Welcome to the Agency IT Planning Training Session.

Slides:



Advertisements
Similar presentations
How to commence the IT Modernization Process?
Advertisements

Campus Wide Microsoft Agreement for Desktop Suite Education Enrolment Solutions (EES agreement)
Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Panel 5: The Latest in OA Innovation and C4ISR 4 November, 2014 Mike Rice President / Senior Systems Engineer R2E Inc.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Governor’s vision for Arkansas When people look to Arkansas, they should see a leader in the nation – in the world – and say ‘We want to do what they did.
Wisconsin Digital Government Summit Chris Neff – Vice President of Marketing December 2, 2008 Balancing Innovation and Risk Calculated & Careful Risk-Taking.
ARKANSAS ENTERPRISE ARCHITECTURE TEAM MEETING March 24, 2010 Agenda 9:00 – 9:30Welcome 9:30 – 10:00Introductions and Kickoff Claire Bailey, State CTO 10:00.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Arkansas Digital Government Initiatives Claire Bailey Director, Department of Information Systems Arkansas Chief Technology Officer.
Enterprise Architecture The Arkansas Approach. Key Areas What is enterprise architecture? Why is it important? How you can participate Current status.
Advisor: Jim French, Dept of Ecology Team Members: Scott Andersen, WSDOT Gary Duffield, DIS Doug Selix, OFM Thelma Smith, WSDOT Brian Sylvester, DOP.
1 expect the best Commonwealth IT Investment Portfolio Tool ProSight Overview.
Government of Canada Enterprise Licensing Agreement Framework Public Sector Chief Information Officer Council September 18, 2014 Benoît Long Senior Assistant.
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
0 United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Enterprise Architecture Working Group.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
The Importance of the Qualifications Based Selection (QBS) Process
Shared Services Workshop Break-out Session Summaries July 7, 2015.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
DAS: State Controller's Division1January 2010 Department of Administrative Services State Controller’s Division Updated January, 2010.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
Unscrambling the Department of Homeland Security Presented to: Alliance South Arthur L. Brown
By: Jeff Siglin BADM 559 Professor Michael Shaw. SaaS Introduction  What is it?  Technically Speaking: It’s software that’s developed and hosted by.
1102 Contract Specialist as a Business Manager Debbie Bartlett Defense Acquisition University.
SERVICES ACQUISITION REFORM ACT OF 2003 A STATUS REPORT Alan Chvotkin Senior Vice President and Counsel Professional Services Council DEFENSE ACQUISITION.
Engineering Management From The Top Power Behind the Storage.
Procurement Strategies Management Buying Smarter: Strategies to Raise the State Buying Power Normand Masse Director General Services and Technology Acquisition.
CIO Summit 2012 The Influence of IT Changes on Business Jacky Wright, Vice President IT Strategic Services, Microsoft IT.
GOC Technical Architecture GoC Position on Open Source Presentation to eGovOS Open Source in Government Series March 15, 2004.
CSI-09 COMMUNICATION TECHNOLOGY INTRANET AUTHOR - V. V. SUBRAHMANYAM.
New York State’s Annual Technology Planning Process GTC East September 2005.
Organization, Roles and Responsibilities of the National CIO Office Karen S. Evans Administrator, Office of E-Government and Information Technology United.
Presented by Peter Lobin, President, Solid Waste Solutions Corp. LUNCH AND LEARN - WEDNESDAY, JUNE 24, 2009 Department of the Interior 1849 C St, NW Washington,
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Using OMB Section 508 reporting in addressing your agency's program maturity. How to Measure Your Agency's 508 Program.
Websense SLP (Software Licensing Program) Sherri Conover Websense Business Unit Manager March 17, 2010.
RECOMMENDATIONS OF THE GOVERNOR ’ S TASK FORCE ON CONTRACTING AND PROCUREMENT REVIEW Report Overview PD Customer Forum September 2002.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
OGS Procurement Services Group 2007 State Purchasing Forum IT Procurement.
Security and Protection Category Management Overview
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Line of Sight Using ComponentX. FEA (from reference)
Heading Subheading Technology Circles of Excellence Delivering better outcomes.
Agency Briefing - Overview
Enterprise Solution Services Assessing the IT environment Oversaw 2014 Texas Legacy System Study report (HB 2738, 83R) Identified 4,130 business applications.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Procurement Development Programs
The time to address enterprise mobility is now
SERVICES ACQUISITION REFORM ACT OF 2003 A STATUS REPORT
XSEDE Value Added and Financial Economies
Coordinated Workstation Purchasing
Federal Outlook for Security Products and Services
Corporate Overview.
(1888 PressRelease) Noosh names Scott Wooley Chief Revenue Officer
Next Steps to Value 11/8/2018.
WIOA: Integration, Alignment, and Local Strategies
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Emergency Preparedness: What to do before disaster strikes
AllClear ID Executive Speakers
Pat Brim Gimmal Public Sector
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Financial Data and Analytics
Next Steps to Value 7/9/2019.
Presentation transcript:

