784 words, 2.9 minutes read. By Gerard Blokdyk
ISO 38500 1 big thing: Evaluate the results of the assessment, advise management, and propose remediation solutions.
The big picture: Secure that your company monitors, evaluates and audits records maintained by service lines to ensure work processes and policies related to the records and information lifecycle are adhered to and documented.
Why it matters: Plan, scope, develop and invest in the coordination, execution, and communication of new, and ongoing Information Security you Compliance initiatives relevant to the implementation of Information Security you Compliance efforts.
On the flip side: Act as a liaison to the business and Information Security groups and lead them in the implementation of data security, compliance requirements, and information security technologies.
What they’re saying: “Make sure your staff operationalizes risk strategy and rationalizes security plans and goals into programs and projects that address system-wide risks, improves information security capability maturity, and supports long-term strategic initiatives.“, Principal/Staff Software Engineer (Device Software) – IoT Devices
Under the hood: Make sure the Information Technology Security Engineer is responsible for the operation of agency security infrastructure, technical security guidance in the application of best practices, and ensuring that the configuration of agency systems, applications and networks are in compliance with agency security policies.
Get the ISO 38500 Kanban: Top ISO 38500 Must Haves
Look inside the ISO 38500 Kanban:
Learn the Top Emerging ISO 38500 Risks HERE: store.theartofservice.com/ISO-38500-critical-capabilities/
Top thinkers are using The Art of Service Kanbans, the Kanbans that are helping leaders stay ahead of what’s next.
This Kanban will help you plan your roadmap. The ISO 38500 Kanban enables leaders to shortlist hundreds of appropriate results, already prioritized.
Get Started:
Questions? Email us HERE
Get started: store.theartofservice.com/ISO-38500-critical-capabilities/
The backdrop: Provide support for the information resource management activities for the organization across a diverse set of technological and business elements by applying sound information resource management tools and techniques.
Between the lines: Be confident that your company projects goals could be focused around people, process, or tools concerning IT Service Management (ITIL), HR Information Systems, (internal) customer Service Management, IT Security Operations, IT Governance Risk and Compliance, Facilities, Project and Portfolio Management, IT Financial Management, Organizational Change Management, and or IT Operations Management Oriented topics.
Go deeper: Establish that your strategy works across departments to facilitate cyber risk assessment and management processes to ensure consistent application of information security policies.
Yes, but: Develop, maintain and verify system protocols are consistent with organization policies and procedures for maintenance of all physical and electronic (internal) client records.
Be smart: Work with Product, Development, and Infrastructure to invest in the overall business technology planning, providing a current knowledge and future vision of technology and systems.
State of play: Collect information for each engagement from the Readiness Review team and the Engagement team to determine if any additional assets your organization is discovered that had not been identified on the data call; determine level of effort it took to complete the engagement, to include the final report; identify other information items related to engagements which could be useful to improve any of the processes used pre-engagement, during an engagement, or post engagement; and perform analytics on information gathered concerning engagements to further refine and improve processes related to support and performance of engagements.
Meanwhile: Check that your staff applies detailed technical knowledge to evaluate security controls on a variety of information system platforms Windows, Linux/Unix, etc.
How it works: Develop and implement procedures to track (internal) clients information technology assets to oversee quality control throughout the life cycles, whether purchased or leased.
The bottom line: Define relevant deployment metrics as you scale and evolve existing release metrics educate internal stakeholders by illustrating those trends with BI and data visualization tools.
What’s next: Be certain that your strategy partners with Business Sponsor, Stakeholders and SMEs and the Project Team to derive and define business requirements and drive functional and technical designs for Business Intelligence (BI) Solutions (Data Warehouse, ETL, Metadata, Operational/Tactical/Strategic Reporting, and Dashboards).
ICYMI: Safeguard that your organization is involved in implementation of IT governance best practices that drive meaningful improvements in the business value of data at an enterprise level.
Look inside the ISO 38500 Kanban:
Want to reuse this data? Purchase your license here:
One-time payment for perpetual commercial re-use
Questions? Email us HERE
Get started: store.theartofservice.com/ISO-38500-critical-capabilities/
Trusted by: FirstEnergy Corp, AE Stategies, LendingPoint, LLC, kraken, IBM, Micron Technology, IDC, CapB InfoteK, Mastery Logistics Systems, Inc., Accenture, McKesson, LumApps, Honeywell, Avery Dennison, Audible, Fidelity Investments, Olathe Public Schools, Amex, Emory University, Kajeet, Inc., Aruba Networks, Volkswagen Group of America, MasterBrand Cabinets Inc., Platform Science, Autonomic, Medtronic, NextEra Energy, Tesla, Novetta, Sirqul, Inc, Kwik Trip Inc, Particle, Rivian Automotive, Watts Water Technologies, Signify, Martin Engineering, TalentWerx, Terumo Medical Corporation, PepsiCo, Microsoft, Delta Faucet Company, Amazon.com Services LLC, Siemens, SunPower, Johnson Controls, Cummins Inc., BrightInsight, Losant, Pall, Allegion, Spireon, Lumin, Insight Enterprises, Inc., Alarm.com, Vodafone, Rad Power Bikes, Axon, ENEL, Schneider Electric, Precision Fermentation, Deeplocal Inc., Harbor Industries, Inc., Samsara, Ayla Networks, Prime Vision, Walmart, Xerox