Mitigation Action Plan
The Strategy and Plan
Vision empower women and girls across the world
Objectives: Teach girls at the start of their transition from youth into leaders we fondly refer to as "wicked women". Not wicked as in evil, but strong and committed women who are willing to take on the issues defined as wicked problems.
Women who can accelerate the balance between men and women in the workforce, which have acquired the vital skills in the latest ICT tactics.
A study was done on the skills acquired by graduates in the delivery of marketing roles. The numbers were dismal and we have a significant gap worth exploring. Marketing has traditionally been the biggest collector of personal identifiable information within most organizations. In fact, its just political suicide for anyone trying to transition marketing into better practices with regard to contact data.
ISACA produced an infographic on the skills we need from the computer science graduates in regard to security roles.
Less than 10% of the CS graduates are prepared to manage the traditional threat and defense tactics. Yes, we have few if any aware of the latest situations.
Fuzzy Security threats caused by using data or abuse of data in forced failures and by omission of data in places the source systems require.
The data relationship or where we turned information back into data and manage the parts as standalone requirements began when technology began to go into the business without the proper implementations.
Now, we have the standalone domains and platforms which perform in ways that are truly not intended to happen in the executive and management layers of any private or public sector organization or agency.
Corrective Action 1: Filter all Big Data in any big data store or any storage container in the cloud or traditional servers.
-
Measure all removed records or rows in a table, report to the SEC as part of the monitoring and logging of customer privacy and human rights contributions for civil society.
- The primary objective we want to meet would be to maintain the least risk within the organization as employee neglect no longer protects the board and executives (directors and officers insurance).
- Ensuring customers are not created in back end systems as another segregation of duties monitoring and prevention tactic we can measure and report. Key Control Design
Means of Implementation: Insert a new process using a filter on any acquisition of data or logs often associated with a person or the persons movements on the planet.
-
Measure all removed records or rows in a table, report to the SEC as part of the monitoring and logging of customer privacy and human rights contributions for civil society.
A separation of concerns
Management Capabilities integrate the mission critical points across business processes by acquiring the reference data from the source system ERP, then publishing as a header transaction across each phase in the life cycle of the transaction.
Understanding the importance of a viable master customer record at the time of quoting and acquiring the customers commitment to buy triggers a series of activities which each business function could begin and manage their service level agreements based on the early indicator.
Structuring the offers by three degrees of complexity, aligns to the same three types of risk, with three different customer market segments, and again with the maturity of the workers.
An opportunity header detail pushed to the various integrated forms or documents in the ERP system; empowers the cross-functional work to run in parallel and measuring against the customers expectations.
- Any material risk are identified and managed in high touch processes, while advanced and core offers run faster.
- Recovery Time Objectives (priority 1 mission critical)
Records Management
- All transactions must be validated before the close as the process of consolidated income statements must be retained for up to 10 years in their original format. Once validated the transaction becomes a record.
- Configuration Management
- Zero Data Loss (priority 1 mission critical)
- Financial Consolidation Capabilities
No delete functionality, only archive
- Change orders must be complete for any update and approved without back end processing.
- Segregation of Duties - users can only be in one of the two user groups
- Users must be organized by management capability
- Users must be organized by transaction capability
- Any change from the opportunity header must be in writing by the customer
- The customer header and offer type allows some internal variables to work with, while maintaining the integrity of an integrated order management system.
- Application change procedures (IT)
- ERP as the governed and P1 application
- Any software enhancement or change to the features and functionality requires full sox control testing.
- Any Sox control test requires full integration testing.
- Any integration test requires full table top resilience testing.
- Any subscription from an EDW transactional or business intelligence application requires reference data services published to an in memory service.
- Privacy and Security
- Managing the scope within the five capabilities enables an identity service to authenticate
- Managing the records to data services enables Roles Based Business services
- Configuration Management
- All transactions must be validated before the close as the process of consolidated income statements must be retained for up to 10 years in their original format. Once validated the transaction becomes a record.

No comments:
Post a Comment