Project Management Methodology Procurement management.

Slides:



Advertisements
Similar presentations
Systems Analysis and Design in a Changing World
Advertisements

Chapter 8: Evaluating Alternatives for Requirements, Environment, and Implementation.
Chapter 3 Project Initiation
Network Design and Implementation
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Chapter 9: Moving to Design
8 Systems Analysis and Design in a Changing World, Fifth Edition.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Chapter 3 Project Initiation. The stages of a project  Project concept  Project proposal request  Project proposal  Project green light  Project.
© Copyright High Performance Concepts, Inc. 12 Criteria for Software Vendor Selection July 14, 2014 prepared by: Brian Savoie Vice President HIGH.
Request For Proposal Barbara Antuna Ronald Healy Chad Hodge Andrew James Mel Ocampo.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Documenting Network Design
November 2009 Network Disaster Recovery October 2014.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Building E-Commerce Applications and Infrastructure.
Pre-Project Activities Text Chapters 5 and 6. Pre-Project Activities 1.Contract Review 2.Development Plan 3.Quality Plan.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
BTS730 Communications Management Chapter 10, Information Technology Management, 5ed.
Information Systems Security Computer System Life Cycle Security.
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Understanding Information Systems. Information System (IS) An IS is a combination of people, hardware, software, computer networks, and data that organizations.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
SCSC 311 Information Systems: hardware and software.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Computer Emergency Notification System (CENS)
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
NETE Computer Network Analysis and DesignSlide 1 Documenting Network Design NETE-4635 Computer Network Analysis and Design.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Project Management Methodology Development Stage.
SDLC 1: Systems Planning and Selection Dania Bilal IS 582 Spring 2008.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Chapter 2 Securing Network Server and User Workstations.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Cloud Computing Use Case Draft v2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 12 The Network Development Life Cycle
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Office 365 Performance Management. Meet Paul Andrew Office 365 Technical Product Manager – Office 365 datacenter, networking, identity management.
Illuminating Britelite’s Internal Services for Success Strategy for Process Improvement.
Project Life Presented by Chuck Ray, PMP ITS Project Manager.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Systems Analysis and Design in a Changing World, Fifth Edition
Unit 3 Virtualization.
Chapter 8 Environments, Alternatives, and Decisions.
Systems Analysis – ITEC 3155 Evaluating Alternatives for Requirements, Environment, and Implementation.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
2 Selecting a Healthcare Information System.
An Introduction to Computer Networking
Systems analysis and design, 6th edition Dennis, wixom, and roth
Systems analysis and design, 6th edition Dennis, wixom, and roth
Selecting a Health Care
PLANNING A SECURE BASELINE INSTALLATION
Modern Systems Analysis and Design Third Edition
Presentation transcript:

Project Management Methodology Procurement management

Procurement Management Purchasing Hardware Software Vendor Services Consulting Services Outsourcing development Training Services Maintenance Documents Contract Specification Statement Of Work

Procurement management processes Processes Planning Conducting procurement Administering Closing Procurement can be organized as a sub- project

Procurement management processes Planning Initial market research Decide about what to buy Preliminary cost estimation Make short list of vendors (2 to 5 names)

Procurement management processes Conducting procurement Request For Proposals (RFP) sent out to vendors RFP must reflect critical requirements, both functional and non-functional. It must enable vendor evaluation, otherwise it will be useless Respectively, evaluation criteria must be defined (do not send them to vendors) Collect responses Responses review and evaluation Communicate to vendors Select a vendor

Generic RFP structure RFP set of criteria should reflect: Management approach – 30% Technical approach – 30% Past performance – 20% Price – 20% Weights are assigned in order to facilitate responses evaluation Management approach and past performance groups of criteria most probably exist, when technical approach must be developed for each project specifically

Technical part of RFP The following must be addressed Functional capabilities - Yellow Platform solution - Red Open architecture - Orange Security - Green Performance - Blue Scalability - Purple Usability (ease of use) - Brown T

Technical Part of RFP – Functional capabilities Two-factor authentication Team Yellow Snake

Questions to ask our Vendors What authentication factors/forms does your product support? What directory services does your product integrate with? Where is your product currently deployed? Does your product support federated user authentication? What federated user authentication protocols does your product support?

