Experiences on how to p contact with end-users (policies and ISO security (policies and ISO security standards at campuses) p ) Brian O’Hora, BSc (Hons) & MBA Technology Management Information Systems Services, TCD TERENA E2E Provisioning Workshop 3 Prague Czech Republic 30 th November 2010 TERENA E2E Provisioning Workshop 3, Prague, Czech Republic, 30 th November 2010
Overview 1. E2E and Change 2. Change and Change Management g g g 3. PM and User Engagement 4. Trinity College Dublin specifics • G Governance • Strategy • Security Policies • Technical strategy 5. Trinity College Dublin outcomes 6 6. Conclusions and recommendations Conclusions and recommendations
E2E and Change 1. Local Policy 2. Resourcing 3. Roles and Responsibilities 4. Technical 5. Design
Ch Change and Change d Ch Management g Trinity College IS Services - two broad y g categories of change 1. Operational incremental change – Change Management g g 2. Radical or step change - A Project and Project Management and Project Management
Project Management Project Management Generic Phases &Processes 1. Initiation 2. Planning and design 3. 3 E Executing ti 4. Closing and and 5. Monitoring and controlling above g
Project Management E d U End User Engagement E t 1. Initiation phase • Analyzing the business needs/requirements in measurable goals • Stakeholder analysis, including users, and • Stakeholder analysis including users and support personnel for the project • Reviewing current operations g p 2. Planning and design • Work Breakdown Structure, Resource allocation Work Breakdown Structure Resource allocation matrix, Schedule, communications plan • Gaining formal approval for work to commence
T i it C ll Trinity College Dublin D bli specifics - Governance p
T i it C ll Trinity College Dublin D bli specifics – College Strategy p g gy College Strategic Plan 2009-2014 g g http://www.tcd.ie/about/strategic_plan Action item 6.15 Build a Cyber Infrastructure to support research Infrastructure to support research
T i it C ll Trinity College Dublin D bli specifics – Security Policy p y y 1. College IT Security Policies http://www.tcd.ie/ITSecurity/policies/policies.php 2 2. T i it C ll Trinity College Dublin - Information D bli I f ti Security Policy 2007 First approved by College Board 9th pp y g July 2003. Last updated February 2007 3. Information Security Supporting y pp g Policies Covers in details security policies in areas such as network security, areas such as network security, internet and email usage etc
TCD specifics - Technical strategy 10GE 10GE plus Lambda service l L bd i support project 10Gbps Internet connection upgrade with Lamba light path service integration project October 2009 to June 2010 service integration project October 2009 to June 2010
TCD specifics - Technical strategy 10GE 10GE plus Lambda service l L bd i support project
TCD 10GE plus Lambda service support project i t j t outcomes
Conclusions & R Recommendations d ti 1. Consider the initial introduction of E2E and subsequent applications for E2E on campus as formal projects to align with local business and technical strategy, policies and processes 2. Initiation and planning/design project stages are particularly important in terms of alignment with local business and technical strategy, policies and processes 3 3. A Analyzing the business needs/requirements in measurable goals l i th b i d / i t i bl l 4. Knowledge of local IT/IS Governance structure is desirable to identify significant stakeholders 5. 5 C Conduct stakeholder analysis, engage with and manage d t t k h ld l i ith d stakeholders 6. Gain formal approval before beginning to execute the plan/design
Thank you
Recommend
More recommend