Monthly Archives: October 2021

ISO 38500 1 big thing: Perform analytical research to identify additional seed data, potential gaps and adverse information.

665 words, 2.5 minutes read. By Gerard Blokdyk

ISO 38500 1 big thing: Perform analytical research to identify additional seed data, potential gaps and adverse information.

The big picture: Develop experience in direct oversight of hardware, server, networking and enterprise-wide and business unit-specific software applications, as well as data governance and information security, and involvement formulating and implementing a Technology Roadmap and maintaining technical oversight.

Why it matters: Ensure your personnel defines the roles and responsibilities related to data governance and ensures clear accountability for stewardship of your organizations principal information assets.

State of play: Invest in regulatory engagement for matters related to IT, information security, business continuity management, operational resilience, information governance, third party risk management, enterprise risk management and data privacy.

Meanwhile: Enhance and implement data governance framework across the Enterprise including data quality, data catalog, data privacy and security, data integrity and access control utilizing the necessary IT solutions and/or external services.

Go deeper: Interface so that your staff is analyzing and articulating business opportunities into clear, use cases and stories to inform the data pipeline, models, services, deployment workflow, KPIs and visualization.

How it works: Make sure your workforce includes performing information systems security engineering and information assurance analysis as well as employing systems and information assurance best practices spanning requirements, architectures, processes, standards, specifications, technical baselines, testing, and verification and validation.

On the flip side: Certify your staff works with engineering to establish test techniques for new product during development and to resolve product or equipment problems, and may install, characterize and/or design equipment.

Between the lines: Make sure the primary objective of the Quality Assurance Automation Engineer is taking ownership of your internal test framework and additionally maintain and improve its capabilities.

What we’re hearing: “Support software releases and lead onsite/support team with expert knowledge, problem analysis, troubleshoot and resolution of defects with priority to bringing issues to closure., Technical Product Owner – IoT Core Platform

What to watch: Make sure the Security specialization is accountable for the identification of appropriate countermeasures to address identified deficiencies and for delivering advice and design solutions with reference to policy and good practise.

What they’re saying: “Make headway so that your company develops and maintains strategic plans; assesses policy needs and develops policies to govern IT activities; provides policy guidance to IT management, staff, and (internal) customers and prepares IT budgets and leads policy/strategy discussions across teams., Mgr, Technology Projects & Strategy

The bottom line: Be sure your group supports collaboration with others across the enterprise to provide solutions and recommendations in order to consolidate data repositories, information, GRC tools and other technology resources by centralizing them under common GRC solutions.

What’s next: Ensure you are able to challenge the status quo and drive innovation by generating creative ideas Keeps up to date on current research practices.

ICYMI: Be certain that your group reviews technical literature, meets with vendors, exchanges information with other organization agencies and attends conferences to identify new programs, methods, equipment, and plants which might be useful for operations.


Look inside the ISO 38500 Kanban:



Want to reuse this data? Purchase your license here:

One-time payment for perpetual commercial re-use


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


Trusted by: FirstEnergy Corp, AE Stategies, LendingPoint, LLC, kraken, IBM, Micron Technology, IDC, CapB InfoteK, Mastery Logistics Systems, Inc., Accenture, McKesson, LumApps, Honeywell, Avery Dennison, Audible, Fidelity Investments, Olathe Public Schools, Amex, Emory University, Kajeet, Inc., Aruba Networks, Volkswagen Group of America, MasterBrand Cabinets Inc., Platform Science, Autonomic, Medtronic, NextEra Energy, Tesla, Novetta, Sirqul, Inc, Kwik Trip Inc, Particle, Rivian Automotive, Watts Water Technologies, Signify, Martin Engineering, TalentWerx, Terumo Medical Corporation, PepsiCo, Microsoft, Delta Faucet Company, Amazon.com Services LLC, Siemens, SunPower, Johnson Controls, Cummins Inc., BrightInsight, Losant, Pall, Allegion, Spireon, Lumin, Insight Enterprises, Inc., Alarm.com, Vodafone, Rad Power Bikes, Axon, ENEL, Schneider Electric, Precision Fermentation, Deeplocal Inc., Harbor Industries, Inc., Samsara, Ayla Networks, Prime Vision, Walmart, Xerox

ISO 38500 1 big thing: Develop experience developing IOT platforms and architectures, managing teams for full stack development.

