2016 Editorial Calendar

Ticker Issue Distribution Dates/Ad Deadlines

Each issue of the WSTA® Ticker e-Zine is available for a NEW! Premier Video Ad. Highlight a video in the Ticker e-Zine, which is also posted on the WSTA homepage for 30 days.  Also includes exposure on all social media sites. Limited to one sponsor per issue.

Click here for more information or contact the WSTA office at 732-530-8808 or email info@wsta.org.

WSTA 2016 Ticker Editorial Calendar

Issue #Articles DueAd Close DateArtwork DueDigital Distribution
 Q1 Jan. 18 Feb. 8 Feb. 22 Mar. 7
 Q2 Apr. 18 May 9 May 23 Jun. 6
 Q3 Jul. 18 Aug. 8 Aug. 22 Sept. 8
 Q4 Oct. 17 Nov. 7 Nov. 21 Dec. 6


Overview: Each subject area highlights the Business Objectives and the Technology Solutions to meet these objectives. This is the approach that should be considered while developing articles.

 

Issue 1:  Managing IT on Wall Street: Infrastructure Provider to Business Partner

A) Business Objectives

  • Maintaining and using a strong alliance between business and IT
  • Increasing the agility for infrastructure spending (I must do intelligent benchmarking)
  • Dynamic demand management for business spikes and seasonal requirements
  • Strong and transparent cybersecurity (revenue potentials bogged down to handle this)
  • Business cases for service mix changes (what goes where and how?)
  • Transparency in chargebacks (am I charged too much?)
  • Quick, SLA-driven recovery from infrastructure failures
  • Data location and service awareness – secure, cheap, accessible
  • High speeds where applications demand speed
  • Ability to seamlessly take advantage of best available services
  • Agility – internal and external

B) Technology Solutions

  • Leadership – partnering with business on growth and efficiency
  • Governance
  • Operations
  • Frameworks
  • Standards
  • Business architecture
  • Software-defined data centers and smart network routing
  • Maturity in defining service levels
  • Maturity in centralized monitoring and alerting
  • Maturity in moving selective workloads to cloud
  • Maturity in data center and telecom cost management
  • Security in vendor location, co-location and multi-tenancy services

 

Issue 2:  Risk Assessed Threat Management

A) Business Objectives

  • Balancing protection vs. innovation
  • Understanding of the impacts and financial losses for all threat categories
  • Map threats based on their relevance and allocate funds accordingly for their remediation – set priorities
  • Threat management dashboards and near-real time key risk indicators (be on top of it)
  • Cyber remediation combining corporate and public domains
  • Strategy for communication of cyber breaches (which, how often, how?)
  • The CISO’s effectiveness and how to make the CISO successful
  • Comprehensive ecosystem / architecture connecting users, processes, assets, end-points, contexts
  • A framework to understand risk in developing new products and services (unhindered or not)
  • A scheme to identify rogue processes originating from employees or vendors
  • A scheme to identify and prove anti money laundering quickly (too many disjoint schemes)
  • A scheme to secure all payment networks and channels (payment is the biggest disruption)

B) Technology Solutions

  • Industry participation to handle cybercrimes on day zero
  • Playbooks for handling security based on risk profiles of applications, data and infrastructure
  • Integrated threat intelligence and metrics
  • Advanced correlations between applications to detect ALM and other cybercrimes
  • Insight and intelligence on where a threat entered the system
    • Creating and maintaining rapid response against threats and attacks
    • Management and monitoring of security across routers and firewalls
  • Securing infrastructure and data based on threat classifications
  • Handling of vendor security exposures
  • Suite of cybersecurity tools and software/updates
  • Rapid incident detection and response
  • Patching more, patching faster

 

Issue 3:  Analytics: Achieving a Sustainable Competitive Advantage

A) Business Objectives

  • Handling big and fast workloads as they need to grow bigger and faster
  • Get clean data
  • Get data just in time
  • Help on compliance in using external data
  • Market alignment – what are the pros and cons (do I join industry alliances?)
  • Combine external data with internal data (what do I match and how?)
  • Digitize everything (what is left out of my decision-making process?)
  • Self-service analytics – put more powerful tools in the hands of business people
  • Ability to track data and transactions back to systems of record
  • Market data analytics
  • Intelligence and discovery of unknown risks and unexplored customer sentiments
  • Roles and responsibilities of internal owners and third parties (Data stewardship)
  • Engage the next generation workforce

B) Technology Solutions

  • Fast data ingestion and analytic engines
  • Ultra low latency market data service integrations
  • Market data analytics
  • Analytics for IT operations
  • Resilient reference data service integrations
  • Social data service integrations
  • Data transformation and normalization tools
  • Engineered information stacks – data and analytic appliances
  • Data security and monitoring
  • Data lineage maintenance across multiple physical data stores and formats
  • Data governance
  • Cloud storage and analytic services
  • Engineered Hadoop stack and data lake implementations
  • Self-help visualization design for business users

 

Issue 4:  Mobile-First Design and Seamless Delivery

A) Business Objectives

  • Device and form factor independence
  • Secure access and data
  • Access to company store and app store from same device
  • Advanced visualization tools adaptive to form factors
  • On-demand compliant data sharing channels with customers
  • Social data access – show me (how can the data be correlated for my analytics)
  • Wearable integration
  • Channel integrations with business partners (what is the weakest link?)
  • Operational implications for transformations from product-centric to user-centric models
  • Design for different user journeys (how to design differently for different user categories)

B) Technology Solutions

  • Multimodal and context-aware identity and access Management
  • Form factor intermediation – Responsive Web Design tools and methods
  • Application framework for mobile development and management
  • Infrastructure framework for multi-channel access
  • App development and deployment agility
  • Bluetooth / NFC / M2M integration for apps
  • App store governance and security
  • Mobility testing / quality assurance
  • DevOps integration
  • Identity management for mobile access
  • Data governance / management architecture implications
  • Systems integration / architecture implications
  • Secure cloud integration

 

Advertisement

Follow Us:

Sitemap | Privacy | Copyright © © 2017, WSTA®, All Rights Reserved.