Monthly Archives: January 2021

Product Architecture

Be accountable for reviewing and evaluating designs for alignment with overall Product Architecture; recommending and implementing changes to designs and technology to improve product quality and overall interactive and interface design.

More Uses of the Product Architecture Toolkit:

  • Pull off review Product Architectures for security design gaps and vulnerabilities and consult with product teams to remediate or mitigate cyber risk.
  • Confirm your organization ensures system, technical and Product Architectures are aligned with business objectives.
  • Manage work with Product Architecture to help develop roadmap for future releases based upon client demand, emerging technologies or current solution limitations.
  • Ensure you magnify; understand and account for the affect of Product Architecture decisions on distributed systems.
  • Generate review Product Architectures for security design gaps and vulnerabilities and consult with product teams to remediate or mitigate cyber risk.
  • Develop conceptual and logical application / Product Architectures based on EA reference architecture that enable IT to meet service requirements.
  • Manage: review of the Product Architecture, design, requirements specifications, and test specifications.
  • Orchestrate: brief understand and account for the effect of Product Architecture decisions on distributed systems.
  • Coordinate: design and implementation of experiments or models that explore aspects of visual perception as it pertains to Product Architecture or design.
  • Direct: act as decision maker for high level / high impact engineering and Product Architecture issues.
  • Initiate: document accomplish review Product Architectures for security design gaps and vulnerabilities and consult with product teams to remediate or mitigate cyber risk.
  • Lead: review Product Architectures for security design gaps and vulnerabilities and consult with appropriate teams to remediate or mitigate cyber risk.
  • Support Product Architecture considerations and project manage cross module solutions and other large and/or complex projects.
  • Systematize: deep domain expertise in all things identity and application/data security in a Product Architecture, design and implementation capacity.
  • Formulate: responsive and decisive on adjusting your Product Architecture per customer requirements, market conditions and technology evolution.
  • Audit: review Product Architectures for security design gaps and vulnerabilities and consult with product teams to remediate or mitigate cyber risk.
  • Ensure system, technical, and Product Architectures are aligned with business objectives.
  • Manage the long term roadmap for 3D printed Product Architectures using customer insights; provide sales forecast to operations to facilitate component planning.

 

ITIL

It analytics customer support and metrics analysis; troubleshooting and issue resolution; ITIL service support process mapping and process improvement; communication and interaction with multiple levels of your organization.

More Uses of the ITIL Toolkit:

  • Ensure you present; lead a team of technical professionals (analysts, administrators, and engineers) working to develop innovative deliverables founded from business obligations, operational requirements, and best practices.
  • Coordinate: design improvements to operations, security, and various efficiencies in ITIL operations (release, deploy, configuration, monitoring, and alerting) to maintain high levels of service and improve team devops controls.
  • Be accountable for assessing and designing the appropriate ITSM ITIL and infrastructure management processes practices and tooling to optimize the use of cloud and enable.
  • Be accountable for all aspects of testing and promoting to production vendor or developed integration changes, enhancements, releases or other related system components.
  • Perform review of ITSM tool design and specifications to ensure that solutions employ good engineering practices and promote the ITIL strategy.
  • ITIL knowledge for methods and processes (IT service strategy, service design it, IT service transition, service operation it, it continual service improvement), service level agreement.
  • Govern: implement policies, procedures, automation and controls for consistent delivery of high availability services in a cost effective manner using the ITIL framework for service management.
  • Ensure you devise; build and maintain effective working relationships with leadership, peers, internal and external customers, vendors and user group communities.
  • Be certain that your organization oversees, facilitate, and administers ITIL based service support and/or technical account management in the coordination of Configuration Management.
  • Warrant that your organization engages other service desk resources or appropriate service resources to resolve incidents that are beyond the scope of the ability or responsibility, communicating technical information to second level support staff.
  • Control: where necessary, re engineering applications support to ensure it aligns with business requirements, processes, and strategic vision.
  • Utilize ITIL based standard operating procedures, key performance indicators (kpis), and reports to provide visibility to service desk performance and quality.
  • Confirm your organization designs process to ensure issues are resolved as quickly as possible and issues are routed to potential resolvers correctly the first time.
  • Help develop and leverage service operations and desk best practices, ITIL Service Management framework, and problem management to drive a continual process improvement culture.
  • Secure that your organization adopts internal delivery methodologies (ITIL, Agile, Kanban) with measured success criteria to deliver continuous, iterative value.
  • Manage work with the Service Desk, Application Managers, IT managers and other stakeholders using the ITIL methodology for IT service Management.
  • Be accountable for promoting the vision and tone for your organization, consistent with organization culture and mission; Providing clear goals and performance expectations.
  • Supervise: champion the use of itsm competencies and ITIL practices and the resulting data in order to optimize the performance of the IT organization.
  • Provide guidance to staff to ensure proper training, performance and productivity goals are aligned with IT and your organizational strategies and to promote a professional atmosphere.
  • Lead the implementation and maintenance of technologies and platforms supporting a complex corporate voice infrastructure.
  • Ensure service desk slas and customer service standards are defined, communicated and met with focus on continuous improvement over time.
  • Drive process oriented methodology that can be audited and tracked for compliance with department, organization, and industry standards.
  • Secure that your organization maintains and continuous improvement of processes, standards, policies, working methods, and tools using Agile and ITIL best practices.
  • Establish that your organization utilizes ITIL based metrics and service level agreements to establish service excellence through system reliability and effective incident and problem management.
  • Perform as operational Infrastructure leader for peers, contributing to continual improvements of ITIL/ITSM/Business Continuity efforts.

