Cyber Security and IT Security Management Program
-
Upload
medard-sotta -
Category
Education
-
view
423 -
download
2
Transcript of Cyber Security and IT Security Management Program
2016
Medard C. Sotta
MeU & GIIM
CYBER SECURITY AND INFORMATION TECHNOLOGY
SECURITY MANAGEMENT PROGRAM
2
Table of Contents Table of Contents ............................................................................................................................... 2
Introduction....................................................................................................................................... 4
Video Presentation.......................................................................................................................... 4
Programs ........................................................................................................................................... 5
Foundation of Cyber Security ........................................................................................................... 5
Objectives.................................................................................................................................. 5
Ethical Hacker ................................................................................................................................. 6
Topics Covered........................................................................................................................... 5
Computer Hacking Forensic Investigators ......................................................................................... 8
Topics Covered........................................................................................................................... 8
Incident Response and Disaster Recovery ......................................................................................... 9
Topics Covered........................................................................................................................... 9
Network Security Administration ................................................................................................... 10
Topics Covered......................................................................................................................... 10
Secure Programming Concepts ...................................................................................................... 12
Objectives................................................................................................................................ 12
Certification & Accreditation ............................................................................................................ 13
Trainers/Program Instructors ........................................................................................................... 14
Professor Jerry Luftman, PhD ......................................................................................................... 14
Present Position ........................................................................................................................ 14
Curriculum Vitae ....................................................................................................................... 14
Professor Christine V. Bullen, PhD .................................................................................................. 15
Present Position ........................................................................................................................ 15
Curriculum Vitae ....................................................................................................................... 15
3
Bruce J. Rogow.............................................................................................................................. 19
Curriculum Vitae ....................................................................................................................... 19
Professor Terry Savage .................................................................................................................. 21
Curriculum Vitae ....................................................................................................................... 21
Delivery Module .............................................................................................................................. 25
Testimonials .................................................................................................................................... 26
Contacts us ...................................................................................................................................... 31
4
INTRODUCTION
Information technology security has been among the top ten management concerns since the 1980’s.
Technologies such as computer networks, PCs, the web, and more recently SMAC (Social, Mobile,
Analytics, Cloud) along with SCADA/Internet of Things continually bring new security considerations to
organizations.
These technologies in concert with changes in regulations, especially in light of the growth of valuable
and sensitive information assets stored by organizations such as individuals’ taxes, financial assets,
medical records, job performance reviews, trade secrets, new product developments, and customer
data, demand a strong focus on security management; the protection of data/information/knowledge.
The threat of invasion by cyber criminals (e.g., governments, competitors, individuals) continues to
grow.
No one can escape cyber-attacks, and the fact that it is hard to find trusted people who are expert in this
new art of war has driven the demand for security professionals to an all -time high. Many companies
are starting to address this issue with the new understanding that constant and ongoing vigilance is the
only way to protect infrastructure and data in the long term.
The purpose of this program is to help organizations meet this increased demand for information
security professionals by preparing attendees/participants via a comprehensive, in-depth, practical set
of courses addressing the entire infrastructure (e.g., data, network, web, applications, systems), as well
as the management, organizational, and legal issues.
Video Presentations
“Why a Program in Cyber Security is Essential in Today’s Dynamic Environment” - Professor Sam S. Gill
“GIIM Cyber Security” - Professor Allen C. Johnston, PhD
5
PROGRAMS
1. Foundations of Cyber Security
This 24 hour introduction to information security provides the foundation for understanding the
planning and implementation of policies and procedures for protecting information assets, determining
the levels of protection and response to security threats and incidents, and designing an appropriate
information security system. Candidates will gain an overview of the field of information security and
assurance, and will also learn the necessary knowledge to engage in information assurance activities and
procedures. Coverage will include inspection and protection of information assets, detection of and
reaction to threats to information assets, examination of pre- and post-incident procedures, technical
and managerial responses, and an overview of the information security planning and staffing functions.
Instructors will also introduce the role of the Chief Information Security Management Officer (CISMO).
