IT POLICY SYSTEM DEVELOPMENT AND DEPLOYMENT Case Study: Kaon Security Ltd and Nillumbik Shire Council.

Slides:



Advertisements
Similar presentations
1 Managing Authority Conducting a self assessment 10 June 2008 A. Badrichani – DG Regional Policy – Audit Unit J3.
Advertisements

Strategic Workforce Planning
T HE V ALUE OF E NTERPRISE S EARCH Robert Gill & Pieter-Jan De Boeck.
Welcome In this presentation, well: Introduce SchoolDocs Ltd Describe the SchoolDocs service Show why its great for your school Explain features of the.
Innovation or Necessity? ISM 158 By: Sepehr Saeb.
NAMS 2010 International Advanced Asset Management Forum Achieving Community Outcomes from Assets and Services Service Level Management.
SP Business Suite Deployment Kick-off
Organizing Shared Drive
2006 QL- LAW 9000 SURVEY REPORT. LAW 9000 Background SAI Global Statistics.
The Practice Standards for the Implementation of Care Planning in Victoria. Presented by: Kate Boucher, Integrated Chronic Disease Management Team &
Process and Procedure Documentation. Agenda Why document processes and procedures? What is process and procedure documentation? Who creates and uses this.
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
University of York Planning for Process Review. Using our Vision, Strategy and Medium Term Planning to inform our business and process change agenda..
Vega/LGC survey Data security in local government April 2010.
PayAdvantageHR Imagine an integrated HRIS – Payroll – Enrollment platform with one login at your fingertips Presents.
© Mailbarrow Spreadsheet Professional Getting Your Spreadsheet Numbers Under Control A 5 minute presentation by Mailbarrow
Presentation Brought to you by: New Thinking. Are your Managers at Risk ? Are Fleet costs to high ?
RMS – a collaborative approach Presentation Lyn Dare & Stephen Larmour Authorisation & Audit Comcare.
Demonstration Slides And Screen Shots for A Complete Guide to ISO 9001: 2008 Click this button below to view full screen 
Project Management Process. Project Complexity means that: a team of people are needed to supply expertise the work needs to be broken into manageable.
HAVING TROUBLE UNDERSTANDING NZS ? 2001–2008 The four previous standards were reviewed with the aim of: Reducing duplication between standards.
AFISS Prospectus of Services AFISS offers HACCP food safety and food quality systems development and management services including preparation for regulatory.
How many more systems? Jane Lovell TQA Australia.
Insight Consulting Siemens Identity Management Survey Conducted April – June 2007 Info
Viewpoint Consulting – Committed to your success.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Internal Auditing ISO22000: Before we start I would like you to spend a few minutes discussing the purpose of Internal Audits with.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
Shaping change through collaboration The value of authoritative data.
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
1 Guidelines for a Palliative Approach in Residential Aged Care AcLan August 2005.
MethodGXP The Solution for the Confusion.
Policy and Procedure Inspector Christian Ellis. Policy Statement About Policy It is best practice to have up to date, clear and standardised policies.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Implementation of the Essential Standards The Australian Quality Framework (AQTF) is the national set of standards which assures nationally consistent,
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Australian Anti-dumping Practice and Potential Changes.
Module 2: Creating a Plan for Network Security. Overview Introduction to Security Policies Designing Security by Using a Framework Creating a Security.
Rising Above the Mark William Penn AIIM Meeting December 5, 2001.
ESIS Schools Version Essential Safety & OHS Compliance Software confirmsystems.com.au ESIS Schools version is a quality reporting & record keeping system,
European Commission IDEAS - New Delhi 14 April 2005 European Commission DG Budget – Evaluation Unit.
Implementing an Effective Global Anti-Bribery Program Implementing an Effective Global Anti-Bribery Program Elaine Murphy, MBA Director Health Care Compliance.
Implementation & Maintenance of a LM Control Program.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
supported by the Local Government Association a local government initiative sharing nationally to improve services locally Information.
BRC Packaging ISSUE 5 Global Standard for Packaging and Packaging Materials.
ISO :2015 Documentation kit for Accreditation of Certifying Body - by Global Manager Group
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
F8: Audit and Assurance. 2 Audit and Assurance Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B:
Introduction to SPA Trade Services PDA Work Flow Management Systems The Era of Change.
CMMI Certification - By Global Certification Consultancy.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
MODULE 6: PLANNING FOR GOVERNANCE AUDIT GOVERNANCE AUDITOR ACCREDITATION COURSE.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Healthy Lives, Healthy People A consultation towards developing the East Sussex Health and Wellbeing Strategy
Transport Self-help Kit: Providing transport services to your community
Internal Audit & Accounting Systems Review
Learn Your Information Security Management System
Relate to Clients on a business level
Rules within an Enterprise
UNLV Data Governance Executive Sponsors Meeting
Lockheed Martin Canada’s SMB Mentoring Program
The Abyde software solution provides a simple path to HIPAA compliance for all sizes of healthcare practices. Abyde solves the problem of trying to attain.
A Complete Guide to ISO 9001: 2008
A Complete Guide to ISO 9001: 2008
Protect data in core business applications
Process and Procedure Documentation
Presentation transcript:

IT POLICY SYSTEM DEVELOPMENT AND DEPLOYMENT Case Study: Kaon Security Ltd and Nillumbik Shire Council

WHO ARE WE? KAON SECURITY LTD  Formed in 2004  Specialise in IT Policy Development, IT Auditing and Consulting  Over 50 IT Policy Customers in both NZ and Australia  Better known for our role in helping Ballarat City Council and Golden Plains Shire Council manage the 2010 security breach

POLICY  Needs to be accessible to all  Appropriate to the organisation  Reviewed regularly  Meet organisational regulatory compliance and legislative requirements  Policy defines the “What” and “Who”  Procedure defines the “How”  Critical to managing your IT environment

INFORMATION SYSTEMS SECURITY CYCLE

WHY OUTSOURCE?  Policy development is time consuming  Low on the priority “to do” list  Hard to get started with a blank canvas  Writing Policy is not exciting, its not cool and its not going to make you popular with the user community  IT doesn’t want to appear as the “IT Police”  The IT - HR disconnect  Regulatory compliance adds complexity  Auditors and Risk Managers requirements

POLICY An example of good policy documentation Nillumbik Shire Council Information and Technology Policy System (Note: These slides are a partial extract from the system)

NILLUMBIK SHIRE COUNCIL How We Got There Trish Spiteri

NILLUMBIK SHIRE COUNCIL The Process with Kaon Security  Questionnaire completed  First draft prepared  Onsite review conducted over 2 days  Final version received  Maintenance to allow further changes anytime  Implementation guidelines provided

NILLUMBIK SHIRE COUNCIL Benefits  Cost effective and saves time  Simple process that delivers an end result  Review process identifies gaps between policy and practice  Links policy, procedure and other documents  Easy to deploy  No training required for users  IT Policies accessible to all  Consistent rules and guidelines across Council  Maintenance options to keep up to date  Big tick from Auditors

THE END Contacts Kaon Security Ltd – Jackie Krzyzewski - Nillumbik Shire Council Trish Spiteri –