SlideShare una empresa de Scribd logo
Monitoring AProject Charter Planning Execution & Milestone Tracking
Design, Governance, Risk,
Compliance & Process
Mapping, Approach
& Budgeting
Mark S Mahre
Aprio Technology Alignment Framework
ASSESSMENTDISCOVERY
Suitability, Remediate,
Test & Implement
CONTROL
CXO s, CISO, Directors, SME s, Analysts, Project Managers & Consultants
Resources , Timeline,
PMO & Gap Analysis
Sponsors & Stakeholders, Business Owners
Strategy, Requirements
& Roadmap
Business Case
Project Scope
Success Criteria
Requirements
Objectives
Approvals
Project Design
Project Tasks
Risk Assessment
As-Is Assessment
Project Financials
Project Scheduling
Project Kick-Off
Resource Scheduling
Gap Assessment
Future State Mapping
Risk Assessment
Identify Required Controls
Governance & Process
Data & Security Mandates
Change Controls
Authentication
Encryption Controls
IncidentManagement
KPI s & Metrics Goals
GRC & Readiness
Employee Training
Controls Mapping
Systems & Infrastructure
SOP s & Alignment
Operational Effectiveness
Risk Mgmt. Controls Testing
Data Security Monitoring
Ops Review & Enhancements
Dashboards, KPI s & Analytics
Quarterly Leadership Meetings
DESIGN & BUILD TEST & EXECUTE
Controls, Analytics &
Sustainability
Risk Mitigations
Suitability of Design
Data RPO/RTO
DR/BCP Strategy
Remediation Testing
Cloud / Co-Lo Contracts
Mahre 2017
ALIGNMENT
Operations / Cloud
Task % Task % Task % Task % Task % Task % Task %
Business Case Project Requirements Confirm Milestones Project Execution Kickoff Governance Framework Governance Execution Operations Mgmt.
Project Scope of Work Project Plan & Budgets Create Templates Assessment Meeting Critical Controls Testing Critical Controls in Place Risk Mgmt. Controls
Data Security Mandates Risk Assessment Approach Identify Partnerships Employee SOC Intro Meeting Change Controls Tested Change MGMG. Controls Network Monitoring
Success Criteria Defined As-Is Assessment (Gaps) To-Be (Targets) Change Control Process Network Penetration Testing Help Desk System in Place Data Security Monitoring
Road Map (Milestones) Project Financials People/Resources Critical Controls Accuracy Client Data Security Testing System Uptime Reporting SW License Management
Security Mandates Schedule Quarterly Mtg. Readiness Assessment Security Governance Process Network Monitoring Results Cybersecurity & Risk Contracts Management
Approval Signoffs Resource Scheduling System Description Risk Avoidance Governance Cloud Testing Results Data Encryption Reporting DR / BCP Testing
Resources Identified PMO – New Project Information Security Cyber Risk Analysis/Metrics Cloud Monitoring Results Client Satisfaction Surveys Help Desk Mgmt.
Blackout Dates Identified Status Meeting Schedule Employee Handbook Infrastructure & Network Security Awareness Education Final PMO Meetings Provisioning Mgmt.
Project Budget Plan Timeline-Milestones Plan Asset Inventory - CMDB Cloud Stack Review Incident Response Testing DR/BCP 2018 Plan in Place Decommissioning Mgmt.
Contact Legal Rep. Operations Hand-Off Plan Change MGMT. Strategy End-2-End Data Encryption DR/BCP Testing Next Year Planning Cloud / TAM Mgmt.
Identify Stakeholders Communications Plan Building Security Plan HIPAA / PHI Mandates Readiness Reviews Breach Communication Plan FY Budgeting
Technology Strategy Cost Optimization Plan Policies & Procedures Regulations Policies Change Mgmt. Process Availability Mgmt Framework Compliance Readiness
Operations Strategy Project Org. Chart Strategic Sourcing Portfolio Mgmt. Framework Application Mgmt. CMDB Operations Hand-Off Notice IT Finance Analytics
CXO & Leadership CISO CIO COO Legal CFO PMO
Aprio Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants
Month 1 Month 2 Month 3 Month 4 & 5 Month 6 & 7 Month 8 - 11 Month 12
Aprio | Version 25.1 | September 2019

Más contenido relacionado

La actualidad más candente

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
Making a cloud first strategy a practical reality
Making a cloud first strategy a practical realityMaking a cloud first strategy a practical reality
Making a cloud first strategy a practical reality
Amazon Web Services
 
