Category Archives: Security Policies and Compliance


Lean Six Sigma Implementation in IT Operations

Lean Six Sigma has been around for quite some time and is now starting to be used in IT Operations more often to provide ITSM success.  The implementation of Lean Six Sigma for the most part into the daily IT Operations has been proved fruitful for companies because the strengths of Six Sigma which lies in the data driven approach. It has supported in minimizing the Project Duration and the Lean Six Sigma framework can be used by IT professionals towards challenges and overcome solutions for tomorrow.

Lean Six Sigma is a defect reduction methodology that can transform organizations to focus on the quality of the customer experience, Lean Six Sigma aims to measure and improve both internal processes, such as network speed and reliability, and line-of-business processes in which IT has a role.

 

In this challenging World, IT and the management of information must be handled with care and … Read the rest


Best Practice Checklist For Business Continuity

No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process.  The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic BCP process has been initiated and the Division management has considered what needs to be done to keep essential functions operating if an adverse event occurs.  The checklist is somewhat “information centric” as organisation’s reliance on information is increasing and its successful management provides competitive advantage.

Program Initiation and Management (Pre-Planning)

  • Establish the need for Business Continuity Program
  • Scope of legal and regulatory authority
  • BCP Sponsor (Senior Management)
  • Business Continuity Steering Committee (5-8 people)
  • BCP protects core assets

 

Risk Evaluation and Control (Pre-Planning)

  • Prioritize planning and resource allocation
  • Identify and mitigate exposures
  • Identify the threats, risks and vulnerabilities
  • Gather information
Read the rest