604 words, 2.2 minutes read. By Gerard Blokdyk

ISO 38500 1 big thing: Develop experience developing IOT platforms and architectures, managing teams for full stack development.

The big picture: Secure that your staff is assisting in the creation or review of information security policies, standards, procedures and plans (BCP, DR, and Incident Response) to support the (internal) clients information security needs and governance requirements.

Why it matters: Make headway so that your process collaborates with key personnel and across the organization to determine compliance with regulatory and compliance requirements and on documenting, implementing, monitoring and managing Information Security controls.

Meanwhile: Develop structure and functionality for web pages; coordinates with department and Information Services staff to ensure needs are met and web practices are consistent with organization standards.

Under the hood: Enable the data technology organization to take authority, responsibility, and accountability for enabling business exploit the value of enterprise information assets to render insights for decision making, automated decisions and augmentation of human performance.


 


Get the ISO 38500 Kanban: Top ISO 38500 Must Haves

Look inside the ISO 38500 Kanban:



Learn the Top Emerging ISO 38500 Risks HERE: store.theartofservice.com/ISO-38500-critical-capabilities/

 

Top thinkers are using The Art of Service Kanbans, the Kanbans that are helping leaders stay ahead of what’s next.

This Kanban will help you plan your roadmap. The ISO 38500 Kanban enables leaders to shortlist hundreds of appropriate results, already prioritized.


Get Started:


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


Between the lines: Make sure the primary responsibilities of IT Operational Risk include providing risk management, risk advisory and third party IT risk management, regulatory liaison, and policy/standards governance for the Information Technology division.

Yes, but: Research (internal) customer issues and complete follow up outgoing calls in order to present resolutions, share information and/or to outline next steps.

What we’re hearing: “Be certain that your team is developing and directing your organizations records training and materials development while coordinating responsibilities for records coordinators and organization staff., Mgr, Technology Projects & Strategy

What to watch: Liaison so that your process operates and maintains geographic information system (GIS); creates, maintains, and updates data in GIS database; queries databases for various analytical information.

What they’re saying: “Ensure you apply best practices in the areas of strategy, governance, process efficiency and architecture to maximize the impact of technology on your business strategy., Supply Chain & Operations Direct Materials Manager

The backdrop: Safeguard that your group designs and supports information governance programs, policies, and procedures and collaborates cross functionally to identify, monitor, report, and escalate data issues and remediation plans.

The bottom line: Ensure your company is providing consultative information security or information technology services to a broad range of companies and/or overarching and state agencies, and be current with regards to information security and compliance for the vendor landscape.

What’s next: Make sure your company maintains singular accountability for all aspects of the implementation process by holding all project resources accountable to the completion of tasks and meeting the project milestone dates.

ICYMI: Ensure your work focuses on uncovering complementary connections across sectors to combine the social, economic, and human capital needed to align action for health.


Look inside the ISO 38500 Kanban:



Want to reuse this data? Purchase your license here:

One-time payment for perpetual commercial re-use


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


Trusted by: FirstEnergy Corp, AE Stategies, LendingPoint, LLC, kraken, IBM, Micron Technology, IDC, CapB InfoteK, Mastery Logistics Systems, Inc., Accenture, McKesson, LumApps, Honeywell, Avery Dennison, Audible, Fidelity Investments, Olathe Public Schools, Amex, Emory University, Kajeet, Inc., Aruba Networks, Volkswagen Group of America, MasterBrand Cabinets Inc., Platform Science, Autonomic, Medtronic, NextEra Energy, Tesla, Novetta, Sirqul, Inc, Kwik Trip Inc, Particle, Rivian Automotive, Watts Water Technologies, Signify, Martin Engineering, TalentWerx, Terumo Medical Corporation, PepsiCo, Microsoft, Delta Faucet Company, Amazon.com Services LLC, Siemens, SunPower, Johnson Controls, Cummins Inc., BrightInsight, Losant, Pall, Allegion, Spireon, Lumin, Insight Enterprises, Inc., Alarm.com, Vodafone, Rad Power Bikes, Axon, ENEL, Schneider Electric, Precision Fermentation, Deeplocal Inc., Harbor Industries, Inc., Samsara, Ayla Networks, Prime Vision, Walmart, Xerox

ISO 38500 1 big thing: Provide strategic risk guidance for IT projects, including evaluation and recommendation of technical controls.

669 words, 2.5 minutes read. By Gerard Blokdyk

ISO 38500 1 big thing: Provide strategic risk guidance for IT projects, including evaluation and recommendation of technical controls.

