Business Intelligence Plan

1587 Words7 Pages
The objective of this Business Intelligence (BI) plan is to encourage outsourcing and offshoring information security (IS) pursuits. The plan provides guidelines for successful implementation of IS systems intended to diminish security risks. The anticipated audiences of this BI plan are chief information officers (CIO) and chief information security officers (CISO). Senior management has an obligation to streamline information technology (IT) budgets, defend spending, and augment service delivery and efficiency (NASCIO, 2008). BI plans are usually comprised of (a) software, hardware, network, and associated infrastructure; (b) data analyses applications; and, (c) a portal or dashboard with which users interact (Hennen,
…show more content…
On the other hand, several companies elect to relocate their operations to offshore locations but maintain control over their infrastructure, staff and processes (Thompson, 2013). Nevertheless, companies must manage the risks associated with protecting their assets and their data while abiding by the innumerable regulations and laws that regulate their business. This BI plan centers on stratagem for updating technical hardware, software, service, and expertise employed in the decreasing of IS risks. The security services may necessitate added hardware resources. Therefore, vigilantly appraise hardware requisites and ascertain that ample computing resources are accessible subsequent to project commencement (Bass, 2013). Furthermore, incorporate capital expenses for any hardware or software purchases for factoring into the concluding determination (Bass, 2013).
Outsourcing and Offshoring
As reported by SupportWorld, “among organizations that outsource IT work, the percentage of their total IT budget going to service providers rose at the median from 6.1 percent in 2009 to 7.1 percent in 2010 and then jumped to 8.6 percent in 2012” (Thompson, 2013). These figures articulate to a rising trend in IT outsourcing where increased offshoring and/or outsourcing of services operations has altered the IT service customs from internal command and control of IT assets to IT service as a utility (Thompson, 2013).
Get Access