The Path to Creating and Sustaining Value. The Scorecard. for Selecting, Managing & Leveraging your Services Team:

Similar documents
The New Enterprise Security Risk Manager

4/26. Analytics Strategy

IT SERVICE MANAGEMENT (ITSM)

How do banks deliver a superior omni-channel experience and cut costs?

SAP NetWeaver Service Select for Master Data Management. Tuesday October 26 th 2004

Commissioning An Essential Part of a Comprehensive Energy Strategy

A Strategic Guide to Visibility & Cost Reduction

The Economics of Sales/Marketing/Product Alignment. Jesse Mendelson Service Director SiriusDecisions

Strategy Analysis. Chapter Study Group Learning Materials

The Robots Are Rising

2018 CUNA Excellence in Technology Award Alliant Credit Union: Consumer Loan Origination System (CLOS)

Securing the Future with Physical Identity and Access Management

Efficiency First Program

Defining Value in the Agency-Client Relationship

Streamline your business processes for far-reaching results. EY s Business Process Management Services practice

Velocity. Accelerating Analytic Innovation Teradata 2018 Teradata

Streamline Physical Identity and Access Management

SAP BI Analytics Roadmap. Tony Alvarez Platform and Analytics

TECHNOLOGY CONTRACTING:

MOVE YOUR DIGITAL EXPERIENCE FORWARD

Job Family Matrix. Core Duties Core Duties Core Duties

Five Guiding Principles of a Successful Center of Excellence

Catalyst 2018 Digital Organization & Culture Transformation TM Forum, Detecon International GmbH, Concentra Consulting Limited, The GC Index 1

CPO RISING 2018: THE AGE OF INTELLIGENCE. Andrew Bartolini, Founder & Chief Research Officer Ardent Partners April 26, 2018

Balanced Perspective. Managing software development from a business and technical point of view. IBM Software Group

Service management solutions White paper. Integrate systems management and predictive intelligence with IBM Service Management solutions.

CORE APPLICATIONS ANALYSIS OF BUSINESS-CRITICAL ADABAS & NATURAL

Analytics: The Widening Divide

Enterprise Performance Management Bridging the Gap from Strategy to Operations

How Opaa! Food Management is retaining customers, improving childhood nutrition and empowering teamwork with Microsoft 365.

Risk Assessment as a Foundation for Disaster Preparedness

Helping New Zealanders get ahead by making banking really easy. Every time. Everywhere.

PORTFOLIO MANAGEMENT Thomas Zimmermann, Solutions Director, Software AG, May 03, 2017

Customer Success Services. Services you need for successful digital transformation

Accelerate Digital Transformation by Connecting Your Manufacturing and Supply Chain Data

INFORMATION SERVICES FY 2018 FY 2020

Enabling Procurement Transformation and Maximizing Business Results through a Global Technology Platform

Data Sheet. VIAVI Observer Apex. Centralized performance monitoring and troubleshooting

Architecting an On Demand Enterprise with the Federal Enterprise Architecture (FEA) Andras R. Szakal Chief Architect, IBM Federal Software, S&D

ecap Health Check Evaluation

2017 North American Physical Security Intelligence Solutions Company of the Year Award

IT Executive Programs

ADM The Architecture Development Method

Business Intelligence and Business Connectivity Services in SharePoint 2010 March 26, 2010

ServiceNow Knowledge 2016

Managed Testing Services

Build a Future-Ready Enterprise With NTT DATA Modernization Services

HR Benchmarks for Modern Times

Accenture Architecture Services. DevOps: Delivering at the speed of today s business

Cloud Skills and Organizational Influence: How Cloud Skills Are Accelerating the Careers of IT Professionals

Fay Sharpe. Managing Director of Zibrant. Founder, Shareholder. o Number one in C&IT Power 50. Women's Advocate. Charity Champion.

ENTERO MOSAIC SPEE SOFTWARE SYMPOSIUM Todd Kuipers, Product Director, Entero MOSAIC

Total. Innovation Networking Professional Development

IDC FutureScape: Worldwide Manufacturing 2018 Predictions

Global Delivery Model

CENTRAL PROCESS REPOSITORY

Firm Profile TURNING RISKS INTO OPPORTUNITIES

AVEPOINT CLIENT SERVICES

Business Architecture Value Proposition: BIZBOK Guide and TOGAF Standard

MindCraft Insurance Portfolio 2016 v.7

CORROSION MANAGEMENT MATURITY MODEL

An integrated model approach to improve the management of marketed products

CIP 2017 Project Outline

Oilpocalypse Now: Weathering the Storm with Integrated Project Management Samarth Jain Andrew Lavinsky

BREAKING THROUGH THE DIGITAL DEADLOCK

IngramMicroAdvancedSolutions

Title: HP OpenView Active CMDB Strategy Session #: 594 Speaker: Michael Pott Company: Hewlett Packard

Enterprise Portal Modeling Methodologies and Processes

Planning the Work How to Create a Manageable Enterprise GIS Project Plan

Leadership in Transforming Organizational Competitiveness Transformational IT

Five Key Themes from the Pulse 2017 Conference

DATASHEET. Tarams Business Intelligence. Services Data sheet

IBM Business Consulting Services. IBM Business Intelligence Services: enabling information on demand.