The big picture: Liaison so that your team identifies system functionality or performance deficiencies, execute changes to existing systems, and tests functionality of the system to correct deficiencies and maintain more effective data handling, data integrity, conversion, input/output requirements, and storage.

Why it matters: Make headway so that your strategy supports enterprise architecture, system operations and systems development, with priority, to ensure information security policy, standards and controls are planned for and effectively implemented.

Be smart: Work with Information Technology to operationalize the requirements of risk and control methodologies in the enterprise Governance, Risk and Controls (GRC) system used across broad stakeholder groups.

Meanwhile: Conduct reviews and analysis of business and information technology processes and solicit (internal) client requirements through interviews, workshops and/or existing systems documentation or procedures.

What they’re saying: “Ensure your workforce is involved in research and analysis of information system issues and trends, and research and development in a technical discipline/field., Technical Project Manager

On the flip side: Make headway so that your organization participates in information security committees through the IT Governance framework to establish organization-wide security policies, verify compliance, and advance security goals and objectives.

How it works: Make sure your organization ensures architectural principles are applied during design to reduce risk and drives adoption and adherence to policy, standards and guidelines.

Yes, but: Develop a go-forward strategy to evolve the TPRM program and continue to develop and oversee a third-party risk governance structure that ensures that all business owners and third parties that expose the organization to compliance, credit, information security, offshore, operational, and strategic risk follow appropriate controls.

State of play: Establish that your company is responsible for your organizations information security strategy/programs daily operations, goals and objectives by developing and monitoring security standards and best practices for your organization.

What we’re hearing: “Develop annual information security governance and policy roadmaps including major policy lifecycle milestones and communicate to key stakeholders to ensure commitments are anticipated., Service Support Manager

Between the lines: Apply an enterprise wide set of disciplines for the planning, analysis, design and construction of information systems on an enterprise wide basis or across a major sector of the enterprise.

The backdrop: Check that your staff evaluates and Recommends information technology strategies, policies, and procedures by evaluating organization outcomes; identifying problems; defining risks; evaluating trends; anticipating requirements.

The bottom line: Be certain that your staff provides oversight for the development of information systems testing strategies, plans or scenarios working with stakeholders and Test and Software Quality Assurance Services representatives.

What’s next: Make sure your team coordinates tracking of all relevant information on drivers, as license status, traffic tickets, accidents and other risk and safety related data.

ICYMI: Develop experience conducting verification and validation (V and V) over information security control remediation activities to determine extent to which such efforts are successful in resolving control weaknesses/audit findings.


Look inside the ISO 38500 Kanban:



Want to reuse this data? Purchase your license here:

One-time payment for perpetual commercial re-use


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


Trusted by: FirstEnergy Corp, AE Stategies, LendingPoint, LLC, kraken, IBM, Micron Technology, IDC, CapB InfoteK, Mastery Logistics Systems, Inc., Accenture, McKesson, LumApps, Honeywell, Avery Dennison, Audible, Fidelity Investments, Olathe Public Schools, Amex, Emory University, Kajeet, Inc., Aruba Networks, Volkswagen Group of America, MasterBrand Cabinets Inc., Platform Science, Autonomic, Medtronic, NextEra Energy, Tesla, Novetta, Sirqul, Inc, Kwik Trip Inc, Particle, Rivian Automotive, Watts Water Technologies, Signify, Martin Engineering, TalentWerx, Terumo Medical Corporation, PepsiCo, Microsoft, Delta Faucet Company, Amazon.com Services LLC, Siemens, SunPower, Johnson Controls, Cummins Inc., BrightInsight, Losant, Pall, Allegion, Spireon, Lumin, Insight Enterprises, Inc., Alarm.com, Vodafone, Rad Power Bikes, Axon, ENEL, Schneider Electric, Precision Fermentation, Deeplocal Inc., Harbor Industries, Inc., Samsara, Ayla Networks, Prime Vision, Walmart, Xerox

ISO 38500 1 big thing: Monitor operational environment and report on adversarial activities which fulfill leaderships priority information requirements.

607 words, 2.2 minutes read. By Gerard Blokdyk

ISO 38500 1 big thing: Monitor operational environment and report on adversarial activities which fulfill leaderships priority information requirements.

The big picture: Make headway so that your organization success in developing strong working relationships across many layers of your organization, outside industry partners and suppliers.

