External Compliance

  • Buy Link or Shortcode: {j2store}39|cart{/j2store}
  • Related Products: {j2store}39|crosssells{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Security and Risk
  • Parent Category Link: /security-and-risk
Take Control of Compliance Improvement to Conquer Every Audit

Optimize Software Pricing in a Volatile Competitive Market

  • Buy Link or Shortcode: {j2store}566|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Marketing Solutions
  • Parent Category Link: /marketing-solutions

Your challenge:

  • Rising supplier costs and inflation are eroding margins and impacting customers' budgets.
  • There is pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
  • You must navigate competing pricing-related priorities among product, sales, and finance teams.
  • Product price increases fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
  • Customers can react negatively, and results are seen much later (more than 12 months) after the price decision.

Our Advice

Critical Insight

Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

Impact and Result

  • Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and assumptions. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.
  • This will build skills on how to price new products or adjust pricing for existing products. The disciplines using our pricing strategy methodology will strengthen efforts to develop repeatable pricing models and processes and build credibility with senior management.

Optimize Software Pricing in a Volatile Competitive Market Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Optimize Software Pricing in a Volatile Competitive Market Executive Brief - A deck to build your skills on how to price new products or adjust pricing for existing products.

This Executive Brief will build your skills on how to price new products or adjust pricing for existing products.

  • Optimize Software Pricing in a Volatile Competitive Market Executive Brief

2. Optimize Software Pricing in a Volatile Competitive Market Storyboard – A deck that provides key steps to complete the project.

This blueprint will build your skills on how to price new products or adjust pricing for existing products with documented key steps to complete the pricing project and use the Excel workbook and customer presentation.

  • Optimize Software Pricing in a Volatile Competitive Market – Phases 1-3

3. Optimize Software Pricing in a Volatile Competitive Market Workbook – A tool that enables product managers to simplify the organization and collection of customer and competitor information for pricing decisions.

These five organizational workbooks for product pricing priorities, interview tracking, sample questions, and critical competitive information will enable the price team to validate price change data through researching the three pricing schemes (competitor, customer, and cost-based).

  • Optimize Software Pricing in a Volatile Competitive Market Workbook

4. Optimize Software Pricing in a Volatile Competitive Market Presentation Template – A template that serves as a guide to communicating the Optimize Pricing Strategy team's results for a product or product line.

This template includes the business case to justify product repricing, contract modifications, and packaging rebuild or removal for launch. This template calls for the critical summarized results from the Optimize Software Pricing in a Volatile Competitive Market blueprint and the Optimize Software Pricing in a Volatile Competitive Market Workbook to complete.

  • Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Infographic

Further reading

SoftwareReviews — A Division of INFO~TECH RESEARCH GROUP

Optimize Software Pricing in a Volatile Competitive Market

Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

Table of Contents

Section Title Section Title
1 Executive Brief 2 Key Steps
3 Concluding Slides

Optimize Software Pricing in a Volatile Competitive Market

Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

EXECUTIVE BRIEF

Analyst Perspective

Optimized Pricing Strategy

Product managers without well-documented and repeatable pricing management processes often experience pressure from “Agile” management to make gut-feel pricing decisions, resulting in poor product revenue results. When combined with a lack of customer, competitor, and internal cost understanding, these process and timing limitations drive most product managers into suboptimal software pricing decisions. And, adding insult to injury, the poor financial results from bad pricing decisions aren’t fully measured for months, which further compounds the negative effects of poor decision making.

A successful product pricing strategy aligns finance, marketing, product management, and sales to optimize pricing using a solid understanding of the customer perception of price/value, competitive pricing, and software production costs.

Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and data. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.

This blueprint will build your skills on how to price new products or adjust pricing for existing products. The discipline you build using our pricing strategy methodology will strengthen your team’s ability to develop repeatable pricing and will build credibility with senior management and colleagues in marketing and sales.

Photo of Joanne Morin Correia, Principal Research Director, SoftwareReviews.

Joanne Morin Correia
Principal Research Director
SoftwareReviews

Executive Summary

Organizations struggle to build repeatable pricing processes:
  • A lack of alignment and collaboration among finance, marketing, product development, and sales.
  • A lack of understanding of customers, competitors, and market pricing.
  • Inability to stay ahead of complex and shifting software pricing models.
  • Time is wasted without a deep understanding of pricing issues and opportunities, and revenue opportunities go unrealized.
Obstacles add friction to the pricing management process:
  • Pressure from management to make quick decisions results in a gut-driven approach to pricing.
  • A lack of pricing skills and management processes limits sound decision making.
  • Price changes fail because discovery often lacks competitive intelligence and buyer value to price point understanding. Customers’ reactions are often observed much later, after the decision is made.
  • Economic disruptions, supplier price hikes, and higher employee salaries/benefits are driving costs higher.
Use SoftwareReviews’ approach for more successful pricing:
  • Organize for a more effective pricing project including roles & responsibilities as well as an aligned pricing approach.
  • Work with CFO/finance partner to establish target price based on margins and key factors affecting costs.
  • Perform a competitive price assessment and understand the buyer price/value equation.
  • Arrive at a target price based on the above and seek buy-in and approvals.

SoftwareReviews Insight

Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and they will make ongoing adjustments based on an ability to monitor buyers, competitors, and product cost changes.

What is an optimized price strategy?

“Customer discovery interviews help reduce the chance of failure by testing your hypotheses. Quality customer interviews go beyond answering product development and pricing questions.” (Pricing Strategies, Growth Ramp, March 2022)

Most product managers just research their direct competitors when launching a new SaaS product. While this is essential, competitive pricing intel is insufficient to create a long-term optimized pricing strategy. Leaders will also understand buyer TCO.

Your customers are constantly comparing prices and weighing the total cost of ownership as they consider your competition. Why?

Implementing a SaaS solution creates a significant time burden as buyers spend days learning new software, making sure tools communicate with each other, configuring settings, contacting support, etc. It is not just the cost of the product or service.

Optimized Price Strategy Is…
  • An integral part of any product plan and business strategy.
  • Essential to improving and maintaining high levels of margins and customer satisfaction.
  • Focused on delivering the product price to your customer’s business value.
  • Understanding customer price-value for your software segment.
  • Monitoring your product pricing with real-time data to ensure support for competitive strategy.
Price Strategy Is Not…
  • Increasing or decreasing price on a gut feeling.
  • Changing price for short-term gain.
  • Being wary of asking customers pricing-related questions.
  • Haphazardly focusing entirely on profit.
  • Just covering product costs.
  • Only researching direct competitors.
  • Focusing on yourself or company satisfaction but your target customers.
  • Picking the first strategy you see.

SoftwareReviews Insight

An optimized pricing strategy establishes the “best” price for a product or service that maximizes profits and shareholder value while considering customer business value vs. the cost to purchase and implement – the total cost of ownership (TCO).

Challenging environment

Product managers are currently experiencing the following:
  • Supplier costs and inflation are rising, eroding product margins and impacting customers’ budgets.
  • Pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
  • Navigating competing pricing-related priorities among product, sales, and finance.
  • Product price increases that fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
  • Slowing customer demand due to poorly priced offerings may not be fully measured for many months following the price decision.
Doing nothing is NOT an option!
Offense Double Down

Benefit: Leverage long-term financial and market assets

Risk: Market may not value those assets in the future
Fight Back

Benefit: Move quickly

Risk: Hard to execute and easy to get pricing wrong
Defense Retrench

Benefit: Reduce threats from new entrants through scale and marketing

Risk: Causes managed decline and is hard to sell to leadership
Move Away

Benefit: Seize opportunities for new revenue sources

Risk: Diversification is challenging to pull off
Existing Markets and Customers New Markets and Customers

Pricing skills are declining

Among product managers, limited pricing skills are big obstacles that make pricing difficult and under-optimized.

Visual of a bar chart with descending values, each bar has written on it: 'Limited - Limits in understanding of engineering, marketing, and sales expectations or few processes for pricing and/or cost', 'Inexperienced - Inexperience in pricing project skills and corporate training', 'Lagging - Financial lag indicators (marketing ROI, revenue, profitability, COGs)', 'Lacking - Lack of relevant competitive pricing/packaging information', 'Shifting - Shift to cloud subscription-based revenue models is challenging'.

The top three weakest product management skills have remained constant over the past five years:
  • Competitive analysis
  • Pricing
  • End of life
Pricing is the weakest skill and has been declining the most among surveyed product professionals every year. (Adapted from 280 Group, 2022)

Key considerations for more effective pricing decisions

Pricing teams can improve software product profitability by:
  • Optimizing software profit with four critical elements: properly pricing your product, giving complete and accurate quotations, choosing the terms of the sale, and selecting the payment method.
  • Implementing tailored price changes (versus across-the-board price actions) to help account for inflation exposure, customer willingness to pay, and product attribute changes.
  • Accelerating ongoing pricing decision-making with a dedicated cross-functional team ready to act quickly.
  • Resetting discounting and promotion, and revisiting service-level agreements.
Software pricing leaders will regularly assess:

Has it been over a year since prices were updated?

Have customers told you to raise your prices?

Do you have the right mix of customers in each pricing plan?

Do 40% of your customers say they would be very disappointed if your product disappeared? (Adapted from Growth Ramp, 2021)

Case Study

Middleware Vendor

INDUSTRY
Technology Middleware
SOURCE
SoftwareReviews Custom Pricing Strategy Project
A large middleware vendor, who is running on Microsoft Azure, known for quality development and website tools, needed to react strategically to the March 2022 Microsoft price increase.

Key Initiative: Optimize New Pricing Strategy

The program’s core objective was to determine if the vendor should implement a price increase and how the product should be packaged within the new pricing model.

For this initiative, the company interviewed buyers using three key questions: What are the core capabilities to focus on building/selling? What are the optimal features and capabilities valued by customers that should be sold together? And should they be charging more for their products?

Results
This middleware vendor saw buyer support for a 10% price increase to their product line and restructuring of vertical contract terms. This enabled them to retain customers over multi-year subscription contracts, and the price increase enabled them to protect margins after the Microsoft price increase.

The Optimize New Pricing Strategy included the following components:

Components: 'Product Feature Importance & Satisfaction', 'Correlation of Features and Value Drivers', 'Fair Cost to Value Average for Category', 'Average Discounting for Category', 'Customer Value Is an Acceptable Multiple of Price'. First four: 'Component fails into the scope of optimizing price strategy to value'; last one: 'They are optimizing their price strategy decisions'.

New product price approach

As a collaborative team across product management, marketing, and finance, we see leaders taking a simple yet well-researched approach when setting product pricing.

Iterating to a final price point is best done with research into how product pricing:

  • Delivers target margins.
  • Is positioned vs. key competitors.
  • Delivers customer value at a fair price/value ratio.
To arrive at our new product price, we suggest iterating among 3 different views:

New Target Price:

  • Buyer Price vs. Value
  • Cost - Plus
  • Vs. Key Competitors
We analyzed:
  • Customer price/value equation interviews
  • Impacts of Supplier cost increases
  • Competitive pricing research
  • How product pricing delivers target margins

Who should care about optimized pricing?

Product managers and marketers who:

  • Support the mandate for optimizing pricing and revenue generation.
  • Need a more scientific way to plan and implement new pricing processes and methods to optimize revenues and profits.
  • Want a way to better apply customer and competitive insights to product pricing.
  • Are evaluating current pricing and cost control to support a refreshed pricing strategy.

Finance, sales, and marketing professionals who are pricing stakeholders in:

  • Finding alternatives to current pricing and packaging approaches.
  • Looking for ways to optimize price within the shifting market momentum.

How will they benefit from this research?

  • Refine the ability to effectively target pricing to specific market demands and customer segments.
  • Strengthen product team’s reputation for reliable and repeatable price-management capabilities among senior leadership.
  • Recognize and plan for new revenue opportunities or cost increases.
  • Allow for faster, more accurate intake of customer and competitive data. 
  • Improve pricing skills for professional development and business outcomes.
  • Create new product price, packaging, or market opportunities. 
  • Reduce financial costs and mistakes associated with manual efforts and uneducated guessing.
  • Price software products that better achieve financial goals optimizing revenue, margins, or market share.
  • Enhance the product development and sales processes with real competitive and customer expectations.

Is Your Pricing Strategy Optimized?

With the right pricing strategy, you can invest more money into your product, service, or growth. A 1% price increase will improv revenues by:

Three bars: 'Customer acquisition, 3.32%', 'Customer retention, 6.71%', 'Price monetization, 12.7%'.

Price monetization will almost double the revenue increases over customer acquisition and retention. (Pricing Strategies, Growth Ramp, March 2022)

DIAGNOSE PRICE CHALLENGES

Prices of today's cloud-based services/products are often misaligned against competition and customers' perceived value, leaving more revenues on the table.
  • Do you struggle to price new products with confidence?
  • Do you really know your SaaS product's costs?
  • Have you lost pricing power to stronger competitors?
  • Has cost focus eclipsed customer value focus?
If so, you are likely skipping steps and missing key outputs in your pricing strategy.

OPTIMIZE THESE STEPS

ALIGNMENT
  1. Assign Team Responsibilities
  2. Set Timing for Project Deliverables
  3. Clarify Financial Expectations
  4. Collect Customer Contacts
  5. Determine Competitors
  6. BEFORE RESEARCH, HAVE YOU
    Documented your executive's financial expectations? If "No," return.

RESEARCH & VALIDATE
  1. Research Competitors
  2. Interview Customers
  3. Test Pricing vs. Financials
  4. Create Pricing Presentation
  5. BEFORE PRESENTING, HAVE YOU:
    Clarified your customer and competitive positioning to validate pricing? If "No," return.

BUY-IN
  1. Executive Pricing Presentation
  2. Post-Mortem of Presentation
  3. Document New Processes
  4. Monitor the Pricing Changes
  5. BEFORE RESEARCH, HAVE YOU:
    Documented your executive's financial expectations? If "No," return.

DELIVER KEY OUTPUTS

Sponsoring executive(s) signs-offs require a well-articulated pricing plan and business case for investment that includes:
  • Competitive features and pricing financial templates
  • Customer validation of price value
  • Optimized price presentation
  • Repeatable pricing processes to monitor changes

REAP THE REWARDS

  • Product pricing is better aligned to achieve financial goals
  • Improved pricing skills or professional development
  • Stronger team reputation for reliable price management

Key Insights

  1. Gain a competitive edge by using market and customer information to optimize product financials, refine pricing, and speed up decisions.
  2. Product leaders will best set software product price based on a deep understanding of buyer/price value equation, alignment with financial strategy, and an ongoing ability to monitor buyer, competitor, and product costs.

SoftwareReviews’ methodology for optimizing your pricing strategy

Steps

1.1 Establish the Team and Responsibilities
1.2 Educate/Align Team on Pricing Strategy
1.2 Document Portfolio & Target Product(s) for Pricing Updates
1.3 Clarify Product Target Margins
1.4 Establish Customer Price/Value
1.5 Identify Competitive Pricing
1.6 Establish New Price and Gain Buy-In

Outcomes

  1. Well-organized project
  2. Clarified product pricing strategy
  3. Customer value vs. price equation
  4. Competitive price points
  5. Approvals

Insight summary

Modernize your price planning

Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

Ground pricing against financials

Meet and align with financial stakeholders.
  • Give finance a heads-up that you want to work with them.
  • Find out the CFO’s expectations for pricing and margins.
  • Ask for a dedicated finance team member.

Align on pricing strategy

Lead stakeholders in SaaS product pricing decisions to optimize pricing based on four drivers:
  • Customer’s price/value
  • Competitive strategy
  • Reflective of costs
  • Alignment with financial goals

Decrease time for approval

Drive price decisions, with the support of the CFO, to the business value of the suggested change:
  • Reference current product pricing guidelines
  • Compare to the competition and our strategy and weigh results against our customer’s price/value
  • Compare against the equation to business value for the suggested change
Develop the skill of pricing products

Increase product revenues and margins by enhancing modern processes and data monetization. Shift from intuitive to information-based pricing decisions.

Look at other options for revenue

Adjust product design, features, packaging, and contract terms while maintaining the functionality customers find valuable to their business.

Blueprint deliverables

Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Key deliverable:

New Pricing Strategy Presentation Template

Capture key findings for your price strategy with the Optimize Your Pricing in a Volatile Competitive Market Strategy Presentation Template

Sample of the 'Acme Corp New Product Pricing' blueprint.

Optimize Software Pricing in a Volatile Competitive Market Executive Brief

This executive brief will build your knowledge on how to price new products or adjust pricing for existing products.

Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' blueprint.

Optimize Software Pricing in a Volatile Competitive Market Workbook

This workbook will help you prioritize which products require repricing, hold customer interviews, and capture competitive insights.

Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' workbook.

Guided Implementation

A Guided Implementation (GI) is a series of calls with a SoftwareReviews analyst to help implement our best practices in your organization.

A typical GI is 4 to 8 calls over the course of 2 to 4 months.

What does a typical GI on optimizing software pricing look like?

Alignment

Research & Reprice

Buy-in

Call #1: Share the pricing team vision and outline activities for the pricing strategy process. Plan next call – 1 week.

Call #2: Outline products that require a new pricing approach and steps with finance. Plan next call – 1 week.

Call #3: Discuss the customer interview process. Plan next call – 1 week.

Call #4 Outline competitive analysis. Plan next call – 1 week.

Call #5: Review customer and competitive results for initial new pricing business case with finance for alignment. Plan next call – 3 weeks.

Call #6: Review the initial business case against financial plans across marketing, sales, and product development. Plan next call – 1 week.

Call #7 Review the draft executive pricing presentation. Plan next call – 1 week.

Call #8: Discuss gaps in executive presentation. Plan next call – 3 days.

SoftwareReviews Offers Various Levels of Support to Meet Your Needs

Included in Advisory Membership Optional add-ons

DIY Toolkit

Guided Implementation

Workshop

Consulting

"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

Desire a Guided Implementation?

  • A GI is where your SoftwareReviews engagement manager and executive advisor/counselor will work with SoftwareReviews research team members to craft with you a Custom Key Initiative Plan (CKIP).
  • A CKIP guides your team through each of the major steps, outlines responsibilities between members of your team and SoftwareReviews, describes expected outcomes, and captures actual value delivered.
  • A CKIP also provides you and your team with analyst/advisor/counselor feedback on project outputs, helps you communicate key principles and concepts to your team, and helps you stay on project timelines.
  • If Guided Implementation assistance is desired, contact your engagement manager.

Workshop overview

Contact your account representative for more information.
workshops@infotech.com1-888-670-8889
Day 1 Day 2 Day 3 Day 4 Day 5
Align Team, Identify Customers, and Document Current Knowledge
Validate Initial Insights and Identify Competitors and Market View
Schedule and Hold Buyer Interviews
Summarize Findings and Provide Actionable Guidance to Stakeholders
Present, Go Forward, and Measure Impact and Results
Activities

1.1 Identify Team Members, roles, and responsibilities

1.2 Establish timelines and project workflow

1.3 Gather current product and future financial margin expectations

1.4 Review the Optimize Software Executive Brief and Workbook Templates

1.4 Build prioritized pricing candidates hypothesis

2.1 Identify customer interviewee types by segment, region, etc.

2.2 Hear from industry analysts their perspectives on the competitors, buyer expectations, and price trends

2.3 Research competitors for pricing, contract type, and product attributes

3.2 Review pricing and attributes survey and interview questionnaires

3.2 Hold interviews and use interview guides (over four weeks)

A gap of up to 4 weeks for scheduling of interviews.

3.3 Hold review session after initial 3-4 interviews to make adjustments

4.1 Review all draft price findings against the market view

4.2 Review Draft Executive Presentation

5.1 Review finalized pricing strategy plan with analyst for market view

5.2 Review for comments on the final implementation plan

Deliverables
  1. Documented steering committee and working team
  2. Current and initial new pricing targets for strategy
  3. Documented team knowledge
  1. Understanding of market and potential target interviewee types
  2. Objective competitive research
  1. Initial review – “Are we going in the right direction with surveys?”
  2. Validate or adjust the pricing surveys to what you hear in the market
  1. Complete findings and compare to the market
  2. Review and finish drafting the Optimize Software Pricing Strategy presentation
  1. Final impute on strategy
  2. Review of suggested next steps and implementation plan

Our process

Align team, perform research, and gain executive buy-in on updated price points

  1. Establish the team and responsibilities
  2. Educate/align team on pricing strategy
  3. Document portfolio & target product(s) for pricing updates
  4. Clarify product target margins
  5. Establish customer price/value
  6. Identify competitive pricing
  7. Establish new price and gain buy-in

Optimize Software Pricing in a Volatile Competitive Market

Our process will help you deliver the following outcomes:

  • Well-organized project
  • Clarified product pricing strategy
  • Customer value vs. price equation
  • Competitive price points
  • Approvals

This project involves the following participants:

  • Product management
  • Program leadership
  • Product marketing
  • CFO or finance representative/partner
  • Others
  • Representative(s) from Sales

1.0 Assign team responsibilities

Input: Steering committee roles and responsibilities, Steering committee interest and role

Output: List of new pricing strategy steering committee and workstream members, roles, and timelines, Updated Software Pricing Strategy presentation

Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: CFO, sponsoring executive, Functional leads – development, product marketing, product management, marketing, sales, customer success/support

1-2 hours
  1. The product manager/member running this pricing/repricing program should review the entire Optimize Software Pricing in a Volatile Competitive Market blueprint and each blueprint attachment.
  2. The product manager should also refer to slide 19 of the Optimize Software Pricing in a Volatile Competitive Market blueprint and decide if help via a Guided Implementation (GI) is of value. If desired, alert your SoftwareReviews engagement manager.
1-2 hours
  1. The product manager should meet with the chief product officer/CPO and functional leaders, and set the meeting agenda to:
    1. Nominate steering committee members.
    2. Nominate work-stream leads.
    3. Establish key pricing project milestones.
    4. Schedule both the steering committee (suggest monthly) and workstream lead meetings (suggest weekly) through the duration of the project.
    5. Ask the CPO to craft, outside this meeting, his/her version of the "Message from the chief product officer.”
    6. If a Guided Implementation is selected, inform the meeting attendees that a SoftwareReviews analyst will join the next meeting to share his/her Executive Brief on Pricing Strategy.
  2. Record all above findings in the Optimize Software Pricing in a Volatile Competitive Market Presentation Template.

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

SoftwareReviews Advisory Insight:

Pricing steering committees are needed to steer overall product, pricing, and packaging decisions. Some companies include the CEO and CFO on this committee and designate it as a permanent body that meets monthly to give go/no-go decisions to “all things product and pricing related” across all products and business units.

2.0 Educate the team

1 hour

Input: Typically, a joint recognition that pricing strategies need upgrading and have not been fully documented, Steering committee and working team members

Output: Communication of team members involved and the makeup of the steering committee and working team, Alignment of team members on a shared vision of “why a new price strategy is critical” and what key attributes define both the need and impact on business

Materials: Optimize Your Software Strategy Executive Brief PowerPoint presentation

Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales, SoftwareReviews marketing analyst (optional)

  1. Walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation.
  2. Optional – Have the SoftwareReviews Advisory (SRA) analyst walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation as part of your session. Contact your engagement manager to schedule.
  3. Walk the team through the current version of the Optimize Software Pricing in a Volatile Competitive Market Presentation Template outlining project goals, steering committee and workstream make-up and responsibilities, project timeline and key milestones, and approach to arriving at new product pricing.
  4. Set expectations among team members of their specific roles and responsibilities for this project, review the frequency of steering committee and workstream meetings to set expectations of key milestones and deliverable due dates.

Download the Optimize Software Pricing in a Volatile Competitive Market Executive Brief

3.0 Document portfolio and target products for pricing update

1-3 Hours

Input: List of entire product portfolio

Output: Prioritized list of product candidates that should be repriced

Materials: Optimize Software Pricing in a Volatile Competitive Market Executive Brief presentation, Optimize Software Pricing in a Volatile Competitive Market Workbook

Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales

  1. Walk the team through the current version of Optimize Software Pricing in a Volatile Competitive Market workbook, tab 2: “Product Portfolio Organizer.” Modify sample attributes to match your product line where necessary.
  2. As a group, record the product attributes for your entire portfolio.
  3. Prioritize the product price optimization candidates for repricing with the understanding that it might change after meeting with finance.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

4.0 Clarify product target margins

2-3 sessions of 1 Hour each

Input: Finance partner/CFO knowledge of target product current and future margins, Finance partner/CFO who has information on underlying costs with details that illustrate supplier contributions

Output: Product finance markup target percentage margins and revenues

Materials: Finance data on the product family, Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Finance partner/CFO

  1. Schedule a meeting with your finance partner/CFO to validate expectations for product margins. The goal is to understand the detail of underlying costs/margins and if the impacts of supplier costs affect the product family. The information will be placed into the Optimize Software Pricing in a Volatile Competitive Market Workbook on tab 2, Product Portfolio Organizer under the “Unit Margins” heading.
  2. Arrive at a final “Cost-Plus New Price” based on underlying costs and target margins for each of the products. Record results in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 2, under the “Cost-Plus New Price” heading.
  3. Record product target finance markup price under “Cost-Plus” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Cost-Plus Analysis,” slide 11.
  4. Repeat this process for any other products to be repriced.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

5.0 Establish customer price to value

1-4 weeks

Input: Identify segments within which you require price-to-value information, Understand your persona insight gaps, Review Sample Interview Guide using the Optimize Software Pricing in a Volatile, Competitive Market Workbook, Tab 4. Interview Guide.

Output: List of interviewees, Updated Interview Guide

Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Customer success to help identify interviewees, Customers, prospects

  1. Identify a list of customers and prospects that best represent your target persona when interviewed. Choose interviewees who will inform key differences among key segments (geographies, company size, a mix of customers and prospects, etc.) and who are decision makers and can best inform insights on price/value and competitors.
  2. Recruit interviewees and schedule 30-minute interviews.
  3. Keep track of interviewees using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 3: “Interviewee Tracking.”
  4. Review the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide,” and modify/update it where appropriate.
  5. Record interviewee perspectives on the “price they are willing to pay for the value received” (price/value equation) using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide.”
  6. Summarize findings to result in an average “customer’s value price.” Record product target ”customer’s value price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and supporting details in Appendix, “Customer Pricing Analysis,” slide 12.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

6.0 Identify competitive pricing

1-2 weeks

Input: Identify price candidate competitors, Your product pricing, contract type, and product attribute information to compare against, Knowledge of existing competitor information, websites, and technology research sites to guide questions

Output: Competitive product average pricing

Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Customers, prospects

  1. Identify the top 3-5 competitors’ products that you most frequently compete against with your selected product.
  2. Perform competitive intelligence research on deals won or lost that contain competitive pricing insights by speaking with your sales force.
  3. Use the interviews with key customers to also inform competitive pricing insights. Include companies which you may have lost to a competitor in your customer interviewee list.
  4. Modify and add key competitive pricing, contract, or product attributes in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
  5. Place your product’s information into the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
  6. Research your competitors’ summarized pricing and product attribute insights into the workbook.
  7. Record research in the Summarize research on competitors to arrive at an average “Competitors Avg. Price”. Record in ”Customer’s Value Price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Competitor Pricing Analysis,” slide 13.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

7.0 Establish new price and gain buy-in

2-3 hours

Input: Findings from competitive, cost-plus, and customer price/value analysis

Output: Approvals for price change

Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Steering committee, Working team – typically representatives in product marketing, product management, sales

  1. Using prior recorded findings of Customer’s Value Price, Competitors’ Avg. Price, and Finance Markup Price, arrive at a recommended “New Price” and record in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and the Appendix for Project Analysis Details.
  2. Present findings to steering committee. Be prepared to show customer interviews and competitive analysis results to support your recommendation.
  3. Plan internal and external communications and discuss the timing of when to “go live” with new pricing. Discuss issues related to migration to a new price, how to handle currently low-priced customers, and how to migrate them over time to the new pricing.
  4. Identify if it makes sense to target a date to launch the new pricing in the future, so customers can be alerted in advance and therefore take advantage of “current pricing” to drive added revenues.
  5. Confer with IT to assess times required to implement within CPQ systems and with product marketing for time to change sales proposals, slide decks, and any other affected assets and systems.

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Summary of Accomplishment

Problem Solved

With the help of this blueprint, you have deepened your and your company’s understanding of how to look at new pricing opportunities and what the market and the buyer will pay for your product. You are among the minority of product and marketing leaders that have thoroughly documented their new pricing strategy and processes – congratulations!

The benefits of having led your team through the process are significant and include the following:

  • Allow for faster, more accurate intake of customer and competitive data 
  • Refine the ability to effectively target pricing to specific market demands and customer segments 
  • Understand the association between the value proposition of products and services
  • Reduce financial costs and mistakes associated with manual efforts & uneducated guessing
  • Recognize and plan for new revenue opportunities or cost increases
  • Create new market or product packaging opportunities
And finally, by bringing your team along with you in this process, you have also led your team to become more customer-focused while pricing your products – a strategic shift that all organizations should pursue.

If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

Contact your account representative for more information.

info@softwarereviews.com
1-888-670-8889

Bibliography

“Chapter 4 Reasons for Project Failure.” Kissflow's Guide to Project Management. Kissflow, n.d. Web.

Edie, Naomi. “Microsoft Is Raising SaaS Prices, and Other Vendors Will, Too.” CIO Dive, 8 December 2021. Web.

Gruman, Galen, Alan S. Morrison, and Terril A. Retter. “Software Pricing Trends.” PricewaterhouseCoopers, 2018. Web.

Hargrave, Marshall. “Example of Economic Exposure.” Investopedia, 12 April 2022. Web.

Heaslip, Emily. “7 Smart Pricing Strategies to Attract Customers.” CO—, 17 November 2021. Web.

Higgins, Sean. “How to Price a Product That Your Sales Team Can Sell.” HubSpot, 4 April 2022. Web.

“Pricing Strategies.” Growth Ramp, March 2022. Web.

“Product Management Skills Benchmark Report 2021.” 280 Group, 9 November 2021. Web.

Quey, Jason. “Price Increase: How to Do a SaaS Pricing Change in 8 Steps.” Growth Ramp, 22 March 2021. Web.

Steenburg, Thomas, and Jill Avery. “Marketing Analysis Toolkit: Pricing and Profitability Analysis.” Harvard Business School, 16 July 2010. Web.

“2021 State of Competitive Intelligence.” Crayon and SCIO, n.d. Web.

Valchev, Konstantin. “Cost of Goods Sold (COGS) for Software-as-a-Service (SaaS) Business.” OpenView Venture Partners, OV Blog, 20 April 2020. Web.

“What Is Price Elasticity?” Market Business News, n.d. Web.

Build a Service Desk Consolidation Strategy

  • Buy Link or Shortcode: {j2store}479|cart{/j2store}
  • member rating overall impact: 10.0/10 Overall Impact
  • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
  • member rating average days saved: Read what our members are saying
  • Parent Category Name: Service Desk
  • Parent Category Link: /service-desk
  • Incompatible technologies. Organizations with more than one service desk are likely to have many legacy IT service management (ITSM) solutions. These come with a higher support cost, costly skill-set maintenance, and the inability to negotiate volume licensing discounts.
  • Inconsistent processes. Organizations with more than one service desk often have incompatible processes, which can lead to inconsistent service support across departments, less staffing flexibility, and higher support costs.
  • Lack of data integration. Without a single system and consistent processes, IT leaders often have only a partial view of service support activities. This can lead to rigid IT silos, limit the ability to troubleshoot problems, and streamline process workflows.

Our Advice

Critical Insight

  • Every step should put people first. It’s tempting to focus the strategy on designing processes and technologies for the target architecture. However, the most common barrier to success is workforce resistance to change.
  • A consolidated service desk is an investment, not a cost-reduction program. Focus on efficiency, customer service, and end-user satisfaction. There will be many cost savings, but viewing them as an indirect consequence of the pursuit of efficiency and customer service is the best approach.

Impact and Result

  • Conduct a comprehensive assessment of existing service desk people, processes, and technology.
  • Identify and retire resources and processes that are no longer meeting business needs, and consolidate and modernize resources and processes that are worth keeping.
  • Identify logistic and cost considerations and create a roadmap of consolidation initiatives.
  • Communicate the change and garner support for the consolidation initiative.

Build a Service Desk Consolidation Strategy Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should build a service desk consolidation strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Develop a shared vision

Engage stakeholders to develop a vision for the project and perform a comprehensive assessment of existing service desks.

  • Build a Service Desk Consolidation Strategy – Phase 1: Develop a Shared Vision
  • Stakeholder Engagement Workbook
  • Consolidate Service Desk Executive Presentation
  • Consolidate Service Desk Assessment Tool
  • IT Skills Inventory and Gap Assessment Tool

2. Design the consolidated service desk

Outline the target state of the consolidated service desk and assess logistics and cost of consolidation.

  • Build a Service Desk Consolidation Strategy – Phase 2: Design the Consolidated Service Desk
  • Consolidate Service Desk Scorecard Tool
  • Consolidated Service Desk SOP Template
  • Service Desk Efficiency Calculator
  • Service Desk Consolidation TCO Comparison Tool

3. Plan the transition

Build a project roadmap and communication plan.

  • Build a Service Desk Consolidation Strategy – Phase 3: Plan the Transition
  • Service Desk Consolidation Roadmap
  • Service Desk Consolidation Communications and Training Plan Template
  • Service Desk Consolidation News Bulletin & FAQ Template
[infographic]

Workshop: Build a Service Desk Consolidation Strategy

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Engage Stakeholders to Develop a Vision for the Service Desk

The Purpose

Identify and engage key stakeholders.

Conduct an executive visioning session to define the scope and goals of the consolidation.

Key Benefits Achieved

A list of key stakeholders and an engagement plan to identify needs and garner support for the change.

A common vision for the consolidation initiative with clearly defined goals and objectives.

Activities

1.1 Identify key stakeholders and develop an engagement plan.

1.2 Brainstorm desired service desk attributes.

1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk.

1.4 Define project goals, principles, and KPIs.

Outputs

Stakeholder Engagement Workbook

Executive Presentation

2 Conduct a Full Assessment of Each Service Desk

The Purpose

Assess the overall maturity, structure, organizational design, and performance of each service desk.

Assess current ITSM tools and how well they are meeting needs.

Key Benefits Achieved

A robust current state assessment of each service desk.

An understanding of agent skills, satisfaction, roles, and responsibilities.

An evaluation of existing ITSM tools and technology.

Activities

2.1 Review the results of diagnostics programs.

2.2 Map organizational structure and roles for each service desk.

2.3 Assess overall maturity and environment of each service desk.

2.4 Assess current information system environment.

Outputs

Consolidate Service Desk Assessment Tool

3 Design Target Consolidated Service Desk

The Purpose

Define the target state for consolidated service desk.

Identify requirements for the service desk and a supporting solution.

Key Benefits Achieved

Detailed requirements and vision for the consolidated service desk.

Gap analysis of current vs. target state.

Documented standardized processes and procedures.

Activities

3.1 Identify requirements for target consolidated service desk.

3.2 Build requirements document and shortlist for ITSM tool.

3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state.

3.4 Document standardized processes for new service desk.

Outputs

Consolidate Service Desk Scorecard Tool

Consolidated Service Desk SOP

4 Plan for the Transition

The Purpose

Break down the consolidation project into specific initiatives with a detailed timeline and assigned responsibilities.

Plan the logistics and cost of the consolidation for process, technology, and facilities.

Develop a communications plan.

Key Benefits Achieved

Initial analysis of the logistics and cost considerations to achieve the target.

A detailed project roadmap to migrate to a consolidated service desk.

A communications plan with responses to anticipated questions and objections.

Activities

4.1 Plan the logistics of the transition.

4.2 Assess the cost and savings of consolidation to refine business case.

4.3 Identify initiatives and develop a project roadmap.

4.4 Plan communications for each stakeholder group.

Outputs

Consolidation TCO Tool

Consolidation Roadmap

Executive Presentation

Communications Plan

News Bulletin & FAQ Template

Further reading

Build a Service Desk Consolidation Strategy

Manage the dark side of growth.

ANALYST PERSPECTIVE

A successful service desk consolidation begins and ends with people.

"It’s tempting to focus strategic planning on the processes and technology that will underpin the consolidated service desk. Consistent processes and a reliable tool will cement the consolidation, but they are not what will hold you back.

The most common barrier to a successful consolidation is workforce resistance to change. Cultural difference, perceived risks, and organizational inertia can hinder data gathering, deter collaboration, and impede progress from the start.

Building a consolidated service desk is first and foremost an exercise in organizational change. Garner executive support for the project, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often. The key is to create a shared vision for the project and engage those who will be most affected."

Sandi Conrad

Senior Director, Infrastructure Practice

Info-Tech Research Group

Our understanding of the problem

This Research is Designed For:

  • CIOs who need to reduce support costs and improve customer service.
  • IT leaders tasked with the merger of two or more IT organizations.
  • Service managers implementing a shared service desk tool.
  • Organizations rationalizing IT service management (ITSM) processes.

This Research Will Help You:

  • Develop a shared vision for the consolidated service desk.
  • Assess key metrics and report on existing service desk architecture.
  • Design a target service desk architecture and assess how to meet the new requirements.
  • Deploy a strategic roadmap to build the consolidated service desk architecture.

Executive summary

Situation

Every organization must grow to survive. Good growth makes an organization more agile, responsive, and competitive, which leads to further growth.

The proliferation of service desks is a hallmark of good growth when it empowers the service of diverse end users, geographies, or technologies.

Complication

Growth has its dark side. Bad growth within a business can hinder agility, responsiveness, and competitiveness, leading to stagnation.

Supporting a large number of service desks can be costly and inefficient, and produce poor or inconsistent customer service, especially when each service desk uses different ITSM processes and technologies.

Resolution

Manage the dark side of growth. Consolidating service desks can help standardize ITSM processes, improve customer service, improve service desk efficiency, and reduce total support costs. A consolidation is a highly visible and mission critical project, and one that will change the public face of IT. Organizations need to get it right.

Building a consolidated service desk is an exercise in organizational change. The success of the project will hinge on how well the organization engages those who will be most affected by the change. Build a guiding coalition for the project, create a shared vision, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often.

Use a structured approach to facilitate the development of a shared strategic vision, design a detailed consolidated architecture, and anticipate resistance to change to ensure the organization reaps project benefits.

Info-Tech Insight

  1. Every step should put people first. It’s tempting to focus the strategy on designing processes and technologies for the target architecture. However, the most common barrier to success is workforce resistance to change.
  2. A consolidated service desk is an investment, not a cost-reduction program. Focus on efficiency, customer service, and end-user satisfaction. Cost savings, and there will be many, should be seen as an indirect consequence of the pursuit of efficiency and customer service.

Focus the service desk consolidation project on improving customer service to overcome resistance to change

Emphasizing cost reduction as the most important motivation for the consolidation project is risky.

End-user satisfaction is a more reliable measure of a successful consolidation.

  • Too many variables affect the impact of the consolidation on the operating costs of the service desk to predict the outcome reliably.
  • Potential reductions in costs are unlikely to overcome organizational resistance to change.
  • Successful service desk consolidations can increase ticket volume as agents capture tickets more consistently and increase customer service.

The project will generate many cost savings, but they will take time to manifest, and are best seen as an indirect consequence of the pursuit of customer service.

Info-Tech Insight

Business units facing a service desk consolidation are often concerned that the project will lead to a loss of access to IT resources. Focus on building a customer-focused consolidated service desk to assuage those fears and earn their support.

End users, IT leaders, and process owners recognize the importance of the service desk.

2nd out of 45

On average, IT leaders and process owners rank the service desk 2nd in terms of importance out of 45 core IT processes. Source: Info-Tech Research Group, Management and Governance Diagnostic (2015, n = 486)

42.1%

On average, end users who were satisfied with service desk effectiveness rated all other IT services 42.1% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey 2015, n = 133)

38.0%

On average, end users who were satisfied with service desk timeliness rated all other IT services 38.0% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey (2015, n = 133)

Overcome the perceived barriers from differing service unit cultures to pursue a consolidated service desk (CSD)

In most organizations, the greatest hurdles that consolidation projects face are related to people rather than process or technology.

In a survey of 168 service delivery organizations without a consolidated service desk, the Service Desk Institute found that the largest internal barrier to putting in place a consolidated service desk was organizational resistance to change.

Specifically, more than 56% of respondents reported that the different cultures of each service unit would hinder the level of collaboration such an initiative would require.

The image is a graph titled Island cultures are the largest barrier to consolidation. The graph lists Perceived Internal Barriers to CSD by percentage. The greatest % barrier is Island cultures, with executive resistance the next highest.

Service Desk Institute (n = 168, 2007)

Info-Tech Insight

Use a phased approach to overcome resistance to change. Focus on quick-win implementations that bring two or three service desks together in a short time frame and add additional service desks over time.

Avoid the costly proliferation of service desks that can come with organizational growth

Good and bad growth

Every organization must grow to survive, and relies heavily on its IT infrastructure to do that. Good growth makes an organization more agile, responsive, and competitive, and leads to further growth.

However, growth has its dark side. Bad growth hobbles agility, responsiveness, and competitiveness, and leads to stagnation.

As organizations grow organically and through mergers, their IT functions create multiple service desks across the enterprise to support:

  • Large, diverse user constituencies.
  • Rapidly increasing call volumes.
  • Broader geographic coverage.
  • A growing range of products and services.

A hallmark of bad growth is the proliferation of redundant and often incompatible ITSM services and processes.

Project triggers:

  • Organizational mergers
  • ITSM tool purchase
  • Service quality or cost-reduction initiatives
Challenges arising from service desk proliferation:
Challenge Impact
Incompatible Technologies
  • Inability to negotiate volume discounts.
  • Costly skill set maintenance.
  • Increased support costs.
  • Increased shadow IT.
Inconsistent Processes
  • Low efficiency.
  • High support costs.
  • Inconsistent support quality.
  • Less staffing flexibility.
Lack of Data Integration
  • Only partial view of IT.
  • Inefficient workflows.
  • Limited troubleshooting ability.
Low Customer Satisfaction
  • Fewer IT supporters.
  • Lack of organizational support.

Consolidate service desks to integrate the resources, processes, and technology of your support ecosystem

What project benefits can you anticipate?

  • Consolidated Service Desk
    • End-user group #1
    • End-user group #2
    • End-user group #3
    • End-user group #4

A successful consolidation can significantly reduce cost per transaction, speed up service delivery, and improve the customer experience through:

  • Single point of contact for end users.
  • Integrated ITSM solution where it makes sense.
  • Standardized processes.
  • Staffing integration.
Project Outcome

Expected Benefit

Integrated information The capacity to produce quick, accurate, and segmented reports of service levels across the organization.
Integrated staffing Flexible management of resources that better responds to organizational needs.
Integrated technology Reduced tool procurement costs, improved data integration, and increased information security.
Standardized processes Efficient and timely customer service and a more consistent customer experience.

Standardized and consolidated service desks will optimize infrastructure, services, and resources benefits

  • To set up a functioning service desk, the organization will need to invest resources to build and integrate tier 1, tier 2, and tier 3 capabilities to manage incidents and requests.
  • The typical service desk (Figure 1) can address a certain number of tickets from all three tiers. If your tickets in a given tier are less than that number, you are paying for 100% of service costs but consuming only a portion of it.
  • The consolidated model (Figure 2) reduces the service cost by reducing unused capacity.
  • Benefits of consolidation include a single service desk solution, a single point of contact for the business, data integration, process standardization, and consolidated administration, reporting, and management.

The image is a graphic showing 2 figures. The first shows ring graphs labelled Service Desk 1 and Service Desk 2, with the caption Service provisioning with distinct service desks. Figure 2 shows one graphic, captioned Service provisioning with Consolidated service providers. At the bottom of the image, there is a legend.

Info-Tech’s approach to service desk consolidation draws on key metrics to establish a baseline and a target state

The foundation of a successful service desk consolidation initiative is a robust current state assessment. Given the project’s complexity, however, determining the right level of detail to include in the evaluation of existing service desks can be challenging.

The Info-Tech approach to service desk consolidation includes:

  • Envisioning exercises to set project scope and garner executive support.
  • Surveys and interviews to identify the current state of people, processes, technologies, and service level agreements (SLAs) in each service desk, and to establish a baseline for the consolidated service desk.
  • Service desk comparison tools to gather the results of the current state assessment for analysis and identify current best practices for migration to the consolidated service desk.
  • Case studies to illustrate the full scope of the project and identify how different organizations deal with key challenges.

The project blueprint walks through a method that helps identify which processes and technologies from each service desk work best, and it draws on them to build a target state for the consolidated service desk.

Inspiring your target state from internal tools and best practices is much more efficient than developing new tools and processes from scratch.

Info-Tech Insight

The two key hurdles that a successful service desk consolidation must overcome are organizational complexity and resistance to change.

Effective planning during the current state assessment can overcome these challenges.

Identify existing best practices for migration to the consolidated service desk to foster agent engagement and get the consolidated service desk up quickly.

A consolidation project should include the following steps and may involve multiple transition phases to complete

Phase 1: Develop a Shared Vision

  • Identify stakeholders
  • Develop vision
  • Measure baseline

Phase 2: Design the Consolidation

  • Design target state
  • Assess gaps to reach target
  • Assess logistics and cost

Phase 3: Plan the Transition

  • Develop project plan and roadmap
  • Communicate changes
  • Make the transition
    • Evaluate and prepare for next transition phase (if applicable)
    • Evaluate and stabilize
      • CSI

Whether or not your project requires multiple transition waves to complete the consolidation depends on the complexity of the environment.

For a more detailed breakdown of this project’s steps and deliverables, see the next section.

Follow Info-Tech’s methodology to develop a service desk consolidation strategy

Phases Phase 1: Develop a Shared Vision Phase 2: Design the Consolidated Service Desk Phase 3: Plan the Transition
Steps 1.1 - Identify and engage key stakeholders 2.1 - Design target consolidated service desk 3.1 - Build the project roadmap
1.2 - Develop a vision to give the project direction
1.3 - Conduct a full assessment of each service desk 2.2 - Assess logistics and cost of consolidation 3.2 - Communicate the change
Tools & Templates Executive Presentation Consolidate Service Desk Scorecard Tool Service Desk Consolidation Roadmap
Consolidate Service Desk Assessment Tool Consolidated Service Desk SOP Communications and Training Plan Template
Service Desk Efficiency Calculator News Bulletin & FAQ Template
Service Desk Consolidation TCO Comparison Tool

Service desk consolidation is the first of several optimization projects focused on building essential best practices

Info-Tech’s Service Desk Methodology aligns with the ITIL framework

Extend

Facilitate the extension of service management best practices to other business functions to improve productivity and position IT as a strategic partner.

Standardize

Build essential incident, service request, and knowledge management processes to create a sustainable service desk that meets business needs.

Improve

Build a continual improvement plan for the service desk to review and evaluate key processes and services, and manage the progress of improvement initiatives.

Adopt Lean

Build essential incident, service request, and knowledge management processes to create a sustainable service desk that boosts business value.

Select and Implement

Review mid-market and enterprise service desk tools, select an ITSM solution, and build an implementation plan to ensure your investment meets your needs.

Consolidate

Build a strategic roadmap to consolidate service desks to reduce end-user support costs and sustain end-user satisfaction.

Our Approach to the Service Desk

Service desk optimization goes beyond the blind adoption of best practices.

Info-Tech’s approach focuses on controlling support costs and making the most of IT’s service management expertise to improve productivity.

Complete the projects sequentially or in any order.

Info-Tech draws on the COBIT framework, which focuses on consistent delivery of IT services across the organization

The image shows Info-Tech's IT Management & Governance Framework. It is a grid of boxes, which are colour-coded by category. The framework includes multiple connected categories of research, including Infrastructure & Operations, where Service Desk is highlighted.

Oxford University IT Service Desk successfully undertook a consolidation project to merge five help desks into one

CASE STUDY

Industry: Higher Education

Source: Oxford University, IT Services

Background

Until 2011, three disparate information technology organizations offered IT services, while each college had local IT officers responsible for purchasing and IT management.

ITS Service Desk Consolidation Project

Oxford merged the administration of these three IT organizations into IT Services (ITS) in 2012, and began planning for the consolidation of five independent help desks into a single robust service desk.

Complication

The relative autonomy of the five service desks had led to the proliferation of different tools and processes, licensing headaches, and confusion from end users about where to acquire IT service.

Oxford University IT at a Glance

  • One of the world’s oldest and most prestigious universities.
  • 36 colleges with 100+ departments.
  • Over 40,000 IT end users.
  • Roughly 350 ITS staff in 40 teams.
  • 300 more distributed IT staff.
  • Offers more than 80 services.

Help Desks:

  • Processes → Business Services & Projects
  • Processes → Computing Services
  • Processes → ICT Support Team

"IT Services are aiming to provide a consolidated service which provides a unified and coherent experience for users. The aim is to deliver a ‘joined-up’ customer experience when users are asking for any form of help from IT Services. It will be easier for users to obtain support for their IT – whatever the need, service or system." – Oxford University, IT Services

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

Workshop

“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

Consulting

“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks used throughout all four options

Build a Service Desk Consolidation Strategy – project overview

1. Develop shared vision 2. Design consolidation 3. Plan transition
Best-Practice Toolkit

1.1 Identify and engage key stakeholders

1.2 Develop a vision to give the project direction

1.3 Conduct a full assessment of each service desk

2.1 Design target consolidated service desk

2.2 Assess logistics and cost of consolidation

3.1 Build project roadmap

3.2 Communicate the change

Guided Implementations
  • Build the project team and define their roles and responsibilities, then identify key stakeholders and formulate an engagement plan
  • Develop an executive visioning session plan to formulate and get buy-in for the goals and vision of the consolidation
  • Use diagnostics results and the service desk assessment tool to evaluate the maturity and environment of each service desk
  • Define the target state of the consolidated service desk in detail
  • Identify requirements for the consolidation, broken down by people, process, technology and by short- vs. long-term needs
  • Plan the logistics of the consolidation for process, technology, and facilities, and evaluate the cost and cost savings of consolidation with a TCO tool
  • Identify specific initiatives for the consolidation project and evaluate the risks and dependencies for each, then plot initiatives on a detailed project roadmap
  • Brainstorm potential objections and questions and develop a communications plan with targeted messaging for each stakeholder group
Onsite Workshop

Module 1: Engage stakeholders to develop a vision for the service desk

Module 2: Conduct a full assessment of each service desk

Module 3: Design target consolidated service desk Module 4: Plan for the transition

Phase 1 Outcomes:

  • Stakeholder engagement and executive buy-in
  • Vision for the consolidation
  • Comprehensive assessment of each service desk’s performance

Phase 2 Outcomes:

  • Defined requirements, logistics plan, and target state for the consolidated service desk
  • TCO comparison

Phase 3 Outcomes:

  • Detailed consolidation project roadmap
  • Communications plan and FAQs

Info-Tech delivers: Use our tools and templates to accelerate your project to completion

  • Service Desk Assessment Tool (Excel)
  • Executive Presentation (PowerPoint)
  • Service Desk Scorecard Comparison Tool (Excel)
  • Service Desk Efficiency Calculator (Excel)
  • Service Desk Consolidation Roadmap (Excel)
  • Service Desk Consolidation TCO Tool (Excel)
  • Communications and Training Plan (Word)
  • Consolidation News Bulletin & FAQ Template (PowerPoint)

Measured value for Guided Implementations (GIs)

Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

GI Measured Value
Phase 1:
  • Time, value, and resources saved by using Info-Tech’s methodology to engage stakeholders, develop a project vision, and assess your current state.
  • For example, 2 FTEs * 10 days * $80,000/year = $6,200
Phase 2:
  • Time, value, and resources saved by using Info-Tech’s tools and templates to design the consolidated service desk and evaluate cost and logistics.
  • For example, 2 FTEs * 5 days * $80,000/year = $3,100
Phase 3:
  • Time, value, and resources saved by following Info-Tech’s tools and methodology to build a project roadmap and communications plan.
  • For example, 1 FTE * 5 days * $80,000/year = $1,500
Total savings $10,800

Workshop overview

Contact your account representative or email Workshops@InfoTech.com for more information.

Pre-Workshop Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
Activities

Module 0: Gather relevant data

0.1 Conduct CIO Business Vision Survey

0.2 Conduct End-User Satisfaction Survey

0.3 Measure Agent Satisfaction

Module 1: Engage stakeholders to develop a vision for the service desk

1.1 Identify key stakeholders and develop an engagement plan

1.2 Brainstorm desired service desk attributes

1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk

1.4 Define project goals, principles, and KPIs

Module 2: Conduct a full assessment of each service desk

2.1 Review the results of diagnostic programs

2.2 Map organizational structure and roles for each service desk

2.3 Assess overall maturity and environment of each service desk

2.4 Assess current information system environment

Module 3: Design target consolidated service desk

3.1 Identify requirements for target consolidated service desk

3.2 Build requirements document and shortlist for ITSM tool

3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state

3.4 Document standardized processes for new service desk

Module 4: Plan for the transition

4.1 Plan the logistics of the transition

4.2 Assess the cost and savings of consolidation to refine business case

4.3 Identify initiatives and develop a project roadmap

4.4 Plan communications for each stakeholder group

Deliverables
  1. CIO Business Vision Survey Diagnostic Results
  2. End-User Satisfaction Survey Diagnostic Results
  1. Stakeholder Engagement Workbook
  2. Executive Presentation
  1. Consolidate Service Desk Assessment Tool
  1. Consolidate Service Desk Scorecard Tool
  2. Consolidated Service Desk SOP
  1. Consolidation TCO Tool
  2. Executive Presentation
  3. Consolidation Roadmap
  4. Communications Plan
  5. News Bulletin & FAQ Template

Insight breakdown

Phase 1 Insight

Don’t get bogged down in the details. A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting and evaluating unnecessary information that will only distract and slow down the project, losing management interest and buy-in.

How we can help

Leverage the Consolidate Service Desk Assessment Tool to gather the data you need to evaluate your existing service desks.

Phase 2 Insight

Select the target state that is right for your organization. Don’t feel pressured to move to a complete consolidation with a single point of contact if it wouldn’t be compatible with your organization’s needs and abilities, or if it wouldn’t be adopted by your end users. Design an appropriate level of standardization and centralization for the service desk and reinforce and improve processes moving forward.

How we can help

Leverage the Consolidate Service Desk Scorecard Tool to analyze the gap between your existing processes and your target state.

Phase 3 Insight

Getting people on board is key to the success of the consolidation, and a communication plan is essential to do so. Develop targeted messaging for each stakeholder group, keeping in mind that your end users are just as critical to success as your staff. Know your audience, communicate to them often and openly, and ensure that every communication has a purpose.

How we can help

Leverage the Communications Plan and Consolidation News Bulletin & FAQ Template to plan your communications.

Phase 1

Develop a Shared Vision

Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

Guided Implementation 1: Develop shared vision

Proposed Time to Completion (in weeks): 4-8

Step 1.1: Identify and engage key stakeholders

Discuss with an analyst:

  • Build the project team and define their roles and responsibilities
  • Identify key stakeholders and formulate an engagement plan

Then complete these activities…

  • Assign project roles and responsibilities
  • Identify key stakeholders
  • Formalize an engagement plan and conduct interviews

With these tools & templates:

Stakeholder Engagement Workbook

Step 1.2: Develop a vision to give the project direction

Discuss with an analyst:

  • Develop an executive visioning session plan to formulate and get buy-in for the goals and vision of the consolidation

Then complete these activities…

  • Host an executive visioning exercise to define the scope and goals of the consolidation

With these tools & templates:

Consolidate Service Desk Executive Presentation

Step 1.3: Conduct a full assessment of each service desk

Discuss with an analyst:

  • Use diagnostics results and the service desk assessment tool to evaluate the maturity and environment of each service desk
  • Assess agent skills, satisfaction, roles and responsibilities

Then complete these activities…

  • Analyze organizational structure
  • Assess maturity and environment of each service desk
  • Assess agent skills and satisfaction

With these tools & templates:

Consolidate Service Desk Assessment Tool

IT Skills Inventory and Gap Assessment Tool

Phase 1 Outcome:

  • A common vision for the consolidation initiative, an analysis of existing service desk architectures, and an inventory of existing best practices.

Step 1.1: Get buy-in from key stakeholders

Phase 1

Develop a shared vision

1.1 Identify and engage key stakeholders

1.2 Develop a vision to give the project direction

1.3 Conduct a full assessment of each service desk

This step will walk you through the following activities:
  • 1.1.1 Assign roles and responsibilities
  • 1.1.2 Identify key stakeholders for the consolidation
  • 1.1.3 Conduct stakeholder interviews to understand needs in more depth, if necessary
This step involves the following participants:
  • Project Sponsor
  • CIO or IT Director
  • Project Manager
  • IT Managers and Service Desk Manager(s)
Step Outcomes:
  • A project team with clearly defined roles and responsibilities
  • A list of key stakeholders and an engagement plan to identify needs and garner support for the change

Oxford consulted with people at all levels to ensure continuous improvement and new insights

CASE STUDY

Industry: Higher Education

Source: Oxford University, IT Services

Motivation

The merging of Oxford’s disparate IT organizations was motivated primarily to improve end-user service and efficiency.

Similarly, ITS positioned the SDCP as an “operational change,” not to save costs, but to provide better service to their customers.

"The University is quite unique in the current climate in that reduction in costs was not one of the key drivers behind the project. The goal was to deliver improved efficiencies and offer a single point of contact for their user base." – Peter Hubbard, ITSM Consultant Pink Elephant

Development

Oxford recognized early that they needed an open and collaborative environment to succeed.

Key IT and business personnel participated in a “vision workshop” to determine long- and short-term objectives, and to decide priorities for the consolidated service desk.

"Without key support at this stage many projects fail to deliver the expected outcomes. The workshop involved the key stakeholders of the project and was deemed a successful and positive exercise, delivering value to this stage of the project by clarifying the future desired state of the Service Desk." – John Ireland, Director of Customer Service & Project Sponsor

Deployment

IT Services introduced a Service Desk Consolidation Project Blog very early into the project, to keep everyone up-to-date and maintain key stakeholder buy-in.

Constant consultation with people at all levels led to continuous improvement and new insights.

"We also became aware that staff are facing different changes depending on the nature of their work and which toolset they use (i.e. RT, Altiris, ITSM). Everyone will have to change the way they do things at least a little – but the changes depend on where you are starting from!" – Jonathan Marks, Project Manager

Understand and validate the consolidation before embarking on the project

Define what consolidation would mean in the context of your organization to help validate and frame the scope of the project before proceeding.

What is service desk consolidation?

Service desk consolidation means combining multiple service desks into one centralized, single point of contact.

  • Physical consolidation = personnel and assets are combined into a single location
  • Virtual consolidation = service desks are combined electronically

Consolidation must include people, process, and technology:

  1. Consolidation of some or all staff into one location
  2. Consolidation of processes into a single set of standardized processes
  3. One consolidated technology platform or ITSM tool

Consolidation can take the form of:

  1. Merging multiple desks into one
  2. Collapsing multiple desks into one
  3. Connecting multiple desks into a virtual desk
  4. Moving all desks to one connected platform

Service Desk 1 - Service Desk 2 - Service Desk 3

Consolidated Service Desk

Info-Tech Insight

Consolidation isn’t for everyone.

Before you embark on the project, think about unique requirements for your organization that may necessitate more than one service desk, such as location-specific language. Ask yourself if consolidation makes sense for your organization and would achieve a benefit for the organization, before proceeding.

1.1 Organize and build the project team to launch the project

Solidify strong support for the consolidation and get the right individuals involved from the beginning to give the project the commitment and direction it requires.

Project Sponsor
  • Has direct accountability to the executive team and provides leadership to the project team.
  • Legitimatizes the consolidation and provides necessary resources to implement the project.
  • Is credible, enthusiastic, and understands the organization’s culture and values.
Steering Committee
  • Oversees the effort.
  • Ensures there is proper support from the organization and provides resources where required.
  • Resolves any conflicts.
Core Project Team
  • Full-time employees drawn from roles that are critical to the service desk, and who would have a strong understanding of the consolidation goals and requirements.
  • Ideal size: 6-10 full-time employees.
  • May include roles defined in the next section.

Involve the right people to drive and facilitate the consolidation

Service desk consolidations require broad support and capabilities beyond only those affected in order to deal with unforeseen risks and barriers.

  • Project manager: Has primary accountability for the success of the consolidation project.
  • Senior executive project sponsor: Needed to “open doors” and signal organization’s commitment to the consolidation.
  • Technology SMEs and architects: Responsible for determining and communicating requirements and risks of the technology being implemented or changed, especially the ITSM tool.
  • Business unit leads: Responsible for identifying and communicating impact on business functions, approving changes, and helping champion change.
  • Product/process owners: Responsible for identifying and communicating impact on business functions, approving changes, and helping champion change.
  • HR specialists: Most valuable when roles and organizational design are affected, i.e. the consolidation requires staff redeployment or substantial training (not just using a new system or tool but acquiring new skills and responsibilities) or termination.
  • Training specialists: If you have full-time training staff in the organization, you will eventually need them to develop training courses and material. Consulting them early will help with scoping, scheduling, and identifying the best resources and channels to deliver the training.
  • Communications specialists (internal): Valuable in crafting communications plan, required if communications function owns internal communications.

Use a RACI table (e.g. in the following section) to clarify who is to be accountable, responsible, consulted, and informed.

Info-Tech Insight

The more transformational the change, the more it will affect the organizational chart – not just after the implementation but through the transition.

Take time early in the project to define the reporting structure for the project/transition team, as well as any teams and roles supporting the transition.

Assign roles and responsibilities

1.1.1 Use a RACI chart to assign overarching project responsibilities

Participants
  • Project Sponsor
  • IT Director, CIO
  • Project Manager
  • IT Managers and Service Desk Manager(s)
What You'll Need
  • RACI chart

RACI = Responsible, Accountable, Consulted, Informed

The RACI chart will provide clarity for overarching roles and responsibilities during the consolidation.

  1. Confirm and modify the columns to match the stakeholders in your organization.
  2. Confirm and modify the roles listed as rows if there are obvious gaps or opportunities to consolidate rows.
  3. Carefully analyze and document the roles as a group.
Task Project Sponsor Project Manager Sr. Executives SMEs Business Lead Service Desk Managers HR Trainers Communications
Meeting project objectives A R A R R
Identifying risks and opportunities R A A C C C C I I
Assessing current state I A I R C R
Defining target state I A I C C R
Planning logistics I A I R R C R
Building the action plan I A C R R R R R R
Planning and delivering communications I A C C C C R R A
Planning and delivering training I A C C C C R R C
Gathering and analyzing feedback and KPIs I A C C C C C R R

Identify key stakeholders to gather input from the business, get buy-in for the project, and plan communications

Identify the key stakeholders for the consolidation to identify the impact consolidation will have on them and ensure their concerns don’t get lost.

  1. Use a stakeholder analysis to identify the people that can help ensure the success of your project.
  2. Identify an Executive Sponsor
    • A senior-level project sponsor is someone who will champion the consolidation project and help sell the concept to other stakeholders. They can also ensure that necessary financial and human resources will be made available to help secure the success of the project. This leader should be someone who is credible, tactful, and accessible, and one who will not only confirm the project direction but also advocate for the project.

Why is a stakeholder analysis essential?

  • Ignoring key stakeholders is an important cause of failed consolidations.
  • You can use the opinions of the most influential stakeholders to shape the project at an early stage.
  • Their support will secure resources for the project and improve the quality of the consolidation.
  • Communicating with key stakeholders early and often will ensure they fully understand the benefits of your project.
  • You can anticipate the reaction of key stakeholders to your project and plan steps to win their support.

Info-Tech Insight

Be diverse and aware. When identifying key stakeholders for the project, make sure to include a rich diversity of stakeholder expertise, geography, and tactics. Also, step back and add silent members to your list. The loudest voices and heaviest campaigners are not necessarily your key stakeholders.

Identify key stakeholders for the consolidation

1.1.2 Identify project stakeholders, particularly project champions

Participants
  • CIO/IT Director
  • Project Sponsor
  • Project Manager
  • IT Managers
What You’ll Need
  • Whiteboard or flip chart and markers

Goal: Create a prioritized list of people who are affected or can affect your project so you can plan stakeholder engagement and communication.

  • Use an influence/commitment matrix to determine where your stakeholders lie.
  • High influence, high commitment individuals should be used in conjunction with your efforts to help bring others on board. Identify these individuals and engage with them immediately.
  • Beware of the high influence, low commitment individuals. They should be the first priority for engagement.
  • High commitment, low influence individuals can be used to help influence the low influence, low commitment individuals. Designate a few of these individuals as “champions” to help drive engagement on the front lines.

Outcome: A list of key stakeholders to include on your steering committee and your project team, and to communicate with throughout the project.

The image is a matrix, with Influence on the Y-axis and Commitment to change on the X-axis. It is a blank template.

Overcome the value gap by gathering stakeholder concerns

Simply identifying and engaging your stakeholders is not enough. There needs to be feedback: talk to your end users to ensure their concerns are heard and determine the impact that consolidation will have on them. Otherwise, you risk leaving value on the table.

  • Talk to the business end users who will be supported by the consolidated service desk.
  • What are their concerns about consolidation?
  • Which functions and services are most important to them? You need to make sure these won't get lost.
  • Try to determine what impact consolidation will have on them.

According to the Project Management Institute, only 25% of individuals fully commit to change. The remaining 75% either resist or simply accept the change. Gathering stakeholder concerns is a powerful way to gain buy-in.

The image is a graph with Business Value on the Y-Axis and Time on the X-Axis. Inside the graph, there is a line moving horizontally, separated into segments: Installation, Implementation, and Target Value. The line inclines during the first two segments, and is flat during the last. Emerging from the space between Installation and Implementation is a second line marked Actual realized value. The space between the target value line and the actual realized value line is labelled: Value gap.

Collect relevant quantitative and qualitative data to assess key stakeholders’ perceptions of IT across the organization

Don’t base your consolidation on a hunch. Gather reliable data to assess the current state of IT.

Solicit direct feedback from the organization to gain critical insights into their perceptions of IT.

  • CIO Business Vision: Understanding the needs of your stakeholders is the first and most important step in building a consolidation strategy. Use the results of this survey to assess the satisfaction and importance of different IT services.
  • End-User Satisfaction: Solicit targeted department feedback on core IT service capabilities, IT communications, and business enablement. Use the results to assess the satisfaction of end users with each service broken down by department and seniority level.

We recommend completing at least the End-User Satisfaction survey as part of your service desk consolidation assessment and planning. An analyst will help you set up the diagnostic and walk through the report with you.

To book a diagnostic, or get a copy of our questions to inform your own survey, visit Info-Tech’s Benchmarking Tools, contact your account manager, or call toll-free 1-888-670-8889 (US) or 1-844-618-3192 (CAN).

Data-Driven Diagnostics:

End-User Satisfaction Survey

CIO Business Vision

Review the results of your diagnostics in step 1.3

Formalize an engagement plan to cultivate support for the change from key stakeholders

Use Info-Tech’s Stakeholder Engagement Workbook to formalize an engagement strategy

If a more formal engagement plan is required for this project, use Info-Tech’s Stakeholder Engagement Workbook to document an engagement strategy to ensure buy-in for the consolidation.

The engagement plan is a structured and documented approach for gathering requirements by eliciting input and validating plans for change and cultivating sponsorship and support from key stakeholders early in the project lifecycle.

The Stakeholder Engagement Workbook situates stakeholders on a grid that identifies which ones have the most interest in and influence on your project, to assist you in developing a tailored engagement strategy.

You can also use this analysis to help develop a communications plan for each type of stakeholder in step 3.2.

Conduct stakeholder interviews to understand needs in more depth, if necessary

1.1.3 Interview key stakeholders to identify needs

  • If the consolidation will be a large and complex project and there is a need to understand requirements in more depth, conduct stakeholder interviews with “high-value targets” who can help generate requirements and promote communication around requirements at a later point.
  • Choose the interview method that is most appropriate based on available resources.
Method Description Assessment and Best Practices Stakeholder Effort Business Analyst Effort
Structured One-on-One Interview In a structured one-on-one interview, the business analyst has a fixed list of questions to ask the stakeholder and follows up where necessary. Structured interviews provide the opportunity to quickly hone in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose – to receive specific stakeholder feedback on proposed requirements or help identify systemic constraints. Generally speaking, they should be 30 minutes or less. Low

Medium

Unstructured One-on-One Interview In an unstructured one-on-one interview, the business analyst allows the conversation to flow freely. The BA may have broad themes to touch on, but does not run down a specific question list. Unstructured interviews are most useful for initial elicitation, when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialog and allow the participants to speak openly. They should be 60 minutes or less. Medium Low

Step 1.2: Develop a vision to give the project direction

Phase 1

Develop a shared vision

1.1 Get buy-in from key stakeholders

1.2 Develop a vision to give the project direction

1.3 Conduct a full assessment of each service desk

This step will walk you through the following activities:
  • 1.2.1 Brainstorm desired attributes for the consolidated service desk to start formulating a vision
  • 1.2.2 Develop a compelling vision and story of change
  • 1.2.3 Create a vision for the consolidated service desk
  • 1.2.4 Identify the purpose, goals, and guiding principles of the consolidation project
  • 1.2.5 Identify anticipated benefits and associated KPIs
  • 1.2.6 Conduct a SWOT analysis on the business
This step involves the following participants:
  • Project Sponsor
  • IT Director, CIO
  • IT Managers and Service Desk Manager(s)
  • Business Executives
Step outcomes

A shared vision for the consolidated service desk that:

  • Defines the scope of the consolidation
  • Encompasses the goals and guiding principles of the project
  • Identifies key attributes of the consolidated service desk and anticipated benefits it will bring
  • Is documented in an executive presentation

Hold an executive visioning session to kick off the project

A major change such as service desk consolidation requires a compelling vision to engage staff and motivate them to comprehend and support the change.

After identifying key stakeholders, gather them in a visioning session or workshop to establish a clear direction for the project.

An executive visioning session can take up to two days of focused effort and activities with the purpose of defining the short and long-term view, objectives, and priorities for the new consolidated service desk.

The session should include the following participants:

  • Key stakeholders identified in step 1.1, including:
    • IT management and CIO
    • Project sponsor
    • Business executives interested in the project

The session should include the following tasks:

  • Identify and prioritize the desired outcome for the project
  • Detail the scope and definition of the consolidation
  • Identify and assess key problems and opportunities
  • Surface and challenge project assumptions
  • Clarify the future desired state of the service desk
  • Determine how processes, functions, and systems are to be included in a consolidation analysis
  • Establish a degree of ownership by senior management

The activities throughout this step are designed to be included as part of the visioning session

Choose the attributes of your desired consolidated service desk

Understand what a model consolidated service desk should look like before envisioning your target consolidated service desk.

A consolidated service desk should include the following aspects:

  • Handles all customer contacts – including internal and external users – across all locations and business units
  • Provides a single point of contact for end users to submit requests for help
  • Handles both incidents and service requests, as well as any additional relevant ITIL modules such as problem, change, or asset management
  • Consistent, standardized processes and workflows
  • Single ITSM tool with workflows for ticket handling, prioritization, and escalations
  • Central data repository so that staff have access to all information needed to resolve issues quickly and deliver high-quality service, including:
    • IT infrastructure information (such as assets and support contracts)
    • End-user information (including central AD, assets and products owned, and prior interactions)
    • Knowledgebase containing known resolutions and workarounds

Consolidated Service Desk

  • Service Desk 1
  • Service Desk 2
  • Service Desk 3
  • Consolidated staff
  • Consolidated ITSM tool
  • Consolidated data repository

Brainstorm desired attributes for the consolidated service desk to start formulating a vision

1.2.1 Identify the type of consolidation and desired service desk attributes

Participants
  • Project Sponsor
  • IT Director, CIO
  • IT Managers and Service Desk Manager(s)
  • Other interested business executives
What You'll Need
  • Whiteboard or flip chart and markers
Document

Document in the Consolidate Service Desk Executive Presentation, slide 6.

Brainstorm the model and attributes of the target consolidated service desk. You will use this to formulate a vision and define more specific requirements later on.
  1. Identify the type of consolidation: virtual, physical, or hybrid (both)
  2. Identify the level of consolidation: partial (some service desks consolidated) or complete (all service desks consolidated)
Consolidated Service Desk Model Level of Consolidation
Partial Complete
Type of Consolidation Virtual
Physical
Hybrid

3. As a group, brainstorm and document a list of attributes that the consolidated service desk should have.

Examples:

  • Single point of contact for all users
  • One ITSM tool with consistent built-in automated workflows
  • Well-developed knowledgebase
  • Self-serve portal for end users with ability to submit and track tickets
  • Service catalog

Develop a compelling vision and story of change

1.2.2 Use a vision table to begin crafting the consolidation vision

Participants
  • Project Sponsor
  • IT Director, CIO
  • IT Managers and Service Desk Manager(s)
  • Other interested business executives
What You'll Need
  • Whiteboard or flip chart and markers
Document

Document in the Consolidate Service Desk Executive Presentation, slide 7.

Build desire for change.

In addition to standard high-level scope elements, consolidation projects that require organizational change also need a compelling story or vision to influence groups of stakeholders.

Use the vision table below to begin developing a compelling vision and story of change.

Why is there a need to consolidate service desks?
How will consolidation benefit the organization? The stakeholders?
How did we determine this is the right change?
What would happen if we didn’t consolidate?
How will we measure success?

Develop a vision to inspire and sustain leadership and commitment

Vision can be powerful but is difficult to craft. As a result, vision statements often end up being ineffective (but harmless) platitudes.

A service desk consolidation project requires a compelling vision to energize staff and stakeholders toward a unified goal over a sustained period of time.

Great visions:

  • Tell a story. They describe a journey with a beginning (who we are and how we got here) and a destination (our goals and expected success in the future).
  • Convey an intuitive sense of direction (or “spirit of change”) that helps people act appropriately without being explicitly told what to do.
  • Appeal to both emotion and reason to make people want to be part of the change.
  • Balance abstract ideas with concrete facts. Without concrete images and facts, the vision will be meaninglessly vague. Without abstract ideas and principles, the vision will lack power to unite people and inspire broad support.
  • Are concise enough to be easy to communicate and remember in any situation.

Info-Tech Insight

Tell a story. Stories pack a lot of information into few words. They are easy to write, remember, and most importantly – share. It’s worth spending a little extra time to get the details right.

Create a vision for the consolidated service desk

1.2.3 Tell a story to describe the consolidated service desk vision

Participants
  • Project Sponsor
  • IT Director, CIO
  • IT Managers and Service Desk Manager(s)
What You'll Need
  • Whiteboard or flip chart and markers
  • Document in the Executive Presentation, slide 8.

Craft a vision of the future state of the service desk.

Tell a story.

Stories serve to give the consolidation real-world context by describing what the future state will mean for both staff and users of the service desk. The story should sum up the core of the experience of using the consolidated service desk and reflect how the service desk will fit into the life of the user.

Stories should include:

  • Action describing the way things happen.
  • Contextual detail that helps readers relate to the person in the story.
  • Challenging ideas that contradict common belief and may be disruptive, but help suggest new directions.
Example:

Imagine if…

… users could access one single online service that allows them to submit a ticket through a self-service portal and service catalog, view the status of their ticket, and receive updates about organization-wide outages and announcements. They never have to guess who to contact for help with a particular type of issue or how to contact them as there is only one point of contact for all types of incidents and service requests.

… all users receive consistent service delivery regardless of their location, and never try to circumvent the help desk or go straight to a particular technician for help as there is only one way to get help by submitting a ticket through a single service desk.

… tickets from any location could be easily tracked, prioritized, and escalated using standardized definitions and workflows to ensure consistent service delivery and allow for one set of SLAs to be defined and met across the organization.

Discuss the drivers of the consolidation to identify the goals the project must achieve

Identifying the reasons behind the consolidation will help formulate the vision for the consolidated service desk and the goals it should achieve.

The image is a graph, titled Deployment Drivers for Those Planning a Consolidated Service Desk. From highest to lowest, they are: Improved Service Delivery/Increased Productivity; Drive on Operational Costs; and Perceived Best Practice.

Service Desk Institute (n = 20, 2007)

A survey of 233 service desks considering consolidation found that of the 20 organizations that were in the planning stages of consolidation, the biggest driver was to improve service delivery and/or increase productivity.

This is in line with the recommendation that improved service quality should be the main consolidation driver over reducing costs.

This image is a graph titled Drivers Among Those Who Have Implemented a Consolidated Service Desk. From highest to lowest, they are: Improved Service Delivery/Increased Productivity; Best Practice; Drive on Operational Costs; Internal vs Outsourcing; and Legacy.

Service Desk Institute (n = 43, 2007)

The drivers were similar among the 43 organizations that had already implemented a consolidated service desk, with improved service delivery and increased productivity again the primary driver.

Aligning with best practice was the second most cited driver.

Identify the purpose, goals, and guiding principles of the consolidation project

1.2.4 Document goals of the project

Participants
  • Project Sponsor
  • IT Director, CIO
  • IT Managers and Service Desk Manager(s)
What You'll Need
  • Whiteboard or flip chart and markers
  • Document in the Executive Presentation, slide 9.

Use the results of your stakeholder analysis and interviews to facilitate a discussion among recommended participants and document the purpose of the consolidation project, the goals the project aims to achieve, and the guiding principles that must be followed.

Use the following example to guide your discussion:

Purpose The purpose of consolidating service desks is to improve service delivery to end users and free up more time and resources to achieve the organization’s core mission.
Goals
  • Align IT resources with business strategies and priorities
  • Provide uniform quality and consistent levels of service across all locations
  • Improve the end-user experience by reducing confusion about where to get help
  • Standardize service desk processes to create efficiencies
  • Identify and eliminate redundant functions or processes
  • Combine existing resources to create economies of scale
  • Improve organizational structure, realign staff with appropriate job duties, and improve career paths
Guiding Principles

The consolidated service desk must:

  1. Provide benefit to the organization without interfering with the core mission of the business
  2. Balance cost savings with service quality
  3. Increase service efficiency without sacrificing service quality
  4. Not interfere with service delivery or the experience of end users
  5. Be designed with input from key stakeholders

Identify the anticipated benefits of the consolidation to weigh them against risks and plan future communications

The primary driver for consolidation of service desks is improved service delivery and increased productivity. This should relate to the primary benefits delivered by the consolidation, most importantly, improved end-user satisfaction.

A survey of 43 organizations that have implemented a consolidated service desk identified the key benefits delivered by the consolidation (see chart at right).

The image is a bar graph titled Benefits Delivered by Consolidated Service Desk. The benefits, from highest to lowest are: Increased Customer Satisfaction; Optimised Resourcing; Cost Reduction; Increased Productivity/Revenue; Team Visibility/Ownership; Reporting/Accountability.

Source: Service Desk Institute (n = 43, 2007)

Info-Tech Insight

Cost reduction may be an important benefit delivered by the consolidation effort, but it should not be the most valuable benefit delivered. Focus communications on anticipated benefits for improved service delivery and end-user satisfaction to gain buy-in for the project.

Identify anticipated outcomes and benefits of consolidation

1.2.5 Use a “stop, start, continue” exercise to identify KPIs

What You'll Need
  • Whiteboard or flip chart and markers
Participants
  • Project Sponsor
  • IT Director, CIO
  • IT Managers and Service Desk Manager(s)
Document

Document in the Executive Presentation, slide 10

  1. Divide the whiteboard into 3 columns: stop, start, and continue
  2. Identify components of your service desk that:
  • Are problematic and should be phased out (stop)
  • Provide value but are not in place yet (start)
  • Are effective and should be sustained, if not improved (continue)
  • For each category, identify initiatives or outcomes that will support the desired goals and anticipated benefits of consolidation.
  • Stop Start Continue
    • Escalating incidents without following proper protocol
    • Allowing shoulder taps
    • Focusing solely on FCR as a measure of success
    • Producing monthly ticket trend reports
    • Creating a self-serve portal
    • Communicating performance to the business
    • Writing knowledgebase articles
    • Improving average TTR
    • Holding weekly meetings with team members

    Use a SWOT analysis to assess the service desk

    • A SWOT analysis is a structured planning method that organizations can use to evaluate the strengths, weaknesses, opportunities, and threats involved in a project or business venture.
    • Use a SWOT analysis to identify the organization’s current IT capabilities and classify potential disruptive technologies as the first step toward preparing for them.
    Review these questions...
    Strengths (Internal) Weaknesses (Internal)
    • What Service Desk processes provide value?
    • How does the Service Desk align with corporate/IT strategy?
    • How does your Service Desk benefit end users?
    • Does the Service Desk produce reports or data that benefit the business?
    • Does your Service Desk culture offer an advantage?
    • What areas of your service desk require improvement?
    • Are there gaps in capabilities?
    • Do you have budgetary limitations?
    • Are there leadership gaps (succession, poor management, etc.)?
    • Are there reputational issues with the business?
    Opportunities (External) Threats (External)
    • Are end users adopting hardware or software that requires training and education for either themselves or the Service Desk staff?
    • Can efficiencies be gained by consolidating our Service Desks?
    • What is the most cost-effective way to solve the user's technology problems and get them back to work?
    • How can we automate Service Desk processes?
    • Are there obstacles that the Service Desk must face?
    • Are there issues with respect to sourcing of staff or technologies?
    • Could the existing Service Desk metrics be affected?
    • Will the management team need changes to their reporting?
    • Will SLAs need to be adjusted?

