peak logo

DK

NO

Case

Bank improved cyber security with new IT-concept 

Print Friendly, PDF & Email

Peak helped international bank and finance concern thoroughly test and plan the implementation of a security concept against cyber risks across the IT-infrastructure. The approach was a hybrid in the sense that it consisted of both agile and traditional development principles.

This case is anonymized

We respect that not all customers wish to appear under their own name. For this reason, this case is described using general terms.  

Problem

Due to acquisitions, mergers and a generally large, global presence, the bank’s infrastructure was especially complex. This not only increased the number of internal and external threats – it also made it more difficult to standardize IT-security across departments and systems. As the bank’s cyber security department was far removed from the executive board in the organization, it was also harder to obtain the management’s mandate to implement cross-organizational projects and thereby ensure progress.  

 In order to implement a new security concept, they needed to develop both a scope, an as-is picture and especially a plan for implantation. A similarly pressing issue was the need to develop PoC (Proof of Concept) for the desired concept. These were meant to document, that it was possible to technically implement the concept before a cross-organizational roll-out. 

Solution

Peak’s consultant acted as Lead Project Manager on the project, being responsible for 13 internal and external resources as well as coordination of external suppliers’ deliverables. The project approach was hybrid, which involved agile principles in the form of SCRUM and SAFe for developing the IT-infrastructure, as well as traditional project management (PRINCE2) for, for instance, governance, reporting, business case and milestone planning. 

 

The result was two PoC, that each confirmed, that it was possible to implement parts of the concept. Moreover, a strategic plan and objective was delivered. These outlined which IT-technical and organizational capabilities were necessary for an international implementation of the concept coming into 2024.  

Do you want us to help you succeed with your IT-security?

Regardless of whether we are dealing with the initial analyses, the development of concept or the implementation of new security standards, we can help you improve your cyber security. Our consultants are incredibly versatile, having experience with everything from the necessary security-certifications, to the needed project management- and development competencies. This means, that we are not only able help find the right solution for you, we can also facilitate the development and implementation of it.  

Read our other cases

Agency established IT service management through dedicated plan of action 

Feel free to reach out:

info@peakconsulting.dk | Tlf: +45 3526 2880

Din tilmelding er registreret

Tak for din tilmelding, der nu er modtaget. Der er en bekræftelse på vej til din indbakke. 

Hvis du har problemer eller spørgsmål til tilmelding, så skriv til ms@peakconsulting.dk

Tilmelding til: Morgenseminar om den agile stat

Udfyld formularen og tilmeld dig seminaret. Ved tilmelding accepterer du vores persondatapolitik og handelsbetingelser

Bemærk: Vi forbeholder os retten til at afvise din tilmelding, hvis vi vurderer, at din profil ikke matcher målgruppen for seminaret. 

Hvis du har problemer eller spørgsmål til tilmelding, så skriv til ms@peakconsulting.dk

Tilmelding til SAFe Forum 16. marts 2022

Udfyld formularen og tilmeld dig SAFe forum 16. marts 2022

Ved tilmelding accepterer du vores persondatapolitik og handelsbetingelser

Tilmelding til Årets projektdag 19. maj 2022

Bemærk: Konferencen er udsolgt, men du kan skrive dig på venteliste og få besked, hvis der er afbud. 

Ved tilmelding accepterer du vores persondatapolitik og handelsbetingelser

Hvis du har problemer eller spørgsmål til tilmelding, så skriv til ms@peakconsulting.dk