blog




  • Essay / Business Intelligence Plan - 1594

    IntroductionThe objective of this Business Intelligence (BI) plan is to encourage the outsourcing and offshoring of information security (IS) activities. The plan provides guidelines for successful implementation of IS systems intended to reduce security risks. The expected audiences for this BI plan are Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs). Senior management has an obligation to streamline information technology (IT) budgets, defend spending, and increase service delivery and efficiency (NASCIO, 2008). BI plans typically include (a) software, hardware, network, and associated infrastructure; (b) data analysis applications; and (c) a portal or dashboard with which users interact (Hennen, 2009). The Launch and Analysis Teams feature provides IT professionals with vital information to ensure successful execution of the plan. Therefore, following the recommendations included in this plan will help ensure the selection of the most appropriate supplier. The objective of the research mission was to present a BI plan to the CIO with the aim of promoting the outsourcing and offshoring of IS activities. Topics include (a) strategies for updating technical hardware, software, services, and knowledge used to reduce information security risks; (b) the role of launch and analysis teams composed of IT professionals working with national and international suppliers; and (c) associated costs, coordination and control process, training programs and audit methods. Business Intelligence Plan As companies seek cost savings and operational efficiencies with their current business processes, they frequently engage service providers domestically or internationally to achieve additional savings. ..... middle of document......w.tenable.com/blog/enhanced-botnet-detection-with-nessusThompson, S. (January 2013). Business Intelligence: the power of IT services. Retrieved from http://www.servicemanagement101.com/files/hdi-sw-janfeb13-lmco.pdf Tsai, W., Leu, J., Liu, J., Lin, S., and Shaw, M.J. (2010). An MCDM approach for procurement strategy mix decision in IT projects. Expert Systems with Applications, 37(5), 3870-3886. doi: 10.1016/j.eswa.2009.11.031 Vivek, SD, Richey, RG, & Dalela, V. (2009). A longitudinal examination of partnership governance in offshoring: a moving target. Journal of World Affairs, 44(1), 16-30. doi:10.1016/j.jwb.2008.03.017Weiss, A. (2013). A denial of service attack can disrupt your organization's website and network services: here's how to defend yourself. Retrieved from http://www.esecurityplanet.com/network-security/how-to-prevent-dos-attacks.html