Change Management Minimizing Some Of The Greatest Operational Risks and Threats In a Communications Center.

Slides:



Advertisements
Similar presentations
Project Management For the last day and a half we’ve talked about the APD process – how to get the funding and approval for your project. There is one.
Advertisements

Welcome to Cloud-hosted church management system - Version 2011 (Click the Next Slide icon, Previous Slide icon, or Home icon to move from page to page.
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Chapter 7 Schedule Control
Planning for the Future Disaster Recovery Plan / Business Continuity Plan Jim Zukowski, Ed.D. Texas State Board of Dental Examiners 2006 Annual ConferenceAlexandria,
Audit Issues regarding Passwords on Elevated Privilege Accounts Gene Scheckel Global Internal Audit.
ITIL: Service Transition
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Copyright 2004 Turning Point Solutions Establishing Lines Of Communication Before a Crisis.
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Chapter 12 Network Security.
Date: 03/05/2007 Vendor Management and Metrics. 2 A.T. Kearney X/mm.yyyy/00000 AT Kearney’s IT/Telecom Vendor Facts IT/Telecom service, software and equipment.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Protect Your Computer Protect Your Work Computing & Communications.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Remedy, a BMC Software company Change Management Maximize Speed and Minimize Risk in the Change Process.
Maintaining and Updating Windows Server 2008
ITIL: Why Your IT Organization Should Care Service Support
Network security policy: best practices
Information Technology Service Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Release & Deployment ITIL Version 3
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Chapter 8.  Network Management  Organization Management  Risk Assessment & Management  Service Management  Performance Management  Problem Management.
1 Enforcing Compliance: A Patch Management Strategy That Works.
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
Entré NetMonitor Proactive IT monitoring, Management and support Think DIFFERENT about IT.
The Cost of Cheap Understanding Your IT Investment Options.
DAY TO DAY USAGE OF THE NETWORK for academic and administrative support (How we make it work) Presented by: Donnie Mize, Network Manager, FTCC Wanda Jones,
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Implementing an Automated ACCUPLACER Score Upload System for the i3 Platform A Cooperative Effort by Testing Staff, Other Student Services Areas, and IT.
70-411: Administering Windows Server 2012
ITIL and the Help Desk Craig Bennion University of Utah
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
St. Agnes School Technology for Teachers Acceptable Protocol.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
INFORMATION TECHNOLOGY SERVICES University Data Center Project Overview January 11, 2010.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
BNL Tier 1 Service Planning & Monitoring Bruce G. Gibbard GDB 5-6 August 2006.
Small Business Security Keith Slagle April 24, 2007.
THIS PRESENTATION: WINDOWS UPDATES VIA AUTOMATIC DEPLOYMENT RULES BEST PRACTICES SYSTEM CENTER CONFIGURATION MANAGER 2012 R2 Jodie Gaver Jodie Gaver Working.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
State of Georgia Release Management Training
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Computer Security Sample security policy Dr Alexei Vernitski.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Information Security Crisis Management Daryl Goodwin.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Maintaining and Updating Windows Server 2008 Lesson 8.
Managed IT Services JND Consulting Group LLC
Module 2: IT Professionals in an Enterprise. IT Professional Roles IT Management and Processes Professional Development for IT Professionals.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
Enterprise Security Management Franklin Tinsley COSC 481.
ITIL: Service Transition
CompTIA Security+ Study Guide (SY0-401)
MCSA VCE
Information Technology Service Management
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education for Service-- tutorialrank.com
Klopotek is transitioning to a Global Organization
Increase and Improve your PC management with Windows Intune
The Survival Plan.
Presentation transcript:

Change Management Minimizing Some Of The Greatest Operational Risks and Threats In a Communications Center

What are the typical risks and threats to successful daily operations???

Change Change arrives in many forms Some manageable, and some not so immediately manageable

Managing Change

Change Management Change is managed as follows: -Develop an ARCI (also known as RACI) Matrix -Define Roles -Implement Policy -Enforce Policy (with penalties)

Change Management ARCI Matrix Accountable (who is accountable for a change) Responsible (who is assigned to implement it) Consulted (who reviews the change and approves it) Informed (whoever needs to be advised that a change is coming)

Types of Change CAD or GIS System Who is Accountable for the change? Who is Responsible for making the change? Who is Consulted before a change is made? Who is Informed about the change BEFORE it is made?

Systemic Changes Changing a computer system component “Updating Windows” Anti-virus “updates” “Router or Network” changes “No impact is anticipated” Radio or Console System changes, PM, testing Remote or Contractor Access

Changing a Computer System Component “We have a redundant system design” “We have done this many times before and no one has ever noticed” “We will just turn on the back-up system” “If we don’t change it right now the whole system will be down very soon” Everybody with any type of supervisorial responsibility should be INFORMED

Updating Windows Computers are set for “automatic updates” “Microsoft has identified a security threat/risk” Users are prompted to update software (Java/Adobe/iTunes) Test, test, test Consult application vendor for every update before applying

Anti-Virus / Spam / Pop-Up Updates “Behind the scenes” Frequently untested until deployed No ability to back out changes easily Test, test, test

Router or Network Changes Changes are frequently just communicated to peer technical staff, at best Back out plans are CRITICAL!!!!! All users should be informed of the change, when it is scheduled, and who to contact when an impairment is experienced

“No Impact is Expected” ??? Really ??? This is always a “dodge” for bypassing a change management process In other words, “We do not think anyone is smart enough to understand what we are doing” In reality, “We are not really sure what the change is going to do as we are not smart enough to understand it”

Radio or Console System Changes Technical staff disabling system functions, “feeling” that it will not impact normal operations System components/functions found not to be working (users and techs) “Radio service testing, 1…2…3…4….5….6….7…” Talkgroups on console with no known purpose or role definition

Remote or Contractor Access “Ghost in the Machine” “Contractor at the radio site doing some work” Allows changes to be made without knowing the full impact Access should always be approved and monitored A back-out plan should be in place

How To FIX the Problems For each system or application, meet with management, technical staff, and end users to develop ARCI Matrix Develop a change process that identifies the roles (not names) that participate in that process Define roles Assign roles

How to FIX the Problems Establish a Change Management Policy Enforce Policy Begin to apply your agency progressive discipline process when the policy is not followed Build severe penalties into SLA / Contractual agreements when policy is not followed

References ITIL (Information Technology Infrastructure Library) Project Management Institute Vendor Best Practices ARCI or RACI Matrix matrix.html

Questions? Contact: Mark Schroeder, City of Phoenix