Candidates will also master risk management, security planning, and security policy enforcement and
auditing activities. Candidates will learn about security guidelines, regulation and legal implications, and
standards that apply in information security management, as well as information confidentiality, data
integrity, and system availability. The course also presents related concepts such as privacy and business
continuity planning. While emphasis is placed on managerial and operational security controls, the
course also provides an overview of the current and emerging technical security controls applied to
access control, operating systems, applications, networks/web, cryptographic solutions, intrusion
detection systems, physical security, wireless security, VPNs, digital forensics, and related topics.
The primary objectives of the course are to:
Understand the importance of information security in business continuity
Critically analyze security threats and define appropriate technical and managerial controls for these
threats
Understand procedures for ensuring compliance with security policies and standards, establish
appropriate systems and plans for security implementation
Identify legal implications of security and standards for security management
Recognize the management, organizational, and sourcing considerations for having an effective
information security program
Describe audit and recovery approaches for coping with security breaches
6
2. Ethical Hacker
This 40 hour course offers a comprehensive guide for ethical hacking. An ethical hacker is defined as
someone who uses the same methods as criminal attackers use to exploit vulnerabilities in a network
accessible to them. The difference is that an ethical hacker performs these “attacks” in order to
document whether a network can be breached by known vulnerabilities in order to mitigate the attack
vector they expose.
Topics covered include:
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans and Backdoors
Viruses and Worms
Sniffers
Social Engineering
Denial of Service
Session Hijacking
Hacking Webservers
7
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Evading IDS, Firewalls, and Honeypots
Buffer Overflow
Cryptography
Penetration Testing
8
3. Computer Hacking Forensic Investigators
This 40 hour course presents a detailed and methodological approach to computer forensics and
evidence analysis. This will enable candidates to understand the often complex issues associated with
investigating cybercrimes, handling of digital evidence, detection methods and proof, in a variety of
digital forensic contexts, including computers, networks and portable digital devices. Each module will
build upon the knowledge gained from previous modules. This course will introduce cutting edge
technologies and methodologies, alongside fundamental building blocks, all owing candidates to
simultaneously understand the theory and practical aspects in dealing with digital investigations.
The primary topics covered in the course are intended to prepare candidates to:
Understand the function and limitations of forensic investigations.
Understand procedures used in conducting forensic investigations.
Guide first responders towards successful data acquisition and preservation.
Describe digital forensics and relate it to an investigative process.
Explain the legal issues of preparing for and performing digital forensic analysis based on the
investigator's position and duty.
Be aware of (digital) evidence storage preparation and requirements.
Perform basic digital forensic investigations.
Demonstrate use of digital forensics tools and their underlying principles.
Size and set up a digital forensic lab.
Conduct simple binary analysis on files with unknown and possible malicious functionality.
Recognize the state of the practice and the gaps in technology, policy, and legal issues.
9
4. Incident Response and Disaster Recovery
This 24 hour course examines detailed aspects of incident response and contingency planning consisting
of incident response planning, disaster recovery planning, and business continuity planning. Developing
and executing plans to deal with incidents in the organization is a critical function in information
security. This course focuses on the planning processes for all three areas of contingency planning,
incident response, disaster recovery and business continuity, and the execution of response to human
and non-human incidents in compliance with these policies.
Topics covered include:
An Overview of Information Security and Risk Management
Planning for Organizational Readiness
Contingency Strategies for IR/DR/BC
Principles of Incident Response and Disaster Recovery
Incident Response: Detection and Decision Making
Incident Response: Organizing and Preparing the CSIRT
Incident Response: Response Strategies
Incident Response: Recovery and Maintenance
Disaster Recovery: Preparation and Implementation
Disaster Recovery: Operation and Maintenance
Business Continuity Planning
Crises Management and International Standards in IR/DR/BC
10
5. Network Security Administration
This 40 hour course offers a comprehensive guide for understanding information systems network
security management. It provides an introduction to the fundamentals of network security, including
compliance and operational security; threats and vulnerabilities; application, data, and host security;
access control and identity management; and cryptography. The course covers new topics in network
security as well, including psychological approaches to social engineering attacks, Web application
attacks, penetration testing, data loss prevention, cloud computing security, and application
programming development security.
