Orange Team E Business Forum. Key Issues – Web Services Seductive and empowering, but how real? Are we in the early ‘hype cycle’ on this? Real opportunity.

Slides:



Advertisements
Similar presentations
PINNACLE CONSULTING & COACHING / TABLE GROUP CONSULTING PARTNERS
Advertisements

Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Chapter 14 Fraud Risk Assessment.
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
What Employers are Looking for in YOU!. Objectives Discuss key skills Employers look for in a successful Intern or New-hire. Discuss key skills Employers.
UWE WLM and WAMS Transferability in Practice?. Key aspects of transferability Capability: ensuring the potential transferability of the model and system.
Business Critical Rules March 2015
Auditing Concepts.
What makes for a successful merger? Peter Scott Peter Scott consulting
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
SEM Planning Model.
Developing Information Security Policy. Why is Developing Good Security Policy Difficult? Effective Security/IA Policy is more than locking doors and.
Security Controls – What Works
SOA Architecture Delivery Process by Dr. Robert Marcus SRI International 1100 Wilson Boulevard Arlington, VA
1 Corporate Capabilities. Adayana was founded in 2001 to improve human capital performance Our clients come to Adayana to help improve their people’s.
IT Governance Navigating for Value Michael Vitale 6 May 2003 CIO Conference Steering the Enterprise Through Stormy Seas Image source: Access2000.
Understanding Boards Building Connections: Community Leadership Program.
Purchasing And Boundary Spanning IDIS 424 Spring 2004
Risk Assessment Frameworks
Digital Campus Initiative Professor Tony Stevenson PVC Planning and Resources 15 February 2012.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
MARKETING STRATEGY O.C. FERRELL • MICHAEL D. HARTLINE
Is volunteering a gender based approach?. Volunteering in Romania Romania has a law for volunteering since April 2001 with the following main provisions.
© 1998 Concept Five Technologies Enterprise Application Integration Capability Maturity Model.
Supplier Selection & Evaluation
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Technology Audit
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
How to Manage the Organizational Change LaMarsh & Associates, Inc.
SEC835 Database and Web application security Information Security Architecture.
Leading Culture Conversations The culture data offers a unique opportunity in organizations to discuss ‘how’ people work (or don’t work) together and identify.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Module 3. Session DCST Clinical governance
Information Systems Security Risk Management. © G. Dhillon All Rights Reserved Alignment Glenmeade Vision To provide a personalized experience to our.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Organization of the Information Systems Function Chapter 14.
Human Resource Management Lecture 27 MGT 350. Last Lecture What is change. why do we require change. You have to be comfortable with the change before.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
Using Business Scenarios for Active Loss Prevention Terry Blevins t
Irene Khan – Secretary General Building effective and responsive INGOs, the strategic role of HR: The IS Job Value Review 8 February 2008.
Module 4: Systems Development Chapter 12: (IS) Project Management.
© 2010 Copyright KrasnePlows Nonprofit Collaborations Social Impact Exchange Conference Thursday, June 17, 2010 New York City.
1 Outsourcing and OffShoring January 2004 Sandy Senti.
DAVID WOLFF, DIRECTOR Healthy Partnerships. Cupp Aims “to become recognised as a leading UK university for the quality and range of its work in economic.
PPTTEST 10/24/ :07 1 IT Ron Williams Business Innovation Through Information Technology IS Organization.
Assessment of Portal Options Presented to: Technology Committee UMS Board of Trustees May 18, 2010.
INTRODUCTION Business enterprises cannot function in isolation Open systems interact with their environment Business enterprises exist in and are surrounded.
Mountains and Plains Child Welfare Implementation Center Maria Scannapieco, Ph.D. Professor & Director Center for Child Welfare UTA SSW National Resource.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
PETER SCOTT CONSULTING Merging Professional Partnerships - the essentials to success Peter Scott Peter Scott Consulting.
Enterprise Cybersecurity Strategy
IEEE IT (Information Technology) Strategy – 2005 Unapproved.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Kathy Corbiere Service Delivery and Performance Commission
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
ARCH-04 Before You Begin Your Transformation Project… Phillip Magnay Architect – Applied Technology.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Interpersonal Skills. 2 Learning Objectives When you have completed this module you will be able to define the key concepts associated with Interpersonal.
GSA IT Strategic Plan 2009 – 2011 August 2007 US General Services Administration 1.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
Creating Positive Culture through Leadership (Recovery Orientation) Jennifer Black.
Auditing Concepts.
Identify the Risk of Not Doing BA
Messaging: A New Approach for Executive Conversations:
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