 

Cyber Deception

Develop and scope tasks to support cyber operations to achieve red, blue, and purple missions.

More Uses of the Cyber Deception Toolkit:

  • Guide: insurance sales associate.
  • Ensure you conceptualize; lead cyber threat intelligence analysis.
  • Ensure you integrate; stand up, accelerate, and evolve cyber threat intelligence teams to increase effectiveness.
  • Orchestrate: cybersecurity management proactive detection.
  • Initiate: why choose between doing meaningful work and having a fulfilling life.
  • Ensure you manage; respond to threats in real time, through diagnosis, communication, and remediation.
  • Coordinate security initiatives between SOC and HUNT team.

 

Data Strategies

Work with owners and users/analysts across the customer operations to modify or implement new repeatable and reliable businesses processes to improve and sustain effective data governance resulting in improved quality and consistency of data used to drive key business decisions.

More Uses of the Data Strategies Toolkit:

  • Make sure that your organization serves as an advanced data technology expert in design efforts, proof of concept (POC) exercises, analysis of solutions, performance tuning/testing and interfaces for new software deliverables or for making significant enhancements to existing ones.
  • Lead team meetings and knowledge sessions to share new strategies for targeting campaigns and to provide feedback on platform and data performance.
  • Identify, assess and solve complex business problems for area of responsibility, where analysis of situations or data requires an in depth evaluation of master data.
  • Provide key insights based on data analytics to aid the client in drawing conclusions as to the business value and impact of the data and best approaches for migrating and transforming data to support new system architectures.
  • Establish that your organization provides product and/or process subject matter resource expertise necessary to support design, development, testing and execution of technology solutions.
  • Establish that your organization partners with stakeholders across business units to build and implement reporting and analytic solutions that provide leaders with information necessary to achieve business goals and objectives.
  • Develop framework for the business units collection use, sharing and disclosure of data taking into consideration the data, operational, reputational and partnership related requirements for the business.
  • Ensure you are able to articulate the value of modern data technology approaches to business executives and build key relationships with platform teams to ensure delivery.
  • Devise: partner with business engagement leadership, service line directors and others to develop high level business cases and manage expectations about service cost, quality, risk, metrics, delivery and lifecycle requirements.
  • Ensure you guide; lead master data development, data quality, data model, and collaborate with cross functional teams comprised of client groups, project teams and IT organizations.
  • Coordinate: work with planners to provide guidance on how data can be utilized to inform annual planning insights and work with the team to help inform how data integration evolves the planning process.
  • Ensure your organization designs data integrations and data quality framework and work closely with internal partners to develop strategy for long term data platform architecture.
  • Be accountable for collaborating with key stakeholders, executives, data engineers, and data analysts to perform data discovery and develop various objectives for data architecture and strategy.
  • Organize: implement business and IT Data requirements through new Data Strategies and designs across all data platforms (relational, dimensional, and nosql) and data tools (reporting, visualization, analytics, and machine learning).
  • Identify: client governance, risk, compliance and security specialists to ensure the data architecture and practices conform and support broader organizational risk and compliance management.
  • Gather data requirements to create and maintain entity relationship models and logical and physical data models that conform to existing standards and conventions.
  • Manage: an agile mindset that moves past blockers and a vision to iteratively migrate to the next/modern set of architecture capabilities with a lens of business benefits/value.
  • Be certain that your organization builds relationships across the Business and IT organization that foster collaboration and partnerships to drive better strategies, priorities and service to the Business.
  • Establish: design and execute the policies, practices, and procedures that support data quality, data security, data governance, data standardization, integration, and managing risks.
  • Support ongoing data strategy work, deliver data models and document data reference architectures that enhance project delivery ranging from transactional systems to reporting and analytic solutions.
  • Devise: work closely with the engineering teams throughout the development process in ensuring best practices and technical soundness (scalability, reliability, performance, security) for data engineering.
  • Ensure you transform; developed in collaboration with industry leading owners and operators, your scheduling, point of sale, and conversation platform was carefully designed to drive revenue, automate workflows, and convert customers from visitors into valuable, long term clients.
  • Manage work with enterprise data management team to develop, implement and manage Data Strategies for each franchise that optimizes the data quality and improves standardization.
  • Oversee development teams in deploying and validating of Data Strategies and understanding concerns as provenance, discovery, entitlement and performance of data delivery.
  • Manage work with project managers, other architects, and delivery teams to effectively manage the data solution across initiatives to ensure an optimal, high level, conceptual data design.