SOLUTION BRIEF RSA ARCHER PUBLIC SECTOR SOLUTIONS

Genpact platform solutions enable business transformation, faster cycle time, and lower costs

Real Estate Lifecycle

RSA Identity Management & Governance

USAA's Supplier Governance Transformation that Optimizes Value and Addresses Risk

Pega Upstream Oil & Gas Capabilities Overview

DevOps. Bringing agility all the way up to Production

Tieto Digitalization Journey. Your journey into the heart of digital

Driving Cost Out of the Learning Organization:

Implementing and Executing Data Governance & Quality Strategy at Northern Trust

2015 Gainsight. All Rights Reserved. The IoT Future: How Customer Success Drives Change at Infrastructure Companies

FUELING FINANCE S NEEDS FOR INSIGHTS WITH SAP S/4HANA

What is a process? So a good process must:

ForeScout Professional Services Overview OUR TEAM OF EXPERT CONSULTANTS WILL HELP YOU ACHIEVE FULL VALUE FROM YOUR FORESCOUT IMPLEMENTATION

API 360: The Complete API Strategy Model for the Enterprise

Supply Management Three-Year Strategic Plan

Operational Excellence in Healthcare. Creating a Culture of High Reliability: Driving Culture Change

ENABLE DIGITAL - % COMPLETE ENGAGED WORKFORCE - % COMPLETE

Mindtree ATLAS - Application Managed Services Overview

Trusted by more than 150 CSPs worldwide.

ACCELERATE TO THE NEW ACCELERATING BIG DATA ADOPTION

Claims Leakage Studies. Does your organization need to complete a Claims Leakage Study?

Consumerizing Service Delivery: Breaking Down Organizational Silos to Deliver Services to a Global, Mobile Workforce

Program Management Effectiveness

The 11 Core Functionalities of a Successful Data Strategy

The four steps to Service Management Exellence. White Paper.

Transcription:

The Path to Creating and Sustaining Value The Scorecard for Selecting, Managing & Leveraging your Services Team: This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Learnings Identify the key characteristics for choosing a: Risk Consultant Security Process Optimization Consultant Security Information Architect Security Integrator vs. a Security Installation Company Performance Management Services Vendor This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Learnings Understand the following principles and how they impact security program costs, value and continuous quality improvement: Methodology and Metrics Professional Disciplines: Performing roles within a methodology Program Management vs. Project Management Performance Management: Managing the lifecycle costs and the ilities Managing a Global Security Network: Identifying and Managing the Extended Team This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Moderated Discussion Followed by Q&A Session Format This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Introductions William Plante, Director of Professional Services, ASG Benjamin Butchko, President of Butchko Inc. Jeffrey Slotnick: ASIS Regional Vice President and Founder of OR 3 M and Setracon. Ron Worman: Founder and Managing Director, The Sage Group This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

The Voice of the Customer

The Mind of the CSO/CIO Budget Optimization From tools to integrated information management Managed Services: to leverage expertise in key areas of growth To streamline operations *IDG Survey

The Value Stream of Security This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Our World As-Is Description 1. All Hazards Risk and Situational Awareness 2. Manual Business Process and Information Workflows 3. RFP to Installer 4. Break Fix Performance Management As-Is Deliverable 1. Paper-based, under-leveraged, periodic 2. No info model, no testing, no metrics 3. Silos of human and digital data 4. Metrics illdefined; value unexpressed This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Lost Value Leverage No Collective Knowledge No Leverage for: Process Improvement Efforts Continuous Compliance Efforts (Realtime) Proactive and Predictive Response to Risks Duplicative Infrastructure and Costs *Estimate: 10-20% of the Security Budget Spend is based on inefficiencies in people, process and/or tools This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Future Proof Point As-Is 1. Risk & Business Assessment 2. Information Workflows Modelled 3. Measures Documented 4. Programs, Assets &Contractors under Management: Metrics that Matter To Be 1. Digitally collected, communicated & leveraged 2. Modeled, Tested, Implemented & Measured 3. Live Data Streams correlated against assets 4. Continuous Compliance, CQI for program & contractors This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