Building A Cloud Strategy PowerPoint Presentation Slides
Building A Cloud Strategy PowerPoint Presentation SlidesBuilding A Cloud Strategy PowerPoint Presentation Slides
Building A Cloud Strategy PowerPoint Presentation Slides
SlideTeam
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
jmcarden
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Alan McSweeney
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Priyanka Aash
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
PECB
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
Greenway Health
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
CCG
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE - ATT&CKcon
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
PECB
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 

La actualidad más candente (20)

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Making a cloud first strategy a practical reality
Making a cloud first strategy a practical realityMaking a cloud first strategy a practical reality
Making a cloud first strategy a practical reality
 
Building A Cloud Strategy PowerPoint Presentation Slides
Building A Cloud Strategy PowerPoint Presentation SlidesBuilding A Cloud Strategy PowerPoint Presentation Slides
Building A Cloud Strategy PowerPoint Presentation Slides
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 

Similar a Technology Alignment Framework

PRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project ManagementPRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project Management
Cgmcdaniel
 
Experience and Qualifications
Experience and QualificationsExperience and Qualifications
Experience and Qualifications
April_B_White
 
PMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk ManagementPMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk Management
Ahmed Higazi, PMP CSM
 
Project Management
Project ManagementProject Management
Project Management
nitinbagaria
 
PMO & CMMI
PMO & CMMIPMO & CMMI
PMO & CMMI
Shailendra Jain
 
Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5
sandeep sonkusale
 
pmos.pptx
pmos.pptxpmos.pptx
pmos.pptx
ssuserf016f4
 
Usability And Project Management
Usability And Project ManagementUsability And Project Management
Usability And Project Management
Sarah Cortes
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2B
Mark S. Mahre
 
Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up
Mobi Marketing
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
Rishabh Software
 
Managed it services
Managed it servicesManaged it services
Managed it services
Gss America
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
Gss America
 
David Schroeder Summary
David Schroeder SummaryDavid Schroeder Summary
David Schroeder Summary
David Schroeder, PMP, PSM
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1
franktibbs
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1
franktibbs
 
PMP ITTOs Quick Review
PMP ITTOs Quick Review PMP ITTOs Quick Review
PMP ITTOs Quick Review
Jamil Faraj , PMP
 
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
GREEN INTERNATIONAL
 
Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)
Peter Steward
 
Paul charife-allen resume-it security
Paul charife-allen resume-it securityPaul charife-allen resume-it security
Paul charife-allen resume-it security
Paul-Charife Allen
 

Similar a Technology Alignment Framework (20)

PRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project ManagementPRP - 21st Century Program/Project Management
PRP - 21st Century Program/Project Management
 
Experience and Qualifications
Experience and QualificationsExperience and Qualifications
Experience and Qualifications
 
PMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk ManagementPMP CAPM Study Guide Risk Management
PMP CAPM Study Guide Risk Management
 
Project Management
Project ManagementProject Management
Project Management
 
PMO & CMMI
PMO & CMMIPMO & CMMI
PMO & CMMI
 
Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5Mastering T&T analysis in PMP - PMBOK Ver5
Mastering T&T analysis in PMP - PMBOK Ver5
 
pmos.pptx
pmos.pptxpmos.pptx
pmos.pptx
 
Usability And Project Management
Usability And Project ManagementUsability And Project Management
Usability And Project Management
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2B
 
Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up Pm training (planning and tracking) - Project Leader Ramp-Up
Pm training (planning and tracking) - Project Leader Ramp-Up
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
David Schroeder Summary
David Schroeder SummaryDavid Schroeder Summary
David Schroeder Summary
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1
 
Actualize Practice Groups 1
Actualize Practice Groups 1Actualize Practice Groups 1
Actualize Practice Groups 1
 
PMP ITTOs Quick Review
PMP ITTOs Quick Review PMP ITTOs Quick Review
PMP ITTOs Quick Review
 
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
01 Corporate Profile Green Intl_PM Services,Training and Oil & Gas
 
Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)Project management methodology pmo example (short sanitised)
Project management methodology pmo example (short sanitised)
 
Paul charife-allen resume-it security
Paul charife-allen resume-it securityPaul charife-allen resume-it security
Paul charife-allen resume-it security
 

Más de Mark S. Mahre

Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment Framework
Mark S. Mahre
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Mark S. Mahre
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional Services
Mark S. Mahre
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0
Mark S. Mahre
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook Template
Mark S. Mahre
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
Mark S. Mahre
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50K
Mark S. Mahre
 
