31
Best Practice Business Information Technology Presented by: Micheal Axelsen Director Applied Insight Pty Ltd

Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Best Practice Business

Information Technology

Presented by: Micheal Axelsen

Director

Applied Insight Pty Ltd

Page 2: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

INTRODUCTION

Page 3: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

About this presentation

Objectives

• To provide an overview of what's on the horizon in the next

generation of IT for business, and how to prepare your business to

take advantage of these future IT advances.

Agenda

• Next generation IT - what's on the horizon in the next 2 - 5 years

• Managing risk and protecting your systems in a wireless and mobile

environment

• System selection for your business

• Getting your systems right

– Creating opportunities to develop your business

– Maximising your return from your technology investment

• Conclusion – meeting the challenges of IT

Page 4: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

About the speaker

Services

• Micheal Axelsen provides consulting services in

the business governance of information

technology, and the development and

implementation of information technology business

strategy

Position and qualifications

• Director of Applied Insight Pty Ltd

• Chair of CPA Australia Information Technology &

Management Centre of Excellence

• Qualifications

– Bachelor of Commerce (Hons)

– Masters of Information Systems

– CPA (Specialist in Information Technology)

Page 5: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

NEXT GENERATION IT

Page 6: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Advances in technology

On crystal ball gazing

• Looking into the future is fraught with danger, and will probably miss

some things

• That said, let’s get the crystal ball out

Major themes for the next two to five years

• Mobility & Convergence

• Innovation is not on the desktop

• Social networking & social media

• Data privacy and quality

Page 7: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Mobility & Convergence

Page 8: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Innovation is not on the desktop

Page 9: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Social networking & social media

Page 10: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Data privacy and quality

Data privacy

• Far more data stored than ever before

• Identity theft and data loss

• Secure access is increasingly necessary

• International trend to increased privacy

requirements

Data quality

• Increasing reliance upon data

• Systems are less forgiving of poor data

• Data’s fitness for the intended use in operations,

decision making & planning

• National Privacy Principles

• Sarbanes Oxley and audit & governance requirements

Page 11: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

MANAGING RISK IN A

CONNECTED WORLD

Page 12: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Wireless networks

General advice

• Monitor your internet bill & router log for usage

• Ensure you have a firewall between the wired and the wireless

Internet connection to prevent intruders from accessing your

network

• Firewall between wired & wireless networks, and the internet

Wireless networks

• Change the default security settings as these are well known and

may allow intruders access to your network

• Secure wireless traffic through WEP (Wired

Equivalent Privacy)

• Minimise the transmission range of your

wireless network

Page 13: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Wireless networks

Secure wireless devices

• Wireless comes with many machines by

default – turn it off if there’s no legitimate

need (otherwise, people can browse through

other networks and get past your security).

• Don’t superglue anything!

• Intel vPro allows hardware-level access to

remote laptops and desktops.

• The Laptop Guardian from Lucent

technologies provides a complete

control option for laptops – if this is

that important to you!

Page 14: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Mobile & remote manageability

Mobile machines

• Easily lost so - backup, backup, backup!

• Consider what happens if a Blackberry or USB key falls into the

wrong hands or is lost!

• Remote kill features for mobile devices

• Buy robust machines that will survive

• Consider disk encryption – BIOS

passwords are no use

• Telework implications and the

mobile environment

• iPod slurping (and digi-cam slurping)

Page 15: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Being clear about policy

Consumer mobile technologies

• People can easily circumvent the rules you put in place

and bring consumer technologies in

• Need clear policies and they need to be enforced

• They also need to be sensible and match the risks

• The reasons why:

– Can walk out with all your files

– Could carry viruses, trojans, etc

– Can install software on machines

that create headaches for IT

Page 16: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

SYSTEM SELECTION

Page 17: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Assessing systems

Page 18: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Market scan, Vendor focus

Focus upon

• Risk reduction

• Vendor knowledge of your industry

• Quality of named clients

• Short-list quickly

• Vendor compatibility with your business

• Strategic plans of vendor and software

• Vendor client testimonials

• Good software is good, but not as good as bad software

is bad...

Page 19: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Market scan, Vendor focus

How to carry it out

• Document the drop-dead, showstopper issues

• Understand your budget

• Document technical considerations

• Document your expectations from the vendor

• Identify known options

• Develop your Request for Information & forward to

vendors

• Rate, weight & score

• Move to next phase

Page 20: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Market scan, Vendor focus works better

The reasons why

• Long-term relationship with the vendor

• Vendor’s ability to work with your business

• Makes the vendor think outside of the

square

• Focus on vendor’s proven capability

• Less resource intensive

• Shorter timeframe to get to a short-list

Page 21: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

CONCLUSIONGETTING YOUR

SYSTEMS RIGHT

Page 22: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

What strategic effort fits your business?

Page 23: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

What is your organisational focus?

Page 24: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

People Process Technology

Page 25: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Scenarios - improving incrementally

Incremental, flexible

• Identify chokepoint

• What is the key impact?

• Devise a solution

• Implement

• Review

Selling stuff

• Salesforce automation

• Electronic mobile

workflow

Doing stuff

• Location based services

• Digital evidence

gathering

Administering stuff

• Fixed mobile

convergence

• Teleworking technologies

Page 26: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Turning strategy into action

Page 27: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Rightsourcing ICT

Page 28: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Turning strategy into action

Page 29: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

CONCLUSION

Page 30: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

Conclusion – meeting the challenges of IT

Information Technology & Management Centre of Excellence

Forthcoming: Social networking policies & procedures

Page 31: Best Practice Business Information Technologymichealaxelsen.com/docs/20080506_best_practice_business_it.pdf · • People can easily circumvent the rules you put in place and bring

CONTACT DETAILS

Micheal Axelsen

Director, Applied Insight Pty Ltd

m: 0412 526 375

t: +61 7 3139 0325

e: [email protected]

blog: www.michealaxelsen.com

Applied Insight Pty Ltd

PO Box 603

Toowong DC 4066

AUSTRALIA