Orange Team E Business Forum

Key Issues – Web Services Seductive and empowering, but how real? Are we in the early ‘hype cycle’ on this? Real opportunity to integrate and collaborate across diverse platforms It’s about standards, not about infinite choices

Key Issues – Web Services Next step in the evolution of services Portal is about service provision – but you need to integrate static pages too Use portal as the integration platform This gives us the ability of systems that students like to use Think of this as the “next small step” … makes XML useable Creates a new competitive market for components

Key Issues - Web Services Collaboration will be enabled and required The potential for inter-enterprise interactions  Federal and state government  Commercial relations Can we adopt common definitions? Need a Web Services management strategy

Web Services – Barriers Lack of clarity Lack of clarity about concept Lack of clarity about who will develop what What will it cost? How will higher education collaborate to make it happen? Need to have proof of concept, models that work, etc.

Web Services – Barriers Business processes/business rules Need to deal with data definitions Liability issues (who shares liability in this environment?) Risk management Incentives Governance Quality assurance of components

Web Services – Barriers New skill sets and attitudes needed Need new IT skills on campus In higher education, “we just like to do it ourselves” (no trust in others) Won’t this lead us to a renewed period of idiosyncratic applications? Organizational change – how do you imbed this new capability? This will require a lot of change management We don’t really know how to re-use components across enterprises

Web Services – Things to Do Get some learning from companies that are already making use of Web Services (KPMG Consulting) Look at data definitions Conduct tests across institutions (e.g., IU, UCSD)  3 Phases (intra-campus, inter-campus, external agency) We are not coders, we are integrators … an editorial piece in EDUCAUSE Review? Could EDUCAUSE/NACUBO deliver some Web services? Underwriters Lab?

Web Services - Things to Do Make the work public; web services and the relationship with CFOs and CIOs Demonstration pilot with TIAA-CREF Expand web services beyond students; consider alumni and other segments Rebundle the event with WACUBO or rework the details of this conference or define a Web Services meeting Emphasize that this is about money and having more sustainable models not about technology Generate some scenarios to make this more “real” Define some modules and ask vendors to develop

Web Services – Things to Do Piece about the value proposition (from NACUBO) Bring in corporate developers to have joint discussions Continue to involve corporations in proof of concepts and discussions Put web services in the context of a real problem that needs to be solved (similar to mortgage example) KPGM will work with Catholic University on an example

Summary Web services are  Seductive but fuzzy  The next evolutionary step Business processes and business rules will be critical Because of lack of clarity we need to “launch and learn” Web services will require significant change management

Key Issues – Security Identifying the risks Central point of responsibility Reliance on passwords is not scaleable Focus on vulnerabilities How offsite is offsite Securing remote access at the same level as on campus access Our culture carries risks Higher education is the weak link Openness vs. security Risks out there vs. problems from within

Key Issues – Security Need to know the value of what we’re protecting Unaware of the value of our assets … therefore hard to assess the risks Development of risk assessment framework “Acceptable” levels of risk in a zero sum game – is there a threshold? Incorporation of IT risk into overall campus risk framework Policies Explicit permissions or explicit prohibitions? What is the inherent transitive trust model

Security – Our Strengths Cultural strengths Inherently honest cultures Tradition (FERPA, etc) of protecting privacy and confidentiality Open disclosure of security breaches Able to deal with heterogeneity Resistant to fads Security by obscurity

Security – Our Strengths Institutional capabilities Very good staff Strong detection and response capabilities Technical diversity Suggestion Renewal of vows – UCSD security education strategy

Security – Our Weaknesses Awareness Students have not been educated about the problem Faculty Clear rules and repercussions Policy enforcement is difficult No public executions We make things too complicated Reactive not proactive Need for consensus IT becoming unclear about how to protect the institution’s systems and information assets Security is not a part of new systems evaluation process

Security – Our Weaknesses Decentralization Organizational decentralization is critical, but makes security difficult No central control of servers Value of what we are protecting Audit/adverse events define the policy environment (unfunded mandates!) Resources Resources – there are more of them

Security – Possible Solutions Reveal the value Asset management As our services and information become portalized … their economic value can be revealed Update and review policies Bring people together – clarify how to manage systems Need for policies for maintenance of data Reconsider the risks of decentralization What should be centralized, what not? Do we need 500 servers on campus?

Security – Corporate Observations This was a ’10 year ago’ discussion Need to look at the cost of doing nothing HE does not always have the skill sets Huge risk: Cannot put a price put on credibility

Summary Insufficient awareness and communication Value of what is being protected needs to be made explicit (e.g., asset management strategy) Enterprise-wide strategy is appropriate