    …to help you conduct your SWOT analysis on the service desk.

    Strengths (Internal) Weaknesses (Internal)
    • End user satisfaction >80%
    • Comprehensive knowledgebase
    • Clearly defined tiers
    • TTR on tickets is <1 day
    • No defined critical incident workflow
    • High cost to solve issues
    • Separate toolsets create disjointed data
    • No root cause analysis
    • Ineffective demand planning
    • No clear ticket categories
    Opportunities (External) Threats (External)
    • Service catalog
    • Ticket Templates
    • Ticket trend analysis
    • Single POC through the use of one tool
    • Low stakeholder buy-in
    • Fear over potential job loss
    • Logistics of the move
    • End user alienation over process change

    Conduct a SWOT analysis on the business

    1.2.6 Conduct SWOT analysis

    Participants
    • Project Sponsor
    • IT Director, CIO
    • IT Managers and Service Desk Manager(s)
    What You'll Need
    • Whiteboard or flip chart and markers
    Document
    • Document in the Executive Presentation, slide 11
    1. Break the group into two teams:
    • Assign team A strengths and weaknesses.
    • Assign team B opportunities and threats.
  • Have the teams brainstorm items that fit in their assigned areas.
    • Refer to the questions on the previous slide to help guide discussion
  • Choose someone from each group to fill in the grid on the whiteboard.
  • Conduct a group discussion about the items on the list.
  • Helpful to achieving the objective Harmful to achieving the objective
    Internal origin attributes of the organization Strengths Weaknesses

    External Origin attributes of the environment

    Opportunities Threats

    Frame your project in terms of people, process, technology

    A framework should be used to guide the consolidation effort and provide a standardized basis of comparison between the current and target state.

    Frame the project in terms of the change and impact it will have on:

    • People
    • Process
    • Technology

    Service desk consolidation will likely have a significant impact in all three categories by standardizing processes, implementing a single service management tool, and reallocating resources. Framing the project in this way will ensure that no aspect goes forgotten.

    For each of the three categories, you will identify:

    • Current state
    • Target state
    • Gap and actions required
    • Impact, risks, and benefits
    • Communication and training requirements
    • How to measure progress/success

    People

    • Tier 1 support
    • Tier 2 support
    • Tier 3 support
    • Vendors

    Process

    • Incident management
    • Service request management
    • SLAs

    Technology

    • ITSM tools
    • Knowledgebase
    • CMDB and other databases
    • Technology supported

    Complete the Consolidate Service Desk Executive Presentation

    Complete an executive presentation using the decisions made throughout this step

    Use the Consolidate Service Desk Executive Presentation to deliver the outputs of your project planning to the business and gain buy-in for the project.

    1. Use the results of the activities throughout step 1.2 to produce the key takeaways for your executive presentation.
    2. At the end of the presentation, include 1-2 slides summarizing any additional information specific to your organization.
    3. Once complete, pitch the consolidation project to the project sponsor and executive stakeholders.
      • This presentation needs to cement buy-in for the project before any other progress is made.

    Step 1.3: Conduct a full assessment of each service desk

    Phase 1

    Develop a shared vision

    1.1 Get buy-in from key stakeholders

    1.2 Develop a vision to give the project direction

    1.3 Conduct a full assessment of each service desk

    This step will walk you through the following activities:
    • 1.3.1 Review the results of your diagnostic programs
    • 1.3.2 Analyze the organizational structure of each service desk
    • 1.3.3 Assess the overall maturity of each service desk
    • 1.3.4 Map out roles and responsibilities of each service desk using organizational charts
    • 1.3.5 Assess and document current information system environment
    This step involves the following participants:
    • CIO
    • IT Directors
    • Service Desk Managers
    • Service Desk Technicians
    Step outcomes
    • A robust current state assessment of each service desk, including overall maturity, processes, organizational structure, agent skills, roles and responsibilities, agent satisfaction, technology and ITSM tools.

    Oxford saved time and effort by sticking with a tested process that works

    CASE STUDY

    Industry: Higher Education

    Source: Oxford University, IT Services

    Oxford ITS instigated the service desk consolidation project in the fall of 2012.

    A new ITSM solution was formally acquired in the spring 2014, and amalgamated workflows designed.

    Throughout this period, at least 3 detailed process analyses occurred in close consultation with the affected IT units.

    Responsibility for understanding each existing process (incident, services, change management, etc.) were assigned to members of the project team.

    They determined which of the existing processes were most effective, and these served as the baseline – saving time and effort in the long run by sticking with tested processes that work.

    Reach out early and often.

    Almost from day one, the Oxford consolidation team made sure to consult closely with each relevant ITS team about their processes and the tools they used to manage their workflows.

    This was done both in structured interviews during the visioning stage and informally at periodic points throughout the project.

    The result was the discovery of many underlying similarities. This information was then instrumental to determining a realistic baseline from which to design the new consolidated service desk.

    "We may give our activities different names or use different tools to manage our work but in all cases common sense has prevailed and it’s perhaps not so surprising that we have common challenges that we choose to tackle in similar ways." – Andrew Goff, Change Management at Oxford ITS

    Review the results of your diagnostic programs to inform your current state assessment

    1.3.1 Understand satisfaction with the service desk

    Participants
    • CIO/IT Director
    • IT Manager
    • Service Manager(s)
    Document
    1. Set up an analyst call through your account manager to review the results of your diagnostic.
    • Whatever survey you choose, ask the analyst to review the data and comments concerning:
      • Assessments of service desk timeliness/effectiveness
      • IT business enablement
      • IT innovation leadership
  • Book a meeting with recommended participants. Go over the results of your diagnostic survey.
  • Facilitate a discussion of the results. Focus on the first few summary slides and the overall department results slide.
    • What is the level of IT support?
    • What are stakeholders’ perceptions of IT performance?
    • How satisfied are stakeholders with IT?
    • Does the department understand and act on business needs?
    • What are the business priorities and how well are you doing in meeting these priorities?
    • How can the consolidation project assist the business in achieving goals?
    • How could the consolidation improve end-user satisfaction and business satisfaction?
  • A robust current state assessment is the foundation of a successful consolidation

    You can’t determine where you’re going without a clear idea of where you are now.

    Before you begin planning for the consolidation, make sure you have a clear picture of the magnitude of what you plan on consolidating.

    Evaluate the current state of each help desk being considered for consolidation. This should include an inventory of:

    • Process:
      • Processes and workflows
      • Metrics and SLAs
    • People:
      • Organizational structure
      • Agent workload and skills
      • Facility layout and design
    • Technology:
      • Technologies and end users supported
      • Technologies and tools used by the service desk

    Info-Tech Insight

    A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting unnecessary information that will only distract and slow down the project.

    Review ticket handling processes for each service desk to identify best practices

    Use documentation, reports, and metrics to evaluate existing processes followed by each service desk before working toward standardized processes.

    Poor Processes vs. Optimized Processes

    Inconsistent or poor processes affect the business through:

    • Low business satisfaction
    • Low end-user satisfaction
    • High cost to resolve
    • Delayed progress on project work
    • Lack of data for reporting due to ineffective ticket categorization, tools, and logged tickets
    • No root cause analysis leads to a reactive vs. proactive service desk
    • Lack of cross-training and knowledge sharing result in time wasted troubleshooting recurring issues
    • Lack of trend analysis limits the effectiveness of demand planning

    Standardized service desk processes increase user and technician satisfaction and lower costs to support through:

    • Improved business satisfaction Improved end-user satisfaction Incidents prioritized and escalated accurately and efficiently
    • Decreased recurring issues due to root cause analysis and trends
    • Increased self-sufficiency of end users
    • Strengthened team and consistent delivery through cross-training and knowledge sharing
    • Enhanced demand planning through trend analysis and reporting

    The image is a graphic of a pyramid, with categories as follows (from bottom): FAQ/Knowledgebase; Users; Tier 1-75-80%; Tier 2-15%; Tier 3 - 5%. On the right side of the pyramid is written Resolution, with arrows extending from each of the higher sections down to Users. On the left is written Escalation, with arrows from each lower category up to the next highest. Inside the pyramid are arrows extending from the bottom to each level and vice versa.

    Analyze the organizational structure of each service desk

    1.3.2 Discuss the structure of each service desk

    Participants
    • CIO
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You'll Need
    • Consolidate Service Desk Assessment Tool

    1. Facilitate a discussion among recommended participants to discuss the structure of each service desk. Decide which model best describes each service desk:

    • The Gatekeeper Model: All calls are routed through a central call group whose sole responsibility is to link the customer to the right individual or group.
    • The Call Sorting Model: All calls are sorted into categories using technology and forwarded to the right 2nd level specialist group.
    • Tiered Structure (Specialist Model): All calls are sorted through a single specialist group, such as desktop support. Their job is to log the interaction, attempt resolution, and escalate when the problem is beyond their ability to resolve.
    • Tiered Structure (Generalist Model): All calls are sorted through a single generalist group, whose responsibility is to log the interaction, attempt a first resolution, and escalate when the problem is beyond their ability to resolve.

    2. Use a flip chart or whiteboard to draw the architecture of each service desk, using the example on the right as a guide.

    The image is a graphic depicting the organizational structure of a service desk, from Users to Vendor. The graphic shows how a user request can move through tiers of service, and the ways that Tiers 2 and 3 of the service desk are broken down into areas of specialization.

    Assess the current state of each service desk using the Consolidate Service Desk Assessment Tool

    Assess the current state of each service desk

    The Consolidate Service Desk Assessment Tool will provide insight into the overall health of each existing service desk along two vectors:

    1. Process Maturity (calculated on the basis of a comprehensive survey)
    2. Metrics (calculated on the basis of entered ticket and demographic data)

    Together these answers offer a snapshot of the health, efficiency, performance, and perceived value of each service desk under evaluation.

    This tool will assist you through the current state assessment process, which should follow these steps:

    1. Send a copy of this tool to the Service Desk Manager (or other designated party) of each service desk that may be considered as part of the consolidation effort.
      • This will collect key metrics and landscape data and assess process maturity
    2. Analyze the data and discuss as a group
    3. Ask follow-up questions
    4. Use the information to compare the health of each service desk using the scorecard tool

    These activities will be described in more detail throughout this step of the project.

    Gather relevant data to assess the environment of each service desk

    Assess each service desk’s environment using the assessment tool

    Send a copy of the Consolidate Service Desk Assessment Tool to the Service Desk Manager (or other designated party) of each service desk that will be considered as part of the consolidation.

    Instruct them to complete tab 2 of the tool, the Environment Survey:

    • Enter Profile, Demographic, Satisfaction, Technology, and Ticket data into the appropriate fields as accurately as possible. Satisfaction data should be entered as percentages.
    • Notes can be entered next to each field to indicate the source of the data, to note missing or inaccurate data, or to explain odd or otherwise confusing data.

    This assessment will provide an overview of key metrics to assess the performance of each service desk, including:

    • Service desk staffing for each tier
    • Average ticket volume and distribution per month
    • # staff in IT
    • # service desk staff
    • # supported devices (PC, laptops, mobiles, etc.)
    • # desktop images

    Assess the overall maturity of each service desk

    1.3.3 Use the assessment tool to measure the maturity of each service desk

    Participants
    • CIO
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You'll Need
    • Consolidate Service Desk Assessment Tool
    1. Assemble the relevant team for each service desk: process owners, functional managers, service desk manager, and relevant staff and technicians who work with the processes to be assessed. Each service desk team should meet to complete the maturity assessment together as a group.
    2. Go to tab 3 (Service Desk Maturity Survey) of the Consolidate Service Desk Assessment Tool and respond to the questions in the following categories:
    • Prerequisites (general questions)
    • People
    • Process
    • Technology
    • SLAs
  • Rate each element. Be honest. The goal is to end up with as close a representation as possible to what really exists. Only then can you identify realistic improvement opportunities. Use the maturity definitions as guides.
  • Evaluate resource utilization and satisfaction to allocate resources effectively

    Include people as part of your current state assessment to evaluate whether your resources are appropriately allocated to maximize effectiveness and agent satisfaction.

    Skills Inventory

    Use the IT Skills Inventory and Gap Assessment Tool to assess agent skills and identify gaps or overlaps.

    Agent Satisfaction

    Measure employee satisfaction and engagement to identify strong teams.

    Roles and Responsibilities

    Gather a clear picture of each service desk’s organizational hierarchy, roles, and responsibilities.

    Agent Utilization

    Obtain a snapshot of service desk productivity by calculating the average amount of time an agent is handling calls, divided by the average amount of time an agent is at work.

    Conduct a skills inventory for each service desk

    Evaluate agent skills across service desks

    After evaluating processes, evaluate the skill sets of the agents tasked with following these processes to identify gaps or overlap.

    Send the Skills Coverage Tool tab to each Service Desk Manager, who will either send it to the individuals who make up their service desk with instructions to rate themselves, or complete the assessment together with individuals as part of one-on-one meetings for discussing development plans.

    IT Skills Inventory and Gap Assessment Tool will enable you to:

    • List skills required to support the organization.
    • Document and rate the skills of the existing IT staffing contingent.
    • Assess the gaps to help determine hiring or training needs, or even where to pare back.
    • Build a strategy for knowledge sharing, transfer, and training through the consolidation project.

    Map out roles and responsibilities of each service desk using organizational charts

    1.3.4 Obtain or draw organizational charts for each location

    Clearly document service desk roles and responsibilities to rationalize service desk architecture.
    Participants
    • CIO, IT Director
    • Service Desk Manager(s)
    • Tier/Specialist Manager(s)
    What You’ll Need
    • Org. charts
    • Flip chart or whiteboard and markers
    1. Obtain or draw (on a whiteboard or flip chart) the organizational chart for each service desk to get a clear picture of the roles that fulfill each service desk. If there is any uncertainty or disagreement, discuss as a group to come to a resolution.
    2. Discuss the roles and reporting relationships within the service desk and across the organization to establish if/where inefficiencies exist and how these might be addressed through consolidation.
    3. If an up-to-date organizational chart is not in place, use this time to define the organizational structure as-is and consider future state.
    IT Director
    Service Desk Manager
    Tier 1 Help Desk Lead Tier 2 Help Desk Lead Tier 2 Apps Support Lead Tier 3 Specialist Support Lead
    Tier 1 Specialist Name Title Name Title Name Title
    Tier 1 Specialist Name Title Name Title Name Title
    Name Title Name Title Name Title
    Name Title Name Title

    Conduct an agent satisfaction survey to compare employee engagement across locations

    Evaluate agent satisfaction

    End-user satisfaction isn’t the only important satisfaction metric.

    Agent satisfaction forms a key metric within the Consolidate Service Desk Assessment Tool, and it can be evaluated in a variety of ways. Choose the approach that best suits your organization and time restraints for the project.

    Determine agent satisfaction on the basis of a robust (and anonymous) survey of service desk agents. Like the end-user satisfaction score, this measure is ideally computed as a percentage.

    There are several ways to measure agent satisfaction:

    1. If your organization runs an employee engagement survey, use the most recent survey results, separating them by location and converting them to a percentage.
    2. If your organization does not currently measure employee engagement or satisfaction, consider one of Info-Tech and McLean & Company’s two engagement diagnostics:
      • Full Engagement Diagnostic – 81 questions that provide a comprehensive view into your organization's engagement levels
      • McLean & Company’s Pulse Survey – 15 questions designed to give a high-level view of employee engagement
    3. For smaller organizations, a survey may not be feasible or make sense. In this case, consider gathering informal engagement data through one-on-one meetings.
    4. Be sure to discuss and document any reasons for dissatisfaction, including pain points with the current tools or processes.
    Document
    • Document on tab 2 of the Consolidate Service Desk Assessment Tool

    Assess the service management tools supporting your service desks

    Identify the different tools being used to support each service desk in order to assess whether and how they can be consolidated into one service management tool.

    Ideally, your service desks are already on the same ITSM platform, but if not, a comprehensive assessment of current tools is the first step toward a single, consolidated solution.

    Include the following in your tools assessment:

    • All automated ITSM solutions being used to log and track incidents and service requests
    • Any manual or other methods of tracking tickets (e.g. Excel spreadsheets)
    • Configurations and any customizations that have been made to the tools
    • How configuration items are maintained and how mature the configuration management databases (CMDB) are
    • Pricing and licensing agreements for tools
    • Any unique functions or limitations of the tools

    Info-Tech Insight

    Document not only the service management tools that are used but also any of their unique and necessary functions and configurations that users may have come to rely upon, such as remote support, self-serve, or chat support, in order to inform requirements in the next phase.

    Assess the IT environment your service desks support

    Even if you don’t do any formal asset management, take this opportunity for discovery and inventory to gain a complete understanding of your IT environment and the range of devices your service desks support.

    Inventory your IT environment, including:

    User Devices

    • Device counts by category Equipment/resources by user

    Servers

    • Server hardware, CPU, memory
    • Applications residing on servers

    Data centers

    • Including location and setup

    In addition to identifying the range of devices you currently support, assess:

    • Any future devices, hardware, or software that the service desk will need to support (e.g. BYOD, mobile)
    • How well each service desk is currently able to support these devices
    • Any unique or location-specific technology or devices that could limit a consolidation

    Info-Tech Insight

    The capabilities and configuration of your existing infrastructure and applications could limit your consolidation plans. A comprehensive technology assessment of not only the service desk tools but also the range of devices and applications your service desks supports will help you to prepare for any potential limitations or obstacles a consolidated service desk may present.

    Assess and document current information system environment

    1.3.5 Identify specific technology and tool requirements

    Participants
    • CIO
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You'll Need
    • Consolidate Service Desk Assessment Tool, tab 2.
    Document

    Document information on number of devices supported and number of desktop images associated with each service desk in the section on “Technology Data” of the Consolidate Service Desk Assessment Tool.

    1. Identify and document the service management tools that are used by each service desk.
    2. For each tool, identify and document any of the following that apply:
    • Integrations
    • Configurations that were made during implementation
    • Customizations that were made during implementation
    • Version, licenses, cost
  • For each service desk, document any location-specific or unique technology requirements or differences that could impact consolidation, including:
    • Devices and technology supported
    • Databases and configuration items
    • Differing applications or hardware needs
  • If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.1.1 Assign roles and responsibilities

    Use a RACI chart to assign overarching responsibilities for the consolidation project.

    1.3.2 Analyze the organizational structure of each service desk

    Map out the organizational structure and flow of each service desk and discuss the model that best describes each.

    Phase 2

    Design the Consolidated Service Desk

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Design consolidated service desk

    Proposed Time to Completion (in weeks): 2-4

    Step 2.1: Model target consolidated service desk

    Start with an analyst kick-off call:

    • Define the target state of the consolidated service desk in detail
    • Identify requirements for the consolidation, broken down by people, process, technology and by short- vs. long-term needs

    Then complete these activities…

    • Set project metrics to measure success of the consolidation
    • Brainstorm people, process, technology requirements for the service desk
    • Build requirements documents and RFP for a new tool
    • Review results of the scorecard comparison tool

    With these tools & templates:

    Consolidate Service Desk Scorecard Tool

    Step 2.2: Assess logistics and cost of consolidation

    Review findings with analyst:

    • Plan the logistics of the consolidation for process, technology, and facilities
    • Evaluate the cost and cost savings of consolidation using a TCO tool

    Then complete these activities…

    • Plan logistics for process, technology, facilities, and resource allocation
    • Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project

    With these tools & templates:

    Service Desk Efficiency Calculator

    Service Desk Consolidation TCO Comparison Tool

    Phase 2 Results:

    • Detailed requirements and vision for the consolidated service desk, gap analysis of current vs. target state, and an initial analysis of the logistical considerations to achieve target.

    Step 2.1: Model target consolidated state

    Phase 2

    Design consolidation

    2.1 Design target consolidated service desk

    2.2 Assess logistics and cost of consolidation

    This step will walk you through the following activities:
    • 2.1.1 Determine metrics to measure the value of the project
    • 2.1.2 Set targets for each metric to measure progress and success of the consolidation
    • 2.1.3 Brainstorm process requirements for consolidated service desk
    • 2.1.4 Brainstorm people requirements for consolidated service desk
    • 2.1.5 Brainstorm technology requirements for consolidated service desk
    • 2.1.6 Build a requirements document for the service desk tool
    • 2.1.7 Evaluate alternative tools, build a shortlist for RFPs, and arrange web demonstrations or evaluation copies
    • 2.1.8 Set targets for key metrics to identify high performing service desks
    • 2.1.9 Review the results of the scorecard to identify best practices
    This step involves the following participants:
    • CIO
    • IT Director
    • Service Desk Managers
    • Service Desk Technicians
    Step Outcomes
    • A list of people, process, and technology requirements for the new consolidated service desk
    • A clear vision of the target state
    • An analysis of the gaps between existing and target service desks

    Ensure the right people and methods are in place to anticipate implementation hurdles

    CASE STUDY

    Industry: Higher Education

    Source: Oxford University, IT Services

    "Since our last update, a review and re-planning exercise has reassessed the project approach, milestones, and time scales. This has highlighted some significant hurdles to transition which needed to be addressed, resulting primarily from the size of the project and the importance to the department of a smooth and well-planned transition to the new processes and toolset." – John Ireland, Director of Customer Service & Project Sponsor

    Initial hurdles led to a partial reorganization of the project in Fall 2014

    Despite careful planning and its ultimate success, Oxford’s consolidation effort still encountered some significant hurdles along the way – deadlines were sometimes missed and important processes overlooked.

    These bumps can be mitigated by building flexibility into your plan:

    • Adopt an Agile methodology – review and revise groups of tasks as the project progresses, rather than waiting until near the end of the project to get approval for the complete implementation.
    • Your Tiger Team or Project Steering Group must include the right people – the project team should not just include senior or high-level management; members of each affected IT group should be consulted, and junior-level employees can provide valuable insight into existing and potential processes and workflows.

    Info-Tech Insight

    Ensure that the project lead is someone conversant in ITSM, so that they are equipped to understand and react to the unique challenges and expectations of a consolidation and can easily communicate with process owners.

    Use the consolidation vision to define the target service desk in more detail

    Use your baseline assessment and your consolidation vision as a guide to figure out exactly where you’re going before planning how to get there.

    With approval for the project established and a clear idea of the current state of each service desk, narrow down the vision for the consolidated service desk into a specific picture of the target state.

    The target state should provide answers to the following types of questions:

    Process:

    • Will there be one set of SLAs across the organization?
    • What are the target SLAs?
    • How will ticket categories be defined?
    • How will users submit and track their tickets?
    • How will tickets be prioritized and escalated?
    • Will a knowledgebase be maintained and accessible by both service desk and end users?

    People:

    • How will staff be reorganized?
    • What will the roles and responsibilities look like?
    • How will tiers be structured?
    • What will the career path look like within the service desk?

    Technology:

    • Will there be one single ITSM tool to support the service desk?
    • Will an existing tool be used or will a new tool be selected?
    • If a new tool is needed, what are the requirements?

    Info-Tech Insight

    Select the target state that is right for your organization. Don’t feel pressured to select the highest target state or a complete consolidation. Instead select the target state that is most compatible with your organization’s current needs and capabilities.

    Determine metrics to measure the value of the project

    2.1.1 Identify KPIs to measure the success of the consolidation

    Participants
    • CIO
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You’ll Need
    • Whiteboard or flip chart and markers

    Identify three primary categories where the consolidation project is expected to yield benefits to the business. Use the example on the right to guide your discussion.

    Efficiency and effectiveness are standard benefits for this project, but the third category may depend on your organization.

    • Examples include: improved resourcing, security, asset management, strategic alignment, end-user experience, employee experience

    Identify 1-3 key performance indicators (KPIs) associated with each benefit category, which will be used to measure the success of the consolidation project. Ensure that each has a baseline measure that can be reassessed after the consolidation.

    Efficiency

    Streamlined processes to reduce duplication of efforts

    • Reduced IT spend and cost of delivery
    • One ITSM tool Improved reliability of service
    • Improved response time

    Resourcing

    Improved allocation of human and financial resources

    • Improved resource sharing
    • Improved organizational structure of service desk

    Effectiveness

    Service delivery will be more accessible and standardized

    • Improved responsive-ness to incidents and service requests
    • Improved resolution time
    • Single point of contact for end users
    • Improved reporting

    Set targets for each metric to measure progress and success of the consolidation

    2.1.2 Identify specific metrics for each KPI and targets for each

    Participants
    • IT Director
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You’ll Need
    • KPIs from previous step
    • Whiteboard or flip chart and markers
    1. Select one core KPI for each critical success factor, which will be used to measure progress and success of the consolidation effort down the road.
    2. For each KPI, document the average baseline metric the organization is achieving (averaged across all service desks).
    3. Discuss and document a target metric that the project will aim to reach through the single consolidated service desk.
    4. Set a short and long-term target for each metric to encourage continuous improvement. Examples:
    Efficiency
    Business Value KPI Current Metric Short-Term (6 month) Target Long-Term (1 year) Target
    Streamlined processes to reduce duplication of efforts Improved response time 2 hours 1 hour 30 minutes
    Effectiveness
    Business Value KPI Current Metric Short-Term (6 month) Target Long-Term (1 year) Target
    Service delivery will be more accessible and standardized Improved first call resolution (% resolved at Tier 1) 50% 60% 70%

    If poor processes were in place, take the opportunity to start fresh with the consolidation

    If each service desk’s existing processes were subpar, it may be easier to build a new service desk from the basics rather than trying to adapt existing processes.

    You should have these service management essentials in place:

    Service Requests:

    • Standardize process to verify, approve, and fulfill service requests.
    • Assign priority according to business criticality and service agreements.
    • Think about ways to manage service requests to better serve the business long term.

    Incident Management:

    • Set standards to define and record incidents.
    • Define incident response actions and communications.

    Knowledgebase:

    • Define standards for knowledgebase.
    • Introduce creation of knowledgebase articles.
    • Create a knowledge-sharing and cross-training culture.

    Reporting:

    • Select appropriate metrics.
    • Generate relevant insights that shed light on the value that IT creates for the organization.

    The image is a circle comprised of 3 concentric circles. At the centre is a circle labelled Standardized Service Desk. The ring outside of it is split into 4 sections: Incident Management; Service Requests; Structure and Reporting; and Knowledgebase. The outer circle is split into 3 sections: People, Process, Technologies.

    Evaluate how your processes compare with the best practices defined here. If you need further guidance on how to standardize these processes after planning the consolidation, follow Info-Tech’s blueprint, Standardize the Service Desk.

    Even optimized processes will need to be redefined for the target consolidated state

    Your target state doesn’t have to be perfect. Model a short-term, achievable target state that can demonstrate immediate value.

    Consider the following elements when designing service desk processes:
    • Ticket input (i.e. how can tickets be submitted?)
    • Ticket classification (i.e. how will tickets be categorized?)
    • Ticket prioritization (i.e. how will critical incidents be defined?)
    • Ticket escalation (i.e. how and at what point will tickets be assigned to a more specialized resource?)
    • Ticket resolution (i.e. how will resolution be defined and how will users be notified?)
    • Communication with end users (i.e. how and how often will users be notified about the status of their ticket or of other incidents and outages?)

    Consider the following unique process considerations for consolidation:

    • How will knowledge sharing be enabled in order for all technicians to quickly access known errors and resolve problems?
    • How can first contact resolution levels be maintained through the transition?
    • How will procedures be clearly documented so that tickets are escalated properly?
    • Will ticket classification and prioritization schemes need to change?
    • Will new services such as self-serve be introduced to end users and how will this be communicated?

    Info-Tech Insight

    Don’t do it all at once. Consolidation will lead to some level of standardization. It will be reinforced and improved later through ongoing reengineering and process improvement efforts (continual improvement management).

    Brainstorm process requirements for consolidated service desk

    2.1.3 Identify process-related requirements for short and long term

    Participants
    • CIO
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You'll Need
    • Whiteboard, sticky notes, markers
    • Vision and goals for the consolidation from step 1.2
    Document
    • Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.
    1. Review the questions in the previous section to frame a discussion on process considerations and best practices for the target consolidated service desk.
    2. Use your responses to the questions to brainstorm a list of process requirements or desired characteristics for the target state, particularly around incident management and service request management.
    3. Write each requirement onto a sticky note and categorize it as one of the following:
      1. Immediate requirement for consolidated service desk
      2. Implement within 6 months
      3. Implement within 1 year

    Example:

    Whiteboard:

    • Immediate
      • Clearly defined ticket prioritization scheme
      • Critical incident process workflow
    • 6 months
      • Clearly defined SOP, policies, and procedures
      • Transactional end-user satisfaction surveys
    • 1 year
      • Change mgmt.
      • Problem mgmt.

    Define the target resource distribution and utilization for the consolidated service desk

    Consolidation can sound scary to staff wondering if there will be layoffs. Reduce that by repurposing local staff and maximizing resource utilization in your organizational design.

    Consider the following people-related elements when designing your target state:

    • How will roles and responsibilities be defined for service desk staff?
    • How many agents will be required to deal with ticket demand?
    • What is the target agent utilization rate?
    • How will staff be distributed among tiers?
    • What will responsibilities be at each tier?
    • Will performance goals and rewards be established or standardized?

    Consider the following unique people considerations for consolidation:

    • Will staffing levels change?
    • Will job titles or roles change for certain individuals?
    • How will staff be reorganized?
    • Will staff need to be relocated to one location?
    • Will reporting relationships change?
    • How will this be managed?
    • How will performance measurements be consolidated across teams and departments to focus on the business goals?
    • Will there be a change to career paths?
    • What will consolidation do to morale, job interest, job opportunities?

    Info-Tech Insight

    Identify SMEs and individuals who are knowledgeable about a particular location, end-user base, technology, or service offering. They may be able to take on a different, greater role due to the reorganization that would make better use of their skills and capabilities and improve morale.

    Brainstorm people requirements for consolidated service desk

    2.1.4 Identify people-related requirements for short and long term

    Participants
    • CIO
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You'll Need
    • Whiteboard, sticky notes, markers
    • Vision and goals for the consolidation from step 1.2
    Document

    Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.

    1. Review the questions in the previous section to frame a discussion on people considerations and best practices for the target consolidated service desk.
    2. Use your responses to the questions to brainstorm a list of requirements for the allocation and distribution of resources, including roles, responsibilities, and organizational structure.
    3. When thinking about people, consider requirements for both your staff and your end users.
    4. Write each requirement onto a sticky note and categorize it as one of the following:
      1. Immediate requirement for consolidated service desk
      2. Implement within 6 months
      3. Implement within 1 year

    Example:

    Whiteboard:

    • Immediate
      • Three tier structure with SMEs at Tier 2 and 3
      • All staff working together in one visible location
    • 6 months
      • Roles and responsibilities well defined and documented
      • Appropriate training and certifications available to staff
    • 1 year
      • Agent satisfaction above 80%
      • End-user satisfaction above 75%

    Identify the tools that will support the service desk and those the service desk will support

    One of the biggest technology-related decisions you need to make is whether you need a new ITSM tool. Consider how it will be used by a single service desk to support the entire organization.

    Consider the following technology elements when designing your target state:
    • What tool will be used to support the service desk?
    • What processes or ITIL modules can the tool support?
    • How will reports be produced? What types of reports will be needed for particular audiences?
    • Will a self-service tool be in place for end users to allow for password resets or searches for solutions?
    • Will the tool integrate with tools for change, configuration, problem, and asset management?
    • Will the majority of manual processes be automated?
    Consider the following unique technology considerations for consolidation:
    • Is an existing service management tool extensible?
    • If so, can it integrate with essential non-IT systems?
    • Can the tool support a wider user base?
    • Can the tool support all areas, departments, and technologies it will need to after consolidation?
    • How will data from existing tools be migrated to the new tool?
    • What implementation or configuration needs and costs must be considered?
    • What training will be required for the tool?
    • What other new tools and technologies will be required to support the consolidated service desk?

    Info-Tech Insight

    Talk to staff at each service desk to ask about their tool needs and requirements to support their work. Invite them to demonstrate how they use their tools to learn about customization, configuration, and functionality in place and to help inform requirements. Engaging staff in the process will ensure that the new consolidated tool will be supported and adopted by staff.

    Brainstorm technology requirements for consolidated service desk

    2.1.5 Identify technology-related requirements for short and long term

    Participants
    • CIO
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You’ll Need
    • Whiteboard, sticky notes, markers
    • Vision and goals for the consolidation from step 1.2
    Document

    Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.

    1. Review the questions in the previous section to frame a discussion on technology considerations and best practices for the target consolidated service desk.
    2. Use your responses to the questions to brainstorm a list of requirements for the tools to support the consolidated service desk, along with any other technology requirements for the target state.
    3. Write each requirement onto a sticky note and categorize it as one of the following:
      1. Immediate requirement for consolidated service desk
      2. Implement within 6 months
      3. Implement within 1 year

    Example:

    Whiteboard:

    • Immediate
      • Single ITSM tool
      • Remote desktop support
    • 6 months
      • Self-service portal
      • Regular reports are produced accurately
    • 1 year
      • Mobile portal
      • Chat integration

    Identify specific requirements for a tool if you will be selecting a new ITSM solution

    Service desk software needs to address both business and technological needs. Assess these needs to identify core capabilities required from the solution.

    Features Description
    Modules
    • Do workflows integrate seamlessly between functions such as incident management, change management, asset management, desktop and network management?

    Self-Serve

    • Does the existing tool support self-serve in the form of web forms for incident reporting, forms for service requests, as well as FAQs for self-solve?
    • Is a service catalog available or can one be integrated painlessly?
    Enterprise Service Management Needs
    • Integration of solution to all of IT, Human Resources, Finance, and Facilities for workflows and financial data can yield great benefits but comes at a higher cost and greater complexity. Weigh the costs and benefits.
    Workflow Automation
    • If IT has advanced beyond simple workflows, or if extending these workflows beyond the department, more power may be necessary.
    • Full business process management (BPM) is part of a number of more advanced service desk/service management solutions.
    License Maintenance Costs
    • Are license and maintenance costs still reasonable and appropriate for the value of the tool?
    • Will the vendor renegotiate?
    • Are there better tools out there for the same or better price?
    Configuration Costs
    • Templates, forms, workflows, and reports all take time and skills but bring big benefits. Can these changes be done in-house? How much does it cost to maintain and improve?
    Speed / Performance
    • Data growth and volume may have reached levels beyond the current solution’s ability to cope, despite database tuning.
    Vendor Support
    • Is the vendor still supporting the solution and developing the roadmap? Has it been acquired? Is the level of support still meeting your needs?

    Build a requirements document for the service desk tool

    2.1.6 Create a requirements list and demo script for an ITSM tool (optional)

    Participants
    • CIO/IT Director
    • Service Desk Manager(s)
    • Service Desk Technicians
    What You'll Need
    • Flip charts and markers
    • Templates:
      • IT Service Management Demo Script Template
      • Service Desk Software and RFP Evaluation Tool

    Create a requirements list for the service desk tool.

    1. Break the group into smaller functional groups.
    2. Brainstorm features that would be important to improving efficiencies, services to users, and visibility to data.
    3. Document on flip chart paper, labelling each page with the functional group name.
    4. Prioritize into must-have and nice-to-have items.
    5. Reconvene and discuss each list with the group.
    6. Info-Tech’s Service Desk Software and RFP Evaluation Tool can also be used to document requirements for an RFI.

    Create a demo script:

    Using information from the requirements list, determine which features will be important for the team to see during a demo. Focus on areas where usability is a concern, for example:

    • End-user experience
    • Workflow creation and modification
    • Creating templates
    • Creating service catalog items
    • Knowledgebase

    Evaluate alternative tools, build a shortlist for RFPs, and arrange web demonstrations or evaluation copies

    2.1.7 Identify an alternative tool and build an RFP (optional)

    Participants
    • CIO (optional)
    • Service Desk Manager
    • Service Desk Technician(s)
    • Service Desk Tool Administrator
    What You'll Need
    • Whiteboard or flip chart and markers
    • Service Desk RFP Template

    Evaluate current tool:

    • Investigate to determine if these features are present and just not in use.
    • Contact the vendor if necessary.
    • If enough features are present, determine if additional training is required.
    • If tool is proven to be inadequate, investigate options.

    Consider alternatives:

    Use Info-Tech’s blueprints for further guidance on selecting and implementing an ITSM tool

    1. Select a tool

    Info-Tech regularly evaluates ITSM solution providers and ranks each in terms of functionality and affordability. The results are published in the Enterprise and Mid-Market Service Desk Software Vendor Landscapes.

    2. Implement the tool

    After selecting a solution, follow the Build an ITSM Tool Implementation Plan project to develop an implementation plan to ensure the tool is appropriately designed, installed, and tested and that technicians are sufficiently trained to ensure successful deployment and adoption of the tool.

    Compare your existing service desks with the Consolidate Service Desk Scorecard Tool

    Complete the scorecard tool along with the activities of the next step

    The Consolidate Service Desk Scorecard Tool will allow you to compare metrics and maturity results across your service desks to identify weak and poor performers and processes.

    The purpose of this tool is to organize the data from up to six service desks that are part of a service desk consolidation initiative. Displaying this data in an organized fashion, while offering a robust comparative analysis, should facilitate the process of establishing a new baseline for the consolidated service desk.

    Use the results on tab 4 of the Consolidate Service Desk Assessment Tool. Enter the data from each service desk into tab “2. InfoCards” of the Consolidate Service Desk Scorecard Tool.

    Data from up to six service desks (up to six copies of the assessment tool) can be entered into this tool for comparison.

    Set targets for key metrics to identify high performing service desks

    2.1.8 Use the scorecard tool to set target metrics against which to compare service desks

    Participants
    • CIO or IT Director
    • Service Desk Manager(s)
    What You’ll Need
    • Consolidate Service Desk Scorecard Tool
    1. Review the explanations of the six core metrics identified from the service desk assessment tool. These are detailed on tab 3 of the Consolidate Service Desk Scorecard Tool.
      1. End-user satisfaction
      2. Agent satisfaction
      3. Cost per ticket
      4. Agent utilization rate
      5. First contact resolution rate
      6. First tier resolution rate
    2. For each metric (except agent utilization), define a “worst” and “best” target number. These numbers should be realistic and determined only after some consideration.
    • Service desks scoring at or above the “best” threshold for a particular metric will receive 100% on that metric; while service desks scoring at or below the “worst” threshold for a particular metric will receive 0% on that metric.
    • For agent utilization, only a “best” target number is entered. Service desks hitting this target number exactly will receive 100%, with scores decreasing as a service desk’s agent utilization gets further away from this target.
  • Identify the importance of each metric and vary the values in the “weighting” column accordingly.
  • The values entered on this tab will be used in calculating the overall metric score for each service desk, allowing you to compare the performance of existing service desks against each other and against your target state.

    Review the results of the scorecard to identify best practices

    2.1.9 Discuss the results of the scorecard tool

    Participants
    • CIO or IT Director (optional)
    • Service Desk Manager(s)
    What You'll Need
    • Consolidate Service Desk Scorecard Tool
    1. Facilitate a discussion on the results of the scorecard tool on tabs 4 (Overall Results), 5 (Maturity Results), and 6 (Metrics Results).
    2. Identify the top performing service desks(s) (SD Champions) as identified by the average of their metric and maturity scores.
    3. Identify the top performing service desk by maturity level (tab 5; Level 3 – Integrated or Optimized), paying particular attention to high scorers on process maturity and maturity in incident & service request management.
    4. Identify the top performing service desk by metric score (tab 6), paying particular attention to the metrics that tie into your KPIs.
    5. For those service desks, review their processes and identify what they are doing well to glean best practices.
      1. Incorporate best practices from existing high performing service desks into your target state.
      2. If one service desk is already performing well in all areas, you may choose to model your consolidated service desk after it.

    Document processes and procedures in an SOP

    Define the standard operating procedures for the consolidated service desk

    Develop one set of standard operating procedures to ensure consistent service delivery across locations.

    One set of standard operating procedures for the new service desk is essential for a successful consolidation.

    Info-Tech’s Consolidated Service Desk SOP Template provides a detailed example of documenting procedures for service delivery, roles and responsibilities, escalation and prioritization rules, workflows for incidents and service requests, and resolution targets to help ensure consistent service expectations across locations.

    Use this template as a guide to develop or refine your SOP and define the processes for the consolidated service desk.

    Step 2.2: Assess logistics and cost of consolidation

    Phase 2

    Design consolidation

    2.1 Design target consolidated state

    2.2 Assess logistics and cost

    This step will walk you through the following activities:
    • 2.2.1 Plan logistics for process, technology, and facilities
    • 2.2.2 Plan logistics around resource allocation
    • 2.2.3 Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project
    This step involves the following participants:
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    Step outcomes
    • An understanding and list of tasks to accomplish to ensure all logistical considerations for the consolidation are accounted for
    • An analysis of the impact on staffing and service levels using the Service Desk Efficiency Calculator
    • An assessment of the cost of consolidation and the cost savings of a consolidated service desk using a TCO tool

    The United States Coast Guard’s consolidation saved $20 million in infrastructure and support costs

    CASE STUDY

    Industry: US Coast Guard

    Source: CIO Rear Adm. Robert E. Day, Jr. (retired)

    Challenges

    The US Coast Guard was providing internal IT support for 42,000 members on active duty from 11 distinct regional IT service centers around the US.

    Pain Points

    1. Maintaining 11 disparate IT architectures was costly and time consuming.
    2. Staffing inefficiencies limited the USCG’s global IT service operations to providing IT support from 8am to 4pm.
    3. Individual sites were unable to offload peak volume during heavier call loads to other facilities.
    4. Enforcing adherence to standard delivery processes, procedures, and methods was nearly impossible.
    5. Personnel didn’t have a single point of contact for IT support.
    6. Leadership has limited access to consolidated analytics.

    Outcomes

    • Significant reduction in infrastructure, maintenance, and support costs.
    • Reduced risk through comprehensive disaster recovery.
    • Streamlined processes and procedures improved speed of incident resolution.
    • Increased staffing efficiencies.
    • Deeper analytical insight into service desk performance.

    Admiral Day was the CIO from 2009 to 2014. In 2011, he lead an initiative to consolidate USCG service desks.

    Selecting a new location communicated the national mandate of the consolidated service desk

    Site Selection - Decision Procedures

    • Determine location criteria, including:
      • Access to airports, trains, and highways
      • Workforce availability and education
      • Cost of land, real estate, taxes
      • Building availability Financial incentives
    • Review space requirements (i.e. amount and type of space).
    • Identify potential locations and analyze with defined criteria.
    • Develop cost models for various alternatives.
    • Narrow selection to 2-3 sites. Analyze for fit and costs.
    • Conduct site visits to evaluate each option.
    • Make a choice and arrange for securing the site.
    • Remember to compare the cost to retrofit existing space with the cost of creating a space for the consolidated service desk.

    Key Decision

    Relocating to a new location involved potentially higher implementation costs, which was a significant disadvantage.

    Ultimately, the relocation reinforced the national mandate of the consolidated service desk. The new organization would act as a single point of contact for the support of all 42,000 members of the US Coast Guard.

    "Before our regional desks tended to take on different flavors and processes. Today, users get the same experience whether they’re in Alaska or Maryland by calling one number: (855) CG-FIX IT." – Rear Adm. Robert E. Day, Jr. (retired)

    Plan the logistics of the consolidation to inform the project roadmap and cost assessment

    Before proceeding, validate that the target state is achievable by evaluating the logistics of the consolidation itself.

    A detailed project roadmap will help break down the project into manageable tasks to reach the target state, but there is no value to this if the target state is not achievable or realistic.

    Don’t forget to assess the logistics of the consolidation that can be overlooked during the planning phase:

    • Service desk size
    • Location of the service desk
    • Proximity to company management and facilities
    • Unique applications, platforms, or configurations in each location/region
    • Distribution of end-user population and varying end-user needs
    • Load balancing
    • Call routing across locations
    • Special ergonomic or accessibility requirements by location
    • Language requirements

    Info-Tech Insight

    Language barriers can form significant hurdles or even roadblocks for the consolidation project. Don’t overlook the importance of unique language requirements and ensure the consolidated service desk will be able to support end-user needs.

    Plan logistics for process, technology, and facilities

    2.2.1 Assess logistical and cost considerations around processes, technology, and facilities

    Participants
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    What You'll Need
    • Whiteboard or flip chart and markers
    • Consolidate roadmap
    Document

    Identify tasks that should form part of the roadmap and document in the roadmap tool.

    Identify costs that should be included in the TCO assessment and document in the TCO tool.

    Discuss and identify any logistic and cost considerations that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.

    Logistic considerations

    • Impact of ticket intake process changes on end users
    • Process change impact on SLAs and productivity standards
    • Call routing changes and improvements
    • Workstations and workspace – is there enough and what will it look like for each agent?
    • Physical access to the service desk – will walk-ups be permitted? Is it accessible?
    • Security or authorization requirements for specific agents that may be impacted by relocation
    • Layout and design of new location, if applicable
    • Hardware, platform, network, and server implications
    • Licensing and contract limitations of the service desk tool

    Cost considerations

    • Cost savings from ITSM tool consolidation
    • Cost of new ITSM tool purchase, if applicable
    • Efficiencies gained from process simplification
    • New hardware or software purchases
    • Cost per square foot of new physical location, if applicable

    Develop a staffing plan that leverages the strengths you currently have and supplement where your needs require

    Your staff are your greatest assets; be sensitive to their concerns as you plan the consolidation.

    Keep in mind that if your target state involves reorganization of resources and the creation of resources, there will be additional staffing tasks that should form part of the consolidation plan. These include:

    • Develop job descriptions and reporting relationships
    • Evaluate current competencies Identify training and hiring needs
    • Develop migration strategy (including severance and migration packages)

    If new positions will be created, follow these steps to mitigate risks:

    1. Conduct skills assessments (a skills inventory should have been completed in phase 1)
    2. Re-interview existing staff for open positions before considering hiring outside staff
    3. Hire staff from outside if necessary

    For more guidance on hiring help desk staff, see Info-Tech’s blueprint, Manage Help Desk Staffing.

    Be sensitive to employee concerns.

    Develop guiding principles for the consolidation to ensure that employee satisfaction remains a priority throughout the consolidation.

    Examples include:

    1. Reconcile existing silos and avoid creating new silos
    2. Keep current systems where it makes sense to avoid staff having to learn multiple new systems to do their jobs and to reduce costs
    3. Repurpose staff and allocate according to their knowledge and expertise as much as possible
    4. Remain open and transparent about all changes and communicate change regularly

    Info-Tech Insight

    The most talented employees can be lost in the migration to a consolidated service desk, resulting in organizational loss of core knowledge. Mitigate this risk using measurement strategies, competency modeling, and knowledge sharing to reduce ambiguity and discomfort of affected employees.

    Plan logistics around resource allocation

    2.2.2 Assess logistical and cost considerations around people

    Participants
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    What You’ll Need
    • Whiteboard or flip chart and markers
    • Consolidate roadmap
    Document

    Identify tasks that should form part of the roadmap and document in the roadmap tool.

    Identify costs that should be included in the TCO assessment and document in the TCO tool.

    Discuss and identify any logistic and cost considerations surrounding resources and staffing that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.

    Logistic considerations

    • Specialized training requirements for staff moving to new roles
    • Enablement of knowledge sharing across agents
    • Potential attrition of staff who do not wish to relocate or be reallocated
    • Relocation of staff – will staff have to move and will there be incentives for moving?
    • Skills requirements, recruitment needs, job descriptions, and postings for hiring

    Cost considerations

    • Existing and future salaries for employees
    • Potential attrition of employees
    • Retention costs and salary increases to keep employees
    • Hiring costs
    • Training needs and costs

    Assess impact on staffing with the Service Desk Efficiency Calculator

    How do organizations calculate the staffing implications of a service desk consolidation?

    The Service Desk Efficiency Calculator uses the ITIL Gross Staffing Model to think through the impact of consolidating service desk processes.

    To estimate the impact of the consolidation on staffing levels, estimate what will happen to three variables:

    • Ticket volume
    • Average call resolution
    • Spare capacity

    All things being equal, a reduction in ticket volume (through outsourcing or the implementation of self-serve options, for example), will reduce your staffing requirements (all things being equal). The same goes for a reduction in the average call resolution rate.

    Constraints:

    Spare capacity: Many organizations are motivated to consolidate service desks by potential reductions in staffing costs. However, this is only true if your service desk agents have spare capacity to take on the consolidated ticket volume. If they don’t, you will still need the same number of agents to do the work at the consolidated service desk.

    Agent capabilities: If your agents have specialised skills that you need to maintain the same level of service, you won’t be able to reduce staffing until agents are cross-trained.

    Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project

    2.2.3 Discuss the results of the efficiency calculator in the context of consolidation

    Participants
    • CIO or IT Director
    • Service Desk Manager(s)
    What You’ll Need
    • Completed Service Desk Efficiency Calculator

    The third tab of the Service Desk Efficiency Calculator will quantify:

    • Service Desk Staffing: The impact of different ticket distribution on service desk staffing levels.
    • Service Desk Ticket Resolution Cost: The impact of different ticket distributions on ticket resolution costs.
    • Service Management Efficiency: The business impact of service management initiatives, specifically, the time lost or captured in service management processes relative to an average full-time employee equivalent.

    Facilitate a discussion around the results.

    Evaluate where you are now and where you hope to be. Focus on the efficiency gains expected from the outsourcing project. Review the expected gains in average resolution time, the expected impact on service desk ticket volume, and the associated productivity gains.

    Use this information to refine the business case and project plan for the consolidation, if needed.

    Assess consolidation costs and cost savings to refine the business case

    While cost savings should not be the primary driver of consolidation, they should be a key outcome of the project in order to deliver value.

    Typical cost savings for a service desk consolidation are highlighted below:

    People 10-20% savings (through resource pooling and reallocation)

    Process 5-10% savings (through process simplification and efficiencies gained)

    Technology 10-15% savings (through improved call routing and ITSM tool consolidation)

    Facilities 5-10% savings (through site selection and redesign)

    Cost savings should be balanced against the costs of the consolidation itself (including hiring for consolidation project managers or consultants, moving expenses, legal fees, etc.)

    Evaluate consolidation costs using the TCO Comparison Tool described in the next section.

    Analyze resourcing and budgeting to create a realistic TCO and evaluate the benefits of consolidation

    Use the TCO tool to assess the cost and cost savings of consolidation

    • The tool compares the cost of operating two service desks vs. one consolidated service desk, along with the cost of consolidation.
    • If your consolidation effort involves more than two facilities, then use multiple copies of the tool.
      • E.g. If you are consolidating four service desks (A, B, C, and D) into one service desk (X), then use two copies of the tool. We encourage you to book an analyst call to help you get the most out of this tool and process.

    Service Desk Consolidation TCO Comparison Tool

    Refine the business case and update the executive presentation

    Check in with executives and project sponsor before moving forward with the transition

    Since completing the executive visioning session in step 1.2, you should have completed the following activities:

    • Current state assessment
    • Detailed target state and metrics
    • Gap analysis between current and target state
    • Assessment of logistics and cost of consolidation

    The next step will be to develop a project roadmap to achieve the consolidation vision.

    Before doing this, check back in with the project sponsor and business executives to refine the business case, obtain necessary approvals, and secure buy-in.

    If necessary, add to the executive presentation you completed in step 1.2, copying results of the deliverables you have completed since:

    • Consolidate Service Desk Assessment Tool (current state assessment)
    • Consolidate Service Desk Scorecard Tool
    • Service Desk Consolidation TCO Comparison Tool

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.1.3 Brainstorm process requirements for consolidated service desk

    Identify process requirements and desired characteristics for the target consolidated service desk.

    2.1.9 Review the results of the scorecard to identify best practices

    Review the results of the Consolidate Service Desk Scorecard Tool to identify top performing service desks and glean best practices.

    Phase 3

    Plan the Transition

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Plan the transition

    Proposed Time to Completion (in weeks): 2-4

    Step 3.1: Build project roadmap

    Discuss with an analyst:

    • Identify specific initiatives for the consolidation project and evaluate the risks and dependencies for each
    • Plot initiatives on a detailed project roadmap with assigned responsibilities

    Then complete these activities…

    • Break the consolidation project down into specific initiatives
    • Identify and document risks and dependencies
    • Plot your initiatives onto a detailed project roadmap
    • Select transition date for consolidation

    With these tools & templates:

    Service Desk Consolidation Roadmap

    Step 3.2: Communicate the change

    Discuss with an analyst:

    • Identify the goals of communication, then develop a communications plan with targeted messaging for each stakeholder group to achieve those goals
    • Brainstorm potential objections and questions as well as responses to each

    Then complete these activities…

    • Build the communications delivery plan
    • Brainstorm potential objections and questions and prepare responses
    • Complete the news bulletin to distribute to your end users

    With these tools & templates:

    Service Desk Consolidation Communications and Training Plan Template

    Service Desk Consolidation News Bulletin & FAQ Template

    Phase 3 Results:
    • A detailed project roadmap toward consolidation and a communications plan to ensure stakeholders are on board

    Step 3.1: Build the project roadmap

    Phase 3

    Plan the consolidation

    3.1 Build the project roadmap

    3.2 Communicate the change

    This step will walk you through the following activities:
    • 3.1.1 Break the consolidation project down into a series of specific initiatives
    • 3.1.2 Identify and document risks and dependencies
    • 3.1.3 Plot your initiatives onto a detailed project roadmap
    • 3.1.4 Select transition date based on business cycles
    This step involves the following participants:
    • CIO
    • IT Directors
    • Service Desk Managers
    • Consolidation Project Manager
    • Service Desk Technicians
    Step outcomes

    A detailed roadmap to migrate to a single, consolidated service desk, including:

    • A breakdown of specific tasks groups by people, process, and technology
    • Identified risks and dependencies for each task
    • A timeline for completion of each task and the overall consolidation
    • Assigned responsibility for task completion

    Failure to engage stakeholders led to the failure of a large healthcare organization’s consolidation

    CASE STUDY

    Industry: Healthcare

    Source: Organizational insider

    A large US healthcare facilities organization implemented a service desk consolidation initiative in early 2013. Only 18 months later, they reluctantly decided to return to their previous service desk model.

    Why did this consolidation effort fail?

    1. Management failed to communicate the changes to service-level staff, leading to agent confusion and pushback. Initially, each desk became part of the other’s overflow queue with no mention of the consolidation effort. Next, the independent desks began to share a basic request queue. Finally, there was a complete virtual consolidation – which came as a shock to service agents.
    2. The processes and workflows of the original service desks were not integrated, requiring service agents to consult different processes and use different workflows when engaging with end users from different facilities, even though all calls were part of the same queue.
    3. Staff at the different service centers did not have a consistent level of expertise or technical ability, even though they all became part of the same queue. This led to a perceived drop in end-user satisfaction – end users were used to getting a certain level of service and were suddenly confronted with less experienced agents.

    Before Consolidation

    Two disparate service desks:

    • With distinct geographic locations.
    • Servicing several healthcare facilities in their respective regions.
    • With distinct staff, end users, processes, and workflows.

    After Consolidation

    One virtually-consolidated service desk servicing many facilities spread geographically over two distinct locations.

    The main feature of the new virtual service desk was a single, pooled ticket queue drawn from all the end users and facilities in the new geographic regions.

    Break the consolidation project down into a series of specific initiatives

    3.1.1 Create a list of specific tasks that will form the consolidation project

    Participants
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    What You’ll Need
    • Whiteboard and markers
    • List of prioritized target state requirements
    • Consolidation roadmap
    Document

    Document the list of initiatives in the Service Desk Consolidation Roadmap.

    In order to translate your newly made decisions regarding the target state and logistical considerations into a successful consolidation strategy, create an exhaustive list of all the steps and sub-steps that will lead you from your current state to your target state.

    Use the next few steps to finish brainstorming the initiative list, identify risks and dependencies, and construct a detailed timeline populated with specific project steps.

    Instructions

    Start with the list you have been curating throughout the current and future state assessments. If you are completing this project as a workshop, add to the initiative list you have been developing on the whiteboard.

    Try to organize your initiatives into groups of related tasks. Begin arranging your initiatives into people, process, technology, or other categories.

    Whiteboard People Process Technology Other

    Evaluate the impact of potential risks and develop a backup plan for high risk initiatives

    A service desk consolidation has a high potential for risks. Have a backup plan prepared for when events don’t go as planned.

    • A consolidation project requires careful planning as it is high risk and not performed often.
    • Apply the same due diligence to the consolidation plan as you do in preparing your disaster recovery plan. Establish predetermined resolutions to realistic risks so that the team can think of solutions quickly during the consolidation.

    Potential Sources of Risk

    • Service desk tool or phone line downtime prevents ability to submit tickets
    • Unable to meet SLAs through the transition
    • Equipment failure or damage through the physical move
    • Lost data through tool migration
    • Lost knowledge from employee attrition
    Risk - degree of impact if activities do not go as planned High

    A – High Risk, Low Frequency

    Tasks that are rarely done and are high risk. Focus attention here with careful planning (e.g. consolidation)

    B – High Risk, High Frequency

    Tasks that are performed regularly and must be watched closely each time (e.g. security authorizations)

    C – Low Risk, Low Frequency

    Tasks that are performed regularly with limited impact or risk (e.g. server upgrades)

    D – Low Risk, High Frequency

    Tasks that are done all the time and are not risky (e.g. password resets)

    Low High
    Frequency - how often the activity has been performed

    Service desk consolidations fit in category A

    Identify risks for people, processes, tools, or data to ensure the project plan will include appropriate mitigations

    Each element of the consolidation has an inherent risk associated with it as the daily service flow is interrupted. Prepare in advance by anticipating these risks.

    The project manager, service desk managers, and subject matter experts (SMEs) of different areas, departments, or locations should identify risks for each of the processes, tools, resource groups (people), and any data exchanges and moves that will be part of the project or impacted by the project.

    Process - For each process, validate that workflows can remain intact throughout the consolidation project. If any gaps may occur in the process flows, develop a plan to be implemented in parallel with the consolidation to ensure service isn’t interrupted.

    Technology - For a tool consolidation, upgrade, or replacement, verify that there is a plan in place to ensure continuation of service delivery processes throughout the change.

    Make a plan for if and how data from the old tool(s) will be migrated to the new tool, and how the new tool will be installed and configured.

    People - For movement of staff, particularly with termination, identify any risks that may occur and involve your HR and legal departments to ensure all movement is compliant with larger processes within the organization.

    Info-Tech Insight

    Don’t overlook the little things. Sometimes the most minor-seeming components of the consolidation can cause the greatest difficulty. For example, don’t assume that the service desk phone number can simply roll over to a new location and support the call load of a combined service desk. Verify it.

    Identify and document risks and dependencies

    3.1.2 Risks, challenges, and dependencies exercise - Estimated Time: 60 minutes

    Participants
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    • SMEs
    What You'll Need
    • Whiteboard and markers
    • List of initiatives identified in previous activities
    • Consolidation roadmap
    Document

    Use the outcome of this activity to complete your consolidation roadmap.

    Instructions
    • Document risks and challenges, as well as dependencies associated with the initiatives identified earlier, using a different color sticky note from your initiatives.
    • See example below.
    Combine Related Initiatives
    • Look for initiatives that are highly similar, dependent on each other, or occurring at the same time. Consolidate these initiatives into a single initiative with several sub-steps in order to better organize your roadmap and reduce redundancy.
    • Create hierarchies for dependent initiatives that could affect the scheduling of initiatives on a roadmap, and reorganize the whiteboard where necessary.
    Optional:
    • Use a scoring method to categorize risks. E.g.:
      • High: will stop or delay operations, radically increase cost, or significantly reduce consolidation benefits
      • Medium: would cause some delay, cost increase, or performance shortfall, but would not threaten project viability
      • Low: could impact the project to a limited extent, causing minor delays or cost increases
    • Develop contingency plans for high risks or adjust to avoid the problem entirely
    Implement new ISTM tool:
    • Need to transition from existing tools
    • Users must be trained
    • Data and open tickets must be migrated

    Plot your initiatives onto a detailed project roadmap

    3.1.3 Estimated Time: 45 minutes

    Participants
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    Document

    Document your initiatives on tab 2 of the Service Desk Consolidation Roadmap or map it out on a whiteboard.

    Determine the sequence of initiatives, identify milestones, and assign dates.
    • The purpose of this exercise is to define a timeline and commit to initiatives to reach your goals.
    • Determine the order in which previously identified consolidation initiatives will be implemented, document previously identified risks and dependencies, assign ownership for each task, and assign dates for pilots and launch.

    Select transition date based on business cycles

    3.1.4

    Participants
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    What You'll Need
    • Consolidation roadmap
    Document

    Adjust initiatives in the consolidation roadmap if necessary.

    The transition date will be used in communications in the next step.

    1. Review the initiatives in the roadmap and the resulting sunshine diagram on tab 3.
    2. Verify that the initiatives will be possible within the determined time frame and adjust if necessary.
    3. Based on the results of the roadmap, select a target transition date for the consolidation by determining:
      1. Whether there are dates when a major effort of this kind should not be scheduled.
      2. Whether there are merger and acquisition requirements that dictate a specific date for the service desk merger.
    4. Select multiple measurable checkpoints to alert the team that something is awry and mitigate risks.
    5. Verify that stakeholders are aware of the risks and the proposed steps necessary to mitigate them, and assign the necessary resources to them.
    6. Document or adjust the target transition date in the roadmap.

    Info-Tech Insight

    Consolidating service desks doesn’t have to be done in one shot, replacing all your help desks, tools, and moving staff all at the same time. You can take a phased approach to consolidating, moving one location, department, or tool at a time to ease the transition.

    Step 3.2: Communicate the change

    Phase 3

    Design consolidation

    3.1 Build the project roadmap

    3.2 Communicate the change

    This step will walk you through the following activities:
    • 3.2.1 Build the communications delivery plan
    • 3.2.2 Brainstorm potential objections and questions and prepare responses
    This step involves the following participants:
    • IT Director
    • Project Manager
    • Service Desk Manager(s)
    • Service Desk Agents
    Step outcomes
    • A detailed communications plan with key messages, delivery timeline, and spokesperson responsibility for each key stakeholder audience
    • A set of agreed-upon responses to anticipated objections and questions to ensure consistent message delivery
    • A news bulletin and list of FAQs to distribute to end users to prepare them for the change

    Create your communication plan with everyone in mind, from the CIO to end users

    CASE STUDY

    Industry: Higher Education

    Source: Oxford University, IT Services

    Oxford implemented extremely innovative initiatives as part of its robust communications plan.

    ITS ran a one-day ITSM “business simulation” for the CIO and direct reports, increasing executive buy-in.

    The business simulation was incredibly effective as a way of getting management buy-in – it really showed what we are driving at. It’s a way of making it real, bringing people on board. ” – John Ireland, Director of Customer Service

    Detailed use cases were envisioned referencing particular ITIL processes as the backbone of the process framework.

    The use cases were very helpful, they were used […] in getting a broad engagement from teams across our department and getting buy-in from the distributed IT staff who we work with across the wider University. ” – John Ireland, Director of Customer Service

    The Oxford ITS SDCP blog was accessible to everyone.

    • Oxford’s SDCP blog acted as a project touchstone not only to communicate updates quickly, but also to collect feedback, enable collaboration, and set a project tone.
    • An informal tone and accessible format facilitated the difficult cultural shifts required of the consolidation effort.

    We in the project team would love to hear your view on this project and service management in general, so please feel free to comment on this blog post, contact us using the project email address […] or, for further information visit the project SharePoint site […] ” – Oxford ITS SDCP blog post

    Plan for targeted and timely communications to all stakeholders

    Develop a plan to keep all affected stakeholders informed about the changes consolidation will bring, and more importantly, how they will affect them.

    All stakeholders must be kept informed of the project plan and status as the consolidation progresses.
    • Management requires frequent communication with the core project group to evaluate the success of the project in meeting its goals.
    • End users should be informed about changes that are happening and how these changes will affect them.

    A communications plan should address three elements:

    1. The audience and their communication needs
    2. The most effective means of communicating with this audience
    3. Who should deliver the message

    Goals of communication:

    1. Create awareness and understanding of the consolidation and what it means for each role, department, or user group
    2. Gain commitment to the change from all stakeholders
    3. Reduce and address any concerns about the consolidation and be transparent in responding to any questions
    4. Communicate potential risks and mitigation plan
    5. Set expectations for service levels throughout and after the consolidation

    Plan the method of delivery for your communications carefully

    Plan the message, test it with a small audience, then deliver to your employees and stakeholders in person to avoid message avoidance or confusion.

    Message Format

    Email and Newsletters

    Email and newsletters are convenient and can be transmitted to large audiences easily, but most users are inundated with email already and may not notice or read the message.

    • Use email to make large announcements or invite people to meetings but not as the sole medium of communication.

    Face-to-Face Communication

    Face-to-face communication helps to ensure that users are receiving and understanding a clear message, and allows them to voice their concerns and clarify any confusion or questions.

    • Use one-on-ones for key stakeholders and team meetings for groups.

    Internal Website/Drive

    Internal sites help sustain change by making knowledge available after the consolidation, but won’t be retained beforehand.

    • Use for storing policies, how-to-guides, and SOPs.
    Message Delivery
    1. Plan your message
      1. Emphasize what the audience really needs to know, that is, how the change will impact them.
    2. Test your message
      1. Run focus groups or test your communications with a small audience (2-3 people) first to get feedback and adjust messages before delivering them more broadly.
    3. Deliver and repeat your message
      1. “Tell them what you’re going to tell them, then tell them, then tell them what you told them.”
    4. Gather feedback and evaluate communications
      1. Evaluate the effectiveness of the communications (through surveys, focus groups, stakeholder interviews, or metrics) to ensure the message was delivered and received successfully and communication goals were met.

    Address the specific concerns of the business vs. employees

    Focus on alleviating concerns from both sides of the communication equation: the business units and employees.

    Business units:

    Be attentive to the concerns of business unit management about loss of power. Appease worries about the potential risk of reduced service quality and support responsiveness that may have been experienced in prior corporate consolidation efforts.

    Make the value of the consolidation clear, and involve business unit management in the organizational change process.

    Focus on producing a customer-focused consolidated service desk. It will assuage fears over the loss of control and influence. Business units may be relinquishing control of their service desk, but they should retain the same level of influence.

    Employees:

    Employees are often fearful of the impact of a consolidation on their jobs. These fears should be addressed and alleviated as soon as possible.

    Design a communication plan outlining the changes and the reasons motivating it.

    Put support programs in place for displaced and surviving employees.

    Motivate employees during the transition and increase employee involvement in the change.

    Educate and train employees who make the transition to the new structure and new job demands.

    Info-Tech Insight

    Know your audience. Be wary of using technical jargon or acronyms that may seem like common knowledge within your department but would not be part of the vocabulary of non-technical audiences. Ensure your communications are suitable for the audience. If you need to use jargon or acronyms, explain what you mean.

    Build the communications delivery plan

    3.2.1 Develop a plan to deliver targeted messages to key stakeholder groups

    Participants
    • CIO or IT Director
    • Project Manager
    • Service Desk Manager(s)
    What You'll Need
    • Communications plan template
    • Whiteboard and markers
    Document

    Document your decisions in the communications plan template

    1. Define the goals of the communications in section 1 of the Service Desk Consolidation Communications and Training Plan Template.
    2. Determine when communication milestones/activities need to be delivered by completing the Communications Schedule in section 2.
    3. Determine the key stakeholder groups or audiences to whom you will need to deliver communications.
    4. Identify the content of the key messages that need to be delivered and select the most appropriate delivery method for each (i.e. email, team meeting, individual meetings). Designate who will be responsible for delivering the messages.
    5. Document a plan for gathering feedback and evaluating the effectiveness of the communications in section 5 (i.e. stakeholder interviews and surveys).

    Section 4 of the communications plan on objections and question handling will be completed in activity 3.2.2.

    Optional Activity

    If you completed the Stakeholder Engagement Workbook in step 1.1, you may also complete the Communications tab in that workbook to further develop your plan to engage stakeholders.

    Effectively manage the consolidation by implementing change management processes

    Implement change management processes to ensure that the consolidation runs smoothly with limited impact on IT infrastructure.

    Communicate and track changes: Identify and communicate changes to all stakeholders affected by the change to ensure they are aware of any downtime and can plan their own activities accordingly.

    Isolate testing: Test changes within a safe non-production environment to eliminate the risk of system outages that result from defects discovered during testing.

    Document back-out plans: Documented back-out/backup plans enable quick recovery in the event that the change fails.

    The image is a horizontal bar graph, titled Unplanned downtime due to change versus change management maturity. The graph shows that for a Change Management Maturity that is Informal, the % Experiencing Unplanned Downtime due to Failed Change is 41%; for Defined, it is 25%; and for Optimized, it is 19%.

    Organizations that have more mature and defined change management processes experience less unplanned downtime when implementing change across the organization.

    Sustain changes by adapting people, processes, and technologies to accept the transition

    Verify that people, process, and technologies are prepared for the consolidation before going live with the transition.

    What?

    1. Adapt people to the change

    • Add/change roles and responsibilities.
    • Move people to different roles/teams.
    • Change compensation and incentive structures to reinforce new goals, if applicable.

    2. Adapt processes to the change

    • Add/change supporting processes.
    • Eliminate or consolidate legacy processes.
    • Add/change standard operating procedures.

    3. Adapt technologies to the change

    • Add/change/update supporting technologies.
    • Eliminate or consolidate legacy technologies
    How? Work with HR on any changes involving job design, personnel changes, or compensation. Work with enterprise architects or business analysts to manage significant changes to processes that may impact the business and service levels.

    See Info-Tech’s Optimize the Change Management Processblueprint to use a disciplined change control process for technology changes.

    Info-Tech Insight

    Organizational change management (OCM) is widely recognized as a key component of project success, yet many organizations struggle to get adoption for new tools, policies, and procedures. Use Info-Tech’s blueprint on driving organizational change to develop a strategy and toolkit to achieve project success.

    Manage people by addressing their specific concerns based on their attitude toward change

    Avoid high turnover and resistance to change by engaging both the enthusiasts and the skeptics with targeted messaging.

    • Clearly articulate and strongly champion the changes that will result from the consolidation for those willing to adapt to the change.
    • Make change management practices integral to the entire project.
    • Provide training workshops on new processes, new goals or metrics, new technologies and tools, and teamwork as early as possible after consolidation.
    1. Enthusiasts - Empower them to stay motivated and promote the change
    2. Fence-Sitters/Indifferent - Continually motivate them by example but give them time to adapt to the change
    3. Skeptics - Engage them early and address their concerns and doubts to convert them to enthusiasts
    4. Saboteurs - Prevent them from spreading dissent and rumors, thus undermining the project, by counteracting negative claims early

    Leverage the Stakeholder Engagement Workbook from step 1.1 as well as Info-Tech’s blueprint on driving organizational change for more tactics on change management, particularly managing and engaging various personas.

    Prepare ahead of time for questions that various stakeholder groups may have

    Anticipate questions that will arise about the consolidation so you can prepare and distribute responses to frequently asked questions. Sample questions from various stakeholders are provided below.

    General
    1. Why is the organization moving to a consolidated service desk?
    2. Where is the consolidated service desk going to be located?
    3. Are all or only some service desks consolidating?
    4. When is the consolidation happening?
    5. What are the anticipated benefits of consolidation?

    Business

    1. What is the budget for the project?
    2. What are the anticipated cost savings and return on investment?
    3. When will the proposed savings be realized?
    4. Will there be job losses from the consolidation and when will these occur?
    5. Will the organization subsidize moving costs?

    Employees

    1. Will my job function be changing?
    2. Will my job location be changing?
    3. What will happen if I can’t relocate?
    4. Will my pay and benefits be the same?
    5. Will reporting relationships change?
    6. Will performance expectations and metrics change?

    End Users

    1. How do I get help with IT issues?
    2. How do I submit a ticket?
    3. How will I be notified of ticket status, outages?
    4. Where will the physical service desk be located?
    5. Will I be able to get help in my language?
    6. Will there be changes for levels of service?

    Brainstorm likely objections/questions to prepare responses

    3.2.2 Prepare responses to likely questions to ensure consistent messaging

    Participants
    • IT Director
    • Project Manager
    • Service Desk Manager(s)
    • Service Desk Agents
    Document

    Document your questions and responses in section 4 of the communications plan template. This should be continually updated.

    1. Brainstorm anticipated objections and questions you may hear from various stakeholder groups: service desk employees, end users, and management or executives.
    2. For each objection or question, prepare a response that will be delivered to ensure consistent messaging. Use a table like the example below.
    Group Objection/Question Response
    Service desk staff I’m comfortable with the service desk tool we’ve been using here and won’t know how to use the new one. We carefully evaluated the new solution against our requirements and selected it as the one that will provide the best service to our users and be user friendly. We tested the solution through user-acceptance testing to ensure staff will be comfortable using it, and we will provide comprehensive training to all users of the tool before launching it.
    End user I’m used to going to my favorite technician for help. How will I get service now? We are initiating a single point of contact so that you will know exactly where to go to get help quickly and easily, so that we can more quickly escalate your issue to the appropriate technician, and so that we can resolve it and notify you as soon as possible. This will make our service more effective and efficient than you having to find one individual who may be tied up with other work or unavailable.

    Keep the following in mind when formulating your responses:

    • Lead with the benefits
    • Be transparent and honest
    • Avoid acronyms, jargon, and technical terms
    • Appeal to both emotion and reason
    • Be concise and straightforward
    • Don’t be afraid to be repetitive; people need repetition to remember the message
    • Use concrete facts and images wherever possible

    Complete the Service Desk Consolidation News Bulletin & FAQ Template to distribute to your end users

    Customize the template or use as a guide to develop your own

    The Service Desk Consolidation News Bulletin & FAQ Template is intended to be an example that you can follow or modify for your own organization. It provides a summary of how the consolidation project will change how end users interact with the service desk.

    1. What the change means to end users
    2. When they should contact the service desk (examples)
    3. How to contact the service desk (include all means of contact and ticket submission)
    4. Answers to questions they may have
    5. Links to more information

    The bulletin is targeted for mass distribution to end users. A similar letter may be developed for service desk staff, though face-to-face communication is recommended.

    Instructions:

    1. Use the template as a guide to develop your own FAQ news bulletin and adjust any sections or wording as you see fit.
    2. You may wish to develop separate letters for each location, referring more specifically to their location and where the new service desk will be located.
    3. Save the file as a PDF for print or email distribution at the time determined in your communications plan.

    Keeping people a priority throughout the project ensured success

    CASE STUDY

    Industry: Higher Education

    Source: Oxford University, IT Services

    Oxford’s new consolidated service desk went live April 20, 2015.

    They moved from 3 distinct tools and 5 disparate help desks to a single service desk with one robust ITSM solution, all grounded by a unified set of processes and an integrated workflow.

    The success of this project hinged upon:

    • A bold vision, formulated early and in collaboration with all stakeholders.
    • Willingness to take time to understand the unique perspective of each role and help desk, then carefully studying existing processes and workflows to build upon what works.
    • Constant collaboration, communication, and the desire to listen to feedback from all interested parties.

    "We have had a few teething issues to deal with, but overall this has been a very smooth transition given the scale of it." – ICTF Trinity Term 2015 IT Services Report

    Beyond the initial consolidation.
    • Over the summer of 2015, ITS moved to full 24/7 support coverage.
    • Oxford’s ongoing proposition with regard to support services is to extend the new consolidated service desk beyond its current IT role:
      • Academic Admissions
      • Case Management
      • IT Purchasing
    • To gradually integrate those IT departments/colleges/faculties that remain independent at the present time.
    • Info-Tech can facilitate these goals in your organization with our research blueprint, Extend the Service Desk to Enterprise.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1.1 Break the consolidation project down into a series of specific initiatives

    Create a list of specific tasks that will form the consolidation project on sticky notes and organize into people, process, technology, and other categories to inform the roadmap.

    3.2.2 Brainstorm likely objections/questions to prepare responses

    Brainstorm anticipated questions and objections that will arise from various stakeholder groups and prepare consistent responses to each.

    Related Info-Tech research

    Standardize the Service Desk - Provide timely and effective responses to user requests and resolutions of all incidents.

    Extend the Service Desk to the Enterprise - Position IT as an innovator.

    Build a Continual Improvement Plan for the Service Desk - Teach your old service desk new tricks.

    Adopt Lean IT to Streamline the Service Desk - Turn your service desk into a Lean, keen, value-creating machine.

    Vendor Landscape: Enterprise Service Desk Software - Move past tickets to proactive, integrated service.

    Vendor Landscape: Mid-Market Service Desk Software - Ensure the productivity of the help desk with the right platform.

    Build an ITSM Tool Implementation Plan - Nail your ITSM tool implementation from the outset.

    Drive Organizational Change from the PMO - Don’t let bad change happen to good projects.

    Research contributors and experts

    Stacey Keener - IT Manager for the Human Health and Performance Directorate, Johnson Space Center, NASA

    Umar Reed - Director of IT Support Services US Denton US LLP

    Maurice Pryce - IT Manager City of Roswell, Georgia

    Ian Goodhart - Senior Business Analyst Allegis Group

    Gerry Veugelaers - Service Delivery Manager New Zealand Defence Force

    Alisa Salley Rogers - Senior Service Desk Analyst HCA IT&S Central/West Texas Division

    Eddie Vidal - IS Service Desk Managers University of Miami

    John Conklin - Chief Information Officer Helen of Troy LP

    Russ Coles - Senior Manager, Computer Applications York Region District Schoolboard

    John Seddon - Principal Vanguard Consulting

    Ryan van Biljon - Director, Technical Services Samanage

    Rear Admiral Robert E. Day Jr. (ret.) - Chief Information Officer United States Coast Guard

    George Bartha - Manager of Information Technology Unifrax

    Peter Hubbard - IT Service Management Consultant Pink Elephant

    Andre Gaudreau - Manager of School Technology Operations York Region District School Board

    Craig Nekola - Manager, Information Technology Anoka County

    Bibliography and Further Reading

    Hoen, Jim. “The Single Point of Contact: Driving Support Process Improvements with a Consolidated IT Help-Desk Approach.” TechTeam Global Inc. September 2005.

    Hubbard, Peter. “Leading University embarks on IT transformation programme to deliver improved levels of service excellence.” Pink Elephant. http://pinkelephant.co.uk/about/case-studies/service-management-case-study/

    IBM Global Services. “Service Desk: Consolidation, Relocation, Status Quo.” IBM. June 2005.

    Keener, Stacey. “Help Desks: a Problem of Astronomical Proportions.” Government CIO Magazine. 1 February 2015.

    McKaughan, Jeff. “Efficiency Driver.” U.S. Coast Guard Forum Jul. 2013. Web. http://www.intergraphgovsolutions.com/documents/CoastGuardForumJuly2013.pdf

    Numara Footprints. “The Top 10 Reasons for Implementing a Consolidated Service Desk.” Numara Software.

    Roy, Gerry, and Frederieke Winkler Prins. “How to Improve Service Quality through Service Desk Consolidation.” BMC Software.

    Smith, Andrew. “The Consolidated Service Desk – An Achievable Goal?” The Service Desk Institute.

    Wolfe, Brandon. “Is it Time for IT Service Desk Consolidation?” Samanage. 4 August 2015.

    Strengthen the SSDLC for Enterprise Mobile Applications

    • Buy Link or Shortcode: {j2store}283|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Mobile Development
    • Parent Category Link: /mobile-development
    • CEOs see mobile for employees as their top mandate for upcoming technology innovation initiatives, making security a key competency for development.
    • Unsecure mobile applications can cause your employees to question the mobile applications’ integrity for handling sensitive data, limiting uptake.
    • Secure mobile development tends to be an afterthought, where vulnerabilities are tested for post-production rather than during the build process.
    • Developers lack the expertise, processes, and proper tools to effectively enhance applications for mobile security.

    Our Advice

    Critical Insight

    • Organizations currently react to security issues. Info-Tech recommends a proactive approach to ensure a secure software development life cycle (SSDLC) end-to-end.
    • Organizations currently lack the secure development practices to provide highly secure mobile applications that end users can trust.
    • Enable your developers with five key secure development techniques from Info-Tech’s development toolkit.

    Impact and Result

    • Embed secure development techniques into your SDLC.
    • Create a repeatable process for your developers to continually evaluate and optimize mobile application security for new threats and corresponding mitigation steps.
    • Build capabilities within your team based on Info-Tech’s framework by supporting ongoing security improvements through monitoring and metric analysis.

    Strengthen the SSDLC for Enterprise Mobile Applications Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should adopt secure development techniques for mobile application development, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess secure mobile development processes

    Determine the current security landscape of mobile application development.

    • Strengthen the SSDLC for Enterprise Mobile Applications – Phase 1: Assess Secure Mobile Development Practices
    • Systems Architecture Template
    • Mobile Application High-Level Design Requirements Template

    2. Implement and test secure mobile techniques

    Incorporate the various secure development techniques into current development practices.

