM RFP
SAP Fieldglass White Paper ESSENTIAL QUESTIONS TO INCLUDE IN A VENDOR MANAGEMENT SYSTEM RFP UNDERSTANDING EACH PHASE OF THE PROCESS Evaluating a Vendor Management System (VMS) can be an overwhelming process
More informationRequest for Information 18-RFP-004-LAJ WOTC Application Management System. Questions and Answers
Request for Information 18-RFP-004-LAJ WOTC Application Management System Questions and Answers The Department s responses to timely submitted questions are provided below: Question Number 1. All 2. All
More informationRBA Validated Audit Program (VAP) Operations Manual Revision January 2018
RBA Validated Audit Program (VAP) Operations Manual Revision 6.0.0 January 2018 Organizations working with and in the Responsible Business Alliance (RBA) www.responsiblebusiness.org are working to improve
More informationuottawa.ca Architecture Review Board (ARB)
Architecture Review Board (ARB) Presentation Outline ARB Goals ARB Big Picture ARB Membership ARB 3 Steps Gate 1: Initiation Gate 2: Solution Review Gate 3: Architecture Review ARB - Goals Support Client
More informationQUALITY and ENVIRONMENTAL, HEALTH & SAFETY MANAGEMENT SYSTEM MANUAL
00 Revision E February 009 ECOM OUTSIDE PLANT & QUALITY and ENVIRONMENTAL, HEALTH & SAFETY MANAGEMENT SYSTEM MANUAL 00 www.tycoelectronics.com www.telecomosp.com www.ampnetconnect.com 00 DCR TQ09/005 Revision
More informationumantis Successful talent management begins with people
HR Software Index Successful talent management begins with people Talent Management accompanies and supports the entire life cycle of the company's employees. The HR department obviously uses the solution,
More informationKuali Research. Simplify administration and compliance, maximize funding, and make more informed decisions.
Kuali Research Simplify administration and compliance, maximize funding, and make more informed decisions. OVERVIEW Kuali provides full online research administration and compliance management to simplify
More informationNERC CIP Version 6 - Robert Koziy Director Cyber Security Compliance Open Systems International
NERC CIP Version 6 - Robert Koziy Director Cyber Security Compliance Open Systems International NERC CIP 6 Agenda CIP version 3/5 vs 6 Vendor Challenges CIP-013 Supply Chain Security Version 5 vs 6 Version
More informationAn Overview of the AWS Cloud Adoption Framework
An Overview of the AWS Cloud Adoption Framework Version 2 February 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes
More informationLAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS LAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS
Design Like A Pro Boost Your Skills in HMI/SCADA Project Development LAYING THE FOUNDATION FOR SUCCESSFUL HMI/SCADA PROJECTS How important is a solid foundation to the success of your project? A good foundation
More informationThird Sector Capital Partners, Inc. & Actionable Intelligence for Social Policy Social Innovation Fund Pay for Success Youth Development Competition
Third Sector Capital Partners, Inc. & Actionable Intelligence for Social Policy Social Innovation Fund Pay for Success Youth Development Competition FREQUENTLY ASKED QUESTIONS Where is the RFP posted?
More informationCertified Enterprise Coach (CEC) Application - SAMPLE
Certified Enterprise Coach (CEC) Application - SAMPLE Application Instructions Download and read the CEC Application Instructions - June 2015 from the Scrum Alliance Website. Application Review Process
More informationCONTROL-SA. The Foundation for Secure Identity Management
0000001000010000001010000000010000100000010100000000100001000000101000000001000010000001010000000010000100 000010100000000100001000000101000000001000010000001010000000010000100000010 1000000001000010000001010000000010000100000010100000000100001000000101000000001000010000001010000000010000
More informationAVEPOINT CLIENT SERVICES
Services Catalog AVEPOINT CLIENT SERVICES AvePoint s Client Services teams provide world-class business and technical experts required to fully maximize your enterprise-wide collaboration technology investments.
More informationCorporate Background and Experience: Financial Soundness: Project Staffing and Organization
A motion by Kentucky, on behalf of the Certification Committee, to adopt changes to the Governing Board Rules, Appendix C, Criteria and Minimum Standards for CSP Certification: Appendix C (04/07/2015)
More informationSIMPLE FUND 360: AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE.
Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE www.bglcorp.com Prepared by BGL Corporate Solutions Pty Ltd March 2018 CONTENTS 1.0 Overview of BGL s Web Applications 2.0 Data Sources and
More informationSecuring Intel s External Online Presence
IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively
More informationSCCE Compliance & Ethics Institute. Agenda. Trust & Verify: Investigation and Compliance Forensic Tools. September 16, 2014
SCCE & Ethics Institute Trust & Verify: Investigation and Forensic Tools September 16, 2014 Martin Wolin Chief Risk & Officer Mercer North & Latin America Boston, MA Alan K. Halfenger Chief Officer Bain
More informationThinking of changing your TMS?
Thinking of changing your TMS? Tips, tricks and some advice ERNST & YOUNG LLP 1 Disclaimer EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global
More informationMaking the SoA an Information Security Governance Tool
Making the SoA an Information Security Governance Tool Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find the article and click
More informationInvitation to Negotiate (ITN) Statewide Travel Management System ITN No D. Questions and Answers ITN Amendments
Invitation to Negotiate (ITN) ADDENDUM NO. 1 Questions and Answers ITN Amendments September 2016 Contained herein are the responses to the questions submitted to the Department of Management Services (Department).
More informationITIL Intermediate Capability Stream:
ITIL Intermediate Capability Stream: OPERATIONAL SUPPORT AND ANALYSIS (OSA) CERTIFICATE Sample Paper 1, version 6.1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style Multiple Choice
More informationDesigning a High-Performing Engagement Culture in a Corporate-wide Function
Designing a High-Performing Engagement Culture in a Corporate-wide Function Organization Design Forum May 10, 2011 Beth Ann Johnson, Corporate Export/Import Shared Services Scott Bartlett, Shipbuilding
More informationTalentGuard Overview. The Predictive People Development Company
TalentGuard Overview The Predictive People Development Company Company Overview TalentGuard Overview The Predictive People Development Company. About Us Provider of Award-Winning Competency- Based Talent
More informationOrganization Conflict of Interest (OCI) Company Process
(ISO 9001:2008) ISO 9001:2008 Organization Conflict of Interest (OCI) Company Process 1.0 Introduction New proposal opportunities will be reviewed against the MCL by the Director of Federal Services as
More informationITSM Process/Change Management
ITSM Process/Change Management Process Documentation Revision Date: December 13, 2017 Version Number: 2.0 Document Ownership Document Owner Maury Collins Revision History ITSM Role, Department Service
More informationCUSTOMER AND SUPPLIER ROLES AND RESPONSIBILITIES FOR 21 CFR 11 COMPLIANCE ASSESSMENT. 21 CFR Part 11 FAQ. (Frequently Asked Questions)
21 CFR Part 11 FAQ (Frequently Asked Questions) Customer and Supplier Roles and Responsibilities for Assessment of METTLER TOLEDO STARe Software Version 16.00, including: - 21 CFR 11 Compliance software
More information!!!! School Security Get its Head in the Clouds. Deploying Modern Video Surveillance in Educational Institutions. Unlocking the Cloud
APPLICATION BRIEF School Security Get its Head in the Clouds Deploying Modern Video Surveillance in Educational Institutions Unlocking the Cloud Unlock the all the potential tools of a modern enterprise
More information