8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 1/13
!"#$%"& ()*+),-&
.-/0 123"00
4+)"5 6"*/7)$8 9:*"7(-8 ;<=>
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 2/13
?$ - %0-&*"
• =@ A*+220A -&B *200","A• (-C27 D"B)*-0 *"&$"7 E-&B D"B)*-0 A*+220F• G&B"7,7-B/-$"H ;IJ><I• %7-B/-$" -&B K725"AA)2&-0H =LJ>;I• M2$-0 5-*/0$8 -&B A$-NH >;J;II• O&527D-P2& -&B M"*+&202,8 6"7Q)*"AH RI<<• O&527D-P2& -&B O&57-A$7/*$/7" ?AA/7-&*"H ;=• ?&&/-0 S#K"&B)$/7"H TUVIW
;
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 3/13
NextGen Michigan Strategy
Shared Infrastructure
Unit Products And Services
Shared Productsand Services
NextGen Michigan
Rationalize IT Across CampusITS Campus
Alignment and Culture GovernanceOrganizationalStructure
X
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 4/13
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 5/13
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 6/13
6"7Q)*"A 97)"&$-P2&
M+" !"#$%"& A$7-$",8H – ]-P2&-0)^" OM – O&Q"A$ )& A+-7"B A"7Q)*"
– ["0)Q"7 !"#$ %"&"7-P2& OM A"7Q)*"A
9/7 A"7Q)*" A$7-$",8H – Y2*/A"A 2& $+" Z/A)&"AA Q-0/"
– ?0),&A 2/7 A"7Q)*" B"0)Q"78 $2 /A"7 &""BA – (-&-,"A A"7Q)*"A &2$ K72B/*$A – W/&B0"A $"*+&202,8 -&B K72*"AA
U
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 7/13
ServiceProvider
Roles
ServiceSupportFunctions
6"7Q)*" ]20"A -&B .W]( (2B"0
Plan Build Run Manage
Project and Portfolio Mgmt Ops & Availability
Finance
HR
Supplie 7R"0-P2&AM,D$
Customer Relationship Management
Enterprise Architecture ITSM
Product Manager
Service Portfolio Owner
Service Owner
Service Mgr
Solution Architecture
Technical/Component Lead
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 8/13
IT Shared Services
• End-User
Computing• Network• Storage• Server• Security
Projects New Services
_
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 9/13
"# $%&'("#) %$$%*#"+, $%(-"&%$Y/&B-D"&$-0J Z-A)* A"*/7)$8 A"7Q)*"A 527 $+" "&P7" *-DK/A 7",-7B0"AA 3+"$+"7 -/&)$ -B2K$A A+-7"B OM A"7Q)*"AV O& $+" *2DD2& ,22BV
` 42DK0)-&*" %/)B-&*"
` ["Q"02KD"&$ 25 .20)*)"AJ 6$-&B-7BAJ -&B %/)B"0)&"A
` 1-7B"&)&, %/)B"A
` ]S49! -A - 6"7Q)*"
` 6"*/7)$8 O&*)B"&$ ]"AK2&A"
` SB/*-P2& -&B ?3-7"&"AA
` W-A)* !"$327\ (2&)$27)&, -&B .72$"*P2&
` a/0&"7-Z)0)$8 6*-&&)&,
@
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 10/13
b+"& - /&)$ -B2K$A $+" ()b27\AK-*"J ()6"7Q"7J ()[-$-Z-A" 27 2$+"7 A+-7"B OMA"7Q)*"J OO? $7-&A)P2&A 572D -& OM A"*/7)$8 K-7$&"7 $2 $+" /&)$cA K7)D-78 OM AA"7Q)*" K72Q)B"7 527 $+2A" A8A$"DAJ A"7Q)*"AJ -&B -KK0)*-P2&A $+-$ OM6 D-&-,"
` 42DK0)-&*" E"V,VJ 1O.??J S?]dOM?]J YS].?F e
` SB/*-P2& -&B ?3-7"&"AA e
` S&+-&*"B !"$327\ (2&)$27)&, -&B .72$"*P2&
` ])A\ (-&-,"D"&$
` 1-7B"&)&, e
` [-$- f2AA .7"Q"&P2&
` a/0&"7-Z)0)$8 (-&-,"D"&$
` O&527D-P2& ?AA"$ 40-AA)g*-P2& 25 6"&A)PQ" 68A$"DA
$.+(%/ "# $%&'("#) $%(-"&%$
=<
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 11/13
G&)$A 3+2 B2 &2$ -B2K$ ()b27\AK-*" 27 2$+"7 A+-7"B OM A"7Q)*"AJ 27 +-Q")&57-A$7/*$/7"dA8A$"DA 2/$A)B" 25 $+"A" A"7Q)*"AJ *-& -*h/)7" 527i5"" A/KK27$572D OO? $2 D""$ $+")7 /&)h/" /&)$ &""BAV
` OM 6"*/7)$8 42&A/0P&,
` OM 6"*/7)$8 [)A-A$"7 ]"*2Q"78dW/A)&"AA 42&P&/)$8 E[]W4F .0-&&)&,
` OM 6"*/7)$8 S$+)*-0 1-*\)&,
+//"#"0*+, "# $%&'("#) $%(-"&%$
==
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 12/13
1234
"# $5635789
$76:;<7 1=6>=2;= 1234"4:7?5@745 1234
%4576A6;?7 +6<B;57<5C67 D
E;<B;834 "#
FC;2G D /7A2=9
16=863@H16=I7<5E34387@745
+6<B;57<5? D %48;4776?
FC;2G D /7A2=9
&B3487 E34387@745
(C4
'?76 $CAA=65 ?76:;<7?
"4J63?56C<5C67 D *75K=6L0A763M=4
+AA2;<3M=4? D"4J=6@3M=4 $76:;<7?
$76:;<7 E34387@745
"44=:357
#73<B;48 D ,7364;48%<=?9?57@
(7?736<B $76:;<7?
S#"*/PQ" 9:*"7AJ ["-&A
j %2Q"7&-&*"
%"&"7-0 Y/&B
.72C"*$ 93&"7A
4-K)$-0
S&B GA"7A
W/A)&"AA 93&"7A
42A$ ]"*2Q"78
Y-*/0$8
]"A"-7*+"7A
%"&"7-0 Y/&B42A$ ]"*2Q"78
$5635789 D &=@@C4;59 (7A7353N27 16=<7??7?&2=CG O;6?5
$76:;<7 O;6?50A763M=432 %P<72274<7
"44=:3M=4
4O9
?AA/7-&*"
Y)&-&*" j Y-*)0)P"A1]J 97, ["QJ j42DD/&)*-P2&A
0NI7<M:7?=V Y2*/A 2& ()AA)2&;V Y2*/A 2& 6"7Q)*"AXV 9K"7-P2&-0 S#*"00"&*"
>V OM 6$7-$",8
=;
8/11/2019 Information Security in the Future IT Organization (237190670)
http://slidepdf.com/reader/full/information-security-in-the-future-it-organization-237190670 13/13
"# Q0-%(*+*&% $#('&#'(%
=X
Top Related