    • Strengthen the SSDLC for Enterprise Mobile Applications – Phase 2: Implement and Test Secure Mobile Techniques

    3. Monitor and support secure mobile applications

    Create a roadmap for mobile optimization initiatives.

    • Strengthen the SSDLC for Enterprise Mobile Applications – Phase 3: Monitor and Support Secure Mobile Applications
    • Mobile Optimization Roadmap
    [infographic]

    Workshop: Strengthen the SSDLC for Enterprise Mobile Applications

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess Your Secure Mobile Development Practices

    The Purpose

    Identification of the triggers of your secure mobile development initiatives.

    Assessment of the security vulnerabilities in your mobile applications from an end-user perspective.

    Identification of the execution of your mobile environment.

    Assessment of the mobile threats and vulnerabilities to your systems architecture.

    Prioritization of your mobile threats.

    Creation of your risk register.

    Key Benefits Achieved

    Key opportunity areas where a secure development optimization initiative can provide tangible benefits.

    Identification of security requirements.

    Prioritized list of security threats.

    Initial mobile security risk register created. 

    Activities

    1.1 Establish the triggers of your secure mobile development initiatives.

    1.2 Assess the security vulnerabilities in your mobile applications from an end-user perspective.

    1.3 Understand the execution of your mobile environment with a systems architecture.

    1.4 Assess the mobile threats and vulnerabilities to your systems architecture.

    1.5 Prioritize your mobile threats.

    1.6 Begin building your risk register.

    Outputs

    Mobile Application High-Level Design Requirements Document

    Systems Architecture Diagram

    2 Implement and Test Your Secure Mobile Techniques

    The Purpose

    Discovery of secure development techniques to apply to current development practices.

    Discovery of new user stories from applying secure development techniques.

    Discovery of new test cases from applying secure development techniques.

    Key Benefits Achieved

    Areas within your code that can be optimized for improving mobile application security.

    New user stories created in relation to mitigation steps.

    New test cases created in relation to mitigation steps.

    Activities

    2.1 Gauge the state of your secure mobile development practices.

    2.2 Identify the appropriate techniques to fill gaps.

    2.3 Develop user stories from security development gaps identified.

    2.4 Develop test cases from user story gaps identified.

    Outputs

    Mobile Application High-Level Design Requirements Document

    3 Monitor and Support Your Secure Mobile Applications

    The Purpose

    Identification of key metrics used to measure mobile application security issues.

    Identification of secure mobile application and development process optimization initiatives.

    Identification of enablers and blockers of your mobile security optimization.

    Key Benefits Achieved

    Metrics for measuring application security.

    Modified triaging process for addressing security issues.

    Initiatives for development optimization.

    Enablers and blockers identified for mobile security optimization initiatives.

    Process for developing your mobile optimization roadmap.

    Activities

    3.1 List the metrics that would be gathered to assess the success of your mobile security optimization.

    3.2 Adjust and modify your triaging process to enhance handling of security issues.

    3.3 Brainstorm secure mobile application and development process optimization initiatives.

    3.4 Identify the enablers and blockers of your mobile security optimization.

    3.5 Define your mobile security optimization roadmap.

    Outputs

    Mobile Optimization Roadmap

    Manage Requirements in an Agile Environment

    • Buy Link or Shortcode: {j2store}522|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Requirements & Design
    • Parent Category Link: /requirements-and-design

    The process of navigating from waterfall to Agile can be incredibly challenging. Even more problematic; how do you operate your requirements management practices once there? There traditionally isn’t a role for a business analyst, the traditional keeper of requirements. It isn’t like switching on a light.

    You likely find yourself struggling to deliver high quality solutions and requirements in Agile. This is a challenge for many organizations, regardless of how long they’ve leveraged Agile.

    But you aren’t here for assurances. You’re here for answers and help.

    Our Advice

    Critical Insight

    Agile and requirements management are complementary, not competitors.

    Impact and Result

    Info-Tech’s advice? Why choose? Why have to pick between traditional waterfall and Agile delivery? If Agile without analysis is a recipe for disaster, Agile with analysis is the solution. How can you leverage the Info-Tech approach to align your Agile and requirements management efforts into a powerful combination?

    Manage Requirements in an Agile Environment is your guide.

    Use the contents and exercises of this blueprint to gain a shared understanding of the two disciplines, to find your balance in your approach, to define your thresholds, and ultimately, to prepare for new ways of working.

    Manage Requirements in an Agile Environment Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Manage Requirements in an Agile Environment Blueprint – Agile and Requirements Management are complementary, not competitors

    Provides support and guidance for organizations struggling with their requirements management practices in Agile environments.

    • Manage Requirements in an Agile Environment Storyboard

    2. Agile Requirements Playbook – A practical playbook for aligning your teams, and articulating the guidelines for managing your requirements in Agile.

    The Agile Requirements Playbook becomes THE artifact for your Agile requirements practices. Great for onboarding, reviewing progress, and ensuring a shared understanding of your ways of working.

    • Agile Requirements Playbook

    3. Documentation Calculator – A tool for determining the right level of documentation for your organization, and whether you’re spending too much, or even not enough, on Agile Requirements documentation.

    The Documentation Calculator can inform your documentation decison making, ensuring you're investing just the right amount of time, money, and effort.

    • Documentation Calculator

    4. Agile Requirements Workbook – Supporting tools and templates in advancing your Agile Requirements practice, to be used in conjunction with the Agile Requirements Blueprint, and the Playbook.

    This workbook is designed to capture the results of your exercises in the Manage Requirements in an Agile Environment Storyboard. Each worksheet corresponds to an exercise in the storyboard. This is a tool for you, so customize the content and layout to best suit your product. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

    • Agile Requirements Workbook

    5. Agile Requirements Assessment – Establishes your current Agile requirements maturity, defines your target maturity, and supports planning to get there.

    The Agile Requirements Assessment is a great tool for determining your current capabilities and maturity in Agile and Business Analysis. You can also articulate your target state, which enables the identification of capability gaps, the creation of improvement goals, and a roadmap for maturing your Agile Requirements practice.

    • Agile Requirements Assessment

    Infographic

    Workshop: Manage Requirements in an Agile Environment

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Framing Agile and Business Analysis

    The Purpose

    Sets the context for the organization, to ensure a shared understanding of the benefits of both Agile and business analysis/requirements management.

    Key Benefits Achieved

    Have a shared definition of Agile and business analysis / requirements.

    Understand the current state of Agile and business analysis in your organization.

    Activities

    1.1 Define what Agile and business analysis mean in your organization.

    1.2 Agile requirements assessment.

    Outputs

    Alignment on Agile and business analysis / requirements in your organization.

    A current and target state assessment of Agile and business analysis in your organization.

    2 Tailoring Your Approach

    The Purpose

    Confirm you’re going the right way for effective solution delivery.

    Key Benefits Achieved

    Confirm the appropriate delivery methodology.

    Activities

    2.1 Confirm your selected methodology.

    Outputs

    Confidence in your selected project delivery methodology.

    3 Defining Your Requirements Thresholds

    The Purpose

    Provides the guardrails for your Agile requirements practice, to define a high-level process, roles and responsibilities, governance and decision-making, and how to deal with change.

    Key Benefits Achieved

    Clearly defined interactions between the BA and their partners

    Define a plan for management and governance at the project team level

    Activities

    3.1 Define your agile requirements process.

    3.2 Define your agile requirements RACI.

    3.3 Define your governance.

    3.4 Define your change and backlog refinement plan.

    Outputs

    Agile requirements process.

    Agile requirements RACI.

    A governance and documentation plan.

    A change and backlog refinement approach.

    4 Planning Your Next Steps

    The Purpose

    Provides the action plan to achieve your target state maturity

    Key Benefits Achieved

    Recognize and prepare for the new ways of working for communication, stakeholder engagement, within the team, and across the organization.

    Establish a roadmap for next steps to mature your Agile requirements practice.

    Activities

    4.1 Define your stakeholder communication plan.

    4.2 Identify your capability gaps.

    4.3 Plan your agile requirements roadmap.

    Outputs

    A stakeholder communication plan.

    A list of capability gaps to achieve your desired target state.

    A prioritized roadmap to achieve the target state.

    5 Agile Requirements Techniques (Optional)

    The Purpose

    To provide practical guidance on technique usage, which can enable an improved experience with technical elements of the blueprint.

    Key Benefits Achieved

    An opportunity to learn new tools to support your Agile requirements practice.

    Activities

    5.1 Managing requirements' traceability.

    5.2 Creating and managing user stories.

    5.3 Managing your requirements backlog.

    5.4 Maintaining a requirements library.

    Outputs

    Support and advice for leveraging a given tool or technique.

    Support and advice for leveraging a given tool or technique.

    Support and advice for leveraging a given tool or technique.

    Support and advice for leveraging a given tool or technique.

    Further reading

    Manage Requirements in an Agile Environment

    Agile and requirements management are complementary, not competitors

    Analyst's Perspective

    The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business then you have failed, regardless of how fast you've gone.

    Delivery in Agile doesn't mean you stop needing solid business analysis. In fact, it's even more critical, to ensure your products and projects are adding value. With the rise of Agile, the role of the business analyst has been misunderstood.

    As a result, we often throw out the analysis with the bathwater, thinking we'll be just fine without analysis, documentation, and deliberate action, as the speed and dexterity of Agile is enough.

    Consequently, what we get is wasted time, money, and effort, with solutions that fail to deliver value, or need to be re-worked to get it right.

    The best organizations find balance between these two forces, to align, and gain the benefits of both Agile and business analysis, working in tandem to manage requirements that bring solutions that are "just right".

    This is a picture of Vincent Mirabelli

    Vincent Mirabelli
    Principal Research Director, Applications Delivery and Management
    Info-Tech Research Group

    EXECUTIVE BRIEF

    Executive Summary

    Your Challenge

    The process of navigating from waterfall to Agile can be incredibly challenging. And even more problematic; how do you operate your requirements management practices once there? Since there traditionally isn't a role for a business analyst; the traditional keeper of requirements. it isn't like switching on a light.

    You likely find yourself struggling to deliver high quality solutions and requirements in Agile. This is a challenge for many organizations, regardless of how long they've leveraged Agile.

    But you aren't here for assurances. You're here for answers and help.

    Common Obstacles

    many organizations and teams face is that there are so busy doing Agile that they fail to be Agile.

    Agile was supposed to be the saving grace of project delivery but is misguided in taking the short-term view of "going quickly" at the expense of important elements, such as team formation and interaction, stakeholder engagement and communication, the timing and sequencing of analysis work, decision-making, documentation, and dealing with change.

    The idea that good requirements just happen because you have user stories is wrong. So, requirements remain superficial, as you "can iterate later"…but sometimes later never comes, or doesn't come fast enough.

    Organizations need to be very deliberate when aligning their Agile and requirements management practices. The work is the same. How the work is done is what changes.

    Info-Tech's Approach

    Infotech's advice? Why choose? Why have to pick between traditional waterfall and Agile delivery? If Agile without analysis is a recipe for disaster, Agile with analysis is the solution. And how can you leverage the Info-Tech approach to align your Agile and requirements management efforts into a powerful combination?

    Manage Requirements in an Agile Environment is your guide.

    Use the contents and exercises of this blueprint to gain a shared understanding of the two disciplines, to find your balance in your approach, to define your thresholds, and ultimately, to prepare for new ways of working.

    Info-Tech Insight

    Agile and requirements management are complementary, not competitors.

    The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business, then you have failed, regardless of how fast you've gone.

    Insight summary

    Overarching insight

    Agile and requirements management are complementary, not competitors.

    The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business, then you have failed, regardless of how fast you've gone

    Phase 1 insight

    • The purpose of requirements in waterfall is for approval. The purpose in Agile is for knowledge management, as Agile has no memory.
    • When it comes to the Agile manifesto, "over" does not mean "instead of".
    • In Agile, the what of business analysis does doesn't change. What does change is the how and when that work happens.

    Phase 2 insight

    • Understand your uncertainties; it's a great way to decide what level of Agile (if any) is needed.
    • Finding your "Goldilocks" zone will take time. Be patient.

    Phase 3 insight

    • Right-size your governance, based on team dynamics and project complexity. A good referee knows when to step in, and when to let the game flow.
    • Agile creates a social contract amongst the team, and with their leaders and organization.
    • Documentation needs to be valuable. Do what is acceptable and necessary to move work to future steps. Not documenting also comes with a cost, but one you pay in the future. And that bill will come due, with interest (aka, technical debt, operational inefficiencies, etc.).
    • A lack of acceptable documentation makes it more difficult to have agility. You're constantly revalidating your current state (processes, practices and structure) and re-arguing decisions already made. This slows you down more than maintaining documentation ever would.

    Phase 4 insight

    • Making Agile predictable is hard, because people are not predictable; people are prone to chaos.

    There have been many challenges with waterfall delivery

    It turns out waterfall is not that great at reducing risk and ensuring value delivery after all

    • Lack of flexibility
    • Difficulty in measuring progress
    • Difficulties with scope creep
    • Limited stakeholder involvement
    • Long feedback loops

    48%
    Had project deadlines more than double

    85%
    Exceeded their original budget by at least 20%

    25%
    At least doubled their original budget

    This is an image of the waterfall project results

    Source: PPM Express.

    Agile was meant to address the shortcomings of waterfall

    The wait for solutions was too long for our business partners. The idea of investing significant time, money, and resources upfront, building an exhaustive and complete vision of the desired state, and then waiting months or even years to get that solution, became unpalatable for them. And rightfully so. Once we cast a light on the pains, it became difficult to stay with the status quo. Given that organizations evolve at a rapid pace, what was a pain at the beginning of an initiative may not be so even 6 months later.

    Agile became the answer.

    Since its' first appearance nearly 20 years ago, Agile has become the methodology of choice for a many of organizations. According to the 15th Annual State of Agile report, Agile adoption within software development teams increased from 37% in 2020 to 86% in 2021.

    Adopting Agile led to challenges with requirements

    Requirements analysis, design maturity, and management are critical for a successful Agile transformation.

    "One of the largest sources of failure we have seen on large projects is an immature Agile implementation in the context of poorly defined requirements."
    – "Large Scale IT Projects – From Nightmare to Value Creation"

    "Requirements maturity is more important to project outcomes than methodology."
    – "Business Analysis Benchmark: Full Report"

    "Mature Agile practices spend 28% of their time on analysis and design."
    – "Quantitative Analysis of Agile Methods Study (2017): Twelve Major Findings"

    "There exists a Requirements Premium… organizations using poor practices spent 62% more on similarly sized projects than organizations using the best requirements practices."
    – "The Business Case for Agile Business Analysis" - Requirements Engineering Magazine

    Strong stakeholder satisfaction with requirements results in higher satisfaction in other areas

    This is an image of a bar graph comparing the percentage of respondents with high stakeholder satisfaction, to the percentage of respondents with low stakeholder satisfaction for four different categories.  these include: Availability of IT Capacity to Complete Projects; Overall IT Projects; IT Projects Meet Business Needs; Overall IT Satisfaction

    N= 324 small organizations from Info-Tech Research Group's CIO Business Vision diagnostic.

    Note: High satisfaction was classified as organizations with a score greater or equal to eight and low satisfaction was every organization that scored below eight on the same questions.

    Info-Tech's Agile requirements framework

    This is an image of Info-Tech's Agile requirements framework.  The three main categories are: Sprint N(-1); Sprint N; Sprint N(+1)

    Agile requirements are a balancing act

    Collaboration

    Many subject matter experts are necessary to create accurate requirements, but their time is limited too.

    Communication

    Stakeholders should be kept informed throughout the requirements gathering process, but you need to get the right information to the right people.

    Documentation

    Recording, organizing, and presenting requirements are essential, but excessive documentation will slow time to delivery.

    Control

    Establishing control points in your requirements gathering process can help confirm, verify, and approve requirements accurately, but stage gates limit delivery.

    What changes for the business analyst?

    In Agile, the what of business analysis does not change.

    What does change is the how and when that work happens.

    Business analysts need to focus on six key elements when managing requirements in Agile.

    • Team formation and interaction
    • Stakeholder engagement and communication
    • The timing and sequencing of their work
    • Decision-making
    • Documentation
    • Dealing with change

    Where does the business analysis function fit on an Agile team?

    Team formation is key, as Agile is a team sport

    A business analyst in an Agile team typically interacts with several different roles, including:

    • The product owner,
    • The Sponsor or Executive
    • The development team,
    • Other stakeholders such as customers, end-users, and subject matter experts
    • The Design team,
    • Security,
    • Testing,
    • Deployment.

    This is an image the roles who typically interact with a Business Analyst.

    How we do our requirements work will change

    • Team formation and interaction
    • Stakeholder engagement and communication
    • The timing and sequencing of their work
    • Decision-making
    • Documentation
    • Dealing with change

    As a result, you'll need to focus on;

    • Emphasizing flexibility
    • Enabling continuous delivery
    • Enhancing collaboration and communication
    • Developing a user-centered approach

    Get stakeholders on board with Agile requirements

    1. Stakeholder feedback and management support are key components of a successful Agile Requirements.
    2. Stakeholders can see a project's progression and provide critical feedback about its success at critical milestones.
    3. Management helps teams succeed by trusting them to complete projects with business value at top of mind and by removing impediments that are inhibiting their productivity.
    4. Agile will bring a new mindset and significant numbers of people, process, and technology changes that stakeholders and management may not be accustomed to. Working through these issues in requirements management enables a smoother rollout.
    5. Management will play a key role in ensuring long-term Agile requirements success and ultimately rolling it out to the rest of the organization.
    6. The value of leadership involvement has not changed even though responsibilities will. The day-to-day involvement in projects will change but continual feedback will ultimately dictate the success or failure of a project.

    Measuring your success

    Tracking metrics and measuring your progress

    As you implement the actions from this Blueprint, you should see measurable improvements in;

    • Team and stakeholder satisfaction
    • Requirements quality
    • Documentation cost

    Without sacrificing time to delivery

    Metric Description and motivation
    Team satisfaction (%) Expect team satisfaction to increase as a result of clearer role delineation and value contribution.
    Stakeholder satisfaction (%) Expect Stakeholder satisfaction to similarly increase, as requirements quality increases, bringing increased value
    Requirements rework Measures the quality of requirements from your Agile Projects. Expect that the Requirements Rework will decrease, in terms of volume/frequency.
    Cost of documentation Quantifies the cost of documentation, including Elicitation, Analysis, Validation, Presentation, and Management
    Time to delivery Balancing Metric. We don't want improvements in other at the expense of time to delivery

    Info-Tech's methodology for Agile requirements

    1. Framing Agile and Business Analysis

    2. Tailoring Your Approach

    3. Defining Your Requirements Thresholds

    4. Planning Your Next Steps

    Phase Activities

    1.1 Understand the benefits and limitations of Agile and business analysis

    1.2 Align Agile and business analysis within your organization

    2.1 Decide the best-fit approach for delivery

    2.2 Manage your requirements backlog

    3.1 Define project roles and responsibilities

    3.2 Define your level of acceptable documentation

    3.3 Manage requirements as an asset

    3.4 Define your requirements change management plan

    4.1 Preparing new ways of working

    4.2 Develop a roadmap for next steps

    Phase Outcomes

    Recognize the benefits and detriments of both Agile and BA.

    Understand the current state of Agile and business analysis in your organization.

    Confirm the appropriate delivery methodology.

    Manage your requirements backlog.

    Connect the business need to user story.

    Clearly defined interactions between the BA and their partners.

    Define a plan for management and governance at the project team level.

    Documentation and tactics that are right-sized for the need.

    Recognize and prepare for the new ways of working for communication, stakeholder engagement, within the team, and across the organization.

    Establish a roadmap for next steps to mature your Agile requirements practice.

    Blueprint tools and templates

    Key deliverable:

    This is a screenshot from the Agile Requirements Playbook

    Agile Requirements Playbook

    A practical playbook for aligning your teams and articulating the guidelines for managing your requirements in Agile

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    This is a screenshot from the Documentation Calculator

    Documentation Calculator

    A tool to help you answer the question: What is the right level of Agile requirements documentation for my organization?

    This is a screenshot from the Agile Requirements Assessment

    Agile Requirements Assessment

    Establishes your current maturity level, defines your target state, and supports planning to get there.

    This is a screenshot from the Agile Requirements Workbook

    Agile Requirements Workbook

    Supporting tools and templates in advancing your Agile requirements practice, to be used with the Agile Requirements Blueprint and Playbook.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5
    1. Framing Agile and Business Analysis / 2. Tailoring Your Approach 3. Defining Your Requirements
    Thresholds
    3. Defining Your Requirements Thresholds / 4. Planning Your Next Steps (OPTIONAL) Agile Requirements Techniques (a la carte) Next Steps and Wrap-Up (Offsite)

    Activities

    What does Agile mean in your organization? What do requirements mean in your organization?

    Agile Requirements Assessment

    Confirm your selected methodology

    Define your Agile requirements process

    Define your Agile requirements RACI (Optional)

    Define your Agile requirements governance

    Defining your change management plan

    Define your

    communication plan

    Capability gap list

    Planning your Agile requirements roadmap

    Managing requirements traceability

    Creating and managing user stories

    Managing your requirements backlog

    Maintaining a requirements library

    Develop Agile Requirements Playbook

    Complete in-progress deliverables from previous four days.

    Set up review time for workshop deliverables and next steps

    Outcomes

    Shared definition of Agile and business analysis / requirements

    Understand the current state of Agile and business analysis in your organization

    Agile requirements process

    Agile requirements RACI (Optional)

    Defined Agile requirements governance and documentation plan

    Change and backlog refinement plan

    Stakeholder communication plan

    Action plan and roadmap for maturing your Agile requirements practice

    Practical knowledge and practice about various tactics and techniques in support of your Agile requirements efforts

    Completed Agile Requirements Playbook

    Guided Implementation

    Phase 1 Phase 2 Phase 3 Phase 4

    Call #1: Scope objectives, and your specific challenges.

    Call #4: Define your approach to project delivery.

    Call #6: Define your Agile requirements process.

    Call #9: Identify gaps from current to target state maturity.

    Call #2: Assess current maturity.

    Call #5: Managing your requirements backlog.

    Call #7: Define roles and responsibilities.

    Call #10: Pprioritize next steps to mature your Agile requirements practice.

    Call #3: Identify target-state capabilities.

    Call #8: Define your change and backlog refinement approach.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 10 calls over the course of 4 to 6 months.

    Framing Agile and Business Analysis

    Phase 1

    Framing Agile and Business Analysis

    Phase 1Phase 2Phase 3Phase 4

    1.1 Understand the benefits and limitations of Agile and business analysis

    1.2 Align Agile and business analysis within your organization

    2.1 Confirm the best-fit approach for delivery

    2.2 manage your requirements backlog

    3.1 Define project roles and responsibilities

    3.2 define your level of acceptable documentation

    3.3 Manage requirements as an asset

    3.4 Define your requirements change management plan

    4.1 Preparing new ways of working

    4.2 Develop a roadmap for next steps

    This phase will walk you through the following activities:

    • EXERCISE: What do Agile and requirements mean in your organization?
    • ASSESSMENT: Agile requirements assessment
    • KEY DELIVERABLE: Agile Requirements Playbook

    This phase involves the following participants:

    • Business analyst and project team
    • Stakeholders
    • Sponsor/Executive

    Managing Requirements in an Agile Environment

    Step 1.1

    Understand the benefits and limitations of Agile and business analysis

    Activities

    1.1.1 Define what Agile and business analysis mean in your organization

    This step involves the following participants:

    • Business analyst and project team
    • Sponsor/Executive

    Outcomes of this step

    • Recognize the benefits and detriments of both Agile and business analysis

    Framing Agile and Business Analysis

    There have been many challenges with waterfall delivery

    It turns out waterfall is not that great at reducing risk and ensuring value delivery after all

    • Lack of flexibility
    • Difficulty in measuring progress
    • Difficulties with scope creep
    • Limited stakeholder involvement
    • Long feedback loops

    48%
    Had project deadlines more than double

    85%
    Exceeded their original budget by at least 20%

    25%
    At least doubled their original budget

    This is an image of the Waterfall Project Results

    Source: PPM Express.

    Business analysis had a clear home in waterfall

    Business analysts had historically been aligned to specific lines of business, in support of their partners in their respective domains. Somewhere along the way, the function was moved to IT. Conceptually this made sense, in that it allowed BAs to provide technical solutions to complex business problems. This had the unintended result of lost domain knowledge, and connection to the business.

    It all starts with the business. IT enables business goals. The closer you can get to the business, the better.

    Business analysts were the main drivers of helping to define the business requirements, or needs, and then decompose those into solution requirements, to develop the best option to solve those problems, or address those needs. And the case for good analysis was clear. The later a poor requirement was caught, the more expensive it was to fix. And if requirements were poor, there was no way to know until much later in the project lifecycle, when the cost to correct them was exponentially higher, to the tune of 10-100x the initial cost.

    This is an image of a graph showing the cost multiplier for Formulating Requirements, Architecture Design, Development, Testing and, Operations

    Adapted from PPM Express. "Why Projects Fail: Business Analysis is the Key".

    Agile was meant to address the shortcomings of waterfall

    The wait for solutions was too long for our business partners. The idea of investing significant time, money, and resources upfront, building an exhaustive and complete vision of the desired state, and then waiting months or even years to get that solution became unpalatable for them. And rightfully so. Once we cast a light on the pains, it became difficult to stand pat in the current state. And besides, organizations evolve at a rapid pace. What was a pain at the beginning of an initiative may not be so even six months later.

    Agile became the answer.

    Since its first appearance nearly 20 years ago, Agile has become the methodology of choice for a huge swathe of organizations. According to the 15th Annual State of Agile report, Agile adoption within software development teams increased from 37% in 2020 to 86% in 2021.

    To say that's significant is an understatement.

    The four core values of Agile helped shift focus

    According to the Agile manifesto, "We value. . ."

    This is an image of what is valued according to the Agile Manifesto.

    "…while there is value in the items on the right, we value the items on the left more."

    Source: Agilemanifesto, 2001

    Agile has made significant inroads in IT and beyond

    94% of respondents report using Agile practices in their organization

    according to Digital.AI's "The 15th State of Agile Report"

    That same report notes a steady expansion of Agile outside of IT, as other areas of the organization seek to benefit from increased agility and responsiveness, including Human Resources, Finance and Marketing.

    While it addressed some problems…

    This is an image of the Waterfall Project Results, compared to Agile Product Results.

    "Agile projects are 37% faster to market than [the] industry average"

    (Requirements Engineering Magazine, 2017)

    • Business requirements documents are massive and unreadable
    • Waterfall erects barriers and bottlenecks between the business and the development team
    • It's hard to define the solution at the outset of a project
    • There's a long turnaround between requirements work and solution delivery
    • Locking in requirements dictates an often-inflexible solution. And the costs to make changes tend to add up.

    …Implementing Agile led to other challenges

    This is an image of a series of thought bubbles, each containing a unique challenge resulting from implementing Agile.

    Adopting Agile led to challenges with requirements

    Requirements analysis, design maturity, and management are critical for a successful Agile transformation.

    "One of the largest sources of failure we have seen on large projects is an immature Agile implementation in the context of poorly defined requirements."
    – BCG, 2015

    "Requirements maturity is more important to project outcomes than methodology."
    – IAG Consulting, 2009.

    "Mature Agile practices spend 28% of their time on analysis and design."
    – InfoQ, 2017."

    "There exists a Requirements Premium… organizations using poor practices spent 62% more on similarly sized projects than organizations using the best requirements practices."
    – Requirements Engineering Magazine, 2017

    Strong stakeholder satisfaction with requirements results in higher satisfaction in other areas

    This is an image of a bar graph comparing the percentage of respondents with high stakeholder satisfaction, to the percentage of respondents with low stakeholder satisfaction for four different categories.  these include: Availability of IT Capacity to Complete Projects; Overall IT Projects; IT Projects Meet Business Needs; Overall IT Satisfaction

    N= 324 small organizations from Info-Tech Research Group's CIO Business Vision diagnostic.

    Note: High satisfaction was classified as organizations with a score greater or equal to eight and low satisfaction was every organization that scored below eight on the same questions.

    Agile is being misinterpreted as an opportunity to bypass planning and analysis activities

    Agile is a highly effective tool.

    This isn't about discarding Agile. It is being used for things completely outside of what was originally intended. When developing products or code, it is in its element. However, outside of that realm, its being used to bypass business analysis activities, which help define the true customer and business need.

    Business analysts were forced to adapt and shift focus. Overnight they morphed into product owners, or no longer had a place on the team. Requirements and analysis took a backseat.

    The result?

    Increased rework, decreased stakeholder satisfaction, and a lot of wasted money and effort.

    "Too often, the process of two-week sprints becomes the thing, and the team never gets the time and space to step back and obsess over what is truly needed to delight customers."
    Harvard Business Review, 9 April 2021.

    Info-Tech Insight

    Requirements in Agile are the same, but the purpose of requirements changes.

    • The purpose of requirements in waterfall is for stakeholder approval.
    • The purpose of requirements in Agile is knowledge management; to maintain a record of the current state.

    Many have misinterpreted the spirit of Agile and waterfall

    The stated principles of waterfall say nothing of how work is to be linear.

    This is an image of a comparison between using Agile and Being Prescriptive.This is an image of Royce's 5 principles for success.

    Source: Royce, Dr. Winston W., 1970.

    For more on Agile methodology, check out Info-Tech's Agile Research Centre

    How did the pendulum swing so far?

    Shorter cycles of work made requirements management more difficult. But the answer isn't to stop doing it.

    Organizations went from engaging business stakeholders up front, and then not until solution delivery, to forcing those partners to give up their resources to the project. From taking years to deliver a massive solution (which may or may not even still fit the need) to delivering in rapid cycles called sprints.

    This tug-of-war is costing organizations significant time, money, and effort.

    Your approach to requirements management needs to be centered. We can start to make that shift by better aligning our Agile and business analysis practices. Outside of the product space, Agile needs to be combined with other disciplines (Harvard Business Review, 2021) to be effective.

    Agility is important. Though it is not a replacement for approach or strategy (RCG Global Services, 2022). In Agile, team constraints are leveraged because of time. There is a failure to develop new capabilities to address the business needs Harvard Business Review, 2021).

    Agility needs analysis.

    Agile requirements are a balancing act

    Collaboration

    Many subject matter experts are necessary to create accurate requirements, but their time is limited too.

    Communication

    Stakeholders should be kept informed throughout the requirements gathering process, but you need to get the right information to the right people.

    Documentation

    Recording, organizing, and presenting requirements are essential, but excessive documentation will slow time to delivery.

    Control

    Establishing control points in your requirements gathering process can help confirm, verify, and approve requirements accurately, but stage gates limit delivery.

    Start by defining what the terms mean in your organization

    We do this because there isn't even agreement by the experts on what the terms "Agile" and "business analysis" mean, so let's establish a definition within the context of your organization.

    1.1.1 What do Agile and business analysis mean in your organization?

    Estimated time: 30 Minutes

    1. Explore the motivations behind the need for aligning Agile with business analysis. Are there any current challenges related to outputs, outcomes, quality? How can the team and organization align the two more effectively for the purposes of requirements management?
    2. Gather the appropriate stakeholders to discuss their definition of the terms "Agile" and "business analysis" It can be related to their experience, practice, or things they've read or heard.
    3. Brainstorm and document all shared thoughts and perspectives.
    4. Synthesize those thoughts and perspectives into a shared definition of each term, of a sentence or two.
    5. Revisit this definition as needed, and as your Agile requirements efforts evolve.

    Input

    • Challenges and experiences/perspectives related to Agile and business requirements

    Output

    • A shared definition of Agile and business analysis, to help guide alignment on Agile requirements management

    Materials

    • Agile Requirements Workbook

    Participants

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Build your Agile Requirements Playbook

    Keep the outcomes of this blueprint in a single document

    Share at the beginning of a new project, as part of team member onboarding, and revisit as your practice matures.

    This is a series of three screenshots from the Agile Requirements Playbook.

    Your Agile Requirements Playbook will include

    • Your shared definition of Agile and business analysis for your organization
    • The Agile Requirements Maturity Assessment
    • A Methodology Selection Matrix
    • Agile requirements RACI
    • A defined Agile requirements process
    • Documentation Calculator
    • Your Requirements Repository Information
    • Capability Gap List (from current to target state)
    • Target State Improvement Roadmap and Action Plan

    Step 1.2

    Align Agile and Business Analysis Within Your Organization

    Activities

    1.2.1 Assess your Agile requirements maturity

    This step involves the following participants:

    • Business Analyst and Project Team
    • Stakeholders
    • Sponsor/Executive

    Outcomes of this step

    • Complete the Agile Requirements Maturity Assessment to establish your current and target states

    Framing Agile and Business Analysis

    Consider the question: "Why Agile?"

    What is the driving force behind that decision?

    There are many reasons to leverage the power of Agile within your organization, and specifically as part of your requirements management efforts. And it shouldn't just be to improve productivity. That's only one aspect.
    Begin by asking, "Why Agile?" Are you looking to improve:

    • Time to market
    • Team engagement
    • Product quality
    • Customer satisfaction
    • Stakeholder engagement
    • Employee satisfaction
    • Consistency in delivery of value
    • Predictably of your releases

    Or a combination of the above?

    Info-Tech Insight

    Project delivery methodologies aren't either/or. You don't have to be 100% waterfall or 100% Agile. Select the right approach for your project, product, or service.

    In the end, your business partners don't want projects delivered faster, they want value faster!

    For more on understanding Agile, check out the Implement Agile Practices That Work Blueprint

    Responses to a 2019 KPMG survey:

    13% said that their top management fully supports Agile transformation.

    76% of organizations did not agree that their organization supports Agile culture.

    62% of top management believe Agile has no implications for them.

    What changes for the business analyst?

    Business analysts need to focus on six key elements when managing requirements in Agile.

    • Team formation and interaction
    • Stakeholder engagement and communication
    • The timing and sequencing of their work
    • Decision-making
    • Documentation
    • Dealing with change

    In Agile, the what of business analysis does not change.

    What does change is the how and when that work happens.

    1.2.1 Assess your Agile requirements maturity

    This is a series of screenshots from the Agile Requirements Maturity Assessment.

    1.2.1 Assess your Agile requirements maturity

    Estimated time: 30 Minutes

      1. Using the Agile Requirements Maturity Assessment, gather all appropriate stakeholders, and discuss and score the current state of your practice. Scoring can be done by:
        1. Consensus: Generally better with a smaller group, where the group agrees the score and documents the result
        2. Average: Have everyone score individually, and aggregate the results into an average, which is then entered.
        3. Weighted Average: As above, but weight the individual scores by individual or line of business to get a weighted average.
      2. When current state is complete, revisit to establish target state (or hold as a separate session) using the same scoring approach as in current state.
        1. Recognize that there is a cost to maturity, so don't default to the highest score by default.
        2. Resist the urge at this early stage to generate ideas to navigate from current to target state. We will re-visit this exercise in Phase 4, once we've defined other pieces of our process and practice.

    Input

    • Participant knowledge and experience

    Output

    • A current and target state assessment of your Agile requirements practice

    Materials

    • Agile Requirements Maturity Assessment

    Participants

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Tailoring Your Approach

    Phase 2

    Phase 1Phase 2Phase 3Phase 4

    1.1 Understand the benefits and limitations of Agile and business analysis

    1.2 Align Agile and business analysis within your organization

    2.1 Confirm the best-fit approach for delivery

    2.2 manage your requirements backlog

    3.1 Define project roles and responsibilities

    3.2 define your level of acceptable documentation

    3.3 Manage requirements as an asset

    3.4 Define your requirements change management plan

    4.1 Preparing new ways of working

    4.2 Develop a roadmap for next steps

    This phase will walk you through the following activities:

    • Selecting the appropriate delivery methodology
    • Managing your requirements backlog
    • Tracing from business need to user story

    This phase involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Managing Requirements in an Agile Environment

    Step 2.1

    Confirm the Best-fit Approach for Delivery

    Activities

    2.1.1 Confirm your methodology

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Outcomes of this step

    • A review of potential delivery methodologies to select the appropriate, best-fit approach to your projects

    Confirming you're using the best approach doesn't have be tricky

    Selecting the right approach (or confirming you're on the right track) is easier when you assess two key inputs to your project; your level of certainty about the solution, and the level of complexity among the different variables and inputs to your project, such as team experience and training, the number of impacted stakeholders or context. lines of business, and the organizational

    Solution certainty refers to the level of understanding of the problem and the solution at the start of the project. In projects with high solution certainty, the requirements and solutions are well defined, and the project scope is clear. In contrast, projects with low solution certainty have vague or changing requirements, and the solutions are not well understood.

    Project complexity refers to the level of complexity of the project, including the number of stakeholders, the number of deliverables, and the level of technical complexity. In projects with high complexity, there are many stakeholders with different priorities, many deliverables, and high technical complexity. In contrast, projects with low complexity have fewer stakeholders, fewer deliverables, and lower technical complexity.

    "Agile is a fantastic approach when you have no clue how you're going to solve a problem"

    • Ryan Folster, Consulting Services Manager, Business Analysis, Dimension Data

    Use Info-Tech's methodology selection matrix

    Waterfall methodology is best suited for projects with high solution certainty and high complexity. This is because the waterfall model follows a linear and sequential approach, where each phase of the project is completed before moving on to the next. This makes it ideal for projects where the requirements and solutions are well-defined, and the project scope is clear.

    On the other hand, Agile methodology is best suited for projects with low solution certainty. Agile follows an iterative and incremental approach, where the requirements and solutions are detailed and refined throughout the project. This makes it ideal for projects where the requirements and solutions are vague or changing.

    Note that there are other models that exist for determining which path to take, should this approach not fit within your organization.

    Use info-tech's-methodology-selection-matrix

    This is an image of Info-Tech’s methodology selection matrix

    Adapted from The Chaos Report, 2015 (The Standish Group)

    Download the Agile Requirements Workbook

    2.1.1 Confirm your methodology

    Estimated time: 30 Minutes

    1. Using the Agile Requirements Workbook, find the tab labelled "Methodology Assessment" and answer the questions to establish your complexity and certainty scores, where;

    1 = Strongly disagree
    2 = Disagree
    3 = Neutral
    4 = Agree
    5 = Strongly agree.

    1. In the same workbook, plot the results in the grid on the tab labelled "Methodology Matrix".
    2. Projects falling into Green are good fits for Agile. Yellow are viable. And Red may not be a great fit for Agile.
    3. Note: Ultimately, the choice of methodology is yours. Recognize there may be additional challenges when a project is too complex, or uncertainty is high.

    Input

    • Current project complexity and solution certainty

    Output

    • A clear choice of delivery methodology

    Materials

    • Agile Requirements Workbook

    Participants

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Step 2.2

    Manage Your Requirements Backlog

    Activities

    2.2.1 Create your user stories

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Outcomes of this step

    • Understand how to convert requirements into user stories, which populate the Requirements Backlog.

    Tailoring Your Approach

    There is a hierarchy to requirements

    This is a pyramid, with the base being: Solution Requirements; The middle being: Stakeholder Requirements; and the Apex being: Business Requirements.
    • Higher-level statements of the goals, objectives, or needs of the enterprise.
    • Business requirements focus on the needs of the organization, and not the stakeholders within it.

    Defines

    Intended benefits and outcomes

    • Statements of the needs of a particular stakeholder or class of stakeholders, and how that stakeholder will interact with a solution.

    Why it is needed, and by who

    • Describes the characteristics of a solution that meets business requirements and stakeholder requirements. Functional describes the behavior and information that the solution will manage. They describe capabilities the system will be able to perform in terms of behaviors or operations. Non-functional represents constraints on the ultimate solution and tends to be less negotiable.

    What is needed, and how its going to be achieved

    Connect the dots with a traceability matrix

    Business requirements describe what a company needs in order to achieve its goals and objectives. Solution requirements describe how those needs will be met. User stories are a way to express the functionality that a solution will provide from the perspective of an end user.

    A traceability matrix helps clearly connect and maintain your requirements.

    To connect business requirements to solution requirements, you can start by identifying the specific needs that the business has and then determining how those needs can be met through technology or other solutions; or what the solution needs to do to meet the business need. So, if the business requirement is to increase online sales, a solution requirement might include implementing a shopping cart feature on your company website.

    Once you have identified the solution requirements, you can then use those to create user stories. A user story describes a specific piece of functionality that the solution will provide from the perspective of a user.

    For example, "As a customer, I want to be able to add items to my shopping cart so that I can purchase them." This user story is directly tied to the solution requirement of implementing a shopping cart feature.

    Tracing from User Story back up to Business Requirement is essential in ensuring your solutions support your organization's strategic vison and objectives.

    This is an image of a traceability matrix for Business Requirements.

    Download the Info-Tech Requirements Traceability Matrix

    Improve the quality of your solution requirements

    A solution requirement is a statement that clearly outlines the functional capability that the business needs from a system or application.

    There are several attributes to look for in requirements:

    Verifiable

    Unambiguous

    Complete

    Consistent

    Achievable

    Traceable

    Unitary

    Agnostic

    Stated in a way that can be easily tested

    Free of subjective terms and can only be interpreted in one way

    Contains all relevant information

    Does not conflict with other requirements

    Possible to accomplish with budgetary and technological constraints

    Trackable from inception through to testing

    Addresses only one thing and cannot be decomposed into multiple requirements

    Doesn't pre-suppose a specific vendor or product

    For more on developing high quality requirements, check out the Improve Requirements Gathering Blueprint

    Prioritize your requirements

    When everything is a priority, nothing is a priority.

    Prioritization is the process of ranking each requirement based on its importance to project success. Each requirement should be assigned a priority level. The delivery team will use these priority levels to ensure efforts are targeted toward the proper requirements as well as to plan features available on each release. Use the MoSCoW Model of Prioritization to effectively order your requirements.

    The MoSCoW Model of Prioritization

    This is an image of The MoSCoW Model of Prioritization

    The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994

    (Source: ProductPlan).

    Base your prioritization on the right set of criteria

    Criteria Description
    Regulatory and legal compliance These requirements will be considered mandatory.
    Policy compliance Unless an internal policy can be altered or an exception can be made, these requirements will be considered mandatory.
    Business value significance Give a higher priority to high-value requirements.
    Business risk Any requirement with the potential to jeopardize the entire project should be given a high priority and implemented early.
    Likelihood of success Especially in proof-of-concept projects, it is recommended that requirements have good odds.
    Implementation complexity Give a higher priority to low implementation difficulty requirements.
    Alignment with strategy Give a higher priority to requirements that enable the corporate strategy.
    Urgency Prioritize requirements based on time sensitivity.
    Dependencies A requirement on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.

    Info-Tech Insight

    It is easier to prioritize requirements if they have already been collapsed, resolved, and rewritten. There is no point in prioritizing every requirement that is elicited up front when some of them will eventually be eliminated.

    Manage solution requirements in a Product backlog

    What is a backlog?

    Agile teams are familiar with the use of a Sprint Backlog, but in Requirements Management, a Product Backlog is a more appropriate choice.

    A product backlog and a Sprint backlog are similar in that they are both lists of items that need to be completed in order to deliver a product or project, but there are some key differences between the two.

    A product backlog is a list of all the features, user stories, and requirements that are needed for a product or project. It is typically created and maintained by the business analyst or product owner and is used to prioritize and guide the development of the product.

    A Sprint backlog, on the other hand, is a list of items specifically for an upcoming sprint, which is an iteration of work in Scrum. The Sprint backlog is created by the development team and is used to plan and guide the work that will be done during the sprint. The items in the Sprint backlog are typically taken from the product backlog and are prioritized based on their importance and readiness.

    For more on building effective product backlogs, visit Deliver on Your Digital Product Vision

    A backlog stores and organizes requirements at various stages

    Your backlog must give you a holistic understanding of demand for change in the product.

    A well-formed backlog can be thought of as a DEEP backlog

    Detailed appropriately: Requirements are broken down and refined as necessary

    Emergent: The backlog grows and evolves over time as requirements are added and removed.

    Estimated: The effort to deliver a requirement is estimated at each tier.

    Prioritized: A requirement's value and priority are determined at each tier.

    This is an image of an inverted funnel, with the top being labeled: Ideas; The middle being labeled: Qualified; and the bottom being labeled: Ready.

    Adapted from Essential Scrum

    Ensure requests and requirements are ready for development

    Clearly define what it means for a requirement, change, or maintenance request to be ready for development.

    This will help ensure the value and scope of each functionality and change are clear and well understood by both developers and stakeholders before the start of the sprint. The definition of ready should be two-fold: ready for the backlog, and ready for coding.

    1. Create a checklist that indicates when a requirement or request is ready for the development backlog. Consider the following questions:
      1. Is the requirement or request in the correct format?
      2. Does the desired functionality or change have significant business value?
      3. Can the requirement or request be reasonably completed within defined release timelines under the current context?
      4. Does the development team agree with the budget and points estimates?
      5. Is there an understanding of what the requirement or request means from the stakeholder or user perspective?
    2. Create a checklist that indicates when a requirement or request is ready for development. Consider the following questions:
      1. Have the requirements and requests been prioritized in the backlog?
      2. Has the team sufficiently collaborated on how the desired functionality or change can be completed?
      3. Do the tasks in each requirement or request contain sufficient detail and direction to begin development?
      4. Can the requirement or request be broken down into smaller pieces?

    Converting solution requirements into user stories

    Define the user

    Who will be interacting with the product or feature being developed? This will help to focus the user story on the user's needs and goals.

    Create the story

    Create the user story using the following template: "As a [user], I want [feature] so that [benefit]."
    This helps articulate the user's need and the value that the requirement will provide.

    Decompose

    User stories are typically too large to be implemented in a single sprint, so they should be broken down into smaller, more manageable tasks.

    Prioritize

    User stories are typically too large to be implemented in a single sprint, so they should be broken down into smaller, more manageable tasks.

    2.2.1 Create your user stories

    Estimated time: 60 Minutes

    1. Gather the project team and relevant stakeholders. Have access to your current list of solution requirements.
    2. Leverage the approach on previous slide "Converting Solution Requirements into User Stories" to generate a collection of user stories.

    NOTE: There is not a 1:1 relationship between requirements and user stories.
    It is possible that a single requirement will have multiple user stories, and similarly, that a single user story will apply to multiple solution requirements.

    Input

    • Requirements
    • Use Case Template

    Output

    • A collection of user stories

    Materials

    • Current Requirements

    Participants

    • Business Analyst(s)
    • Project Team
    • Relevant Stakeholders

    Use the INVEST model to create good user stories

    At this point your requirements should be high-level stories. The goal is to refine your backlog items, so they are . . .

    A vertical image of the Acronym: INVEST, taken from the first letter of each bolded word in the column to the right of the image.

    Independent: Ideally your user stories can be built in any order (i.e. independent from each other). This allows you to prioritize based on value and not get caught up in sequencing and prerequisites.
    Negotiable: As per the Agile principle, collaboration over contracts. Your user stories are meant to facilitate collaboration between the developer and the business. Therefore, they should be built to allow negotiation between all parties.
    Valuable: A user story needs to state the value so it can be effectively prioritized, but also so developers know what they are building.
    Estimable: As opposed to higher-level approximation given to epics, user stories need more accuracy in their estimates in order to, again, be effectively prioritized, but also so teams can know what can fit into a sprint or release plans.
    Small: User stories should be small enough for a number of them to fit into a sprint. However, team size and velocity will impact how many can be completed. A general guideline is that your teams should be able to deliver multiple stories in a sprint.
    Testable: Your stories need to be testable, which means they must have defined acceptance criteria and any related test cases as defined in your product quality standards.
    Source: Agile For All

    Defining Your Requirements Thresholds

    Phase 3

    Defining Your Requirements Thresholds

    Phase 1Phase 2Phase 3Phase 4

    1.1 Understand the benefits and limitations of Agile and business analysis

    1.2 Align Agile and business analysis within your organization

    2.1 Confirm the best-fit approach for delivery

    2.2 manage your requirements backlog

    3.1 Define project roles and responsibilities

    3.2 define your level of acceptable documentation

    3.3 Manage requirements as an asset

    3.4 Define your requirements change management plan

    4.1 Preparing new ways of working

    4.2 Develop a roadmap for next steps

    This phase will walk you through the following activities:

    • Assigning roles and responsibilities optional (Tool: RACI)
    • Define your Agile requirements process
    • Calculate the cost of your documentation (Tool: Documentation Calculator)
    • Define your backlog refinement plan

    This phase involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Managing Requirements in an Agile Environment

    Step 3.1

    Define Project Roles and Responsibilities

    Activities

    3.1.1 Define your Agile requirements RACI (optional)

    3.1.2 Define your Agile requirements process

    Defining Your Requirements Thresholds

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Outcomes of this step

    • A defined register of roles and responsibilities, along with a defined process for how Agile requirements work is to be done.

    Defining Your Requirements Thresholds

    Where does the BA function fit on an Agile team?

    Team formation is key, as Agile is a team sport

    A business analyst in an Agile team typically interacts with several different roles, including the product owner, development team, and many other stakeholders throughout the organization.

    This is an image the roles who typically interact with a Business Analyst.

    • The product owner, to set the priorities and direction of the project, and to gather requirements and ensure they are being met. Often, but not always, the BA and product owner are the same individual.
    • The development team, to provide clear and concise requirements that they can use to build and test the product.
    • Other stakeholders, such as customers, end-users, and subject matter experts to gather their requirements, feedback and validate the solution.
      • Design, to ensure that the product meets user needs. They may provide feedback and ensure that the design is aligned with requirements.
      • Security, to ensure that the solution meets all necessary security requirements and to identify potential risks and appropriate use of controls.
      • Testing, to ensure that the solution is thoroughly tested before it is deployed. They may create test cases or user scenarios that validate that everything is working as intended.
      • Deployment, to ensure that the necessary preparations have been made, including testing, security, and user acceptance.

    Additionally, during the sprint retrospectives, the team will review their performance and find ways to improve for the next sprint. As a team member, the business analyst helps to identify areas where the team could improve how they are working with requirements and understand how the team can improve communication with stakeholders.

    3.1.1 (Optional) Define Your Agile Requirements RACI

    Estimated Time: 60 Minutes

    1. Identify the project deliverables: The first step is to understand the project deliverables and the tasks that are required to complete them. This will help you to identify the different roles and responsibilities that need to be assigned.
    2. Define the roles and responsibilities: Identify the different roles that will be involved in the project and their associated responsibilities. These roles may include project manager, product owner, development team, stakeholders, and any other relevant parties.
    3. Assign RACI roles: Assign a RACI role to each of the identified tasks. The RACI roles are:
      1. Responsible: the person or team who is responsible for completing the task
      2. Accountable: the person who is accountable for the task being completed on time and to the required standard
      3. Consulted: the people or teams who need to be consulted to ensure the task is completed successfully
      4. Informed: the people or teams who need to be informed of the task's progress and outcome
    4. Create the RACI chart: Use the information gathered in the previous steps to create a matrix or chart that shows the tasks, the roles, and the RACI roles assigned to each task.
    5. Review and refine: Review the RACI chart with the project team and stakeholders to ensure that it accurately reflects the roles and responsibilities of everyone involved. Make any necessary revisions and ensure that all parties understand their roles and responsibilities.
    6. Communicate and implement: Communicate the RACI chart to all relevant parties and ensure that it is used as a reference throughout the project. This will help to ensure that everyone understands their role and that tasks are completed on time and to the required standard.

    Input

    • A list of required tasks and activities
    • A list of stakeholders

    Output

    • A list of defined roles and responsibilities for your project

    Materials

    • Agile Requirements Workbook

    Participants

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    A Case Study in Team Formation

    Industry: Anonymous Organization in the Energy sector
    Source: Interview

    Challenge

    Agile teams were struggling to deliver within a defined sprint, as there were consistent delays in requirements meeting the definition of ready for development. As such, sprints were often delayed, or key requirements were descoped and deferred to a future sprint.

    During a given two-week sprint cycle, the business analyst assigned to the team would be working along multiple horizons, completing elicitation, analysis, and validation, while concurrently supporting the sprint and dealing with stakeholder changes.

    Solution

    As a part of addressing this ongoing pain, a pilot program was run to add a second business analyst to the team.

    The intent was, as one is engaged preparing requirements through elicitation, analysis, and validation for a future sprint, the second is supporting the current sprint cycle, and gaining insights from stakeholders to refine the requirements backlog.

    Essentially, these two were leap-frogging each other in time. At all times, one BA was focused on the present, and one on the future.

    Result

    A happier team, more satisfied stakeholders, and consistent delivery of features and functions by the Agile teams. The pilot team outperformed all other Agile teams in the organization, and the "2 BA" approach was made the new standard.

    Understanding the Agile requirements process

    Shorter cycles make effective requirements management more necessary, not less

    Short development cycles can make requirements management more difficult because they often result in a higher rate of change to the requirements. In a shorter timeframe, there is less time to gather and verify requirements, leading to a higher likelihood of poor or incomplete requirements. Additionally, there may be more pressure to make decisions quickly, which can lead to less thorough analysis and validation of requirements. This can make it more challenging to ensure that the final solution meets the needs of the stakeholders.
    When planning your requirements cycles, it's important to consider;

    • Your sprint logistics (how long?)
    • Your release plan (at the end of every sprint, monthly, quarterly?)
    • How the backlog will be managed (as tickets, on a visual medium, such as a Kanban board?)
    • How will you manage communication?
    • How will you monitor progress?
    • How will future sprint planning happen?

    Info-Tech's Agile requirements framework

    Sprint N(-1)

    Sprint N

    Sprint N(+1)

    An image of Sprint N(-1) An image of Sprint N An image of Sprint N(+1)

    Changes from waterfall to Agile

    Gathering and documenting requirements: Requirements are discovered and refined throughout the project, rather than being gathered and documented up front. This can be difficult for business analysts who are used to working in a waterfall environment where all requirements are gathered and documented before development begins.
    Prioritization of requirements: Requirements are prioritized based on their value to the customer and the team's ability to deliver them. This can be difficult for business analysts who are used to prioritizing requirements based on the client's needs or their own understanding of what is important.

    Defining acceptance criteria: Acceptance criteria are defined for each user story to ensure that the team understands what needs to be delivered. Business analysts need to understand how to write effective acceptance criteria and how to use them to ensure that the team delivers what the customer needs.
    Supporting Testing and QA: The business analyst plays a role in ensuring that testing (and test cases) are completed and of proper quality, as defined in the requirements.

    Managing changing requirements: It is expected that requirements will change throughout the project. Business analysts need to be able to adapt quickly to changing requirements and ensure that the team is aware of the changes and how they will impact the project.
    Collaboration with stakeholders: Requirements are gathered from a variety of stakeholders, including customers, users, and team members. Business analysts need to be able to work effectively with all stakeholders to gather and refine requirements and ensure that the team is building the right product.

    3.1.2 Define your Agile requirements process

    Estimated time: 60 Minutes

    1. Gather all relevant stakeholders to discuss and define your process for requirements management.
    2. Have a team member facilitate the session to define the process. The sample in the Agile Requirements Workbook can be used optionally as a starting point. You can also use any existing processes and procedures as a baseline.
    3. Gain agreement on the process from all involved stakeholders.
    4. Revisit the process periodically to review its performance and make adjustments as needed.

    NOTE: The process is intended to be at a high enough level to leave space and flexibility for team members to adapt and adjust, but at a sufficient depth that everyone understands the process and workflows. In other words, the process will be both flexible and rigid, and the two are not mutually exclusive.

    Input

    • Project team and RACI
    • Existing Process (if available)

    Output

    • A process for Agile requirements that is flexible yet rigid

    Materials

    • Agile Requirements Workbook

    Participants

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Establish the right level of governance and decision-making

    Establishing the right level of governance and decision making is important in Agile requirements because there is a cost to decision making, as time plays an important factor. Even the failure to decide can have significant impacts.

    Good governance and decision-making practices can help to minimize risks, ensure that requirements are well understood and managed, and that project progress is tracked and reported effectively.

    In Agile environments, this often involves establishing clear roles and responsibilities, implementing effective communication and collaboration practices, and ensuring that decision-making processes are efficient and effective.

    Good requirements management practices can help to ensure that projects are aligned with organizational goals and strategy, that stakeholders' needs are understood and addressed, and that deliverables are of high quality and meet the needs of the business.

    By ensuring that governance and decision-making is effective, organizations can improve the chances of project success, and deliver value to the business. Risks and costs can be mitigated by staying small and nimble.

    Check out Make Your IT Governance Adaptable

    Develop an adaptive governance process

    A pyramid, with the number 4 at the apex, and the number 1 at the base.  In order from base-apex, the following titles are found to the right of the pyramid: Ad-Hoc governance; Controlled Governance; Agile Governance; Embedded/Automated governance.

    Maturing governance is a journey

    Organizations should look to progress in their governance stages. Ad-hoc and controlled governance tends to be slow, expensive, and a poor fit for modern practices.

    The goal as you progress through your stages is to delegate governance and empower teams to make optimal decisions in real-time, knowing that they are aligned with the understood best interests of the organization.

    Automate governance for optimal velocity, while mitigating risks and driving value.

    This puts your organization in the best position to be adaptive and able to react effectively to volatility and uncertainty.

    A graph charting Trust and empowerment on the x-axis, and Progress Integration on the Y axis.

    Five key principles for building an adaptive governance framework

    Delegate and empower

    Decision making must be delegated down within the organization, and all resources must be empowered and supported to make effective decisions.

    Define outcomes

    Outcomes and goals must be clearly articulated and understood across the organization to ensure decisions are in line and stay within reasonable boundaries.

    Make risk- informed decisions

    Integrated risk information must be available with sufficient data to support decision making and design approaches at all levels of the organization.

    Embed / automate

    Governance standards and activities need to be embedded in processes and practices. Optimal governance reduces its manual footprint while remaining viable. This also allows for more dynamic adaptation.

    Establish standards and behavior

    Standards and policies need to be defined as the foundation for embedding governance practices organizationally. These guardrails will create boundaries to reinforce delegated decision making.

    Sufficient decision-making power should be given to your Agile teams

    Push the decision-making process down to your pilot teams.

    • Bring your business stakeholders and subject matter experts together to identify the potential high-level risks.
    • Bring your business stakeholders and subject matter experts together to identify the potential high-level risks.
    • Discuss with the business the level of risk they are willing to accept.
    • Define the level of authority project teams have in making critical decisions.

    "Push the decision making down as far as possible, down to the point where sprint teams completely coordinate all the integration, development, and design. What I push up the management chain is risk taking. [Management] decides what level of risk they are willing to take and [they] demonstrate that by the amount of decision making you push down."
    – Senior Manager, Canadian P&C Insurance Company, Info-Tech Interview

    Step 3.2

    Define Your Level of Acceptable Documentation

    Activities

    3.2.1 Calculate the cost of documentation

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Relevant Stakeholders

    Outcomes of this step

    • Quantified cost of documentation produced for your Agile project.

    Defining Your Requirements Thresholds

    Right-size Your Documentation

    Why do we need it, and what purpose does it serve?

    Before creating any documentation, consider why; why are you creating documentation, and what purpose is it expected to serve?
    Is it:

    • … to gain approval?
    • … to facilitate decision-making?
    • .. to allow the team to think through a challenge or compare solution options?

    Next, consider what level of documentation would be acceptable and 'enough' for your stakeholders. Recognize that 'enough' will depend on your stakeholder's personal definition and perspective.
    There may also be considerations for maintaining documentation for the purposes of compliance, and auditability in some contexts and industries.
    The point is not to eliminate all documentation, but rather, to question why we're producing it, so that we can create just enough to deliver value.

    "What does the next person need to do their work well, to gain or create a shared understanding?"
    - Filip Hendrickx, Innovating BA and Founder, altershape

    Documentation comes at a cost

    We need to quantify the cost of documentation, against the expected benefit

    All things take time, and that would imply that all things have an inherent cost. We often don't think in these terms, as it's just the work we do, and costs are only associated with activities requiring additional capital expenditure. Documentation of requirements can come at a cost in terms of time and resources. Creating and maintaining detailed documentation requires effort from project team members, which could be spent on other aspects of the project such as development or testing. Additionally, there may be costs associated with storing and distributing the documentation.

    When creating documentation, we are making a decision. There is an opportunity cost of investing time to create, and concurrently, not working on other activities. Documentation of requirements can come at a cost in terms of time and resources. Creating and maintaining detailed documentation requires effort from project team members, which could be spent on other aspects of the project such as development or testing. Additionally, there may be costs associated with storing and distributing the documentation.

    In order to make better informed decisions about the types, quantity and even quality of the documentation we are producing, we need to capture that data. To ensure we are receiving good value for our documentation, we should compare the expected costs to the expected benefits of a sprint or project.

    3.2.1 Calculate the cost of documentation

    Estimated time: as needed

    1. Use this tool to quantify the cost of creating and maintaining current state documentation for your Agile requirements team. It provides an indication, via the Documentation Cost Index, of when your project is documenting excessively, relative to the expected benefits of the sprint or project.
    2. In Step 1, enter the hourly rate for the person (or persons) completing the business analysis function for your Agile team. NB: This does not have to be a person with the title of business analyst. If there are multiple people fulfilling this role, enter the average rate (if their rates are same or similar) or a weighted average (if there is a significant range in the hourly rate)
    3. In Step 2, enter the expected benefit (in $) for the sprint or project.
    4. In Step 3, enter the total number of hours spent on each task/activity during the sprint or project. Use blank spaces as needed to add tasks and activities not listed.
    5. In Step 4, you'll find the Documentation Cost Index, which compares your total documentation cost to the expected benefits. The cell will show green when the value is < 0.8, yellow between 0.8 and 1, and red when >1.
    6. Use the information to plan future sprints and documentation needs, identify opportunities for improvement in your requirements practice, and find balance in "just enough" documentation.

    Input

    • Project team and RACI
    • Existing Process (if available)

    Output

    • A process for Agile requirements that is flexible yet rigid

    Materials

    • Agile Requirements Workbook

    Participants

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Lack of documentation also comes at a cost

    Lack of documentation can bring costs to Agile projects in a few different ways.

    • Onboarding new team members
    • Improving efficiency
    • Knowledge management
    • Auditing and compliance
    • Project visibility
    • Maintaining code

    Info-Tech Insight

    Re-using deliverables (documentation, process, product, etc.) is important in maintaining the velocity of work. If you find yourself constantly recreating your current state documentation at the start of a project, it's hard to deliver with agility.

    Step 3.3

    Manage Requirements as an Asset

    Activities

    3.3.1 Discuss your current perspectives on requirements as assets

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Relevant Stakeholders

    Outcomes of this step

    • Awareness of the value in, and tactics for enabling effective management of requirements as assets

    Defining Your Requirements Thresholds

    What do we mean by "assets"?

    And when do requirements become assets?

    In order to delivery with agility, you need to maximize the re-usability of artifacts. These artifacts could take the form of current state documentation, user stories, test cases, and yes, even requirements for re-use.
    Think of it like a library for understanding where your organization is today. Understanding the people, processes, and technology, in one convenient location. These artifacts become assets when we choose to retain them, rather than discard them at the end of a project, when we think they'll no longer be needed.
    And just like finding a single book in a vast library, we need to ensure our assets can be found when we need them. And this means making them searchable.
    We can do this by establishing criteria for requirements and artifact reuse;

    • What business need and benefit is it aligned to?
    • What metadata needs to be attached, related to source, status, subject, author, permissions, type, etc.?
    • Where will it be stored for ease of retrieval?

    Info-Tech Insight

    When writing requirements for products or services, write them for the need first, and not simply for what is changing.

    The benefits of managing requirements as assets

    Retention of knowledge in a knowledge base that allows the team to retain current business requirements, process documentation, business rules, and any other relevant information.
    A clearly defined scope to reduce stakeholder, business, and compliance conflicts.
    Impact analysis of changes to the current organizational assets.

    Source: Requirement Engineering Magazine, 2017.

    A case study in creating an asset repository

    Industry: Anonymous Organization in the Government sector
    Source: Interview

    Challenge

    A large government organization faced a challenge with managing requirements, processes, and project artifacts with any consistency.

    Historically, their documentation was lacking, with multiple versions existing in email sent folders and manila folders no one could find. Confirming the current state at any given time meant the heavy lift of re-documenting and validating, so that effort was avoided for an excessive period.

    Then there was a request for audit and compliance, to review their existing documentation practices. With nothing concrete to show, drastic recommendations were made to ensure this practice would end.

    Solution

    A small but effective team was created to compile and (if not available) document all existing project and product documentation, including processes, requirements, artifacts, business cases, etc.

    A single repository was built and demonstrated to key stakeholders to ensure it would satisfy the needs of the audit and compliance group.

    Result

    A single source of truth for the organization, which was;

    • Accessible (view access to the entire organization).
    • Transparent (anyone could see and understand the process and requirements as intended).
    • A baseline for continuous improvement, as it was clear what the one defined "best way" was.
    • Current, where no one retained current documentation outside of this library.

    3.3.1 Discuss your current perspectives on requirements as assets

    Estimated time: 30 Minutes

    1. Gather all relevant stakeholder to share perspectives on the use of requirements as assets, historically in the organization.
    2. Have a team member facilitate the session. It is optional to document the findings.
    3. After looking at the historical use of requirements as assets, discuss the potential uses, benefits, and drawbacks of managing as assets in the target state.

    Input

    • Participant knowledge and experience

    Output

    • A shared perspective and history on requirements as assets

    Materials

    • A method for data capture (optional)

    Participants

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Apply changes to baseline documentation

    Baseline + Release Changes = New Baseline

    • Start from baseline documentation dramatically to reduce cost and risk
    • Treat all scope as changes to baseline requirements
    • Sum of changes in the release scope
    • Sum of changes and original baseline becomes the new baseline
    • May take additional time and effort to maintain accurate baseline

    What is the right tool?

    While an Excel spreadsheet is great to start off, its limitations will become apparent as your product delivery process becomes more complex. Look at these solutions to continue your journey in managing your Agile requirements:

    Step 3.4

    Define Your Requirements Change Management Plan

    Activities

    3.4.1 Triage your requirements

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Relevant Stakeholders

    Outcomes of this step

    • An approach for determining the appropriate level of governance over changes to requirements.

    Expect and embrace change

    In Agile development, change is expected and embraced. Instead of trying to rigidly follow a plan that may become outdated, Agile teams focus on regularly reassessing their priorities and adapting their plans accordingly. This means that the requirements can change often, and it's important for the team to have a process in place for managing these changes.

    A common approach to managing change in Agile is to use a technique called "backlog refinement." Where previously we populated our backlog with requirements to get them ready for development and deployment, this involves regularly reviewing and updating the list of work to be done. The team will prioritize the items on the evolving backlog, and the prioritized items will be worked on during the next sprint. This allows the team to quickly respond to changes in requirements and stay focused on the most important work.

    Another key aspect of managing change in Agile is effective communication. The team should have regular meetings, such as daily stand-up meetings or weekly sprint planning meetings, to discuss any changes in requirements and ensure that everyone is on the same page.

    Best practices in change and backlog refinement

    Communicate

    Clearly communicate your change process, criteria, and any techniques, tools, and templates that are part of your approach.

    Understand impacts/risks

    Maintain consistent control and communication and ensure that an impact assessment is completed. This is key to managing risks.

    Leverage tools

    Leverage tools when you have them available. This could be a Requirements Management system, a defect/change log, or even by turning on "track changes" in your documents.

    Cross-reference

    For every change, define the source of the change, the reason for the change, key dates for decisions, and any supporting documentation.

    Communicate the reason, and stay on message throughout the change

    Leaders of successful change spend considerable time developing a powerful change message: a compelling narrative that articulates the desired end state and makes the change concrete and meaningful to staff. They create the change vision with staff to build ownership and commitment.

    • The change message should:
    • Explain why the change is needed.
    • Summarize the things that will stay the same.
    • Highlight the things that will be left behind.
    • Emphasize the things that are being changed.
    • Explain how the change will be implemented.
    • Address how the change will affect the various roles in the organization.
    • Discuss staff's role in making the change successful.

    The five elements of communicating the reason for the change:

    An image of a cycle, including the five elements for communicating the reason for change.  these include: What will the role be for each department and individual?; What is the change?; Why are we doing it?; How are we going to go about it?; How long will it take us?

    How to make the management of changes more effective

    Key decisions and considerations

    How will changes to requirements be codified?
    How will intake happen?

    • What is the submission process?
    • Who has approval to submit?
    • What information is needed to submit a request?

    How will potential changes be triaged and evaluated?

    • What criteria will be used to assess the impact and urgency of the potential change?
    • How will you treat material and non-material changes?

    What is the review and approval process?

    • How will acceptance or rejection status be communicated to the submitter?

    3.4.1 Triage Your requirements

    An image of an inverted triangle, with the top being labeled: No Material Impact, the middle being labeled: Material impact; and the bottom being labeled: Governance Impact.  To the right of the image, are text boxes elaborating on each heading.

    If there's no material impact, update and move on

    An image of an inverted triangle, with the top being labeled: No Material Impact, the middle being labeled: Material impact; and the bottom being labeled: Governance Impact. To the right of the image, is a cycle including the following terms: Validate change; Update requirements; Track change (log); Package and communicate

    Material changes require oversight and approval

    An image of an inverted triangle, with the top being labeled: No Material Impact, the middle being labeled: Material impact; and the bottom being labeled: Governance Impact. To the right of the image, is a cycle including the following terms: Define impact; Revise; Change control needed?; Implement change.

    Planning Your Next Steps

    Phase 4

    Planning Your Next Steps

    Phase 1Phase 2Phase 3Phase 4

    1.1 Understand the benefits and limitations of Agile and business analysis

    1.2 Align Agile and business analysis within your organization

    2.1 Confirm the best-fit approach for delivery

    2.2 manage your requirements backlog

    3.1 Define project roles and responsibilities

    3.2 define your level of acceptable documentation

    3.3 Manage requirements as an asset

    3.4 Define your requirements change management plan

    4.1 Preparing new ways of working

    4.2 Develop a roadmap for next steps

    This phase will walk you through the following activities:

    • Completing Your Agile Requirements Playbook
    • EXERCISE: Capability Gap List

    This phase involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Managing Requirements in an Agile Environment

    Step 4.1

    Preparing New Ways of Working

    Activities

    4.1.1 Define your communication plan

    Planning Your Next Steps

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Outcomes of this step

    • Recognize the changes required on the team and within the broader organization, to bring stakeholders on board.

    How we do requirements work will change

    • Team formation and interaction
    • Stakeholder engagement and communication
    • The timing and sequencing of their work
    • Decision-making
    • Documentation
    • Dealing with change

    As a result, you'll need to focus on;

    Emphasizing flexibility: In Agile organizations, there is a greater emphasis on flexibility and the ability to adapt to change. This means that requirements may evolve over time and may not be fully defined at the beginning of the project.
    Enabling continuous delivery: Agile organizations often use continuous delivery methods, which means that new features and functionality are delivered to users on a regular basis. This requires a more iterative approach to requirements management, as new requirements may be identified and prioritized during the delivery process.
    Enhancing collaboration and communication: Agile organizations place a greater emphasis on collaboration and communication between team members, stakeholders, and customers.
    Developing a user-centered approach: Agile organizations often take a user-centered approach to requirements gathering, which means that the needs and goals of the end-user are prioritized.

    Change within the team, and in the broader organization

    How to build an effective blend Agile and requirements management

    Within the team

    • Meetings should happen as needed
    • Handoffs should be clear and concise
    • Interactions should add value
    • Stand-ups should similarly add value, and shouldn't be for status updates

    Within the organization

    • PMO inclusion, to ensure alignment across the organization
    • Business/Operating areas, to recognize what they are committing to for time, resources, etc.
    • Finance, for how your project or product is funded
    • Governance and oversight, to ensure velocity is maintained

    "Whether in an Agile environment or not, collaboration and relationships are still required and important…how you collaborate, communicate, and how you build relationships are key."
    - Paula Bell, CEO, Paula A. Bell Consulting

    Get stakeholders on board with Agile requirements

    1. Stakeholder feedback and management support are key components of successful Agile requirements.
    2. Stakeholders can see a project's progression and provide critical feedback about its success at critical milestones.
    3. Management helps teams succeed by trusting them to complete projects with business value at top of mind and by removing impediments that are inhibiting their productivity.
    4. Agile will bring a new mindset and significant amounts of people, process, and technology changes that stakeholders and management may not be accustomed to. Working through these issues in requirements management enables a smoother rollout.
    5. Management will play a key role in ensuring long-term Agile requirements success and ultimately rolling it out to the rest of the organization.
    6. The value of leadership involvement has not changed even though responsibilities will. The day-to-day involvement in projects will change but continual feedback will ultimately dictate the success or failure of a project.

    4.1.1 Define your communication plan

    Estimated time: 60 Minutes

      1. Gather all relevant stakeholder to create a communication plan for project or product stakeholders.
      2. Have a team member facilitate the session.
      3. Identify
      4. ;
        1. Each stakeholder
        2. The nature of information they are interested in
        3. The channel or medium best to communicate with them
        4. The frequency of communication
      5. (Optional) Consider validating the results with the stakeholders, if not present.
      6. Document the results in the Agile Requirements Workbook and include in Agile Requirements Playbook.
      7. Revisit as needed, whether at the beginning of a new initiative, or over time, to ensure the content is still valid.

    Input

    • Participant knowledge and experience

    Output

    • A plan for communicating with stakeholders

    Materials

    • Agile Requirements Workbook

    Participants

    • Business Analyst(s)
    • Project Team

    Step 4.2

    Develop a Roadmap for Next Steps

    Activities

    4.2.1 Develop your Agile requirements action plan

    4.2.2 Prioritize with now, next, later

    This step involves the following participants:

    • Business Analyst(s)
    • Project Team
    • Sponsor/Executive
    • Relevant Stakeholders

    Outcomes of this step

    • A comprehensive and prioritized list of opportunities and improvements to be made to mature the Agile requirements practice.

    Planning Your Next Steps

    Identify opportunities to improve and close gaps

    Maturing at multiple levels

    With a mindset of continuous improvement, there is always some way we can get better.

    As you mature your Agile requirements practice, recognize that those gaps for improvement can come from multiple levels, from the organizational down to the individual.

    Each level will bring challenges and opportunities.

    The organization

    • Organizational culture
    • Organizational behavior
    • Political will
    • Unsupportive stakeholders

    The team

    • Current ways of working
    • Team standards, norms and values

    The individual

    • Practitioner skills
    • Practitioner experience
    • Level of training received

    Make sure your organization is ready to transition to Agile requirements management

    A cycle is depicted, with the following Terms: Learning; Automation; Integrated teams; Metrics and governance; Culture.

    Learning:

    Agile is a radical change in how people work
    and think. Structured, facilitated learning is required throughout the transformation to
    help leaders and practitioners go from

    doing Agile to being Agile.

    Automation:

    While Agile is tool-agnostic at its roots, Agile work management tools and DevOps inspired SDLC tools that have become a key part of Agile practices.

    Integrated Teams:


    While temporary project teams can get some benefits from Agile, standing, self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of Agile.

    Metrics and Governance:

    Successful Agile implementations
    require the disciplined use

    of delivery and operations
    metrics that support governance focused on developing better teams.

    Culture:

    Agile teams believe that value is best created by standing, self-organizing cross-functional teams who deliver sustainably in frequent,
    short increments supported by leaders
    who coach them through challenges.

    Info-Tech Insight

    Agile gaps may only have a short-term, perceived benefit. For example, coding without a team mindset can allow for maximum speed to market for a seasoned developer. Post-deployment maintenance initiatives, however, often lock the single developer as no one else understands the rationale for the decisions that were made.

    4.2.1 Develop your Agile requirements action plan

    Estimated time: 60 Minutes

    1. Gather all relevant stakeholder to create a road map and action plan for requirements management.
    2. Have a team member facilitate the session using the results of the Agile Requirements Maturity Assessment.
    3. Identify gaps from current to future state and brainstorm possible actions that can be taken to address those gaps. Resist the urge to analyze or discuss the feasibility of each idea at this stage. The intent is idea generation.
    4. When the group has exhausted all ideas, the facilitator should group like ideas together, with support from participants. Discuss any ideas that are unclear or ambiguous.
    5. Document the results in the Agile Requirements Workbook.

    Note: the feasibility and timing of the ideas will happen in the following "Now, Next, Later" exercise.

    Prioritize your roadmap

    Taking steps to mature your Agile requirements practice.

    An image of the Now; Next; Later technique.

    The "Now, Next, Later" technique is a method for prioritizing and planning improvements or tasks. This involves breaking down a list of tasks or improvements into three categories:

    • "Now" tasks are those that must be completed immediately. These tasks are usually urgent or critical, and they must be completed to keep the project or organization running smoothly.
    • "Next" tasks are those that should be completed soon. These tasks are not as critical as "now" tasks, but they are still important and should be tackled relatively soon.
    • "Later" tasks are those that can be completed later. These tasks are less critical and can be deferred without causing major problems.

    By using this technique, you can prioritize and plan the most important tasks first, while also allowing for flexibility and the ability to adjust plans as necessary.
    This process also helps you get a clear picture on what needs to be done first and what can be done later. This way you can work on the most important things first, and keep track of what you need to do next, for keeping the development/improvement process smooth and efficient.

    Monitor your progress

    Monitoring progress is important in achieving your target state. Be deliberate with your actions, to continue to mature your Agile requirements practice.

    As you navigate toward your target state, continue to monitor your progress, your successes, and your challenges. As your Agile requirements practice matures, you should see improvements in the stated metrics below.

    Establish a cadence to review these metrics, as well as how you are progressing on your roadmap, against the plan.

    This is not about adding work, but rather, about ensuring you're heading in the right direction; finding the balance in your Agile requirements practice.

    Metric
    Team satisfaction (%) Expect team satisfaction to increase as a result of clearer role delineation and value contribution.
    Stakeholder satisfaction (%) Expect stakeholder satisfaction to similarly increase, as requirements quality increases, bringing increased value.
    Requirements rework Measures the quality of requirements from your Agile projects. Expect that the requirements rework will decrease, in terms of volume/frequency.
    Cost of documentation Quantifies the cost of documentation, including elicitation, analysis, validation, presentation, and management.
    Time to delivery Balancing metric. We don't want improvements in other at the expense of time to delivery.

    Appendix

    Research Contributors and Experts

    This is a picture of Emal Bariali

    Emal Bariali
    Business Architect & Business Analyst
    Bariali Consulting

    Emal Bariali is a Senior Business Analyst and Business Architect with 17 years of experience, executing nearly 20 projects. He has experience in both waterfall and Agile methodologies and has delivered solutions in a variety of forms, including custom builds and turnkey projects. He holds a Master's degree in Information Systems from the University of Toronto, a Bachelor's degree in Information Technology from York University, and a post-diploma in Software & Database Development from Seneca College.

    This is a picture of Paula Bell

    Paula Bell
    Paula A. Bell Consulting, LLC

    Paula Bell is the CEO of Paula A Bell Consulting, LLC. She is a Business Analyst, Leadership and Career Development coach, consultant, speaker, and author with 21+ years of experience in corporate America in project roles including business analyst, requirements manager, business initiatives manager, business process quality manager, technical writer, project manager, developer, test lead, and implementation lead. Paula has experience in a variety of industries including media, courts, manufacturing, and financial. Paula has led multiple highly-visible multi-million-dollar technology and business projects to create solutions to transform businesses as either a consultant, senior business analyst, or manager.

    Currently she is Director of Operations for Bridging the Gap, where she oversees the entire operation and their main flagship certification program.

    This is a picture of Ryan Folster

    Ryan Folster
    Consulting Services Manager, Business Analysis
    Dimension Data

    Ryan Folster is a Business Analyst Lead and Product Professional from Johannesburg, South Africa. His strong focus on innovation and his involvement in the business analysis community have seen Ryan develop professionally from a small company, serving a small number of users, to large multi-national organizations. Having merged into business analysis through the business domain, Ryan has developed a firm grounding and provides context to the methodologies applied to clients and projects he is working on. Ryan has gained exposure to the Human Resources, Asset Management, and Financial Services sectors, working on projects that span from Enterprise Line of Business Software to BI and Compliance.

    Ryan is also heavily involved in the local chapter of IIBA®; having previously served as the chapter president, he currently serves as a non-executive board member. Ryan is passionate about the role a Business Analyst plays within an organization and is a firm believer that the role will develop further in the future and become a crucial aspect of any successful business.

    This is a picture of Filip Hendrickx

    Filip Hendrickx
    Innovating BA, Visiting Professor @ VUB
    altershape

    Filip loves bridging business analysis and innovation and mixes both in his work as speaker, trainer, coach, and consultant.

    As co-founder of the BA & Beyond Conference and IIBA Brussels Chapter president, Filip helps support the BA profession and grow the BA community in and around Belgium. For these activities, Filip received the 2022 IIBA® EMEA Region Volunteer of the Year Award.