Topics covered include:
Introduction to Network Security
Malware and Social Engineering Attacks
Data Breaches
Application and Networking-Based Attacks
Host, Application, and Data Security
Basic Cryptography
Advanced Cryptography
Network Security Fundamentals
Administering a Secure Network
Wireless Network Security
Mobile Device Security
11
Access Control Fundamentals
Authentication and Account Management
Business Continuity
Risk Mitigation
Vulnerability Assessment
Legal, Ethical, and Organizational Factors
12
6. Secure Programming Concepts
The purpose of this 30 hour course is to provide candidates with a comprehensive understanding of
what a Secure Development Process is. Participants will learn secure programming concepts and
techniques; learn how to identify key characteristics of secure code; learn how to use design patterns
for secure code; learn how to build in a secure requirement process in the software life cycle from the
beginning to the end; and learn how to write, test, and debug programs using secure programming
techniques. Topics will include design principles, code snippets, and a simple explanation of each step as
you work your way through the course.
The primary objectives of the course are to:
Identify what secure programming is and why it is needed
Work with principles associated with software engineering
Understand principles of security and quality in the industry and how to use them
Understand the Application Guide
Learn how to understand, analyze, and interpret software requirements
Design for quality using industry frameworks
Know what industry design patterns are and how to carry them out
Understand industry standard development tools
Know how to produce secure code
Sustain a formal development process
13
CERTIFICATION
A certificate from the Global Institute for IT Management (GIIM) is granted upon successfully completion of four courses. The Foundations Course is a prerequisite (requirement) for all of the other courses in the program. But participants who after reviewing the Foundations Course description believe that the foundation course is not necessary because they have sufficient background/experience in IT Security, or have taken a similar course elsewhere (hence, they accept the risk of taking the other certificate courses without taking GIIMs Foundations course first) can omit the foundation course. But whether the Foundations Course is included or not, four courses must be taken and passed to obtain a Certificate. The Cyber Security and IT Security Management Program and certificate adhere to leading international accreditation agency (e.g., AACSB, EFMD, AMBA, NSCHBC, NBA, ABET, Middle States Association) standards and expectations (e.g., European e-Competence Framework), and can also be applied towards a Master's Degree (GIIM courses as transfer credit towards a Master's Degree).
14
TRAINERS/PROGRAM INSTRUCTORS
Program is taught by an international team of prominent academics & executives, providing a balanced
perspective of leading professors from multiple universities and expert practitioners. These are some of
the international academicians and practitioners which provide the Cyber Security and IT Security
Management program:
Professor Jerry Luftman, PhD
Present Position
Founder, Professor, & Managing Director of the Global Institute for IT Management GIIM) Jerry Luftman’s experience combines the strengths of CIO/practitioner, consultant, and academic. His proficiency in business-IT alignment and IT trends, eighteen books, published research, consulting, mentoring, and teaching/speaking engagements exemplify Dr. Luftman’s expertise and leadership. After a distinguished twenty-two year career with IBM, he had an exemplary career for about twenty years as Professor, Founder and Associate Dean of the Stevens Institute of Technology Information Systems Programs (one of the largest in the world). Driven by the strong demand for a global executive education program focusing on managing information technology, Dr. Luftman has leveraged his experience as a CIO, IT management consultant, and leading academic, with his strong network of prominent IT practitioners and academics, to provide a valuable and innovative initiative via the Global Institute for IT Management.
