13
8/11/2019 Information Security in the Future IT Organization (237190670) http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 1/13 !"#$%"& ()*+),-& .-/0 123"00 4+)"5 6"*/7)$8 9:*"7 (-8 ;<=>

Information Security in the Future IT Organization (237190670)

Embed Size (px)

Citation preview

Page 1: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 1/13

!"#$%"& ()*+),-&

.-/0 123"00

4+)"5 6"*/7)$8 9:*"7(-8 ;<=>

Page 2: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 2/13

?$ - %0-&*"

• =@ A*+220A -&B *200","A• (-C27 D"B)*-0 *"&$"7 E-&B D"B)*-0 A*+220F• G&B"7,7-B/-$"H ;IJ><I• %7-B/-$" -&B K725"AA)2&-0H =LJ>;I• M2$-0 5-*/0$8 -&B A$-NH >;J;II• O&527D-P2& -&B M"*+&202,8 6"7Q)*"AH RI<<• O&527D-P2& -&B O&57-A$7/*$/7" ?AA/7-&*"H ;=• ?&&/-0 S#K"&B)$/7"H TUVIW

;

Page 3: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 3/13

NextGen Michigan Strategy

Shared Infrastructure

Unit Products And Services

Shared Productsand Services

NextGen Michigan

Rationalize IT Across CampusITS Campus

Alignment and Culture GovernanceOrganizationalStructure

X

Page 4: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 4/13

Page 5: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 5/13

Page 6: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 6/13

6"7Q)*"A 97)"&$-P2&

M+" !"#$%"& A$7-$",8H – ]-P2&-0)^" OM – O&Q"A$ )& A+-7"B A"7Q)*"

– ["0)Q"7 !"#$ %"&"7-P2& OM A"7Q)*"A

9/7 A"7Q)*" A$7-$",8H – Y2*/A"A 2& $+" Z/A)&"AA Q-0/"

– ?0),&A 2/7 A"7Q)*" B"0)Q"78 $2 /A"7 &""BA – (-&-,"A A"7Q)*"A &2$ K72B/*$A – W/&B0"A $"*+&202,8 -&B K72*"AA

U

Page 7: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 7/13

ServiceProvider

Roles

ServiceSupportFunctions

6"7Q)*" ]20"A -&B .W]( (2B"0

Plan Build Run Manage

Project and Portfolio Mgmt Ops & Availability

Finance

HR

Supplie 7R"0-P2&AM,D$

Customer Relationship Management

Enterprise Architecture ITSM

Product Manager

Service Portfolio Owner

Service Owner

Service Mgr

Solution Architecture

Technical/Component Lead

Page 8: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 8/13

IT Shared Services

• End-User

Computing• Network• Storage• Server• Security

Projects New Services

_

Page 9: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 9/13

"# $%&'("#) %$$%*#"+, $%(-"&%$Y/&B-D"&$-0J Z-A)* A"*/7)$8 A"7Q)*"A 527 $+" "&P7" *-DK/A 7",-7B0"AA 3+"$+"7 -/&)$ -B2K$A A+-7"B OM A"7Q)*"AV O& $+" *2DD2& ,22BV

` 42DK0)-&*" %/)B-&*"

` ["Q"02KD"&$ 25 .20)*)"AJ 6$-&B-7BAJ -&B %/)B"0)&"A

` 1-7B"&)&, %/)B"A

` ]S49! -A - 6"7Q)*"

` 6"*/7)$8 O&*)B"&$ ]"AK2&A"

` SB/*-P2& -&B ?3-7"&"AA

` W-A)* !"$327\ (2&)$27)&, -&B .72$"*P2&

` a/0&"7-Z)0)$8 6*-&&)&,

@

Page 10: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 10/13

b+"& - /&)$ -B2K$A $+" ()b27\AK-*"J ()6"7Q"7J ()[-$-Z-A" 27 2$+"7 A+-7"B OMA"7Q)*"J OO? $7-&A)P2&A 572D -& OM A"*/7)$8 K-7$&"7 $2 $+" /&)$cA K7)D-78 OM AA"7Q)*" K72Q)B"7 527 $+2A" A8A$"DAJ A"7Q)*"AJ -&B -KK0)*-P2&A $+-$ OM6 D-&-,"

` 42DK0)-&*" E"V,VJ 1O.??J S?]dOM?]J YS].?F e

` SB/*-P2& -&B ?3-7"&"AA e

` S&+-&*"B !"$327\ (2&)$27)&, -&B .72$"*P2&

` ])A\ (-&-,"D"&$

` 1-7B"&)&, e

` [-$- f2AA .7"Q"&P2&

` a/0&"7-Z)0)$8 (-&-,"D"&$

` O&527D-P2& ?AA"$ 40-AA)g*-P2& 25 6"&A)PQ" 68A$"DA

$.+(%/ "# $%&'("#) $%(-"&%$

=<

Page 11: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 11/13

G&)$A 3+2 B2 &2$ -B2K$ ()b27\AK-*" 27 2$+"7 A+-7"B OM A"7Q)*"AJ 27 +-Q")&57-A$7/*$/7"dA8A$"DA 2/$A)B" 25 $+"A" A"7Q)*"AJ *-& -*h/)7" 527i5"" A/KK27$572D OO? $2 D""$ $+")7 /&)h/" /&)$ &""BAV

` OM 6"*/7)$8 42&A/0P&,

` OM 6"*/7)$8 [)A-A$"7 ]"*2Q"78dW/A)&"AA 42&P&/)$8 E[]W4F .0-&&)&,

` OM 6"*/7)$8 S$+)*-0 1-*\)&,

+//"#"0*+, "# $%&'("#) $%(-"&%$

==

Page 12: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 12/13

1234

"# $5635789

$76:;<7 1=6>=2;= 1234"4:7?5@745 1234

%4576A6;?7 +6<B;57<5C67 D

E;<B;834 "#

FC;2G D /7A2=9

16=863@H16=I7<5E34387@745

+6<B;57<5? D %48;4776?

FC;2G D /7A2=9

&B3487 E34387@745

(C4

'?76 $CAA=65 ?76:;<7?

"4J63?56C<5C67 D *75K=6L0A763M=4

+AA2;<3M=4? D"4J=6@3M=4 $76:;<7?

$76:;<7 E34387@745

"44=:357

#73<B;48 D ,7364;48%<=?9?57@

(7?736<B $76:;<7?

S#"*/PQ" 9:*"7AJ ["-&A

j %2Q"7&-&*"

%"&"7-0 Y/&B

.72C"*$ 93&"7A

4-K)$-0

S&B GA"7A

W/A)&"AA 93&"7A

42A$ ]"*2Q"78

Y-*/0$8

]"A"-7*+"7A

%"&"7-0 Y/&B42A$ ]"*2Q"78

$5635789 D &=@@C4;59 (7A7353N27 16=<7??7?&2=CG O;6?5

$76:;<7 O;6?50A763M=432 %P<72274<7

"44=:3M=4

4O9

?AA/7-&*"

Y)&-&*" j Y-*)0)P"A1]J 97, ["QJ j42DD/&)*-P2&A

0NI7<M:7?=V Y2*/A 2& ()AA)2&;V Y2*/A 2& 6"7Q)*"AXV 9K"7-P2&-0 S#*"00"&*"

>V OM 6$7-$",8

=;

Page 13: Information Security in the Future IT Organization (237190670)

8/11/2019 Information Security in the Future IT Organization (237190670)

http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 13/13

"# Q0-%(*+*&% $#('&#'(%

=X