    Together with Ian Richards, Filip is the author ofBrainy Glue, a business novel on business analysis, innovation and change. Filip is also co-author of the BCS book Digital Product Management and Cycles, a book, method and toolkit enabling faster innovation.

    This is a picture of Fabricio Laguna

    Fabricio Laguna
    Professional Speaker, Consultant, and Trainer
    TheBrazilianBA.com

    Fabrício Laguna, aka The Brazilian BA, is the main reference on business analysis in Brazil. Author and producer of videos, articles, classes, lectures, and playful content, he can explain complex things in a simple and easy-to-understand way. IIBA Brazil Chapter president between 2012-2022. CBAP, AAC, CPOA, PMP, MBA. Consultant and instructor for more than 25 years working with business analysis, methodology, solution development, systems analysis, project management, business architecture, and systems architecture. His online courses are approved by students from 65 countries.

    This is a picture of Ryland Leyton

    Ryland Leyton
    Business Analyst and Agile Coach
    Independent Consultant

    Ryland Leyton, CBAP, PMP, CSM, is an avid Agile advocate and coach, business analyst, author, speaker, and educator. He has worked in the technology sector since 1998, starting off with database and web programming, gradually moving through project management and finding his passion in the BA and Agile fields. He has been a core team member of the IIBA Extension to the BABOK and the IIBA Agile Analysis Certification. Ryland has written popular books on agility, business analysis, and career. He can be reached at www.RylandLeyton.com.

    This is a picture of Steve Jones

    Steve Jones
    Supervisor, Market Support Business Analysis
    ISO New England

    Steve is a passionate analyst and BA manager with more than 20 years of experience in improving processes, services and software, working across all areas of software development lifecycle, business change and business analysis. He rejoices in solving complex business problems and increasing process reproducibility and compliance through the application of business analysis tools and techniques.

    Steve is currently serving as VP of Education for IIBA Hartford. He is a CBAP, certified SAFe Product Owner/Product Manager, Six Sigma Green Belt, and holds an MS in Information Management and Communications.

    This is a picture of Angela Wick

    Angela Wick
    Founder
    BA-Squared and BA-Cube

    Founder of BA-Squared and BA-Cube.com, Angela is passionate about teaching practical, modern product ownership and BA skills. With over 20 years' experience she takes BA skills to the next level and into the future!
    Angela is also a LinkedIn Learning instructor on Agile product ownership and business analysis, an IC-Agile Authorized Trainer, Product Owner and BA highly-rated trainer, highly-rated speaker, sought-after workshop facilitator, and contributor to many industry publications, including:

    • IIBA BABOK v3 Core Team, leading author on the BABOK v3
    • Expert Reviewer, IIBA Agile Extension to the BABOK
    • PMI BA Practice Guide – Expert Reviewer
    • PMI Requirements Management Practice Guide – Expert Reviewer
    • IIBA Competency Model – Lead Author and Team Lead, V1, V2, and V3.

    This is a picture of Rachael Wilterdink

    Rachael Wilterdink
    Principal Consultant
    Infotech Enterprises

    Rachael Wilterdink is a Principal Consultant with Infotech Enterprises. With over 25 years of IT experience, she holds multiple business analysis and Agile certifications. As a consultant, Rachael has served clients in the financial, retail, manufacturing, healthcare, government, non-profit, and insurance industries. Giving back to the professional community, Ms. Wilterdink served on the boards of her local IIBA® and PMI® chapters. As a passionate public speaker, Rachael presents various topics at conferences and user groups across the country and the world. Rachael is also the author of the popular eBook "40 Agile Transformation Pain Points (and how to avoid or manage them)."

    Bibliography

    "2021 Business Agility Report: Rising to the Challenge." Business Agility, 2021. Accessed 13 June 2022.
    Axure. "The Pitfalls of Agile and How We Got Here". Axure. Accessed 14 November 2022.
    Beck, Kent, et al. "Manifesto for Agile Software Development." Agilemanifesto. 2001.
    Brock, Jon, et al. "Large-Scale IT Projects: From Nightmare to Value Creation." BCG, 25 May 2015.
    Bryar, Colin and Bill Carr. "Have We Taken Agile Too Far?" Harvard Business Review, 9 April 2021. Accessed 11 November, 2022.
    Clarke, Thomas. "When Agile Isn't Responsive to Business Goals" RCG Global Services, Accessed 14 November 2022.
    Digital.ai "The 15th State of Agile Report". Digital.ai. Accessed 21 November 2022.
    Hackshall, Robin. "Product Backlog Refinement." Scrum Alliance. 9 Oct. 2014.
    Hartman, Bob. "New to Agile? INVEST in good user stories." Agile For All.
    IAG Consulting. "Business Analysis Benchmark: Full Report." IAG Consulting, 2009.
    Karlsson, Johan. "Backlog Grooming: Must-Know Tips for High-Value Products." Perforce. 18 May 2018
    KPMG. Agile Transformation (2019 Survey on Agility). KPMG. Accessed November 29.
    Laguna, Fabricio "REQM guidance matrix: A framework to drive requirements management", Requirements Engineering Magazine. 12 September 2017. Accessed 10 November 2022.
    Miller, G. J. (2013). Agile problems, challenges, & failures. Paper presented at PMI® Global Congress 2013—North America, New Orleans, LA. Newtown Square, PA: Project Management Institute.
    Product Management: MoSCoW Prioritization." ProductPlan, n.d. Web.
    Podeswa, Howard "The Business Case for Agile Business Analysis" Requirements Engineering Magazine. 21 February 2017. Accessed 7 November 2022.
    PPM Express. "Why Projects Fail: Business Analysis is the Key". PPM Express. Accessed 16 November 2022.
    Reifer, Donald J. "Quantitative Analysis of Agile Methods Study: Twelve Major Findings." InfoQ, 6 February, 2017.
    Royce, Dr. Winston W. "Managing the Development of Large Software Systems." Scf.usc.edu. 1970. (royce1970.pdf (usc.edu))
    Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education. 2012.
    Singer, Michael. "15+ Surprising Agile Statistics: Everything You Need To Know About Agile Management". Enterprise Apps Today. 22 August 2022.
    The Standish Group. The Chaos Report, 2015. The Standish Group.

    Where do I go next?

    Improve Requirements Gathering

    Back to basics: great products are built on great requirements.

    Make the Case for Product Delivery

    Align your organization on the practices to deliver what matters most.

    Requirements for Small and Medium Enterprises

    Right-size the guidelines of your requirements gathering process.

    Implement Agile Practices that Work

    Improve collaboration and transparency with the business to minimize project failure.

    Create an Agile-Friendly Gating and Governance Model

    Use Info-Tech's Agile Gating Framework as a guide to gating your Agile projects following a "trust but verify" approach.

    Make Your IT Governance Adaptable

    Governance isn't optional, so keep it simple and make it flexible.

    Deliver on Your Digital Product Vision

    Build a product vision your organization can take from strategy through execution.

    AI and the Future of Enterprise Productivity

    • Buy Link or Shortcode: {j2store}329|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $12,399 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Innovation
    • Parent Category Link: /innovation
    • We’re witnessing a fundamental transformation in how businesses operate and productivity is achieved.
    • Advances in narrow but powerful forms of artificial intelligence (AI) are being driven by a cluster of factors.
    • Applications for enterprise AI aren’t waiting for the emergence of a general AI. They’re being rapidly deployed in task-specific domains. From robotic process automation (RPA) to demand forecasting, from real-world robotics to AI-driven drug development, AI is boosting enterprise productivity in significant ways.

    Our Advice

    Critical Insight

    Algorithms are becoming more advanced, data is now richer and easier to collect, and hardware is cheaper and more powerful. All of this is true and contributes to the excitement around enterprise AI applications, but the biggest difference today is that enterprises are redesigning their processes around AI, rather than simply adding AI to their existing processes.

    Impact and Result

    This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.

    AI and the Future of Enterprise Productivity Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Read the trend report

    This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.

    • AI and the Future of Enterprise Productivity Trend Report
    • AI and the Future of Enterprise Productivity Trend Report (PDF)
    [infographic]

    Get Started With Customer Advocacy

    • Buy Link or Shortcode: {j2store}565|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions

    Getting started with customer advocacy (CA) is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach.

    Our Advice

    Critical Insight

    • Customer success leaders must reposition their CA program around growth; the recognition that customer advocacy is a strategic growth initiative is necessary to succeed in today’s competitive market.
    • Get key stakeholders on board early – especially Sales!
    • Always link your CA efforts back to retention and growth.
    • Make building genuine relationships with your advocates the cornerstone of your CA program.

    Impact and Result

    • Enable the organization to identify and develop meaningful relationships with top customers and advocates.
    • Understand the concepts and benefits of CA and how CA can be used to improve marketing and sales and fuel growth and competitiveness.
    • Follow SoftwareReviews’ methodology to identify where to start to apply CA within the organization.
    • Develop a customer advocacy proof of concept/pilot program to gain stakeholder approval and funding to get started with or expand efforts around customer advocacy.

    Get Started With Customer Advocacy Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Get Started With Customer Advocacy Executive Brief – An overview of why customer advocacy is critical to your organization and the recommended approach for getting started with a pilot program.

    Understand the strategic benefits and process for building a formal customer advocacy program. To be successful, you must reposition CA as a strategic growth initiative and continually link any CA efforts back to growth.

    • Get Started With Customer Advocacy Storyboard

    2. Define Your Advocacy Requirements – Assess your current customer advocacy efforts, identify gaps, and define your program requirements.

    With the assessment tool and steps outlined in the storyboard, you will be able to understand the gaps and pain points, where and how to improve your efforts, and how to establish program requirements.

    • Customer Advocacy Maturity Assessment Tool

    3. Win Executive Approval and Launch Pilot – Develop goals, success metrics, and timelines, and gain approval for your customer advocacy pilot.

    Align on pilot goals, key milestones, and program elements using the template and storyboard to effectively communicate with stakeholders and gain executive buy-in for your customer advocacy pilot.

    • Get Started With Customer Advocacy Executive Presentation Template

    Infographic

    Further reading

    Get Started With Customer Advocacy

    Develop a customer advocacy program to transform customer satisfaction into revenue growth.

    EXECUTIVE BRIEF

    Analyst perspective

    Customer advocacy is critical to driving revenue growth

    The image contains a picture of Emily Wright.

    Customer advocacy puts the customer at the center of everything your organization does. By cultivating a deep understanding of customer needs and how they define value and by delivering positive experiences throughout the customer journey, organizations inspire and empower customers to become evangelists for their brands or products. Both the client and solution provider enjoy satisfying and ongoing business outcomes as a result.

    Focusing on customer advocacy is critical for software solutions providers. Business-to-business (B2B) buyers are increasingly looking to their peers and third-party resources to arm themselves with information on solutions they feel they can trust before they choose to engage with solution providers. Your satisfied customers are now your most trusted and powerful resource.

    Customer advocacy helps build strong relationships with your customers, nurtures brand advocacy, gives your marketing messaging credibility, and differentiates your company from the competition; it’s critical to driving revenue growth. Companies that develop mature advocacy programs can increase Customer Lifetime Value (CLV) by 16% (Wharton Business School, 2009), increase customer retention by 35% (Deloitte, 2011), and give themselves a strong competitive advantage in an increasingly competitive marketplace.

    Emily Wright
    Senior Research Analyst, Advisory
    SoftwareReviews

    Executive summary

    Your Challenge

    Ad hoc customer advocacy (CA) efforts and reference programs, while still useful, are not enough to drive growth. Providers increase their chance for success by assessing if they face the following challenges:

    • Lack of referenceable customers that can turn into passionate advocates, or a limited pool that is at risk of burnout.
    • Lack of references for all key customer types, verticals, etc., especially in new growth segments or those that are hard to recruit.
    • Lack of a consistent program for gathering customer feedback and input to make improvements and increase customer satisfaction.
    • Lack of executive and stakeholder (e.g. Sales, Customer Success, channel partners, etc.) buy-in for the importance and value of customer advocacy.

    Building a strong customer advocacy program must be a high priority for customer service/success leaders in today’s highly competitive software markets.

    Common Obstacles

    Getting started with customer advocacy is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach. What separates them from success are several nagging obstacles:

    • Efforts lack funding and buy-in from stakeholders.
    • Senior management doesn’t fully understand the business value of a customer advocacy program.
    • Duplicate efforts are taking place between Sales, Marketing, product teams, etc., because ownership, roles, and responsibilities have not been determined.
    • Relationships are guarded/hoarded by those who feel they own the relationship (e.g. Sales, Customer Success, channel partners, etc.).
    • Customer-facing staff often lack the necessary skills to foster customer advocacy.

    SoftwareReviews’ Approach

    This blueprint will help leaders of customer advocacy programs get started with developing a formalized pilot program that will demonstrate the value of customer advocacy and lay a strong foundation to justify rollout. Through SoftwareReviews’ approach, customer advocacy leaders will:

    • Enable the organization to identify and develop meaningful relationships with top customers and advocates.
    • Understand the concepts and benefits of CA and how CA can be used to improve marketing and sales and fuel growth and competitiveness.
    • Follow SoftwareReviews’ methodology to identify where to start to apply CA within the organization.
    • Develop a customer advocacy proof of concept/pilot program to gain stakeholder approval and funding to get started with or expand efforts around customer advocacy.

    What is customer advocacy?

    “Customer advocacy is the act of putting customer needs first and working to deliver solution-based assistance through your products and services." – Testimonial Hero, 2021

    Customer advocacy is designed to keep customers loyal through customer engagement and advocacy marketing campaigns. Successful customer advocacy leaders experience decreased churn while increasing return on investment (ROI) through retention, acquisition, and cost savings.

    Businesses that implement customer advocacy throughout their organizations find new ways of supporting customers, provide additional customer value, and ensure their brands stand unique among the competition.

    Customer Advocacy Is…

    • An integral part of any marketing and/or business strategy.
    • Essential to improving and maintaining high levels of customer satisfaction.
    • Focused on delivering value to customers.
    • Not only a set of actions, but a mindset that should be fostered and reinforced through a customer-centric culture.
    • Mutually beneficial relationships for both company and customer.

    Customer Advocacy Is Not…

    • Only referrals and testimonials.
    • Solely about what you can get from your advocates.
    • Brand advocacy. Brand advocacy is the desired outcome of customer advocacy.
    • Transactional. Brand advocates must be engaged.
    • A nice-to-have.
    • Solved entirely by software. Think about what you want to achieve and how a software solution can you help you reach those goals.

    SoftwareReviews Insight

    Customer advocacy has evolved into being a valued company asset versus a simple referral program – success requires an organization-wide customer-first mindset and the recognition that customer advocacy is a strategic growth initiative necessary to succeed in today’s competitive market.

    Customer advocacy: Essential to high retention

    When customers advocate for your company and products, they are eager to retain the value they receive

    • Customer acts of advocacy correlate to high retention.
    • Acts of advocacy won’t happen unless customers feel their interests are placed ahead of your company’s, thereby increasing satisfaction and customer success. That’s the definition of a customer-centric culture.
    • And yet your company does receive significant benefits from customer advocacy:
      • When customers advocate and renew, your costs go down and margins rise because it costs less to keep a happy customer than it does to bring a new customer onboard.
      • When renewal rates are high, customer lifetime value increases, also increasing profitability.

    Acquiring a new customer can cost five times more than retaining an existing customer (Huify, 2018).

    Increasing customer retention by 5% can increase profits by 25% to 95% (Bain & Company, cited in Harvard Business Review, 2014).

    SoftwareReviews Insight

    Don’t overlook the value of customer advocacy to retention! Despite the common knowledge that it’s far easier and cheaper to sell to an existing customer than to sell to a new prospect, most companies fail to leverage their customer advocacy programs and continue to put pressure on Marketing to focus their budgets on customer acquisition.

    Customer advocacy can also be your ultimate growth strategy

    In your marketing and sales messaging, acts of advocacy serve as excellent proof points for value delivered.

    Forty-five percent of businesses rank online reviews as a top source of information for selecting software during this (top of funnel) stage, followed closely by recommendations and referrals at 42%. These sources are topped only by company websites at 54% (Clutch, 2020).

    With referrals coming from customer advocates to prospects via your lead gen engine and through seller talk tracks, customer advocacy is central to sales, marketing, and customer experience success.

    ✓ Advocates can help your new customers learn your solution and ensure higher adoption and satisfaction.
    ✓ Advocates can provide valuable, honest feedback on new updates and features.

    The image contains a picture to demonstrate the cycle of customer advocacy. The image has four circles, with one big circle in the middle and three circles surrounding with arrows pointing in both directions in between them. The middle circle is labelled customer advocacy. The three circles are labelled: sales, customer success, marketing.

    “A customer advocacy program is not just a fancy buzz word or a marketing tool that’s nice to have. It’s a core discipline that every major brand needs to integrate into their overall marketing, sales and customer success strategies if they expect to survive in this trust economy. Customer advocacy arguably is the common asset that runs throughout all marketing, sales and customer success activities regardless of the stage of the buyer’s journey and ties it all together.” – RO Innovation, 2017

    Positive experience drives acts of advocacy

    More than price or product, experience now leads the way in customer advocacy and retention

    Advocacy happens when customers recommend your product. Our research shows that the biggest drivers of likeliness to recommend and acts of customer advocacy are the positive experiences customers have with vendors and their products, not product features or cost savings. Customers want to feel that:

    1. Their productivity and performance is enhanced and the vendor is helping them to innovate and grow as a company.
    2. Their vendor inspires them and helps them to continually improve.
    3. They can rely on the vendor and the product they purchased.
    4. They are respected by the vendor.
    5. They can trust that the vendor will be on their side and save them time.

    The image contains a graph to demonstrate the correlation of likeliness to recommend a satisfaction driver. Where anything above a 0.5 indicates a strong driver of satisfaction.

    Note that anything above 0.5 indicates a strong driver of satisfaction.
    Source: SoftwareReviews buyer reviews (based on 82,560 unique reviews).

    SoftwareReviews Insight

    True customer satisfaction comes from helping customers innovate, enhancing their performance, inspiring them to continually improve, and being reliable, respectful, trustworthy, and conscious of their time. These true drivers of satisfaction should be considered in your customer advocacy and retention efforts. The experience customers have with your product and brand is what will differentiate your brand from competitors, drive advocacy, and ultimately, power business growth. Talk to a SoftwareReviews advisor to learn how users rate your product on these satisfaction drivers in the SoftwareReviews Emotional Footprint Report.

    Yet challenges exist for customer advocacy program leaders

    Customer success leaders without a strong customer advocacy program feel numerous avoidable pains:

    • Lack of compelling stories and proof points for the sales team, causing long sales cycles.
    • Heavy reliance on a small pool of worn-out references.
    • Lack of references for all needed customer types, verticals, etc.
    • Lack of a reliable customer feedback process for solution improvements.
    • Overspending on acquiring new customers due to a lack of customer proof points.
    • Missed opportunities that could grow the business (customer lifetime value, upsell/cross-sell, etc.).

    Marketing, customer success, and sales teams experiencing any one of the above challenges must consider getting started with a more formalized customer advocacy program.

    Obstacles to customer advocacy programs

    Leaders must overcome several barriers in developing a customer advocacy program:

    • Stakeholders are often unclear on the value customer advocacy programs can bring and require proof of benefits to invest.
    • Efforts are duplicated among sales, marketing, product, and customer success teams, given ownership and collaboration practices are ill-defined or nonexistent.
    • There is a culture of guarding or hoarding customer relationships by those who feel they own the relationship, or there’s high turnover among employees who own the customer relationships.
    • The governance, technology, people, skills, and/or processes to take customer advocacy to the next level are lacking.
    • Leaders don’t know where to start with customer advocacy, what needs to be improved, or what to focus on first.

    A lack of customer centricity hurts organizations

    12% of people believe when a company says they put customers first. (Source: HubSpot, 2019)

    Brands struggle to follow through on brand promises, and a mismatch between expectations and lived experience emerges. Customer advocacy can help close this gap and help companies live up to their customer-first messaging.

    42% of companies don’t conduct any customer surveys or collect feedback. (Source: HubSpot, 2019)

    Too many companies are not truly listening to their customers. Companies that don’t collect feedback aren’t going to know what to change to improve customer satisfaction. Customer advocacy will orient companies around their customer and create a reliable feedback loop that informs product and service enhancements.

    Customer advocacy is no longer a nice-to-have but a necessity for solution providers

    B2B buyers increasingly turn to peers to learn about solutions:

    “84% of B2B decision makers start the buying process with a referral.” (Source: Influitive, Gainsight & Pendo, 2020)

    “46% of B2B buyers rely on customer references for information before purchasing.” (Source: RO Innovation, 2017)

    “91% of B2B purchasers’ buying decisions are influenced by word-of-mouth recommendations.” (Source: ReferralRock, 2022)

    “76% of individuals admit that they’re more likely to trust content shared by ‘normal’ people than content shared by brands.” (Source: TrustPilot, 2020)

    By ignoring the importance of customer advocacy, companies and brands are risking stagnation and missing out on opportunities to gain competitive advantage and achieve growth.

    Getting Started With Customer Advocacy: SoftwareReviews' Approach

    1 BUILD
    Build the business case
    Identify your key stakeholders, steering committee, and working team, understand key customer advocacy principles, and note success barriers and ways to overcome them as your first steps.

    2 DEVELOP
    Develop your advocacy requirements
    Assess your current customer advocacy maturity, identify gaps in your current efforts, and develop your ideal advocate profile.

    3 WIN
    Win executive approval and implement pilot
    Determine goals and success metrics for the pilot, establish a timeline and key project milestones, create advocate communication materials, and finally gain executive buy-in and implement the pilot.

    SoftwareReviews Insight
    Building and implementing a customer advocacy pilot will help lay the foundation for a full program and demonstrate to executives and key stakeholders the impact on revenue, retention, and CLV that can be achieved through coordinated and well-planned customer advocacy efforts.

    Customer advocacy benefits

    Our research benefits customer advocacy program managers by enabling them to:

    • Explain why having a centralized, proactive customer advocacy program is important.
    • Clearly communicate the benefits and business case for having a formalized customer advocacy program.
    • Develop a customer advocacy pilot to provide a proof of concept (POC) and demonstrate the value of customer advocacy.
    • Assess the maturity of your current customer advocacy efforts and identify what to improve and how to improve to grow your customer advocacy function.

    "Advocacy is the currency for business and the fuel for explosive growth. Successful marketing executives who understand this make advocacy programs an essential part of their go-to-market strategy. They also know that advocacy isn't something you simply 'turn on': ... ultimately, it's about making human connections and building relationships that have enduring value for everyone involved."
    - Dan Cote, Influitive, Dec. 2021

    Case Study: Advocate impact on sales at Genesys

    Genesys' Goal

    Provide sales team with compelling customer reviews, quotes, stories, videos, and references.

    Approach to Advocacy

    • Customers were able to share their stories through Genesys' customer hub GCAP as quotes, reviews, etc., and could sign up to host reference forum sessions for prospective customers.
    • Content was developed that demonstrated ROI with using Genesys' solutions, including "top-tier logos, inspiring quotes, and reference forums featuring some of their top advocates" (Influitive, 2021).
    • Leveraged customer advocacy-specific software solution integration with the CRM to easily identify reference recommendations for Sales.

    Advocate Impact on Sales

    According to Influitive (2021), the impacts were:

    • 386% increase in revenue influences from references calls
    • 82% of revenue has been influence by reference calls
    • 78 reference calls resulted in closed-won opportunities
    • 250 customers and prospects attended 7 reference forums
    • 112 reference slides created for sales enablement
    • 100+ quotes were collect and transformed into 78 quote slides

    Who benefits from getting started with customer advocacy?

    This Research Is Designed for:

    • Customer advocacy leaders and marketers who are looking to:
      • Take a more strategic, proactive, and structured approach to customer advocacy.
      • Find a more effective and reliable way to gather customer feedback and input on products and services.
      • Develop and nurture a customer-oriented mindset throughout the organization.
      • Improve marketing credibility both within the company and outside to prospective customers.

    This Research Will Help You:

    • Explain why having a centralized, proactive customer advocacy program is important.
    • Clearly communicate the benefits and business case for having a formalized customer advocacy program.
    • Develop a customer advocacy pilot to provide a proof of concept (POC) and demonstrate the value of customer advocacy.
    • Assess the maturity of your current customer advocacy efforts and identify what to improve and how to improve to grow your customer advocacy function.

    This Research Will Also Assist:

    • Customer success leaders and sales directors who are responsible for:
      • Gathering customer references and testimonials.
      • Referral or voice of the customer (VoC) programs.

    This Research Will Help Them:

    • Align stakeholders on an overall program of identifying ideal advocates.
    • Coordinate customer advocacy efforts and actions.
    • Gather and make use of customer feedback to improve products, solutions, and service provided.
    • Provide an amazing customer experience throughout the entirety of the customer journey.

    SoftwareReviews’ methodology for getting started with customer advocacy

    Phase Steps

    1. Build the business case

    1. Identify your key stakeholders, steering committee, and working team
    2. Understand the concepts and benefits of customer advocacy as they apply to your organization
    3. Outline barriers to success, risks, and risk mitigation tactics

    2. Develop your advocacy requirements

    1. Assess your customer advocacy maturity using the SoftwareReviews CA Maturity Assessment Tool
    2. Identify gaps/pains in current CA efforts and add tasks to your action plan
    3. Develop ideal advocate profile/identify target advocate segment(s)

    3. Create implementation plan and pitch CA pilot

    1. Determine pilot goals and success metrics
    2. Establish timeline and create advocate communication materials
    3. Gain executive buy-in and implement pilot

    Phase Outcomes

    1. Common understanding of CA concepts and benefits
    2. Buy-in from CEO and head of Sales
    3. List of opportunities, risks, and risk mitigation tactics
    1. Identification of gaps in current customer advocacy efforts and/or activities
    2. Understanding customer advocacy readiness
    3. Identification of ideal advocate profile/target segment
    4. Basic actions to bridge gaps in CA efforts
    1. Clear objective for CA pilot
    2. Key metrics for program success
    3. Pilot timelines and milestones
    4. Executive presentation with business case for CA

    Insight summary

    Customer advocacy is a critical strategic growth initiative
    Customer advocacy (CA) has evolved into being a highly valued company asset as opposed to a simple referral program, but not everyone in the organization sees it that way. Customer success leaders must reposition their CA program around growth instead of focusing solely on retention and communicate this to key stakeholders. The recognition that customer advocacy is a strategic growth initiative is necessary to succeed in today’s competitive market.

    Get key stakeholders on board early – especially Sales!
    Work to bring the CEO and the head of Sales on your side early. Sales is the gatekeeper – they need to open the door to customers to turn them into advocates. Clearly reposition CA for growth and communicate that to the CEO and head of Sales; wider buy-in will follow.

    Identify the highest priority segment for generating acts of advocacy
    By focusing on the highest priority segment, you accomplish a number of things: generating growth in a critical customer segment, proving the value of customer advocacy to key stakeholders (especially Sales), and setting a strong foundation for customer advocacy to build upon and expand the program out to other segments.

    Always link your CA efforts back to retention and growth
    By clearly demonstrating the impact that customer advocacy has on not only retention but also overall growth, marketers will gain buy-in from key stakeholders, secure funding for a full CA program, and gain the resources needed to expand customer advocacy efforts.

    Focus on providing value to advocates
    Many organizations take a transactional approach to customer advocacy, focusing on what their advocates can do for them. To truly succeed with CA, focus on providing your advocates with value first and put them in the spotlight.

    Make building genuine relationships with your advocates the cornerstone of your CA program
    "57% of small businesses say that having a relationship with their consumers is the primary driver of repeat business" (Factory360).

    Guided Implementation

    What does our GI on getting started with building customer advocacy look like?

    Build the Business Case

    Call #1: Identify key stakeholders. Map out motivations and anticipate any concerns or objections. Determine steering committee and working team. Plan next call – 1 week.

    Call #2: Discuss concepts and benefits of customer advocacy as they apply to organizational goals. Plan next call – 1 week.

    Call #3: Discuss barriers to success, risks, and risk mitigation tactics. Plan next call – 1 week.

    Call #4: Finalize CA goals, opportunities, and risks and develop business case. Plan next call – 2 weeks.

    Develop Your Advocacy Requirements

    Call #5: Review the SoftwareReviews CA Maturity Assessment Tool. Assess your current level of customer advocacy maturity. Plan next call – 1 week.

    Call #6: Review gaps and pains in current CA efforts. Discuss tactics and possible CA pilot program goals. Begin adding tasks to action plan. Plan next call – 2 weeks.

    Call #7: Discuss ideal advocate profile and target segments. Plan next call – 2 weeks.

    Call #8: Validate and finalize ideal advocate profile. Plan next call – 1 week.

    Win Executive Approval and Implement Pilot

    Call #9: Discuss CA pilot scope. Discuss performance metrics and KPIs. Plan next call – 3 days.

    Call #10: Determine timeline and key milestones. Plan next call –2 weeks.

    Call #11: Develop advocate communication materials. Plan next call – 3 days.

    Call #12: Review final business case and coach on executive presentation. Plan next call – 1 week.

    A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization. For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst. Your engagement managers will work with you to schedule analyst calls.


    Customer Advocacy Workshop

    Pre-Workshop Day 1 Day 2 Day 3 Day 4 Day 5 Post-Workshop
    Activities Identify Stakeholders & CA Pilot Team Build the Business Case Assess Current CA Efforts Develop Advocacy Goals & Ideal Advocate Profile Develop Project Timelines, Materials, and Exec Presentation Next Steps and Wrap-Up (offsite) Pitch CA Pilot
    0.1 Identify key stakeholders to involve in customer advocacy pilot and workshop; understand their motivations and anticipate possible concerns. 1.1 Review key CA concepts and identify benefits of CA for the organization.
    1.2 Outline barriers to success, risks, and risk mitigation tactics.
    2.1 Assess your customer advocacy maturity using the SoftwareReviews CA Maturity Assessment Tool.
    2.2 Identify gaps/pains in current CA efforts.
    2.3 Prioritize gaps from diagnostic and any other critical pain points.
    3.1 Identify and document the ideal advocate profile and target customer segment for pilot.
    3.2 Determine goal(s) and success metrics for program pilot.
    4.1 Develop pilot timelines and key milestones.
    4.2 Outline materials needed and possible messaging.
    4.3 Build the executive buy-in presentation.
    5.1 Complete in-progress deliverables from the previous four days. 6.1 Present to executive team and stakeholders.
    6.2 Gain executive buy-in and key stakeholder approval.
    6.3 Execute CA pilot.
    Deliverables
    1. Rationale for CA pilot; clear benefits, and how they apply to the organization.
    2. Documented barriers to success, risks, and risk mitigation tactics.
    1. CA Maturity Assessment results.
    2. Identification of gaps in current customer advocacy efforts and/or activities.
    1. Documented ideal advocate profile/target customer segment.
    2. Clear goal(s) and success metrics for CA pilot.
    1. Documented pilot timelines and key milestones.
    2. Draft/outlines of advocate materials.
    3. Draft executive presentation with business case for CA.
    1. Finalized implementation plan for CA pilot.
    2. Finalized executive presentation with business case for CA.
    1. Buy-in from decision makers and key stakeholders.

    Contact your account representative for more information.
    workshops@infotech.com
    1-888-670-8889

    Get started!

    Know your target market and audience, deploy well-designed strategies based on shared values, and make meaningful connections with people.

    Phase 1
    Build the Business Case

    Phase 2
    Develop Your Advocacy Requirements

    Phase 3
    Win Executive Approval and Implement Pilot

    Phase 1: Build the Business Case

    Steps
    1.1 Identify your key stakeholders, steering committee, and working team
    1.2 Understand the concepts and benefits of customer advocacy as they apply to your organization
    1.3 Outline barriers to success, risks, and risk mitigation tactics

    Phase Outcome

    • Common understanding of CA concepts and benefits
    • Buy-in from CEO and head of Sales
    • List of barriers to success, risks, and risk mitigation tactics

    Build the business case

    Step 1.1 Identify your key stakeholders, steering committee, and working team

    Total duration: 2.5-8.0 hours

    Objective
    Identify, document, and finalize your key stakeholders to know who to involve and how to get them onboard by truly understanding the forces of influence.

    Output

    • Robust stakeholder list with key stakeholders identified.
    • Steering committee and working team decided.

    Participants

    • Customer advocacy lead
    • Identified stakeholders
    • Workstream leads

    MarTech
    None

    Tools

    1.1.1 Identify Stakeholders
    (60-120 min.)

    Identify
    Using the guidance on slide 28, identify all stakeholders who would be involved or impacted by your customer advocacy pilot by entering names and titles into columns A and B on slide 27 "Stakeholder List Worksheet."

    Document
    Document as much information about each stakeholder as possible in columns C, D, E, and F into the table on slide 27.

    1.1.2 Select Steering Committee & Working Team
    (60-90 min.)

    Select
    Using the guidance on slides 28 and 29 and the information collected in the table on slide 27, identify the stakeholders that are steering committee members, functional workstream leads, or operations; document in column G on slide 27.

    Document
    Open the Executive Presentation Template to slides 5 and 6 and document your final steering committee and working team selections. Be sure to note the Executive Sponsor and Program Manager on slide 5.

    Tips & Reminders

    1. It is critical to identify "key stakeholders"; a single missed key stakeholder can disrupt an initiative. A good way to ensure that nobody is missed is to first uncover as many stakeholders as possible and later decide how important they are.
    2. Ensure steering committee representation from each department this initiative would impact or that may need to be involved in decision-making or problem-solving endeavors.

    Consult Info-Tech's Manage Stakeholder Relations blueprint for additional guidance on identifying and managing stakeholders, or contact one of our analysts for more personalized assistance and guidance.

    Stakeholder List Worksheet

    *Possible Roles
    Executive Sponsor
    Program Manager
    Workstream Lead
    Functional Lead
    Steering Committee
    Operations
    A B C D E F G
    Name Position Decision Involvement
    (Driver / Approver / Contributor / Informe
    Direct Benefit?
    (Yes / No)
    Motivation Concerns *Role in Customer Advocacy Pilot
    E.g. Jane Doe VP, Customer Success A N
    • Increase customer retention
    • Customer advocate burnout
    Workstream Lead

    Customer advocacy stakeholders

    What to consider when identifying stakeholders required for CA:
    Customer advocacy should be done as a part of a cross-functional company initiative. When identifying stakeholders, consider:

    • Who can make the ultimate decision on approving the CA program?
    • Who are the senior leadership members you need buy-in from?
    • Who do you need to support the CA program?
    • Who is affected by the CA program?
    • Who will help you build the CA program?
    • Where and among who is there enthusiasm for customer advocacy?
    • Consider stakeholders from Customer Success, Marketing, Sales, Product, PR & Social, etc.
    Key Roles Supporting an Effective Customer Advocacy Pilot
    Executive Sponsor
    • Owns the function at the management/C-suite level
    • Responsible for breaking down barriers and ensuring alignment with organizational strategy
    • CMO, VP of Marketing, and in SMB providers, the CEO
    Program Manager
    • Typically, a senior member of the marketing team
    • Responsible for organizing the customer advocacy pilot, preparing summary executive-level communications, and approval requests
    • Program manages the customer advocacy pilot, and in many cases, the continued formal program
    • Product Marketing Director, or other Marketing Director, who has strong program management skills, has run large-scale marketing or product programs, and is familiar with the stakeholder roles and enabling technologies
    Functional / Workstream Leads
    • Works alongside the Program Manager on planning and implementing the customer advocacy pilot and ensures functional workstreams are aligned with pilot objectives
    • Typical customer advocacy pilots will have a team comprised of representatives from Marketing, Sales, and Customer Success
    Steering Committee
    • Comprised of C-suite/management-level individuals that guide key decisions, approve requests, and mitigate any functional conflicts
    • Responsible for validating goals and priorities, enabling adequate resourcing, and critical decision making
    • CMO, CRO/Head of Sales, Head of Customer Success
    Operations
    • Comprised of individuals whose application and tech tools knowledge and skills support integration of customer advocacy functions into existing tech stack/CRM (e.g. adding custom fields into CRM)
    • Responsible for helping select technology that enables customer advocacy program activities
    • CRM, Marketing Applications, and Analytics Managers, IT Managers

    Customer advocacy working team

    Consider the skills and knowledge required for planning and executing a customer advocacy pilot.

    Workstream leads should have strong project management and collaboration skills and deep understanding of both product and customers (persona, journeys, satisfaction, etc.).

    Required Skills Suggested Functions
    • Project management
    • CRM knowledge
    • Marketing automation experience
    • MarTech knowledge
    • Understanding of buyer persona and journey
    • Product knowledge
    • Understanding of executive-level goals for the pilot
    • Content creation
    • Customer advocacy experience, if possible
    • Customer satisfaction
    • Email and event marketing experience
    • Customer Success
    • Marketing
    • Sales
    • Product
    • PR/Corporate Comms.

    Build the business case

    Step 1.2 Understand key concepts and benefits of customer advocacy

    Total duration: 2.0-4.0 hours

    Objective
    Understand customer advocacy and what benefits you seek from your customer advocacy program, and get set up to best communicate them to executives and decision makers.

    Output

    • Documented customer advocacy benefits

    Participants

    • Customer advocacy lead

    MarTech
    None

    Tools

    1.2.1 Discuss Key Concepts
    (60-120 min.)

    Envision
    Schedule a visioning session with key stakeholders and share the Get Started With Customer Advocacy Executive Brief (slides 3-23 in this deck).

    Discuss how key customer advocacy concepts can apply to your organization and how CA can contribute to organizational growth.

    Document
    Determine the top benefits sought from the customer advocacy program pilot and record them on slides 4 and 12 in the Executive Presentation Template.

    Finalize
    Work with the Executive Sponsor to finalize the "Message from the CMO" on slide 4 in the Executive Presentation Template.

    Tips & Reminders

    Keep in mind that while we're starting off broadly, the pilot for your customer advocacy program should be narrow and focused in scope.

    Build the business case

    Step 1.3 Understand barriers to success, risks, and risk mitigation tactics

    Total duration: 2.0-8.0 hours

    Objective
    Anticipate threats to pilot success; identify barriers to success, any possible risks, and what can be done to reduce the chances of a negative pilot outcome.

    Output

    • Awareness of barriers
    • Tactics to mitigate risk

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    1.3.1 Brainstorm Barriers to Success & Possible Risks
    (60-120 min.)

    Identify
    Using slide 7 of the Executive Presentation Template, brainstorm any barriers to success that may exist and risks to the customer advocacy program pilot success. Consider the people, processes, and technology that may be required.

    Document
    Document all information on slide 7 of the Executive Presentation Template.

    1.3.2 Develop Risk Mitigation Tactics
    (60-300 min.)

    Develop
    Brainstorm different ways to address any of the identified barriers to success and reduce any risks. Consider the people, processes, and technology that may be required.

    Document
    Document all risk mitigation tactics on slide 7 of the Executive Presentation Template.

    Tips & Reminders
    There are several types of risk to explore. Consider the following when brainstorming possible risks:

    • Damage to brand (if advocate guidance not provided)
    • Legal (compliance with regulations and laws around contact, incentives, etc.)
    • Advocate burnout
    • Negative advocate feedback

    Phase 2: Develop Your Advocacy Requirements

    Steps
    2.1 Assess your customer advocacy maturity
    2.2 Identify and document gaps and pain points
    2.3 Develop your ideal advocate profile

    Phase Outcome

    • Identification of gaps in current customer advocacy efforts or activities
    • Understanding of customer advocacy readiness and maturity
    • Identification of ideal advocate profile/target segment
    • Basic actions to bridge gaps in CA efforts

    Develop your advocacy requirements

    Step 2.1 Assess your customer advocacy maturity

    Total duration: 2.0-8.0 hours

    Objective
    Use the Customer Advocacy Maturity Assessment Tool to understand your organization's current level of customer advocacy maturity and what to prioritize in the program pilot.

    Output

    • Current level of customer advocacy maturity
    • Know areas to focus on in program pilot

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    2.1.1 Diagnose Current Customer Advocacy Maturity
    (60-120 min.)

    Diagnose
    Begin on tab 1 of the Customer Advocacy Maturity Assessment Tool and read all instructions.

    Navigate to tab 2. Considering the current state of customer advocacy efforts, answer the diagnostic questions in the Diagnostic tab of the Customer Advocacy Maturity Assessment Tool.

    After completing the questions, you will receive a diagnostic result on tab 3 that will identify areas of strength and weakness and make high-level recommendations for your customer advocacy program pilot.

    2.1.2 Discuss Results
    (60-300 min.)

    Discuss
    Schedule a call to discuss your customer advocacy maturity diagnostic results with a SoftwareReviews Advisor.

    Prioritize the recommendations from the diagnostic, noting which will be included in the program pilot and which require funding and resources to advance.

    Transfer
    Transfer results into slides 8 and 11 of the Executive Presentation Template.

    Tips & Reminders
    Complete the diagnostic with a handful of key stakeholders identified in the previous phase. This will help provide a more balanced and accurate assessment of your organization’s current level of customer advocacy maturity.

    Develop your advocacy requirements

    Step 2.2 Identify and document gaps and pain points

    Total duration: 2.5-8.0 hours

    Objective
    Understand the current pain points within key customer-related processes and within any current customer advocacy efforts taking place.

    Output

    • Prioritized list of pain points that could be addressed by a customer advocacy program.

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    2.2.1 Identify Pain Points
    (60-120 min.)

    Identify
    Identify and list current pain points being experienced around customer advocacy efforts and processes around sales, marketing, customer success, and product feedback.

    Add any gaps identified in the diagnostic to the list.

    Transfer
    Transfer key information into slide 9 of Executive Presentation Template.

    2.2.2 Prioritize Pain Points
    (60-300 min.)

    Prioritize
    Indicate which pains are the most important and that a customer advocacy program could help improve.

    Schedule a call to discuss the outputs of this step with a SoftwareReviews Advisor.

    Document
    Document priorities on slide 9 of Executive Presentation Template.

    Tips & Reminders

    Customer advocacy won't solve for everything; it's important to be clear about what pain points can and can't be addressed through a customer advocacy program.

    Develop your advocacy requirements

    Step 2.3 Develop your ideal advocate profile

    Total duration: 3.0-9.0 hours

    Objective
    Develop an ideal advocate persona profile that can be used to identify potential advocates, guide campaign messaging, and facilitate advocate engagement.

    Output

    • Ideal advocate persona profile

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    May require the use of:

    • CRM or marketing automation platform
    • Available and up-to-date customer database

    Tools

    2.3.1 Brainstorm Session Around Ideal Advocate Persona
    (60-150 min.)

    Brainstorm
    Lead the team to prioritize an initial, single, most important persona and to collaborate to complete the template.

    Choose your ideal advocate for the pilot based on your most important audience. Start with firmographics like company size, industry, and geography.

    Next, consider satisfaction levels and behavioral attributes, such as renewals, engagement, usage, and satisfaction scores.

    Identify motivations and possible incentives for advocate activities.

    Document
    Use slide 10 of the Executive Presentation Template to complete this exercise.

    2.3.2 Review and Refine Advocate Persona
    (60-300 min.)

    Review & Refine
    Place the Executive Presentation Template in a shared drive for team collaboration. Encourage the team to share persona knowledge within the shared drive version.

    Hold any necessary follow-up sessions to further refine persona.

    Validate
    Interview advocates that best represent your ideal advocate profile on their type of preferred involvement with your company, their role and needs when it comes to your solution, ways they'd be willing to advocate, and rewards sought.

    Confirm
    Incorporate feedback and inputs into slide 10 of the Executive Presentation Template. Ensure everyone agrees on persona developed.

    Tips & Reminders

    1. When identifying potential advocates, choose based on your most important audience.
    2. Ensure you're selecting those with the highest satisfaction scores.
    3. Ideally, select candidates that have, on their own, advocated previously such as in social posts, who may have acted as a reference, or who have been highly visible as a positive influence at customer events.
    4. Knowing motivations will determine the type of acts of advocacy they would be most willing to perform and the incentives for participating in the program.

    Consider the following criteria when identifying advocates and developing your ideal advocate persona:

    Demographics Firmographics Satisfaction & Needs/Value Sought Behavior Motivation
    Role - user, decision-maker, etc. Company size: # of employees Satisfaction score Purchase frequency & repeat purchases (renewals), upgrades Career building/promotion
    Department Company size: revenue NPS score Usage Collaboration with peers
    Geography CLV score Engagement (e.g. email opens, response, meetings) Educate others
    Industry Value delivered (outcomes, occasions used, etc.) Social media interaction, posts Influence (on product, service)
    Tenure as client Benefits sought
    Account size ($) Minimal and resolved service tickets, escalations
    1. When identifying potential advocates, choose based on your most important audience/segments. 2. Ensure you're selecting those with the highest satisfaction, NPS, and CLV scores. 3. When identifying potential advocates, choose based on high engagement and interaction, regular renewals, and high usage. 4. Knowing motivations will determine the type of acts of advocacy they would be most willing to perform and incentives for participating in the program.

    Phase 3: Win Executive Approval and Implement Pilot

    Steps
    3.1 Determine pilot goals and success metrics
    3.2 Establish timeline and create advocate communication materials
    3.3 Gain executive buy-in and implement pilot

    Phase Outcome

    • Clear objective for CA pilot
    • Key metrics for program success
    • Pilot timelines and milestones
    • Executive presentation with business case for CA

    Win executive approval and implement pilot

    Step 3.1 Determine pilot goals and success metrics

    Total duration: 2.0-4.0 hours

    Objective
    Set goals and determine the scope for the customer advocacy program pilot.

    Output

    • Documented business objectives for the pilot
    • Documented success metrics

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    May require to use, set up, or install platforms like:

    • Register to a survey platform
    • CRM or marketing automation platform

    Tools

    3.1.1 Establish Pilot Goals
    (60-120 min.)

    Set
    Organize a meeting with department heads and review organizational and individual department goals.

    Using the Venn diagram on slide 39 in this deck, identify customer advocacy goals that align with business goals. Select the highest priority goal for the pilot.

    Check that the goal aligns with benefits sought or addresses pain points identified in the previous phase.

    Document
    Document the goals on slides 9 and 16 of the Executive Presentation Template.

    3.1.2 Establish Pilot Success Metrics
    (60-120 min.)

    Decide
    Decide how you will measure the success of your program pilot using slide 40 in this document.

    Document
    Document metrics on slide 16 of the Executive Presentation Template.

    Tips & Reminders

    1. Don't boil the ocean. Pick the most important goal that can be achieved through the customer advocacy pilot to gain executive buy-in and support or resources for a formal customer advocacy program. Once successfully completed, you'll be able to tackle new goals and expand the program.
    2. Keep your metrics simple, few in number, and relatively easy to track

    Connect customer advocacy goals with organizational goals

    List possible customer advocacy goals, identifying areas of overlap with organizational goals by taking the following steps:

    1. List organizational/departmental goals in the green oval.
    2. List possible customer advocacy program goals in the purple oval.
    3. Enter goals that are covered in both the Organizational Goals and Customer Advocacy Goals sections into the Shared Goals section in the center.
    4. Highlight the highest priority goal for the customer advocacy program pilot to tackle.
    Organizational Goals Shared Goals Customer Advocacy Goals
    Example Example: Gain customer references to help advance sales and improve win rates Example: Develop pool of customer references
    [insert goal] [insert goal] Example: Gather customer feedback
    [insert goal] [insert goal] [insert goal]
    [insert goal] [insert goal] [insert goal]

    Customer advocacy success metrics for consideration

    This table provides a starting point for measuring the success of your customer advocacy pilot depending on the goals you've set.

    This list is by no means exhaustive; the metrics here can be used, or new metrics that would better capture success measurement can be created and tracked.

    Metric
    Revenue influenced by reference calls ($ / % increase)
    # of reference calls resulting in closed-won opportunities
    # of quotes collected
    % of community growth YoY
    # of pieces of product feedback collected
    # of acts of advocacy
    % membership growth
    % product usage amongst community members
    # of social shares, clicks
    CSAT score for community members
    % of registered qualified leads
    # of leads registered
    # of member sign-ups
    # of net-new referenceable customers
    % growth rate of products used by members
    % engagement rate
    # of published third-party reviews
    % increase in fulfilled RFPs

    When selecting metrics, remember:
    When choosing metrics for your customer advocacy pilot, be sure to align them to your specific goals. If possible, try to connect your advocacy efforts back to retention, growth, or revenue.

    Do not choose too many metrics; one per goal should suffice.

    Ensure that you can track the metrics you select to measure - the data is available and measuring won't be overly manual or time-consuming.

    Win executive approval and implement pilot

    Step 3.2 Establish timeline and create advocate communication materials

    Total duration: 2.5-8.0 hours

    Objective
    Outline who will be involved in what roles and capacities and what tasks and activities need to completed.

    Output

    • Timeline and milestones
    • Advocate program materials

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    None

    Tools

    3.2.1 Establish Timeline & Milestones
    (30-60 min.)

    List & Assign
    List all key tasks, phases, and milestones on slides 13, 14, and 15 in the Executive Presentation Template.

    Include any activities that help close gaps or address pain points from slide 9 in the Executive Presentation Template.

    Assign workstream leads on slide 15 in the Executive Presentation Template.

    Finalize all tasks and activities with working team.

    3.2.2 Design & Build Advocate Program Materials
    (180-300 min.)

    Decide
    Determine materials needed to recruit advocates and explain the program to advocate candidates.

    Determine the types of acts of advocacy you are looking for.

    Determine incentives/rewards that will be provided to advocates, such as access to new products or services.

    Build
    Build out all communication materials.

    Obtain incentives.

    Tips & Reminders

    1. When determining incentives, use the validated ideal advocate profile for guidance (i.e. what motivates your advocates?).
    2. Ensure to leave a buffer in the timeline if the need to adjust course arises.

    Win executive approval and implement pilot

    Step 3.3 Implement pilot and gain executive buy-in

    Total duration: 2.5-8.0 hours

    Objective
    Successfully implement the customer advocacy pilot program and communicate results to gain approval for full-fledged program.

    Output

    • Deliver Executive Presentation
    • Successful customer advocacy pilot
    • Provide regular updates to stakeholders, executives

    Participants

    • Customer advocacy lead
    • Workstream leads

    MarTech
    May require the use of:

    • CRM or Marketing Automation Platform
    • Available and up-to-date customer database

    Tools

    3.3.1 Complete & Deliver Executive Presentation
    (60-120 min.)

    Present
    Finalize the Executive Presentation.

    Hold stakeholder meeting and introduce the program pilot.

    3.3.2 Gain Executive Buy-in
    (60-300 min.)

    Pitch
    Present the final results of the customer advocacy pilot using the Executive Presentation Template and gain approval.

    3.3.3 Implement the Customer Advocacy Program Pilot
    (30-60 min.)

    Launch
    Launch the customer advocacy program pilot. Follow the timelines and activities outlined in the Executive Presentation Template. Track/document all advocate outreach, activity, and progress against success metrics.

    Communicate
    Establish a regular cadence to communicate with steering committee, stakeholders. Use the Executive Presentation Template to present progress and resolve roadblocks if/as they arise.

    Tips & Reminders

    1. Continually collect feedback and input from advocates and stakeholders throughout the process.
    2. Don't be afraid to make changes on the go if it helps to achieve the end goal of your pilot.
    3. If the pilot program was successful, consider scaling it up and rolling it out to more customers.

    Summary of Accomplishment

    Mission Accomplished

    • You successfully launched your customer advocacy program pilot and demonstrated clear benefits and ROI. By identifying the needs of the business and aligning those needs with key customer advocacy activities, marketers and customer advocacy leaders can prioritize the most important tasks for the pilot while also identifying potential opportunities for expansion pending executive approval.
    • SoftwareReviews' comprehensive and tactical approach takes you through the steps to build the foundation for a strategic customer advocacy program. Our methodology ensures that a customer advocacy pilot is developed to deliver the desired outcomes and ROI, increasing stakeholder buy-in and setting up your organization for customer advocacy success.

    If you would like additional support, contact us and we'll make sure you get the professional expertise you need.

    Contact your account representative for more information.
    info@softwarereviews.com
    1-888-670-8889

    Related SoftwareReviews Research

    Measure and Manage the Customer Satisfaction Metrics That Matter the Most
    Understand what truly keeps your customer satisfied. Measure what matters to improve customer experience and increase satisfaction and advocacy.

    • Understand the true drivers of satisfaction and dissatisfaction among your customer segments.
    • Establish process and cadence for effective satisfaction measurement and monitoring.
    • Know where resources are needed most to improve satisfaction levels and increase retention.

    Develop the Right Message to Engage Buyers
    Sixty percent of marketers find it hard to produce high-quality content consistently. SaaS marketers have an even more difficult job due to the technical nature of content production.

    • Create more compelling and relevant content that aligns with a buyer's needs and journey.
    • Shrink marketing and sales cycles.
    • Increase the pace of content production.

    Create a Buyer Persona and Journey
    Get deeper buyer understanding and achieve product-market fit, with easier access to market and sales.

    • Reduce time and resources wasted chasing the wrong prospects.
    • Increase open and click-through rates.
    • Perform more effective sales discovery.
    • Increase win rate.

    Bibliography

    "15 Award-Winning Customer Advocacy Success Stories." Influitive, 2021. Accessed 8 June 2023.

    "Advocacy Marketing." Influitive, June 2016. Accessed 26 Oct. 2021.

    Andrews, Marcus. "42% of Companies Don’t Listen to their Customers. Yikes." HubSpot, June 2019. Accessed 2 Nov. 2021.

    "Before you leap! Webcast." Point of Reference, Sept. 2019. Accessed 4 Nov. 2021.

    "Brand Loyalty: 5 Interesting Statistics." Factory360, Jan. 2016. Accessed 2 Nov. 2021.

    Brenner, Michael. "The Data Driven Guide to Customer Advocacy." Marketing Insider Group, Sept. 2021. Accessed 3 Feb. 2022.

    Carroll, Brian. "Why Customer Advocacy Should Be at the Heart of Your Marketing." Marketing Insider Group, Sept. 2017. Accessed 3 Feb. 2022.

    Cote, Dan. "Advocacy Blooms and Business Booms When Customers and Employees Engage." Influitive, Dec. 2021. Accessed 3 Feb. 2022.

    "Customer Success Strategy Guide." ON24, Jan. 2021. Accessed 2 Nov. 2021.

    Dalao, Kat. "Customer Advocacy: The Revenue-Driving Secret Weapon." ReferralRock, June 2017. Accessed 7 Dec. 2021.

    Frichou, Flora. "Your guide to customer advocacy: What is it, and why is it important?" TrustPilot, Jan. 2020. Accessed 26 Oct. 2021.

    Gallo, Amy. "The Value of Keeping the Right Customers." Harvard Business Review, Oct. 2014. Accessed 10 March 2022.

    Huhn, Jessica. "61 B2B Referral Marketing Statistics and Quotes." ReferralRock, March 2022. Accessed 10 March 2022.

    Kemper, Grayson. "B2B Buying Process: How Businesses Purchase B2B Services and Software." Clutch, Feb. 2020. Accessed 6 Jan. 2022.

    Kettner, Kyle. "The Evolution of Ambassador Marketing." BrandChamp.io, Oct. 2018. Accessed 2 Nov. 2021.

    Landis, Taylor. "Customer Retention Marketing vs. Customer Acquisition Marketing." OutboundEngine, April 2022. Accessed 23 April 2022.

    Miels, Emily. "What is customer advocacy? Definition and strategies." Zendesk Blog, June 2021. Accessed 27 Oct. 2021.

    Mohammad, Qasim. "The 5 Biggest Obstacles to Implementing a Successful B2B Customer Advocacy Program." HubSpot, June 2018. Accessed 6 Jan. 2022.

    Murphy, Brandon. "Brand Advocacy and Social Media - 2009 GMA Conference." Deloitte, Dec. 2009. Accessed 8 June 2023.

    Patel, Neil. "Why SaaS Brand Advocacy is More Important than Ever in 2021." Neil Patel, Feb. 2021. Accessed 4 Nov. 2021.

    Pieri, Carl. "The Plain-English Guide to Customer Advocacy." HubSpot, Apr. 2020. Accessed 27 Oct. 2021.

    Schmitt, Philipp; Skiera, Bernd; Van den Bulte, Christophe. "Referral Programs and Customer Value." Wharton Journal of Marketing, Jan. 2011. Accessed 8 June 2023.

    "The Complete Guide to Customer Advocacy." Gray Group International, 2020. Accessed 15 Oct. 2021.

    "The Customer-powered Enterprise: Playbook." Influitive, Gainsight & Pendo. 2020. Accessed 26 Oct. 2021.

    "The Winning Case for a Customer Advocacy Solution." RO Innovation, 2017. Accessed 26 Oct. 2021.

    Tidey, Will. "Acquisition vs. Retention: The Importance of Customer Lifetime Value." Huify, Feb. 2018. Accessed 10 Mar. 2022.

    "What a Brand Advocate Is and Why Your Company Needs One." RockContent, Jan. 2021. Accessed 7 Feb. 2022.

    "What is Customer Advocacy? A Definition and Strategies to Implement It." Testimonial Hero, Oct. 2021. Accessed 26 Jan. 2022.

    Develop a Business Continuity Plan

    • Buy Link or Shortcode: {j2store}411|cart{/j2store}
    • member rating overall impact: 9.1/10 Overall Impact
    • member rating average dollars saved: $37,093 Average $ Saved
    • member rating average days saved: 30 Average Days Saved
    • Parent Category Name: DR and Business Continuity
    • Parent Category Link: /business-continuity
    • Recent crises have increased executive awareness and internal pressure to create a business continuity plan (BCP).
    • Industry and government-driven regulations require evidence of sound business continuity practices.
    • Customers demand their vendors provide evidence of a workable BCP prior to signing a contract.
    • IT leaders, because of their cross-functional view and experience with incident management and DR, are often asked to lead BCP efforts.

    Our Advice

    Critical Insight

    • BCP requires input from multiple departments with different and sometimes conflicting objectives. There are typically few, if any, dedicated resources for BCP, so it can't be a full-time, resource-intensive project.
    • As an IT leader you have the skill set and organizational knowledge to lead a BCP project, but ultimately business leaders need to own the BCP – they know their processes, and therefore, their requirements to resume business operations better than anyone else.
    • The traditional approach to BCP is a massive project that most organizations can’t execute without hiring a consultant. To execute BCP in-house, carve up the task into manageable pieces as outlined in this blueprint.

    Impact and Result

    • Implement a structured and repeatable process that you apply to one business unit at a time to keep BCP planning efforts manageable.
    • Use the results of the pilot to identify gaps in your recovery plans and reduce overall continuity risk while continuing to assess specific risks as you repeat the process with additional business units.
    • Enable business leaders to own the BCP going forward. Develop a template that the rest of the organization can use.
    • Leverage BCP outcomes to refine IT DRP recovery objectives and achieve DRP-BCP alignment.

    Develop a Business Continuity Plan Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop a business continuity plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify BCP maturity and document process dependencies

    Assess current maturity, establish a team, and choose a pilot business unit. Identify business processes, dependencies, and alternatives.

    • BCP Maturity Scorecard
    • BCP Pilot Project Charter Template
    • BCP Business Process Workflows Example (Visio)
    • BCP Business Process Workflows Example (PDF)

    2. Conduct a BIA to determine acceptable RTOs and RPOs

    Define an objective impact scoring scale, estimate the impact of downtime, and set recovery targets.

    • BCP Business Impact Analysis Tool

    3. Document the recovery workflow and projects to close gaps

    Build a workflow of the current steps for business recovery. Identify gaps and risks to recovery. Brainstorm and prioritize solutions to address gaps and mitigate risks.

    • BCP Tabletop Planning Template (Visio)
    • BCP Tabletop Planning Template (PDF)
    • BCP Project Roadmap Tool
    • BCP Relocation Checklists

    4. Extend the results of the pilot BCP and implement governance

    Present pilot project results and next steps. Create BCMS teams. Update and maintain BCMS documentation.

    • BCP Pilot Results Presentation
    • BCP Summary
    • Business Continuity Teams and Roles Tool

    5. Appendix: Additional BCP tools and templates

    Use these tools and templates to assist in the creation of your BCP.

    • BCP Recovery Workflow Example (Visio)
    • BCP Recovery Workflow Example (PDF)
    • BCP Notification, Assessment, and Disaster Declaration Plan
    • BCP Business Process Workarounds and Recovery Checklists
    • Business Continuity Management Policy
    • Business Unit BCP Prioritization Tool
    • Industry-Specific BIA Guidelines
    • BCP-DRP Maintenance Checklist
    • Develop a COVID-19 Pandemic Response Plan Storyboard
    [infographic]

    Workshop: Develop a Business Continuity Plan

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define BCP Scope, Objectives, and Stakeholders

    The Purpose

    Define BCP scope, objectives, and stakeholders.

    Key Benefits Achieved

    Prioritize BCP efforts and level-set scope with key stakeholders.

    Activities

    1.1 Assess current BCP maturity.

    1.2 Identify key business processes to include in scope.

    1.3 Flowchart key business processes to identify business processes, dependencies, and alternatives.

    Outputs

    BCP Maturity Scorecard: measure progress and identify gaps.

    Business process flowcharts: review, optimize, and allow for knowledge transfer of processes.

    Identify workarounds for common disruptions to day-to-day continuity.

    2 Define RTOs and RPOs Based on Your BIA

    The Purpose

    Define RTOs and RPOs based on your BIA.

    Key Benefits Achieved

    Set recovery targets based business impact, and illustrate the importance of BCP efforts via the impact of downtime.

    Activities

    2.1 Define an objective scoring scale to indicate different levels of impact.

    2.2 Estimate the impact of downtime.

    2.3 Determine acceptable RTO/RPO targets for business processes based on business impact.

    Outputs

    BCP Business Impact Analysis: objective scoring scale to assess cost, goodwill, compliance, and safety impacts.

    Apply the scoring scale to estimate the impact of downtime on business processes.

    Acceptable RTOs/RPOs to dictate recovery strategy.

    3 Create a Recovery Workflow

    The Purpose

    Create a recovery workflow.

    Key Benefits Achieved

    Build an actionable, high-level, recovery workflow that can be adapted to a variety of different scenarios.

    Activities

    3.1 Conduct a tabletop exercise to determine current recovery procedures.

    3.2 Identify and prioritize projects to close gaps and mitigate recovery risks.

    3.3 Evaluate options for command centers and alternate business locations (i.e. BC site).

    Outputs

    Recovery flow diagram – current and future state

    Identify gaps and recovery risks.

    Create a project roadmap to close gaps.

    Evaluate requirements for alternate business sites.

    4 Extend the Results of the Pilot BCP and Implement Governance

    The Purpose

    Extend the results of the pilot BCP and implement governance.

    Key Benefits Achieved

    Outline the actions required for the rest of your BCMS, and the required effort to complete those actions, based on the results of the pilot.

    Activities

    4.1 Summarize the accomplishments and required next steps to create an overall BCP.

    4.2 Identify required BCM roles.

    4.3 Create a plan to update and maintain your overall BCP.

    Outputs

    Pilot BCP Executive Presentation

    Business Continuity Team Roles & Responsibilities

    3. Maintenance plan and BCP templates to complete the relevant documentation (BC Policy, BCP Action Items, Recovery Workflow, etc.)

    Further reading

    Develop a Business Continuity Plan

    Streamline the traditional approach to make BCP development manageable and repeatable.

    Analyst Perspective

    A BCP touches every aspect of your organization, making it potentially the most complex project you’ll take on. Streamline this effort or you won’t get far.

    None of us needs to look very far to find a reason to have an effective business continuity plan.

    From pandemics to natural disasters to supply chain disruptions to IT outages, there’s no shortage of events that can disrupt your complex and interconnected business processes. How in the world can anyone build a plan to address all these threats?

    Don’t try to boil the ocean. Use these tactics to streamline your BCP project and stay on track:

    • Focus on one business unit at a time. Keep the effort manageable, establish a repeatable process, and produce deliverables that provide a starting point for the rest of the organization.
    • Don’t start with an extensive risk analysis. It takes too long and at the end you’ll still need a plan to resume business operations following a disruption. Rather than trying to predict what could cause a disruption, focus on how to recover.
    • Keep your BCP documentation concise. Use flowcharts, checklists, and diagrams instead of traditional manuals.

    No one can predict every possible disruption, but by following the guidance in this blueprint, you can build a flexible continuity plan that allows you to withstand the threats your organization may face.

    Frank Trovato

    Research Director,
    IT Infrastructure & Operations Practice
    Info-Tech Research Group

    Andrew Sharp

    Senior Research Analyst,
    IT Infrastructure & Operations Practice
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Recent crises have increased executive awareness and internal pressure to create a BCP.
    • Industry- and government-driven regulations require evidence of sound business continuity practices.
    • Customers demand their vendors provide evidence of a workable BCP prior to signing a contract.

    IT leaders, because of their cross-functional view and experience with incident management and DR, are often asked to lead BCP efforts.

    Common Obstacles

    • IT managers asked to lead BCP efforts are dealing with processes and requirements beyond IT and outside of their control.
    • BCP requires input from multiple departments with different and sometimes conflicting objectives.
    • Typically there are few, if any, dedicated resources for BCP, so it can't be a full-time, resource-intensive project.

    Info-Tech’s Approach

    • Focus on implementing a structured and repeatable process that can be applied to one business unit at a time to avoid BCP from becoming an overwhelming project.
    • Enable business leaders to own the BCP going forward by establishing a template that the rest of the organization can follow.
    • Leverage BCP outcomes to refine IT DRP recovery objectives and achieve DRP-BCP alignment.

    Info-Tech Insight

    As an IT leader you have the skill set and organizational knowledge to lead a BCP project, but you must enable business leaders to own their department’s BCP practices and outputs. They know their processes and, therefore, their requirements to resume business operations better than anyone else.

    Use this research to create business unit BCPs and structure your overall BCP

    A business continuity plan (BCP) consists of separate but related sub-plans, as illustrated below. This blueprint enables you to:

    • Develop a BCP for a selected business unit (as a pilot project), and thereby establish a methodology that can be repeated for remaining business units.
    • Through the BCP process, clarify requirements for an IT disaster recovery plan (DRP). Refer to Info-Tech’s Disaster Recovery Planning workshop for instructions on how to create an IT DRP.
    • Implement ongoing business continuity management to govern BCP, DRP, and crisis management.

    Overall Business Continuity Plan

    IT Disaster Recovery Plan

    A plan to restore IT application and infrastructure services following a disruption.

    Info-Tech’s disaster recovery planning blueprint provides a methodology for creating the IT DRP. Leverage this blueprint to validate and provide inputs for your IT DRP.

    BCP for Each Business Unit

    A set of plans to resume business processes for each business unit. This includes:

    • Identifying business processes and dependencies.
    • Defining an acceptable recovery timeline based on a business impact analysis.
    • Creating a step-by-step recovery workflow.

    Crisis Management Plan

    A plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage.

    Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage.

    IT leaders asked to develop a BCP should start with an IT Disaster Recovery Plan

    It’s a business continuity plan. Why should you start continuity planning with IT?

    1. IT services are a critical dependency for most business processes. Creating an IT DRP helps you mitigate a key risk to continuity quicker than it takes to complete your overall BCP, and you can then focus on other dependencies such as people, facilities, and suppliers.
    2. A BCP requires workarounds for IT failures. But it’s difficult to plan workarounds without a clear understanding of the potential IT downtime and data loss. Your DRP will answer those questions, and without a DRP, BCP discussions can get bogged down in IT discussions. Think of payroll as an example: if downtime might be 24 hours, the business might simply wait for recovery; if downtime might be a week, waiting it out is not an option.
    3. As an IT manager, you can develop an IT DRP primarily with resources within your control. That makes it an easier starting point and puts IT in a better position to shift responsibility for BCP to business leaders (where it should reside) since essentially the IT portion is done.

    Create a Right-Sized Disaster Recovery Plan today.

    Modernize the BCP

    If your BCP relies heavily on paper-based processes as workarounds, it’s time to update your plan.

    Back when transactions were recorded on paper and then keyed into the mainframe system later, it was easier to revert to deskside processes. There is very little in the way of paper-based processes anymore, and as a result, it is increasingly difficult to resume business processes without IT.

    Think about your own organization. What IT system(s) are absolutely critical to business operations? While you might be able to continue doing business without IT, this requires regular preparation and training. It’s likely a completely offline process and won’t be a viable workaround for long even if staff know how to do the work. If your data center and core systems are down, technology-enabled workarounds (such as collaboration via mobile technologies or cloud-based solutions) could help you weather the outage, and may be more flexible and adaptable for day-to-day work.

    The bottom line:

    Technology is a critical dependency for business processes. Consider the role IT systems play as process dependencies and as workarounds as part of continuity planning.

    Info-Tech’s approach

    The traditional approach to BCP takes too long and produces a plan that is difficult to use and maintain.

    The Problem: You need to create a BCP, but don’t know where to start.

    • BCP is being demanded more and more to comply with regulations, mitigate business risk, meet customer demands, and obtain insurance.
    • IT leaders are often asked to lead BCP.

    The Complication: A traditional BCP process takes longer to show value.

    • Traditional consultants don’t usually have an incentive to accelerate the process.
    • At the same time, self-directed projects with no defined process go months without producing useful deliverables.
    • The result is a dense manual that checks boxes but isn’t maintainable or usable in a crisis.

    A pie chart is separated into three segments, Internal Mandates 43%, Customer Demands 23%, and Regulatory Requirements 34%. The bottom of the image reads Source: Info-Tech Research Group.

    The Info-Tech difference:

    Use Info-Tech’s methodology to right-size and streamline the process.

    • Reduce required effort. Keep the work manageable and maintain momentum by focusing on one business unit at a time; allow that unit to own their BCP.
    • Prioritize your effort. Evaluate the current state of your BCP to identify the steps that are most in need of attention.
    • Get valuable results faster. Functional deliverables and insights from the first business unit’s BCP can be leveraged by the entire organization (e.g. communication, assessment, and BC site strategies).

    Expedite BCP development

    Info-Tech’s Approach to BCP:

    • Start with one critical business unit to manage scope, establish a repeatable process, and generate deliverables that become a template for remaining business units.
    • Resolve critical gaps as you identify them, generating early value and risk mitigation.
    • Create concise, practical documentation to support recovery.

    Embed training and awareness throughout the planning process.

    BCP for Business Unit A:

    Scope → Pilot BIA → Response Plan → Gap Analysis

    → Lessons Learned:

    • Leverage early results to establish a BCM framework.
    • Take action to resolve critical gaps as they are identified.
    • BCP for Business Units B through N.
    • Scope→BIA→Response Plan→Gap Analysis

    = Ongoing governance, testing, maintenance, improvement, awareness, and training.

    By comparison, a traditional BCP approach takes much longer to mitigate risk:

    • An extensive, upfront commitment of time and resources before defining incident response plans and mitigating risk.
    • A “big bang” approach that makes it difficult to predict the required resourcing and timelines for the project.

    Organizational Risk Assessment and Business Impact Analysis → Solution Design to Achieve Recovery Objectives → Create and Validate Response Plans

    Case Study

    Continuity Planning Supports COVID-19 Response

    Industry: Non-Profit
    Source: Info-Tech Advisory Services

    A charitable foundation for a major state university engaged Info-Tech to support the creation of their business continuity plan.

    With support from Info-Tech analysts and the tools in this blueprint, they worked with their business unit stakeholders to identify recovery objectives, confirm recovery capabilities and business process workarounds, and address gaps in their continuity plans.

    Results

    The outcome wasn’t a pandemic plan – it was a continuity plan that was applicable to pandemics. And it worked. Business processes were prioritized, gaps in work-from-home and business process workarounds had been identified and addressed, business leaders owned their plan and understood their role in it, and IT had clear requirements that they were able and ready to support.

    “The work you did here with us was beyond valuable! I wish I could actually explain how ready we really were for this…while not necessarily for a pandemic, we were ready to spring into action, set things up, the priorities were established, and most importantly some of the changes we’ve made over the past few years helped beyond words! The fact that the groups had talked about this previously almost made what we had to do easy.“ -- VP IT Infrastructure

    Download the BCP Case Study

    Project Overview: BCP

    Phases Phase 1: Identify BCP Maturity and Document Process Dependencies Phase 2: Conduct a BIA to Determine Acceptable RTOs and RPOs Phase 3: Document the Recovery Workflow and Projects to Close Gaps Phase 4: Extend the Results of the Pilot BCP and Implement Governance
    Steps 1.1 Assess current BCP maturity 2.1 Define an objective impact scoring scale 3.1 Determine current recovery procedures 4.1 Consolidate BCP pilot insights to support an overall BCP project plan
    1.2 Establish the pilot BCP team 2.2 Estimate the impact of downtime 3.2 Identify and prioritize projects to close gaps 4.2 Outline a business continuity management (BCM) program
    1.3 Identify business processes, dependencies, and alternatives 2.3 Determine acceptable RTO/RPO targets 3.3 Evaluate BC site and command center options 4.3 Test and maintain your BCP
    Tools and Templates

    BCP Business Impact Analysis Tool

    Results Presentation

    BCP Maturity Scorecard

    Tabletop Planning Template

    BCP Summary

    Pilot Project Charter

    Recovery Workflow Examples

    Business Continuity Teams and Roles

    Business Process Workflows Examples

    BCP Project Roadmap

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    BCP Business Impact Analysis Tool: Conduct and document a business impact analysis using this document.

    BCP Recovery Workflows Example: Model your own recovery workflows on this example.

    BCP Project Roadmap: Use this tool to prioritize projects that can improve BCP capabilities and mitigate gaps and risks.

    BCP Relocation Checklists: Plan for and manage a site relocation – whether to an alternate site or work from home.

    Key deliverable:

    BCP Summary Document

    Summarize your organization's continuity capabilities and objectives in a 15-page, easy-to-consume template.

    This document consolidates data from the supporting documentation and tools to the right.

    Download Info-Tech’s BCP Summary Document

    Insight summary

    Focus less on risk, and more on recovery

    Avoid focusing on risk and probability analysis to drive your continuity strategy. You never know what might disrupt your business, so develop a flexible plan to enable business resumption regardless of the event.

    Small teams = good pilots

    Choose a small team for your BCP pilot. Small teams are better at trialing new techniques and finding new ways to think about problems.

    Calculate downtime impact

    Develop and apply a scoring scale to develop a more-objective assessment of downtime impact for the organization. This will help you prioritize recovery.

    It’s not no, but rather not now…

    You can’t address all the organization’s continuity challenges at once. Prioritize high value, low effort initiatives and create a long-term roadmap for the rest.

    Show Value Now

    Get to value quickly. Start with one business unit with continuity challenges, and a small, focused project team who can rapidly learn the methodology, identify continuity gaps, and define solutions that can also be leveraged by other departments right away.

    Lightweight Testing Exercises

    Outline recovery capabilities using lightweight, low risk tabletop planning exercises. Our research shows tabletop exercises increase confidence in recovery capabilities almost as much as live exercises, which carry much higher costs and risks.

    Blueprint benefits

    Demonstrate compliance with demands from regulators and customers

    • Develop a plan that satisfies auditors, customers, and insurance providers who demand proof of a continuity plan.
    • Demonstrate commitment to resilience by identifying gaps in current capabilities and projects to overcome those gaps.
    • Empower business users to develop their plans and perform regular maintenance to ensure plans don’t go stale.
    • Establish a culture of business readiness and resilience.

    Leverage your BCP to drive value (Business Benefits)

    • Enable flexible, mobile, and adaptable business operations that can overcome disruptions large and small. This includes making it easier to work remotely in response to pandemics or facility disruptions.
    • Clarify the risk of the status quo to business leaders so they can make informed decisions on where to invest in business continuity.
    • Demonstrate to customers your ability to overcome disruptions and continue to deliver your services.

    Info-Tech Advisory Services lead to Measurable Value

    Info-Tech members told us they save an average of $44,522 and 23 days by working with an Info-Tech analyst on BCP (source: client response data from Info-Tech's Measured Value Survey).

    Why do members report value from analyst engagement?

    1. Expert advice on your specific situation to overcome obstacles and speed bumps.
    2. Structure the project and stay on track.
    3. Review project deliverables and ensure the process is applied properly.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostic and consistent frameworks are used throughout all four options.

    Guided Implementation

    Your Trusted Advisor is a call away.

    A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between eight to twelve calls over the course of four to six months.

    Scoping

    Call 1: Scope requirements, objectives, and stakeholders. Identify a pilot BCP project.

    Business Processes and Dependencies

    Calls 2 - 4: Assess current BCP maturity. Create business process workflows, dependencies, alternates, and workarounds.

    Conduct a BIA

    Calls 5 – 7: Create an impact scoring scale and conduct a BIA. Identify acceptable RTO and RPO.

    Recovery Workflow

    Calls 8 – 9: Create a recovery workflow based on tabletop planning.

    Documentation & BCP Framework

    Call 10: Summarize the pilot results and plan next steps. Define roles and responsibilities. Make the case for a wider BCP program.

    Workshop Overview

    Contact your account representative for more information.

    workshops@infotech.com | 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5
    Identify BCP Maturity, Key Processes, and Dependencies Conduct a BIA to Determine Acceptable RTOs and RPOs Document the Current Recovery Workflow and Projects to Close Gaps Identify Remaining BCP Documentation and Next Steps Next Steps and Wrap-Up (offsite)
    Activities

    1.1 Assess current BCP maturity.

    1.2 Identify key business processes to include in scope.

    1.3 Create a flowchart for key business processes to identify business processes, dependencies, and alternatives.

    2.1 Define an objective scoring scale to indicate different levels of impact.

    2.2 Estimate the impact of a business disruption on cost, goodwill, compliance, and health & safety.

    2.3 Determine acceptable RTOs/RPOs for selected business processes based on business impact.

    3.1 Review tabletop planning – what is it, how is it done?

    3.2 Walk through a business disruption scenario to determine your current recovery timeline, RTO/RPO gaps, and risks to your ability to resume business operations.

    3.3 Identify and prioritize projects to close RTO/RPO gaps and mitigate recovery risks.

    4.1 Assign business continuity management (BCM) roles to govern BCP development and maintenance, as well as roles required to execute recovery.

    4.2 Identify remaining documentation required for the pilot business unit and how to leverage the results to repeat the methodology for remaining business units.

    4.3 Workshop review and wrap-up.

    5.1 Finalize deliverables for the workshop.

    5.2 Set up review time for workshop outputs and to discuss next steps.

    Deliverables
    1. Baseline BCP maturity status
    2. Business process flowcharts
    3. Business process dependencies and alternatives recorded in the BIA tool
    1. Potential impact of a business disruption quantified for selected business processes.
    2. Business processes criticality and recovery priority defined
    3. Acceptable RTOs/RPOs defined based on business impact
    1. Current-state recovery workflow and timeline.
    2. RTO/RPO gaps identified.
    3. BCP project roadmap to close gaps
    1. BCM roles and responsibilities defined
    2. Workshop results deck; use this to communicate pilot results and next steps
    1. Finalized deliverables

    Phase 1

    Identify BCP Maturity and Document Process Dependencies

    Phase 1

    1.1 Assess Current BCP Maturity

    1.2 Establish the pilot BCP team

    1.3 Identify business processes, dependencies, and alternatives

    Insights & Outcomes

    Define the scope for the BCP project: assess the current state of the plan, create a pilot project team and pilot project charter, and map the business processes that will be the focus of the pilot.

    Participants

    • BCP Coordinator
    • BCP Executive Sponsor
    • Pilot Business Unit Manager & Process SMEs

    Step 1.1

    Assess current BCP Maturity

    This step will walk you through the following activities:

    • Complete Info-Tech’s BCP Maturity Scorecard

    This step involves the following participants:

    • Executive Sponsor
    • BCP Coordinator

    You'll use the following tools & templates:

    Outcomes & Insights

    Establish current BCP maturity using Info-Tech’s ISO 22301-aligned BCP Maturity Scorecard.

    Evaluate the current state of your continuity plan

    Use Info-Tech’s Maturity Scorecard to structure and accelerate a BCP maturity assessment.

    Conduct a maturity assessment to:

    • Create a baseline metric so you can measure progress over time. This metric can also drive buy-in from senior management to invest time and effort into your BCP.
    • Understand the scope of work to create a complete business continuity plan.
    • Measure your progress and remaining gaps by updating your assessment once you’ve completed the activities in this blueprint.

    This blueprint primarily addresses the first four sections in the scorecard, which align with the creation of the core components of your business continuity plan.

    Info-Tech’s BCP Maturity Scorecard

    Info-Tech’s maturity scorecard is aligned with ISO 22301, the international standard that describes the key elements of a functioning business continuity management system or program – the overarching set of documents, practices, and controls that support the ongoing creation and maintenance of your BCP. A fully functional BCMS goes beyond business continuity planning to include crisis management, BCP testing, and documentation management.

    Audit tools tend to treat every bullet point in ISO 22301 as a separate requirement – which means there’s almost 400 lines to assess. Info-Tech’s BCP Maturity Scorecard has synthesized key requirements, minimizing repetition to create a high-level self-assessment aligned with the standard.

    A high score is a good indicator of likely success with an audit.