The New Scorecard for the Risk Consultant Organizational Resilience Management and the Platform This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Information Management /Business Intersections Risks Threats Vulnerabilities Assess Analyze Measure Rank Benchmark Respond Contain Remediate Implement Mitigate Manage Measure Correlate Prevent Integrate

The Scorecard Organizational Resilience Management (ORM) training Risk Assessment Information Management Platform To digitally capture and communicate information To maintain and sustain captured intelligence Knowledge of the Value Stream to optimize the risk mitigation strategy This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

The New Scorecard for the Security Business Process Consultant People, Process and the Use Patterns of Technology This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Business Process Assessment: The Key Step Before Technology Selection People Roles with KPIs Process With KPIs Tools Use Patterns Are they capturing and Optimizing People and Process or causing constraints? Reports Critical to CQI and Value

The Scorecard Business Process Methodology Experience performing Business Process Assessments Bridge to Information Management Architecture and Technology Deployment Support Value Stream Communication This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

The New Scorecard for the Security Information Architect Provisioning the Common Operating Picture Designing the Platform before Choosing the Tools This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Information Model: The Key Step After the Business Model How information is consumed and leveraged Baseline Metrics How information should flow given the business optimization assessment and the measures Architecture dictates roadmap for funding and implementation This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Information on Tap To bring organized structure and design to security information sources to facilitate effective communications across systems and users.

The Common Operating Picture Create command and decision-making capabilities for the Client across all logical layers. This would include data sources, applications, communications channels. It would be intuitively visual to the end-users platforms (mobile, clients, display walls).

The Great Consultation The Consulting Process Iterate on the client s functional and technical requirements though a variety of modes to develop the Information Architecture Model and help engineer the design to deliver the capabilities.

Security Information Architect Score Card Possess the full set of education, skills and experiences needed to design, develop and execute a security information architecture. Can develop information concepts / models based on Client Use Cases and identify a strategy to implement aligned to the Client s environment. Has deep understanding of manufacturer s product strategies and roadmaps to ensure their recommendations for an information architecture are aligned to the Clients requirements. Can lead security integration teams to deliver the Architecture within the client s environment and ensure it s current and future usefulness. The Information Architect Question Is the Information Architect capableof identifying the Client Experience Needs across the entire spectrum and effectively design to it?

The New Scorecard for the Security Integrator Integration is the Provisioning and Execution of a Well Designed Program This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Value Orientation WHAT IS THE ROLE OF THE INTEGRATOR?

Trust as a Foundation Trust Agent (ideally an advisor) to Clients on a broad range of technical, operational and risk related issues regarding security systems design and implementation. You must hire and retain the SME needed to earn the trust

Information Integration Optimize the end-toend integration of security systems into the client s domain (The Business, IT, operations and others) from initial concept and strategy to post installation system performance management. Technology Physical Culture Network Application

Be the Info Hub of the Security Value Stream Domain expert within the security industry Manufacturers product strategy/plans and offerings, Consulting vendors, Logistics and Distribution channels, Information Technology Network Architecture and applications Compliance as a Service Business Process Optimization

Integrator Score Card Full complement of disciplines, processes and tools that support delivering all elements of the Integrator s role. Broad ecosystem of vetted strategic partners and a mechanism to maintain the integrity of the ecosystem and the value stream. Investment in training, operational process excellence, learning and management systems, that ensures consistent results and driving innovation. Demonstrate alignment with Client business, security and IT goals, strategies, and performance expectations. Does the Integrator advance the value of the Industry and their clients?

The New Scorecard for the Performance Management Vendor High Availability, Maintainability, Sustainability, Reliability This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Performance Management Architecture Continuous Quality Improvement (CQI) External Input Performance Plan Performance Managed Goals Plans Operate Monitor Analyze Action Expectations Support Data Change Performance Execution

Elements of Measurement Performance Management Platform to measure: People: measured by their defined roles with key performance measures Process: measured by time to value and the reduction of non-value touch points Tools (Technology) measured by the ilities : Availability (Up Time), Reliability, Sustainability, Maintainability, Usability (See People KPIs) Organization Goals mapped to Security Business Processes and Information Model

Summary This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage

The Keys The Value Stream provides a model that helps optimize how you assess, manage and measure your vendor interactions The scorecard depends on measuring vendors against their capabilities and experience in each domain as well as their knowledge of the value stream This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage Group. Copyright 2014 - The Sage Group

Questions? Email Contact: ron@the-sage-group.com This presentation is only for the private consumption of ISC Session attendees. Any other use must be approved by The Sage