Dr Luftman's project experience ranges from senior management issues through tactical implementation. Dr. Luftman most recently pioneered the vehicle for assessing the maturity of IT-business alignment, where he has a benchmark repository of over one -third of the Global 1,000 companies. He also serves on the Executive Board of several companies, associations, and publications. Dr. Luftman’s last responsibility at IBM, after being a CIO, was a key speaker at their Customer Executive Conference Center in Palisades, N.Y. While responsible for management research, he played a significant role in defining and introducing the IT Strategy and Planning, and Business Process Re -engineering practice methods for the IBM Management Consulting Group. His framework for applying the strategic alignment model is fundamental in helping clients understand, define, and scope the appropriate strategic planning approach to pursue. Dr. Luftman’s annual global IT trends research, sponsored by several CIO associations and universities, is recognized internationally as an industry barometer.
15
Professor Christine V. Bullen, PhD
Present Position
Professor, Coordinator of Strategic Issues Course, Coordinator of IT Outsourcing concentration in MSIS, Director of Distance Learning for MSIS Howe School of Technology Management Stevens Institute of Technology Castle Point on Hudson Hoboken NJ 07030
Research Current Research: Understanding the IT outsourcing decision, measuring value in IT outsourcing, Previous Research: The impact of implementing Enterprise Resource Planning Systems; investigating pharmaceutical data management systems; investigating stereotypes about computer professionals; understanding the impact of collaborative tools which facilitate the work of teams; critical issues in competitive use of networking; effective knowledge management; valuing business processes; the impacts of information systems, including networking, computer conferencing, and advanced workstation design; strategic alignment of I/T with business directions; career path issues for I/S professionals; the use of the critical success factors methodology; and the design and implementation of distributed processing. Teaching Current: Strategic Issues in IT, IT Outsourcing Governance Previous: Strategic Planning for IT, Business Design Through IT, The Human Side of ICS, End User Computing, Decision Support Systems, Core Graduate Course in IT, Core Undergraduate Course in IT, Costs and Benefits of IT, Transnational MBA IT Course Education
Ph.D. Stevens Institute of Technology
Information Management
M.B.A 1976 MIT Sloan School Planning & Control
A.B. 1967 Barnard College Biology
16
Professional Society Membership (Current)
AIS INFORMS SIM ACM
Non-Academic Experience
1974-75 Planning Analyst, Inforex, Inc.
1968-74 Professional Staff, Arthur D. Little, Inc.
1967-68 Assistant to the President, Brand Rating Research Corporation
1966 Officer Candidate, U.S. Navy Officer Candidate School
Academic Experience
2002 – Present Faculty, Stevens Institute of Technology, Howe School of Management
1993 – 2002 Faculty, Fordham University Graduate School of Business
1976 – 1993 Assistant Director of the MIT Sloan School Center for Information Systems Research
Career Highlights
The Howe School hosted the AMCIS 2004 conference in New York City and I served officially in the role of Program Co-Chair, however unofficially served as the general chair, webmaster and local arrangements chairs as well. This conference was a huge success and the largest ever held by AIS. While it was an enormous amount of work, it was also very satisfying to successfully work with 1200 authors and reviewers, and host almost 1500 attendees.
Received the 2001 Gladys and Henry Crown Award for Faculty Excel lence at Fordham University.
This was a highlight of my Fordham career as it was voted on by three graduating classes.
The majority of her academic career (17 years) was spent at the MIT Sloan School Center for Information Systems Research (CISR). I help to launch CISR and participated in ground-breaking
research projects that are still considered significant today.
17
She was among the “dirty 30” faculty who launched the ICIS conferences. This conference has continued to serve as the premier research conference in our field and she is proud to have
been there to get it started.
After working at Arthur D. Little, Inc for 6 years, she became part of a client team that traveled completely around the world in 4 months conducting interviews and collecting data on the use of controlled substances in all branches of U.S. Mi litary forces. This trip took her to California, Hawaii, Thailand (on the border of Cambodia during the Viet Nam war!), Afghanistan, Turkey, Italy and Spain. It was exhilarating, exhausting, and dangerous and resulted in the most significant data ever collected in this area. As a result of this work, she was presented with the President’s award.