    Download Info-Tech's BCP Maturity Scorecard

    Tool: BCP Maturity Scorecard

    Assess your organization’s BCP capabilities.

    Use Info-Tech’s BCP Maturity Scorecard to:

    • Assess the overall completeness of your existing BCP.
    • Track and demonstrate progress towards completion as you work through successive planning iterations with additional business units.
    1. Download a copy of the BCP Maturity Scorecard. On tab 1, indicate the percent completeness for each item using a 0-10 scale (0 = 0% complete, 10 = 100% complete).
    2. If you anticipate improvements in a certain area, make note of it in the “Comments” column.
    3. Review a visual representation of your overall scores on tab 2.

    Download Info-Tech's BCP Maturity Scorecard

    "The fact that this aligns with ISO is huge." - Dr. Bernard Jones MBCI, CBCP

    Step 1.2

    Establish the pilot BCP team

    This step will walk you through the following activities:

    • Assign accountability, responsibility, and roles.
    • Develop a project charter.
    • Identify dependencies and alternates for those dependencies.

    This step involves the following participants:

    • Executive Sponsor
    • BCP Coordinator

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Assign roles and responsibilities for the BCP pilot project. Set milestones and timelines for the pilot.

    Take a pilot approach for BCP

    Limit the scope of an initial BCP project to get to value faster.

    Pilot Project Goals

    • Establish a repeatable methodology that fits your organization and will accelerate BCP development, with tangible deliverables that provide a template for the rest of the business.
    • Identify high-priority business continuity gaps for the pilot business unit, many of which will also apply to the overall organization.
    • Identify initiatives to start addressing gaps now.
    • Enable business users to learn the BCP methodology and toolset so they can own and maintain their business unit BCPs.

    Accomplishments expected:

    • Define key business processes and process dependencies, and alternatives if dependencies are not available.
    • Classify key business processes by criticality for one business unit, using an objective impact scoring scale.
    • Set recovery objectives for these key processes.
    • Document workarounds and recovery plans.
    • Identify gaps in recovery plans and list action items to mitigate risks.
    • Develop a project plan to structure a larger continuity project.

    What not to expect from a pilot project:

    • A complete organizational BCP (the pilot is a strong starting point).
    • Implemented solutions to all BCP gaps (proposed solutions will need to be evaluated first).

    Structure IT’s role in continuity planning

    Clearly define IT’s role in the pilot BCP project to deliver a successful result that enables business units to own BCP in the future.

    Though IT is a critical dependency for most processes, IT shouldn’t own the business continuity plan. IT should be an internal BCP process consultant, and each business unit must own their plan.

    IT should be an internal BCP consultant.

    • IT departments interact with all business units, which gives IT leaders at least a high-level understanding of business operations across the organization.
    • IT leaders typically also have at least some knowledge of disaster recovery, which provides a foundation for tackling BCP.
    • By contrast, business leaders often have little or no experience with disaster recovery, and don’t have the same level of experience as IT when it comes to working with other business units.

    Why shouldn’t IT own the plan?

    • Business unit managers have the authority to direct resources in their department to participate in the BCP process.
    • Business users are the experts in their processes, and are in the best position to identify dependencies, downtime impacts, recovery objectives, and viable solutions (e.g., acceptable alternate sites or process workarounds).
    • Ultimately, business unit managers and executives must decide whether to mitigate, accept, or transfer risks.

    Info-Tech Insight

    A goal of the pilot is to seed success for further planning exercises. This is as much about demonstrating the value of continuity planning to the business unit, and enabling them to own it, as it is about implementing the methodology successfully.

    Create a RACI matrix for the pilot

    Assemble a small, focused team for the pilot project empowered to discover, report, and present possible solutions to continuity planning challenges in your organization.

    Outline roles and responsibilities on the pilot team using a “RACI” exercise. Remember, only one party can be ultimately accountable for the work being completed.

    Example Pilot BCP Project RACI

    Board Executive Team BCP Executive Sponsor BCP Team Leader BCP Coordinator Pilot Bus. Unit Manager Expert Bus. Unit Staff IT Manager
    Communicate BCP project status I I I A R C C I
    Assign resources to pilot BCP project A R C R C R
    Conduct continuity planning activities I A/R R R R R
    Create pilot BCP deliverables I A R R C C C
    Manage BCP documentation I A C R I C C
    Integrate results into BCMS I I A R R I C C
    Create overall BCP project plan I I A R C C

    R: Responsible for doing the work.

    A: Accountable to ensure the activity/work happens.

    C: Consulted prior to decision or action.

    I: Informed of the decision/action once it’s made.

    "Large teams excel at solving problems, but it is small teams that are more likely to come up with new problems for their more sizable counterparts to solve." – Wang & Evans, 2019

    Info-Tech Insight

    Small teams tend to be better at trialing new techniques and finding new ways to think about problems, both of which are needed for a BCP pilot project.

    Choose one business unit for the pilot

    Many organizations begin their BCP project with a target business unit in mind. It’s still worth establishing whether this business unit meets the criteria below.

    Good candidates for a pilot project:

    • Business processes are standardized and documented.
    • Management and staff are motivated to improve business continuity.
    • The business unit is sufficiently well resourced to spare time (e.g. a few hours a week) to dedicate to the BCP process.
    • If the business unit doesn’t meet these criteria, consider addressing shortfalls before the pilot (e.g. via stakeholder management or business process analysis) or selecting another unit.
    • Many of the decisions will ultimately require input and support from the business unit’s manager(s). It is critical that they are bought into and engaged with the project.
    • The leader of the first business unit will be a champion for BCP within the executive team.
    • Sometimes, there’s no clear place to start. If this is the case for you, consider using Info-Tech’s Business Unit BCP Prioritization Tool to determine the order in which business units should undergo BCP development.

    Create role descriptions for the pilot project

    Use these role descriptions and your RACI chart to define roles for the pilot.

    These short descriptions establish the functions, expectations, and responsibilities of each role at a more granular level.

    The Board and executives have an outsized influence on the speed at which the project can be completed. Ensure that communication with these stakeholders is clear and concise. Avoid involving them directly in activities and deliverable creation, unless it’s required by their role (e.g. as a business unit manager).

    Project Role Description
    Board & Executive Team
    • Will receive project status updates but are not directly involved in deliverable creation.
    Executive Sponsor
    • Liaison with the executive team.
    • Accountable to ensure the pilot BCP is completed.
    • Set project goals and approve resource allocation and funding.
    Pilot Business Unit Manager
    • Drive the project and assign required resources.
    • Delegate day-to-day project management tasks to the BCP Coordinator.
    BCP Coordinator
    • Function as the project manager. This includes scheduling activities, coordinating resources, reporting progress, and managing deliverables.
    • Learn and apply the BCP methodology to achieve project goals.
    Expert Business Unit Staff
    • Pilot business unit process experts to assist with BCP development for that business unit.
    IT Manager
    • Provide guidance on IT capabilities and recovery options.
    Other Business Unit Managers
    • Consulted to validate or provide input to the business impact analysis and RTOs/RPOs.

    Identify a suitable BCP Coordinator

    A skilled and committed coordinator is critical to building an effective and durable BCP.

    • Coordinating the BC planning effort requires a perspective that’s informed by IT, but goes beyond IT.
    • For example, many IT professionals only see business processes where they intersect with IT. The BCP Coordinator needs to be able to ask the right questions to help the business units think through dependencies for critical processes.
    • Business analysts can thrive in this role, which requires someone effective at dissecting business processes, working with business users, identifying requirements, and managing large projects.

    Structure the role of the BCP Coordinator

    The BCP Coordinator works with the pilot business unit as well as remaining business units to provide continuity and resolve discrepancies as they come up between business units.

    Specifically, this role includes:

    • Project management tasks (e.g. scheduling, assigning tasks, coordinating resources, and reporting progress).
    • Learning the BCP methodology (through the pilot) so that this person can lead remaining business units through their BCP process. This enables the IT leader who had been assigned to guide BCP development to step back into a more appropriate consulting role.
    • Managing the BCP workflow.

    "We found it necessary to have the same person work with each business unit to pass along lessons learned and resolve contingency planning conflicts for common dependencies." – Michelle Swessel, PM and IT Bus. Analyst, Wisconsin Compensation Rating Bureau (WCRB)

    Template: Pilot Project Charter

    Formalize participants, roles, milestones, risks for the pilot project.

    Your charter should:

    1. Define project parameters, including drivers, objectives, deliverables, and scope.
    2. Identify the pilot business unit.
    3. Assign a BCP pilot team, including a BCP Coordinator, to execute the methodology.
    4. Define before-and-after metrics to enable the team to measure pilot success.
    5. Set achievable, realistic target dates for specific project milestones.
    6. Document risks, assumptions, and constraints.

    Download Info-Tech’s BCP Pilot Project Charter Template

    Step 1.3

    Identify business processes, dependencies, and alternatives

    This step will walk you through the following activities:

    • Identify key business processes.
    • Document the process workflow.
    • Identify dependencies and alternates for those dependencies.

    This step involves the following participants:

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Expert Business Unit Staff

    You'll use the following tools & templates:

    Outcomes & Insights

    Documented workflows, process dependencies, and workarounds when dependencies are unavailable.

    Flowchart business processes

    Workflows help you visually identify process dependencies and optimization opportunities.

    • Business continuity planning is business process focused. You need to document business processes, dependencies, and downtime workarounds.
    • Process documentation is a basic BCP audit requirement, but it will also:
      • Keep discussions about business processes well-scoped and focused – by documenting the process, you also clarify for everyone what you’re actually talking about.
      • Remind participants of process dependencies and workarounds.
      • Make it easier to spot possible process breakdowns or improvements.
      • Capture your work, which can be used to create or update SOP documentation.
    • Use flowcharts to capture process workflows. Flowcharts are often quicker to create, take less time to update, and are ultimately more usable than a dense manual.

    Info-Tech Insight

    Process review often results in discovering informal processes, previously unknown workarounds or breakdowns, shadow IT, or process improvement opportunities.

    1.3.1 Prioritize pilot business unit processes

    Input

    • List of key business unit processes.

    Output

    • List of key business unit processes, now prioritized (at a high-level)

    Materials

    • Whiteboard/flip charts
    • BCP Business Impact Analysis Tool

    Participants

    • BCP Coordinator (leads the discussion)
    • Pilot Business Unit Manager

    30 minutes

    1. Create a list of all formal and informal business processes executed by the pilot business unit.
    2. Discuss the impact of process downtime, and do a quick assessment whether impact of downtime for each process would be high, medium, or low across each of these criteria:
      • Revenue or costs (e.g. supports sales, billing, or productivity)
      • Goodwill (e.g. affects internal or external reputation)
      • Compliance (e.g. affects legal or industry requirements)
      • Health or safety (e.g. affects employee/public health & safety)

    Note: A more in-depth analysis will be conducted later to refine priorities. The goal here is a high-level order of priority for the next steps in the planning methodology (identify business processes and dependencies).

    1. In the BCP Business Impact Analysis Tool, Processes and Dependencies tab, record the following:
      • The business processes in rough order of criticality.
      • For each process, provide a brief description that focuses on purpose and impact.
      • For each process, name a process owner (i.e. accountable for process completion – could be a manager or senior staff, not necessarily those executing the process).

    1.3.2 Review process flows & identify dependencies

    Input

    • List of key business unit processes (prioritized at a high level in Activity 1.3.1).
    • Business process flowcharts.

    Output

    • Business process flowcharts

    Materials

    • Whiteboard/flip charts
    • Microsoft Visio, or other flowcharting software
    • BCP Business Impact Analysis Tool

    Download Info-Tech’s Business Process Workflows Example

    1.5 hours

    1. Use a whiteboard to flowchart process steps. Collaborate to clarify process steps and dependencies. If processes are not documented, use this as an opportunity to create standard operating procedures (SOPs) to drive consistency and process optimization, as described in the Info-Tech blueprint, Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind.
    2. Record the dependencies in tab 1 of the BCP Business Impact Analysis Tool in the appropriate columns:
      • People – Anyone involved in the process, from providing guidance to executing the steps.
      • IT Applications – Core IT services (e.g. ERP, CRM) required for this process.
      • End-user devices & equipment – End-user devices, locally-installed apps, IoT, etc.
      • Facility – Any special requirements beyond general office space.
      • Suppliers & Service Providers – Third-parties who support this process.

    Info-Tech Insight

    Policies and procedures manuals, if they exist, are often out of date or incomplete. Use these as a starting point, but don’t stop there. Identify the go-to staff members who are well versed in how a process works.

    1.3.3 Document workarounds

    Input

    • Business process flowcharts.
    • List of process dependencies.

    Output

    • Workarounds and alternatives in the event dependencies aren’t available.

    Materials

    • BCP Business Impact Analysis Tool

    Participants

    • BCP Coordinator (facilitates the activity)
    • Pilot Business Unit Manager
    • Business Process Subject Matter Experts (SMEs)

    1.5 hours

    Identify alternatives to critical dependencies to help you create contingency plans.

    1. For each business process, identify known alternatives for each primary dependency. Ignore for the moment how long the workaround or alternate would be feasible.
    2. Record alternatives in the Business Continuity Business Impact Analysis Tool, Processes and Dependencies tab, Alternatives columns (a separate column for each category of dependency):
      • People – Can other staff execute the process steps? (Example: managers can step in if needed.)
      • IT Applications – Is there a manual workaround or other alternative while enterprise technology services are unavailable? (Example: database is down, but data is stored on physical forms.)
      • End-User Devices and Equipment – What alternatives exist to the usual end-user technologies, such as workstations and desk phones? (Example: some staff have cell phones.)
      • Facility Location and Requirements – Is there an alternate location where this work can be conducted? (Example: work from home, or from another building on the campus.)
      • Suppliers and External Services – Is there an alternative source for key suppliers or other external inputs? (Example: find alternate suppliers for key inputs.)
      • Additional Inputs or Requirements – What workarounds exist for additional artifacts that enable process steps (e.g. physical inventory records, control lists)? (Example: if hourly pay information is missing, run the same payroll as the previous run and reconcile once that information is available.)

    Phase 2

    Conduct a BIA to Determine Acceptable RTOs and RPOs

    Phase 2

    2.1 Define an objective impact scoring scale

    2.2 Estimate the impact of downtime

    2.3 Determine acceptable RTO/RPO targets

    Insights & Outcomes

    Assess the impact of business process downtime using objective, customized impact scoring scales. Sort business processes by criticality and by assigning criticality tiers, recovery time, and recovery point objectives.

    Participants

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Business Process SMEs

    Step 2.1

    Define an objective scoring scale

    This step will walk you through the following activities:

    • Identify impact criteria that are relevant to your business.
    • Create a scale that defines a range of impact for relevant criteria.

    This step involves the following participants:

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Expert Business Unit Staff

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Define an impact scoring scale relevant to your business, which allows you to more-objectively assess the impact of business process downtime.

    Set appropriate recovery objectives

    Recovery time and recovery point objectives should align with business impact.

    The activities in Phase 2 will help you set appropriate, acceptable recovery objectives based on the business impact of process downtime.

    • The recovery time objective (RTO) and recovery point objective (RPO) are the recovery goals set for individual processes and dependencies to ensure your business unit meets its overall acceptable recovery timeline.

    For example:

    • An RTO of four hours means staff and other required resources must be available to support the business processes within four hours of an incident (e.g. relocate to an alternate worksite if necessary, access needed equipment, log-in to needed systems, get support for completing the process from alternate staff, etc.)
    • An RPO of four hours for a customer database means the most recent secondary copy of the data must never be more than four hours old – e.g. running a backup every four hours or less.

    Conduct a Business Impact Analysis (BIA)

    Create Impact Scoring Scales→Assess the impact of process downtime→Review overall impact of process downtime→Set Criticality Tiers→Set Recovery Time and Recovery Point Objectives

    Create financial impact scales

    Identify maximum cost and revenue impacts to build financial impact scales to measure the financial impact of process downtime.

    Work with the Business Unit Manager and Executive Sponsor to identify the maximum impact in each category to the entire business. Use a worst-case scenario to estimate the maximum for each scale. In the future, you can use this scoring scale to estimate the impact of downtime for other business units.

    • Loss of Revenue: Estimate the upper bound for this figure from the previous year, and divide that by the number of business days in the year. Note: Some organizations may choose to exclude revenue as a category where it won’t be lost (e.g. public-sector organizations).
    • Loss of Productivity: Proxy for lost workforce productivity using payroll numbers. Use the fully loaded payroll for the company, divided by the number of working days in the year as the maximum.
    • Increased Operating Costs: Isolate this to known additional costs resulting from a disruption. Does the interruption itself increase operating costs (e.g. if using timesheets for hourly/contract employees and that information is lost or unavailable, do you assume a full work week)?
    • Financial Penalties: If there are known financial penalties (e.g. due to failure to meet SLAs or other contractual obligations), include those values in your cost estimates.

    Info-Tech Insight

    Cost estimates are like hand grenades and horseshoes: you don’t need to be exact. It’s much easier to get input and validation from other stakeholders when you have estimates. Even weak estimates are far better than a blank sheet.

    Create goodwill, compliance, and safety impact scales

    Create a quantitative, more-objective scoring scale for goodwill, compliance and safety by following the guidance below.

    • Impact on Customers: By default, the customer impact scale is based on the percent of your total customer base impacted. You can also modify this scale to include severity of impact or alter it to identify the maximum number of customers that would be impacted.
    • Impact on Staff: Consider staff that are directly employed by the organization or its subsidiaries.
    • Impact on Business Partners: Which business partners would be affected by a business disruption?
    • Impact on Health & Safety: Consider the extent to which process downtime could increase the risk of the health & safety of staff, customers, and the general public. In addition, degradation of health & safety services should be noted.
    • Impact on Compliance: Set up the scale so that you can capture the impact of any critical regulatory requirements that might not be met if a particular process was down for 24 hours. Consider whether you expect to receive leeway or a grace period from the governance body that requires evidence of compliance.

    Info-Tech Best Practice

    Use just the impact scales that are relevant to your organization.

    Tool: Impact Scoring Scales

    • Define 4-point scoring scales in the BCP business impact analysis tool for a more objective assessment than gut-feel rankings.
    • You don’t need to include every category, if they aren’t relevant to your organization.
    • Refine the scoring scale as needed through the pilot project.
    • Use the same scoring scale for impact analyses with additional business units in the future.

    An image depicting the Business Impact Analysis Tool. A note pointing to the Level of Impact and Direct Cost Impact Scales columns states: Add the maximum cost impacts across each of the four impact scales to the tool. The rest of the scale will auto-populate based on the criteria outlined in the “Level of Impact” column. A note pointing to the column headers states: Change the names of the column headers in this tab. The changes to column headers will populate across the rest of the tool. Indicate exclusions from the scale here. A note pointing to the Goodwill Impact Scales columns reads: Update the Goodwill impact scales. For example, perhaps a critical impact on customers could be defined as “a significant impact on all customers using the organization’s services in a 24-hour period.” A note pointing to the Compliance, Heath and Safety Impact Scales columns reads: Review the compliance and safety impact scales, and update as required.

    Step 2.2

    Estimate the impact of downtime

    This step will walk you through the following activities:

    • Apply the scoring scale developed in step 2.1 to assess the impact of downtime for specific business processes.

    This step involves the following participants:

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Expert Business Unit Staff

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Develop an objective view of the impact of downtime for key business processes.

    2.2.1 Estimate the impact of downtime

    1.5 hours

    Input

    • List of business processes, dependencies, and workarounds, all documented in the BIA tool.

    Output

    • Impact of downtime scores for key business unit processes.

    Materials

    • BCP Business Impact Analysis Tool

    Participants

    • BCP Coordinator (facilitates the discussion)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager
    1. Print a copy of the Scoring Criteria tab to use as a reference, or have it open on another screen. In tab 3 of the BCP Business Impact Analysis Tool use the drop-down menu to assign a score of 0 to 4 based on levels of impact defined in the Scoring Criteria tab.
    2. Work horizontally across all categories for a single process. This will set a benchmark, familiarize you with the scoring system, and allow you to modify any scoring scales if needed. In general, begin with the process that you know to be most critical.
      • For example, if call center sales operations are down:
        • Loss of Revenue would be the portion of sales revenue generated through the call center. This might score a 2 or 3 depending on the proportion of sales generated through the call center.
        • The Impact on Customers might be a 1 or 2 depending on the extent that existing customers might be using the call center to purchase new products or services.
        • The Legal/Regulatory Compliance and Health or Safety Risk might be a 0.
    3. Next, work vertically across all processes within a single category. This will allow you to compare scores within the category as you create them.

    Tool: Impact Analysis

    • The goal of the exercise is to arrive at a defensible ranking of process criticality, based on the impact of downtime.
    • Make sure participants can see the scores you’re assigning during the exercise (e.g. by writing out the scores on a whiteboard, or displaying the tool on a projector or screen) and can reference the scoring scales tab to understand what the scores mean.
    • Take notes to record the rationale behind the impact scores. Consider assigning note-taking duties to one of the participants.

    An image of the Impact Analysis Tool. A note pointing to the column headings states: Any customized column headings from tab 2, Scoring Criteria are automatically ported to this tab. A note pointing to the Impact on Goodwill columns reads: Score each application across each scoring scale from 0 to 4. Be sure to refer back to the scoring scale defined in tab 2. Have the scoring scale printed out, written on a whiteboard, or displayed on a separate screen. A note pointing to the tool's dropdown boxes states: Score categories using the drop-down boxes. A note pointing to the centre columns reads: Ignore scoring for categories you choose to exclude. You can hide these columns to clean up the tool if needed.

    2.2.2 Sort processes into Criticality Tiers

    30 minutes

    Input

    • Processes, with assigned impact scores (financial impact, goodwill impact, compliance and safety impact).

    Output

    • Business processes sorted into criticality tiers, based on the impact of downtime.

    Materials

    • BCP Business Impact Analysis Tool

    Participants

    • BCP Coordinator (facilitates the discussion)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager
    1. In general, consider the Total Impact on Goodwill, Compliance, and Safety first.
      • An effective tactic to start the process is to assign a tier 1 rating to all processes with a Goodwill, Compliance, and Safety score that’s 50% or more of the highest total score, tier 2 where scores are between 25% and 50%, and tier 3 where scores are below 25% (see table below for an example).
      • In step 2.3, you’ll align recovery time objectives with the criticality tiers. So, Tier 1 processes will target recovery before Tier 2 processes, and Tier 2 processes will target recovery before Tier 3 processes.
    2. Next, consider the Total Cost of Downtime.
    • The Total Cost is calculated by the tool based on the Scoring Criteria in tab 2 and the estimates in the BIA.
    • Consider whether the total cost impact justifies changing the criticality rating. “Smoke test” categorization with participants. Are there any surprises (processes more or less critical than expected)?
  • If the categorization doesn’t seem right, check that the scoring scale was applied consistently.
  • Example: Highest total Goodwill, Compliance, and Safety impact score is 18.

    Tier Score Range % of high score
    Tier 1 - Gold 9-18 50-100%
    Tier 2 - Silver 5 to 9 25-50%
    Tier 3 - Bronze 0 to 5 0-25%

    Step 2.3

    Determine acceptable RTO and RPO targets

    This step will walk you through the following activities:

    • Identify acceptable Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) for business processes.

    This step involves the following participants:

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Expert Business Unit Staff

    In this step, you’ll use these tools and templates:

    Outcomes and Insights

    Right-size recovery objectives based on business impact.

    Right-size recovery objectives

    Acceptable RTOs and RPOs must be right-sized to the impact of downtime.

    Rapid recovery typically requires more investment.

    The impact of downtime for most business processes tends to look something like the increasing impact curve in the image to the right.

    In the moments after a disruption, impact tends to be minimal. Imagine, for example, that your organization was suddenly unable to pay its suppliers (don’t worry about the reason for the disruption, for the moment). Chances are, this disruption wouldn’t affect many payees if it lasted just a few minutes, or even a few hours. But if the disruption were to continue for days, or weeks, the impact of downtime would start to spiral out of control.

    In general, we want to target recovery somewhere between the point where impact begins, and the point where impact is intolerable. We want to balance the impact of downtime with the investment required to make processes more resilient.

    Info-Tech Insight

    Account for hard copy files as well as electronic data. If that information is lost, is there a backup? BCP can be the driver to remove the last resistance to paperless processes, allowing IT to apply appropriate data protection.

    Set recovery time objectives and recovery point objectives in the “Debate Space”

    A graph with the X axis labelled as: Increasing downtime/data loss and the Y-axis labelled Increasing Impact. The graph shows a line rising as impact and downtime/data loss increase, with the lowest end of the line (on the left) labelled as minimal impact, and the highest point of the line (on the right) labelled maximum tolerance. The middle section of the line is labelled as the Debate Space, and a note reads: Acceptable RTO/RPO must be between Low Impact and Maximum Tolerance

    2.3.1 Define process-level recovery objectives

    1 hour

    Input

    • Processes, ranked by criticality.

    Output

    • Initial business-defined recovery objectives for each process.

    Materials

    • BCP Business Impact Analysis Tool

    Participants

    • BCP Coordinator (facilitates the discussion)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager
    1. Review the “Debate Space” diagram (shown in previous section) with all participants.
    2. Ask business participants for each process: how much downtime is tolerable, acceptable, or appropriate? How much data loss is tolerable?
      • If participants aren’t yet comfortable setting recovery objectives, identify the point at which downtime and data loss first becomes noticeable and the point at which downtime and data loss becomes intolerable.
      • Choose an RTO and RPO for each process that falls within the range set by these two extremes.

    RTOs and RPOs are business-defined, impact-aligned objectives that you may not be able to achieve today. It may require significant investments of time and capital to enable the organization to meet RTO and RPO.

    2.3.2 Align RTOs within and across criticality tiers

    1 hour

    Input

    • Results from pilot BCP impact analysis.

    Output

    • Initial business-defined recovery objectives for each process.

    Materials

    • BCP Business Impact Analysis Tool
    • Whiteboard/ flipchart

    Participants

    • BCP Coordinator
    • BCP Project Sponsor
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager (optional)

    Set a range for RTO for each Tier.

    1. Start with your least critical/Tier 3 processes. Use the filter in the “Criticality Rating” column in the Impact Analysis tab of the BIA tool to show only Tier 3 processes.
      • What range of RTOs did the group assign for processes in this Tier? Does the group agree that these targets are appropriate for these processes?
      • Record the range of RTOs on the whiteboard or flipchart.
    2. Next, look at Tier 2 processes. Use the same filter to show just Tier 2 processes.
      • Record the range of RTOs, confirm the range with the group, and ensure there’s no overlap with the Tier 3 range.
      • If the RTOs in one Tier overlap with RTOs in another, you’ll need to adjust RTOs or move processes between Tiers (if the impact analysis justifies it).
    Tier RTO
    Tier 1 4 hrs- 24 hrs
    Tier 2 24 hrs - 72 hrs
    Tier 3 72 hrs - 120 hrs

    Phase 3

    Document the Recovery Workflow and Projects to Close Gaps

    3.1 Determine current recovery procedures

    3.2 Identify and prioritize projects to close gaps

    3.3 Evaluate business continuity site and command center options

    Insights & Outcomes

    Outline business recovery processes. Highlight gaps and risks that could hinder business recovery. Brainstorm ideas to address gaps and risks. Review alternate site and business relocation options.

    Participants

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Business Process SMEs

    Step 3.1

    Determine current recovery procedures

    This step will walk you through the following activities:

    • Create a step-by-step, high-level recovery workflow.
    • Highlight gaps and risks in the recovery workflow.
    • Test the workflow against multiple scenarios.

    This step involves the following participants:

    • BCP Coordinator
    • Crisis Management Team
    • Pilot Business Unit Manager
    • Expert Business Unit Staff

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Establish steps required for business recovery and current recovery timelines.

    Identify risks & gaps that could delay or obstruct an effective recovery.

    Conduct a tabletop planning exercise to draft business recovery plans

    Tabletop exercises are the most effective way to test and increase business confidence in business recovery capabilities.

    Why is tabletop planning so effective?

    • It enables you play out a wider range of scenarios than technology-based testing (e.g. full-scale, parallel) due to cost and complexity factors.
    • It is non-intrusive, so it can be executed more frequently than other testing methodologies.
    • It provides a thorough test of your recovery workflow since the exercise is, essentially, paper-based.
    • After you have a BCP in place, this exercise can continue to be a valuable testing exercise for BCP to capture changes in your recovery process.

    A graph titled: Tabletop planning had the greatest impact on respondent confidence in meeting recovery objectives. The graph shows that the relative importance of Tabletop Planning is 57%, compared to 33% for Unit Testing, 3% for Simulation Testing, 6% for Parallel Testing, and 2% for Full-Scale Testing. The source for the graph is Info-Tech Research Group.

    Step 2 - 2 hours
    Establish command center.

    Step 2: Risks

    • Command center is just 15 miles away from primary site.

    Step 2: Gaps

    • Confirm what’s required to set up the command center.
    • Who has access to the EOC?
    • Does the center have sufficient bandwidth, workstations, phones, telephone lines?

    3.1.1 Choose a scenario for your first tabletop exercise

    30 minutes

    Input

    • List of past incidents.
    • Risks to business continuity that are of high concern.

    Output

    • Scenario for the tabletop exercise.

    Materials

    • N/A

    Participant

    • BCP Coordinator (facilitates the exercise)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot business unit manager

    At the business unit level, the goal is to define a plan to resume business processes after an incident.

    A good scenario is one that helps the group focus on the goal of tabletop planning – to discuss and document the steps required to recover business processes. We suggest choosing a scenario for your first exercise that:

    • Disrupts many process dependencies (i.e. facilities, staff, IT services, suppliers).
    • Does not result in major property damage, harm, or loss of life. Business resumption is the focus of this exercise, not emergency response.
    • Has happened in the past, or is of concern to the business.

    An example: a gas leak at company HQ that requires the area to be cordoned off and power to be shut down. The business must resume processes from another location without access to materials, equipment, or IT services at the primary location.

    A plan that satisfies the gas leak scenario should meet the needs of other scenarios that affect your normal workspace. Then use BCP testing to validate that the plan meets a wider range of incidents.

    3.1.2 Define the BCP activation process

    1 hour

    Input

    • Any existing crisis management, incident response or emergency response plans.
    • BC Scenario.

    Output

    • High level incident notification, assessment, and declaration workflow.

    Materials

    • Cue cards, sticky notes, whiteboard and markers, or Visio template.

    Participants

    • BCP Coordinator
    • Crisis Management Team (if one exists)
    • Business Process SMEs
    • Pilot Business Unit Manager

    Answer the questions below to structure your notification, assessment, and BCP activation procedures.

    Notification

    How will you be notified of a disaster event? How will this be escalated to leadership? How will the team responsible for making decisions coordinate (if they can’t meet on-site)? What emergency response plans are in place to protect health and safety? What additional steps are involved if there’s a risk to health and safety?

    Assessment

    Who’s in charge of the initial assessment? Who may need to be involved in the assessment? Who will coordinate if multiple teams are required to investigate and assess the situation? Who needs to review the results of the assessment, and how will the results of the assessment be communicated (e.g. phone bridge, written memo)? What happens if your primary mode of communication is unavailable (e.g. phone service is down)?

    Declaration

    Who is responsible today for declaring a disaster and activating business continuity plans? What are the organization’s criteria for activating continuity plans, and how will BCP activation be communicated? Establish a crisis management team to guide the organization through a wide range of crises by Implementing Crisis Management Best Practices.

    3.1.3 Document the business recovery workflow

    1 hour

    Input

    • Pilot BIA.
    • Any existing crisis management, incident response, or emergency response plans.
    • BC Scenario

    Output

    • Outline of your BCP declaration and business recovery plan.

    Materials

    • Cue cards, sticky notes, whiteboard and markers, or Visio template.

    Participants

    • BCP Coordinator (facilitates the exercise)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager

    Do the following:

    1. Create separate flows for facility, IT, and staff disruptions. Include additional workflows as needed.
      • We suggest you outline the recovery process at least to the point where business processes are restored to a minimum viable functional level.
    2. On white cue cards:
      1. Record the step.
      2. Indicate the task owner.
      3. Estimate how long the step will take.
    3. On yellow cue cards, document gaps in people, process, and technology requirements to complete the step.
    4. On red cue cards, indicate risks (e.g. no backup person for a key staff member).

    Info-Tech Best Practice

    Tabletop planning is most effective when you keep it simple.

    • Be focused; stay on task and on time.
    • Revisit each step and record risks and mitigation strategies.
    • Discuss each step from start to finish.
    • Revise the plan with key task owners.
    • Don’t get weighed down by tools.
    • Simple tools, like cue cards or whiteboards, can be very effective.

    Tool: BCP Recovery Workflow

    Document the steps you identified in the tabletop to create your draft recovery workflow.

    Why use a flowchart?

    • Flowcharts provide an at-a-glance view, are ideal for crisis scenarios where pressure is high and effective, and where timely communication is necessary.
    • For experienced managers and staff, a high-level reminder of process flows or key steps is sufficient.
    • Where more detail is required, include links to supporting documentation (which could include checklists, vendor documentation/contracts, other flowcharts, etc.)

    Create one recovery workflow for all scenarios.

    Traditional planning calls for separate plans for different “what-if” scenarios. This is challenging not just because it’s a lot more documentation – and maintenance – but because it’s impossible to predict every possible incident. Use the template, aligned to recovery of process dependencies, to create one recovery workflow for each business unit that can be used in and tested against different scenarios.

    Download Info-Tech’s BCP Recovery Workflow Example

    "We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management." – Assistant Director-IT Operations, Healthcare Industry

    "Very few business interruptions are actually major disasters. It’s usually a power outage or hardware failure, so I ensure my plans address ‘minor’ incidents as well as major disasters."- BCP Consultant

    3.1.4 Document achievable recovery metrics (RTA/RPA)

    30 minutes

    Input

    • Pilot BCP BIA.
    • Draft recovery workflow.

    Output

    • RTA and RPA for each business process.

    Materials

    • Pilot BCP BIA.

    Participants

    • BCP Coordinator (facilitates the exercise)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager

    Add the following data to your copy of the BCP Business Impact Analysis Tool.

    1. Estimate the recovery time achievable (RTA) for each process based on the required time for the process to be restored to a minimum acceptable functional level. Review your recovery workflow to identify this timeline. For example, if the full process from notification, assessment, and declaration to recovery and relocation would take a full day, set the RTA to 24 hours.
    2. Estimate the recovery point achievable (RPA) for each process based on the maximum amount of data that could be lost. For example, if data on a particular system is backed up offsite once per day, and the onsite system was destroyed just before that backup began, the entire day’s data could be lost and the achievable RPO is 24 hours. Note: Enter a value of 9999 to indicate that data is unrecoverable.

    Info-Tech Insight

    Operating at a minimum acceptable functional level may not be feasible for more than a few days or weeks. Develop plans for immediate continuity first, then develop further plans for long-term continuity processes as required. Recognize that for longer term outages, you will evolve your plans in the crisis to meet the needs of the situation.

    3.1.5 Test the workflow of other scenarios

    1 hour

    Input

    • Draft recovery workflow.

    Output

    • Updated draft recovery workflow.

    Materials

    • Draft recovery workflow.
    • Projector or screen.

    Participants

    • BCP Coordinator (facilitates the exercise)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager

    Work from and update the soft copy of your recovery workflow.

    1. Would any steps change if the scenario changes? If yes, capture the different flow with a decision diamond. See the example Recovery Workflow for a workflow that uses decision diamonds. Identify any new gaps or risks you encounter with red and yellow cards.
    2. Make sure the decision diamonds are as generalized as possible. For example, instead of creating a separate response plan for each scenario that would require you to relocate from your existing building, create one response plan for relocation and one response plan for remaining in place.
    3. See the next section for some examples of different types of scenarios that you may include in your recovery workflow.

    Info-Tech Insight

    Remember that health and safety risks must be dealt with first in a crisis. The business unit recovery workflow will focus on restoring business operations after employees are no longer at risk (e.g. the risk has been resolved or employees have been safely relocated). See Implement Crisis Management Best Practices for ideas on how to respond to and assess a wide range of crises.

    Not all scenarios will have full continuity plans

    Risk management is a business decision. Business continuity planning can help decision makers understand and decide on whether to accept or mitigate high impact, low probability risks.

    For some organizations, it’s not practical or possible to invest in the redundancy that would be necessary to recover in a timely manner from certain major events.

    Leverage existing risk management practices to identify key high impact events that could present major business continuity challenges that could cause catastrophic disruptions to facility, IT, staffing, suppliers, or equipment. If you don’t have a risk register, review the scenarios on the next slide and brainstorm risks with the working group.

    Work through tabletop planning to identify how you might work through an event like this, at a high level. In step 3.2, you can estimate the effort, cost, and benefit for different ideas that can help mitigate the damage to the business to help decision makers choose between investment in mitigation or accepting the risk.

    Document any scenarios that you identify as outside the scope of your continuity plans in the “Scope” section of your BCP Summary document.

    For example:

    A single location manufacturing company is creating a BCP.

    The factory is large and contains expensive equipment; it’s not possible to build a second factory for redundancy. If the factory is destroyed, operations can’t be resumed until the factory is rebuilt. In this case, the BCP outlines how to conduct an orderly business shutdown while the factory is rebuilt.

    Contingency planning to resume factory operations after less destructive events, as well as a BCP for corporate services, is still practical and necessary.

    Considerations for other BCP scenarios

    Scenario Type Considerations
    Local hazard (gas leak, chemical leak, criminal incident, etc.)
    • Systems might be accessible remotely, but hands-on maintenance will be required eventually. “Work from home” won’t be a long-term solution.
    • An alternate site is required for service continuity. Can be within normal commuting distance.
    Equipment/building damage (fire, roof collapse, etc.)
    • Equipment will need repair or replacement (vendor involvement).
    • An alternate site is required for service continuity. Can be nearby.
    Regional natural disasters
    • Utilities may be affected (power, running water, etc.).
    • Expect staff to take care of their families first before work.
    • A geographically distant alternate site is required for service continuity.
    Supplier failure (IT provider outage, disaster at supplier, etc.)
    • Service-level agreements are important to establish recovery timelines. Review contracts and master services agreements.
    Staff (lottery win, work stoppage, pandemic/quarantine)
    • Staff are suddenly unavailable. Expect that no warm handoff to alternates is possible and that time to ramp up on the process is accounted for.
    • In a pandemic scenario, work from home, remote toolsets, and digital/contactless workflows become critical.

    Step 3.2

    Identify and prioritize projects to close gaps

    This step will walk you through the following activities:

    • Brainstorm solutions to identified gaps and risks.
    • Prioritize projects and action items to close gaps and risks.
    • Assess the impact of proposed projects on the recovery workflow.

    This step involves the following participants:

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Expert Business Unit Staff

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Identify and prioritize projects and action items that can improve business continuity capabilities.

    3.2.1 Brainstorm solutions to address risks and gaps

    1 hour

    Input

    • Draft recovery workflow.
    • Known continuity risks and gaps.

    Output

    • Ideas for action items and projects to improve business continuity.

    Materials

    • Flipchart

    Participants

    • BCP Coordinator (facilitates the exercise)
    • Business Process Subject Matter Experts (SMEs)
    • Pilot Business Unit Manager
    1. Review each of the risk and gap cards from the tabletop exercise.
    2. As a group, brainstorm ideas to address gaps, mitigate risks, and improve resiliency. Write the list of ideas on a whiteboard or flip chart paper. The solutions can range from quick-wins and action items to major capital investments. The following slides can help you seed ideas to support brainstorming and idea generation.

    Info-Tech Best Practice

    Try to avoid debates about feasibility at this point. The goal is to get ideas on the board.

    When you’re brainstorming solutions to problems, don’t stop with the first idea, even if the solution seems obvious. The first idea isn’t always the best or only solution – other ideas can expand on it and improve it.

    Step 4: No formal process to declare a disaster and invoke business continuity.

    Step 7: Alternate site could be affected by the same regional event as the main office.

    Step 12: Need to confirm supplier service-level agreements (SLAs).

    1. Continue to create BCP documentation.
    2. Identify a third location for regional disasters.
    3. Contact suppliers to confirm SLAs and validate alignment with RTOs/RPOs.
    4. Add BCP requirements collection to service procurement process?

    Discuss your remote work capabilities

    With COVID-19, most organizations have experience with mass work-from-home.

    Review the following case studies. Do they reflect your experience during the COVID-19 pandemic?

    Unacceptable risk

    • A small insurance company provided laptops to staff so they could work remotely.
    • Complication: Cheque and print stock is a dependency and no plan was made to store check stock offsite in a secure fashion.

    Key dependencies missing

    • A local government provided laptops to key staff so they could work remotely.
    • Complication: The organization didn’t currently own enough Citrix licenses for every user to be online concurrently.

    Unable to serve customers

    • The attestation and land services department of a local government agency provided staff with remote access to key apps.
    • Complication: Their most critical business processes were designed to be in-person – they had no plan to execute these processes from home.

    Consider where your own work-from-home plans fell short.

    • Were your collaboration and communication solutions too difficult for users to use effectively?
    • Did legacy infrastructure affect performance or limit capabilities? Were security concerns appropriately addressed?
    • What challenges did IT face supporting business users on break-fix and new requests?
    • Were there logistical needs (shipping/receiving, etc.) that weren’t met?
    • Develop an updated plan to support work-from-home using Info-Tech’s BCP Relocation Checklists and Home Office Survey template, and integrate these into your overall BCP documentation. Stakeholders can easily appreciate the value of this plan since it’s relevant to recent experience.

    Identify opportunities to improve continuity plans

    What gaps in your continuity response could be addressed with better planning?

    People

    • Alternates are not identified
    • Roles in a disaster are not formalized
    • No internal/external crisis comm. strategy

    Site & Facilities

    • No alternate place of business or command center identified
    • No formal planning or exercises to test alternate site viability

    • Identify a viable secondary site and/or work-from-home plan, and develop a schedule for testing activities. Review in Step 3.3 of the Develop a Business Continuity Plan blueprint.

    External Services & Suppliers

    • Contingency plans for a disruption not planned or formalized
    • No formal review of service-level agreements (SLAs)

    • Contact key suppliers and vendors to establish SLAs, and ensure they meet requirements.
    • Review supplier continuity plans.

    Technology & Physical Assets

    • No secondary site or redundancy for critical IT systems
    • No documented end-to-end IT DR plan

    Tool: BCP Project Roadmap

    Prioritize and visualize BCP projects to present options to decision makers.

    Not all BCP projects can be tackled at once. Enable decision makers to defer, rather than outright reject, projects that aren’t feasible at this time.

    1. Configure the tool in Tab 1. Setup. Adjust criteria and definitions for criteria. Note that shaded columns are required for reporting purposes and can’t be modified.
    2. Add projects and action items in Tab 2. Data Entry. Fields highlighted in red are all required for the dashboard to populate. All other fields are optional but will provide opportunities to track more detailed data on project ideas.
    3. To generate the dashboard in Tab 3. Roadmap, open the Data ribbon and under Queries and Connections click Refresh All. You can now use the slicers on the right of the sheet.

    Download Info-Tech’s BCP Project Roadmap Tool

    Demonstrate BCP project impacts

    Illustrate the benefits of proposed projects.

    1. Review your recovery workflow.
    2. Make updates to a second copy of the high-level outline to illustrate how the business response to a disaster scenario will change once proposed projects are complete.
    • Remove steps that have been made unnecessary.
    • Remove any risks or gaps that have been mitigated or addressed.
    • Verify that proposed projects close gaps between acceptable and achievable recovery capabilities in the BIA tool.
  • The visual impact of a shorter, less-risky recovery workflow can help communicate the benefits of proposed projects to decision makers.
  • Step 3.3

    Evaluate business continuity site and command center options

    This step will walk you through the following activities:

    • Take a deep dive on the requirements for working from an alternate location.
    • Assess different options for an alternate location.

    This step involves the following participants:

    • BCP Coordinator
    • Pilot Business Unit Manager
    • Expert Business Unit Staff

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Identify requirements for an alternate business site.

    Tool: Relocation Checklists

    An alternate site could be another company building, a dedicated emergency operations center, or work-from-home. Use this tool to guide and prepare for any relocation exercise.

    • Coordinate your response with the pre-populated checklists in Tabs 1 & 2, identify who’s responsible for items on the checklists, and update your recovery workflows to reflect new steps. When reviewing the checklist, consider what can be done to prepare ahead of a crisis.
      • For example, you may wish to create crisis communication templates to streamline crisis communications during a disaster.
    • Calculate the effort required to provision equipment for relocated users in Tabs 3 & 4.
    • Evaluate your options for alternate sites with the requirements matrix in Tab 5. Use your evaluation to identify how the organization could address shortcomings of viable options either ahead of time or at the time of an incident.

    Download Info-Tech’s BCP Relocation Checklists

    Create a checklist of requirements for an alternate site

    Leverage the roll-up view, in tab 3, of dependencies required to create a list of requirements for an alternate site in tab 4.

    1. The table on Tab 5 of the relocation checklists is pre-populated with some common requirements. Modify or replace requirements to suit your needs for an alternate business/office site. Be sure to consider distance, transportation, needed services, accessibility, IT infrastructure, security, and seating capacity at a minimum.
    2. Don’t assume. Verify. Confirm anything that requires permissions from the site owner. What network providers have a presence in the building? Can you access the site 24/7 and conduct training exercises? What facilities and services are available? Are you guaranteed the space if needed?

    "There are horror stories about organizations that assumed things about their alternate site that they later found out they weren’t true in practice." – Dr. Bernard Jones, MBCI CBCP

    Info-Tech Insight

    If you choose a shared location as a BCP site, a regional disaster may put you in competition with other tenants for space.

    Identify a command center

    For command center and alternate worksite selection, remember that most incidents are local and short term. Identify an onsite and an offsite command center.

    1. For events where the building is not compromised, identify an onsite location, ideally with remote conferencing capabilities and planning and collaboration tools (projectors, whiteboards, flipcharts). The onsite location can also be used for BCM and crisis management meetings. Remember, most business continuity events are not regional or massively destructive.
    2. For the offsite command center, select a location that is sufficiently far away from your normal business location to maintain separation from local incidents while minimizing commute time. However, consider a geographically distant option (e.g. more than 50 miles away) identified for those scenarios where it is a regional disaster, or plan to leverage online tools to create a virtual command center (see the Insight box below).
    3. The first members of the Emergency Response Team to be notified of the incident will determine which location to use or whether a third alternative is required.

    Info-Tech Insight

    For many organizations, a dedicated command center (TVs on the wall, maps and charts in filing cabinets) isn’t necessary. A conference bridge and collaboration tools allowing everyone to work remotely can be an acceptable offsite command center as long as digital options can meet your command center requirements.

    Create a plan for a return to normal

    Operating in continuity mode for an extended period of time tends to result in higher costs and reduced business capabilities. It’s important to restore normal operations as soon as possible.

    Advance planning can minimize risks and delays in returning to normal operations.

    Leverage the methodology and tools in this blueprint to define your return to normal (repatriation) procedures:

    1. Repeat the tabletop planning exercise to determine the repatriation steps and potential gaps. How will you return to the primary site from your alternate site? Does data need to be re-entered into core systems if IT services are down? Do you need to transfer job duties back to primary staff?
    2. What needs to be done to address the gaps in the return to normal workflow? Are there projects or action items that could make return to normal easier?

    For more on supporting a business move back to the office from the IT perspective, see Responsibly Resume IT Operations in the Office

    Potential business impacts of ongoing operations at a failover site

    • The cost of leasing alternate business worksites.
    • Inability to deliver on strategic initiatives while in emergency/interim operations mode, resulting in lost business opportunities.
    • A growing backlog of work that falls outside of emergency operations mode.
    • Travel and accommodation costs if the alternate site is geographically remote.
    • Additional vendor licensing and contract costs.

    Phase 4

    Extend the Results of the Pilot BCP and Implement Governance

    Phase 4

    4.1 Consolidate BCP pilot insights to support an overall BCP project plan

    4.2 Outline a business continuity management (BCM) program

    4.3 Test and maintain your BCP

    Insights & Outcomes

    Summarize and consolidate your initial insights and documentation. Create a project plan for overall BCP. Identify teams, responsibilities, and accountabilities, and assign documentation ownership. Integrate BCP findings in DR and crisis management practices. Set guidelines for testing, plan maintenance, training, and awareness.

    Participants

    • BCP Coordinator
    • Pilot Business Unit Manager
    • BCP Executive Sponsor

    Step 4.1

    Consolidate BCP pilot insights to support an overall BCP project plan

    This step will walk you through the following activities:

    • Summarize and consolidate outputs and key insights from the BCP pilot.
    • Identify outputs from the pilot that can be re-used for the overall BCP.
    • Create a project charter for an overall BCP.

    This step involves the following participants:

    • BCP Coordinator
    • Pilot Business Unit Manager
    • BCP Executive Sponsor

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Present results from the pilot BCP, and outline how you’ll use the pilot process with other business units to create an overall continuity program.

    Structure the overall BCP program.

    Template: BCP Pilot Results Presentation

    Highlight key findings from the BCP pilot to make the case for next steps.

    • Highlight critical gaps or risks identified, any potential process improvements, and progress made toward improving overall BCP maturity through the pilot project. Summarize the benefits of the pilot project for an executive audience.
    • Review process recovery objectives (RTO/RPO). Provide an overview of recovery capabilities (RTA/RPA). Highlight any significant gaps between objectives and capabilities.
    • Propose next steps, including an overall BCP project and program, and projects and action items to remediate gaps and risks.
    • Develop a project plan to estimate resource requirements for an overall BCP project prior to delivering this presentation. Quantifying required time and resources is a key outcome as it enables the remaining business units to properly scope and resource their BCP development activities and can help managers overcome the fear of the unknown.

    Download Info-Tech’s BCP Pilot Results Presentation

    Tool: BCP Summary

    Sum up information from completed BCP documents to create a high-level BCP overview for auditors and executives.

    The BCP Summary document is the capstone to business unit continuity planning exercises. It consolidates your findings in a short overview of your business continuity requirements, capabilities, and maintenance procedures.

    Info-Tech recommends embedding hyperlinks within the Summary to the rest of your BCP documentation to allow the reader to drill down further as needed. Leverage the following documents:

    • Business Impact Analysis
    • BCP Recovery Workflows
    • Business Process Workflows
    • BCP Project Roadmap
    • BCP Relocation Checklists
    • Business Continuity Policy

    Download Info-Tech’s BCP Summary Document

    Reuse templates for additional exercises

    The same methodology described in this blueprint can be repeated for each business unit. Also, many of the artifacts from the BCP pilot can be reused or built upon to give the remaining business units a head start. For example:

    • BCP Pilot Project Charter Template. Make a copy to use as a base for the next business unit’s BCP project charter, and update the stakeholders/roles and milestone dates. The rest of the content can remain the same in most cases.
    • BCP Reference Workbook. This tool contains information common to all business units and can be updated as needed.
    • BCP Business Impact Analysis Tool. You may need to start a separate copy for each business unit to allow enough space to capture all business processes. However, use the same scoring scale to drive consistent assessments. In addition, the scoring completed by the pilot business unit provides an example and benchmark for assessing other business processes.
    • BCP Recovery Workflow. The notification, assessment, and declaration steps can be standardized so remaining business units can focus primarily on recovery after a disaster is declared. Similarly, many of the steps related to alternate sites and IT workarounds will also apply to other business units.
    • BCP Project Roadmap Tool. Many of the projects identified by the pilot business unit will also apply to other business units – update the list as needed.
    • The Business Unit BCP Prioritization Tool, BCP Executive Presentation, and Business Continuity Policy Template do not need to be updated for each business unit.

    Info-Tech Best Practice

    You may need to create some artifacts that are site specific. For example, relocation plans or emergency plans may not be reusable from one site to another. Use your judgement to reuse as much of the templates as you can – similar templates simplify audit, oversight, and plan management.

    Create an Overall BCP Project Charter

    Modify the pilot project charter to encompass the larger BCP project.

    Adjust the pilot charter to answer the following questions:

    • How much time and effort should the rest of the project take, based on findings from the pilot? When do you expect to meet certain milestones? What outputs and outcomes are expected?
    • In what order should additional business units complete their BCP? Who needs to be involved?
    • What projects to address continuity gaps were identified during the pilot? What investments will likely be required?
    • What additional documentation is required? This section and the appendix include templates to document your BCM Policy, Teams & Contacts, your notification procedures, and more.
    • How does this integrate with the other areas of business resilience and continuity (IT disaster recovery planning and crisis management planning)?
    • What additional activities, such as testing, are required?

    Prioritize business units for further BCP activities.

    As with the pilot, choose a business unit, or business units, where BCP will have the greatest impact and where further BCP activities will have the greatest likelihood of success. Prioritize business units that are critical to many areas of the business to get key results sooner.

    Work with one business unit at a time if:

    • Required resources from the business unit are available to focus on BCP full-time over a short period (one to two weeks).
    • More hands-on guidance (less delegation) is needed.
    • The business unit is large or has complex processes.

    Work with several business units at the same time if:

    • Required resources are only available sporadically over a longer period of time.
    • Less guidance (more delegation) is possible.
    • All business units are small and have well-documented processes.

    Download Info-Tech’s Business Unit BCP Prioritization Tool

    Step 4.2

    Outline a Business Continuity Management (BCM) Program

    This step will walk you through the following activities:

    • Identify teams and roles for BCP and business continuity management.
    • Identify individuals to fill key roles.

    This step involves the following participants:

    • BCP Coordinator
    • Executive Sponsor

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Document BCP teams, roles, and responsibilities.

    Document contact information, alternates, and succession rules.

    Outline a Business Continuity Management Program

    A BCM program, also known as a BCM system, helps structure business continuity activities and practices to deliver long-term benefits to your business.

    A BCM program should:

    • Establish who is responsible and accountable for BCP practices, activities, and documentation, and set documentation management practices.
    • Define a process to improve plans. Review and update continuity requirements, suggest enhancements to recovery capabilities, and measure progress and improvements to the plan over time.
    • Coordinate disaster recovery, business continuity, and crisis management planning outputs and practices.
    • Communicate the value of the continuity program to the organization.

    Develop a Business Continuity Management Program

    Phase 4 of this blueprint will focus on the following elements of a business continuity management program:

    • BCM Roles, Responsibilities, and Accountabilities
    • BCM Document Management Practices
    • Integrate BC, IT DR, Crisis Management, and Emergency Management
    • Business Continuity Plan maintenance and testing
    • Training and awareness

    Schedule a call with an Info-Tech Analyst for help building out these core elements, and for advice on developing the rest of your BCM program.

    Create BCM teams

    Include a mix of strong leaders and strong planners on your BC management teams.

    BC management teams (including the secondary teams such as the emergency response team) have two primary roles:

    1. Preparation, Planning, and Governance: Conduct and consolidate business impact analyses. Review, and support the development of recovery workflows, including emergency response plans and business unit recovery workflows. Organize testing and training. Report on the state of the continuity plan.
    2. Leadership During a Crisis: Coordinate and support the execution of business recovery processes. To meet these goals, each team needs a mix of skill sets.

    Crisis leaders require strong crisis management skills:

    • Ability to make quick decisions under pressure with incomplete information.
    • Excellent verbal communication skills.
    • Strong leadership skills. Calm in stressful situations.
    • Team leaders are ideally, but not necessarily, those with the most senior title on each team. It’s more important that the team leader has the appropriate skill set.

    Collectively, the team must include a broad range of expertise as well as strong planning skills:

    • Diverse expertise to be able to plan for and respond to a wide range of potential incidents, from health and safety to reputational damage.
    • Excellent organizational skills and attention to detail.
    • Excellent written communication skills.

    Note: For specific BC team roles and responsibilities, including key resources such as Legal, HR, and IT SMEs required to prepare for and execute crisis management plans, see Implement Crisis Management Best Practices.

    Structure the BCM Team

    Create a hierarchy of teams to govern and coordinate business continuity planning and crisis management.

    BCM Team: Govern business continuity, DR, and crisis management planning. Support the organization’s response to a crisis, including the decision to declare a disaster or emergency.

    Emergency Response Teams: Assist staff and BC teams during a crisis, with a focus first on health and safety. There’s usually one team per location. Develop and maintain emergency response plans.

    Emergency Response Teams: Assist staff and BC teams during a crisis, with a focus first on health and safety. There’s usually one team per location. Develop and maintain emergency response plans.

    IT Disaster Recovery Team: Manage the recovery of IT services and data following an incident. Develop and maintain the IT DRP.

    Business Unit BCP Teams: Coordinate business process recovery at the business unit level. Develop and maintain business unit BCPs.

    “Planning Mode”

    Executive Team → BC Management Team ↓

    • Emergency Response Teams (ERT)
    • Crisis Management Team
    • IT DR Management Team
    • Business Unit BCP Teams

    “Crisis Mode”

    Executive Team ↔Crisis Management Team↓ ↔ Emergency Response Teams (ERT)

    • BC Management Team
    • IT DR Management Team
    • Business Unit BCP Teams

    For more details on specific roles to include on these teams, as well as more information on crisis management, review Info-Tech’s blueprint, Implement Crisis Management Best Practices.

    Tool: BCM Teams, Roles, Contacts, and Vendors

    Track teams, roles, and contacts in this template. It is pre-populated with roles and responsibilities for business continuity, crisis management, IT disaster recovery, emergency response, and vendors and suppliers critical to business operations.

    • Expect overlap across teams. For example, the BC Management Team will include representation from each secondary team to ensure plans are in sync. Similarly, both the Crisis Communication Team and BC Management Team should include a representative from your legal team to ensure legal issues are considered in communications as well as overall crisis management.
    • Clarify spending and decision authority for key members of each team during a crisis.

    Track contact information in this template only if you don’t have a more streamlined way of tracking it elsewhere.

    Download Info-Tech’s Business Continuity Teams and Roles Tool

    Manage key vendors

    Review supplier capabilities and contracts to ensure they meet your requirements.

    Suppliers and vendors might include:

    • Material shipments
    • IT/telecoms service providers
    • Integrators and business process outsourcing providers
    • Independent contractors
    • Utilities (power, water, etc.)

    Supplier RTOs and RPOs should align with the acceptable RTOs and RPOs defined in the BIA. Where they do not, explore options for improvement.

    Confirm the following:

    1. The supplier’s own BC/DR capabilities – how they would recover their own operations in a disaster scenario.
    2. Any continuity services the supplier provides – how they can help you recover your operations in a disaster scenario.
    3. Their existing contractual obligations for service availability (e.g. SLAs).

    Download Info-Tech’s BCP Supplier Evaluation Questionnaire

    Organize your BCMS documentation

    Your BCP isn’t any one document. It’s multiple documents that work together.

    Continue to work through any additional required documentation. Build a repository where master copies of each document will reside and can be updated as required. Assign ownership of document management to someone with an understanding of the process (e.g. the BCP Coordinator).

    Governance Recovery
    BCMS Policy BCP Summary Core BCP Recovery Workflows
    Business Process Workflows Action Items & Project Roadmap BCP Recovery Checklists
    BIA Teams, Roles, Contact Information BCP Business Process Workarounds and Recovery Checklists
    BCP Maturity Scorecard BCP Project Charter Additional Recovery Workflows
    Business Unit Prioritization Tool BCP Presentation

    Info-Tech Best Practice

    Recovery documentation has a different audience, purpose, and lifecycle than governance documentation, and keeping the documents separate can help with content management. Disciplined document management keeps the plan current and accessible.

    Align your IT DRP with your BCP

    Use the following BCP outputs to inform your DRP:

    • Business process technology dependencies. This includes technology not controlled by IT (e.g. cloud-based services).
    • RTOs and RPOs for business processes.
    • Technology projects identified by the business to improve resilience (e.g. improved mobility support).
    PCP Outputs DRP Activities
    Business processes defined Identify critical applications

    Dependencies identified:

    • People
    • Enterprise tech
    • Personal devices
    • Workspace and facilities
    • Services and other inputs

    Identify IT dependencies:

    • Infrastructure
    • Secondary applications

    Recovery objectives defined:

    • BIA and RTOs/RPOs
    • Recovery workflows

    Identify recovery objectives:

    • BIA and RTOs/RPOs
    • IT Recovery workflows

    Projects identified to close gaps:

    • Resourcing changes (e.g. training secondary staff)
    • Process changes (e.g. optimize processes and define interim processes)
    • Technology changes (e.g. improving mobility)

    Identify projects to close gaps:

    • Projects to improve DR capability (e.g. data replication, standby systems).
    • Projects to improve resiliency (e.g. redundant components)

    Info-Tech Insight

    Don’t think of inconsistencies between your DRP and BCP as a problem. Discrepancies between the plans are part of the discovery process, and they’re an opportunity to have a conversation that can improve alignment between IT service capabilities and business needs. You should expect that there will be discrepancies – managing discrepancies is part of the ongoing process to refine and improve both plans.

    Schedule activities to keep BC and DR in sync

    BC/DR Planning Workflow

    1. Collect BCP outputs that impact IT DRP (e.g. technology RTOs/RPOs).

    2. As BCPs are done, BCP Coordinator reviews outputs with IT DRP Management Team.

    3. Use the RTOs/RPOs from the BCPs as a starting point to determine IT recovery plans.

    4. Identify investments required to meet business-defined RTOs/RPOs, and validate with the business.

    5. Create a DR technology roadmap to meet validated RTOs/RPOs.

    6. Review and update business unit BCPs to reflect updated RTOs/RPOs.

    Find and address shadow IT

    Reviewing business processes and dependencies can identify workarounds or shadow IT solutions that weren’t visible to IT and haven’t been included in IT’s DR plan.

    • If you identify technology process dependencies that IT didn’t know about, it can be an opportunity to start a conversation about service support. This can be a “teachable moment” to highlight the risks of adopting and implementing technology solutions without consulting IT.
    • Highlight the possible impact of using technology services that aren’t supported by IT. For example:
      • RTOs and RPOs may not be in line with business requirements.
      • Costs could be higher than supported solutions.
      • Security controls may not be in line with compliance requirements.
      • IT may not be able to offer support when the service breaks or build new features or functionality that might be required in the future.
    • Make sure that if IT is expected to support shadow IT solutions, these systems are included in the IT DRP and that the risks and costs of supporting the non-core solution are clear to all parties and are compared to an alternative, IT-recommended solutions.

    Shadow IT can be a symptom of larger service support issues. There should be a process for requesting and tracking non-standard services from IT with appropriate technical, security, and management oversight.

    Review and reprioritize BC projects to create an overall BC project roadmap

    Assign the BCP Coordinator the task of creating a master list of BC projects, and then work with the BC management team to review and reprioritize this list, as described below:

    1. Build a list of BC projects as you work with each business unit.
      1. Add proposed projects to a master copy of the BCP Project Roadmap Tool
      2. For each subsequent business unit, copy project names, scoring, and timelines into the master roadmap tool.
    2. Work with the Executive Sponsor, the IT BCM representative, and the BCM team to review and reprioritize projects.
      1. In the master BCP Project Roadmap Tool, review and update project scoring, taking into account the relative importance of each project within the overall list. Rationalize the list (e.g. eliminate duplicate projects).
    3. The project roadmap is a suggested list of projects at this stage. Assign a project sponsor and project manager (from the BC management team or appropriate delegates) to each project to take it through your organization’s normal project scoping and approval process.

    Improving business continuity capabilities is a marathon, not a sprint. Change for the better is still change and introduces risk – massive changes introduce massive risk. Incremental changes help minimize disruption. Use Info-Tech research to deliver organizational change.

    "Developing a BCP can be like solving a Rubik’s Cube. It’s a complex, interdepartmental concern with multiple and sometimes conflicting objectives. When you have one side in place, another gets pushed out of alignment." – Ray Mach, BCP Expert

    Step 4.3

    Test and maintain your BCP

    This step will walk you through the following activities:

    • Create additional documentation to support your business continuity plan.
    • Create a repository for documentation, and assign ownership for BCP documentation.

    This step involves the following participants:

    • BCP Coordinator

    In this step, you’ll use these tools and templates:

    Outcomes & Insights

    Create a plan to maintain the BCP.

    Iterate on your plan

    Tend your garden, and pull the weeds.

    Mastery comes through practice and iteration. Iterating on and testing your plan will help you keep up to date with business changes, identify plan improvements, and help your organization’s employees develop a mindset of continuity readiness. Maintenance drives continued success; don’t let your plan become stagnant, messy, and unusable.

    Your BCM program should structure BCP reviews and updates by answering the following:

    1. When do we review the plan?
    2. What are the goals of a review?
    3. Who must lead reviews and update BCP documents?
    4. How do we track reviews, tests, and updates?

    Structure plan reviews

    There are more opportunities for improvements than just planned reviews.

    At a minimum, review goals should include:

    1. Identify and document changes to BCP requirements.
    2. Identify and document changes to BCP capabilities.
    3. Identify gaps and risks and ways to remediate risks and close gaps.

    Who leads reviews and updates documents?

    The BCP Coordinator is likely heavily involved in facilitating reviews and updating documentation, at least at first. Look for opportunities to hand off document ownership to the business units over time.

    How do we track reviews, tests, and updates?

    Keep track of your good work by keeping a log of document changes. If you don’t have one, you can use the last tab on the BCP-DRP Maintenance Checklist.

    When do we review the plan?

    1. Scheduled reviews: At a minimum, plan reviews once a year. Plan owners should review the documents, identify needed updates, and notify the coordinator of any changes to their plan.
    2. As-needed reviews: Project launches, major IT upgrades, office openings or moves, organizational restructuring – all of these should trigger a BCP review.
    3. Testing exercises: Schedule controlled exercises to test and improve different aspects of your continuity plan, and ensure that lessons learned become part of plan documentation.
    4. Retrospectives: Take the opportunity to learn from actual continuity events and crises by conducting retrospectives to evaluate your response and brainstorm improvements.

    Conduct a retrospective after major incidents

    Use a retrospective on your COVID-19 response as a starting point. Build on the questions below to guide the conversation.

    • If needed, how did we set up remote work for our users? What worked, and what didn’t?
    • Did we discover any long-term opportunities to improve business processes?
    • Did we use any continuity plans we have documented?
    • Did we effectively prioritize business processes for recovery?
    • Were expectations from our business users in line with our plans?
    • What parts of our plan worked, and where can we improve the plan?
    1. Gather stakeholders and team members
    2. Ask:
      1. What happened?
      2. What did we learn?
      3. What did we do well?
      4. What should we have done differently?
      5. What gaps should we take action to address?
    3. Prepare a plan to take action

    Outcomes and benefits

    • Confirm business priorities.
    • Validate that business recovery solutions and procedures are effective in meeting business requirements (i.e. RTOs and RPOs).
    • Identify gaps in continuity resources, procedures, or documentation, and options to close gaps.
    • Build confidence in the response team and recovery capabilities.

    Tool: Testing and Maintenance Schedule

    Build a light-weight maintenance schedule for your BCP and DRP plans.

    This tool helps you set a schedule for plan update activities, identify document and exercise owners, and log updates for audit and governance purposes.

    • Add the names of your documents and brainstorm update activities.
    • Activities (document updates, testing, etc.) might be scheduled regularly, as-needed, or both. If they happen “as needed,” identify the trigger for the activity.
    • Start tracking past activities and resulting changes in Tab 3. You can also track crises that tested your continuity capabilities on this tab.

    Info-Tech Insight

    Everyone gets busy. If there’s a meeting you can schedule months in advance, schedule it months in advance! Then send reminders closer to the date. As soon as you’re done the pilot BCP, set aside time in everyone’s calendar for your first review session, whether that’s three months, six months, or a year from now.

    Appendix

    Additional BCP Tools and Templates

    Template Library: Business Continuity Policy

    Create a high-level policy to govern BCP and clarify BCP requirements.

    Use this template to:

    • Outline the organizational commitment to BCM.
    • Clarify the mandate to prepare, validate, and maintain continuity plans that align with business requirements.
    • Define specific policy statements that signatories to the policy are expected to uphold.
    • Require key stakeholders to review and sign off on the template.

    Download Info-Tech’s Business Continuity Policy template

    Template Library: Workarounds & Recovery Checklists

    Capture the step-by-step details to execute workarounds and steps in the business recovery process.

    If you require more detail to support your recovery procedures, you can use this template to:

    • Record specific steps or checklists to support specific workarounds or recovery procedures.
    • Identify prerequisites for workarounds or recovery procedures.

    Download Info-Tech’s BCP Process Workarounds & Recovery Checklists Template

    Template Library: Notification, Assessment, Declaration

    Create a procedure that outlines the conditions for assessing a disaster situation and invoking the business continuity plan.

    Use this template to:

    • Guide the process whereby the business is notified of an incident, assesses the situation, and declares a disaster.
    • Set criteria for activating business continuity plans.
    • Review examples of possible events, and suggest options on how the business might proceed or react.

    Download Info-Tech’s BCP Notification, Assessment, and Disaster Declaration Plan template

    Template Library: BCP Recovery Workflow Example

    Review an example of BCP recovery workflows.

    Use this template to:

    • Generate ideas for your own recovery processes.
    • See real examples of recovery processes for warehousing, supply, and distribution operations.
    • Review an example of working BCP documentation.

    Download Info-Tech’s BCP Recovery Workflows Example

    Create a Pandemic Response Plan

    If you’ve been asked to build a pandemic-specific response plan, use your core BCP findings to complete these pandemic planning documents.

    • At the onset of the COVID-19 crisis, IT departments were asked to rapidly ramp up work-from-home capabilities and support other process workarounds.
    • IT managers already knew that obstacles to working from home would go beyond internet speed and needing a laptop. Business input is critical to uncover unexpected obstacles.
    • IT needed to address a range of issues from security risk to increased service desk demand from users who don’t normally work from home.
    • Workarounds to speed the process up had to be balanced with good IT practices and governance (Asset Management, Security, etc.)
    • If you’ve been asked to update your Pandemic Response Plan, use this template and your core BCP deliverables to deliver a set of streamlined documentation that draws on lessons learned from the COVID-19 pandemic.

    Structure HR’s role in the pandemic plan

    Leverage the following materials from Info-Tech’s HR-focused sister company, McLean & Company.

    These HR research resources live on the website of Info-Tech’s sister company, McLean & Company. Contact your Account Manager to gain access to these resources.

    Summary of Accomplishment

    Knowledge Gained

    This blueprint outlined:

    • The streamlined approach to BCP development.
    • A BIA process to identify acceptable, appropriate recovery objectives.
    • Tabletop planning exercises to document and validate business recovery procedures.

    Processes Optimized

    • Business continuity development processes were optimized, from business impact analysis to incident response planning.
    • In addition, pilot business unit processes were identified and clarified to support BCP development, which also provided the opportunity to review and optimize those processes.

    Key Deliverables Completed

    • Core BCP deliverables for the pilot business unit, including a business impact analysis, recovery workflows, and a project roadmap.
    • BCP Executive Presentation to communicate pilot results as well as a summary of the methodology to the executive team.
    • BCP Summary to provide a high-level view of BCP scope, objectives, capabilities, and requirements.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information.

    workshops@infotech.com

    1-888-670-8889

    Research Contributors and Experts

    Dr. Bernard A. Jones, MBCI, CBCP

    Professor and Continuity Consultant Berkeley College

    Dr. Jones is a professor at Berkeley College within the School of Professional Studies teaching courses in Homeland Security and Emergency Management. He is a member of the National Board of Directors for the Association of Continuity Professionals (ACP) as well as the Information & Publications Committee Chair for the Garden State Chapter of the ACP. Dr. Jones earned a doctorate degree in Civil Security Leadership, Management & Policy from New Jersey City University where his research focus was on organizational resilience.

    Kris L. Roberson

    Disaster Recovery Analyst Veterans United Home Loans

    Kris Roberson is the Disaster Recovery Analyst for Veterans United Home Loans, the #1 VA mortgage lender in the US. Kris oversees the development and maintenance of the Veterans United Home Loans DR program and leads the business continuity program. She is responsible for determining the broader strategies for DR testing and continuity planning, as well as the implementation of disaster recovery and business continuity technologies, vendors, and services. Kris holds a Masters of Strategic Leadership with a focus on organizational change management and a Bachelors in Music. She is a member of Infragard, the National Association of Professional Women, and Sigma Alpha Iota, and holds a Project+ certification.

    Trevor Butler

    General Manager of Information Technology City of Lethbridge

    As the General Manager of Information Technology with the City of Lethbridge, Trevor is accountable for providing strategic management and advancement of the city’s information technology and communications systems consistent with the goals and priorities of the corporation while ensuring that corporate risks are appropriately managed. He has 15+ years of progressive IT leadership experience, including 10+ years with public sector organizations. He holds a B.Mgt. and PMP certification along with masters certificates in both Project Management and Business Analysis.

    Robert Miller

    Information Services Director Witt/Kieffer

    Bob Miller is the Information Services Director at Witt/Kieffer. His department provides end-user support for all company-owned devices and software for Oak Brook, the regional offices, home offices, and traveling employees. The department purchases, implements, manages, and monitors the infrastructure, which includes web hosting, networks, wireless solutions, cell phones, servers, and file storage. Bob is also responsible for the firm’s security planning, capacity planning, and business continuity and disaster preparedness planning to ensure that the firm has functional technology to conduct business and continue business growth.

    Related Info-Tech Research

    Create a Right-Sized Disaster Recovery Plan

    Close the gap between your DR capabilities and service continuity requirements.

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind

    Go beyond satisfying auditors to drive process improvement, consistent IT operations, and effective knowledge transfer.

    Select the Optimal Disaster Recovery Deployment Model

    Determine which deployment models, including hybrid solutions, best meet your DR requirements.

    Bibliography

    “Business Continuity Planning.” IT Examination HandBook. The Federal Financial Institution Examination Council (FFIEC), February 2015. Web.

    “Business Continuity Plans and Emergency Contact Information.” FINRA, 12 February 2015. Web.

    “COBIT 5: A Business Framework for the Governance and Management of Enterprise IT.” ISACA, n.d. Web.

    Disaster Resource GUIDE. Emergency Lifeline Corporation, n.d. Web.

    “DR Rules & Regulations.” Disaster Recovery Journal, March 2017. Web.

    “Federal Information Security Management Act (FISMA).” Homeland Security, 2014. Web.

    FEMA. “Planning & Templates.” FEMA, n.d. Web.

    “FINRA-SEC-CFTC Joint Advisory (Regulatory Notice 13-25).” FINRA, August 2013. Web.

    Gosling, Mel and Andrew Hiles. “Business Continuity Statistics: Where Myth Meets Fact.” Continuity Central, 24 April 2009. Web.

    Hanwacker, Linda. “COOP Templates for Success Workbook.” The LSH Group, 2016. Web.

    Potter, Patrick. “BCM Regulatory Alphabet Soup – Part Two.” RSA Link, 28 August 2012. Web.

    The Good Practice Guidelines. Business Continuity Institute, 2013. Web.

    Wang, Dashun and James A. Evans. “When Small Teams are Better than Big Ones.” Harvard Business Review, 21 February 2019. Web.

    Create a Holistic IT Dashboard

    • Buy Link or Shortcode: {j2store}117|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $8,049 Average $ Saved
    • member rating average days saved: 8 Average Days Saved
    • Parent Category Name: Performance Measurement
    • Parent Category Link: /performance-measurement
    • IT leaders do not have a single holistic view of how their 45 IT processes are operating.
    • Expecting any single individual to understand the details of all 45 IT processes is unrealistic.
    • Problems in performance only become evident when the process has already failed.

    Our Advice

    Critical Insight

    • Mature your IT department by measuring what matters.
    • Don’t measure things just because you can; change what you measure as your organization matures.

    Impact and Result

    • Use Info-Tech’s IT Metrics Library to review typical KPIs for each of the 45 process areas and select those that apply to your organization.
    • Configure your IT Management Dashboard to record your selected KPIs and start to measure performance.
    • Set up the cadence for review of the KPIs and develop action plans to improve low-performing indicators.

    Create a Holistic IT Dashboard Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how to develop your KPI program that leads to improved performance.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Choose the KPIs

    Identify the KPIs that matter to your organization’s goals.

    • Create a Holistic IT Dashboard – Phase 1: Choose the KPIs
    • IT Metrics Library

    2. Build the Dashboard

    Use the IT Management Dashboard on the Info-Tech website to display your chosen KPIs.

    • Create a Holistic IT Dashboard – Phase 2: Build the Dashboard

    3. Create the Action Plan

    Use the review of your KPIs to build an action plan to drive performance.

    • Create a Holistic IT Dashboard – Phase 3: Build the Action Plan
    [infographic]

    Workshop: Create a Holistic IT Dashboard

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify What to Measure (Offsite)

    The Purpose

    Determine the KPIs that matter to your organization.

    Key Benefits Achieved

    Identify organizational goals

    Identify IT goals and their organizational goal alignment

    Identify business pain points

    Activities

    1.1 Identify organizational goals.

    1.2 Identify IT goals and organizational alignment.

    1.3 Identify business pain points.

    Outputs

    List of goals and pain points to create KPIs for

    2 Configure the Dashboard Tool (Onsite)

    The Purpose

    Learn how to configure and use the IT Management Dashboard.

    Key Benefits Achieved

    Configured IT dashboard

    Initial IT scorecard report

    Activities

    2.1 Review metrics and KPI best practices.

    2.2 Use the IT Metrics Library.

    2.3 Select the KPIs for your organization.

    2.4 Use the IT Management Dashboard.

    Outputs

    Definition of KPIs to be used, data sources, and ownership

    Configured IT dashboard

    3 Review and Develop the Action Plan

    The Purpose

    Learn how to review and plan actions based on the KPIs.

    Key Benefits Achieved

    Lead KPI review to actions to improve performance

    Activities

    3.1 Create the scorecard report.

    3.2 Interpret the results of the dashboard.

    3.3 Use the IT Metrics Library to review suggested actions.

    Outputs

    Initial IT scorecard report

    Action plan with initial actions

    4 Improve Your KPIs (Onsite)

    The Purpose

    Use your KPIs to drive performance.

    Key Benefits Achieved

    Improve your metrics program to drive effectiveness

    Activities

    4.1 Develop your action plan.

    4.2 Execute the plan and tracking progress.

    4.3 Develop new KPIs as your practice matures.

    Outputs

    Understanding of how to develop new KPIs using the IT Metrics Library

    5 Next Steps and Wrap-Up (Offsite)

    The Purpose

    Ensure all documentation and plans are complete.

    Key Benefits Achieved

    Documented next steps

    Activities

    5.1 Complete IT Metrics Library documentation.

    5.2 Document decisions and next steps.

    Outputs

    IT Metrics Library

    Action plan

    Further reading

    Create a Holistic IT Dashboard

    Mature your IT department by measuring what matters.

    Executive Brief

    Analyst Perspective

    Measurement alone provides only minimal improvements

    It’s difficult for CIOs and other top-level leaders of IT to know if everything within their mandate is being managed effectively. Gaining visibility into what’s happening on the front lines without micromanaging is a challenge most top leaders face.

    Understanding Info-Tech’s Management and Governance Framework of processes that need to be managed and being able to measure what’s important to their organization's success can give leaders the ability to focus on their key responsibilities of ensuring service effectiveness, enabling increased productivity, and creating the ability for their teams to innovate.

    Even if you know what to measure, the measurement alone will lead to minimal improvements. Having the right methods in place to systematically collect, review, and act on those measurements is the differentiator to driving up the maturity of your IT organization.

    The tools in this blueprint can help you identify what to measure, how to review it, and how to create effective plans to improve performance.

    Tony Denford

    Research Director, Info-Tech Research Group

    Executive Summary

    Your Challenge

    • IT leaders do not have a single holistic view of how their IT processes are operating.
    • Expecting any single individual to understand the details of all IT processes is unrealistic.
    • Problems in performance only become evident when the process has already failed.

    Common Obstacles

    • Business changes quickly, and what should be measured changes as a result.
    • Most measures are trailing indicators showing past performance.
    • Measuring alone does not result in improved performance.
    • There are thousands of operational metrics that could be measured, but what are the right ones for an overall dashboard?

    Info-Tech's Approach

    • Use Info-Tech’s IT Metrics Library to review typical KPIs for each of the process areas and select those that apply to your organization.
    • Configure your IT Management Dashboard to record your selected KPIs and start to measure performance.
    • Set up the cadence for review of the KPIs and develop action plans to improve low-performing indicators.

    Info-Tech Insight

    Mature your IT department by aligning your measures with your organizational goals. Acting early when your KPIs deviate from the goals leads to improved performance.

    Your challenge

    This research is designed to help organizations quickly choose holistic measures, review the results, and devise action plans.

    • The sheer number of possible metrics can be overwhelming. Choose metrics from our IT Metrics Library or choose your own, but always ensure they are in alignment with your organizational goals.
    • Ensure your dashboard is balanced across all 45 process areas that a modern CIO is responsible for.
    • Finding leading indicators to allow your team to be proactive can be difficult if your team is focused on the day-to-day operational tasks.
    • It can be time consuming to figure out what to do if an indicator is underperforming.

    Build your dashboard quickly using the toolset in this research and move to improvement actions as soon as possible.