Functional Capabilities Do you offer 24/7 technical support? What Data and transport encryption protocols does the product support? Comments The questions are good and relevant, except of one re the product deployment. This one is better to locate at the section that requests about the company experience

Team Red Anti-virus RFP Platform solution

Questions Current Solutions for: Linux Server Windows Workstation Licenses Type of licenses Number of computers per license Effectiveness - % of malware protection Maintenance – updates and patches Support Interaction with other software? Comments: First group is fine but Others are not relevant to The topic. Better choice Would be to ask about Plans for the future

THE GREEN TEAM IPS Adam, Liane, Paul, Matt It’s not easy being green Security Questions to the vendor

Questions 1. Does your product allow for remote access/administration? 2. What are your terms when it comes to ownership of data (cloud)? 3. Do third parties conduct security assessments on your products? Questions are good re Security. Not all are Relevant to IPS

Questions Cont’d 4. Does your product store data unencrypted? 5. Do you review security at each phase during the software development cycle? 6. What methodologies do you use for testing your products’ security?

Questions Cont’d 7. Do you delete data once requested by the customer? 8. Do you have a privacy policy, if so, what is it? 9. What are the vendors’ security certifications?

Questions Cont’d 10. What are your disaster recovery plans? 11. What are your risk mitigation strategies? 12. How are the end users alerted to new updates?

Questions Cont’d 13. What kind of authentication controls are built into the product? 14. How is your application team educated in current application security risks? 15. What is your process for notifying customers of security problems and the solutions?

TEAM BLUE: Web Traffic Filtering Project - Performance We would like to know…. 1. What are the performing advantages in this system that we should consider over any other similar system in the market? 2. How quickly this integrated system could run up at the beginning of each working day? 3. How many workstations could this system handle? 4. What is the possible down time in annual bases? 5. How many applications could simultaneously run before any indication of system slow down? Good questions

RFP SIEM Scalability

● SIEM (Security information and event management) ● Logging and event management ● Nodes refers to any software that creates log files that are collected by the SIEM software. Good questions

Scalability ● How many additional network nodes can be added? ● Is there a delay in logging if the number of nodes exceed a certain amount? ● How much additional storage capacity required per node? ● Will adding more nodes cost more money? (license restrictions) ● Is it open source? ● Does the interface support WANs? ● How in-depth can individual logs be accessed? (per computer, per software, ect.)

Firewall project RFP Usability Team Brown Mike Max Kowri Nahin

Questions Does this product require more than average technical knowledge in order to operate? Will there be any bottlenecking involved with the implementation of the 3 firewalls? Will it be easy to control the access permissions and privileges for user data travelling through the firewalls? How much throughput will the product be able to analyze before it starts dropping packets?

More Questions Will there be any connectivity complications involved with the different vendor products and because of the more complex network structure? Are we able to increase the number of SSL/VPN peer connections? Good questions although It is difficult to segregate Usability and performance For this sort of tools

Procurement management processes Administering procurement Define procedures and have them described in the RFP. Vendors must be aware about procedures The description must provide information about: Due date of responses submission Document format Delivery channels Contact information

Procurement management processes Closing procurement Having a vendor selected, focus on her performance Make deeper investigation of technical capabilities. Sometimes people conduct a Proof Of Concept project in order to understand things better Prepare a contract (legal document) Prepare technical specification and/or statement of work (SOW) Technical specification is provided to buy products “off the shelf” SOW is provided to buy services, such as Installation and configuration Training Development

SOW content SOW describes the content, terms, and conditions of the purchased (outsourced) service delivery This is some sort of initial project plan that shows the project milestones, critical human resources, and price