Why it matters: Ensure strong technical capabilities and experiences in software engineering, IT technology and data analytics for manufacturing environment, such as software architecture design, programming with various tools (.

Yes, but: Make sure your staff applies data domain knowledge to your organization, channel, and the application and process to satisfy regulatory and internal requirements related to information governance and data management.

Under the hood: Ensure your staff secures Enterprise information by developing and supporting security technologies, services, and capabilities across the network plus design and develop migration strategies.


 


Get the ISO 38500 Kanban: Top ISO 38500 Must Haves

Look inside the ISO 38500 Kanban:



Learn the Top Emerging ISO 38500 Risks HERE: store.theartofservice.com/ISO-38500-critical-capabilities/

 

Top thinkers are using The Art of Service Kanbans, the Kanbans that are helping leaders stay ahead of what’s next.

This Kanban will help you plan your roadmap. The ISO 38500 Kanban enables leaders to shortlist hundreds of appropriate results, already prioritized.


Get Started:


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


What to watch: Drive the exploratory data analysis process on newly acquired data sets in order to describe gross surface properties, source, and limitations of data assets and explore and prototype the standardization of these assets.

What we’re hearing: “Safeguard that your workforce is performing technical and competitive analysis of Risk, Controls, Third Party Management, Security Operations solutions, including integration with enterprise information security and information technology applications and data feeds., IOT Sales Solution Engineer – Siemens Comfy | Enlighted Job Opportunity – Remote

Meanwhile: Work with other members of the Information Security Governance Team to analyze and audit processes, implementations, policy adherence and other information sources to evaluate compliance with multiple regulatory standards and risk management objectives.

The backdrop: Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.

How it works: Make sure the team delivers high-quality information through activities that include development of essential, building infrastructure capabilities to meet (internal) client needs and implementing data standards and governance.

State of play: Ensure project launch information is communicated effectively to minimize any negative impact at it while supporting a high level of engagement and implementation.

Between the lines: Warrant that your staff is involved in Service Oriented Architecture (SOA), web services, micro services, enterprise data management, information security, applications development, and cloud based architectures.

The bottom line: Develop and manage operational support processes for information security including identity and access management, incident response and investigations, disaster recovery, and business continuity.

What’s next: Verify that your operation reviews and edits privacy documentation and information sharing agreements submitted by (internal) clients on a wide array of information technology systems.

ICYMI: Make headway so that your personnel exchanges information in all formats, on matters having a wide range of importance and complexity both inter organizationally and with outside (internal) customers.


Look inside the ISO 38500 Kanban:



Want to reuse this data? Purchase your license here:

One-time payment for perpetual commercial re-use


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


Trusted by: FirstEnergy Corp, AE Stategies, LendingPoint, LLC, kraken, IBM, Micron Technology, IDC, CapB InfoteK, Mastery Logistics Systems, Inc., Accenture, McKesson, LumApps, Honeywell, Avery Dennison, Audible, Fidelity Investments, Olathe Public Schools, Amex, Emory University, Kajeet, Inc., Aruba Networks, Volkswagen Group of America, MasterBrand Cabinets Inc., Platform Science, Autonomic, Medtronic, NextEra Energy, Tesla, Novetta, Sirqul, Inc, Kwik Trip Inc, Particle, Rivian Automotive, Watts Water Technologies, Signify, Martin Engineering, TalentWerx, Terumo Medical Corporation, PepsiCo, Microsoft, Delta Faucet Company, Amazon.com Services LLC, Siemens, SunPower, Johnson Controls, Cummins Inc., BrightInsight, Losant, Pall, Allegion, Spireon, Lumin, Insight Enterprises, Inc., Alarm.com, Vodafone, Rad Power Bikes, Axon, ENEL, Schneider Electric, Precision Fermentation, Deeplocal Inc., Harbor Industries, Inc., Samsara, Ayla Networks, Prime Vision, Walmart, Xerox

ISO 38500 1 big thing: Interact with multiple stakeholders as business and architecture information gathering workshops and eliciting requirements.

705 words, 2.6 minutes read. By Gerard Blokdyk

ISO 38500 1 big thing: Interact with multiple stakeholders as business and architecture information gathering workshops and eliciting requirements.

The big picture: Develop and implement effective and reasonable policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and legal interpretation.

Why it matters: Invest in conducting reviews and doing post-review work for Enterprise Information Security Governance (identification, classification, protection, retention and disposition) for structured and unstructured environments.