    The image is a bar graph, titled KPI-based improvements. On the X-axis are four categories, each with one bar for Before KPIs and another for After KPIs. The categories are: Productivity; Fire Incidents; Request Response Time; and Savings.

    Productivity increased by 30%

    Fire/smoke incidents decreased by 25% (high priority)

    Average work request response time reduced by 64%

    Savings of $1.6 million in the first year

    (CFI, 2013)

    Common obstacles

    These barriers make this challenge difficult to address for many organizations:

    • What should be measured can change over time as your organization matures and the business environment changes. Understanding what creates business value for your organization is critical.
    • Organizations almost always focus on past result metrics. While this is important, it will not indicate when you need to adjust something until it has already failed.
    • It’s not just about measuring. You also need to review the measures often and act on the biggest risks to your organization to drive performance.

    Don’t get overwhelmed by the number of things you can measure. It can take some trial and error to find the measures that best indicate the health of the process.

    The importance of frequent review

    35% - Only 35% of governing bodies review data at each meeting. (Committee of University Chairs, 2008)

    Common obstacles

    Analysis paralysis

    Poor data can lead to incorrect conclusions, limit analysis, and undermine confidence in the value of your dashboard.

    Achieving perfect data is extremely time consuming and may not add much value. It can also be an excuse to avoid getting started with metrics and analytics.

    Data quality is a struggle for many organizations. Consider how much uncertainty you can tolerate in your analysis and what would be required to improve your data quality to an acceptable level. Consider cost, technological resources, people resources, and time required.

    Info-Tech Insight

    Analytics are only as good as the data that informs it. Aim for just enough data quality to make informed decisions without getting into analysis paralysis.

    Common obstacles

    The problem of surrogation

    Tying KPIs and metrics to performance often leads to undesired behavior. An example of this is the now infamous Wells Fargo cross-selling scandal, in which 3.5 million credit card and savings accounts were opened without customers’ consent when the company incented sales staff to meet cross-selling targets.

    Although this is an extreme example, it’s an all-too-common phenomenon.

    A focus on the speed of closure of tickets often leads to shortcuts and lower-quality solutions.

    Tying customer value to the measures can align the team on understanding the objective rather than focusing on the measure itself, and the team will no longer be able to ignore the impact of their actions.

    Surrogation is a phenomenon in which a measure of a behavior replaces the intent of the measure itself. People focus on achieving the measure instead of the behavior the measure was intended to drive.

    Info-Tech’s thought model

    The Threefold Role of the IT Executive Core CIO Objectives
    IT Organization - Manager A - Optimize the Effectiveness of the IT Organization
    Enterprise - Partner B - Boost the Productivity of the Enterprise
    Market - Innovator C - Enable Business Growth Through Technology

    Low-Maturity Metrics Program

    Trailing indicators measure the outcomes of the activities of your organization. Hopefully, the initiatives and activities are aligned with the organizational goals.

    High-Maturity Metrics Program

    The core CIO objectives align with the organizational goals, and teams define leading indicators that show progress toward those goals. KPIs are reviewed often and adjustments are made to improve performance based on the leading indicators. The results are improved outcomes, greater transparency, and increased predictability.

    The image is a horizontal graphic with multiple text boxes. The first (on the left) is a box that reads Organizational Goals, second a second box nested within it that reads Core CIO Objectives. There is an arrow pointing from this box to the right. The arrow connects to a text box that reads Define leading indicators that show progress toward objectives. To the right of that, there is a title Initiatives & activities, with two boxes beneath it: Processes and Projects. Below this middle section, there is an arrow pointing left, with the text: Adjust behaviours. After this, there is an arrow pointing right, to a box with the title Outcomes, and the image of an unlabelled bar graph.

    Info-Tech’s approach

    Adopt an iterative approach to develop the right KPIs for your dashboard

    Periodically: As appropriate, review the effectiveness of the KPIs and adjust as needed.

    Frequently: At least once per month, but the more frequent, the more agility your organization will have.

    The image shows a series of steps in a process, each connected by an arrow. The process is iterative, so the steps circle back on themselves, and repeat. The process begins with IT Metrics Library, then Choose or build KPIs, then Build Dashboard, then Review KPIs and Create action plan. Review KPIs and Create action plan are steps that the graphic indicates should be repeated, so the arrows are arranged in a circle around these two items. Following that, there is an additional step: Are KPIs and action plans leading to improved results? After this step, we return to the Choose or build KPIs step.

    The Info-Tech difference:

    1. Quickly identify the KPIs that matter to your organization using the IT Metrics Library.
    2. Build a presentable dashboard using the IT Management Dashboard available on the Info-Tech website.
    3. When indicators show underperformance, quickly get them back on track using the suggested research in the IT Metrics Library.
    4. If your organization’s needs are different, define your own custom metrics using the same format as the IT Metrics Library.
    5. Use the action plan tool to keep track of progress

    Info-Tech’s methodology for creating a holistic IT dashboard

    1. Choose the KPIs 2. Build the Dashboard 3. Create the Action Plan
    Phase Steps
    1. Review available KPIs
    2. Select KPIs for your organization
    3. Identify data sources and owners
    1. Understand how to use the IT Management Dashboard
    2. Build and review the KPIs
    1. Prioritize low-performing indicators
    2. Review suggested actions
    3. Develop your action plan
    Phase Outcomes A defined and documented list of the KPIs that will be used to monitor each of the practice areas in your IT mandate A configured dashboard covering all the practice areas and the ability to report performance in a consistent and visible way An action plan for addressing low-performing indicators

    Insight summary

    Mature your IT department by aligning your measures with your organizational goals. Acting early when your KPIs deviate from the goals leads to improved performance.

    Don’t just measure things because you can. Change what you measure as your organization becomes more mature.

    Select what matters to your organization

    Measure things that will resolve pain points or drive you toward your goals.

    Look for indicators that show the health of the practice, not just the results.

    Review KPIs often

    Ease of use will determine the success of your metrics program, so keep it simple to create and review the indicators.

    Take action to improve performance

    If indicators are showing suboptimal performance, develop an action plan to drive the indicator in the right direction.

    Act early and often.

    Measure what your customers value

    Ensure you understand what’s valued and measure whether the value is being produced. Let front-line managers focus on tactical measures and understand how they are linked to value.

    Look for predictive measures

    Determine what action will lead to the desired result and measure if the action is being performed. It’s better to predict outcomes than react to them.

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    IT Metrics Library

    Customize the KPIs for your organization using the IT Metrics Library

    IT Metrics Library Action Plan

    Keep track of the actions that are generated from your KPI review

    Key deliverable:

    IT Management Dashboard and Scorecard

    The IT Overall Scorecard gives a holistic view of the performance of each IT function

    Blueprint benefits

    IT Benefits

    • An IT dashboard can help IT departments understand how well they are performing against key indicators.
    • It can allow IT teams to demonstrate to their business partners the areas they are focusing on.
    • Regular review and action planning based on the results will lead to improved performance, efficiency, and effectiveness.
    • Create alignment of IT teams by focusing on common areas of performance.

    Business Benefits

    • Ensure alignment and transparency between the business and IT.
    • Understand the value that IT brings to the operation and strategic initiatives of your organization.
    • Understand the contribution of the IT team to achieving business outcomes.
    • Focus IT on the areas that are important to you by requesting new measures as business needs change.

    Measure the value of this blueprint

    Utilize the existing IT Metrics Library and IT Dashboard tools to quickly kick off your KPI program

    • Developing the metrics your organization should track can be very time consuming. Save approximately 120 hours of effort by choosing from the IT Metrics Library.
    • The need for a simple method to display your KPIs means either developing your own tool or buying one off the shelf. Use the IT Management Dashboard to quickly get your KPI program up and running. Using these tools will save approximately 480 hours.
    • The true value of this initiative comes from using the KPIs to drive performance.

    Keeping track of the number of actions identified and completed is a low overhead measure. Tracking time or money saved is higher overhead but also higher value.

    The image is a screen capture of the document titled Establish Baseline Metrics. It shows a table with the headings: Metric, Current, Goal.

    The image is a chart titled KPI benefits. It includes a legend indicating that blue bars are for Actions identified, purple bars are for Actions completed, and the yellow line is for Time/money saved. The graph shows Q1-Q4, indicating an increase in all areas across the quarters.

    Executive Brief Case Study

    Using data-driven decision making to drive stability and increase value

    Industry: Government Services

    Source: Info-Tech analyst experience

    Challenge

    A newly formed application support team with service desk responsibilities was becoming burned out due to the sheer volume of work landing on their desks. The team was very reactive and was providing poor service due to multiple conflicting priorities.

    To make matters worse, there was a plan to add a major new application to the team’s portfolio.

    Solution

    The team began to measure the types of work they were busy doing and then assessed the value of each type of work.

    The team then problem solved how they could reduce or eliminate their low-value workload.

    This led to tracking how many problems were being resolved and improved capabilities to problem solve effectively.

    Results

    Upon initial data collection, the team was performing 100% reactive workload. Eighteen months later slightly more than 80% of workload was proactive high-value activities.

    The team not only was able to absorb the additional workload of the new application but also identified efficiencies in their interactions with other teams that led to a 100% success rate in the change process and a 92% decrease in resource needs for major incidents.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostic and consistent frameworks are used throughout all four options.

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 - Choose the KPIs

    Call #1: Scope dashboard and reporting needs.

    Call #2: Learn how to use the IT Metrics Library to select your metrics.

    Phase 2 – Build the Dashboard

    Call #3: Set up the dashboard.

    Call #4: Capture data and produce the report.

    Phase 3 – Create the Action Plan

    Call #5: Review the data and use the metrics library to determine actions.

    Call #6: Improve the KPIs you measure.

    A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 5 and 8 calls over the course of 2 to 3 months.

    Workshop Overview

    Contact your account representative for more information.

    workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5
    Identify What to Measure Configure the Dashboard Tool Review and Develop the Action Plan Improve Your KPIs Compile Workshop Output
    Activities

    1.1 Identify organizational goals.

    1.2 Identify IT goals and organizational alignment.

    1.3 Identify business pain points.

    2.1 Determine metrics and KPI best practices.

    2.2 Learn how to use the IT Metrics Library.

    2.3 Select the KPIs for your organization.

    2.4 Configure the IT Management Dashboard.

    3.1 Create the scorecard report.

    3.2 Interpret the results of the dashboard.

    3.3 Use the IT Metrics Library to review suggested actions.

    4.1 Develop your action plan.

    4.2 Execute the plan and track progress.

    4.3 Develop new KPIs as your practice matures.

    5.1 Complete the IT Metrics Library documentation.

    5.2 Document decisions and next steps.

    Outcomes 1. List of goals and pain points that KPIs will measure

    1. Definition of KPIs to be used, data sources, and ownership

    2. Configured IT dashboard

    1. Initial IT scorecard report

    2. Action plan with initial actions

    1. Understanding of how to develop new KPIs using the IT Metrics Library

    1. IT Metrics Library documentation

    2. Action plan

    Phase 1

    Choose the KPIs

    Phase 1

    1.1 Review Available KPIs

    1.2 Select KPIs for Your Org.

    1.3 Identify Data Sources and Owners

    Phase 2

    2.1 Understand the IT Management Dashboard

    2.2 Build and Review the KPIs

    Phase 3

    3.1 Prioritize Low-Performing Indicators

    3.2 Review Suggested Actions

    3.3 Develop the Action Plan

    This phase will walk you through the following activities:

    Reviewing and selecting the KPIs suggested in the IT Metrics Library.

    Identifying the data source for the selected KPI and the owner responsible for data collection.

    This phase involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Step 1.1

    Review Available KPIs

    Activities

    1.1.1 Download the IT Metrics Library and review the KPIs for each practice area.

    Choose the KPIs

    Step 1.1 – Review Available KPIs

    Step 1.2 – Select KPIs for Your Org.

    Step 1.3 – Identify Data Sources and owners

    This step will walk you through the following activities:

    Downloading the IT Metrics Library

    Understanding the content of the tool

    Reviewing the intended goals for each practice area

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    Downloaded tool ready to select the KPIs for your organization

    Using the IT Metrics Library

    Match the suggested KPIs to the Management and Governance Framework

    The “Practice” and “Process” columns relate to each of the boxes on the Info-Tech Management and Governance Framework. This ensures you are measuring each area that needs to be managed by a typical IT department.

    The image shows a table on the left, and on the right, the Info-Tech Management and Governance Structure. Sections from the Practice and Process columns of the table have arrows emerging from them, pointing to matching sections in the framework.

    Using the IT Metrics Library

    Content for each entry

    KPI - The key performance indicator to review

    CSF - What needs to happen to achieve success for each goal

    Goal - The goal your organization is trying to achieve

    Owner - Who will be accountable to collect and report the data

    Data Source (typical) - Where you plan to get the data that will be used to calculate the KPI

    Baseline/Target - The baseline and target for the KPI

    Rank - Criticality of this goal to the organization's success

    Action - Suggested action if KPI is underperforming

    Blueprint - Available research to address typical underperformance of the KPI

    Practice/Process - Which practice and process the KPI represents

    1.1.1 Download the IT Metrics Library

    Input

    • IT Metrics Library

    Output

    • Ideas for which KPIs would be useful to track for each of the practice areas

    Materials

    • Whiteboard/flip charts

    Participants

    • IT senior leadership
    • Process area owners
    • Metrics program owners and administrators

    4 hours

    1. Click the link below to download the IT Metrics Library spreadsheet.
    2. Open the file and select the “Data Entry” tab.
    3. The sheet has suggested KPIs for each of the 9 practice areas and 45 processes listed in the Info-Tech Management and Governance Framework. You can identify this grouping in the “Practice” and “Process” columns.
    4. For each practice area, review the suggested KPIs and their associated goals and discuss as a team which of the KPIs would be useful to track in your organization.

    Download the IT Metrics Library

    Step 1.2

    Select KPIs for Your Organization

    Activities

    1.2.1 Select the KPIs that will drive your organization forward

    1.2.2 Remove unwanted KPIs from the IT Metrics Library

    Choose the KPIs

    Step 1.1 – Review Available KPIs

    Step 1.2 – Select KPIs for Your Org.

    Step 1.3 – Identify Data Sources and Owners

    This step will walk you through the following activities:

    • Selecting the KPIs for your organization and removing unwanted KPIs from IT Metrics Library

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    A shortlist of selected KPIs

    1.2.1 Select the KPIs that will drive your organization forward

    Input

    • IT Metrics Library

    Output

    • KPIs would be useful to track for each of the practice areas

    Materials

    • IT Metrics Library

    Participants

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    4 hours

    1. Review the suggested KPIs for each practice area and review the goal.
    2. Some suggested KPIs are similar, so make sure the goal is appropriate for your organization.
    3. Pick up to three KPIs per practice.

    1.2.2 Remove unwanted KPIs

    Input

    • IT Metrics Library

    Output

    • KPIs would be useful to track for each of the practice areas

    Materials

    • IT Metrics Library

    Participants

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    0.5 hours

    1. To remove unwanted KPIs from the IT Metric Library Tool, select the unwanted row, right-click on the row, and delete it.
    2. The result should be up to three KPIs per practice area left on the spreadsheet.

    Step 1.3

    Identify data sources and owners

    Activities

    1.3.1 Document the data source

    1.3.2 Document the owner

    1.3.3 Document baseline and target

    Choose the KPIs

    Step 1.1 – Review Available KPIs

    Step 1.2 – Select KPIs for Your Org.

    Step 1.3 – Identify Data Sources and Owners

    This step will walk you through the following activities:

    Documenting for each KPI where you plan to get the data, who is accountable to collect and report the data, what the current baseline is (if available), and what the target is

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    A list of KPIs for your organization with appropriate attributes documented

    1.3 Identify data sources, owners, baseline, and target

    Input

    • IT Metrics Library

    Output

    • Completed IT Metrics Library

    Materials

    • IT Metrics Library

    Participants

    • Process area owners
    • Metrics program owners and administrators

    2 hours

    1. For each selected KPI, complete the owner, data source, baseline, and target if the information is available.
    2. If the information is not available, document the owner and assign them to complete the other columns.

    Phase 2

    Build the Dashboard

    Phase 1

    1.1 Review Available KPIs

    1.2 Select KPIs for Your Org.

    1.3 Identify Data Sources and Owners

    Phase 2

    2.1 Understand the IT Management Dashboard

    2.2 Build and Review the KPIs

    Phase 3

    3.1 Prioritize Low-Performing Indicators

    3.2 Review Suggested Actions

    3.3 Develop the Action Plan

    This phase will walk you through the following activities:

    Understanding the IT Management Dashboard

    Configuring the IT Management Dashboard and entering initial measures

    Produce thing IT Scorecard from the IT Management Dashboard

    Interpreting the results

    This phase involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Step 2.1

    Understand the IT Management Dashboard

    Activities

    2.1.1 Logging into the IT Management Dashboard

    2.1.2 Understanding the “Overall Scorecard” tab

    2.1.3 Understanding the “My Metrics” tab

    Build the Dashboard

    Step 2.1 – Understand the IT Management Dashboard

    Step 2.2 – Build and review the KPIs

    This step will walk you through the following activities:

    Accessing the IT Management Dashboard

    Basic functionality of the tool

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    Understanding of how to administer the IT Management Dashboard

    2.1.1 Logging into the IT Management Dashboard

    Input

    • Info-Tech membership

    Output

    • Access to the IT Management Dashboard

    Materials

    • Web browser

    Participants

    • Metrics program owners and administrators

    0.5 hours

    1. Using your web browser, access your membership at infotech.com.
    2. Log into your Info-Tech membership account.
    3. Select the “My IT Dashboard” option from the menu (circled in red).
    4. If you cannot gain access to the tool, contact your membership rep.

    The image is a screen capture of the Info-Tech website, with the Login button at the top right of the window circled in red.

    2.1.2 Understanding the “Overall Scorecard” tab

    0.5 hours

    1. Once you select “My IT Dashboard,” you will be in the “Overall Scorecard” tab view.
    2. Scrolling down reveals the data entry form for each of the nine practice areas in the Info-Tech Management and Governance Framework, with each section color-coded for easy identification.
    3. Each of the section headers, KPI names, data sources, and data values can be updated to fit the needs of your organization.
    4. This view is designed to show a holistic view of all areas in IT that are being managed.

    2.1.3 Understanding the “My Metrics” tab

    0.5 hours

    1. On the “My Metrics” tab you can access individual scorecards for each of the nine practice areas.
    2. Below the “My Metrics” tab is each of the nine practice areas for you to select from. Each shows a different subset of KPIs specific to the practice.
    3. The functionality of this view is the same as the overall scorecard. Each title, KPI, description, and actuals are editable to fit your organization’s needs.
    4. This blueprint does not go into detail on this tab, but it is available to be used by practice area leaders in the same way as the overall scorecard.

    Step 2.2

    Build and review the KPIs

    Activities

    2.2.1 Entering the KPI descriptions

    2.2.2 Entering the KPI actuals

    2.2.3 Producing the IT Overall Scorecard

    Build the Dashboard

    Step 2.1 – Understand the IT Management Dashboard

    Step 2.2 – Build and review the KPIs

    This step will walk you through the following activities:

    Entering the KPI descriptions

    Entering the actuals for each KPI

    Producing the IT Overall Scorecard

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    An overall scorecard indicating the selected KPI performance

    2.2.1 Entering the KPI descriptions

    Input

    • Access to the IT Management Dashboard
    • IT Metrics Library with your organization’s KPIs selected

    Output

    • KPI descriptions entered into tool

    Materials

    • Web browser

    Participants

    • Metrics program owners and administrators

    1 hour

    1. Navigate to the IT Management Dashboard as described in section 2.1.1 and scroll down to the practice area you wish to complete.
    2. If needed, modify the section name to match your organization’s needs.
    3. Select “Add another score.”

    2.2.1 Entering the KPI descriptions

    1 hour

    1. Select if your metric is a custom metric or a standard metric available from one of the Info-Tech diagnostic tools.
    2. Enter the metric name you selected from the IT Metrics Library.
    3. Select the value type.
    4. Select the “Add Metric” button.
    5. The descriptions only need to be entered when they change.

    Example of a custom metric

    The image is a screen capture of the Add New Metric function. The metric type selected is Custom metric, and the metric name is Employee Engagement. There is a green Add Metric button, which is circled in red.

    Example of a standard metric

    The image is a screen capture of the Add New Metric function. The metric type selected is Standard Metric. The green Add Metric button at the bottom is circled in red.

    2.2.2 Entering the KPI actuals

    Input

    • Actual data from each data source identified

    Output

    • Actuals recorded in tool

    Materials

    • Web browser

    Participants

    • Metrics program owners and administrators

    1 hour

    1. Select the period you wish to create a scorecard for by selecting “Add New Period” or choosing one from the drop-down list.
    2. For each KPI on your dashboard, collect the data from the data source and enter the actuals.
    3. Select the check mark (circled) to save the data for the period.

    The image is a screen capture of the My Overall Scorecard Metrics section, with a button at the bottom that reads Add New Period circled in red

    The image has the text People and Resources at the top. It shows data for the KPI, and there is a check mark circled in red.

    2.2.3 Producing the IT Overall Scorecard

    Input

    • Completed IT Overall Scorecard data collection

    Output

    • IT Overall Scorecard

    Materials

    • Web browser

    Participants

    • Metrics program owners and administrators

    0.5 hours

    1. Select the period you wish to create a scorecard for by selecting from the drop-down list.
    2. Click the “Download as PDF” button to produce the scorecard.
    3. Once the PDF is produced it is ready for review or distribution.

    Phase 3

    Create the Action Plan

    Phase 1

    1.1 Review Available KPIs

    1.2 Select KPIs for Your Org.

    1.3 Identify Data Sources and Owners

    Phase 2

    2.1 Understand the IT Management Dashboard

    2.2 Build and Review the KPIs

    Phase 3

    3.1 Prioritize Low-Performing Indicators

    3.2 Review Suggested Actions

    3.3 Develop the Action Plan

    This phase will walk you through the following activities:

    Prioritizing low-performing indicators

    Using the IT Metrics Library to review suggested actions

    Developing your team’s action plan to improve performance

    This phase involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Step 3.1

    Prioritize low-performing indicators

    Activities

    3.1.1 Determine criteria for prioritization

    3.1.2 Identify low-performing indicators

    3.1.3 Prioritize low-performing indicators

    Create the action plan

    Step 3.1 – Prioritize low-performing indicators

    Step 3.2 – Review suggested actions

    Step 3.3 – Develop the action plan

    This step will walk you through the following activities:

    Determining the criteria for prioritization of low-performing indicators

    Identifying low-performing indicators

    Prioritizing the low-performing indicators

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    A prioritized list of low-performing indicators that need remediation

    3.1.1 Determine criteria for prioritization

    Often when metrics programs are established, there are multiple KPIs that are not performing at the desired level. It’s easy to expect the team to fix all the low-performing indicators, but often teams are stretched and have conflicting priorities.

    Therefore it’s important to spend some time to prioritize which of your indicators are most critical to the success of your business.

    Also consider, if one area is performing well and others have multiple poor indicators, how do you give the right support to optimize the results?

    Lastly, is it better to score slightly lower on multiple measures or perfect on most but failing badly on one or two?

    3.1.1 Determine criteria for prioritization

    Input

    • Business goals and objectives
    • IT goals and objectives
    • IT organizational structure

    Output

    • Documented scorecard remediation prioritization criteria

    Materials

    • Whiteboard or flip charts

    Participants

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    1 hour

    1. Identify any KPIs that are critical and cannot fail without high impact to your organization.
    2. Identify any KPIs that cannot fail for an extended period and document the time period.
    3. Rank the KPIs from most critical to least critical in the IT Metrics Library.
    4. Look at the owner accountable for the performance of each KPI. If there are any large groups, reassess the ownership or rank.
    5. Periodically review the criteria to see if they’re aligned with meeting current business goals.

    3.1.2 Identify low-performing indicators

    Input

    • Overall scorecard
    • Overall scorecard (previous period)
    • IT Metrics Library

    Output

    • List of low-performing indicators that need remediation
    • Planned actions to improve performance

    Materials

    • Whiteboard or flip charts

    Participants

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    1 hour

    1. Review the overall scorecard for the current period. List any KPIs that are not meeting the target for the current month in the “Action Plan” tab of the IT Metrics Library.
    2. Compare current month to previous month. List any KPIs that are moving away from the long-term target documented in the tool IT Metrics Library.
    3. Revise the target in the IT Metrics Library as business needs change.

    3.1.3 Prioritize low-performing indicators

    Input

    • IT Metrics Library

    Output

    • Prioritized list of planned actions for low-performing indicators

    Materials

    • IT Metrics Library

    Participants

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators
    • Task owners

    1 hour

    1. Look through the list of new and outstanding planned actions in the “Action Plan” tab of the IT Metrics Library, review progress, and prioritize outstanding items.
    2. Compare the list that needs remediation with the rank in the data entry tab.
    3. Adjust the priority of the outstanding and new actions to reflect the business needs.

    Step 3.2

    Review suggested actions

    Activities

    3.2.1 Review suggested actions in the IT Metrics Library

    Create the Action Plan

    Step 3.1 – Prioritize low-performing indicators

    Step 3.2 – Review suggested actions

    Step 3.3 – Develop the action plan

    This step will walk you through the following activities:

    Reviewing the suggested actions in the IT Metrics Library

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    An idea of possible suggested actions

    Take Action

    Knowing where you are underperforming is only half the battle. You need to act!

    • So far you have identified which indicators will tell you whether or not your team is performing and which indicators are most critical to your business success.
    • Knowing is the first step, but things will not improve without some kind of action.
    • Sometimes the action needed to course-correct is small and simple, but sometimes it is complicated and may take a long time.
    • Utilize the diverse ideas of your team to find solutions to underperforming indicators.
    • If you don’t have a viable simple solution, leverage the IT Metrics Library, which suggests high-level action needed to improve each indicator. If you need additional information, use your Info-Tech membership to review the recommended research.

    3.2.1 Review suggested actions in the IT Metrics Library

    Input

    • IT Metrics Library

    Output

    • Suggested actions

    Materials

    • IT Metrics Library

    Participants

    • Process area owners
    • Metrics program owners and administrators
    • Task owners

    0.5 hours

    1. For each of your low-performing indicators, review the suggested action and related research in the IT Metrics Library.

    Step 3.3

    Develop the action plan

    Activities

    3.3.1 Document planned actions

    3.3.2 Assign ownership of actions

    3.3.3 Determine timeline of actions

    3.3.4 Review past action status

    Create the action plan

    Step 3.1 – Prioritize low- performing indicators

    Step 3.2 – Review suggested actions

    Step 3.3 – Develop the action plan

    This step will walk you through the following activities:

    Using the action plan tool to document the expected actions for low-performing indicators

    Assigning an owner and expected due date for the action

    Reviewing past action status for accountability

    This step involves the following participants:

    • Senior IT leadership
    • Process area owners
    • Metrics program owners and administrators

    Outcomes of this step

    An action plan to invoke improved performance

    3.3.1 Document planned actions

    Input

    • IT Metrics Library

    Output

    • Planned actions

    Materials

    • IT Metrics Library

    Participants

    • Process area owners
    • Metrics program owners and administrators
    • Task owners

    1 hour

    1. Decide on the action you plan to take to bring the indicator in line with expected performance and document the planned action in the “Action Plan” tab of the IT Metrics Library.

    Info-Tech Insight

    For larger initiatives try to break the task down to what is likely manageable before the next review. Seeing progress can motivate continued action.

    3.3.2 Assign ownership of actions

    Input

    • IT Metrics Library

    Output

    • Identified owners for each action

    Materials

    • IT Metrics Library

    Participants

    • Process area owners
    • Metrics program owners and administrators
    • Task owners

    0.5 hours

    1. For each unassigned task, assign clear ownership for completion of the task.
    2. The task owner should be the person accountable for the task.

    Info-Tech Insight

    Assigning clear ownership can promote accountability for progress.

    3.3.3 Determine timeline of actions

    Input

    • IT Metrics Library

    Output

    • Expected timeline for each action

    Materials

    • IT Metrics Library

    Participants

    • Process area owners
    • Metrics program owners and administrators
    • Task owners

    0.5 hours

    1. For each task, agree on an estimated target date for completion.

    Info-Tech Insight

    If the target completion date is too far in the future, break the task into manageable chunks.

    3.3.4 Review past action status

    Input

    • IT Metrics Library

    Output

    • Complete action plan for increased performance

    Materials

    • IT Metrics Library

    Participants

    • Process area owners
    • Metrics program owners and administrators
    • Task owners

    0.5 hours

    1. For each task, review the progress since last review.
    2. If desired progress is not being made, adjust your plan based on your organizational constraints.

    Info-Tech Insight

    Seek to understand the reasons that tasks are not being completed and problem solve for creative solutions to improve performance.

    Measure the value of your KPI program

    KPIs only produce value if they lead to action

    • Tracking the performance of key indicators is the first step, but value only comes from taking action based on this information.
    • Keep track of the number of action items that come out of your KPI review and how many are completed.
    • If possible, keep track of the time or money saved through completing the action items.

    Keeping track of the number of actions identified and completed is a low overhead measure.

    Tracking time or money saved is higher overhead but also higher value.

    The image is a chart titled KPI benefits. It includes a legend indicating that blue bars are for Actions identified, purple bars are for Actions completed, and the yellow line is for Time/money saved. The graph shows Q1-Q4, indicating an increase in all areas across the quarters.

    Establish Baseline Metrics

    Baseline metrics will be improved through:

    1. Identifying actions needed to remediate poor-performing KPIs
    2. Associating time and/or money savings as a result of actions taken
    Metric Current Goal
    Number of actions identified per month as a result of KPI review 0 TBD
    $ saved through actions taken due to KPI review 0 TBD
    Time saved through actions taken due to KPI review 0 TBD

    Summary of Accomplishment

    Problem Solved

    Through this project we have identified typical key performance indicators that are important to your organization’s effective management of IT.

    You’ve populated the IT Management Dashboard as a simple method to display the results of your selected KPIs.

    You’ve also established a regular review process for your KPIs and have a method to track the actions that are needed to improve performance as a result of the KPI review. This should allow you to hold individuals accountable for improvement efforts.

    You can also measure the effectiveness of your KPI program by tracking how many actions are identified as a result of the review. Ideally you can also track the money and time savings.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information.

    workshops@infotech.com

    1-888-670-8889

    Additional Support

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

    Contact your account representative for more information.

    workshops@infotech.com 1-888-670-8889

    To accelerate this project, engage your IT team in an Info-Tech Workshop with an Info-Tech analyst team.

    Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    Select the KPIs for your organization

    Examine the benefits of the KPIs suggested in the IT Metrics Library and help selecting those that will drive performance for your maturity level.

    Build an action plan

    Discuss options for identifying and executing actions that result from your KPI review. Determine how to set up the discipline needed to make the most of your KPI review program.

    Research Contributors and Experts

    Valence Howden

    Principal Research Director, CIO – Service Management Info-Tech Research Group

    • Valence has extensive experience in helping organizations be successful through optimizing how they govern themselves, how they design and execute strategies, and how they drive service excellence in all work.

    Tracy-Lynn Reid

    Practice Lead, CIO – People & Leadership Info-Tech Research Group

    • Tracy-Lynn covers key topics related to People & Leadership within an information technology context.

    Fred Chagnon

    Practice Lead, Infrastructure & Operations Info-Tech Research Group

    • Fred brings extensive practical experience in all aspects of enterprise IT Infrastructure, including IP networks, server hardware, operating systems, storage, databases, middleware, virtualization and security.

    Aaron Shum

    Practice Lead, Security, Risk & Compliance Info-Tech Research Group

    • With 20+ years of experience across IT, InfoSec, and Data Privacy, Aaron currently specializes in helping organizations implement comprehensive information security and cybersecurity programs as well as comply with data privacy regulations.

    Cole Cioran

    Practice Lead, Applications and Agile Development Info-Tech Research Group

    • Over the past twenty-five years, Cole has developed software; designed data, infrastructure, and software solutions; defined systems and enterprise architectures; delivered enterprise-wide programs; and managed software development, infrastructure, and business systems analysis practices.

    Barry Cousins

    Practice Lead, Applications – Project and Portfolio Mgmt. Info-Tech Research Group

    • Barry specializes in Project Portfolio Management, Help/Service Desk, and Telephony/Unified Communications. He brings an extensive background in technology, IT management, and business leadership.

    Jack Hakimian

    Vice President, Applications Info-Tech Research Group

    • Jack has close to 25 years of Technology and Management Consulting experience. He has served multi-billion-dollar organizations in multiple industries, including Financial Services and Telecommunications. Jack also served several large public sector institutions.

    Vivek Mehta

    Research Director, CIO Info-Tech Research Group

    • Vivek publishes on topics related to digital transformation and innovation. He is the author of research on Design a Customer-Centric Digital Operating Model and Create Your Digital Strategy as well as numerous keynotes and articles on digital transformation.

    Carlos Sanchez

    Practice Lead, Enterprise Applications Info-Tech Research Group

    • Carlos has a breadth of knowledge in enterprise applications strategy, planning, and execution.

    Andy Neill

    Practice Lead, Enterprise Architecture, Data & BI Info-Tech Research Group

    • Andy has extensive experience in managing technical teams, information architecture, data modeling, and enterprise data strategy.

    Michael Fahey

    Executive Counselor Info-Tech Research Group

    • As an Executive Counselor, Mike applies his decades of business experience and leadership, along with Info-Tech Research Group’s resources, to assist CIOs in delivering outstanding business results.

    Related Info-Tech Research

    Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

    • Reinforce service orientation in your IT organization by ensuring your IT metrics generate value-driven resource behavior.

    Use Applications Metrics That Matter

    • It all starts with quality and customer satisfaction.

    Take Control of Infrastructure Metrics

    • Master the metrics maze to help make decisions, manage costs, and plan for change.

    Bibliography

    Bach, Nancy. “How Often Should You Measure Your Organization's KPIs?” EON, 26 June 2018. Accessed Jan. 2020.

    “The Benefits of Tracking KPIs – Both Individually and for a Team.” Hoopla, 30 Jan. 2017. Accessed Jan. 2020.

    Chepul, Tiffany. “Top 22 KPI Examples for Technology Companies.” Rhythm Systems, Jan. 2020. Accessed Jan. 2020.

    Cooper, Larry. “CSF's, KPI's, Metrics, Outcomes and Benefits” itSM Solutions. 5 Feb. 2010. Accessed Jan 2020.

    “CUC Report on the implementation of Key Performance Indicators: case study experience.” Committee of University Chairs, June 2008. Accessed Jan 2020.

    Harris, Michael, and Bill Tayler. “Don’t Let Metrics Undermine Your Business.” HBR, Sep.–Oct 2019. Accessed Jan. 2020.

    Hatari, Tim. “The Importance of a Strong KPI Dashboard.” TMD Coaching. 27 Dec. 2018. Accessed Jan. 2020.

    Roy, Mayu, and Marian Carter. “The Right KPIs, Metrics for High-performing, Cost-saving Space Management.” CFI, 2013. Accessed Jan 2020.

    Schrage, Michael, and David Kiron. “Leading With Next-Generation Key Performance Indicators.” MIT Sloan Management Review, 26 June 2018. Accessed Jan. 2020.

    Setijono, Djoko, and Jens J. Dahlgaard. “Customer value as a key performance indicator (KPI) and a key improvement indicator (KII)” Emerald Insight, 5 June 2007. Accessed Jan 2020.

    Skinner, Ted. “Balanced Scorecard KPI Examples: Comprehensive List of 183 KPI Examples for a Balanced Scorecard KPI Dashboard (Updated for 2020).” Rhythm Systems, Jan. 2020. Accessed Jan 2020.

    Wishart, Jessica. “5 Reasons Why You Need The Right KPIs in 2020” Rhythm Systems, 1 Feb. 2020. Accessed Jan. 2020.

    Define and Deploy an Enterprise PMO

    • Buy Link or Shortcode: {j2store}189|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $471,249 Average $ Saved
    • member rating average days saved: 53 Average Days Saved
    • Parent Category Name: Project Management Office
    • Parent Category Link: /project-management-office
    • As an enterprise PMO leader, you need to evolve your PMO framework beyond an IT-centric model of project portfolio management (PPM) to optimize communication and coordination on enterprise-wide initiatives.
    • While senior leaders are demanding greater uniformity in strategic project execution, individual departments currently operate—to the detriment of the organization—as sovereign silos.
    • You know that the answer is a more strategically aligned enterprise PMO framework, but you’re unsure of how to start building the case for one, especially when the majority of upper management view PMOs as support entities rather than strategic partners.

    Our Advice

    Critical Insight

    • An EPMO can’t simply be imposed on an organization. If it is not backed by an executive sponsor, then there needs to be an identifiable business value in implementing one, and you need to communicate this value to stakeholders throughout the enterprise.
    • EPMOs add value not by enforcing project or program governance, but by helping organizations achieve strategic goals and manage change.
    • EPMOs enable organizations to succeed on enterprise-wide initiatives by connecting the individual parts to the whole. They should serve as the coordinating mechanism that ensures the flow of information and resources across departments and programs.

    Impact and Result

    • Find the right balance between a command and control approach that dictates governance standards versus an approach that gives business units flexibility to manage projects, programs, and portfolios the way they see fit, as long as they meet certain reporting, process, and record keeping requirements.
    • Effectively define the EPMO’s role, reach, and authority in terms of Portfolio Governance, Project Leadership, and PPM Administration. An organizationally appropriate mix of these three practices will not only ensure stakeholder buy-in, but it will help foster the right conditions for EPMO success.
    • Build strong cross-departmental relationships upon soft or informal grounds by positioning your EPMO as your organization’s portfolio network, i.e. an enterprise hub that facilitates the flow of reliable information and enables timely responsiveness to change.

    Define and Deploy an Enterprise PMO Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how implementing an EPMO could help your organization achieve business goals, review Info-Tech’s methodology, and discover the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Gather requirements

    Evaluate executive stakeholder needs and assess your current capabilities to ensure your implementation strategy sets realistic expectations.

    • Define and Deploy an Enterprise PMO – Phase 1: Gather Requirements
    • EPMO Capabilities Survey

    2. Define the plan

    Define an organizationally appropriate scope and mandate for your EPMO to ensure that your processes serve the needs of the whole.

    • Define and Deploy an Enterprise PMO – Phase 2: Define the Plan
    • EPMO Charter Template
    • EPMO Communication Planning Template

    3. Implement the plan

    Establish clearly defined and easy-to-follow EPMO processes that minimize project complexity and improve enterprise project results.

    • Define and Deploy an Enterprise PMO – Phase 3: Implement the Plan
    • EPMO Process Guide and SOP Template
    • EPMO Communications Template
    [infographic]

    Workshop: Define and Deploy an Enterprise PMO

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Gather Requirements

    The Purpose

    Identify breakdowns in the flow of portfolio data across the enterprise to pinpoint where and how an EPMO can best intervene.

    Assess areas of strength and opportunity in your PPM capabilities to help structure and drive the EPMO.

    Define stakeholder needs and expectations for the EPMO in order to cultivate capabilities and services that help drive informed and engaged project decisions at the executive level.

    Key Benefits Achieved

    A current state picture of the triggers that are driving the need for an EPMO at your organization.

    A current state understanding of the strengths you bring to the table in constructing an EPMO as well as the areas you need to focus on in building up your capabilities.

    A target state set by stakeholder requirements and expectations, which will enable you to build out an implementation strategy that is aligned with the needs of the executive layer.

    Activities

    1.1 Map current enterprise PPM workflows.

    1.2 Conduct a SWOT analysis.

    1.3 Identify resourcing considerations and other implementation factors.

    1.4 Survey stakeholders to establish the right mix of EPMO capabilities.

    Outputs

    An overview of the flow of portfolio data and information across the organization

    An overview of current strengths, weaknesses, opportunities, and threats

    A preliminary assessment of internal and external factors that could impact the success of this implementation

    The ability to construct a project plan that is aligned with stakeholder needs and expectations

    2 Define the Plan

    The Purpose

    Define an appropriate scope for the EPMO and the deployment it services.

    Devise a plan for engaging and including the appropriate stakeholders during the implementation phase.

    Key Benefits Achieved

    A clear purview for the EPMO in relation to the wider enterprise in order to establish appropriate expectations for the EPMO’s services throughout the organization.

    Engaged stakeholders who understand that they have a stake in the successful implementation of the EPMO.

    Activities

    2.1 Prepare your EPMO value proposition.

    2.2 Define the role and organizational reach of your EPPM capabilities.

    2.3 Establish a communication plan to create stakeholder awareness.

    Outputs

    A clear statement of purpose and benefit that can be used to help build the case for an EPMO with stakeholders

    A functional charter defining the scope of the EPMO and providing a statement of the services the EPMO will provide once established

    An engaged executive layer that understands the value of the EPMO and helps drive its success

    3 Implement the Plan

    The Purpose

    Establish clearly defined and easy-to-follow EPMO processes that minimize project complexity.

    Develop portfolio and project governance structures that feed the EPMO with the data decision makers require without overloading enterprise project teams with processes they can’t support.

    Devise a communications strategy that helps achieve organizational buy-in.

    Key Benefits Achieved

    The reduction of project chaos and confusion throughout the organization.

    Processes and governance requirements that work for both decision makers and project teams.

    Organizational understanding of the universal benefit of the EPMO’s processes to stakeholders throughout the enterprise. 

    Activities

    3.1 Establish EPMO roles and responsibilities.

    3.2 Document standard procedures around enterprise portfolio reporting, PPM administration, and project leadership.

    3.3 Review enterprise PPM solutions.

    3.4 Develop a stakeholder engagement and resistance plan.

    Outputs

    Clear lines of portfolio accountability

    A fully actionable EPMO Standard Operating Procedure document that will enable process clarity

    An informed understanding of the right PPM solution for your enterprise processes

    A communications strategy document to help communicate the organizational benefits of the EPMO

    Maximize Your American Rescue Plan Funding

    • Buy Link or Shortcode: {j2store}74|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $661,499 Average $ Saved
    • member rating average days saved: 8 Average Days Saved
    • Parent Category Name: Cost & Budget Management
    • Parent Category Link: /cost-and-budget-management
    • Will funding from COVID-19 stimulus opportunities mean more human and financial resources for IT?
    • Are there governance processes in place to successfully execute large projects?
    • What does a large, one-time influx of capital mean for keeping-the-lights-on budgets?
    • How will ARP funding impact your internal resourcing?
    • How can you ensure that IT is not left behind or an afterthought?

    Our Advice

    Critical Insight

    • Seek a one-to-many relationship between IT solutions and business problems. Use the central and overarching nature of IT to identify one solution to multiple business problems that span multiple programs, departments, and agencies.
    • Lack of specific guidance should not be a roadblock to starting. Be proactive by initiating the planning process so that you are ready to act as soon as details are clear.
    • IT involvement is the lynchpin for success. The pandemic has made this theme self-evident, and it needs to stay that way.
    • The fact that this funding is called COVID-19 relief might make you think you should only use it for recovery, but actually it should be viewed as an opportunity to help the organization thrive post-pandemic.

    Impact and Result

    • Shift IT’s role from service provider to innovator. Take ARP funding as a once-in-a-lifetime opportunity to create future enterprise capabilities by thinking big to consider IT innovation that can transform the business and its initiatives for the post-pandemic world.
    • Whether your organization is eligible for a direct or an indirect transfer, be sure you understand the requirements to apply for funding internally through a business case or externally through a grant application.
    • Gain the skills to execute the project with confidence by developing a comprehensive statement of work and managing your projects and vendor relationships effectively.

    Maximize Your American Rescue Plan Funding Research & Tools

    Use our research to help maximize ARP funding.

    Follow Info-Tech's approach to think big, align with the business, analyze budget and staffing, execute with confidence, and ensure compliance and reporting.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    [infographic]

    Workshop: Maximize Your American Rescue Plan Funding

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Think Big

    The Purpose

    Push the boundaries of conventional thinking and consider IT innovations that truly transform the business.

    Key Benefits Achieved

    A list of innovative IT opportunities that your IT department can use to transform the business

    Activities

    1.1 Discuss the objectives of ARP and what they mean to IT departments.

    1.2 Identify drivers for change.

    1.3 Review IT strategy.

    1.4 Augment your IT opportunities list.

    Outputs

    Revised IT vision

    List of innovative IT opportunities that can transform the business

    2 Align With the Business

    The Purpose

    Partner with the business to reprioritize projects and initiatives for the post-pandemic world.

    Key Benefits Achieved

    Assessment of the organization’s new and existing IT opportunities and alignment with business objectives

    Activities

    2.1 Assess alignment of current and new IT initiatives with business objectives.

    2.2 Review and update prioritization criteria for IT projects.

    Outputs

    Preliminary list of IT initiatives

    Revised project prioritization criteria

    3 Analyze IT Budget and Staffing

    The Purpose

    Identify IT budget deficits resulting from pandemic response and discover opportunities to support innovation through new staff and training.

    Key Benefits Achieved

    Prioritized shortlist of business-aligned IT initiative and projects

    Activities

    3.1 Classify initiatives into project categories using ROM estimates.

    3.2 Identify IT budget needs for projects and ongoing services.

    3.3 Identify needs for new staff and skills training.

    3.4 Determine business benefits of proposed projects.

    3.5 Prioritize your organization’s projects.

    Outputs

    Prioritized shortlist of business-aligned IT initiatives and projects

    4 Plan Next Steps

    The Purpose

    Tie IT expenditures to direct transfers or link them to ARP grant opportunities.

    Key Benefits Achieved

    Action plan to obtain ARP funding

    Activities

    4.1 Tie projects to direct transfers, where applicable.

    4.2 Align list of projects to indirect ARP grant opportunities.

    4.3 Develop an action plan to obtain ARP funding.

    4.4 Discuss required approach to project governance.

    Outputs

    Action plan to obtain ARP funding

    Project governance gaps

    Implement Infrastructure Shared Services

    • Buy Link or Shortcode: {j2store}456|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • Organizations have service duplications for unique needs. These duplications increase business expenditure.
    • Lack of collaboration between business units to share their services increases business cost and reduces business units’ faith to implement shared services.
    • Transitioning infrastructure to shared services is challenging for many organizations. It requires an accurate planning and efficient communication between participating business units.

    Our Advice

    Critical Insight

    • Identify your current process, tool, and people capabilities before implementing shared services. Understand the financial compensations prior to implementation and assess if your organization is ready for transitioning to shared services model.
    • Do not implement shared services when the nature of the services differs greatly between business units.

    Impact and Result

    • Understand benefits of shared services for the business and determine whether transitioning to shared services would benefit the organization.
    • Identify the best implementation plan based on goals, needs, and services.
    • Build a shared-services process to manage the plan and ensure its success.

    Implement Infrastructure Shared Services Research & Tools

    Start here – Read the Executive Brief

    Read our concise Executive Brief to find out why you should implement shared services, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Conduct gap analysis

    Identify benefits of shared services to your organization and define implementation challenges.

    • Implement Infrastructure Shared Services – Phase 1: Conduct Gap Analysis
    • Shared Services Implementation Executive Presentation
    • Shared Services Implementation Business Case Template
    • Shared Services Implementation Assessment Tool

    2. Choose the right path

    Identify your process and staff capabilities and discover which services will be transitioned to shared services plan. It will also help you to figure out the best model to choose.

    • Implement Infrastructure Shared Services – Phase 2: Choose the Right Path
    • Sample Enterprise Services

    3. Plan the transition

    Discuss an actionable plan to implement shared services to track the project. Walk through a communication plan to document the goals, progress, and expectations with customer stakeholders.

    • Implement Infrastructure Shared Services – Phase 3: Plan the Transition
    • Shared Services Implementation Roadmap Tool
    • Shared Services Implementation Customer Communication Plan
    [infographic]

    Workshop: Implement Infrastructure Shared Services

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Challenges

    The Purpose

    Establish the need for change.

    Key Benefits Achieved

    Set a clear understanding about benefits of shared services to your organization.

    Activities

    1.1 Identify your organization’s main drivers for using a shared services model.

    1.2 Define if it is beneficial to implement shared services.

    Outputs

    Shared services mission

    Shared services goals

    2 Assess Your Capabilities

    The Purpose

    Become aware of challenges to implement shared services and your capabilities for such transition.

    Key Benefits Achieved

    Discover the primary challenges for transitioning to shared services, eliminate resistance factors, and identify your business potentials for implementation.

    Activities

    2.1 Identify your organization’s resistance to implement shared services.

    2.2 Assess process and people capabilities.

    Outputs

    Shared Services Business Case

    Shared Services Assessment

    3 Define the Model

    The Purpose

    Determine the shared services model.

    Key Benefits Achieved

    Identify the core services to be shared and the best model that fits your organization.

    Activities

    3.1 Define core services that will be moved to shared services.

    3.2 Assess different models of shared services and pick the one that satisfies your goals and needs.

    Outputs

    List of services to be transferred to shared services

    Shared services model

    4 Implement and Communicate

    The Purpose

    Define and communicate the tasks to be delivered.

    Key Benefits Achieved

    Confidently approach key stakeholders to make the project a reality.

    Activities

    4.1 Define the roadmap for implementing shared services.

    4.2 Make a plan to communicate changes.

    Outputs

    List of initiatives to reach the target state, strategy risks, and their timelines

    Draft of a communication plan

    Business Value

    • Buy Link or Shortcode: {j2store}7|cart{/j2store}
    • Related Products: {j2store}7|crosssells{/j2store}
    • Up-Sell: {j2store}7|upsells{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Financial Management
    • Parent Category Link: /financial-management
    Maximize your ROI on IT through benefits realization

    Integrate Portfolios to Create Exceptional Customer Value

    • Buy Link or Shortcode: {j2store}176|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Architecture & Strategy
    • Parent Category Link: /architecture-and-strategy
    • Through growth, both organic and acquisition, you have a significant footprint of projects and applications.
    • Projects and applications have little in common with one another, all with their own history and pedigree.
    • You need to look across your portfolio of applications and projects to see if they will collectively help the organization achieve its goals.

    Our Advice

    Critical Insight

    • Stakeholders don’t care about the minutia and activities involved in project and application portfolio management.
    • Timely delivery of effective and important applications that deliver value throughout their life are the most important factors driving business satisfaction with IT.

    Impact and Result

    • Define an organizing principle that will structure your projects and applications in a way that matters to your stakeholders.
    • Bridge application and project portfolio data using the organizing principle that matters to communicate with stakeholders across the organization.
    • Create a dashboard that brings together the benefits of both project and application portfolio management to improve visibility and decision making.

    Integrate Portfolios to Create Exceptional Customer Value Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should integrate your application and project portfolios, review Info-Tech’s methodology, and understand the three ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Define the principle that organizes your portfolios, objectives, and stakeholders

    To bring your portfolios together, you need to start with learning about your objectives, principles, and stakeholders.

    • Integrate Portfolios to Create Exceptional Customer Value – Phase 1: Define the Principle That Organizes Your Portfolios, Objectives, and Stakeholders
    • Integrated Portfolio Dashboard Tool
    • Integrated Portfolio Dashboard Tool – Example

    2. Take stock of what brings you closer to your goals

    Get a deeper understanding of what makes up your organizing principle before learning about your applications and projects that are aligned with your principles.

    • Integrate Portfolios to Create Exceptional Customer Value – Phase 2: Take Stock of What Brings You Closer to Your Goals

    3. Bring it all together

    Bound by your organizing principles, bring your projects and applications together under a single dashboard. Once defined, determine the rollout and communication plan that suits your organization.

    • Integrate Portfolios to Create Exceptional Customer Value – Phase 3: Bring It All Together
    • Integrated Portfolio Communication and Roadmap Plan
    • Integrated Portfolio Communication and Roadmap Plan Example
    [infographic]

    Workshop: Integrate Portfolios to Create Exceptional Customer Value

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Looking at Your Principles

    The Purpose

    Determine your organizational objectives and organizing principle.

    Key Benefits Achieved

    A clear understanding of where you need to go as an organization.

    A clear way to enable all parts of your portfolio to come together.

    Activities

    1.1 Determine your organization’s objectives.

    1.2 Determine your key stakeholders.

    1.3 Define your organizing principle.

    1.4 Decompose your organizing principle into its core components.

    Outputs

    Determined organizing principle for your applications and projects

    2 Understanding Your Applications

    The Purpose

    Get a clear view of the applications that contribute to your organization’s objectives.

    Key Benefits Achieved

    A key element of IT value delivery is its applications. Gaining awareness allows you to evaluate if the right value is being provided.

    Activities

    2.1 Determine your complete list of applications.

    2.2 Determine the health of your applications.

    2.3 Link your applications to the organization’s core components.

    Outputs

    List of applications

    Application list with health statistics filled in

    List of applications with health metrics bound to the organization’s core components

    3 Understanding Your Projects

    The Purpose

    Get a clear view of your project portfolio and how it relates to your applications and their organizing principle.

    Key Benefits Achieved

    An understanding of your project portfolio.

    Activities

    3.1 List all in-flight projects and vital health statistics.

    3.2 Map out the key programs and projects in your portfolio to the application’s core components.

    Outputs

    List of projects

    List of projects mapped to applications they impact

    4 Rolling Out the New Dashboard

    The Purpose

    Bring together your application and project portfolios in a new, easy-to-use dashboard with a full rollout plan.

    Key Benefits Achieved

    Dashboard available for use

    Roadmap and communication plan to make dashboard implementable and tangible

    Activities

    4.1 Test the dashboard.

    4.2 Define your refresh cadence.

    4.3 Plan your implementation.

    4.4 Develop your communication plan.

    Outputs

    Validated dashboards

    2021 CIO Priorities Report

    • Buy Link or Shortcode: {j2store}83|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy
    • It is a new year, but the challenges of 2020 remain: COVID-19 infection rates continue to climb, governments continue to enforce lockdown measures, we continue to find ourselves in the worst economic crisis since the Great Depression, and civil unrest grows in many democratic societies.
    • At the start of 2020, no business leader predicted the disruption that was to come. This left IT in a reactive but critical role as the health crisis hit. It was core to delivering the organization’s products and services, as it drove the radical shift to work-from-home.
    • For the year ahead, IT will continue to serve a critical function in uncertain times. However, unlike last year, CIOs can better prepare for 2021. That said, in the face of the uncertainty and volatility of the year ahead, what they need to prepare for is still largely undefined.
    • But despite the lack of confidence on knowing specifically what is to come, most business leaders will admit they need to get ready for it. This year’s priority report will help.

    Our Advice

    Critical Insight

    • “Resilience” is the theme for this year’s CIO Priorities Report. In this context, resilience is about building up the capacity and the capabilities to effectively respond to emergent and unforeseen needs.
    • Early in 2021 is a good time to develop resilience in several different areas. As we explore in this year’s Report, CIOs can best facilitate enterprise resilience through strategic financial planning, proactive risk management, effective organizational change management and capacity planning, as well as through remaining tuned into emergent technologies to capitalize on innovations to help weather the uncertainty of the year ahead.

    Impact and Result

    • Use Info-Tech’s 2021 CIO Priorities Report to prepare for the uncertainty of the year ahead. Across our five priorities we provide five avenues through which CIOs can demonstrate resilient planning, enabling the organization as a whole to better confront what’s coming in 2021.
    • Each of our priorities is backed up by a “call to action” that will help CIOs start to immediately implement the right drivers of resilience for their organization.
    • By building up resilience across our five key areas, CIOs will not only be able to better prepare for the year to come, but also strengthen business relations and staff morale in difficult times.

    2021 CIO Priorities Report Research & Tools

    Read the 2021 CIO Priorities Report

    Use Info-Tech’s 2021 CIO Priorities Report to prepare for the uncertainty of the year ahead. Across our five priorities we provide five avenues through which CIOs can demonstrate resilient planning, enabling the organization as a whole to better confront what’s coming in 2021.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Create an appropriate budget reserve

    Identifying and planning sources of financial contingency will help ensure CIOs can meet unforeseen and emergent operational and business needs throughout the year.

    • 2021 CIO Priorities Report: Priority 1 – Create an Appropriate Budget Reserve

    2. Refocus IT risk planning

    The start of 2021 is a time to refocus and redouble IT risk management and business continuity planning to bring it up to the standards of our “new normal.” Indeed, if last year taught us anything, it’s that no “black swan” should be off the table in terms of scenarios or possibilities for business disruption.

    • 2021 CIO Priorities Report: Priority 2 – Refocus IT Risk Planning

    3. Strengthen organizational change management capabilities

    At its heart, resilience is having the capacity to deal with unexpected change. Organizational change management can help build up this capacity, providing the ability to strategically plot known changes while leaving some capacity to absorb the unknowns as they present themselves.

    • 2021 CIO Priorities Report: Priority 3 – Strengthen Organizational Change Management Capabilities

    4. Establish capacity awareness

    Capacity awareness facilitates resilience by providing capital in the form of resource data. With this data, CIOs can make better decisions on what can be approved and when it can be scheduled for.

    • 2021 CIO Priorities Report: Priority 4 – Establish Capacity Awareness

    5. Keep emerging technologies in view

    Having an up-to-date view of emerging technologies will enable the resilient CIO to capitalize on and deploy leading-edge innovations as the business requires.

    • 2021 CIO Priorities Report: Priority 5 – Keep Emerging Technologies in View
    [infographic]

    Audit the Project Portfolio

    • Buy Link or Shortcode: {j2store}442|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • As a CIO you know you should audit your portfolio, but you don’t know where to start.
    • There is a lack of portfolio and project visibility.
    • Projects are out of scope, over budget, and over schedule.

    Our Advice

    Critical Insight

    • Organizations establish processes and assume people are following them.
    • There is a dilution of practices from external influences and rapid turnover rates.
    • Many organizations build their processes around existing frameworks. These frameworks are great resources but they’re often missing context and clear links to tools, templates, and fiduciary duty.

    Impact and Result

    • The best way to get insight into your current state is to get an objective set of observations of your processes.
    • Use Info-Tech’s framework to audit your portfolios and projects:
      • Triage at a high level to assess the need for an audit by using the Audit Standard Triage Tool to assess your current state and the importance of conducting a deeper audit.
      • Complete Info-Tech’s Project Portfolio Audit Tool:
        • Validate the inputs.
        • Analyze the data.
        • Review the findings and create your action plan.

    Audit the Project Portfolio Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should audit the project portfolio, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess readiness

    Understand your current state and determine the need for a deeper audit.

    • Audit the Project Portfolio – Phase 1: Assess Readiness
    • Info-Tech Audit Standard for Project Portfolio Management
    • Audit Glossary of Terms
    • Audit Standard Triage Tool

    2. Perform project portfolio audit

    Audit your selected projects and portfolios. Understand the gaps in portfolio practices.

    • Audit the Project Portfolio – Phase 2: Perform Project Portfolio Audit
    • Project Portfolio Audit Tool

    3. Establish a plan

    Document the steps you are going to take to address any issues that were uncovered in phase 2.

    • Audit the Project Portfolio – Phase 3: Establish a Plan
    • PPM Audit Timeline Template
    [infographic]

    Workshop: Audit the Project Portfolio

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Portfolio Audit

    The Purpose

    An audit of your portfolio management practices.

    Key Benefits Achieved

    Analysis of audit results.

    Activities

    1.1 Info-Tech’s Audit Standard/Engagement Context

    1.2 Portfolio Audit

    1.3 Input Validation

    1.4 Portfolio Audit Analysis

    1.5 Start/Stop/Continue

    Outputs

    Audit Standard and Audit Glossary of Terms

    Portfolio and Project Audit Tool

    Start/Stop/Continue

    2 Project Audit

    The Purpose

    An audit of your project management practices.

    Key Benefits Achieved

    Analysis of audit results.

    Activities

    2.1 Project Audit

    2.2 Input Validation

    2.3 Project Audit Analysis

    2.4 Start/Stop/Continue

    Outputs

    Portfolio and Project Audit Tool

    Start/Stop/Continue

    3 Action Plan

    The Purpose

    Create a plan to start addressing any vulnerabilities.

    Key Benefits Achieved

    A plan to move forward.

    Activities

    3.1 Action Plan

    3.2 Key Takeaways

    Outputs

    Audit Timeline Template

    Mature and Scale Product Ownership

    • Buy Link or Shortcode: {j2store}145|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $21,919 Average $ Saved
    • member rating average days saved: 13 Average Days Saved
    • Parent Category Name: Development
    • Parent Category Link: /development
    • Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.
    • Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.
    • In many organizations, the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

    Our Advice

    Critical Insight

    A product owner is the CEO for their product. Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

    • Product and service ownership share the same foundation - underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.
    • Product owners represent three primary perspectives: Business (externally facing), Technical (systems and tools), or Operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.
    • Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

    Impact and Result

    • Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.
    • Promote and develop true Agile skills among your product owners and family managers.
    • Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

    Mature and Scale Product Ownership Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Mature and Scale Product Ownership Storyboard – Establish a culture of success for product management and mature product owner capabilities.

    Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

  • Establish a foundation for empowerment and success.
  • Assign and align product owners with products and stakeholders.
  • Mature product owner capabilities and skills.
    • Mature and Scale Product Ownership Storyboard

    2. Mature and Scale Product Ownership Readiness Assessment – Determine your readiness for a product-centric culture based on Info-Tech’s CLAIM+G model.

    Using Info-Tech’s CLAIM model, quickly determine your organization’s strengths and weaknesses preparing for a product culture. Use the heat map to identify key areas.

    • Mature and Scale Product Ownership Readiness Assessment

    3. Mature and Scale Product Ownership Playbook – Playbook for product owners and product managers.

    Use the blueprint exercises to build your personal product owner playbook. You can also use the workbook to capture exercise outcomes.

    • Mature and Scale Product Ownership Playbook

    4. Mature and Scale Product Ownership Workbook – Workbook for product owners and product managers.

    Use this workbook to capture exercise outcomes and transfer them to your Mature and Scale Product Ownership Playbook (optional).

    • Mature and Scale Product Ownership Workbook

    5. Mature and Scale Product Ownership Proficiency Assessment – Determine your current proficiency and improvement areas.

    Product owners need to improve their core capabilities and real Agile skills. The assessment radar will help identify current proficiency and growth opportunities.

    • Mature and Scale Product Ownership Proficiency Assessment
    [infographic]

    Workshop: Mature and Scale Product Ownership

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish the foundation for product ownership

    The Purpose

    Establish the foundation for product ownership.

    Key Benefits Achieved

    Product owner playbook with role clarity and RACI.

    Activities

    1.1 Define enablers and blockers of product management.

    1.2 Define your product management roles and names.

    1.3 Assess your product management readiness.

    1.4 Identify your primary product owner perspective.

    1.5 Define your product owner RACI.

    Outputs

    Enablers and blockers

    Role definitions.

    Product culture readiness

    Product owner perspective mapping

    Product owner RACI

    2 Align product owners to products

    The Purpose

    Align product owners to products.

    Key Benefits Achieved

    Assignment of resources to open products.

    A stakeholder management strategy.

    Activities

    2.1 Assign resources to your products and families.

    2.2 Visualize relationships to identify key influencers.

    2.3 Group stakeholders into categories.

    2.4 Prioritize your stakeholders.

    Outputs

    Product resource assignment

    Stakeholder management strategy

    Stakeholder management strategy

    Stakeholder management strategy

    3 Mature product owner capabilities

    The Purpose

    Mature product owner capabilities.

    Key Benefits Achieved

    Assess your Agile product owner readiness

    Assess and mature product owner capabilities

    Activities

    3.1 Assess your real Agile skill proficiency.

    3.2 Assess your vison capability proficiency.

    3.3 Assess your leadership capability proficiency.

    3.4 Assess your PLM capability proficiency.

    3.5 Assess your value realization capability proficiency.

    3.6 Identify your business value drivers and sources of value.

    Outputs

    Real Agile skill proficiency assessment

    Info-Tech’s product owner capability model proficiency assessment

    Info-Tech’s product owner capability model proficiency assessment

    Info-Tech’s product owner capability model proficiency assessment

    Info-Tech’s product owner capability model proficiency assessment

    Business value drivers and sources of value

    Further reading

    Mature and Scale Product Ownership

    Strengthen the product owner’s role in your organization by focusing on core capabilities and proper alignment.

    Executive Brief

    Analyst Perspective

    Empower product owners throughout your organization.

    Hans Eckman

    Whether you manage a product or service, the fundamentals of good product ownership are the same. Organizations need to focus on three key elements of product ownership in order to be successful.

    • Create an environment of empowerment and service leadership to reinforce product owners and product family managers as the true owners of the vision, improvement, and realized the value of their products.
    • Align product and product family owner roles based on operational alignment and the groups defined when scaling product management.
    • Develop your product owners to improve the quality of roadmaps, alignment to enterprise goals, and profit and loss (P&L) for each product or service.

    By focusing the attention of the teammates serving in product owner or service owner roles, your organization will deliver value sooner and respond to change more effectively.

    Hans Eckman

    Principal Research Director – Application Delivery and Management
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.

    Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.

    In many organizations the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

    Common Obstacles

    Organizations have poor alignment or missing product owners between lines of business, IT, and operations.

    Product owners are aligned to projects and demand management rather than long-term strategic product ownership.

    Product families are not properly defined, scaled, and supported within organizations.

    Individuals in product owner roles have an incomplete understanding of needed capabilities and lack a development path.

    Info-Tech's Approach

    Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.

    Promote and develop true Agile skills among your product owners and family managers.

    Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

    Extend product management success using Deliver on Your Digital Product Vision and Deliver Digital Products at Scale.

    Info-Tech Insight

    There is no single correct approach to product ownership. Product ownership must be tuned and structured to meet the delivery needs of your organization and the teams it serves.

    Info-Tech’s Approach

    Product owners make the final decision

    • Establish a foundation for empowerment and success
    • Assign product owners and align with products and stakeholders
    • Mature product owner capabilities and skills
    Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

    The Info-Tech difference

    1. Assign product owners where product decisions are needed, not to match org charts or delivery teams. The product owner has the final word on product decisions.
    2. Organize product owners into related teams to ensure product capabilities delivered are aligned to enterprise strategy and goals.
    3. Shared products and services must support the needs of many product owners with conflicting priorities. Shared service product owners must map and prioritize demand to align to enterprise priorities and goals.
    4. All product owners share the same capability model.

    Insight summary

    There is no single correct approach to product ownership

    Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

    Phase 1 insight

    Product owners represent three primary perspectives: business (external-facing), technical (systems and tools), or operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

    Phase 2 insight

    Start with your operational grouping of products and families, identifying where an owner is needed. Then, assign people to the products and families. The owner does not define the product or family.

    Phase 3 insight

    Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

    Product and service ownership share the same foundation

    The underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.

    Map product owner roles to your existing job titles

    Identify where product management is needed and align expectations with existing roles. Successful product management does not require a dedicated job family.

    Projects can be a mechanism for funding product changes and improvements

    Projects can be a mechanism for funding product changes and improvements. Shows difference of value for project life-cycles, hybrid life-cycles, and product life-cycles.

    Projects within products

    Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

    You go through a period or periods of project-like development to build a version of an application or product.

    You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

    Product and services owners share the same foundation and capabilities

    For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but would apply to services, as well.

    Product = Service

    Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

    “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

    • External products
    • Internal products
    • External services
    • Internal services
    • Products as a service (PaaS)
    • Productizing services (SaaS)

    Recognize the product owner perspectives

    The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

    Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

    Info-Tech Insight

    Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

    Match your product management role definitions to your product family levels

    Product ownership exists at the different operational tiers or levels in your product hierarchy. This does not imply a management relationship.

    Product portfolio

    Groups of product families within an overall value stream or capability grouping.

    Project portfolio manager

    Product family

    A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

    Product family manager

    Product

    Single product composed of one or more applications and services.

    Product owner

    Info-Tech Insight

    Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

    Align enterprise value through product families

    Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

    Understand special circumstances

    In Deliver Digital Products at Scale, products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

    Value stream alignment

    • Business architecture
      • Value stream
      • Capability
      • Function
    • Market/customer segment
    • Line of business (LoB)
    • Example: Customer group > value stream > products

    Enterprise applications

    • Enabling capabilities
    • Enterprise platforms
    • Supporting apps
    • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

    Shared Services

    • Organization of related services into service family
    • Direct hierarchy does not necessarily exist within the family
    • Examples: End-user support and ticketing, workflow and collaboration tools

    Technical

    • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
    • Often used in combination with Shared Services grouping or LoB-specific apps
    • Examples: Java, .NET, low-code, database, network

    Organizational alignment

    • Used at higher levels of the organization where products are aligned under divisions
    • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

    Map sources of demand and influencers

    Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

    Map of key stakeholders for enterprise applications and shared services.

    Info-Tech Insight

    Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

    Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

    The primary value of the product owner is to fill the backlog with the highest ROI opportunities aligned with enterprise goals.

    Info-Tech Insight

    The product owner owns the direction of the product.

    • Roadmap - Where are we going?
    • Backlog - What changes are needed to get there?
    • Product review - Did we get close enough?

    Product delivery realizes value for your product family

    While planning and analysis are done at the family level, work and delivery are done at the individual product level.

    Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

    Product family owners are more strategic

    When assigning resources, recognize that product family owners will need to be more strategic with their planning and alignment of child families and products.

    Product family owners are more strategic. They require a roadmap that is strategic, goal-based, high-level, and flexible.

    Info-Tech Insight

    Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

    Connecting your product family roadmaps to product roadmaps

    Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn’t available.

    Product family roadmap versus Product Roadmaps.

    Develop a product owner stakeholder strategy

    Stakeholder management, Product lifecycle, Project delivery, Operational support.

    Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

    Product owners operate within a network of stakeholders who represent different perspectives within the organization.

    First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

    Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

    Create a stakeholder network map to product roadmaps and prioritization

    Follow the trail of breadcrumbs from your direct stakeholders to their influencers, to uncover hidden stakeholders.

    Stakeholder network map defines the influence landscape your product operates. Connectors determine who may be influencing your direct stakeholders.

    Info-Tech Insight

    Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

    Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

    Being successful at Agile is more than about just doing Agile

    The following represents the hard skills needed to “Do Agile”:

    Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.
    • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
    • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
    • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
    • Tools skills. This represents the software that helps you deliver other software.

    While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

    Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

    Why focus on core skills?

    They are the foundation to achieve business outcomes

    Skills, actions, output and outcomes

    The right skills development is only possible with proper assessment and alignment against outcomes.

    Focus on these real Agile skills

    Agile skills

    • Accountability
    • Collaboration
    • Comfort with ambiguity
    • Communication
    • Empathy
    • Facilitation
    • Functional decomposition
    • Initiative
    • Process discipline
    • Resilience

    Product capabilities deliver value

    As a product owner, you are responsible for managing these facets through your capabilities and activities.

    The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

    Info-Tech Best Practice

    It is easy to lose sight of what matters when we look at a product from a single point of view. Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

    Recognize product owner knowledge gaps

    Pulse survey of product owners

    Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

    Info-Tech Insight

    1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
    2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

    Source: Pulse Survey (N=18)

    Implement the Info-Tech product owner capability model

    Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

    Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

    Vision

    • Market Analysis
    • Business Alignment
    • Product Roadmap

    Leadership

    • Soft Skills
    • Collaboration
    • Decision Making

    Product Lifecycle Management

    • Plan
    • Build
    • Run

    Value Realization

    • KPIs
    • Financial Management
    • Business Model

    Product owner capabilities provide support

    Vision predicts impact of Value realization. Value realization provides input to vision

    Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

    Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

    Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

    Product owner capabilities provide support

    Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

    Develop product owner capabilities

    Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

    Avoid common capability gaps

    Vision

    • Focusing solely on backlog grooming (tactical only)
    • Ignoring or failing to align product roadmap to enterprise goals
    • Operational support and execution
    • Basing decisions on opinion rather than market data
    • Ignoring or missing internal and external threats to your product

    Leadership

    • Failing to include feedback from all teams who interact with your product
    • Using a command-and-control approach
    • Viewing product owner as only a delivery role
    • Acting as a proxy for stakeholder decisions
    • Avoiding tough strategic decisions in favor of easier tactical choices

    Product lifecycle management

    • Focusing on delivery and not the full product lifecycle
    • Ignoring support, operations, and technical debt
    • Failing to build knowledge management into the lifecycle
    • Underestimating delivery capacity, capabilities, or commitment
    • Assuming delivery stops at implementation

    Value realization

    • Focusing exclusively on “on time/on budget” metrics
    • Failing to measure a 360-degree end-user view of the product
    • Skipping business plans and financial models
    • Limiting financial management to project/change budgets
    • Ignoring market analysis for growth, penetration, and threats

    Your product vision is your North Star

    It's ok to dream a little!

    Who is the target customer, what is the key benefit, what do they need, what is the differentiator

    Adapted from: Crossing the Chasm

    Info-Tech Best Practice

    A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

    Leverage the product canvas to state and inform your product vision

    Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

    Define product value by aligning backlog delivery with roadmap goals

    In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

    In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

    Use a balanced value to establish a common definition of goals and value

    Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

    Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

    Info-Tech Insight

    Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

    Use CLAIM to guide your journey

    Culture, Learning, Automation, Integrated teams, Metrics and governance.

    Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

    Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

    Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

    Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

    Successful implementations require the disciplined use of metrics that support developing better teams

    Communicate reasons for changes and how they will be implemented

    Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

    Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

    The organizational change message should:

    • Explain why the change is needed.
    • Summarize what will stay the same.
    • Highlight what will be left behind.
    • Emphasize what is being changed.
    • Explain how the change will be implemented.
    • Address how change will affect various roles in the organization.
    • Discuss the staff’s role in making the change successful.

    Info-Tech’s methodology for mature and scale product ownership

    Phase steps

    1. Establish the foundation for product ownership

    Step 1.1 Establish an environment for product owner success

    Step 1.2 Establish your product ownership model

    2. Align product owners to products

    Step 2.1 Assign product owners to products

    Step 2.2 Manage stakeholder influence

    3. Mature product owner capabilities

    Step 3.1 Assess your Agile product owner readiness

    Step 3.2 Mature product owner capabilities

    Phase outcomes

    1.1.1 Define enablers and blockers of product management

    1.1.2 Define your product management roles and names

    1.2.1 Identify your primary product owner perspective

    1.2.2 Define your product owner RACI

    2.1.1 Assign resources to your products and families

    2.2.1 Visualize relationships to identify key influencers

    2.2.2 Group stakeholders into categories

    2.2.3 Prioritize your stakeholders

    3.1.1 Assess your real Agile skill proficiency

    3.2 Mature product owner capabilities

    3.2.1 Assess your vision capability proficiency

    3.2.2 Assess your leadership capability proficiency

    3.2.3 Assess your PLM capability proficiency

    3.2.4 Identify your business value drivers and sources of value

    3.2.5 Assess your value realization capability proficiency

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

    Key deliverable

    Mature and Scale Product Ownership Playbook

    Capture and organize the outcomes of the activities in the workbook.

    Mature and Scale Product Ownership Workbook

    The workbook helps organize and communicate the outcomes of each activity.

    Mature and Scale Product Ownership Readiness Assessment

    Determine your level of mastery of real Agile skills and product owner capabilities.


    Blueprint benefits

    IT benefits

    • Competent product owner who can support teams operating in any delivery methodology.
    • Representative viewpoint and input from the technical and operational product owner perspectives.
    • Products aligned to business needs and committed work are achievable.
    • Single point of contact with a business representative.
    • Acceptance of product owner role outside the Scrum teams.

    Business benefits

    • Better alignment to enterprise goals, vision, and outcomes.
    • Improved coordination with stakeholders.
    • Quantifiable value realization tied to vision.
    • Product decisions made at the right time and with the right input.
    • Product owner who has the appropriate business, operations, and technical knowledge.

    Measure the value of this blueprint

    Align product owner metrics to product delivery and value realization.

    Member outcome

    Suggested Metric

    Estimated impact

    Increase business application satisfaction Satisfaction of business applications (CIO BV Diagnostic) 20% increase within one year after implementation
    Increase effectiveness of application portfolio management Effectiveness of application portfolio management (M&G Diagnostic) 20% increase within one year after implementation
    Increase importance and effectiveness of application portfolio Importance and effectiveness to business (APA Diagnostic) 20% increase within one year after implementation
    Increase satisfaction of support of business operations Support to business (CIO BV Diagnostic) 20% increase within one year after implementation
    Successfully deliver committed work (productivity) Number of successful deliveries; burndown Reduction in project implementation overrun by 20%

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project"

    Diagnostics and consistent frameworks are used throughout all four options.

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Establish the Foundation for Product Ownership

    Phase 2 Align Product Owners to Products

    Phase 3 Mature Product Owner Capabilities

    • Call #1:
      Scope objectives and your specific challenges
    • Call #2:
      Step 1.1 Establish an environment for product owner success
      Step 1.2 Establish your product ownership model
    • Call #3:
      Step 2.1 Assign product owners to products
    • Call #4:
      Step 2.2 Manage stakeholder influence
    • Call #5:
      Step 3.1 Assess your Agile product owner readiness
    • Call #6:
      Step 3.2 Mature product owner capabilities

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 8 and 12 calls over the course of 4 to 6 months.

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Phase 1

    Phase 2

    Phase 3

    Activities

    Establish the Foundation for Product Ownership

    Step 1.1 Establish an environment for product owner success

    1.1.1 Define enablers and blockers of product management

    1.1.2 Define your product management roles and names

    1.1.3 Assess your product management readiness

    Step 1.2 Establish your product ownership model

    1.2.1 Identify your primary product owner perspective

    1.2.2 Define your product owner RACI

    Align Product Owners to Products

    Step 2.1 Assign product owners to products

    2.1.1 Assign resources to your products and families

    Step 2.2 Manage stakeholder influence

    2.2.1 Visualize relationships to identify key influencers

    2.2.2 Group stakeholders into categories

    2.2.3 Prioritize your stakeholders

    Mature Product Owner Capabilities

    Step 3.1 Assess your Agile product owner readiness

    3.1.1 Assess your real Agile skill proficiency

    Step 3.2 Mature product owner capabilities=

    3.2.1 Assess your Vision capability proficiency

    3.2.2 Assess your Leadership capability proficiency

    3.2.3 Assess your PLM capability proficiency

    3.2.4 Identify your business value drivers and sources of value

    3.2.5 Assess your Value Realization capability proficiency

    Deliverables

    1. Enablers and blockers
    2. Role definitions
    3. Product culture readiness
    4. Product owner perspective mapping
    5. Product owner RACI
    1. Product resource assignment
    2. Stakeholder management strategy
    1. Real Agile skill proficiency assessment
    2. Info-Tech’s product owner capability model proficiency assessment
    3. Business value drivers and sources of value

    Related Info-Tech Research

    Product delivery

    Deliver on Your Digital Product Vision

    Build a product vision your organization can take from strategy through execution.

    Deliver Digital Products at Scale

    Deliver value at the scale of your organization through defining enterprise product families.

    Build Your Agile Acceleration Roadmap

    Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

    Develop Your Agile Approach for a Successful Transformation

    Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

    Implement DevOps Practices That Work

    Streamline business value delivery through the strategic adoption of DevOps practices.

    Extend Agile Practices Beyond IT

    Further the benefits of Agile by extending a scaled Agile framework to the business.

    Build Your BizDevOps Playbook

    Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

    Embed Security Into the DevOps Pipeline

    Shift security left to get into DevSecOps.

    Spread Best Practices With an Agile Center of Excellence

    Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

    Enable Organization-Wide Collaboration by Scaling Agile

    Execute a disciplined approach to rolling out Agile methods in the organization.

    Related Info-Tech Research

    Application portfolio management

    APM Research Center

    See an overview of the APM journey and how we can support the pieces in this journey.

    Application Portfolio Management Foundations

    Ensure your application portfolio delivers the best possible return on investment.

    Streamline Application Maintenance

    Effective maintenance ensures the long-term value of your applications.

    Streamline Application Management

    Move beyond maintenance to ensuring exceptional value from your apps.

    Build an Application Department Strategy

    Delivering value starts with embracing what your department can do.

    Embrace Business-Managed Applications

    Empower the business to implement its own applications with a trusted business-IT relationship.

    Optimize Applications Release Management

    Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

    Related Info-Tech Research

    Value, delivery metrics, estimation

    Build a Value Measurement Framework

    Focus product delivery on business value-driven outcomes.

    Select and Use SDLC Metrics Effectively

    Be careful what you ask for, because you will probably get it.

    Application Portfolio Assessment: End User Feedback

    Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

    Create a Holistic IT Dashboard

    Mature your IT department by measuring what matters.

    Refine Your Estimation Practices With Top-Down Allocations

    Don’t let bad estimates ruin good work.

    Estimate Software Delivery With Confidence

    Commit to achievable software releases by grounding realistic expectations.

    Reduce Time to Consensus With an Accelerated Business Case

    Expand on the financial model to give your initiative momentum.

    Optimize Project Intake, Approval, and Prioritization

    Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

    Enhance PPM Dashboards and Reports

    Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

    Related Info-Tech Research

    Organizational design and performance

    Redesign Your IT Organizational Structure

    Focus product delivery on business value-driven outcomes.

    Build a Strategic Workforce Plan

    Have the right people in the right place, at the right time.