Languages English, French, some German Teaching Courses Taught Howe School of Technology Management MS in IS: MIS 760 Strategic Issues in IT
MIS 650 IT Outsourcing Governance
Fordham University Schools of Business Undergraduate: Core IT Course MBA: Core IT Course
Planning for IT Business Design through IT The Human Side of IT End User Computing Decision Support Systems The Costs and Benefits of IT
Transnational MBA: Core IT Course
18
Curriculum Development Coordinated the development of a four course concentration in IT Outsourcing Coordinator for the IT Outsourcing concentration Developed IT Outsourcing Governance Coordinator for Strategic Issues in IT Teaching Honors and Awards The 2001 Gladys and Henry Crown Award for Faculty Excellence at Fordham University (Chosen by the graduating classes of 9/2000, 2/2001 and 5/2001)
19
Bruce J. Rogow
IT Odyssey and Advisory Provocative Perspectives in Information Technology Management
Since 1992, Bruce has been an independent, private counselor for Boards, CEOs and CIOs related to
the management of information technology. He presents his perspectives in thought provoking
presentations for his clients and public groups.
His perspectives are based on over 40 years of management observation, over 120 annual face -to-
face Odyssey visits with senior executives involved with directing IT and a set of frameworks
providing insight to IT executive issues. The IT Odyssey visits keep him current as to what is
happening in the management of IT, what is working, what isn’t, how executives continually
increase yield from IT investments and are restructuring IT organizations for the future.
His most current work is focused on the expectations, challenges and opportunities faced by IT over
the next decade, the steps being taken to capitalize upon and adjust to those challenges, the
evolving capabilities required and how the relationship between the Board/CEO and IT/CIO is
changing.
Bruce’s career has allowed him to build a pre-eminent understanding of the issues, mindsets and
agendas of senior executives involved with IT management. He serves as an ICEX Principal
facilitating private exchanges on Enterprise Architecture and also Infrastructure & Operations for
executives from large-scale, global enterprises. He has produced major practitioner pieces on The IT
Organization of the Future, Enabling Wikinomics (mass collaboration) and Marketing2.0 for Don
Tapscott’s nGenera Insight research programs. He contributes proprietary columns and podcasts for
several organizations such as Gartner Executive Programs and Cognizant’s thought leadership
quarterly, Cognizanti. In the 90’s, he served as an Executive Fellow of Gartner.
Previously, he was Executive Vice President, Global Head of Research for Gartner. During his
leadership, Gartner’s Total Cost of Ownership, Magic Quadrants, Hype Cycles and Symposium
became global industry standards. Gartner became the indispensable research fi rm for over 80% of
global enterprises. From 1977 through 1987, as a Senior Managing Principal of Nolan, Norton & Co,
Bruce was instrumental in developing NNC’s ground breaking IT Management Methodologies and
Practices including such now widely accepted methodologies as Functional Quality, Technical
Quality, Life Cycle Costing, Portfolio Valuation, Maintenance Ratios, IT Governance Models, Project -
Program-Endeavor Structures, Portfolio Asset Management, IT Management Process Assessment,
and IT Financial Management. He led major management assessments in over twenty Fortune 200
firms based on Dr. Nolan’s Harvard Business School frameworks. He built and led the NNC Wall
20
Street practice for which almost every major firm was a client. He led the NNC Executive Education
efforts and was among their most sought after and effective communicators.
He started his career at IBM in Gainesville, FL in sales. Bruce then spent five years in IBM’s
Poughkeepsie Advanced Technical Training group pioneering what became known as systems
management. He was also the originator, curriculum developer and lead instructor of their IT
Complex Systems Management course that introduced systems management principles to both
customer executives and IBM field personnel.
He holds a Bachelor of Civil Engineering from the University of Florida and lives in Marblehead, MA.