Go deeper: Define the vision, strategy, and the implementation of the Information Security program in support of successful governance, execution and delivery of policy and standards.

Yes, but: Use data and insights to inform conclusions and support decision making and develop a point of view on key trends, and how they impact (internal) clients.

How it works: Ensure you aim to protect personal information by implementing and maintaining reasonable security, such as by using reasonable organizational, technological and physical safeguards appropriate to the sensitivity of the personal information you hold.

What we’re hearing: “Lead effort to prepare materials for weekly management meetings, including collecting information from organization leads and project managers and coordinating presentation materials with them., Service Support Manager

State of play: Work effectively across the business to facilitate information security risk assessment and risk management processes and ensure alignment between security, technical architecture, and coding processes.

Meanwhile: Make sure the Project Manager will be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting Information Technology projects, which have to be created or changed periodically.

Between the lines: Develop experience providing executive level leadership and management of enterprise- wide information technology resources, for a large, complex, geographically dispersed organization, to include IT infrastructure management and consolidation, enterprise applications, IT governance, enterprise architecture, integrated IT service delivery, IT security, and IT portfolio management.

The backdrop: Lead functional and or technical support to ensure business requirements of mission partners are delivered in the context of the Information Technology Solution.

On the flip side: Analyze, interpret, and create actionable information from the output of enterprise cybersecurity capabilities such as the Security Information and Event Management (SIEM) tool, endpoint security, network boundary protection, network intrusion detection, vulnerability scanning, and Security Content Automation Protocol (SCAP) compliance scanning.

Under the hood: Warrant that your company works with business/(internal) customers to implement the various governance and monitoring programs required to properly manage records in the lines of business and in Information Technology.


 


Get the ISO 38500 Kanban: Top ISO 38500 Must Haves

Look inside the ISO 38500 Kanban:



Learn the Top Emerging ISO 38500 Risks HERE: store.theartofservice.com/ISO-38500-critical-capabilities/

 

Top thinkers are using The Art of Service Kanbans, the Kanbans that are helping leaders stay ahead of what’s next.

This Kanban will help you plan your roadmap. The ISO 38500 Kanban enables leaders to shortlist hundreds of appropriate results, already prioritized.


Get Started:


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


Be smart: Conduct Assessments for PIT, Assessment and Authorization for PIT Systems and Assessment and Authorization for Information Systems to successfully obtain an Authorization to Operate.

The bottom line: Implement approved policies and procedures to ensure information security efforts system-wide are properly coordinated and in compliance to make recommendations for changes and improvements to reduce the overall security risk.

What’s next: Ensure your group supports compliance and manages the process of identifying risks related to the collection, storage, protection, access, use, and destruction of personally identifiable or sensitive information.

ICYMI: Ensure your software enables holistic and informed conversations about governance, risk and compliance and ensures CEOs, CFOs and the board have an integrated view of audit, risk, information security, ethics and compliance from across the organization.


Look inside the ISO 38500 Kanban:



Want to reuse this data? Purchase your license here:

One-time payment for perpetual commercial re-use


Questions? Email us HERE

 

Get started: store.theartofservice.com/ISO-38500-critical-capabilities/

 


Trusted by: FirstEnergy Corp, AE Stategies, LendingPoint, LLC, kraken, IBM, Micron Technology, IDC, CapB InfoteK, Mastery Logistics Systems, Inc., Accenture, McKesson, LumApps, Honeywell, Avery Dennison, Audible, Fidelity Investments, Olathe Public Schools, Amex, Emory University, Kajeet, Inc., Aruba Networks, Volkswagen Group of America, MasterBrand Cabinets Inc., Platform Science, Autonomic, Medtronic, NextEra Energy, Tesla, Novetta, Sirqul, Inc, Kwik Trip Inc, Particle, Rivian Automotive, Watts Water Technologies, Signify, Martin Engineering, TalentWerx, Terumo Medical Corporation, PepsiCo, Microsoft, Delta Faucet Company, Amazon.com Services LLC, Siemens, SunPower, Johnson Controls, Cummins Inc., BrightInsight, Losant, Pall, Allegion, Spireon, Lumin, Insight Enterprises, Inc., Alarm.com, Vodafone, Rad Power Bikes, Axon, ENEL, Schneider Electric, Precision Fermentation, Deeplocal Inc., Harbor Industries, Inc., Samsara, Ayla Networks, Prime Vision, Walmart, Xerox