    Implement a New Organizational Structure

    Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

    Build an IT Employee Engagement Program

    Don’t just measure engagement, act on it.

    Set Meaningful Employee Performance Measures

    Set holistic measures to inspire employee performance.

    Phase 1

    Establish the Foundation for Product Ownership

    Phase 1: Establish an environment for product owner success, Establish your product ownership model

    Mature and Scale Product Ownership

    This phase will walk you through the following activities:

    1.1.1 Define enablers and blockers of product management

    1.1.2 Define your product management roles and names

    1.1.3 Assess your product management readiness

    1.2.1 Identify your primary product owner perspective

    1.2.2 Define your product owner RACI

    This phase involves the following participants:

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Delivery managers
    • Business analysts

    Step 1.1

    Establish an environment for product owner success

    Activities

    1.1.1 Define enablers and blockers of product management

    1.1.2 Define your product management roles and names

    1.1.3 Assess your product management readiness

    Establish the foundation for product ownership

    This step involves the following participants:

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Delivery managers
    • Business analysts

    Outcomes of this step

    • Enablers and blockers
    • Role definitions

    Empower product owners as the true owners of their product

    Product ownership requires decision-making authority and accountability for the value realization from those decisions. POs are more than a proxy for stakeholders, aggregators for changes, and the communication of someone else’s priorities.

    “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

    – Robbin Schuurman,
    “Tips for Starting Technical Product Managers”

    Info-Tech Best Practice

    Implement Info-Tech’s Product Owner Capability Model to help empower and hold product owners accountable for the maturity and success of their product. The product owner must understand how their product fits into the organization’s mission and strategy in order to align to enterprise value.

    Product and service owners share the same foundation and capabilities

    For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but applies to services, as well.

    Product = Service

    Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

    “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

    • External products
    • Internal products
    • External services
    • Internal services
    • Products as a service (PaaS)
    • Productizing services (SaaS)

    Define product ownership to match your culture and customers

    Characteristics of a discrete product:

    • Has end users or consumers
    • Delivers quantifiable value
    • Evolves or changes over time
    • Has predictable delivery
    • Has definable boundaries
    • Has a cost to produce and operate
    • Has a discrete backlog and roadmap of improvements

    What does not need a product owner?

    • Individual features
    • Transactions
    • Unstructured data
    • One-time solutions
    • Non-repeatable processes
    • Solutions that have no users or consumers
    • People or teams

    Info-Tech Insight

    • Products are long-term endeavors that don’t end after the project finishes.
    • Products mature and improve their ability to deliver value.
    • Products have a discrete backlog of changes to improve the product itself, separate from operational requests fulfilled by the product or service.

    Need help defining your products or services? Download our blueprint Deliver Digital Products at Scale.

    Connect roadmaps to value realization with KPIs

    Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.</p data-verified=

    " loading="lazy">

    Info-Tech Insight

    Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.

    Identify the differences between a project-centric and a product-centric organization

    Differences between Project centric and Product centric organizations in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

    Info-Tech Insight

    Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

    Projects can be a mechanism for funding product changes and improvements

    Projects lifecycle, hybrid lifecycle and product lifecycle. Period or periods of project development have parallel services that encompass a more product-based view.

    Projects withing products

    Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

    You go through a period or periods of project-like development to build a version of an application or product.

    You also have parallel services along with your project development, which encompasses a more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

    Recognize common barriers to product management

    The transition to product ownership is a series of behavioral and cultural changes supported by processes and governance. It takes time and consistency to be successful.

    • Command and control structures
    • Lack of ownership and accountability
    • High instability in the market, demand, or organization
    • Lack of dedicated teams align to delivery, service, or product areas
    • Culture of one-off projects
    • Lack of identified and engaged stakeholders
    • Lack of customer exposure and knowledge

    Agile’s four core values

    “…while there is value in the items on the right, we value the items on the left more.”

    Source: “The Agile Manifesto”

    We value...

    We value being agile: Individuals and interactions, Working Software, Customer collaboration, Responding to change. Versus being prescriptive: Processes and tools, Comprehensive documentation, Contract negotiation, following a plan.

    Exercise 1.1.1 Define enablers and blockers of product management

    1 hour
    1. Identify and mitigate blockers of product management in your organization.
    2. What enablers will support strong product owners?
    3. What blockers will make the transition to product management harder?
    4. For each blocker, also define at least one mitigating step.
    Define enablers e.g. team culture. Define blockers and at least one mitigating step

    Output

    • Enablers and blockers

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Align enterprise value through product families

    Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

    Effective product delivery requires thinking about more than just a single product

    Good application and product management begins with strengthening good practices for a single or small set of applications, products, and services.

    Product portfolio

    Groups of product families within an overall value stream or capability grouping.

    Project portfolio manager

    Product family

    A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

    Product family manager

    Product

    Single product composed of one or more applications and services.

    Product owner

    Info-Tech Insight

    Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

    Exercise 1.1.2 Define your product management roles and names

    1-2 hour
    1. Identify the roles in which product management activities will be owned.
    2. Define a common set of role names and describe the role.
    3. Map the level of accountability for each role: Product or Product Family
    4. Product owner perspectives will be defined in the next step.

    Define roles, description and level of product accountability.

    Output

    • Role definitions

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Use CLAIM to guide your journey

    Culture, Learning, Automation, Integrated teams, Metrics and governance.

    Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

    Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

    Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

    Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

    Successful implementations require the disciplined use of metrics that support developing better teams

    Exercise 1.1.3 Assess your product management readiness

    1 hour
    1. Open and complete the Mature and Scale Product Ownership Readiness Assessment in your Playbook or the provided Excel tool.
    2. Discuss high and low scores for each area to reach a consensus.
    3. Record your results in your Playbook.

    Assess your culture, learning, automation, Integrated teams, metrics and governance.

    Output

    • Assessment of product management readiness based on Info-Tech’s CLAIM+G model.

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Readiness Assessment.

    Communicate reasons for changes and how they will be implemented

    Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

    Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

    The organizational change message should:

    Step 1.2

    Establish your product ownership model

    Activities

    1.2.1 Identify your primary product owner perspective

    1.2.2 Define your product owner RACI

    Establish the foundation for product ownership

    This step involves the following participants:

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Delivery managers
    • Business analysts

    Outcomes of this step

    • Product owner perspective mapping
    • Product owner RACI

    Recognize the product owner perspectives

    The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

    Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

    Info-Tech Best Practice

    Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

    Identify and align to product owner perspectives to ensure product success

    Product owner perspectives

    The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.
    1. Each product owner perspective provides important feedback, demand, and support for the product.
    2. Where a perspective is represented by a distinct role, the perspective is managed with that product owner.
    3. If separate roles don’t exist, the product owner must evaluate their work using two or three perspectives.
    4. The ultimate success of a product, and therefore product owner, is meeting the end-user value of the business product owner, tool support of the technical product owner, and manual processing support of the operations product owner.

    Line of business (LOB) product owners

    LOB product owners focus on the products and services consumed by the organization’s external consumers and users. The role centers on the market needs, competitive landscape, and operational support to deliver products and services.

    Business perspective

    • Alignment to enterprise strategy and priorities
    • Growth: market penetration and/or revenue
    • Perception of product value
    • Quality, stability, and predictability
    • Improvement and innovation
    • P&L
    • Market threats and opportunities
    • Speed to market
    • Service alignment
    • Meet or exceed individual goals

    Relationship to Operations

    • Customer satisfaction
    • Speed of delivery and manual processing
    • Continuity

    Relationship to Technical

    • Enabler
    • Analysis and insight
    • Lower operating and support costs

    Technical product owners

    Technical product owners are responsible for the IT systems, tools, platforms, and services that support business operations. Often they are identified as application or platform managers.

    Technical perspective

    • Application, application suite, or group of applications
    • Core platforms and tools
    • Infrastructure and networking
    • Third-party technology services
    • Enable business operations
    • Direct-to-customer product or service
    • Highly interconnected
    • Need for continuous improvement
    • End-of-life management
    • Internal value proposition and users

    Relationship to Business

    • Direct consumers
    • End users
    • Source of funding

    Relationship to Operations

    • End users
    • Process enablement or automation
    • Support, continuity, and manual intervention

    Operations (service) product owners

    Operational product owners focus on the people, processes, and tools needed for manual processing and decisions when automation is not cost-effective. Operational product owners are typically called service owners due to the nature of their work.

    Operational perspective

    • Business enablement
    • Continuity
    • Problem, incident, issue resolution
    • Process efficiency
    • Throughput
    • Error/defect avoidance
    • Decision enablement
    • Waste reduction
    • Limit time in process
    • Disaster recovery

    Relationship to Business

    • Revenue enablement
    • Manual intervention and processing
    • End-user satisfaction

    Relationship to Technical

    • Process enabler
    • Performance enhancement
    • Threat of automation

    Exercise 1.2.1 Identify your primary product owner perspective

    1 hour
    1. Identify which product owner perspective represents your primary focus.
    2. Determine where the other perspectives need to be part of your product roadmap or if they are managed by other product owners.

    Identify product/service name, identify product owner perspective, determine if other perspectives need to be part of roadmap.

    Output

    • Identification of primary product owner perspective.

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Realign differences between project managers and product owners

    Differences between Project Manager and Product Owners in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

    Manage and communicate key milestones

    Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

    Define key milestones and their product delivery life-cycles.

    Info-Tech Best Practice

    Product ownership isn’t just about managing the product backlog and development cycles. Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints.

    Define who manages each key milestone

    Key milestones must be proactively managed. If a project manager is not available, those responsibilities need to be managed by the product owner or Scrum Master. Start with responsibility mapping to decide which role will be responsible.

    Example milestones and Project Manager, Product Owner and Team Facilitator.

    *Scrum Master, Delivery Manager, Team Lead

    Exercise 1.2.2 Define your product owner RACI

    60 minutes
    1. Review your product and project delivery methodologies to identify key milestones (including approvals, gates, reviews, compliance checks, etc.). List each milestone on a flip chart or whiteboard.
    2. For each milestone, define who is accountable for the completion.
    3. For each milestone, define who is responsible for executing the milestone activity. (Who does the work that allows the milestone to be completed?)
    4. Review any responsibility and accountability gaps and identify opportunities to better support and execute your operating model.
    5. If you previously completed Deliver Digital Products at Scale , review and update your RACI in the Mature and Scale Product Ownership Workbook .

    Define: Milestones, Project Manager, Product/service owner, Team Facilitator, and Other roles.

    Output

    • Product owner RACI

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Phase 2

    Align Product Owners to Products

    Phase 2: Assign product owners to products, Manage stakeholder influence

    Mature and Scale Product Ownership

    This phase will walk you through the following activities:

    2.1.1 Assign resources to your products and families

    2.2.1 Visualize relationships to identify key influencers

    2.2.2 Group stakeholders into categories

    2.2.3 Prioritize your stakeholders

    This phase involves the following participants:

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Delivery managers
    • Business analysts

    Step 2.1

    Assign product owners to products

    Activities

    2.1.1 Assign resources to your products and families

    Align product owners to products

    This step involves the following participants:

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Delivery managers
    • Business analysts

    Outcomes of this step

    • Product resource assignment

    Match your product management role definitions to your product family levels

    Using the role definitions, you created in Exercise 1.1.2, determine which roles correspond to which levels of your product families.

    Product portfolio

    Groups of product families within an overall value stream or capability grouping.

    Project portfolio manager

    Product family

    A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

    Product family manager

    Product

    Single product composed of one or more applications and services.

    Product owner

    Info-Tech Insight

    Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

    Assign resources throughout your product families

    Project families are owned by a product manager. Product owners own each product that has a distinct backlog.

    Info-Tech Insight

    • Start by assigning resources to each product or product family box.
    • A product owner can be responsible for more than one product.
    • Ownership of more than one product does not mean they share the same backlog.
    • For help organizing your product families, please download Deliver Digital Products at Scale.

    Understand special circumstances

    In Deliver Digital Products at Scale , products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

    Value stream alignment

    • Business architecture
      • Value stream
      • Capability
      • Function
    • Market/customer segment
    • Line of business (LoB)
    • Example: Customer group > value stream > products

    Enterprise applications

    • Enabling capabilities
    • Enterprise platforms
    • Supporting apps
    • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

    Shared Services

    • Organization of related services into service family
    • Direct hierarchy does not necessarily exist within the family
    • Examples: End-user support and ticketing, workflow and collaboration tools

    Technical

    • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
    • Often used in combination with Shared Services grouping or LoB-specific apps
    • Examples: Java, .NET, low-code, database, network

    Organizational alignment

    • Used at higher levels of the organization where products are aligned under divisions
    • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

    Map the source of demand to each product

    With enterprise applications and shared services, your demand comes from other product and service owners rather than end customers in a value stream.

    Enterprise applications

    • Primary demand comes from the operational teams and service groups using the platform.
    • Each group typically has processes and tools aligned to a module or portion of the overall platform.
    • Product owners determine end-user needs to assist with process improvement and automation.
    • Product family managers help align roadmap goals and capabilities across the modules and tools to ensure consistency and the alignment of changes.

    Shared services

    • Primary demand for shared services comes from other product owners and service managers whose solution or application is dependent on the shared service platform.
    • Families are grouped by related themes (e.g. workflow tools) to increase reusability, standard enterprise solutions, reduced redundancy, and consistent processes across multiple teams.
    • Product owners manage the individual applications or services within a family.

    Pattern: Enterprise applications

    A division or group delivers enabling capabilities and the team’s operational alignment maps directly to the modules/components of an enterprise application and other applications that support the specific business function.

    Workforce Management, Strategic HR, Talent Management, Core HR

    Example:

    • Human resources is one corporate function. Within HR, however, there are subfunctions that operate independently.
    • Each operational team is supported by one or more applications or modules within a primary HR system.
    • Even though the teams work independently, the information they manage is shared with, or ties into processes used by other teams. Coordination of efforts helps provide a higher level of service and consistency.

    For additional information about HRMS, please download Get the Most Out of Your HRMS.

    Assigning owners to enterprise applications

    Align your enterprise application owners to your operating teams that use the enterprise applications. Effectively, your service managers will align with your platform module owners to provide integrated awareness and planning.

    Family manager (top-level), Family managers (second-level) and Product owners.

    Pattern: Shared services

    Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

    Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

    Example:

    • Recommended for governance, risk, and compliance; infrastructure; security; end-user support; and shared platforms (workflow, collaboration, imaging/record retention). Direct hierarchies do not necessarily exist within the shared service family.
    • Service groupings are common for service owners (also known as support managers, operations managers, etc.).
    • End-user ticketing comes through a common request system, is routed to the team responsible for triage, and then is routed to a team for resolution.
    • Collaboration tools and workflow tools are enablers of other applications, and product families might support multiple apps or platforms delivering that shared capability.

    Assigning owners to shared services

    Assign owners by service type, knowledge area, or technology to provide alignment of shared business capabilities and common solutions.

    Family manager (top-level), Family managers (second-level) and Product owners.

    Map sources of demand and influencers

    Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

    Map of key stakeholders for enterprise applications and shared services.

    Info-Tech Insight

    Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

    Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

    Exercise 2.1.1 Assign resources to your products and families

    1-4 hours
    1. Use the product families you completed in Deliver Digital Products at Scale to determine which products and product families need a resource assigned. Where the same resource fills more than one role, they are the product owner or manager for each independently.
    2. Product families that are being managed as products (one backlog for multiple products) should have one owner until the family is split into separate products later.
    3. For each product and family, define the following:
      • Who is the owner (role or person)?
      • Is ownership clearly defined?
      • Are there other stakeholders who make decisions for the product?
    4. Record the results in the Mature and Scale Product Ownership Workbook on the Product Owner Mapping worksheet.

    Output

    • Product owner and manager resource alignment.

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Step 2.2

    Manage stakeholder influence

    Activities

    2.2.1 Visualize relationships to identify key influencers

    2.2.2 Group stakeholders into categories

    2.2.3 Prioritize your stakeholders

    Align product owners to products

    This step involves the following participants:

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Delivery managers
    • Business analysts

    Outcomes of this step

    • Stakeholder management strategy

    Develop a product owner stakeholder strategy

    Stakeholder management, Product lifecycle, Project delivery, Operational support.

    Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

    Product owners operate within a network of stakeholders who represent different perspectives within the organization.

    First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

    Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

    Create a stakeholder network map to product roadmaps and prioritization

    Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

    Create a stakeholder network map to product roadmaps and prioritization. Use connectors to determine who may be influencing your direct stakeholders.

    Info-Tech Insight

    Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

    Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

    Exercise 2.2.1 Visualize relationships to identify key influencers

    1 hour
    1. List direct stakeholders for your product.
    2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
    3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
    4. Construct a diagram linking stakeholders and their influencers together.
      • Use black arrows to indicate the direction of professional influence.
      • Use dashed green arrows to indicate informal bidirectional influence relationships.
    5. Record the results in the Mature and Scale Product Ownership Workbook .

    Output

    • Relationships among stakeholders and influencers

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Categorize your stakeholders with a prioritization map

    A stakeholder prioritization map helps product owners categorize their stakeholders by their level of influence and ownership in the product and/or teams.

    Influence versus Ownership/Interest

    There are four areas on the map, and the stakeholders within each area should be treated differently.

    • Players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediments to the objectives.
    • Mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
    • Noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively but have little ability to enact their wishes.
    • Spectators are generally apathetic and have little influence over or interest in the initiative.

    Exercise 2.2.2 Group stakeholders into categories

    1 hour
    1. Identify your stakeholders’ interest in and influence on your Agile implementation as high, medium, or low by rating the attributes below.
    2. Map your results to the model below to determine each stakeholder’s category.
    3. Record the results in the Mature and Scale Product Ownership Workbook .

    Influence versus Ownership/Interest with CMO, CIO and Product Manager in assigned areas.

    Output

    • Categorization of stakeholders and influencers

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Prioritize your stakeholders

    There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

    Stakeholder category versus level of support.

    Consider the three dimensions of stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: How likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive your focused attention. The table to the right indicates how stakeholders are ranked.

    Exercise 2.2.3 Prioritize your stakeholders

    1 hour
    1. Identify the level of support of each stakeholder by answering the following question: How likely is it that your stakeholder would endorse your product?
    2. Prioritize your stakeholders using the prioritization scheme on the previous slide.
    3. Record the results in the Mature and Scale Product Ownership Workbook .

    Stakeholder, Category, level of support, prioritization.

    Output

    • Stakeholder and influencer prioritization

    Participants

    • Product owners
    • Product managers
    • Development team leads
    • Portfolio managers
    • Business analysts

    Capture in the Mature and Scale Product Ownership Playbook.

    Define strategies for engaging stakeholders by type

    Authority Vs. Ownership/Interest.

    Type

    Quadrant

    Actions

    Players

    High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve players in the process and maintain their engagement and interest by demonstrating their value to its success.

    Mediators

    High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

    Noisemakers

    Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using mediators to help them.

    Spectators

    Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

    Info-Tech Insight

    Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy spectators and noisemakers while ensuring the needs of mediators and players are met.

    Phase 3

    Mature Product Owner Capabilities

    Phase 3: Assess your Agile product owner readiness, Mature product owner capabilities.

    Mature and Scale Product Ownership

    This phase will walk you through the following activities:

    3.1.1 Assess your real Agile skill proficiency

    3.2.1 Assess your vision capability proficiency

    3.2.2 Assess your leadership capability proficiency

    3.2.3 Assess your PLM capability proficiency

    3.2.4 Identify your business value drivers and sources of value

    3.2.5 Assess your value realization capability proficiency

    This phase involves the following participants:

    • Product owners
    • Product managers

    Step 3.1

    Assess your Agile product owner readiness

    Activities

    3.1.1 Assess your real Agile skill proficiency

    Mature product owner capabilities

    This step involves the following participants:

    • Product owners
    • Product managers

    Outcomes of this step

    • Real Agile skill proficiency assessment

    Why focus on core skills?

    They are the foundation to achieve business outcomes

    Skills, actions, output and outcomes

    The right skills development is only possible with proper assessment and alignment against outcomes.

    Being successful at Agile is more than about just doing Agile

    The following represents the hard skills needed to “Do Agile”:

    Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.

    • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
    • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
    • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
    • Tools skills. This represents the software that helps you deliver other software.

    While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

    Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

    Focus on these real Agile skills

    Agile skills

    • Accountability
    • Collaboration
    • Comfort with ambiguity
    • Communication
    • Empathy
    • Facilitation
    • Functional decomposition
    • Initiative
    • Process discipline
    • Resilience

    Info-Tech research shows these are the real Agile skills to get started with

    Skill Name

    Description

    Accountability

    Refers to the state of being accountable. In an Agile context, it implies transparency, dedication, acting responsibly, and doing what is necessary to get the job done.

    Collaboration

    Values diverse perspectives and working with others to achieve the best output possible. Effective at working toward individual, team, department, and organizational goals.

    Comfort with ambiguity

    Allows you to confidently take the next steps when presented with a problem without having all the necessary information present.

    Communication

    Uses different techniques to share information, concerns, or emotions when a situation arises, and it allows you to vary your approach depending on the current phase of development.

    Empathy

    Is the ability to understand and share the feelings of another to better serve your team and your stakeholders.

    Facilitation

    Refers to guiding and directing people through a set of conversations and events to learn and achieve a shared understanding.

    Functional decomposition

    Is being able to break down requirements into constituent epics and stories.

    Initiative

    Is being able to anticipate challenges and then act on opportunities that lead to better business outcomes.

    Process discipline

    Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.

    Resilience

    Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

    Accountability

    An accountable person:

    • Takes ownership of their own decisions and actions and is responsible for the quality of results.
    • Recognizes personal accountabilities to others, including customers.
    • Works well autonomously.
    • Ensures that the mutual expectations between themselves and others are clearly defined.
    • Takes the appropriate actions to ensure that obligations are met in a timely manner.
    • As a leader, takes responsibility for those being led.

    Accountability drives high performance in teams and organizations

    • The performance level of teams depends heavily on accountability and who demonstrates it:
      • In weak teams, there is no accountability.
      • In mediocre teams, supervisors demonstrate accountability.
      • In high-performance teams, peers manage most performance problems through joint accountability. (Grenny, 2014)
    • According to Bain & Company, accountability is the third most important attribute of high-performing companies. Some of the other key attributes include honest, performance-focused, collaborative, and innovative. (Mankins, 2013)

    All components of the employee empowerment driver have a strong, positive correlation with engagement.

    Employee empowerment and Correlation with engagement.

    Source: McLean & Company Engagement Database, 2018; N=71,794

    Accountability

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Alerts others to possible problems in a timely manner.
    • Seeks appropriate support to solve problems.
    • Actively contributes to the creation and evaluation of possible solutions.
    • Acts on solutions selected and decisions made as directed.
    • Makes effective decisions about how to complete work tasks.
    • Demonstrates the capability of breaking down concrete issues into parts and synthesizing information succinctly.
    • Collects and analyzes information from a variety of sources.
    • Seeks information and input to fully understand the cause of problems.
    • Takes action to address obstacles and problems before they impact performance and results.
    • Initiates the evaluation of possible solutions to problems.
    • Makes effective decisions about work task prioritization.
    • Appropriately assesses risks before deciding.
    • Effectively navigates through ambiguity, using multiple data points to analyze issues and identify trends.
    • Does not jump to conclusions.
    • Draws logical conclusions and provides opinions and recommendations with confidence.
    • Takes ownership over decisions and their consequences.
    • Demonstrates broad knowledge of information sources that can be used to assess problems and make decisions.
    • Invests time in planning, discovery, and reflection to drive better decisions.
    • Effectively leverages hard data as inputs to making decisions.
    • Garners insight from abstract data and makes appropriate decisions.
    • Coaches others in effective decision-making practices.
    • Has the authority to solve problems and make decisions.
    • Thinks several steps ahead in deciding the best course of action, anticipating likely outcomes, risks, or implications.
    • Establishes metrics to aid in decision-making, for self and teams
    • Prioritizes objective and ambiguous information and analyzes this when making decisions.
    • Solicits a diverse range of opinions and perspectives as inputs to decision making.
    • Applies frameworks to decision making, particularly in situations that have little base in prior experience.
    • Makes effective decisions about organizational priorities.
    • Holds others accountable for their decisions and consequences.
    • Creates a culture of empowerment and trust to facilitate effective problem solving and decision making.
    • Makes sound decisions that have organization-wide consequences and that influence future direction.

    Collaboration as a skill

    The principles and values of Agile revolve around collaboration.

    • Works well with others on specialized and cross-functional teams.
    • Can self-organize while part of a team.
    • Respects the commitments that others make.
    • Identifies and articulates dependencies.
    • Values diverse perspectives and works with others to achieve the best output possible.
    • Effective at working toward individual, team, department, and organizational goals.
    The principles and values of Agile revolve around collaboration. Doing what was done before (being prescriptive), going though the motions (doing Agile), living the principles (being Agile)

    Collaboration

    The Agile Manifesto has three principles that focus on collaboration:

    1. The business and developers must work together daily throughout the project.
    2. Build projects around motivated individuals. Give them the environment and support they need and trust them to get the job done.
    3. The most efficient and effective method of conveying information to and within a development team is face-to-face conversation.

    Effective collaboration supports Agile behaviors, including embracing change and the ability to work iteratively.

    Collaboration

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Understands role on the team and the associated responsibilities and accountabilities.
    • Treats team members with respect.
    • Contributes to team decisions and to the achievement of team goals and objectives.
    • Demonstrates a positive attitude.
    • Works cross-functionally to achieve common goals and to support the achievement of other team/department goals.
    • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
    • Fosters team camaraderie, collaboration, and cohesion.
    • Understands the impact of one's actions on the ability of team members to do their jobs.
    • Respects the differences other team members bring to the table by openly seeking others' opinions.
    • Helps the team accomplish goals and objectives by breaking down shared goals into smaller tasks.
    • Approaches challenging team situations with optimism and an open mind, focusing on coming to a respectful conclusion.
    • Makes suggestions to improve team engagement and effectiveness.
    • Supports implementation of team decisions.
    • Professionally gives and seeks feedback to achieve common goals.
    • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
    • Motivates the team toward achieving goals and exceeding expectations.
    • Reaches out to other teams and departments to build collaborative, cross-functional relationships.
    • Creates a culture of collaboration that leverages team members' strengths, even when the team is remote or virtual.
    • Participates and encourages others to participate in initiatives that improve team engagement and effectiveness.
    • Builds consensus to make and implement team decisions, often navigating through challenging task or interpersonal obstacles.
    • Values leading a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
    • Creates a culture of collaboration among teams, departments, external business partners, and all employee levels.
    • Breaks down silos to achieve inter-departmental collaboration.
    • Demonstrates ownership and accountability for team/department/ organizational outcomes.
    • Uses an inclusive and consultative approach in setting team goals and objectives and making team decisions.
    • Coaches others on how to identify and proactively mitigate potential points of team conflict.
    • Recognizes and rewards teamwork throughout the organization.
    • Provides the tools and resources necessary for teams to succeed.
    • Values diverse teams and understands the importance of differing perspectives to develop unique solutions or ideas.

    Comfort with ambiguity

    Ability to handle ambiguity is a key factor in Agile success.

    • Implies the ability to maintain a level of effectiveness when all information is not present.
    • Able to confidently act when presented with a problem without all information present.
    • Risk and uncertainty can comfortably be handled.
    • As a result, can easily adapt and embrace change.
    • People comfortable with ambiguity demonstrate effective problem-solving skills.

    Relative importance of traits found in Agile teams

    1. Handles ambiguity
    2. Agreeable
    3. Conscientious

    Comfort with ambiguity

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Requires most information to be present before carrying out required activities.
    • Can operate with some information missing.
    • Comfortable asking people within their known circles for help.
    • Significant time is taken to reveal small pieces of information.
    • More adept at operating with information missing.
    • Willing to reach out to people outside of their regular circles for assistance and clarification.
    • Able to apply primary and secondary research methods to fill in the missing pieces.
    • Can operate essentially with a statement and a blank page.
    • Able to build a plan, drive others and themselves to obtain the right information to solve the problem.
    • Able to optimize only pulling what is necessary to answer the desired question and achieve the desired outcome.

    Communication

    Even though many organizations recognize its importance, communication is one of the root causes of project failure.

    Project success vs Communication effectiveness. Effective communications is associated with a 17% increase in finishing projects within budget.

    56%

    56% of the resources spent on a project are at risk due to ineffective communications.

    PMI, 2013.

    29%

    In 29% of projects started in the past 12 months, poor communication was identified as being one of the primary causes of failure.

    PMI, 2013.

    Why are communication skills important to the Agile team?

    It’s not about the volume, it’s about the method.

    • Effectively and appropriately interacts with others to build relationships and share ideas and information.
    • Uses tact and diplomacy to navigate difficult situations.
    • Relays key messages by creating a compelling story, targeted toward specific audiences.

    Communication effectiveness, Activity and Effort required.

    Adapted From: Agile Modeling

    Communication

    Your Score:____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Actively listens, learns through observation, and uses clear and precise language.
    • Possesses an open and approachable demeanor, with a positive and constructive tone.
    • Demonstrates interest in the thoughts and feelings of others.
    • Considers potential responses of others before speaking or acting.
    • Checks own understanding of others’ communication by repeating or paraphrasing.
    • Demonstrates self-control in stressful situations.
    • Provides clear, concise information to others via verbal or written communication.
    • Seeks to understand others' points of view, looking at verbal and non-verbal cues to encourage open and honest discussions.
    • Invites and encourages others to participate in discussions.
    • Projects a sincere and genuine tone.
    • Remains calm when dealing with others who are upset or angry.
    • Provides and seeks support to improve communication.
    • Does not jump to conclusions or act on assumptions.
    • Tailors messages to meet the different needs of different audiences.
    • Accurately interprets responses of others to their words and actions.
    • Provides feedback effectively and with empathy.
    • Is a role model for others on how to effectively communicate.
    • Ensures effective communication takes place at the departmental level.
    • Engages stakeholders using appropriate communication methods to achieve desired outcomes.
    • Creates opportunities and forums for discussion and idea sharing.
    • Demonstrates understanding of the feelings, motivations, and perspectives of others, while adapting communications to anticipated reactions.
    • Shares insights about their own strengths, weaknesses, successes, ad failures to show empathy and help others relate.
    • Discusses contentious issues without getting defensive and maintains a professional tone.
    • Coaches others on how to communicate effectively and craft targeted messages.
    • Sets and exemplifies standards for respectful and effective communications in the organization.
    • Comfortably delivers strategic messages supporting their function and the organization at the enterprise level.
    • Communicates with senior-level executives on complex organizational issues.
    • Promotes inter-departmental communication and transparency.
    • Achieves buy-in and consensus from people who share widely different views.
    • Shares complex messages in clear, understandable language.
    • Accurately interprets how they are perceived by others.
    • Rallies employees to communicate ideas and build upon differing perspectives to drive innovation.

    Empathy

    Empathy is the ability to understand and share the feelings of another in order to better serve your team and your stakeholders. There are three kinds:

    Cognitive

    Thought, understanding, intellect

    • Knowing how someone else feels and what they might be thinking.
    • Contributes to more effective communication.

    Emotional

    Feelings, physical sensation

    • You physically feel the emotions of the other person.
    • Helps build emotional connections with others.

    Compassionate

    Intellect, emotion with action

    • Along with understanding, you take action to help.

    How is empathy an Agile skill?

    Empathy enables you to serve your team, your customers, and your organization

    Serving the team

    • Primary types: Emotional and compassionate empathy.
    • The team is accountable for delivery.
    • By being able to empathize with the person you are talking to, complex issues can be addressed.
    • A lack of empathy leads to a lack of collaboration and being able to go forward on a common path.

    Serving your customers and stakeholders

    • Primary type: Cognitive empathy.
    • Agile enables the delivery of the right value at the right time to your stakeholders
    • Translating your stakeholders' needs requires an understanding of who they are as people. This is done through observations, interviews and conversations.
    • Leveraging empathy maps and user-story writing is an effective tool.

    Empathy

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Knowing how someone else feels and what they might be thinking.
    • Ability to build emotional connections with others.
    • Able to harness emotional connections to achieve tangible and experiential outcomes.
    • Demonstrates an awareness of different feelings and ways of thinking by both internal and external stakeholders.
    • Limited ability to make social connections with others outside of the immediate team.
    • Able to connect with similarly minded people to improve customer/stakeholder satisfaction. (Insights into action)
    • Able to interact and understand others with vastly different views.
    • Lack of agreement does not stop individual. from asking questions, understanding, and pushing the conversation forward

    Facilitation

    It’s not just your manager’s problem.

    “Facilitation is the skill of moderating discussions within a group in order to enable all participants to effectively articulate their views on a topic under discussion, and to ensure that participants in the discussion are able to recognize and appreciate the differing points of view that are articulated.” (IIBA, 2015)

    • Drives action through influence, often without authority.
    • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
    • Encourages others to self-organize and hold themselves accountable.
    • Identifies blockers and constructively removes barriers to progress.

    Facilitation

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Drives action through influence, often without authority.
    • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
    • Encourages others to self-organize and hold themselves accountable.
    • Identifies blockers and constructively removes barriers to progress.
    • Maps and executes processes effectively.
    • Uses facts and concrete examples to demonstrate a point and gain support from others.
    • Openly listens to the perspectives of others.
    • Builds relationships through honest and consistent behavior.
    • Understands the impact of their own actions and how others will perceive it.
    • Identifies impediments to progress.
    • Anticipates the effect of one's approach on the emotions and sensitivities of others.
    • Practices active listening while demonstrating positivity and openness.
    • Customizes discussion and presentations to include "what’s in it for me" for the audience.
    • Presents compelling information to emphasize the value of an idea.
    • Involves others in refining ideas or making decisions in order to drive buy-in and action.
    • Knows how to appropriately use influence to achieve outcomes without formal authority.
    • Seeks ways and the help of others to address barriers or blockers to progress.
    • Leverages a planned approach to influencing others by identifying stakeholder interests, common goals, and potential barriers.
    • Builds upon successes to gain acceptance for new ideas.
    • Facilitates connections between members of their network for the benefit of the organization or others.
    • Demonstrates the ability to draw on trusting relationships to garner support for ideas and action.
    • Encourages a culture that allows space for influence to drive action.
    • Adept at appropriately leveraging influence to achieve business unit outcomes.
    • Actively manages the removal of barriers and blockers for teams.

    Functional decomposition

    It’s not just a process, it’s a skill.

    “Functional decomposition helps manage complexity and reduce uncertainty by breaking down processes, systems, functional areas, or deliverables into their simpler constituent parts and allowing each part to be analyzed independently."

    (IIBA, 2015)

    Being able to break down requirements into constituent consumable items (example: epics and user stories).

    Start: Strategic Initiatives. 1: Epics. 2: Capabilities. 3: Features. End: Stories.

    Use artifact mapping to improve functional decomposition

    In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

    Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

    Functional Decomposition

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Able to decompose items with assistance from other team members.
    • Able to decompose items independently, ensuring alignment with business value.
    • Able to decompose items independently and actively seeks out collaboration opportunities with relevant SME's during and after the refinement process to ensure completion.
    • Able to decompose items at a variety of granularity levels.
    • Able to teach and lead others in their decomposition efforts.
    • Able to quickly operate at different levels of the requirements stack.

    Initiative and self-organization

    A team that takes initiative can self-organize to solve critical problems.

    • "The best architectures, requirements, and designs emerge from self-organizing teams." (Agile Manifesto)
    • In a nutshell, the initiative represents the ability to anticipate challenges and act on opportunities that lead to better business outcomes.
    • Anticipates challenges and acts on opportunities that lead to better business outcomes.
    • Thinks critically and is motivated to use both specialist expertise and general knowledge.
    • Driven by the delivery of business value and better business outcomes.
    • Empowers others to act and is empowered and self-motivated.

    Initiative and self-organization

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Demonstrates awareness of an opportunity or issue which is presently occurring or is within the immediate work area.
    • Reports an opportunity or issue to the appropriate person.
    • Acts instead of waiting to be asked.
    • Willingly takes on challenges, even if they fall outside their area of expertise.
    • Is proactive in identifying issues and making recommendations to resolve them.
    • Within the scope of the work environment, takes action to improve processes or results, or to resolve problems.
    • Not deterred by obstacles.
    • Tackles challenges that require risk taking.
    • Procures the necessary resources, team and technical support to enable success.
    • Assists others to get the job done.
    • Demonstrates awareness of an opportunities or issues which are in the future or outside the immediate work area.
    • Typically exceeds the expectations of the job.
    • Learns new technology or skills outside their specialization so that they can be a more effective team member.
    • Recommends solutions to enhance results or prevent potential issues.
    • Drives implementation of new processes within the team to improve results.
    • Able to provide recommendations on plans and decisions that are strategic and future-oriented for the organization.
    • Identifies areas of high risk or of organizational level impact.
    • Able to empower significant recourses from the organization to enable success.
    • Leads long-term engagements that result in improved organizational capabilities and processes.

    Process discipline

    A common misconception is that Agile means no process and no discipline. Effective Agile teams require more adherence to the right processes to create a culture of self-improvement.

    • Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.
    • Focus on following the right steps for a given activity at the right time to achieve desired outcomes.
    Example: Scrum Ceremonies during a sprint (1 - 4 weeks/sprint). 1: Sprint planning, 2: Daily scrum, 3: Sprint review, 4: Sprint retrospective.

    Process discipline

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Demonstrates awareness of the key processes and steps that are needed in a given situation.
    • Limited consistency in following processes and limited understanding of the 'why' behind the processes.
    • Aware and follows through with key agile processes in a consistent manner.
    • Demonstrates not only the knowledge of processes but understands the 'why' behind their existence.
    • Aware and follows through with key agile processes in a consistent manner.
    • Demonstrates understanding of not only why specific processes exist but can suggest changes to improve efficiency, consistency, and outcomes.

    N/A -- Maximum level is '3

    Resilience

    If your team hits the wall, don’t let the wall hit them back.

    • Resilience is critical for an effective Agile transformation. A team that demonstrates resilience always exhibits:
    • Evolution over transformation – There is a recognition that changes happen over time.
    • Intensity and productivity – A race is not won by the ones who are the fastest, but by the ones who are the most consistent. Regardless of what comes up, the team can push through.
    • That organizational resistance is futile – Given that it is working on the right objectives, the team needs to demonstrate a consistency of approach and intensity regardless of what may stand in its way.
    • Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

    How resilience aligns with Agile

    A team is not “living the principles” without resilience.

    1. Purpose

      Aligns with: “Our highest priority is to satisfy the customer through early and continuous delivery of valuable software.” The vision or goals may not be clear in certain circumstances and can be difficult to relate to a single work item. Being able to intrinsically source and harness a sense of purpose becomes more important, especially as a self-organizing team.
    2. Perseverance

      Aligns with: “Agile processes harness change for the customer's competitive advantage.” Perseverance enables teams to continuously deliver at a steady pace, addressing impediments or setbacks and continuing to move forward.
    3. Composure

      Aligns with: “Agile processes promote sustainable development,” and “At regular intervals, the team reflects ... and adjusts its behavior accordingly.”
      When difficult situations arise, composure allows us to understand perspectives, empathize with customers, accept late changes, and sustain a steady pace.
    4. Self-Reliance

      Aligns with: “The best architectures, requirements, and designs emerge from self-organizing teams.” Knowing oneself, recognizing strengths, and drawing on past successes, can be a powerful aid in creating high-performing Agile teams
    5. Authenticity

      Aligns with: “At regular intervals, the team reflects … and adjusts its behavior accordingly,” and “Build projects around motivated individuals.”
      When difficult situations arise, authenticity is crucial. “For example, being able to openly disclose areas outside of your strengths in sprint planning or being able to contribute constructively toward self-organization.”

    Adapted from: Why Innovation, 2019.

    Resilience

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Easily distracted and stopped by moderately stressful and challenging situations.
    • Requires significant help from others to get back on track.
    • Not frequently able (or knows) how to ask for help
    • Handles typical stresses and challenges for the given role.
    • Able to get back on track with limited assistance.
    • Able to ask for help when they need it.
    • Quality of work unaffected by an increase in pressures and challenges.
    • Handles stresses and challenges what is deemed above and beyond their given role.
    • Able to provide advice to others on how to handle difficult and challenging situations.
    • Quality of work and outcomes is maintained and sometimes exceeded as pressure increases.
    • Team looks to this individual as being the gold standard on how to approach any given problem or situation.
    • Directly mentors others on approaches in situations regardless of the level of challenge.

    Exercise 1.2.1 Identify your primary product owner perspective

    1 hour
    1. Review each real Agile skill and determine your current proficiency.
    2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
    3. Record the results in the Mature and Scale Product Ownership Playbook.
    4. Review the skills map to identify strengths and areas of growth.

    Accountability, Collaboration, Comfort in Ambiguity, Communication, Empathy, Facilitation, Functional Decomposition, Initiative, Process Discipline, Resilience.

    Output

    • Agile skills assessment results.

    Participants

    • Product owners
    • Product managers

    Capture in the Mature and Scale Product Owner Proficiency Assessment.

    Determine your Agile skills proficiency: Edit chart data to plot your scores or add your data points and connect the lines.

    Step 3.2

    Mature product owner capabilities

    Activities

    3.2.1 Assess your vision capability proficiency

    3.2.2 Assess your leadership capability proficiency

    3.2.3 Assess your PLM capability proficiency

    3.2.4 Identify your business value drivers and sources of value

    3.2.5 Assess your value realization capability proficiency

    Mature product owner capabilities

    This step involves the following participants:

    • Product owners
    • Product managers

    Outcomes of this step

    • Info-Tech product owner capability model proficiency assessment

    Product capabilities deliver value

    As a product owner, you are responsible for managing these facets through your capabilities and activities.

    The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

    Info-Tech Best Practice

    It is easy to lose sight of what matters when we look at a product from a single point of view . Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

    Recognize product owner knowledge gaps

    Pulse survey of product owners

    Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

    Info-Tech Insight

    1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
    2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

    Source: Pulse Survey (N=18)

    Implement the Info-Tech product owner capability model

    Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

    Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

    Vision

    • Market Analysis
    • Business Alignment
    • Product Roadmap

    Leadership

    • Soft Skills
    • Collaboration
    • Decision Making

    Product Lifecycle Management

    • Plan
    • Build
    • Run

    Value Realization

    • KPIs
    • Financial Management
    • Business Model

    Product owner capabilities provide support

    Vision predicts impact of Value realization. Value realization provides input to vision

    Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

    Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

    Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

    Product owner capabilities provide support

    Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

    Develop product owner capabilities

    Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

    Avoid common capability gaps

    Vision

    • Focusing solely on backlog grooming (tactical only)
    • Ignoring or failing to align product roadmap to enterprise goals
    • Operational support and execution
    • Basing decisions on opinion rather than market data
    • Ignoring or missing internal and external threats to your product

    Leadership

    • Failing to include feedback from all teams who interact with your product
    • Using a command-and-control approach
    • Viewing product owner as only a delivery role
    • Acting as a proxy for stakeholder decisions
    • Avoiding tough strategic decisions in favor of easier tactical choices

    Product lifecycle management

    • Focusing on delivery and not the full product lifecycle
    • Ignoring support, operations, and technical debt
    • Failing to build knowledge management into the lifecycle
    • Underestimating delivery capacity, capabilities, or commitment
    • Assuming delivery stops at implementation

    Value realization

    • Focusing exclusively on “on time/on budget” metrics
    • Failing to measure a 360-degree end-user view of the product
    • Skipping business plans and financial models
    • Limiting financial management to project/change budgets
    • Ignoring market analysis for growth, penetration, and threats

    Capabilities: Vision

    Market Analysis

    • Customer Empathy: Identify the target users and unique value your product provides that is not currently being met. Define the size of your user base, segmentation, and potential growth.
    • Customer Journey: Define the future path and capabilities your users will respond to.
    • Competitive analysis: Complete a SWOT analysis for your end-to-end product lifecycle. Use Info-Tech’s Business SWOT Analysis Template.

    Business Alignment

    • Enterprise alignment: Align to enterprise and product family goals, strategies, and constraints.
    • Delivery and release strategy: Develop a delivery strategy to achieve value quickly and adapt to internal and external changes. Value delivery is constrained by your delivery pipeline.
    • OCM and go-to-market strategy: Create organizational change management, communications, and a user implementation approach to improve adoption and satisfaction from changes.

    Product Roadmap

    • Roadmap strategy: Determine the duration, detail, and structure of your roadmap to accurately communicate your vision.
    • Value prioritization: Define criteria used to evaluate and sequence demand items.
    • Release and capacity planning: Build your roadmap with realistic goals and milestones based on your delivery pipeline and dependencies.

    “Customers are best heard through many ears.”

    – Thomas K. Connellan, Inside the Magic Kingdom

    Vision: Market Analysis, Business Alignment, and Product Roadmap.

    Info-Tech Insight

    Data comes from many places and may still not tell the complete story.

    Build your product strategy playbook

    Complete Deliver on Your Digital Product Vision to define your Vision, Goals, Roadmap approach, and Backlog quality filters.

    Digital Product Strategy Supporting Workbook

    Supporting workbook that captures the interim results from a number of exercises that will contribute to your overall digital product vision.

    Product Backlog Item Prioritization Tool

    An optional tool to help you capture your product backlog and prioritize based on your given criteria

    Product Roadmap Tool

    An optional tool to help you build out and visualize your first roadmap.

    Your Digital Product Vision Details Strategy

    Record the results from the exercises to help you define, detail, and make real your digital product vision.

    Your product vision is your North Star

    It's ok to dream a little!

    Who is the target customer, what is the key benefit, what do they need, what is the differentiator

    Adapted from: Geoffrey Moore, 2014.

    Info-Tech Best Practice

    A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

    Use product roadmaps to guide delivery

    In Deliver on Your Digital Product Vision, we showed how the product roadmap is key to value realization. As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy.

    As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy

    Info-Tech Best Practice

    Info-Tech Best Practice Product delivery requires a comprehensive set of business and technical competencies to effectively roadmap, plan, deliver, support, and validate your product portfolio. Product delivery is a “multi-faceted, complex discipline that can be difficult to grasp and hard to master.” It will take time to learn and adopt methods and become a competent product manager or owner (“What Is Product Management?”, Pichler Consulting Limited).

    Match your roadmap and backlog to the needs of the product

    Ultimately, you want products to be able to respond faster to changes and deliver value sooner. The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

    The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

    Product delivery realizes value for your product family

    While planning and analysis are done at the family level, work and delivery are done at the individual product level.

    Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

    Use artifact mapping to improve functional decomposition

    In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

    Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

    Manage and communicate key milestones

    Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

    Define key milestones and their release dates.

    Info-Tech Best Practice

    Product ownership isn’t just about managing the product backlog and development cycles! Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints!

    Milestones

    • Points in the timeline when the established set of artifacts is complete (feature-based), or checking status at a particular point in time (time-based).
    • Typically assigned a date and used to show the progress of development.
    • Plays an important role when sequencing different types of artifacts.

    Release dates

    • Releases mark the actual delivery of a set of artifacts packaged together in a new version of the product.
    • Release dates, firm or not, allow stakeholders to anticipate when this is coming.

    Leverage the product canvas to state and inform your product vision

    Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

    Capability: Vision

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Product backlog.
    • Basic roadmap with milestones and releases.
    • Unprioritized stakeholder list.
    • Understanding of product’s purpose and value.
    • Customers and end-users defined with core needs identified.
    • Roadmap with goals and capabilities defined by themes and set to appropriate time horizons.
    • Documented stakeholder management plan with communication and collaboration aligned to the stakeholder strategy.
    • Value drivers traced to product families and enterprise goals.
    • Customer personas defined with pain relievers and value creators defined.
    • Fully-developed roadmap traced to family (and child) roadmaps.
    • Expected ROI for all current and next roadmap items.
    • KPIs/OKRs used to improve roadmap prioritization and sequencing.
    • Proactive stakeholder engagement and reviews.
    • Cross-functional engagement to align opportunities and drive enterprise value.
    • Formal metrics to assess customer needs and value realization.
    • Roadmaps managed in an enterprise system for full traceability, value realization reporting, and views for defined audiences.
    • Proactive stakeholder engagement with regular planning and review ceremonies tied to their roadmaps and goals.
    • Cross-functional innovation to find disruptive opportunities to drive enterprise value.
    • Omni-channel metrics and customer feedback mechanisms to proactively evaluate goals, capabilities, and value realization.

    Exercise 3.2.1 Assess your Vision capability proficiency

    1 hour
    1. Review the expectations for this capability and determine your current proficiency for each skill.
    2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
    3. Record the results in the Mature and Scale Product Ownership Playbook.
    4. Review the skills map to identify strengths and areas of growth.

    Output

    • Product owner capability assessment

    Participants

    • Product owners
    • Product managers

    Capture in the Mature and Scale Product Owner Proficiency Assessment.

    Capabilities: Leadership

    Soft Skills

    • Communication: Maintain consistent, concise, and appropriate communication using SMART guidelines (specific, measurable, attainable, relevant, and timely).
    • Integrity: Stick to your values, principles, and decision criteria for the product to build and maintain trust with your users and teams.
    • Influence: Manage stakeholders using influence and collaboration over contract negotiation.

    Collaboration

    • Stakeholder management: Build a communications strategy for each stakeholder group, tailored to individual stakeholders.
    • Relationship management: Use every interaction point to strengthen relationships, build trust, and empower teams.
    • Team development: Promote development through stretch goals and controlled risks to build team capabilities and performance.

    Decision Making

    • Prioritized criteria: Remove personal bias by basing decisions off data analysis and criteria.
    • Continuous improvement: Balance new features with the need to ensure quality and create an environment of continuous improvement.
    • Team empowerment/negotiation: Push decisions to teams closest to the problem and solution, using Delegation Poker to guide you.

    “Everything walks the walk. Everything talks the talk.”

    – Thomas K. Connellan, Inside the Magic Kingdom

    Leadership: Soft skills, collaboration, decision making.

    Info-Tech Insight

    Product owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.

    Capability: Leadership

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Activities are prioritized with minimal direction and/or assistance.
    • Progress self-monitoring against objectives with leadership apprised of deviations against plan.
    • Facilitated decisions from stakeholders or teams.
    • Informal feedback on performance and collaboration with teams.
    • Independently prioritized activities and provide direction or assistance to others as needed.
    • Managed issue resolution and provided guidance on goals, priorities, and constraints.
    • Product decision ownership with input from stakeholders, SMEs, and delivery teams.
    • Formal product management retrospectives with tracked and measured changes to improve performance.
    • Consulted in the most challenging situations to provide subject matter expertise on leading practices and industry standards.
    • Provide mentoring and coaching to your peers and/or teammates.
    • Use team empowerment, pushing decisions to the lowest appropriate level based on risk and complexity.
    • Mature and flexible communication.
    • Provide strategies and programs ensuring all individuals in the delivery organization obtain the level of coaching and supervision required for success in their position.
    • Provide leadership to the organization’s coaches ensuring delivery excellence across the organization.
    • Help develop strategic initiatives driving common approaches and utilizing information assets and processes across the enterprise.

    Exercise 3.2.2 Assess your Leadership capability proficiency

    1 hour
    1. Review the expectations for this capability and determine your current proficiency for each skill.
    2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
    3. Record the results in the Mature and Scale Product Ownership Playbook.
    4. Review the skills map to identify strengths and areas of growth.

    Output

    • Product owner capability assessment

    Participants

    • Product owners
    • Product managers

    Capture in the Mature and Scale Product Owner Proficiency Assessment.

    Capability: Product lifecycle management

    Plan

    • Product backlog: Follow a schedule for backlog intake, grooming, updates, and prioritization.
    • Journey map: Create an end-user journey map to guide adoption and loyalty.
    • Fit for purpose: Define expected value and intended use to ensure product meets your end user’s needs.

    Build

    • Capacity management: Work with operations and delivery teams to ensure consistent and stable outcomes.
    • Release strategy: Build learning, release, and critical milestones into a repeatable release plan.
    • Compliance: Build policy compliance into delivery practices to ensure alignment and reduce avoidable risk (privacy, security).

    Run

    • Adoption: Focus attention on end-user adoption and proficiency to accelerate value and maximize retention.
    • Support: Build operational support and business continuity into every team.
    • Measure: Measure KPIs and validate expected value to ensure product alignment to goals and consistent product quality.

    “Pay fantastic attention to detail. Reward, recognize, celebrate.”

    – Thomas K. Connellan, Inside the Magic Kingdom

    Product Lifecycle Management: Plan, Build, Run

    Info-Tech Insight

    Product owners must actively manage the full lifecycle of the product.

    Define product value by aligning backlog delivery with roadmap goals

    In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

    In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

    A backlog stores and organizes PBIs at various stages of readiness

    A backlog stores and organizes PBIs at different levels of readiness. Stage 3 - Ideas are composed of raw, vague ideas that have yet to go through any formal valuation. Stage 2 - Qualified are researched and qualified PBIs awaiting refinement. Stage 1 - Ready are Discrete, refined RBIs that are read to be placed in your development team's sprint plans.

    A well-formed backlog can be thought of as a DEEP backlog:

    Detailed Appropriately: PBIs are broken down and refined, as necessary.

    Emergent: The backlog grows and evolves over time as PBIs are added and removed.

    Estimated: The effort a PBI requires is estimated at each tier.

    Prioritized: The PBI’s value and priority are determined at each tier.

    (Perforce, 2018)

    Distinguish your specific goals for refining in the product backlog vs. planning for a sprint itself

    Often backlog refinement is used interchangeably or considered a part of sprint planning. The reality is they are very similar, as the required participants and objectives are the same; however, there are some key differences.

    Backlog refinement versus Sprint planning. Differences in Objectives, Cadence and Participants

    Use quality filters to promote high value items into the delivery pipeline

    Product backlog has quality filters such as: Backlogged, Qualified and Ready. Sprint backlog has a backlog of accepted PBI's

    Basic scrum process

    The scrum process coordinates multiple stakeholders to deliver on business priorities.

    Prioritized Backlog, Sprint Backlog, Manage Delivery, Sprint Review, Product Release

    Capability: Product lifecycle management

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Informal or undocumented intake process.
    • Informal or undocumented delivery lifecycle.
    • Unstable or unpredictable throughput or quality.
    • Informal or undocumented testing and release processes.
    • Informal or undocumented organizational change management planning for each release.
    • Informal or undocumented compliance validation with every release.
    • Documented intake process with stakeholder prioritization of requests.
    • Consistent delivery lifecycle with stable and predictable throughput with an expected range of delivery variance.
    • Formal and documented testing and release processes.
    • Organizational change management planning for each major release.
    • Compliance validation with every major release.
    • Intake process using value drivers and prioritization criteria to sequence all items.
    • Consistent delivery lifecycle with stable and predictable throughput with little variance.
    • Risk-based and partially automated testing and release processes.
    • Organizational change management planning for all releases.
    • Automated compliance validation with every major release.
    • Intake process using enterprise value drivers and prioritization criteria to sequence all items.
    • Stable Agile DevOps with low variability and automation.
    • Risk-based automated and manual testing.
    • Multiple release channels based on risk. Automated build, validation, and rollback capabilities.
    • Cross-channel, integrated organizational change management for all releases.
    • Automated compliance validation with every change or release.

    Exercise 3.2.3 Assess your PLM capability proficiency

    1 hour
    1. Review the expectations for this capability and determine your current proficiency for each skill.
    2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
    3. Record the results in the Mature and Scale Product Ownership Playbook.
    4. Review the skills map to identify strengths and areas of growth.

    Output

    • Product owner capability assessment

    Participants

    • Product owners
    • Product managers

    Capture in the Mature and Scale Product Owner Proficiency Assessment.

    Capabilities: Value realization

    Key performance indicators (KPIs)

    • Usability and user satisfaction: Assess satisfaction through usage monitoring and end-user feedback.
    • Value validation: Directly measure performance against defined value proposition, goals, and predicted ROI.
    • Fit for purpose: Verify the product addresses the intended purpose better than other options.

    Financial management

    • P&L: Manage each product as if it were its own business with profit and loss statements.
    • Acquisition cost/market growth: Define the cost of acquiring a new consumer, onboarding internal users, and increasing product usage.
    • User retention/market share: Verify product usage continues after adoption and solution reaches new user groups to increase value.

    Business model

    • Defines value proposition: Dedicate your primary focus to understanding and defining the value your product will deliver.
    • Market strategy and goals: Define your acquisition, adoption, and retention plan for users.
    • Financial model: Build an end-to-end financial model and plan for the product and all related operational support.

    “The competition is anyone the customer compares you with.”

    – Thomas K. Connellan, Inside the Magic Kingdom

    Value Realization: KPIs, Financial management, Business model

    Info-Tech Insight

    Most organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.

    Use a balanced value to establish a common definition of goals and value

    Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

    Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

    Info-Tech Insight

    Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

    Include balanced value as one criteria to guide better decisions

    Your balanced value is just one of many criteria needed to align your product goals and sequence roadmap items. Feasibility, delivery pipeline capacity, shared services, and other factors may impact the prioritization of backlog items.

    Build your balanced business value score by using four key value drivers.

    Determine your value drivers

    Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of sources of value. Dissecting value by benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

    Business value matrix

    Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

    Financial benefits vs. improved capabilities

    Financial benefits refer to the degree to which the value source can be measured through monetary metrics and is often quite tangible.

    Human benefits refer to how a product or service can deliver value through a user’s experience.

    Inward vs. outward orientation

    Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.

    Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

    Exercise 3.2.4 Identify your business value drivers and sources of value

    1 hour
    1. Brainstorm the different types of business value that you produce on the sticky notes (one item per page). Draw from examples of products in your portfolio.
    2. Identify the most important value items for your organization (two to three per quadrant).
    3. Record the results in the Mature and Scale Product Ownership Workbook.

    Output

    • Product owner capability assessment

    Participants

    • Product owners
    • Product managers

    Capture in the Mature and Scale Product Ownership Workbook.

    My business value sources

    Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

    Capability: Value realization

    Your Score: ____

    1 - Foundational: Transitioning and Growing

    2 - Capable/Competent: Core Contributor

    3 - Influential: Gifted Improver

    4 - Transformational: Towering Strength

    • Product canvas or basic product positioning overview.
    • Simple budget or funding mechanism for changes.
    • Product demos and informal user feedback mechanisms.
    • Business value canvas or basic business model tied to roadmap funding.
    • Product funding tied to roadmap milestones and prioritization.
    • Defined KPIs /OKRs for roadmap delivery throughput and value realization measurement.
    • Business model with operating cost structures, revenue/value traceability, and market/user segments.
    • Scenario-based roadmap funding alignment.
    • Roadmap aligned KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.
    • Business model tied to enterprise operating costs and value realization KPIs/OKRs.
    • P&L roadmap and cost accounting tied to value metrics.
    • Roadmap aligned enterprise and scenario-based KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.

    Exercise 3.2.5 Assess your value realization capability proficiency

    1 hour
    1. Review the expectations for this capability and determine your current proficiency for each skill.
    2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
    3. Record the results in the Mature and Scale Product Ownership Playbook.
    4. Review the skills map to identify strengths and areas of growth.

    Output

    • Product owner capability assessment

    Participants

    • Product owners
    • Product managers

    Capture in the Mature and Scale Product Owner Proficiency Assessment.

    Determine your product owner capability proficiency in regards to: Vision, Leadership, Product Lifecycle, and Value Realization

    Summary of Accomplishment

    Problem solved.

    Product ownership can be one of the most difficult challenges facing delivery and operations teams. By focusing on operational grouping and alignment of goals, organizations can improve their value realization at all levels in the organization.

    The foundation for delivering and enhancing products and services is rooted in the same capability model. Traditionally, product owners have focused on only a subset of skills and capabilities needed to properly manage and grow their products. The product owner capability model is a useful tool to ensure optimal performance from product owners and assess the right level of detail for each product within the product families.

    Congratulations. You’ve completed a significant step toward higher-value products and services.

    If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

    Contact your account representative for more information

    workshops@infotech.com
    1-888-670-8889

    Additional Support

    If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

    Contact your account representative for more information
    workshops@infotech.com 1-888-670-8889

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1.1 Assess your real Agile skill proficiency

    Assess your skills and capabilities against the real Agile skills inventory

    2.2.3 Prioritize your stakeholders

    Build a stakeholder management strategy.

    Research Contributors and Experts

    Emily Archer

    Lead Business Analyst,
    Enterprise Consulting, authentic digital agency

    Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

    David Berg

    Founder & CTO
    Strainprint Technologies Inc.

    David Berg is a product commercialization expert who has spent the last 20 years delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world, with a goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

    Research Contributors and Experts

    Kathy Borneman

    Digital Product Owner, SunTrust Bank

    Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

    Charlie Campbell

    Product Owner, Merchant e-Solutions

    Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

    Research Contributors and Experts

    Yarrow Diamond

    Sr. Director, Business Architecture
    Financial Services

    Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

    Cari J. Faanes-Blakey, CBAP, PMI-PBA

    Enterprise Business Systems Analyst,
    Vertex, Inc.

    Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

    Research Contributors and Experts

    Kieran Gobey

    Senior Consultant Professional Services
    Blueprint Software Systems

    Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations.

    Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

    Rupert Kainzbauer

    VP Product, Digital Wallets
    Paysafe Group

    Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. With a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

    Research Contributors and Experts

    Saeed Khan

    Founder,
    Transformation Labs

    Saeed Khan has been working in high tech for 30 years in Canada and the US and has held several leadership roles in Product Management in that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005.

    Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders; the only global community of senior level product executives.

    Hoi Kun Lo

    Product Owner
    Nielsen

    Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

    Research Contributors and Experts

    Abhishek Mathur

    Sr Director, Product Management
    Kasisto, Inc.

    Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

    Jeff Meister

    Technology Advisor and Product Leader

    Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations.

    Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements.

    Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

    Research Contributors and Experts

    Vincent Mirabelli

    Principal,
    Global Project Synergy Group

    With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

    Oz Nazili

    VP, Product & Growth
    TWG

    Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

    Research Contributors and Experts

    Mike Starkey

    Director of Engineering
    W.W. Grainger

    Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

    Anant Tailor

    Cofounder and Head of Product
    Dream Payments Corp.

    Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes.

    Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries.

    Anant is a Professional Engineer with a Bachelor degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

    Research Contributors and Experts

    Angela Weller

    Scrum Master, Businessolver

    Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

    Related Info-Tech Research

    Product Delivery

    Deliver on Your Digital Product Vision

    Build a product vision your organization can take from strategy through execution.

    Deliver Digital Products at Scale

    Deliver value at the scale of your organization through defining enterprise product families.

    Build Your Agile Acceleration Roadmap

    Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

    Implement Agile Practices That Work

    Improve collaboration and transparency with the business to minimize project failure.

    Implement DevOps Practices That Work

    Streamline business value delivery through the strategic adoption of DevOps practices.

    Extend Agile Practices Beyond IT

    Further the benefits of Agile by extending a scaled Agile framework to the business.

    Build Your BizDevOps Playbook

    Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

    Embed Security Into the DevOps Pipeline

    Shift security left to get into DevSecOps.

    Spread Best Practices With an Agile Center of Excellence

    Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

    Enable Organization-Wide Collaboration by Scaling Agile

    Execute a disciplined approach to rolling out Agile methods in the organization.

    Related Info-Tech Research

    Application Portfolio Management

    APM Research Center

    See an overview of the APM journey and how we can support the pieces in this journey.

    Application Portfolio Management Foundations

    Ensure your application portfolio delivers the best possible return on investment.

    Streamline Application Maintenance

    Effective maintenance ensures the long-term value of your applications.

    Streamline Application Management

    Move beyond maintenance to ensuring exceptional value from your apps.

    Build an Application Department Strategy

    Delivering value starts with embracing what your department can do.

    Embrace Business-Managed Applications

    Empower the business to implement their own applications with a trusted business-IT relationship

    Optimize Applications Release Management

    Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

    Related Info-Tech Research

    Value, Delivery Metrics, Estimation

    Build a Value Measurement Framework

    Focus product delivery on business value–driven outcomes.

    Select and Use SDLC Metrics Effectively

    Be careful what you ask for, because you will probably get it.

    Application Portfolio Assessment: End User Feedback

    Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

    Create a Holistic IT Dashboard

    Mature your IT department by measuring what matters.

    Refine Your Estimation Practices With Top-Down Allocations

    Don’t let bad estimates ruin good work.

    Estimate Software Delivery With Confidence

    Commit to achievable software releases by grounding realistic expectations.

    Reduce Time to Consensus With an Accelerated Business Case

    Expand on the financial model to give your initiative momentum.

    Optimize Project Intake, Approval, and Prioritization

    Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

    Enhance PPM Dashboards and Reports

    Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

    Related Info-Tech Research

    Organizational Design and Performance

    Redesign Your IT Organizational Structure

    Focus product delivery on business value-driven outcomes.

    Build a Strategic IT Workforce Plan

    Have the right people, in the right place, at the right time.

    Implement a New Organizational Structure

    Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

    Build an IT Employee Engagement Program

    Don’t just measure engagement, act on it

    Set Meaningful Employee Performance Measures

    Set holistic measures to inspire employee performance.

    Bibliography (Product Management)

    “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

    A, Karen. “20 Mental Models for Product Managers.” Product Management Insider, Medium, 2 Aug. 2018. Web.

    Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

    Aghina, Handscomb, Ludolph, West, and Abby Yip, “How to select and develop individuals for successful agile teams: A practical guide” McKinsey & Company 20 Dec. 2018. Web.

    Agile Alliance. “Product Owner.” Agile Alliance. n.d. Web.

    Ambler, Scott W. "Communication on Agile Software Teams“, Agile Modeling. 2001-2022. Web.

    Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

    Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

    Beck, Beedle, van Bennekum, Cockburn, Cunningham, Fowler, Grenning, Highsmith, Hunt, Jeffries, Kern, Marick, Martin, Mellor, Schwaber, Sutherland, Thomas, "Manifesto for Agile Software Development." agilemanifesto.org. 2001

    Berez, Steve, et al. “How to Plan and budget for Agile at Scale.” Bain & Company, 08 Oct 2019. Web

    Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint. 2012. Web.

    Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, Agile Alliance 2015. Web.

    Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group. 2005. Web.

    Cohn, Mike. “What Is a Product?” Mountain Goat Software. 6 Sept. 2016. Web.

    Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997.

    Curphey, Mark. “Product Definition.” SlideShare, 25 Feb. 2007. Web.

    “Delegation Poker Product Image.” Management 3.0, n.d. Web.

    Distel, Dominic, et al. “Finding the sweet spot in product-portfolio management.’ McKinsey, 4 Dec. 2020. Web

    Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

    Fernandes, Thaisa. “Spotify Squad Framework - Part I.” PM101, Medium, 6 Mar. 2017. Web.

    Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

    Grenny, Joseph. “The Best Teams Hold Themselves Accountable.” Harvard Business Review, 30 May 2014. Web.

    Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile2016 Conference, Agile Alliance, 2016. Web.

    Bibliography (Product Management)

    IIBA "A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) v3" IIBA. 15 APR 2015

    Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” The Ready, Medium, 9 Feb. 2018. Web.

    Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Scaled Agile Framework, Medium, 23 Jul. 2018. Web.

    Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

    Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

    Mankins, Michael. “The Defining Elements of a Winning Culture.” Bain, 19 Dec. 2013. Web.

    McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

    McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web. Mironov, Rich. “Scaling Up Product Manager/Owner Teams.” Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014. Web.

    Moore, Geoffrey A. “Crossing the Chasm, 3rd Edition.” Collins Business Essentials, 28 Jan 2014

    Oh, Paul. “How Mastering Resilience Can Help Drive Agile Transformations.” Why Innovation!, 10 Oct. 2019.

    Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 Mar. 2017. Web.

    Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

    Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

    Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

    Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

    Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

    PMI "The high cost of low performance: the essential role of communications“. PMI Pulse of Profession, May 2013.

    Radigan,Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

    Bibliography (Product Management)

    Rouse, Margaret. “Definition: product.” TechTarget, Sept. 2005. Web.

    Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

    Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

    Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

    Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

    Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

    Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

    Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin Voice of Product, 2 Oct. 2018. Web.

    Spitz, Enid R. “The Three Kinds of Empathy: Emotional, Cognitive, Compassionate.” The Three Kinds of Empathy: Emotional, Cognitive, Compassionate. Heartmanity. Web.

    Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

    “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2016. Web.

    “The Standish Group 2015 Chaos Report.” The Standish Group. 2015. Web.

    Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

    Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

    Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium, 19 Dec. 2017. Web.

    Verwijs, Christiaan. “Retrospective: Do The Team Radar.” The Liberators, Medium, 10 Feb. 2017. Web.

    Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management”. Academia.edu. 2010. Web.

    Backlog

    2009 Business Analysis Benchmark Study.” IAG Consulting, 2009. Web.

    Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc, 2015. Web.

    Bradley, Marty. “Agile Estimation Guidance.” Leading Agile, 30 Aug. 2016. Web. Feb. 2019.

    CollabNet and VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

    Craveiro, João. “Marty meets Martin: connecting the two triads of Product Management.” Product Coalition, 18 Nov. 2017. Accessed Feb. 2019.

    “Enablers.” Scaled Agile, n.d. Web.

    “Epic.” Scaled Agile, n.d. Web.

    Fischer, Christian. “Scrum Compact.” Itemis, n.d. Web. Feb. 2019.

    Hackshall, Robin. “Product Backlog Refinement.” Scrum Alliance, 9 Oct. 2014. Accessed Feb. 2019.

    Hartman, Bob. “New to agile? INVEST in good user stories.” Agile For All, 14 May 2009. Web.

    Huether, Derek. “Cheat Sheet for Product Backlog Refinement (Grooming).” Leading Agile, 2 Nov. 2013. Accessed Feb. 2019.

    Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce, 18 May 2018. Accessed Feb. 2019.

    Khan, Saeed. “Good Bye ‘Product Owner’, Hello ‘Backlog Manager.’” On Product Management, 27 June 2011. Accessed Feb. 2019.

    Khan, Saeed. “Let’s End the Confusion: A Product Owner is NOT a Product Manager.” On Product Management, 14 July 2017. Accessed Feb. 2019.

    Lawrence, Richard. “New Story Splitting Resource.” Agile For All. 27 Jan. 2012. Web. Feb. 2019.

    Leffingwell, Dean. “SAFe 4.0.” Scaled Agile Inc, 2017. Accessed Feb. 2019.

    Lucero, Mario. “Product Backlog – Deep Model.” Agilelucero, 8 Oct. 2014. Web.

    “PI Planning.” Scaled Agile, n.d. Web.

    Pichler, Roman. “The Product Roadmap and the Product Backlog.” Roman Pichler, 9 Sept. 2014. Accessed Feb. 2019.

    Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012.

    Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Burozeven, 20 Nov. 2017. Accessed Feb. 2019.

    Srinivasan, Vibhu. “Product Backlog Management: Tips from a Seasoned Product Owner.” Agile Alliance, n.d. Accessed Feb. 2019.

    Todaro, Dave. “Splitting Epics and User Stories.” Ascendle, n.d. Accessed Feb. 2019.

    “What Characteristics Make Good Agile Acceptance Criteria?” Segue Technologies, 3 Sept. 2015. Web. Feb. 2019.

    Bibliography (Roadmap)

    Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

    Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

    Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012 IEEE International Conference, 12 June 2012, Herzliya, Israel. Web.

    Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

    Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

    “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

    Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

    Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

    Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, Web. Sept. 2018.

    Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, 2017. Web.

    Maurya, Ash. “What is a Minimum Viable Product (MVP).” Leanstack, 12 June 2017. Accessed Sept. 2018.

    Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

    Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

    “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

    Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 October 2015. Accessed Sept. 2018.

    Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018.

    Bibliography (Vision and Canvas)

    Adams, Paul. “The Future Product Canvas.” Inside Intercom, 10 Jan. 2014. Web.

    “Aligning IT Funding Models to the Pace of Technology Change.” EDUCAUSE, 14 Dec. 2015. Web.

    Altman, Igor. “Metrics: Gone Bad.” OpenView, 10 Nov. 2009. Web.

    Barry, Richard. “The Product Vision Canvas – a Strategic Tool in Developing a Successful Business.” Polymorph, 2019. Web.

    “Business Canvas – Business Models & Value Propositions.” Strategyzer, 2019. Web.

    “Business Model Canvas.” Wikipedia: The Free Encyclopedia, 4 Aug. 2019. Web.

    Charak, Dinker. “Idea to Product: The Working Model.” ThoughtWorks, 13 July 2017. Web.

    Charak, Dinker. “Product Management Canvas - Product in a Snapshot.” Dinker Charak, 29 May 2017. Web.

    Chudley, James. “Practical Steps in Determining Your Product Vision (Product Tank Bristol, Oct. 2018).” LinkedIn SlideShare. Uploaded by cxpartners, 2 Nov. 2018. Web.

    Cowan, Alex. “The 20 Minute Business Plan: Business Model Canvas Made Easy.” COWAN+, 2019. Web.

    Craig, Desiree. “So You've Decided To Become A Product Manager.” Start it up, Medium, 2 June 2019. Web.

    “Create an Aha! Business Model Canvas Strategic Model.” Aha! Support, 2019. Web.

    Eick, Stephen. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.

    Eriksson, Martin. “The next Product Canvas.” Mind the Product, 22 Nov. 2013. Web.

    “Experience Canvas: a Lean Approach: Atlassian Team Playbook.” Atlassian, 2019. Web.

    Freeman, James. “How to Make a Product Canvas – Visualize Your Product Plan.” Edraw, 23 Dec. 2019. Web.

    Fuchs, Danny. “Measure What Matters: 5 Best Practices from Performance Management Leaders.” OpenGov, 8 Aug. 2018. Web.

    Gorisse, Willem. “A Practical Guide to the Product Canvas.” Mendix, 28 Mar. 2017. Web.

    Gothelf, Jeff. “The Lean UX Canvas.” Jeff Gothelf, 15 Dec. 2016. Web.

    Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product: Getting Started.” EBG Consulting, 15 Jan. 2019. Web.

    Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product's Core Requirements.” EBG Consulting, 4 Feb. 2019. Web.

    Gray, Mark Krishan. “Should I Use the Business Model Canvas or the Lean Canvas?” Blog, Medium.com, 2019. Web.

    Bibliography (Vision and Canvas)

    Hanby, Jeff. "Software Maintenance: Understanding and Estimating Costs." LookFar, 21 Oct. 2016. Web.

    “How do you define a product?” Scrum.org, 4 Apr 2017, Web

    Juncal, Shaun. “How to Build a Product Roadmap Based on a Business Model Canvas.” ProductPlan, 19 June 2019. Web.

    “Lean Canvas Intro - Uber Example.” YouTube, uploaded by Railsware Product Academy, 12 Oct. 2018. Web.

    “Lesson 6: Product Canvas.” ProdPad Help Center, 2019. Web.

    Lucero, Mario. “The Product Canvas.” Agilelucero.com, 22 June 2015. Web.

    Maurya, Ash. “Create a New Lean Canvas.” Canvanizer, 2019. Web.

    Maurya, Ash. “Don't Write a Business Plan. Create a Lean Canvas Instead.” LEANSTACK, 2019. Web.

    Maurya, Ash. “Why Lean Canvas vs Business Model Canvas?” Medium, 27 Feb. 2012. Web.

    Mirabelli, Vincent. “The Project Value Canvas.” Vincent Mirabelli, 2019. Web.

    Mishra, LN. “Business Analysis Canvas – The Ultimate Enterprise Architecture.” BA Times, 19 June 2019. Web.

    Muller. Jerry Z. “Why performance metrics isn’t always the best way to judge performance.” Fast Company, 3 April 2019. Web.

    Perri, Melissa. “What Is Good Product Strategy?” Melissa Perri, 14 July 2016. Web.

    Pichler, Roman. “A Product Canvas for Agile Product Management, Lean UX, Lean Startup.” Roman Pichler, 16 July 2012. Web.

    Pichler, Roman. “Introducing the Product Canvas.” JAXenter, 15 Jan. 2013. Web.

    Pichler, Roman. “Roman's Product Canvas: Introduction.” YouTube, uploaded by Roman Pichler, 3 Mar. 2017. Web.

    Pichler, Roman. “The Agile Vision Board: Vision and Product Strategy.” Roman Pichler, 10 May 2011. Web.

    Pichler, Roman. “The Product Canvas – Template.” Roman Pichler, 11 Oct. 2016. Web.

    Pichler, Roman. “The Product Canvas Tutorial V1.0.” LinkedIn SlideShare. Uploaded by Roman Pichler, 14 Feb. 2013. Web.

    Pichler, Roman. “The Product Vision Board: Introduction.” YouTube uploaded by Roman Pichler, 3 Mar. 2017. Web.

    “Product Canvas PowerPoint Template.” SlideModel, 2019. Web.

    Bibliography (Vision and Canvas)

    “Product Canvas.” SketchBubble, 2019, Web.

    “Product Canvas.” YouTube, uploaded by Wojciech Szramowski, 18 May 2016. Web.

    “Product Roadmap Software to Help You Plan, Visualize, and Share Your Product Roadmap.” Productboard, 2019. Web.

    Roggero, Giulio. “Product Canvas Step-by-Step.” LinkedIn SlideShare, uploaded by Giulio Roggero, 18 May 2013. Web.

    Royce, Dr. Winston W. “Managing the Development of Large Software Systems.” Scf.usc.edu, 1970. Web.

    Ryan, Dustin. “The Product Canvas.” Qdivision, Medium, 20 June 2017. Web.

    Snow, Darryl. “Product Vision Board.” Medium, 6 May 2017. Web.

    Stanislav, Shymansky. “Lean Canvas – a Tool Your Startup Needs Instead of a Business Plan.” Railsware, 12 Oct. 2018. Web.

    Stanislav, Shymansky. “Lean Canvas Examples of Multi-Billion Startups.” Railsware, 20 Feb. 2019. Web.

    “The Product Vision Canvas.” YouTube, Uploaded by Tom Miskin, 20 May 2019. Web.

    Tranter, Leon. “Agile Metrics: the Ultimate Guide.” Extreme Uncertainty, n.d. Web.

    “Using Business Model Canvas to Launch a Technology Startup or Improve Established Operating Model.” AltexSoft, 27 July 2018. Web.

    Veyrat, Pierre. “Lean Business Model Canvas: Examples + 3 Pillars + MVP + Agile.” HEFLO BPM, 10 Mar. 2017. Web.

    “What Are Software Metrics and How Can You Track Them?” Stackify, 16 Sept. 2017. Web

    “What Is a Product Vision?” Aha!, 2019. Web.

    Supporting Research

    Transformation topics and supporting Info-Tech research to make the journey easier, with less rework.

    Supporting research and services

    Improving IT alignment

    Build a Business-Aligned IT Strategy

    Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

    Includes a "Strategy on a page" template

    Make Your IT Governance Adaptable

    Governance isn't optional, so keep it simple and make it flexible.

    Create an IT View of the Service Catalog

    Unlock the full value of your service catalog with technical components.

    Application Portfolio Management Foundations

    Ensure your application portfolio delivers the best possible return on investment.

    Supporting research and services

    Shifting toward Agile DevOps

    Agile/DevOps Resource Center

    Tools and advice you need to be successful with Agile.

    Develop Your Agile Approach for a Successful Transformation

    Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

    Implement DevOps Practices That Work

    Streamline business value delivery through the strategic adoption of DevOps practices.

    Perform an Agile Skills Assessment

    Being Agile isn't about processes, it's about people.

    Define the Role of Project Management in Agile and Product-Centric Delivery

    Projects and products are not mutually exclusive.

    Supporting research and services

    Shifting toward product management

    Make the Case for Product Delivery

    Align your organization on the practices to deliver what matters most.

    Deliver on Your Digital Product Vision

    Build a product vision your organization can take from strategy through execution.

    Deliver Digital Products at Scale

    Deliver value at the scale of your organization through defining enterprise product families.

    Build a Better Product Owner

    Strengthen the product owner's role in your organization by focusing on core capabilities and proper alignment.

    Supporting research and services

    Improving value and delivery metrics

    Build a Value Measurement Framework

    Focus product delivery on business value-driven outcomes.

    Create a Holistic IT Dashboard

    Mature your IT department by measuring what matters.

    Select and Use SDLC Metrics Effectively

    Be careful what you ask for because you will probably get it.

    Reduce Time to Consensus With an Accelerated Business Case

    Expand on the financial model to give your initiative momentum.

    Supporting research and services

    Improving governance, prioritization, and value

    Make Your IT Governance Adaptable

    Governance isn't optional, so keep it simple and make it flexible.

    Maximize Business Value from IT Through Benefits Realization

    Embed benefits realization into your governance process to prioritize IT spending and confirm the value of IT.

    Drive Digital Transformation With Platform Strategies

    Innovate and transform your business models with digital platforms.

    Succeed With Digital Strategy Execution

    Building a digital strategy is only half the battle: create a systematic roadmap of technology initiatives to execute the strategy and drive digital transformation.

    Build a Value Measurement Framework

    Focus product delivery on business value-driven outcomes.

    Create a Holistic IT Dashboard

    Mature your IT department by measuring what matters.

    Supporting research and services

    Improving requirements management and quality assurance

    Requirements Gathering for Small Enterprises

    Right-size the guidelines of your requirements gathering process.