He serves on the University of Florida Engineering College Dean’s Advisory Board. His wife, Winnie,
a retired Nolan, Norton & Co/KPMG Partner was the program manager for the work that became
the Balanced Scorecard by Norton & Kaplan. His son Mark was the Minor League Medical
Coordinator for the New York Mets and the Assistant Trainer of the Pittsburgh Pirates. Mark is now
Sports Medicine Program Manager with the US Naval Special Warfare in Coronado, CA. His
daughter Michelle is a Registered Professional Engineer serving as an Emergency Response On -Site
Coordinator with the EPA based from San Francisco. His other son, Geoff is News Editor for the
Markets and Finance section of The Wall Street Journal. He was formerly news editor for the WSJ
FX/Trader, a markets reporter for Dow Jones in New York City, the economics and fixed income
reporter in Sydney and had a daily column in the WSJ. Bruce and Geoff consider their respective
work to be confidential and they do not share any discussion of their respective work.
21
Professor Terry Savage Summary of Qualifications Seven years as a graduate professor engaged in teaching, course creation, advising, academic business process improvement, and marketing. In dealing with all aspects of an academic environment I possess the ability to ensure that the roles of educator and administrator are performed at the highest level. My successful career as a senior executive and consultant adds to my ability to interject real life experiences into the courses I teach.
2004 – Present Stevens Institute of Technology, Haboken, New Jersey
2006 – 11 Participating Adjunct Professor Director of Marketing - Financial Services
2006 – 11 Student Advisor
Lead member of the team responsible for creating, maintaining, and delivering the Information Systems Masters Capstone Course. The objective of the course is to prepare experienced and entry level Information Technology professionals for their transition into senior management positions. Course content focuses on the skills and tools required to develop and implement strategic business decisions. Assignments are based on the actual demands of the individual students company (or case). Students are required to work with their business counterparts during the course. Co-authored and developed the schools concentration in Management Consulting. Serve as the Marketing Director and Student Advisor for the Financial Services industry. Teaching and marketing responsibilities are domestic, international and web based. This program is one of the largest and most successful in the world. Curriculum Competencies The following is based on my academic, educational, and professional experience. The areas listed below relate to concentrations; the individual courses associated within these concentrations would follow the institutions AACSB Syllabi. Curriculums can be taught on an undergraduate, graduate, or certificate level. All can be taught as executive or seminar programs. * Organizational Behavior & Theory * Business Practices and Strategies * Elements of Consulting * Alignment Strategy between IT & Business * Supply Chain Management * Distribution & Logistics * Procurement and Vendor Management * Concepts of Industrial Engineering
22
* Strategic Alignment – Methods & Metrics * Entrepreneurship * Materials management * Process Engineering * Labor / Management Issues * Efficiency and Incentives Additional Selected Accomplishments:
(i) As student advisor he advised, reviewed, and approved course study plans. Worked with academic staff and students to facilitate resolution of issues (e.g., student, course, process).
(ii) Co-authored and developed the schools Management Consulting Track.
(iii) Teach courses on campus, at cohort locations, over the web, national and
internationally.
(iv) Review academic research for publication.
(v) Interface with internal and external executives to enhance operations and processes in and outside the academic environment by creating new and unique opportunities
for growth and improvement.
(vi) As a Director of Marketing developed, instituted, and took part in the first live web Information Sessions for prospective students. Sessions were interactive and can still be accessed externally for rebroadcast. Created print and e-mail campaigns.
Marketed on campus, via web and at offsite locations.
Education /Academic Accomplishments
M.B.A – Major: Management, Thesis: Marketing Fairleigh Dickenson University
B.S – Industrial Engineering Newark College of Engineering (New Jersey Institute of Technology)
C.E.U – Operations Research Wharton College
Management Consulting Track Stevens Institute of Technology Curriculum Development
Reviewer Communications of the Association for Information Systems.
