Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012.

Slides:



Advertisements
Similar presentations
Topics Seminars -why Topics for theses, peer supervisor, chairman Thesis Topic Idea - guidelines.
Advertisements

New Supervisor: Skills for Success
ORGANIZATION. 2 Problem scenario  Develop an organizational chart for your laboratory showing lines of authority from the head of the organization to.
Effective Meetings Training for Employees Presenter’s Name 2008.
1 LaCrosse PMI Chapter Meeting A discussion about the Introduction of PM within your business 4/20/2011 Jim Strong Mayo Clinic DLMP PMO Director.
Introducing an environment for change and innovation into your recruitment business.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Truths & Misperceptions about Win Loss Analysis © Primary Intelligence, Inc June 10, 2015.
Taking care of our people Being good neighbours
Relevant Impact Building an Enterprise Security Program Tech Security ConferenceMinneapolis April 10, 2014.
Customer Focus Module Preview
© 2011 Financial Operations Networks LLC AP Policies and Internal Controls for Running a Tight Ship Panel: Susan Tinkler-Muller Mike Iverson Rob Rogers.
WORKSHOPON INNOVATIONS AND OPTIONS IN THE MANAGEMENT OF SMALL AND LARGE TAX ADMINISTRATIONS WITHIN THE CONTEXT OF CARICOM BY SABINA WALCOTT-DENNY COMMISSIONER.
Headlight: Social Networking Steve Holbrook IBM, AC rep 14 May 2012.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
1 Charles Garbowski Senior Director Research March 16, 2007 R E S E A R C H K P M G L L P ACI Second Annual Global Audit Committee Survey.
Course Overview. 1.Identify the types of environments that attract or discourage criminal behavior. 2.Define CPTED and describe its historical development.
Welcome to Junior Achievement! Our mission: to inspire and prepare young people to succeed in a global economy Workforce Readiness | Entrepreneurship |
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Implementing and Auditing Ethics Programs
Set-up ROOM SET-UP Checklist  Push tables to back of the room  Move 10 chairs into a semi-circle facing you as illustrated  Put 3 pieces of tape on.
Challenges in Infosecurity Practices at IT Organizations
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Establishing Effective ERM of IT: Implementation and Operational Issues of the New ‘Risk IT Framework’ Robert.
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
1-1 Road Safety 365: A Safety Workshop for Local Governments Module 1: Course Introduction 1-1.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
3 CX Best Practices to Keep Your Customers Coming Back © Primary Intelligence, Inc
GIOA Conference – March “Facebook Me” TRUST THEN WHY CARE?
It’s Not Just About the Horses: How to Bring Out the Best In the People You Work With John J. Martin Dina Parrello.
FERMA Risk Management Benchmarking Survey SURVEY OBJECTIVES The FERMA Risk Management Benchmarking Survey 2014 is seeking to  Benchmark.
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
Spring SGO Conference. Welcome address…. Agenda Headteacher and young person address Making a difference…..how do you know? School Games café Skill development.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
© 2011 theIDLgroup Welcome Workshop on integrating Social Protection, DRR and CCA UNECA, Addis Ababa 14 th – 17 th March 2011.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Lead Generation 36:12:3 Power Session 10: Lead Conversion.
Networks & Telecom Shared Interest Group ‘Network Services 2020’ Acquisition Excellence Roundtables Facilitators Guide Project Lead – Roxane.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
SOUNDING BOARDS. What are Sounding Boards? Peer Feedback/Learning Model Structured opportunity to work on a focused issue Based on model described in.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
State DOT CIO Round Table Discussion DOUG COUTO FACILITATOR Information Systems and Technology Committee Transportation Research Board January 13, 2014.
Workplace Skills Group
TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013.
Coaching one-to-one with Charan Sarai Practice Management Advisor.
F ORUM Overview. Icebreaker Groundrules Turn your cellphones off or put them on vibrate Everyone’s opinion is to be respected Be on time Attendance and.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
What we will cover Introduction To Social Media Turn your Linkedin Connections into Gold Additional Resources Next Steps.
- Company Confidential - Corporate Overview March 2015.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
BILs Science Meeting April 21, 2016 Student Agency in Science BILs Science Meeting April 21, 2016 Student Agency in Science Office of Curriculum,Instruction,
QAD in the Consumer Products and Food & Beverage Industries Today Stephen Dombroski Senior Manager, Consumer Verticals, QAD.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Office 365 Security Assessment Workshop
Microsoft Dynamics CRM User Group (CRMUG®)
Office 365 Security Assessment Workshop
Wrap Up and Homework Assignment
ISC2 Cleveland Chapter Meeting
Welcome.
Information Security: Risk Management or Business Enablement?
Interactive Session #1: Exploring AFIRM Tools and Resources
Exploring The Power of C!
The EDUCAUSE 2019 Top 10 IT Issues
Exploring The Power of C!
Successfully build your GDPR offer – and how Microsoft can help
The EDUCAUSE 2019 Top 10 IT Issues
Presentation transcript:

Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012

2 Today’s Agenda TimeTopic DescriptionSpeaker(s) 3:00 – 3:05Session IntroductionJim Enstrom Tim Demas 3:05 – 3:50Small Group Break-out Discussions N/A 3:50 – 4:50Facilitated Group DiscussionJim Enstrom Tim Demas Table Leaders/Spokesperson 4:50 – 5:00Session Wrap UpJim Enstrom Tim Demas

3 Today’s Learning Objective Today’s overall learning objective is to gain insights into IT priorities, challenges and opportunities for 2012, for IT and IT compliance/audit professionals.

4 Session Rules of Road Everyone’s participation is valued -- so we encourage you to share information, ask questions, and learn from your peers! CAUTION – This is not a confidential forum, so understand your company’s policies regarding sharing of information Respect everyone’s point of view Don’t monopolize the floor, and be respectful of everyone’s time Turn off cell phones, PDAs etc.

5 Who’s in Our Audience Today?

6 Survey Results – Top IT Priorities for 2012 IT governance related priorities including: –Budget, spending constraints, demonstrating ROI –Effective project management –Compliance management / impact of regulation –Audit remediation –IT risk assessment –Customer service –Metrics and reporting –Linkage to ERM

7 Survey Results – Top IT Priorities for 2012 (cont’d) Cloud and virtualization priorities –Policy development –Security and privacy –Vendor management Information security –Security governance –Mobile security (BYOD) –Advanced Persistent Threats (APTs)

8 Survey Results – Top IT Priorities for 2012 (cont’d) Social media ERP – including compliance and auditing requirements for large-scale implementations Data Loss Prevention (DLP)

9 Top Issues, Challenges & Opportunities Topic #1: Threats to Effective IT Governance Topic #2: IT Regulation – Burden or Opportunity? Topic #3: Cloud, Virtualization, Mobile, Social Media – Common Risk Management Threads Topic #4: IT Security – the Changing Landscape Topic #5: Organizational Change Enablement: Communicating IT Risk Issues with Impact Topic #6: Third Party Vendor Management

10 Small Group Discussions First, assign a group “scribe” to take notes on the flip chart. Discuss the following questions: 1.What are the key issues or challenges associated with your topic? (consider some of the points we just discussed) 2.What are ways that company’s can more effectively deal with these issues or challenges? In other words, what solutions have worked for you? 3.Now, consider the flip side – what are the opportunities associated with this topic? 4.Discuss solutions or ideas you have to exploit these opportunities. 5.Lastly, discuss and consider what this topic means to the IT risk management professional – IT compliance and IT audit professionals. After you have completed discussing these topics, let one of the facilitators know. You should assign a spokesperson for your group.

11 Facilitated Session We will spend approx 10 minutes on each topic. Please be mindful of this time requirement. –Topic #1: Threats to Effective IT Governance –Topic #2: IT Regulation – Burden or Opportunity? –Topic #3: Cloud, Virtualization, Mobile, Social Media – Common Risk Management Threads –Topic #4: IT Security – the Changing Landscape –Topic #5: Organizational Change Enablement: Communicating IT Risk Issues with Impact –Topic #6: Third Party Vendor Management

12 Session Wrap-up Feedback on the session Thank you: Jim Enstrom Vice President, ISACA Chicago Chapter Tim Demas Program Director, ISACA Chicago Chapter