Preview

Virginia Information Technologies Agency Case Study

Satisfactory Essays
Open Document
Open Document
377 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Virginia Information Technologies Agency Case Study
What is VITA? The Virginia Information Technologies Agency (VITA) is an executive department located in Chester, VA. VITA is the commonwealth's consolidated information technology (IT) organization. VITA’s responsibilities fall into four primary categories:
• Governance of the commonwealth's information security programs in provision of the obligations of the Chief Information Officer, Nelson Moe, of the Commonwealth;
• Operation of the IT infrastructure, which consist of all related personnel, for the executive branch agencies declared by the legislature to be "in-scope" to VITA;
• Governance of IT investments in support of the duties and responsibilities of the Information Technology Advisory Council and the Chief Information Officer of the Commonwealth;
• Procurement of technology for VITA and on behalf of other state agencies and organizations of higher education.
…show more content…
Under the Chief Information Officer of the Commonwealth, VITA is organized into seven board of directors, with functional leads for reporting and planning purposes. As service management executive duties are captivated by other executives and transitioned to the platform relationship office, the executive has a dotted line to the CIO (See Figure 1 above). The service management executive administers the current IT infrastructure contract, which is expiring and will be exchanged with a multi-sourcing

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    IT governance recently has raised many companies’ concern with its advantages including balancing companies’ priorities for scale and IT standardization, leverage IT innovation in Business to support companies’ operation and strategic growth. WestJet, as one of the most competitive international airline has invested much to the improvement of technological development. However, it now faces a great challenge during the transition into codeshare that they have no idea whether they have a great IT, if not, how to improve it to bring this company to where it need to be. This assignment is going to illustrate the key strengths and challenges of WestJet, the IT management condition and some of personal suggestions to improve the IT governance.…

    • 1240 Words
    • 5 Pages
    Better Essays
  • Good Essays

    1. Information Systems Manager. The objective of this project is to develop an integrated system to improve day-to-day operations of Spa Works as well as to offer better reporting in the accounting and human resources. As a result, the IS manager of Spa Works has been chosen to serve on the committee to ensure the strategic IS planning is aligned with the company’s overall strategy. IS manager will advise on the hardware and software (software upgrades) that must be purchased to ensure smooth functionality of the system applications. The IS manager will also endorse an effective and efficient system design so that everyone across the organization is able to use it trouble-free. Being on the advisory board, IS manager will facilitate proper security and recovery software and will develop strategies for training the existing and new personnel if required. Spa Works’ IS manager will also ensure that a set of adequate IT policies is in place and the new system complies with…

    • 1046 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Information Security Policy creates a framework to protect the Council’s information, whether electronic or paper based from any form of threat, including both internal, and external, deliberate or accidental. It ensures that any data or information held is protected from unauthorised access and that its integrity and confidentiality is maintained.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Cookies Are Us Case Study

    • 436 Words
    • 2 Pages

    | Capability to support multiple departments or even customers or partners that use the common physical infrastructure along with employees.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Virginia Plan, drafted by James Madison and proposed at the Constitutional Convention by Edmund Randolph, was to install a national government with a bicameral legislature and was to be comprised by representative that held seats, in the new congress, in proportion to each states population. After the delegates at convention accepted the Virginia Plan as a basis to build on the national government, debate quickly arose against the share of distributed legislative power the northern states would have over the southern states to make national policy. This was due to the northern states having much larger populations than those of the south, but since the southern states had amassed a large number of slaves, it was believed that the southern representation in congress should also include the slave population. The northern states were opposed to this idea given that slaves were generally…

    • 469 Words
    • 2 Pages
    Good Essays
  • Good Essays

    • Over 35,000 employees, 200 offices coast-coast and 100+ countries with divisions including Security Services, Nuclear Security and Energy Consulting, Government Services, Automated & Integrated Security, Security Management Systems, and Consulting and Investigation…

    • 929 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Security Organization Provides information on the structure of the information security organization and individuals that fulfill the information security role Scope  This Information Security Policy applies to the City of Chicago, its departments, commissions, boards, offices, and agencies, and all officers, employees, temporary employees, interns, vendors, consultants, contractors and agents thereof--collectively referred to as ―User(s)‖. The principles set forth in this Policy are applicable to all information technology and assets, in all…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Key Issues At NAF, delivering value with IT is about more than delivering projects on time and on budget or having a good IT development shop. They have all this but theres still not enough value getting delivered. This case explores the questions of who is responsible for delivering value with IT and when IT value is delivered. It emphasizes that value delivery should be a business-IT partnership responsibility and will require change in the business over time. The first part of this case looks at the relationship between business strategy and IT development projects. It makes it clear that enterprise business strategies need enterprise solutions and a procedure for matching these. It also introduces the concept that investing in IT infrastructure and keeping it current is an important component of being able to deliver value. This case speaks directly to the disconnect between IT budgeting practices and financial and business strategy implementation. The case describes how lack of clearly defined expectations, effective governance, and accountabilities can undermine the business-IT relationship and lead to a lack of trust. The case illustrates the need to reduce the proportion of the IT budget spent on maintenance matters and the need for reduction of the complexity of the applications portfolio in order to free up resources to use on discretionary, strategic IT projects. Discussion Questions Cathy Benson, the Director of the newly created IT Investment Office, is tasked with the design and implementation of a detailed investment optimization process to be implemented throughout the bank in time for the next budget cycle. She has three months to do this and it must be in accordance with the five established principles to guide the banks IT investment process. Your task is to design and implement inst/ingeneral-problem idch05genqq01 label1 maxpoints1questionparaDesiA thorough and rigorous method of project categorization and…

    • 1109 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Ms. Cole’s issues should be addressed in a timely manner. The first issue at hand is the need for a clearly defined description of her position and the duties for which she is responsible. Because she is the chief information officer, she has complete authority over the IT personnel. Ms. Cole will act as coordinator between her personnel and the departments within the bank. Although they report directly to her, each IT tech would also report to the department manager to which she has assigned them. The technician in each department will be responsible for passing along pertinent information to the department manager as well as the staff in their respective department. Any ideas for upgrades will be presented to the department manager for approval before proceeding with upgrades. Coordination between…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ICT investment trends in Australia - Enterprise ICT spending patterns through to the end of 2015…

    • 843 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Acenture Business Case

    • 5114 Words
    • 17 Pages

    Services: This unit usually focuses on the outsourcing engagements in the areas of maintenance, business operations, IT and Application development, HR and help desk services. Sometimes they also work as an internal Enterprise team.…

    • 5114 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    for staff and line agencies for advising the chief executive and in carrying out his…

    • 20206 Words
    • 81 Pages
    Good Essays