ClearCost
ClearCostClearCost
ClearCost
Mark S. Mahre
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015Mark S. Mahre
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015Mark S. Mahre
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
Mark S. Mahre
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech final
Mark S. Mahre
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4
Mark S. Mahre
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2
Mark S. Mahre
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process Handbook
Mark S. Mahre
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33
Mark S. Mahre
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03
Mark S. Mahre
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010
Mark S. Mahre
 

Más de Mark S. Mahre (18)

Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment Framework
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional Services
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook Template
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50K
 
ClearCost
ClearCostClearCost
ClearCost
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech final
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process Handbook
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010
 

Último

Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 

Último (20)

Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 

Technology Alignment Framework

  • 1. Monitoring AProject Charter Planning Execution & Milestone Tracking Design, Governance, Risk, Compliance & Process Mapping, Approach & Budgeting Mark S Mahre Aprio Technology Alignment Framework ASSESSMENTDISCOVERY Suitability, Remediate, Test & Implement CONTROL CXO s, CISO, Directors, SME s, Analysts, Project Managers & Consultants Resources , Timeline, PMO & Gap Analysis Sponsors & Stakeholders, Business Owners Strategy, Requirements & Roadmap Business Case Project Scope Success Criteria Requirements Objectives Approvals Project Design Project Tasks Risk Assessment As-Is Assessment Project Financials Project Scheduling Project Kick-Off Resource Scheduling Gap Assessment Future State Mapping Risk Assessment Identify Required Controls Governance & Process Data & Security Mandates Change Controls Authentication Encryption Controls IncidentManagement KPI s & Metrics Goals GRC & Readiness Employee Training Controls Mapping Systems & Infrastructure SOP s & Alignment Operational Effectiveness Risk Mgmt. Controls Testing Data Security Monitoring Ops Review & Enhancements Dashboards, KPI s & Analytics Quarterly Leadership Meetings DESIGN & BUILD TEST & EXECUTE Controls, Analytics & Sustainability Risk Mitigations Suitability of Design Data RPO/RTO DR/BCP Strategy Remediation Testing Cloud / Co-Lo Contracts Mahre 2017 ALIGNMENT Operations / Cloud Task % Task % Task % Task % Task % Task % Task % Business Case Project Requirements Confirm Milestones Project Execution Kickoff Governance Framework Governance Execution Operations Mgmt. Project Scope of Work Project Plan & Budgets Create Templates Assessment Meeting Critical Controls Testing Critical Controls in Place Risk Mgmt. Controls Data Security Mandates Risk Assessment Approach Identify Partnerships Employee SOC Intro Meeting Change Controls Tested Change MGMG. Controls Network Monitoring Success Criteria Defined As-Is Assessment (Gaps) To-Be (Targets) Change Control Process Network Penetration Testing Help Desk System in Place Data Security Monitoring Road Map (Milestones) Project Financials People/Resources Critical Controls Accuracy Client Data Security Testing System Uptime Reporting SW License Management Security Mandates Schedule Quarterly Mtg. Readiness Assessment Security Governance Process Network Monitoring Results Cybersecurity & Risk Contracts Management Approval Signoffs Resource Scheduling System Description Risk Avoidance Governance Cloud Testing Results Data Encryption Reporting DR / BCP Testing Resources Identified PMO – New Project Information Security Cyber Risk Analysis/Metrics Cloud Monitoring Results Client Satisfaction Surveys Help Desk Mgmt. Blackout Dates Identified Status Meeting Schedule Employee Handbook Infrastructure & Network Security Awareness Education Final PMO Meetings Provisioning Mgmt. Project Budget Plan Timeline-Milestones Plan Asset Inventory - CMDB Cloud Stack Review Incident Response Testing DR/BCP 2018 Plan in Place Decommissioning Mgmt. Contact Legal Rep. Operations Hand-Off Plan Change MGMT. Strategy End-2-End Data Encryption DR/BCP Testing Next Year Planning Cloud / TAM Mgmt. Identify Stakeholders Communications Plan Building Security Plan HIPAA / PHI Mandates Readiness Reviews Breach Communication Plan FY Budgeting Technology Strategy Cost Optimization Plan Policies & Procedures Regulations Policies Change Mgmt. Process Availability Mgmt Framework Compliance Readiness Operations Strategy Project Org. Chart Strategic Sourcing Portfolio Mgmt. Framework Application Mgmt. CMDB Operations Hand-Off Notice IT Finance Analytics CXO & Leadership CISO CIO COO Legal CFO PMO Aprio Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants Month 1 Month 2 Month 3 Month 4 & 5 Month 6 & 7 Month 8 - 11 Month 12 Aprio | Version 25.1 | September 2019