“Outstanding Adjunct Professor” 2008 Stevens
23
Professional Experience 1983- Present Terrence Savage LLC, Boca Raton, Florida, Fort Lee, New Jersey Principal A full service business, management, and information technology consulting firm retained by private and public companies, international institutions, and government agencies to perform studies and undertake engagements domestically and abroad. A multi-disciplined organization I am capable of working across all levels of management for the successful implementation of projects requiring alignment between business and technology. Services * Business Continuity * Disaster Recovery * Organization * Policy and Procedures * Strategic Planning * Technology Assessment * Strategic Alignment * Executive Seminars * Vendor Management * Risk Assessment * Audit Implementation * Process Engineering * Supply Chain Management * Marketing * Warehouse Management Selected Accomplishments:
(i) Using Supply Chain Management and Critical Inventory Scheduling enabled a third party distribution center to create a virtual warehouse where goods could be scheduled in and out of locations in advance of physical movement. Overall effect was to reduce space requirements by 15%. Additional benefit was the ability to move stock to forward picking locations at time of initial receipt of inventory. Continuous Benchmarking was implemented to gauge accomplishments.
(ii) Oversaw the strategic business and technology tasks of introducing a non-American bank into the US. Project was completed as defined, within budget and on time. The follow-up assignment to upgrade and integrate the core business and IT systems of the two entities was also accomplished in a successful manner and signed off on by the Board of Directors. Lead consultant efforts for two FDIC audits.
24
(iii) Worked under a two year contract for the World Bank to establish an export
development program for manufacturers in Jamaica. Gave manufacturing and distribution support as requested, while coordinating all program activities through the Bank of Jamaica. Program accomplished its goal of providing funding and management expertise for export development.
(iv) Developed metrics and analytical tools for various financial and non-financial
concerns to access the various risks associated with specific business plans. These methodologies focused on both the technical and physical analysis of business and IT aligned strategies.
1970-1983 Additional Professional Experience Starting in the manufacturing sector as an Industrial Engineer I demonstrated the professional and managerial skills to achieve success in a variety of manufacturing and service industries. Positions included Chief Industrial Engineer, Plant Manager and General Manager. Responsibilities included strategic planning, budgets, project implementation, facilities management, purchasing, outsourcing, quality control, supply chain management, and human resources.
Jackson Modern Art (1981-1983) - General Manager: A privately held firm employing over 300 salaried and hourly personnel.
Celebrity (1979 - 1981) - Plant Manager: Managed a manufacturing and distribution force of
over 100 employees located in multiple locations.
Aberdeen Manufacturing (1976 - 1979) Assistant to Sr. Executive Vice President: Directed projects across multiple divisions. Initiatives included; Manufacturing, Vendor Management, Distribution, and Construction, Budgeting.
Jaclyn, Inc. (1970 - 1976) Chief Industrial Engineer: Responsible for the layout, process flow,
costing, labor budgets and incentive payroll of over 500 employees at three locations.
25
DELIVERY MODULE
The delivery model of this program is via asynchronous learning, which is leveraging the use of
internet to provide the program via the web in the online distance self -paced learning model.
The online enrollment portal link for these programs is here.
Optionally, we can also provide synchronous learning or Face-to-face Classroom Learning, though
that comes also with the changing in our pricing considering for example in order to have a
successfully face-to-face classroom learning overheads costs for venue, travelling, hotel etc. are
inevitable contrary to the asynchronous learning.
26
TESTIMONIALS
Comments from our previous candidates
"The classes prepared me for significantly increased responsibilities in my company. Within 2 years of
completing the courses I was responsible for strategically critical areas of our global technical
infrastructure."
- John Murphy, Director Deutsche Bank
"Working in a professional services organization, the program gave me skills that were applicable from
day one. Whether it was dealing with strategic programs, project management, financial management,
or technology issues, the classes were all relevant and helped accelerate my career progression."
-Tony Politano, Senior Director, Oracle Corporation and author
"My new found Project Management, Financial Control, and Information Technology Management skills
enable me to run strategic initiatives more effectively."
- Stanley Kules, Vice President, the Bank of New York Mellon Corporation
27
"Upon completing the classes I was promoted to Director of the Information Technology Support
Directorate where I managed 5 divisions staffed with 142 IT professionals providing the full suite of IT
applications and support services and was responsible for $100M+ budget."