Welcome to the Agency IT Planning Training Session

Purpose and Outcome of Meeting Why Enterprise Architecture Scott Bittler, Gartner Technology Plan Changes Scott Utley, Architect Technology Cost Analysis Ann Purvis, DFA IGS

Act 648 of 2009 DIS is responsible for: Develop technical standards and specifications and provide technical leadership and guidance to support the state's enterprise architecture. Information technology acquisitions meet state needs and are consistent with coordinated efforts to maximize standardization and cost effectiveness

The Arkansas State Technology Council View on IT in Three Years Shared Data Standardized Business Processes Standardized Information Management (from Creation to Destruction) Increased Innovation by Business Units Increased Mobility Where should we be?

The Arkansas State Technology Council View on IT in Three Years Improved Digital Literacy Statewide Access One Call to Get it Fixed Find Information Easily Easy to do Business with Government

Why Enterprise Architecture? Manage and align the organization's business needs with Information Technology (IT) resources. Procurement Opportunities Cost Savings Standardization Governance

Enterprise Architecture at work Issue: ▫Many different End Point Protection/Anti-Virus solutions and versions in place of varying effectiveness and a wide variety of pricing

Enterprise Architecture at work Solution: ▫Reduce the number of End Point Protection solutions in our environment to achieve:  Economies of scale due to high volume purchasing  Easier to manage  More uniform prices  Reduced security risks  Better prepared against threats

EA Endpoint Protection Solutions *Calculations based on Number of systems for State Agencies (35576) **Savings calculated based on the average price from the SHI purchases for AV and EPP software ($8.15) Multiple Heterogeneous SolutionsFewer Solutions Harder to manage due to diversityEasier to manage Wide variety of PricingMore uniform Prices Higher PricesEconomies of Scale due to high volume Higher exposure to vulnerabilitiesReduced security risks Better prepared against attacks

Enterprise Architecture at work Microsoft PricingUnit PriceCostSavings Forefront One Year $ 6.00 $ 213, $ 76, Two Year $ 6.00 $ 213, $ 76, Client Security One Year $ $ 853, $ (563,879.60) Two Year $ $ 853, $ (563,879.60) McAfee Antivirus One Year $ 4.50 $ 160, $ 129, Two Year $ 3.75 $ 133, $ 156, Endpoint Advanced One Year $ 6.00 $ 213, $ 76, Two Year $ 5.00 $ 177, $ 112, Symantec Endpoint One Year $ 5.70 $ 202, $ 87, Two Year $ 4.85 $ 172, $ 117, Protection Suite One Year $ $ 437, $ (147,640.40) Two Year $ $ 378, $ (88,940.00)

Enterprise Architecture Case Study Arkansas Department of Emergency Management (ADEM) ▫Previously spent $9,000 on EPP solutions ▫Now spends $1,500 with new state contracts ▫Cost savings for the agency and the state = $7,500

E-Architecture Initiatives Identify trends, strategies & requirements

Scott Bittler Research vice president in Gartner's Business of IT Research division Recognized as a leading authority on enterprise architecture More than 26 years of IT industry experience Numerous government clients at the federal, state/provincial, and municipal levels