IntroductionThe objective of this Business Intelligence (BI) plan is to encourage outsourcing and offshoring of information security (IS) activities. The plan provides guidelines for effective implementation of IS systems intended to reduce security risks. The intended recipients of this BI plan are Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs). Senior management has an obligation to rationalize information technology (IT) budgets, defend spending, and increase service delivery and efficiency (NASCIO, 2008). BI plans generally consist of (a) software, hardware, network, and associated infrastructure; (b) data analytics applications; and (c) a portal or dashboard with which users interact (Hennen, 2009). The launch and analytics teams function provides IT professionals with vital information to ensure successful plan execution. Therefore, adhering to the recommendations included in this plan will help ensure the selection of the most suitable provider. The objective of the assigned research was to present a BI plan to the CIO in an effort to promote outsourcing and offshoring of IS activities. Topics include (a) strategies for upgrading technical hardware, software, services, and knowledge used in reducing information security risks; (b) the role of launch and analysis teams of IT professionals working with national and international vendors; and (c) associated costs, coordination and control process, training programs and audit methods. Business Intelligence Plan While companies seek cost savings and operational efficiencies with their current business processes, they often engage domestic or international service providers to achieve additional cost savings. ..... half of the paper ...... w.tenable.com/blog/enhanced-botnet-detection-with-nessusThompson, S. (2013, January). Business Intelligence: the power of IT services. Retrieved from http://www.servicemanagement101.com/files/hdi-sw-janfeb13-lmco.pdf Tsai, W., Leu, J., Liu, J., Lin, S., & Shaw, M. J. (2010). An MCDM approach for deciding the mix of sourcing strategies in IT projects. Expert Systems with Applications, 37(5), 3870-3886. doi: 10.1016/j.eswa.2009.11.031Vivek, S. D., Richey, R. G., & Dalela, V. (2009). A longitudinal examination of partnership governance in offshoring: A moving target. Journal of Business, 44(1), 16-30. doi: 10.1016/j.jwb.2008.03.017Weiss, A. (2013). A denial of service attack can compromise your organization's website and network services - here's how to defend yourself. Retrieved from http://www.esecurityplanet.com/network-security/how-to-prevent-dos-attacks.html
tags