- John J. Tugman, Vice President, EPS Network Solutions
"The courses and leadership under Jerry allowed me to transition from the corporate world into the
academic world. His IBM experience and connections with IT leaders from around the world were
invaluable in developing a research stream that not only resulted in my Ph.D. dissertation, but several co-
authored articles over the years. Luftman's guidance and mentoring have allowed me to pursue my goal
of a career in academia and still maintain a consulting practice on the side"
- Dr. Raymond Papp, Associate Professor, The University of Tampa
"With the knowledge, confidence, and support that I received from the courses I was able to grow my
company by seeking out strategic partnerships. This allowed me to participate in an IPO and created an
entirely new career path that would not have been possible before the program."
- Ken Harney, Director, the Burgiss Group
28
"Having the opportunity to work in several very large and very different Fortune 500 companies as an IT
professional (and as a women), I can flat out tell you that I did not have the right skills in place early in
my career to help me meet my career objectives. My Information Systems Undergraduate Degree did not
prepare me for what I needed to know even 10 years into my job. I was stalling out as a First Line
Manager and was struggling as a woman in a man's field as well. I found what I was missing in taking
my career to the next level with the classes. It ingrained in me the need to understand the business and
to personally take hold of my own career with what I learned and experienced, and to get to know as
many people by leveraging those skills, and managing my relationship better, which indeed led me to
find the right mentors to guide me on my path. I can say with all sincerity, I would not be where I am
today without programs like GIIM."
- Catherine M. White, Technology Director, Risk Technology at JPMorgan Chase
"As a senior management consultant, former CIO and academic my course experience has exceeded my
expectations for its broad coverage of subject matter essential to the effective management of IT
organizations in the 21st century. Graduates of GIIM are exposed to real-world problems in IT strategy
and organization management that must be addressed through the application of a wide variety of
analysis frameworks, business planning techniques and core technology courses that will serve them well
in their current and future workplaces. Graduates are prepared to face real-world business and IT
challenges to a degree I find in few other academic programs.
Jerry Luftman, as founder and Executive Director of GIIM brings world-class depth of experience as a
senior practitioner at IBM, senior management consultant and academic to the program and breathes
life into the types of problems and exercises posed to students. His deep practical experience working at
CxO levels in many different industries and his ground-breaking research in the area of strategic
29
alignment of business and IT enables Dr. Luftman to bring current insights to the classroom environment
to the benefit of his students."
- Elby Nash, Senior Management Consultant Cognizant
"Today’s market is ultra-competitive. You need an edge if you want to stand out. Completing the courses
in the program has given me that distinction. The IS classes better prepared me with a well-rounded
focused education experience in information technology management."
- Donald E. Brown, Executive, Prudential
“Jerry is a renowned expert in information technology and business a lignment and I've benefited
tremendously by his counsel, leadership, insights and applied experience in this key area. Dr. Luftman's
experience combines the strengths of practitioner, consultant, and academic. His framework for
assessing IT-business alignment maturity is considered key in helping companies around the world
understand, define, and scope an appropriate strategic planning direction that leverages Information
Technology. Dr. Luftman continues to publish leading research and his GIIM program is making a
significant contribution to individuals and companies around the globe. He is an invaluable reference in
my role as an IT executive.”
- Ken Denno, Sales Director, Oracle Corporation
30
"The courses have provided me with the concepts, methods, and tools to use in my career. The program
gave me a greater understanding of the Strategic Alignment between Information Technology and
Business. The focus on strategy, Business Process Management, and Technology Fundamentals gave me
the ideal landscape to further my career. The mix of classes provided me with a unique mixture of
Business Acumen with Innovation through use of Technology. My experience with the faculty was
excellent. I would recommend the program to Executives, Managers, and those interested in furthering
their understanding of strategy, information technology, and business. The faculty in his new
independent initiative are top notch in the industry."
- Chris Colla, Director of Business Process Management
Logistics and Supply Chain, Sharp Electronics Corporation
31
CONTACT US
Emails
info@medarduniversity [email protected]
Websites
www.globaliim.com
www.medarduniversity.org
Mobile +255769986829 +255684643402