 

Privacy Risk

Confirm your organization works with privacy steward, legal counsel and management to ensure your organization has and maintains appropriate security, privacy, and confidentiality consent, authorization forms, and information notices and materials reflecting current organization and legal practices and requirements.

More Uses of the Privacy Risk Toolkit:

  • Methodize: work cross functionally on technology implementation projects to provide IT controls expertise and test controls to meet information security and privacy requirements.
  • Ensure you strategically support leading edge initiatives designed to improve patient care and work with business leaders to support internal functions with privacy and security concerns, ensuring security and privacy by design.
  • Manage work with all organization personnel involved with any aspect of release of protected information, to ensure full coordination and cooperation under your organizations policies and procedures and legal requirements.
  • Audit: implement and maintain an internal reporting mechanism for intended (new or changed) personal data processing activities, to which business unit/process owners must adhere.
  • Confirm your organization ensures compliance with organization policies, procedures, and regulatory requirements, and the accuracy and reliability of organization data; and to confirm the adequacy of implemented security controls and help identify necessary improvements.
  • Confirm your organization takes a lead role, to ensure your organization has and maintains appropriate privacy and confidentiality consents, authorization forms and information notices and materials reflecting current organization and legal practices and requirements.
  • Confirm your organization completes assigned tasks designed to ensure the security of your organizations systems and information assets and protects against unauthorized access, modification, or destruction.
  • Ensure your organization utilizes security and vulnerability assessment tools internally and externally to identify network security weaknesses in order to recommend network or operating system enhancements.
  • Organize: review all system related information security plans through the Centers network to ensure alignment between security and privacy practices, and acts as a liaison to the information technology department.
  • Lead: review and assess privacy related risk with business partners to identify and address privacy related compliance gaps or areas of Privacy Risk in support of business requirements.
  • Support the development and implementation of effective data privacy practices, aimed at minimizing privacy legal risk and ensuring the confidentiality and integrity of personal data.
  • Serve as a privacy liaison to cross departmental stakeholders in connection with business activities establishing solutions that integrate privacy requirements with business priorities.
  • Identify: continuously review, evolves and, when necessary, executes your organizations IT disaster recovery plan and business continuity plan as it pertains to technology and technology assets to maximize uptime.
  • Devise and update policies and procedures for customers, employees and data breach incident responses, ensuring alignment with the actual implementation of personal data processing activities.
  • Lead the development and implementation of the enterprises risk strategy for effective risk and compliance program governance; intended to strategically and proactively mitigate risk, and promptly detect and correct instances of non compliance.
  • Analyze and review metrics of ethics, compliance and Privacy Risks to look for unusual patterns, ensure adherence to external regulatory obligations and internal standards compliance.
  • Coordinate the working relationships with IS and other related departments to ensure that privacy is integrated in all System Development Lifecycle Management processes and in any Project Management Methodology developed by business to implement projects and roll out systems and tools.
  • Manage work with all functions, divisions, and departments globally to coordinate the privacy support and advice to ensure that privacy by design is met in all projects and initiatives globally.
  • Evaluate: review all system related information security plans throughout your organizations network to ensure alignment between security and privacy practices, and acts as a liaison to the information systems department.
  • Provide day to day advice on common data protection to a wide range of stakeholders relating to security measures and advice into best practice for data protection risk mitigation measures.
  • Serve as a liaison between internal and external parties during contract development and negotiation stages and executes outcomes from contract negotiations into contractual language.
  • Ensure your organization implements and enforces regulatory compliance to prevent costly breaches (internal and external) which impact resource and commercial activities (fines, reports, file notes, corrective action, reputational damage).
  • Manage work with all the Centers personnel involved with any aspect of release of protected health information, to ensure full coordination and cooperation under the Centers policies and procedures and legal requirements.
  • Support and drive awareness of current ethics, regulatory compliance and privacy best practices, industry standards, references and data models to understand and evaluate potential areas of risk to the enterprise.
  • Ensure thrive has and maintains the appropriate privacy and confidentiality consents, authorizations, notices, and written requirements for legal requirements and best practice.