Crisis Leadership Business Continuity Technology & Operations Critical Incident Cyber Information Security KeyBank Presents Critical Incident at itSMF.

Slides:



Advertisements
Similar presentations
Securing Engagement in Risk Management Mark Scrivener Corporate Risk Manager 16 th October 2013.
Advertisements

Determining CLIMASP Competencies Jerash University Development of Interdisciplinary Program on Climate Change and Sustainability Policy- CLIMASP Development.
Project Cyber Security Order 706 January 10, 2012 Most of the material presented has been compiled from NERC webinars and drafting team meetings.
Chapter 14 Contemporary cost management. Cost management §Improvement of an organisation’s cost effectiveness through understanding and managing the real.
Clarity on the performance of IT Metricus at a Glance Metricus Metricus has been acknowledged for breaking new ground on IT performance management and.
© Richard Mironov, All rights reserved. Tel: Service Metrics Measure, improve, measure, improve…
Enterprise NASA Will Peters August, 2010.
Clarity on the performance of IT Metricus at a Glance Metricus Metricus has been acknowledged for breaking new ground on IT performance management and.
Maximizing Business Value Through Projects: Doing less and achieving more! Thomas G. Lechler Stevens Institute of Technology Hoboken NJ.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
University of Nevada, Reno Data-Driven Organization Governance 1 Governing a data-driven organization (4/24/2014)  Define governance within organizations.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Adaptive Metrics Develop metrics that determine how well we are adapting.
Managing Risk for Opportunity. In the absence of certainty, the only way to maintain potentiality is to focus on excellent execution and demonstrable.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
1-1 McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved C H A P T E R SIX Targeting Attractive Market Segments 6.
the core of Enterprise Agile Mathew Aniyan Program Manager, Microsoft.
Preparing a business plan Workshop APL Leading a business Drives and values Context Actions Leadership styles.
Creating Entrepreneurial Communities: The ideal conditions to unleash the potential of next generation leaders Christopher Gergen.
Introduction to the Continual Service Improvement Toolkit Welcome.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Larry Clinton Operations Officer Internet Security Alliance
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Problem Management.
Introducing Project Management Update December 2011.
“Achieving world class returns by managing the supply of forest and wood products to preferred global customers” Health and Safety Expo 2015 Leading Health.
SAFE KNOWLEDGEwww.zondex.com SAFE KNOWLEDGE GEOFF ROBERTS Implementation Partner AUSTRALIAN PROJECTS PTY LIMITED IT Security and Data Protection.
Enable self-service – users make requests on demand Standardize and deliver Templates, workflows, processes and a common CDMB enable automation The Service.
We provide web based benchmarking, process diagnostics and operational performance measurement solutions to help public and private sector organisations.
We provide web based benchmarking, process diagnostics and operational performance measurement solutions to help public and private sector organisations.
Hitting the Leadership Target Through Leadership and Accountability.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
CSI—The Lifecycle Stage
Enterprise Risk Management Dr. Doug Webster, CGFM, PMP Financial Management in Challenging Times May 13, 2009.
Kathy Corbiere Service Delivery and Performance Commission
2012 DHS/ACT-IAC Cybersecurity Awards The “Fed Cyber Cup” Concept Overview Cheryl Soderstrom, Programs Chair, Cybersecurity SIG.
Value-Based Health Translating Health Into Performance Sean Sullivan, JD President & CEO Healthy Worksite Initiative Outcomes Congress Washington Wellness.
CSI - Introduction ITIL v3.
What to Do When Models Don't Work Moderator: Dave Ingram, EVP, WillisRe Panelists:Neil Cantle, Principal and Consulting Actuary, Milliman, Inc. Dave Ingram,
GRC: Aligning Policy, Risk and Compliance
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
SaaS or a Customized Solution: Which is right for your recognition program?
Enterprise Architecture Sunil V. Rajan 20 th November 2008.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
From Technology to Intelligence from. The Current Cyber Discussion Business leaders are more aware of Cyber Risk but ….. ‒ struggle to connect Cyber issues.
MODULE 18 – PERFORMANCE MANAGEMENT
Customer Experience: Create a digitally led customer experience
“ ” HYPERION APPLICATION OPERATION SUPPORT AOS SERVICE STREAMS
Ken Shoquist VP, CIO Information Technology Board Meeting October 2003
USA Final Project Report
HPI Leadership and Challenges
STAR Element Current State Future State Gap
Anatomy of Learning.
Boeing Business Continuity
VeNí Service-focused Approach
ITF ‘Security Matters’ Forum Are we missing a trick in managing our risks? People, behaviours and the boardroom Nick Wilding, General Manager, Cyber.
SUCCESSION PLANNING Anita Orozco, PhD.
2018/19 Q1 results and Key forecast themes
Proposal to Chicago Community Trust
Goldratt Research Labs
CRISIS EVENT Risk Assessment Crisis Management and Business Continuity
Cybersecurity EXERCISE (CE) ATD Scenario questions
TECHNOLOGY EXPLOSION TECHNOLOGY EXPLOSION. TECHNOLOGY EXPLOSION TECHNOLOGY EXPLOSION.
KEY INITIATIVE Shared Services Function Management
KEY INITIATIVE Finance Function Management
Workforce Planning Project support overview Presenter's Name
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Finance Function Management
Management reporting Project support overview.
Business Case Template
2019 Scorecard September 2019.
50% Introducing the Cybersecurity Assessment
Presentation transcript:

Crisis Leadership Business Continuity Technology & Operations Critical Incident Cyber Information Security KeyBank Presents Critical Incident at itSMF

2 Engage Business Continuity & Cyber Security as needed

3 KeyBank Presents Critical Incident at itSMF

4 Metrics: Add (not reduce) Value Some measures can drive undesirable results through behavior SLA in Incident Response can introduce risk Focus on missing a targeted restoration instead of the restoration itself Reduction of Risk assessment to hurry if approaching a deadline Wait if assumption is an easy fix Ownership is blame over opportunity & knowledge Risk of unidentified trends when looking at Enterprise metrics cut into parts of the whole The Right Metrics & Goals Enterprise Level Measures for Process Maturity & Improvement Critical Incident Response is an ASAP while managing risk model through removal of the term “SLA” Focus on restoration Risk is weighed against potential restoration efforts Decisions for business not numbers Ownership is opportunity to better support a line of business Trend Analysis remains to identify trouble areas Reporting & Analysis is moving to impact over cause to improve reliability of platforms as a whole KeyBank Presents Critical Incident at itSMF