Tulsa TechFest 2015
Jamey Tiffee, IT Manager, OK Data Solutions
Over the years I have watched as IT has gone from 5" floppies to the "World Wide Web" to "Big Data" to wherever we can imagine. As a Professor and Chairman at ITT Technical Institute I brought students into this world of technology I love.
Assess Your Current IT Security State
This presentation is designed for IT and business leaders to assist in developing or improving their current security strategy.
Assess the current state Define the security obligations, scope, boundaries, and current security capabilities and maturity.
Security obligations statement
Security scope and boundaries statement
Security capabilities and performance report
Establish the target state Develop a security target state based on the organization's security risk profile and conduct a gap analysis.
Organization's security risk profile
Security future state
Future state?current state gap analysis
Initiatives to address the gap
Assess your organizational readiness Assess the effort needed for security initiatives and identify the organization's readiness to implement those initiatives to develop a feasible implementation plan.
Estimated effort needed
Motivational and culture readiness analysis
Budget and resource readiness analysis
Implement option determined
Plan for the transition Build a security roadmap, action plan, and communication plan to implement your security strategy. Develop a metrics program to measure your progress.
Security action plan
Change and communication plan
Security strategy and roadmap deck