    Improve Requirements Gathering

    Back to basics: great products are built on great requirements.

    Build a Software Quality Assurance Program

    Build quality into every step of your SDLC.

    Automate Testing to Get More Done

    Drive software delivery throughput and quality confidence by extending your automation test coverage.

    Manage Your Technical Debt

    Make the case to manage technical debt in terms of business impact.

    Create a Business Process Management Strategy

    Avoid project failure by keeping the "B" in BPM.

    Build a Winning Business Process Automation Playbook

    Optimize and automate your business processes with a user-centric approach.

    Create a Winning BPI Playbook

    Don't waste your time focusing on the "as is." Focus on the improvements and the "to be."

    Supporting research and services

    Improving release management

    Optimize Applications Release Management

    Build trust by right-sizing your process using appropriate governance.

    Streamline Application Maintenance

    Effective maintenance ensures the long-term value of your applications.

    Streamline Application Management

    Move beyond maintenance to ensure exceptional value from your apps.

    Optimize Change Management

    Right-size your change management process.

    Manage Your Technical Debt

    Make the case to manage technical debt in terms of business impact.

    Improve Application Development Throughput

    Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.

    Supporting research and services

    Business relationship management

    Embed Business Relationship Management

    Leverage knowledge of the business to become a strategic IT partner.

    Improving security

    Build an Information Security Strategy

    Create value by aligning your strategy to business goals and business risks.

    Develop and Deploy Security Policies

    Enhance your overall security posture with a defensible and prescriptive policy suite.

    Simplify Identity and Access Management

    Leverage risk- and role-based access control to quantify and simplify the IAM process.

    Supporting research and services

    Improving and supporting business-managed applications

    Embrace Business-Managed Applications

    Empower the business to implement their own applications with a trusted business-IT relationship.

    Enhance Your Solution Architecture Practices

    Ensure your software systems solution is architected to reflect stakeholders’ short-and long-term needs.

    Satisfy Digital End Users With Low- and No-Code

    Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

    Build Your First RPA Bot

    Support RPA delivery with strong collaboration and management foundations.

    Automate Work Faster and More Easily With Robotic Process Automation

    Embrace the symbiotic relationship between the human and digital workforce.

    Supporting research and services

    Improving business intelligence, analytics, and reporting

    Modernize Data Architecture for Measurable Business Results

    Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, Agile, and fit-for-purpose data architecture practice.

    Build a Reporting and Analytics Strategy

    Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.

    Build Your Data Quality Program

    Quality data drives quality business decisions.

    Design Data-as-a-Service

    Journey to the data marketplace ecosystems.

    Build a Robust and Comprehensive Data Strategy

    Key to building and fostering a data-driven culture.

    Build an Application Integration Strategy

    Level the table before assembling the application integration puzzle or risk losing pieces.

    Appendix

    Pulse survey results

    Pulse survey (N=18): What are the key components of product/service ownership?

    Pulse survey results: What are the key components of product/service ownership? Table shows answer options and responses in percentage.

    Pulse Survey (N=18): What are the key individual skills for a product/service owner?

    What are the key individual skills for a product/service owner? Table shows answer options and responses in percentage

    Other choices entered by respondents:

    • Anticipating client needs, being able to support delivery in all phases of the product lifecycle, adaptability, and ensuring a healthy backlog (at least two sprints’ worth of work).
    • Requirements elicitation and prioritization.
    • The key skill is being product-focused to ensure it provides value for competitive advantage.

    Pulse Survey (N=18): What are three things an outstanding product/service owner does that an average one doesn’t?

    What are three things an outstanding product/service owner does that an average one doesn't? Table shows results.

    Build a More Effective Go-to-Market Strategy

    • Buy Link or Shortcode: {j2store}559|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions
    • A weak or poorly defined Go-to-Market strategy is often the root cause of slow product revenue growth or missed product revenue targets.
    • Many agile-driven product teams rush to release, skipping key GTM steps leaving Sales and Marketing misaligned and not ready to fully monetize precious product investments.
    • Guessing at buyer persona and journey or competitive SWOT analyses – two key deliverables of an effective GTM strategy – cause poor marketing and sales outcomes.
    • Without the sales and product-aligned business case for launch called for in a successful GTM strategy, companies see low buyer adoption, wasted sales and marketing investments, and a failure to claim product and launch campaign success.

    Our Advice

    Critical Insight

    • Having an updated and compelling Go-to-Market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development, given its huge impact on the many drivers of sustainable growth.
    • Establishing alignment through the GTM process builds long-term operational strength.
    • With a sound GTM strategy, marketers give themselves a 50% greater chance of product launch success.

    Impact and Result

    • Align stakeholders on a common vision and execution plan prior to the Build and Launch phases.
    • Build a foundation of buyer and competitive understanding to drive a successful product hypothesis, then validate with buyers.
    • Deliver a team-aligned launch plan that enables launch readiness and outlines commercial success.

    Build a More Effective Go-to-Market Strategy Research & Tools

    Build Your Go-to-Market Strategy

    Use this storyboard and its deliverables to build a baseline market, understand your buyer, and gain competitive insights. It will also help you design your initial product and business case, and align stakeholder plans to prep for build.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Build a More Effective Go-to-Market Strategy – Executive Brief

      Almost there!

      Please enter your email and a few details and you're on your way to an efficient process.

      Download ×
    • Build a More Effective Go-to-Market Strategy – Phases 1-3
    • Go-to-Market Strategy Presentation Template
    • Go-to-Market Strategy RACI and Launch Checklist Workbook
    • Product Market Opportunity Sizing Workbook
    • Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Infographic

    Workshop: Build a More Effective Go-to-Market Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Align on GTM Vision & Plan, Craft Initial Strategy

    The Purpose

    Align on GTM vision and plan; craft initial strategy.

    Key Benefits Achieved

    Confidence that market opportunity is sufficient.

    Deeper buyer understanding to drive product design and messaging and launch campaign asset design.

    Steering committee approval for next phase.

    Activities

    1.1 Outline a vision for GTM, roles required, identify Steering Committee lead, workstream leads, and teams.

    1.2 Capture GTM strategy hypothesis by working through initial draft of the Go-to-Market Strategy Presentation and business case.

    1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.

    1.4 Identify info./data gaps, sources, and plan for capturing/gathering including buyer interviews.

    Outputs

    Documented Steering Committee and Working team.

    Aligned on GTM vision and process.

    Documented buyer persona and journey. Competitive SWOT analysis.

    Document team knowledge on initial GTM strategy, buyer personas, and business case.

    2 Identify Initial Business Case, Sales Forecast, and Launch Plan

    The Purpose

    Identify Initial Business Case, Sales Forecast, and Launch Plan.

    Key Benefits Achieved

    Confidence in size of market opportunity.

    Alignment of Sales and Product on product forecast.

    Assessment of marketing tech stack.

    Initial business case.

    Activities

    2.1 Size Product Market Opportunity and initial revenue forecast.

    2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, channel/route to market.

    2.3 Craft initial launch campaign, product release and sales and CX readiness plans.

    2.4 Identify launch budgets across each investment area.

    2.5 Discuss initial product launch business case and key activities.

    Outputs

    Product Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM) and Total Available Market (TAM).

    Definition of product-market fit, uniqueness, and competitive differentiation.

    Preliminary campaign, targets, and readiness plans.

    Incremental budgets for each key stakeholder area.

    Preliminary product launch business case.

    3 Develop Launch Plans (I of II)

    The Purpose

    Develop final Launch plans and budgets in product and marketing.

    Key Benefits Achieved

    Align Product release/launch plans with the marketing campaign for launch.

    Understand incremental budgets from product and marketing for launch.

    Activities

    3.1 Apply product interviews to scope, MVP, roadmap, competitive differentiation, pricing, feature prioritization, routes to market, and sales forecast.

    3.2 Develop a more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.

    Outputs

    Minimally Viable Product defined with feature prioritization. Product competitive differentiation documented Routes to market identified Sales forecast aligned with product team expectations.

    Marketing campaign launch plan Content marketing asset-creation/acquisition plan Campaign targets and metrics.

    4 Develop Launch Plans (II of II)

    The Purpose

    Develop final Launch Plans and budgets for remaining areas.

    Key Benefits Achieved

    Align Product release/launch plans with the marketing campaign for launch.

    Understand incremental budgets from Product and Marketing for launch.

    Activities

    4.1 Develop detailed launch/readiness plans with final budgets for: Sales enablement , Sales training, Tech stack, Customer onboarding & success, Product marketing, AR, PR, Corp Comms/Internal Comms, Customer Events, Employee Events, etc.

    Outputs

    Detailed launch plans, budgets for Product Marketing, Sales, Customer Success, and AR/PR/Corp. Comms.

    5 Present Final Business Case

    The Purpose

    To gain approval to move to Build and Launch phases.

    Key Benefits Achieved

    Align business case with Steering Committee expectations

    Approvals to Build and Launch targeted offering

    Activities

    5.1 Review final launch/readiness plans with final budgets for all key areas.

    5.2 Move all key findings into Steering Committee presentation slides.

    5.3 Present to Steering Committee; receive feedback.

    5.4 Incorporate Steering Committee feedback; update finial business case.

    Outputs

    Combined budgets across all areas. Final launch/readiness plans.

    Final Steering Committee-facing slides.

    Final approvals for Build and Launch.

    Further reading

    Build a More Effective Go-to-Market Strategy

    Maximize GTM success through deeper market and buyer understanding and competitive differentiation and launch team readiness that delivers target revenues.

    Table of Contents

    Section Title
    1 Executive Brief
    • Executive Summary
    • Analyst Perspective
    • Go-to-Market (GTM) strategy critical success factors
    • Key GTM challenges
    • Essential deliverables for GTM success
    • Benefits of a more effective GTM Strategy
    • Our methodology to support your success
    • Insight Summary
    • Blueprint deliverables and guided implementation steps
    2 Build baseline market, buyer, and competitive insights
    • Establish your team
    • Build buyer personas and journeys – develop initial messaging
    • Build initial product hypothesis
    • Size product market opportunity
    • Outline your key tech, app, and digital requirements
    • Develop your competitive differentiation
    • Select routes to market
    3 Design initial product and business case
    • Branding check
    • Formulate packaging and pricing
    • Craft buyer-valid product concept
    • Build campaign plan and targets
    • Develop budgets for creative, content, and media purchases
    • Draft product business case
    • Update GTM Strategy deck
    4 Align stakeholder plans to prep for build
    • Assess tech/tools support for all GTM phases
    • Outline sales enablement and customer success plan
    • Build awareness plan
    • Finalize business case
    • Final GTM plan deck

    Executive Brief

    Analyst Perspective

    Go-to-Market Strategy.

    A successful go-to-market (GTM) strategy aligns marketing, product, sales and customer success, sees decision making based on deep buyer understanding, and tests many basic assumptions often overlooked in today’s agile-driven product development/management environment.

    The disciplines you build using our methodology will not only support your team’s effort building and launching more successful products, but also can be modified for use in other strategic initiatives such as branding, M&A integration, expanding into new markets, and other initiatives that require a cross-functional and multidisciplined process.

    Photo of Jeff Golterman, Managing Director, SoftwareReviews Advisory.

    Jeff Golterman
    Managing Director
    SoftwareReviews Advisory

    Executive Summary

    An ineffective go-to-market strategy is often a root cause of:
    • Failure to attain new product revenue targets.
    • A loss of customer focus and poor new product/feature release buyer adoption.
    • Product releases misaligned with marketing, sales, and customer success readiness.
    • Low win rates compared to key competitors’.
    • Low contact-to-lead conversion rates.
    • Loss of executive/investor support for further new product development and marketing investments.
    Hurdles to go-to-market success include:
    • An unclear product-market opportunity.
    • A lack of well defined and prioritized buyer personas and needs that are well understood.
    • Poor competitive analysis that fails to pinpoint key areas of competitive differentiation.
    • Guessing at buyer journey and buyer-described ideal engagement within your lead gen engine.
    • A business case that calls for levels of customer value delivery (vs. feature MVPs) that can actually deliver wins and targeted revenue goals.
    Apply SoftwareReviews approach for greater GTM success.

    Our blueprint is designed to help you:

    • Align stakeholders on a common vision and execution plan prior to the build and launch phases.
    • Build a foundation of buyer and competitive understanding to drive a successful product hypothesis, then validate with buyers.
    • Deliver a team-aligned launch plan that enables launch readiness and outlines commercial success.

    SoftwareReviews Insight

    Creating a compelling go-to-market strategy, and keeping it current, is a critical software company function – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.

    Go-to-Market Strategy Critical Success Factors

    Your GTM Strategy is where a multi-disciplined team builds a strong foundation for overall product plan, build, launch, and manage success

    A GTM Strategy is not all art and not all science but requires both. Software leaders will establish a set of core capabilities upon which they will plan, build, launch and manage product success. Executives, when resourcing their GTM strategies, will begin with:
    • Strong Program Leadership – An experienced Program Manager will guide the team through each step of GTM Strategy and test team readiness before advancing to the next step.
    • Few Shortcuts – Successful teams will have navigated the process through all steps together at least once. Then future launches can skip steps where prior decisions still hold.
    • Stakeholder Buy-In – Strong collaboration among Sales, Marketing, and Product wins the day.
    • Strong Team Skills – Success depends on having the right talent, making the right decisions, and delivering the right outcomes enabled with the right set of technologies and integrated to reach the right buyers at the right moment.
    • Discipline and perseverance – Given that GTM Strategy is not easy, it’s not surprising that 75% of marketers cite a significant level of dissatisfaction with the outcomes of their GTM plan, build, and launch phases.
    Diagram titled 'Go-to-Market Phases' with phases 'Manage', 'Launch', 'Build', and highlighted as 'This blueprint focus': 'Plan'.

    SoftwareReviews Advisory Insight:
    Marketers who get GTM Strategy “right” give themselves a 50% greater chance of Build and Launch success.

    Sample of the 'PLAN' section of the GTM Strategy optimization diagram shown later.

    Go-to-Market Success is Challenging

    Getting GTM right is like winning an Olympic first-place crew finish. It takes teamwork, practice, and well-functioning tools and equipment.

    Stock image of a rowing team.

    • The goal of any Go-to-Marketing Strategy is not only to do it right once, but to do it over and over consistently.
    • A lack of GTM consistency often results in decelerating growth, and a weak GTM Strategy is likely the root cause when companies observe any of the following challenges:
      • Product opportunity is unclear and well-defined business cases are lacking
      • Buyer adoption slows of new features and launch revenue targets are missed
      • Sales and marketing are not ready when development releases new features
      • Sales win/loss ratios drop as customers tell us products are not competitively differentiated
      • Loss of executive support for new product investments
    • A company experiencing any one of these symptoms will find a remedy in plugging gaps in the way they Go-to-Market.

    “Figuring out a Go-to-Market approach is no trivial exercise – it separates the companies that will be successful and sustainable from those that won’t.” (Harvard Business Review)

    Slowing growth may be due to missing GTM Strategy essentials

    Marketers – Large and Small – will further test their GTM Strategy strength by asking “Are we missing any of the following?”

    • Product, Marketing, and Sales Alignment
    • Buyer personas and journeys
    • Product market opportunity size
    • Competitively differentiated product hypothesis
    • Buyer validated commercial concept
    • Sales revenue plan and program cost budget
    • Compelling business case for build and launch

    SoftwareReviews Advisory Insight:

    Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed. Future releases to existing products don’t need to be re-thought but instead check-listed against prior foundational decisions.

    Is Your GTM Strategy Led and Staffed Properly?

    Staffing tree outlining GTM Strategy essentials. At the top are 'Steering Committee: CEO/GM in larger company, CFO/Senior Finance, Key functional leaders'. Next is 'Program Manager: Leads the GTM program. Workstream leads are “dotted line” for the program.' Followed by 'Workstream Leads: (PM) Product Marketing – Program leadership, (PD) Product Mgt. – Aligned with PM, (MO) Marketing Ops – SMB optional, (BR) Branding/Creative – SMB optional, (CI) Competitive Intel. – SMB optional, (DG) Demand Gen./Field Marketing. – crucial, (SE) Sales Enablement – crucial, (PR) PR/AR/Comms – SMB optional, and (CS) Customer Success – SMB optional'. In a 'Large Enterprise' each role is assigned to a separate person, but in a 'Small' Enterprise each person has multiple roles. 'SMB – as employees wear many hats, teams comprise members with requisite skills vs. specific roles/titles.'

    Benefits of a more effective go-to-market strategy

    Our research shows a more effective GTM Strategy delivers key benefits, including:
    • Increased product development ROI – with a finance-aligned business case, a buyer-validated value proposition, and the readiness of marketing and sales to product launch.
    • Launch campaign effectiveness – increases dramatically when messaging resonates with buyers and where they are in their journey.
    • Seller effectiveness – increases with buyer validated value proposition, competitive differentiation, and the ability to articulate to buyers.
    • Executive support – is achieved when an aligned sales, marketing, and product team proves consistent in delivering against release targets over and over again.

    SoftwareReviews Advisory Insight:
    Many marketers experiencing the value of the GTM Steering Committee, extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.

    “Go-to-Market Strategies aren’t just for new products or services, they can also be used for:
    • Acquiring other businesses
    • Changing your business’s focus
    • Announcing a new feature
    • Entering a new market
    • Rebranding
    • Positioning or repositioning

    And while each GTM strategy is unique, there are a series of steps that every product marketer should follow.” (Product Marketing Alliance)

    Is your GTM Strategy optimized?

    Large detailed layout of the steps needed to 'Make Your Go-to-Market Strategy More Successful'. 'GTM Planning Success Can Be Elusive'; '75% of high-tech marketers desire a more effective GTM strategy...'. Steps: '1 Your Challenges - Are You Feeling Any of These Pains?', '2 Framework - Stay Aligned', '3 Planning - Check Your GTM Plan Steps', '4 Insight - Deliver Key Output', and '5 Results - Reap Key Benefits'. Source: SoftwareReviews, powered by Info-Tech Research Group.

    Marketers, in order to optimize a go-to-market strategy, will:

    1. Self assess for symptoms of a sub-optimized approach.
    2. Align marketing, sales, product, and customer success with a common vision and execution plan.
    3. Diagnose for missing steps.
    4. Ensure creation of key deliverables.
    5. And then be able to reap the rewards.

    Who benefits from an optimized go-to-market strategy?

    This research is designed for:
    • High-tech marketers who are:
      • Looking to improve any aspect of their go-to-market strategy.
      • Looking for a checklist of roles and responsibilities across the product planning, build, and launch processes.
      • Looking to foster better alignment among key stakeholders such as product marketing, product management, sales, field marketing/campaigners, and customer success.
      • Looking to build a stronger business case for new product development and launch.
    This research will help you:
    • Explain the benefits of a more effective go-to-market strategy to stakeholders.
    • Size the market opportunity for a product/solution.
    • Organize stakeholders for GTM operational success.
    • More easily present the GTM strategy to executives and colleagues.
    • Build and present a solid business case for product build and launch.
    This research will also assist:
    • High-tech marketing and product leaders who are:
      • Looking for a framework of best practices to improve and scale their GTM planning.
      • Looking to align team members from all the key teams that support high-tech product planning, build, launch, and manage.
    This research will help them:
    • Align stakeholders on an overall GTM strategy.
    • Coordinate tasks and activities involved across plan, build, launch, and manage – the product lifecycle.
    • Avoid low market opportunity pursuits.
    • Avoid poorly defined product launch business cases.
    • Build competence in managing cross-functional complex programs.

    SoftwareReviews’ Approach

    1

    Build baseline market, buyer, and competitive insights

    Sizing your opportunity, building deep buyer understanding, competitive differentiation, and routes to market are fundamental first steps.

    2

    Design initial product and business case

    Validate positioning and messaging against brand, develop packaging and pricing, and develop digital approach, launch campaign approach and supporting budgets across all areas.

    3

    Align stakeholder plans to prep for build

    Rationalize product release and concept to sales/financial plan and further develop customer success, PR/AR, MarTech, and analytics/metrics plans.

    Our methodology provides a step-by-step approach to build a more effective go-to-market strategy

    1.Build baseline market, buyer, and competitive insights 2. Design initial product and business case 3. Align stakeholder plans to prep for build
    Phase Steps
    1. Select Steering Committee, GTM team, and outline roles and responsibilities. Build an aligned vision.
    2. Build initial product hypothesis based on sales and buyer “jobs to be done” research.
    3. Size the product market opportunity.
    4. Outline digital and tech requirements to support the full GTM process.
    5. Clarify target buyer personas and the buyer journey.
    6. Identify competitive gaps, parity, and differentiators.
    7. Select the most effective routes to market.
    8. Craft initial GTM Strategy presentation for executive review and status check.
    1. Compare emerging messaging and positioning with existing brand for consistency.
    2. Formulate packaging and pricing.
    3. Build a buyer-validated product concept.
    4. Build an initial campaign plan and targets.
    5. Develop initial budgets across all areas.
    6. Draft an initial product business case.
    7. Update GTM Strategy for executive review and status check.
    1. Assess technology and tools support for GTM strategy as well as future phases of GTM build, launch, and manage.
    2. Outline support for customer onboarding and ongoing engagement.
    3. Build an awareness plan covering media, social media, and industry analysts.
    4. Finalize product business case with collaborative input from product, sales, and marketing.
    5. Develop a final executive presentation for request for approval to proceed to GTM build phase.
    Phase Outcomes
    1. Properly sized market opportunity and a unique buyer value proposition
    2. Buyer persona and journey mapping with buyer needs and competitive SWOT
    3. Tech stack modernization requirements
    4. First draft of business case
    1. Customer-validated value proposition and product-market fit
    2. Initial product business case with sales alignment
    3. Initial launch plans including budgets across all areas
    1. Key stakeholders and their plans are fully aligned
    2. Executive sign-off to move to GTM build phases

    Insight summary

    Your go-to-market strategy ability is a strategic asset

    Having an updated and compelling go-to-market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.

    Build the GTM Steering Committee into a strategic decision-making body

    Many marketers experiencing the value of the GTM Steering Committee extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.

    A strong MarTech apps and analytics stack differentiates GTM leaders from laggards

    Marketers that collaborate closely with Marketing Ops., Sales Ops., and IT early in the process of a go-to-market strategy will be best able to assess whether current website/digital, marketing applications, CRM/sales automation apps, and tools can support the complete Go-to-Market process effectively.

    Establishing alignment through the GTM process builds long term operational strength

    Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed.

    Build speed and agility

    Future releases to existing products don’t need be re-thought but instead check-listed against prior foundational decisions.

    GTM Strategy builds launch success

    Marketers who get GTM Strategy “right” give themselves a 50% greater chance of build and launch success.

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    Key deliverable:

    Go-to-Market Strategy Presentation Template

    Capture key findings for your GTM Strategy within the Go-to-Market Strategy Presentation Template.

    Sample of the key deliverable, the Go-to-Market Strategy Presentation Template.

    Go-to-Market Strategy RACI and Launch Checklist Workbook

    Includes a RACI model and launch checklist that helps scope your working team’s roles and responsibilities.

    Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable.

    Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Capture launch incremental costs that, when weighed against the forecasted revenue, illustrate gross margins as a crucial part of the business case.

    Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.

    Product Market Opportunity Sizing

    While not a deliverable of this blueprint per se, the Product Market Opportunity blueprint is required.

    Sample of the Product Market Opportunity Sizing deliverable. This blueprint calls for downloading the following additional blueprint:

    Buyer Persona and Journey blueprint

    While not a deliverable of this blueprint per se, the Buyer Persona and Journey blueprint is required

    Sample of the Buyer Persona and Journey blueprint deliverable.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
    Included within advisory membership Optional add-ons

    Guided Implementation

    A Guided Implementation (GI) is a series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.

    For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.

    Your engagement managers will work with you to schedule analyst calls.

    What does our GI on Build a More Effective Go-to-Market Strategy look like?

    Build baseline market, buyer, and competitive insights

    Design initial product and business case

    Align stakeholder plans to prep for build

    Call #1: Share GTM vision and outline team activities for the GTM Strategy process. Plan next call – 1 week.

    Call #2: Outline product market opportunity approach and steps to complete. Plan next call – 1 week.

    Call #3: Hold a series of inquiries to do a modernization check on tech stack. Plan next call – 2 weeks.

    Call #4: Discuss buyer interview process, persona, and journey steps. Plan next call – 2 weeks.

    Call #5: Outline competitive differentiation analysis, routes to market, and review of to-date business case. Plan next call – 1 week.

    Call #6: Discuss brand strength/weakness, pricing, and packaging approach. Plan next call – 3 weeks.

    Call #7: Outline needs to craft assets with right messaging across campaign launch plan and budget. Outline needs to create plans and budgets across rest of marketing, sales, CX, and product. Plan next call – 1 week.

    Call #8: Review template and approach for initial business case and sales and product alignment. Plan next call – 1 week.

    Call #9: Review initial business case and launch plans across marketing, sales, CX, and product. Plan next call – 1 week.

    Call #10: Discuss plans/needs/budgets for tech stack modernization. Plan next call – 3 days.

    Call #11: Discuss plans/needs/budgets for CX readiness for launch. Plan next call – 3 days.

    Call #12: Discuss plans/needs/budgets for digital readiness for launch. Plan next call – 3 days.

    Call #13: Discuss plans/needs/budgets for marketing and sales readiness for launch. Plan next call – 3 days.

    Call #14: Review final business case and coach on Steering Committee Presentation. Plan next call – 1 week.

    A Go-to-Market Workshop Overview

    Contact your engagement manager for more information.
    Day 1 Day 2 Day 3 Day 4 Day 5
    Align on GTM Vision & Plan, Craft Initial Strategy
    Identify Initial Business Case, Sales Forecast and Launch Plan
    Develop Launch Plans (i of ii)
    Develop Launch Plans (ii of ii)
    Present Final Business Case to Steering Committee
    Activities

    1.1 Outline a vision for GTM and roles required, identify Steering Committee lead, workstream leads, and teams.

    1.2 Capture GTM strategy hypothesis by working through initial draft of GTM Strategy Presentation and business case.

    1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.

    1.4 Identify information/data gaps and sources and plan for capturing/gathering including buyer interviews.

    Plan next day 2-3 weeks after buyer persona/journey interviews.

    2.1 Size product market opportunity and initial revenue forecast.

    2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, and channel/route to market.

    2.3 Craft initial launch campaign, product release, sales, and CX readiness plans.

    2.4 Identify launch budgets across each investment area.

    2.5 Discuss initial product launch business case and key activities.

    Plan next day 2-3 weeks after product hypothesis-validation interviews with customers and prospects.

    3.1 Apply product interviews to scope, MVP, and roadmap competitive differentiation, pricing, feature prioritization, routes to market and sales forecast.

    3.2 Develop more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.

    4.1 Develop detailed launch/readiness plans with final budgets for:

    • Sales enablement
    • Sales training
    • Tech stack
    • Customer onboarding & success
    • Product marketing
    • AR
    • PR
    • Corp comms/Internal comms
    • Customer events
    • Employee events
    • etc.

    5.1 Review final launch/readiness plans with final budgets for all key areas.

    5.2 Move all key findings up into Steering Committee presentation slides.

    5.3 Present to Steering Committee, receive feedback.

    5.4 incorporate Steering Committee feedback; update finial business case.

    Deliverables
    1. Documented Steering Committee and working team, aligned on GTM vision and process.
    2. Document team knowledge on initial GTM strategy, buyer persona and business case.
    1. Definition of product market fit, uniqueness and competitive differentiation.
    2. Preliminary product launch business case, campaign, targets, and readiness plans.
    1. Detailed launch plans, budgets for product and marketing launch.
    1. Detailed launch plans, budgets for product marketing, sales, customer success, and AR/PR/Corp. comms.
    1. Final GTM Strategy, launch plan and business case.
    2. Approvals to move to GTM build and launch phases.

    Build a More Effective Go-to-Market Strategy

    Phase 1

    Build baseline market, buyer, and competitive insights

    Phase 1

    1.1 Select Steering Cmte/team, build aligned vision for GTM

    1.2 Buyer personas, journey, initial messaging

    1.3 Build initial product hypothesis

    1.4 Size market opportunity

    1.5 Outline digital/tech requirements

    1.6 Competitive SWOT

    1.7 Select routes to market

    1.8 Craft GTM Strategy deck

    Phase 2

    2.1 Brand consistency check

    2.2 Formulate packaging and pricing

    2.3 Craft buyer-valid product concept

    2.4 Build campaign plan and targets

    2.5 Develop cost budgets across all areas

    2.6 Draft product business case

    2.7 Update GTM Strategy deck

    Phase 3

    3.1 Assess tech/tools support for all GTM phases

    3.2 Outline sales enablement and Customer Success plan

    3.3 Build awareness plan

    3.4 Finalize business case

    3.5 Final GTM Plan deck

    This phase will walk you through the following activities:

    • Steering Committee and Team formulation
    • A vision for go-to-market strategy
    • Initial product hypothesis
    • Market Opportunity sizing
    • Tech stack/digital requirements
    • Buyer persona and journey
    • Competitive gaps, parity, differentiators
    • Routes to market
    • GTM Strategy deck

    This phase involves the following stakeholders:

    • Steering Committee
    • Working group leaders

    To complete this phase, you will need:

    Go-to-Market Strategy Presentation Template Go-to-Market Strategy RACI and Launch Checklist Workbook Buyer Persona and Journey blueprint Product Market Opportunity Sizing Workbook
    Sample of the Go-to-Market Strategy Presentation Template deliverable. Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable. Sample of the Buyer Persona and Journey blueprint deliverable. Sample of the Product Market Opportunity Sizing Workbook deliverable.
    Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
    • Documenting your GTM Strategy stakeholders
    • Documenting your GTM Strategy working team
    Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
    • Review the scope of roles and responsibilities required
    • Document the roles and responsibilities of your teams
    Use the Buyer Persona and Journey blueprint to:
    • Interview sales and customers/prospects to inform product concepts, understand persona and later, flush out buyer journey
    Use the Product Market Opportunity Sizing blueprint to:
    • Project Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM), and Total Available Market (TAM) from your current penetrated market

    Step 1.1

    Identify a GTM Program Steering Committee and Team. Build an Aligned Vision for Your Go-to-Market Strategy Approach

    Activities
    • 1.1.1 Identify the Steering Committee of key stakeholders whose support will be critical to success
    • 1.1.2 Select your go-to-market strategy program team
    • 1.1.3 Discuss an overview of the GTM process and program roles and responsibilities with stakeholders and GTM workstream leads
    • 1.1.4 Develop a Go-to-Market launch, tiering, time-line, and overall program plan
    • 1.1.5 Work with each workstream lead on their overall project plan and incremental budget requirements

    This step will walk you through the following activities:

    • Identify stakeholders – your Steering Committee
    • Identify team members
    • Present a vision of GTM Strategy

    This step involves the following participants:

    • Steering Committee
    • Program workstream leads

    Outcomes of this step

    • Steering Committee identified
    • Team members identified
    • All aligned on the GTM process
    • Go-to-market strategy timeline and program plan
    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    1.1.1 Identify stakeholders critical to success

    1-2 hours

    Input: Steering Committee interviews, Recognition of Steering Committee interest

    Output: List of GTM Strategy stakeholders as Steering Committee members

    Materials: Following slide outlining the key responsibilities required of the Steering Committee members, A high-Level timeline of GTM Strategy phases and key milestone meetings

    Participants: CMO, sponsoring executive, Functional leads - Marketing, Product Marketing, Product Management, Sales, Customer Success

    1. The GTM Strategy initiative manager should meet with the CMO to determine who will comprise the Steering Committee for your GTM Strategy.
    2. Finalize selection of steering committee members.
    3. Meet with members to outline their roles and responsibilities and ensure their willingness to participate.
    4. Document the steering committee members and the milestone/presentation expectations for reporting project progress and results.

    SoftwareReviews Advisory Insight:
    Go To Market Steering Committee’s can become an important ongoing body to steer overall product, pricing and other GTM decisions. Some companies have done so by adding the CEO and CFO to this committee and designated it as a permanent body that meets monthly to give go/no decisions to “all things product related” across all products and business units. Leaders that use this tool well, stay aligned, demonstrate consistency across business units and leverage outcomes across business units to drive greater scale.

    Go-to-Market Strategy Stakeholders

    Understand that aligning key stakeholders around the way your company goes to market is an essential company function.

    Title Key Roles Supporting an Effective Go-to-Market Strategy
    Go-to-Market Strategy Sponsor
    • Owns the function at the management/C-suite level
    • Responsible for breaking down barriers and ensuring alignment with organizational strategy
    • CMO, VP of Marketing, and in SMB Providers, the CEO
    Go-to-Market Strategy Program Manager
    • Typically a senior member of the marketing team
    • Responsible for organizing the GTM Strategy process, preparing summary executive-level communications and approval requests
    • Program manages the GTM Strategy process, and in many cases, the continued phases of build and launch.
    • Product Marketing Director, or other marketing director, that has strong program management skills, has run large scale marketing and/or product programs, and is familiar with the stakeholder roles and enabling technologies
    Functional Workstream Leads
    • Works alongside the Go-to-Market Strategy Initiative Manager on a specific product launch, campaign, rebranding, new market development, etc. and ensures their functional workstreams are aligned with the GTM Strategy
    • With typical GTM B2B a representative from each of the following functions will comprise the team:
      • Product Marketing, Product Management, Field Marketing, Creative, Marketing Ops/Digital, PR/Corporate Comms/AR, Social Media Marketing, Sales Operations, Sales Enablement/Training, and Customer Success
    Digital, Marketing/Sales Ops/IT Team
    • Comprised of individuals whose application and tech tools knowledge and skills are crucial to supporting the entire marketing tech stack and its integration with Sales/CRM
    • Responsible for choosing technology that supports the business requirements behind Go-to-Market Strategy, and eventually the build and launch phases as well
    • Digital Platforms, CRM, Marketing Applications and Analytics managers
    Steering Committee
    • Comprised of C-suite/management-level individuals that guide key decisions, approve of requests, and mitigate any functional conflicts
    • Responsible for validating goals and priorities, defining the scope, enabling adequate resourcing, and managing change especially among C-level leaders in Sales & Product
    • CMO, CTO/CPO, CRO, Head of Customer Success

    Download the Go-to-Market Strategy Presentation Template

    Roles vary by company size. Launch success depends on clear responsibilities

    Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook.

    Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

    Success improves when you align & assign
    • Go-to-Market, build, and launch success improves when:
      • Phases and steps are outlined
      • Key activities are documented
      • Roles/functions are described
      • At the intersection of activities and role, whether the role is “Responsible,” “Accountable,” “Consulted,” or “Informed” is established across the team
    • Leaders will hold a workshop to establish RACI that fits with the scope and scale of your organization.
    • Confusion, conflict, and friction can be dramatically reduced/eliminated with RACI adoption and practice.
    • Review the RACI model and launch checklist within the Go-to-Market Strategy RACI and Launch Checklist Workbook in order to identify the full scope of roles and responsibilities needed.

    Go-to-Market Strategy Working Team

    Consider the skills and knowledge required for GTM Strategy as well as build and launch functions when choosing teams.

    Work with functional leaders to select workstream leads

    Workstream leads should be strong in collaboration, coordination of effort among others, knowledgeable about their respective function, and highly organized as they may be managing a team of colleagues within their function to deliver their responsible portion of GTM.

    Required Skills/Knowledge

    • Target Buyer
    • Product Roadmap
    • Brand
    • Competitors
    • Campaigns/Lead Gen
    • Sales Enablement
    • Media/Analysts
    • Customer satisfaction

    Suggested Functions

    • Product Marketing
    • Product Management
    • Creative Director
    • Competitive Intelligence
    • Demand Gen./Field Marketing
    • Sales Ops/Training/Enablement
    • PR/AR/Corporate Comms.
    • Customer Success
    Roles Required in Successful GTM Strategy
    For SMB companies, as employees wear many different hats, assign people that have the requisite skills and knowledge vs. the role title.

    Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

    1.1.2 Select the GTM Strategy working team

    1-2 hours

    Input: Stakeholders and leaders across the various functions outlined to the left

    Output: List of go-to-market strategy team members

    Materials: Go-to-Market Strategy Workbook

    Participants: Initiative Manager, CMO, Sponsoring executive, Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others), Marketing Applications Director, Senior Digital Business Analyst

    1. The GTM Strategy Initiative Manager should meet with the GTM Strategy Sponsor and functional leaders of workstream areas/functions to determine which team members will serve as Steering Committee members and who will serve as workstream leads.
    2. The working team for your go-to-market strategy should have the following roles represented in the working team:
      • Depending on the initiative and the size of the organization, the team will vary.
      • Key business leaders in key areas – Product Marketing, Field Marketing, Digital Marketing, Inside Sales, Sales, Marketing Ops., Product Management, and IT – should be involved.
    3. Document the members of your go-to-market strategy team in the Go-to-Market Strategy Presentation slide entitled “Our Team.”

    Download the Go-To-Market Strategy RACI and Launch Checklist Workbook

    1.1.3 Develop a timeline for key milestones

    1 hour

    Timeline for Key Milestones with row headers 'Go-to-Market Phases', 'Major Milestones', and 'Key Phase Activities'. The phases (each column) and their associated activities are 'PLAN - Create buyer-validated product concept, size opportunity, and build business case', 'BUILD - Build product and enable readiness across the rest of marketing sales and customer success', 'LAUNCH - Release product, launch campaigns, and measure progress toward objectives', and then post-phase is 'MANAGE'. Notes in the 'Major Milestones' row: 'Outline key dates', 'Update with 'Today's Date' as you make progress', and 'Use GTM Plan major milestones or create your own'.

    GTM Program Managers:

    1. Will establish key program milestones working collaboratively with the Steering Cmte. and workstream leads.
    2. Outline key ”Market-facing” or external deliverables & dates, as well as internal.
    3. More detailed deliverable plans are called for working with workstream leads.
    4. This high-level overview will be used in regular Steering Cmte. and working team meets
    5. Record in the Go-to-Market Strategy Presentation

    Download the Go-to-Market Strategy Presentation Template

    1.1.5 Share your GTM strategy vision with your team

    1-2 hours

    Input: N/A

    Output: Team understanding of an effective go-to-market strategy, team roles and responsibilities and initial product and launch concept.

    Materials: The Build a More Effective Go-to-Market Strategy Executive Brief

    Participants: GTM Program Manager, CMO, Sponsoring executive, Workstream leads

    1. Download the Build a More Effective Go-to-Market Strategy Executive Brief and add the additional slides on Team Composition and Key Milestones you have created in prior steps as appropriate.
    2. Convene the Steering Committee and Working Team and take them through the Build a More Effective Go-to-Market Strategy Executive Brief with your additional slides to:
      1. Communicate team composition, roles and responsibilities, and key GTM Strategy program milestones.
      2. Educate them on what comprises a complete GTM Strategy from the Executive Brief.
    3. Optional: As a SoftwareReviews Advisory client, invite a SoftwareReviews analyst to present the Executive Brief if that is of help to you and your team.

    Go to the Build a More Effective Go-to-Market Strategy Executive Brief

    GTM program managers and workstream leads will collaborate on detailed project plans

    Timeline titled 'Workstreams Status' with a legend of shapes and colors, activities listed as row headers, timeline sections 'EXPLORE', 'DESIGN', 'ALIGN', and 'BUILD', and a column at the end of the timelines for the name of the workstream lead. Notes: 'Change names to actual workstream. Create separate pages for each', 'Overlay colored bars to indicate on/off track', 'Describe major deliverables & due dates', 'Outline major milestones', 'Update with your actual month and week-ending dates', 'Add workstream lead names'.

    Program managers will:

    • Outline an overall more detailed way of tracking GTM program workstreams, key dates and on/off track status

    Program managers & workstream leads will:

    • Call out each key workstream and workstream lead
    • Outline key deliverables and due dates
    • Track weekly for communicating status to Steering Cmte and working team meetings

    Use the Launch Checklist when building out full project plans

    Sample Launch Checklist table with project info above, and table columns 'Component', 'Owner', 'Start Date', 'Finish Date', 'G2M Plan', and 'Build'.

    Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

    Continuous improvement is enabled with a repeatable process
    • With ownership assigned and set-back schedules in place, product marketing and management leaders can take the guesswork out of the GTM plan and build and launch process for the entire team.
    • “Lighter” versions are created for lower-tier releases.
    • Checklists ensure “we haven’t missed anything” and drive clarity among the team.
    • Articulating where we are now and what’s next increases management confidence.
    • Rinse and repeat improves overall quality and drives scale.

    1.1.6 Develop a project plan for each workstream

    Work with your workstream leads to see them develop a detailed project plan that spans all their deliverables for a GTM Strategy
    1. It’s essential that GTM initiative managers can rely upon workstream leads to provide the status of their respective workstreams in a shared environment for easy weekly updating and reporting.
    2. We suggest the following approach:
      1. GTM initiative managers should maintain a copy of the GTM Strategy Presentation in a shared drive so workstream leads can provide updates.
      2. Workstream leads should work with their GTM initiative manager to populate a version of the workstream tracker shown on the previous slide that enables team status reporting.
      3. Additional slides that actually show “work completed” (e.g. images of assets created, training plans, screen caps of software functionality, etc.) should be reviewed each week as well.
      4. GTM initiative leaders/program managers are advised to summarize the to-date work completed across the team into the Go-To-Market Product and Launch Business Case slides to demonstrate progress to the Steering Committee.
    3. The goal is to keep tracking manageable. Because status is most easily shown during Steering Committee and Working Team meetings using PowerPoint, we recommend a simple approach to program management by using PowerPoint.
    Using the Go-to-Market Strategy Presentation:
    3-4 hours Initial, 1-2 hours weekly
    1. Work with your workstream leads to create a slide for each workstream that will contain all the key milestones.
    2. Some teams will choose to use project management software, others a PowerPoint representation, which makes for easy presentation during status meets.
    3. Use the following resources:
      • In the Go-to-Market Strategy RACI and Launch Checklist Workbook, reference the Launch Checklist.
      • In the Go-to-Market Presentation, use the Appendix slides and complete for each workstream.
    4. The GTM initiative manager must be able to track status with workstream leads and present status to the rest of the team during Steering Committee and workstream lead meetings.

    Download the Go-to-Market Strategy Presentation Template

    Download the Go-To-Market Strategy RACI and Launch Checklist Workbook

    Step 1.2

    Hold Interviews With Sales Then Customers and Prospects to Inform Your Initial Product Concept

    Activities
    • 1.2.1 Use the SoftwareReviews Buyer Persona and Journey Interview Guide and Data Capture Tool found within the SoftwareReviews Buyer Persona and Journey blueprint.
    • 1.2.2 Follow the instructions within the above blueprint and hold interviews with Sales and customers and prospects to inform your buyer persona, initial product hypothesis, and buyer journey.
    • 1.2.3 Flush out the initial product and launch concept using the slides found within the Go-to-Market Strategy Presentation Template. You will continually refine the Go-to-Market Strategy Presentation Template such that you turn the Product and Launch descriptions into a business case for product build and launch. We advise you and your team to populate the slides to begin to inform an initial concept, then hold interviews with Sales, customers, and prospects to refine. The best way to capture customer and prospect insights is to use the Buyer Persona and Journey blueprint.

    This step will walk you through the following activities:

    • Schedule time with sales/sales advisory to flush out the product concept
    • Develop your customer and prospect interviewee list
    • Consolidate findings for your GTM Strategy program slide deck

    This step involves the following participants:

    • Sales/sales advisory, product management, initiative leader (product marketing)
    • Customers and prospects

    Outcomes of this step

    • Guidance from sales on product concept
    • Initial guidance from customers and prospective buyers
    • Agreement to proceed further

    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    Documenting buyer personas enables success beyond marketing

    Documenting buyer personas has several essential benefits to marketing, sales, and product teams:
    • Achieve a better understanding of your target buyer – by building a detailed buyer persona for each type of buyer and keeping it fresh, you take a giant step in becoming a customer-centric organization.
    • Align the team on a common definition – will happen when you build buyer personas collaboratively and among teams that touch the customer.
    • Improved lead generation – increases dramatically when messaging and marketing assets across your lead generation engine better resonate with buyers because you have taken the time to understand them deeply.
    • More effective selling – is possible when sellers apply persona development output to their interactions with prospects and customers.
    • Better product-market fit – increases when product teams more deeply understand for whom they are designing products. Documenting buyer challenges, pain points, and unmet buyer needs gives product teams what they need to optimize product adoption.
    “It’s easier buying gifts for your best friend or partner than it is for a stranger, right? You know their likes and dislikes, you know the kind of gifts they’ll have use for, or the kinds of gifts they’ll get a kick out of. Customer personas work the same way. By knowing what your customer wants and needs, you can present them with content targeted specifically to those wants and needs.” (Emma Bilardi, Product Marketing Alliance, July 8, 2020)

    Buyer persona attributes that need defining

    A well defined buyer persona enables us to:

    • Clarify target org-types, identify buying decision makers and key personas, and determine how they make decisions
    • Align colleagues around a common definition of target buyer(s) to drive improvements in messaging and engagement across marketing, sales, and customer success
    • Identify specific asset-types and tools that, when activated within our lead gen engine and in the hands of sellers, helps a buyer move through a decision process
    Functional – “to find them”
    Job Role Titles Org Chart Dynamics Buying Center Firmographics

    Emotive – “what they do and jobs to be done”
    Initiatives – What programs/projects the persona is tasked with and what are their feelings and aspirations about these initiatives? Motivations? Build credibility? Get promoted? Challenges – Identify the business issues, problems, and pain points, that impede attainment of objectives. What are their fears, uncertainties, and doubts about these challenges? Buyer need – They may have multiple needs; which need is most likely met with the offering? Terminology – What are the keywords/phrases they organically use to discuss the buyer need or business issue?

    Decision Criteria – “how they decide”
    Buyer role – List decision-making criteria and power level. The five common buyer roles are champion, influencer, decision maker, user, and ratifier (purchaser/negotiator). Evaluation and decision criteria – The lens, either strategic, financial, or operational, through which the persona evaluates the impact of purchase.

    Solution Attributes – “what the ideal solution looks like”
    Steps in “Jobs to be Done” Elements of the “Ideal Solution” Business outcomes from ideal solution Opportunity scope – other potential users Acceptable price for value delivered Alternatives that see consideration Solution sourcing – channel, where to buy

    Behavioral Attributes – “how to approach them successfully”
    Content preferences – List the persona’s content preferences, could be blog, infographic, demo, video, or other, vs. long-form assets (e.g. white paper, presentation, analyst report). Interaction preferences – Which among in-person meetings, phone calls, emails, video conferencing, conducting research via web, mobile, and social. Watering holes – Which physical or virtual places do they go to network or exchange info with peers e.g. LinkedIn, etc.

    Buyer journeys are constantly shifting

    If you haven’t re-mapped buyer journeys recently, you may be losing to competitors that have. Leaders re-map buyer journeys frequently.
    • The multi-channel buyer journey is constantly changing – today’s B2B buyer uses industry research sites, vendor content marketing assets, software reviews sites, contacts with vendor salespeople, events participation, peer networking, consultants, emails, social media sites, and electronic media to research purchasing decisions.
    • COVID has dramatically decreased face-to-face – we estimate a B2B buyer spent between 20-25% more time online researching software buying decisions in 2021 than they did pre-COVID. This has diminished the importance of face-to-face selling and has given dramatic rise to digital selling and outbound marketing.
    • Content marketing has exploded – but without mapping the buyer journey and knowing where (by channel) and when (which buyer journey step) to offer content marketing assets, we will fail to convert prospects into buyers.

    SoftwareReviews Advisory Insight:
    Marketers are advised to update their buyer journey annually and with greater frequency when the human vs. digital mix is effected due to events such as COVID, and as emerging media such as Augmented Reality shifts asset-type usage and engagement options.

    “Two out of three B2B buyers today prefer remote human interactions or digital self service.

    And during August 2020-February 2021, use of digital self service leapt by 10%” (McKinsey & Company, 2021.)

    Challenges of not mapping persona and journey

    A lack of buyer persona and journey understanding is frequently the root cause of the following symptoms:
    • Lead generation results are way below expectations.
    • Inconsistent product-market fit.
    • Sellers have low success rates doing discovery with new prospects.
    • Website abandonment rates are really high.

    These challenges are often attributed to messaging and talk tracks that fail to resonate with prospects and products that fail to meet the needs of targeted buyers.

    SoftwareReviews Advisory Insight:
    Marketers developing buyer personas and journeys that lack agreement among Marketing, Sales, and Product of personas to target will squander precious time and resources throughout the customer targeting and acquisition process.

    “Forty-four percent of B2B marketers have already discovered the power of personas.” (Boardview, 2016.)

    1.2.1 Interview Sales and customers/prospects

    12 - 15 Hours, over course of 2-3 weeks

    Input: Insights from Sellers, Insights from customers and prospects

    Output: Completed slides outlining buyer persona, buyer journey, overall product concept, and detailed features and capabilities needed

    Materials: Create a Buyer Persona and Journey blueprint, Go-to-Market Strategy Presentation

    Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews

    1. Using the Create a Buyer Journey and Persona Journey blueprint:
      • Follow the instructions to interview a group of Sellers, and most importantly, several customers and prospects
        • For this stage in the GTM Strategy process, the goal is to validate your initial product and launch concept.
        • We urge getting through all the interview questions with interviewees as the answers inform:
          • Product market fit and Minimal Viable Product
          • Competitive differentiation
          • Messaging, positioning, and campaign targeting
          • Launch campaign asset creation.
      • Place summary findings into the Go-to-Market Strategy Presentation, and for reference, place the Buyer Persona and Journey Summaries into the Go-to-Market Strategy Presentation Appendix.

    Download the Go-to-Market Strategy Presentation Template

    Download the Create a Buyer Journey and Persona Journey blueprint

    Step 1.3

    Update Your Product Concept

    Activities
    • 1.3.1 Based on Sales and Customer/Prospect interviews, update:
      • Your product concept slide
      • Detailed prioritization of features and capabilities

    This step calls for the following activities:

    • Update the product concept slide based on interview findings
    • Update/create the stack-ranking of buyer requested feature and capability priorities

    This step involves the following participants:

    • Product management lead
    • GTM initiative leader
    • Select workstream leads who sat in on interview findings

    Outcomes of this step

    • Advanced product concept
    • Prioritized features for development during Build phase
    • Understanding of MVP to deliver customer value and deal “wins”

    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    1.3.1 Update Product and Launch concept

    2 Hours

    Input: Insights from Sellers, Insights from customers and prospects

    Output: Completed slides outlining product concept and detailed features and capabilities needed

    Materials: Go-to-Market Strategy Presentation

    Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews

    1. Using the Go-to-Market Strategy Presentation:
      • With interview findings, update the Product and Launch Concept, Buyer Journey, and Capture Key Features/Capabilities of High Importance to Buyers slides

    Download the Go-to-Market Strategy Presentation Template

    Product and Launch Concept

    At this early stage, summarize findings from concept interviews to guide further discovery, as well as go-to-market concepts and initial campaign concepts in upcoming steps.

    Job Function Attributes

    Target Persona(s):
    Typical Title:
    Buying Center/functional area/dept.:

    Firmographics:
    Industry specific/All:
    Industry subsegments:
    Sizes (by revenues, # of employees):
    Geographical focus:

    Emotive Attributes

    Initiative descriptions: Buyer description of project/program/initiative. What terms used?

    Business issues: What are the business issues related to this initiative? How is this linked to a CEO-level mission-critical priority?

    Key challenges: What business/process hurdles need to be overcome?

    Pain points: What are the pain points to the business/personally in their role related to the challenges that drove them to seek a solution?

    Success motivations: What motivates our persona to be successful in this area?

    Solution and Opportunity

    Steps to do the job: What are the needed steps to do this job today?

    Key features and capabilities: What are the key solution elements the buyer sees in the ideal solution? (See additional detail slide with prioritized features.)

    Key business outcomes: In business terms, what value (e.g. cost/time/FTE savings, deals won, smarter, etc.) is expected by implementing this solution?

    Other users/opportunities: Are there other users in the role team/company that would benefit from this solution?

    Pricing/Packaging

    What is an acceptable price to pay for this solution? Based on financial benefits and ROI hurdles, what’s a good price to pay? A high price? What are packaging options? Any competitive pricing to compare?

    Alternatives/Competition

    What are alternatives to this solution: How else would you solve this problem? Are there other solutions you’ve investigated?

    Channel Preferences

    Where would it be most convenient to buy?: Direct from provider? Channel partner/reseller? Download from the web?

    Decision Criteria Attributes

    Decision maker – Role, criteria/decision lens:
    User(s) – Role, criteria/decision lens:
    Influencer(s) – Role, criteria/decision lens:
    Ratifier(s) – Role, criteria/decision lens:

    Behavioral Attributes

    Interaction preferences: Best way for us to reach this role? Email? At events? Texting? Video calls?

    Content types: Which content types (specifics; videos, short blog/article, longer whitepapers, etc.) help us stay educated about this initiative area?

    Content sources: What news, data, and insight sources (e.g. specifics) do you use to stay abreast of what’s important for this initiative area?

    Update the Go-to-Market Strategy Presentation with findings from Sales and customer/prospect interviews.

    Capture key features/capabilities of high importance to buyers

    Ask buyers during interviews, as outlined in the Buyer Persona and Journey blueprint, to describe and rate key features by need. You will also review with buyers during the GTM Build phase, so it’s important to establish high priority features now.

    Example bar chart for 'Buyer Feature Importance Ratings' where 'Buyer Need' is rated for each 'Feature'.
    • List key feature areas for buyer importance rating.
    • Establish a rating scheme.
        E.g. a rating of:
      • 4.5 or higher = critical ROI driver
      • 3.5 to 4.5 = must haves
      • 2 to 3.5 = nice to have
      • Less than 2 = low importance
    • Have buyers rate each possible feature 0-5 after explaining the rating scheme. Ask – are we missing any key features?
    • Update this slide, found within the Go-to-Market Strategy Presentation, with customer/prospect interview findings.
    Perform the same buyer interviews for non-feature “capabilities” such as:
    • Ease of use, security, availability of training, service model, etc. – and other “non-feature” areas that you need for your product hypothesis.

    Step 1.4

    Size the Product Market Opportunity

    Activities
    • 1.3.1 Based on the product concept, size, and the product market opportunity and with a focus on your “Obtainable Market”:
      • Clarify the definitions used to size market opportunity.
      • Source data both internally and externally.
      • Calculate the available, obtainable market for your software product.

    This step will walk you through the following activities:

    • Review market sizing definitions and identify required data
    • Identify the target market for your software application
    • Source market and internal data that will support your market sizing
    • Document and validate with team members

    This step involves the following participants:

    • GTM initiative leader
    • CMO, select workstream leads

    Outcomes of this step

    • Definitions on market sizing views
    • Data sourcing established
    • Market sizing and estimated penetration calculations

    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    Market opportunity sizing definitions

    Your goal is to assess whether or not the opportunity is significantly sized and if you are well positioned to capture it

    1. This exercise is designed to help size the market opportunity for this particular product GTM launch and not the market opportunity for the entire product line or company. First a few market sizes to define:
      1. Penetrated – is your current revenues and can be expressed in your percentage vs. competitors’.
      2. Serviceable Obtainable Market (SOM) – larger than your currently penetrated market, and a percentage of SAM that can realistically be achieved. It accounts for your current limitations to reach and your ability to sell to buyers. It is restricted by your go-to-market ability and reduced by competitive market share. SOM answers: What increased market can we obtain by further penetrating accounts within current geographical coverage and go-to-market abilities and within our ability to finance our growth?
      3. Serviceable Available Market (SAM) – larger than SOM yet smaller than TAM, SAM accounts for current products and current go-to-market capabilities and answers: What if every potential buyer bought the products we have today and via the type of go-to-market (GTM) especially geographical coverage, we have today? SAM calls for applying our current GTM into unpenetrated portions of currently covered customer segments and regions.
      4. Total Available Market (TAM) – larger than SAM, TAM sizes a market assuming we could penetrate other customer segments within currently covered regions without regard for resources, capabilities, or competition. It answers the question: If every potential buyer within our available market – covered regions – bought, how big would the market be?
      5. Total Global Market – estimates market opportunity if all orgs in all segments and regions bought – with full disregard for resources and without the restrictions of our current GTM abilities.
      6. Develop your market opportunity sizing using the Product Market Opportunity Sizing Workbook.

    Download the Product Market Opportunity Sizing Workbook

    SoftwareReviews Advisory Insight:
    Product marketers that size the product market opportunity and account for the limitations posed by competitors, current sales coverage, brand permission, and awareness, provide their organizations with valuable insights into which inhibitors to growth should be addressed.

    Visualization of market opportunity sizes as circles within bigger circles, 'Penetrated Market' being the smallest and 'Global Market' being the largest.

    1.4.1 Size the product market opportunity

    Your goal is two-fold: Determine the target market size, and develop a realistic 12–24 month forecast to support your business case
    1. Open the Product Market Opportunity Sizing Workbook.
    2. Follow the instructions within.
    3. When finished, download the Go-to-Market Strategy Presentation and update the Product Market Opportunity Size slide with your calculated Product Market Opportunity Size.

    Download the Product Market Opportunity Sizing Workbook

    Download the Go-to-Market Strategy Presentation Template

    “Segmentation, targeting and positioning are the three pillars of modern marketing. Great segmentation is the bedrock for GTM success but is overlooked by so many.” (Product Marketing Alliance)

    Step 1.5

    Outline Digital and Tech Requirements

    Activities

    Designing your go-to-market strategy does not require a robust customer experience management (CXM) platform, but implementing your strategy during the next steps of Go-to-Market – Build then Launch – certainly does.

    Review info-Tech’s CXM blueprint to build a more complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components.

    The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis called for during your GTM Strategy design.

    Diagram of 'Customer Relationship Management' surrounded by its components: 'Web Experience Management Platform', 'E-Commerce & Point-of-Sale Solutions', 'Social Media Management Platform', 'Customer Intelligence Platform', 'Customer Service Management Tools', and 'Marketing Management Suite'.

    These steps outlined in the CXM blueprint, will help you:

    • Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.
    • Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy
    • Pull this all together to develop a prioritized optimization roadmap.

    This step involves the following participants:

    • Marketing Operations, Digital, IT
    • Project workstream leads as appropriate

    Outcomes of this step

    • After inquiries with appropriate analysts, client will be able to assess what new application and technology support is required to support Go To Market process.

    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    Step 1.6

    Identify features and capabilities that will drive competitive differentiation

    Activities
    • 1.6.1 Hold a session with key stakeholders including sales, customer success, product, and product marketing to develop a hypothesis of features and capabilities vs. competitors: differentiators, parity areas, and gaps (DPG).
    • Optional for clients with buyer reviews and key competitive reviews within target product category:
      • 1.6.2 Request from SoftwareReviews a 2X2 Matrix Report of Importance vs. Satisfaction for both features and capabilities within your product market/category to identify areas of competitive DPG.
      • 1.6.3 Hold an Inquiry with covering ITRG analysts in your product category to have them validate key areas of competitive DPG.
    • 1.6.4 Document competitive DPG and build out your hypothesis for product build as you ready for customer interviews to validate that hypothesis.

    This step will provide processes to help you:

    • Understand and document competitive differentiation, parity, and gaps

    This step involves the following participants:

    • Project workstream leads in product marketing, competitive intelligence, product management, and customer success

    Outcomes of this step

    • Develop a clear understanding of what differentiated capabilities to promote, which parity items to mention in marketing, and which areas are competitive gaps
    • Develop a hypothesis of what areas need to be developed during the Build phase of the Go-to-Market lifecycle

    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    Assess current capabilities and competitive differentiation vs. buyer needs

    Taking buyer needs ratings from step 1.3, assess your current and key competitive capabilities against buyer needs for both feature and non-feature capabilities. Incorporate into your initial product hypothesis.

    Example bar chart for 'Competitive Differentiation, Parity and Gaps – Features' comparing ratings of 'Buyer Need', 'Our Current Capabilities', and 'Competitive Capabilities' for each 'Feature'.

    • Rank features in order of buyer need from step 1.3.
    • Prioritize development needs where current capabilities are rated low. Spot areas for competitive differentiation especially in high buyer-need areas.
    Perform the analysis for non-feature capabilities such as:
    • ease of use
    • security
    • availability of training
    • service model

    Optional: Validate feature and capability importance with buyer reviews

    Request from your SoftwareReviews Engagement Manager the “Importance vs. Satisfaction” analysis for your product(s) feature and non-feature capabilities under consideration for your GTM Strategy

    Satisfaction
    Fix Promote
    Importance

    Low Satisfaction
    High Importance

    These features are important to their market and will highlight any differentiators to avoid market comparison.

    High Satisfaction
    High Importance

    These are real strengths for the organization and should be promoted as broadly as possible.

    Low Satisfaction
    Low Importance

    These features are not important for the market and are unlikely to drive sales if marketing material focuses on them. Rationalize investment in these areas.

    High Satisfaction
    Low Importance

    Features are relatively strong, so highlight that these features can meet customer needs
    Review Maintain

    Overall Category Product Feature Satisfaction Importance

    • Importance is based on how strongly satisfaction for a feature of a software suite correlates to the overall Likeliness to Recommend
    • Importance is relative – low scores do not necessarily indicate the product is not important, just that it’s not as important as other features

    (Optional for clients with buyer reviews and key competitive reviews within target product category.)

    Optional: Feature importance vs. satisfaction

    Example: ERP “Vendor A” ratings and recommended key actions. Incorporate this analysis into your product concept if updating an existing solution. Have versions of the below run for specific competitors.

    Importance vs. Satisfaction map for Features, as shown on the previous slide, but with examples mapped onto it using a legend, purple squares are 'Enterprise Resource Planning' and green triangles are 'Vendor A'.

    Features in the “Fix” quadrant should be addressed in this GTM Strategy cycle.

    Features in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”

    Features in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.

    Features in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.

    (Optional for clients with buyer reviews and key competitive reviews within target product category.)

    Optional: Capabilities importance vs. satisfaction

    Example: ERP “Vendor A” capabilities ratings and recommended key actions. Incorporate this analysis into your product concept for non-feature areas if updating an existing solution. Have versions of the below run for specific competitors.

    Importance vs. Satisfaction map for Capabilities with examples mapped onto it using a legend, purple squares are 'Enterprise Resource Planning' and green triangles are 'Vendor A'.

    Capabilities in the “Fix” quadrant should be addressed in this GTM Strategy cycle.

    Capabilities in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”

    Capabilities in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.

    Capabilities in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.

    (Optional for clients with buyer reviews and key competitive reviews within target product category.)

    Develop a competitively differentiated value proposition

    Combining internal competitive knowledge with insights from buyer interviews and buyer reviews; establish which key features that will competitively differentiate your product when delivered

    Example bar chart for 'Competitive Differentiation, Parity and Gaps – Features and Capabilities' comparing ratings of 'Your Product' and 'Competitor A' with high buyer importance at the top, low at the bottom, and rankings of each 'Differentiator', 'Parity', and 'Gap'.

    • Identify what buyers need that will differentiate your product features and company capabilities from key competitors.
    • Determine which features and company capabilities, ideally lower in buyer importance, can achieve/maintain competitive parity.
    • Determine which features and company capabilities, ideally much lower in buyer importance, that can exist in a state of competitive gap.

    Step 1.7

    Select the Most Effective Routes to Market

    Activities
    • 1.7.1 Understand a framework for deciding how to approach evaluating each available channel including freemium/ecommerce, inside sales, field sales, and channel partner.
    • 1.7.2 Gather data that will inform option consideration.
    • 1.7.3 Apply to decision framework and present to key stakeholders for a decision.

    This step will provide processes to help you:

    • Understand the areas to consider when choosing a sales channel
    • Support your decision by making a specific channel recommendation

    This step involves the following participants:

    • Project workstream leads in Sales, Sales Operations, Product Marketing, and Customer Success

    Outcomes of this step

    • Clarity around channel choice for this specific go-to-market strategy cycle
    • Pros and cons of choices with rationale for selected channel

    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    Your “route-to-market” – channel strategy

    Capture buyer channel preferences in Step 1.3, and research alternatives using the following framework

    Inside vs. Field Sales – Selling software during COVID has taught us that you can successfully sell software using virtual conferencing tools, social media, the telephone, and even texting and webchat – so is the traditional model of field/territory-based sellers being replaced with inside/virtual sellers who can either work at home, or is there a benefit to being in the office with colleagues?

    Solutions vs. Individual Products – Do your buyers prefer to buy a complete solution from a channel partner or a solutions integrator that puts all the pieces together, and can handle training and servicing, for a more complete buyer solution?

    Channel Partner vs. Build Sales Force – Are there channel partners that, given your product is targeting a new buyer with whom you have no relationship, can leverage their existing relationships, quicken adoption of your products, and lower your cost of sales?

    Fully Digital – Is your application one where users can get started for free then upgrade with more advanced features without the use of a field or inside sales person? Do you possess the e-commerce platform to support this?

    While there are other considerations beyond the above to consider, decide which channel approach will work best for this GTM Strategy.

    Flowchart on how to capture 'Buyer Channel Preferences' with five possible outcomes: 'Freemium/e-commerce', 'Use specified channel partner', 'Establish channel partner', 'Use Inside Sales', and 'Use Field Sales'.

    Channel Partnerships are Expanding

    “One estimate is that for every dollar a firm spends on its SaaS platform, it spends four times that amount with systems integrators and other channel partners.

    And as technologies are embedded inside other products, services, and solutions, effective selling requires more partners.

    Salesforce, for example, is recruiting thousands of new partners, while Microsoft is reportedly adding over 7,000 partners each month.” (HBR, 2021)

    Step 1.8

    Craft an Initial GTM Strategy Presentation for Executive Review and Status Check

    Activities
    • 1.8.1 Finalize the set of slides within the Go-to-Market Strategy Presentation that best illustrates the many key findings and recommended decisions that have been made during the Explore phase of the GTM Strategy.
      • Test whether all key deliverables have been created, especially those that must be in place in order to support future phases and steps.
      • Schedule a Steering Committee meeting and present your findings with the goal to gain support to proceed to the Design phase of GTM Strategy.

    This step will provide processes to help you:

    • Work with your colleagues to consolidate the findings from Phase 1 of the GTM Strategy
    • Create a slide deck with your colleagues for presentation to the Steering Committee to gain approvals to proceed to Phase 2

    This step involves the following participants:

    • Project workstream leads in Sales, Sales Operations, Product Marketing, and Customer Success
    • Steering Committee

    Outcomes of this step

    • Slide deck to present to the Steering Committee
    • Approvals to move to Phase 2 of the GTM Strategy

    Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

    Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

    1.8.1 Build your GTM Strategy deck for Steering Committee approval

    1. As you near completion of the Go-to-Market Strategy Phase, Explore Step, an important test to pass before proceeding to the Design step of GTM Strategy, is to answer several key questions:
      1. Have you properly sized the market opportunity for the focus of this GTM cycle?
      2. Have you defined a unique value proposition of what buyers are looking for?
      3. And have you aligned stakeholders on the target customer persona and flushed out an accurate buyer journey?
    2. If the answer is “no” you need to return to these steps and ensure completion.
    3. Pull together a summary review deck, schedule a meeting with the Steering Committee, present to-date findings for approval to move on to Phase 2.

    Download the Go-to-Market Strategy Presentation Template

    Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Explore Review' circled in red.

    The presentation you create contains:

    • Team composition and roles and responsibilities
    • Steps in overall process
    • Goals and objectives
    • Timelines and work plan
    • Initial product and launch concept
    • Buyer persona and journey
    • Competitive differentiation
    • Channel strategy

    Build a More Effective Go-to-Market Strategy

    Phase 2

    Design your initial product and business case

    Phase 1

    1.1 Select Steering Cmte/team, build aligned vision for GTM

    1.2 Buyer personas, journey, initial messaging

    1.3 Build initial product hypothesis

    1.4 Size market opportunity

    1.5 Outline digital/tech requirements

    1.6 Competitive SWOT

    1.7 Select routes to market

    1.8 Craft GTM Strategy deck

    Phase 2

    2.1 Brand consistency check

    2.2 Formulate packaging and pricing

    2.3 Craft buyer-valid product concept

    2.4 Build campaign plan and targets

    2.5 Develop cost budgets across all areas

    2.6 Draft product business case

    2.7 Update GTM Strategy deck

    Phase 3

    3.1 Assess tech/tools support for all GTM phases

    3.2 Outline sales enablement and Customer Success plan

    3.3 Build awareness plan

    3.4 Finalize business case

    3.5 Final GTM Plan deck

    This phase will walk you through the following activities:

    • Branding consistency check
    • Formulate packaging and pricing
    • Craft buyer-validated product concept
    • Build initial campaign plan and targets
    • Develop budgets for creative, content, and media purchases
    • Draft product business case
    • Update GTM Strategy deck

    This phase involves the following stakeholders:

    • Steering Committee
    • Working group leaders

    To complete this phase, you will need:

    Go-to-Market Strategy Presentation TemplateGo-to-Market Strategy RACI and Launch Checklist WorkbookBuyer Persona and Journey blueprintGo-to-Market Strategy Cost Budget and Revenue Forecast Workbook
    Sample of the Go-to-Market Strategy Presentation Template deliverable.Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable.Sample of the Buyer Persona and Journey blueprint deliverable.Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.
    Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
    • Documenting your GTM strategy stakeholders
    • Documenting your GTM strategy working team
    Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
    • Review the scope of roles and responsibilities required
    • Document the roles and responsibilities of your teams
    Use the Buyer Persona and Journey blueprint to:
    • Interview sales and customers/prospects to inform product concepts, understand persona and later, flesh out buyer journeys
    Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
    • Tally budgets from across key functions involved in GTM Strategy
    • Compare with forecasted revenues to assess gross margins

    Step 2.1

    Compare Emerging Messaging and Positioning With Existing Brand for Consistency

    Activities

    Share messaging documented with the buyer journey with branding/creative and/or Marketing VP/CMO to ensure consistency with overall corporate messaging. Use the “Brand Diagnostic” on the following slide as a quick check.

    For those marketers that see the need for a re-brand, please:
    Download the Go-to-Market Strategy Presentation Template

    Later during the Build phase of GTM, marketing assets, digital platforms, sales enablement, and sales training will be created where actual messaging can be written with brand guidelines aligned.

    This step is to assess whether you we need to budget extra funds for any rebranding.

    This step will walk you through the following activities:

    • After completing the buyer journey and identifying messaging, test with branding/CMO that new messaging aligns with current:
      • Company positioning
      • Messaging
      • Brand imagery

    This step involves the following participants:

    • Project lead
    • Product marketing
    • Branding/creative
    • CMO

    Outcomes of this step

    • Check – Y/N on brand alignment
    • Adjustments made to current branding or new product messaging to gain alignment

    Phase 2 – Validate designs with buyers and solidify product business case

    Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

    Brand identity

    Re-think tossing a new product into the same old marketing engine. Ask if your branding today and on this new offering needs help.

    If you answer “no” to any of the following questions, you may need to re-think your brand. Does your brand:

    • recognize buyer pain points and convey clear pain-relief?
    • convey unique value that is clearly distanced from key competitors?
    • resonate with how target personas see themselves (e.g. rebellious, intelligent, playful, wise, etc.) and convey the “feeling” (e.g. relief, security, confidence, inspiration, etc.) buyers seek?
    • offer proof points via customer testimonials (vs. claimed value)?
    • tell a truly customer-centric story that is all about them (vs. what you want them to know about you)?
    • use words (e.g. quality, speed, great service, etc.) that equate to how buyers actually see you? Is your tone of voice going to resonate with your target buyer?
    • present in a clean, simple, and truly unique way? And will your brand identity stand the test of time?
    • represent feedback gleaned from prospects as well as customers?

    “Nailing an impactful brand identity is a critical part of Growth Marketing.

    Without a well-crafted and maintained brand identity, your marketing will always feel flat and one-dimensional.” (Lean Labs, 2021)

    Step 2.2

    Formulate Packaging and Pricing

    Activities
    • 2.2.1 Leverage what was learned in Phase 1 from buyer interviews to create an initial packaging and initial pricing approach.
      • Packaging success is driven by knowing what the buyer values are, how newly proposed functionality may work with other applications, and how well the buyer(s) work in teams.
      • Develop pricing using cost-plus, value/ROI, and competitive/market pricing comparisons.

    This step will walk you through the following activities:

    • Approaches to establishing price points for software products
    • Checking if pricing supports emerging product revenue plan

    This step involves the following participants:

    • Project lead
    • Product Marketing
    • Product Management
    • Pricing (if a function)

    Outcomes of this step

    • Pricing that is validated through buyer interviews and consistent with overall company pricing guardrails
    • Packaging that can be delivered

    Phase 2 – Validate designs with buyers and solidify product business case

    Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

    2.2.1 Formulate packaging and pricing

    Goal: Incorporate buyer benefits into your MVP that delivers the buyer value that compels them to purchase and drives the business case

    1. Leverage findings from buyer interviews and feature prioritization found in Step 1.3 to arrive at initial feature inclusion.
    2. Leverage feedback from customer interviews and competitive pricing analysis to arrive at an initial target price offer.
    3. Go to the Go-to-Market Strategy Presentation and use the slides labeled “Go-to-Market Strategy, Overall Project Plan.”

    Download the Go-to-Market Strategy Presentation Template

    Refer to the findings from buyer persona interviews

    Sample of the Buyer Persona and Journey blueprint deliverable.

    Step 2.3

    Build a Buyer-Validated Product Concept

    Activities
    • 2.2.1 Add to your initial product concept from Phase 1, the pricing and packaging approach.
      • Take the concept out to buyers to get their feedback – not on UX design, that will come later, but to ensure the value is clear to the buyers, and to raise confidence in the product concept.
      • As with previous customer and prospect interviews, use the Buyer Persona and Journey blueprint with its accompanying interview guide and focus on the product related questions.
      • Generate your slides to present and discuss with buyers, capture feedback, and refine the product concept.

    This step will walk you through the following activities:

    • Hold buyer interviews to review the product design
    • Validate concept and commercial variables – not UX design, that comes later

    This step involves the following participants:

    • Project lead
    • Product Marketing
    • Product Management

    Outcomes of this step

    • Customer validated product concept that meets the business plan

    Phase 2 – Validate designs with buyers and solidify product business case

    Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

    2.3.1 The best new product hypothesis doesn’t always come from your best customers

    Goal: Validate your product concept and business case

    1. Key areas to validate during product concept feedback:
      1. Feature/capability-build priorities – Which set of features and capabilities (i.e. service model, etc.) must be delivered in a minimum viable product (MVP) that delivers unique and competitively differentiating buyer value so we have win rates that support the business case?
      2. Packaging/Pricing – Are their features/capabilities that are not in base offering but offered as add-ons or not at all? Are their different packaging options that must be delivered given different customer segments and appropriate price points? (E.g. a small- to-medium sized business (SMB) version, Freemium, or Basic vs. Premium offerings?
      3. Routes to Market/Channel – Ensure you validate your channel strategy as work/effort will be needed to arrive at channel sales and marketing enablement.

    Download the Go-to-Market Strategy Presentation Template

    “Innovation opportunities almost always come from understanding a company’s worst customers or customers it doesn’t serve” (Harvard Business School Press, 1997)

    2.3.2 How your prospects buy will inform upcoming campaign design

    Goal: During product validation interviews, further validate the buyer journey to identify asset types to be created/sourced for launch campaign design

    1. Leverage findings from buyer interviews with a focus on buyer journey questions/answers found in Step 1.3 and further validated during product concept feedback in step 2.3.
    2. Your goal is to uncover the following key areas (see next slide for illustration):
      1. Validate the steps buyers take throughout the buyer journey – when you validate buyer steps and what the buyer is doing and thinking as they make a buying decision determines if you are supporting the right process.
      2. Validate the human vs. non-human/digital interaction type for each step – this determines whether your lead gen engine or your salesforce (or channel partner) will deliver the marketing assets and sales collateral.
      3. Describe the asset-types most valued by buyers during each step – this will provide the guidance your demand gen/field marketers need to either work with product marketing and creative to design and build, or source the right marketing asset and sales collateral for your lead gen engine and to support sales enablement.
      4. Identify which channels – this will give your digital team the guidance they need to design the “where” to place the assets within your lead gen engine. Feedback from customer interviews and competitive pricing analysis to arrive at an initial target price for offering is shown on the next slide.
    3. Use the Go-to-Market Strategy Presentation to complete the buyer journey slide with key findings.

    Download the Go-to-Market Strategy Presentation Template

    Refer to the findings from buyer persona interviews

    Sample of the Buyer Persona and Journey blueprint deliverable.

    Answers you need to map buyer journey

    Your buyer interviews – whether during earlier steps or here during product concept validation – will give specific answers to all areas in green text below. Understanding channels, asset-types, and crafting your key messaging are essential for next steps.

    Table outlining an example buyer's journey with fields in green text that are to be to replaced with answers from your buyer interviews.

    Step 2.4

    Build Your Initial Campaign Plan and Targets

    Activities
    • 2.4.1. While product management and marketing is working on the business case, the campaign team is designing their launch campaign.
    • Expand from the product concept and build out the entire launch campaign identifying dates, CTA’s, channels, and asset types needed that will be built during the Build phase.

    This step will walk you through the following activities:

    • Outline deployment plan of activities and outcomes
    • Draw up specs for needed assets, web-page changes, emails, target segments, and targets for leads generated

    This step involves the following participants:

    • Project lead
    • Field Marketing
    • Product Marketing

    Outcomes of this step

    • The initial draft of the campaign plan that outlines multichannel activities, dates, and assets that need to be sourced and/or created

    Phase 2 – Validate designs with buyers and solidify product business case

    Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

    2.4.1 Document your campaign plan

    2 hours

    On the following Awareness and Lead Gen Engine slide:
    1. Tailor the slide to describe your lead generation engine as you will use it when you get to latter steps to describe the activities in your lead gen engine and weigh them for go-to-market strategy.
    2. Use the template to see what makes up a typical lead gen and awareness building engine to see what you may be missing, as well as to record your current engine “parts.”
      • Note: The “Goal” image in upper right is meant as a reminder that marketers should establish a goal for Sales Qualified Leads (SQL’s) delivered to field sales for each campaign.

    On the Product and Launch Concept slides:

    1. Update the slides with findings from 2.3 and 2.4.

    Download the Go-to-Market Strategy Presentation Template

    “Only 32% of marketers – and 29% of B2B marketers – said the process of planning campaigns went very well. Just over half were sure they had selected the right business goal for a given marketing project and only 42% were confident they identified the right audience – which is, of course, a critical determinant for achieving success.” (MIT Sloan Management Review)

    Launch campaign

    Our Goal for [Campaign name] is to generate X SQL’s

    Flowchart of the steps to take when a campaign is launched, from 'Organic Website Visits' and 'Go Live' to future 'Sales Opportunities'. A key is present to decipher various icons.

    Awareness

    PR/EXTERNAL COMMS:

    Promote release in line with company story

    • [Executive Name] interview with [Publication Y] on [Launch Topic X] – Mo./Day
    • Press Release on new enhancements – Mo./Day
    • [Executive Name] interview with [Publication Z] on [Launch Topic X] – Mo./Day
    ANALYST RELATIONS:

    Receive analyst feedback pre-launch and brief with final releases messaging/positioning

    • Inquiry with [Key Analysts] on [Launch Topic X] – Mo./Day, pre launch
    • Press Release shared on new enhancements – Launch day minus two days
    • Analyst briefing with [Key Analysts] on [Launch Topic X] – Launch day minus two days

    Download the Go-to-Market Strategy Presentation Template

    2.4.2 Campaign targets

    Goal: Establish a Marketing-Influenced Win target that will be achieved for this launch

    We advise setting a target for the launch campaign. Here is a suggested approach:
    1. Understand what % of all sales wins are touched by marketing either through first or last touch attribution. This is the % of Marketing-Influenced Wins (MIWs).
    2. Determine what sales wins are needed to attain product revenue targets for this launch.
    3. Apply the actual company MIW % to the number of deals that must be closed to achieve target product launch revenues. This becomes the MIW target for this launch campaign.
    4. Then, using your average marketing funnel conversion rates working backwards from MIWs to Opportunities, Sales Accepted Leads (SALs), Sales Qualified Leads (SQLs), Marketing Qualified Leads (MQLs), up to website visits.
    5. Update the slides with findings from 2.3 and 2.4.

    Download the Go-to-Market Strategy Presentation Template

    “Marketing should quantify its contribution to the business. One metric many clients have found valuable is Marketing Influenced Wins (MIW). Measured by what % of sales wins had a last-touch marketing attribution, marketers in the 30% – 40% MIW range are performing well.” (SoftwareReviews Advisory Research)

    Step 2.5

    Develop Initial Budgets Across All Areas

    Activities
    • 2.5.1 Use the Go-to-Market Budget Workbook and work with your workstream leads.
      • Capture the costs associated with this GTM Strategy and Launch.
      • Summarize your GTM budget in the Go-to-Market Strategy Presentation, including the details behind the gross margin calculation for your GTM Strategy/campaign if required.

    This step will walk you through the following activities:

    • Field marketing, product marketing, creative, others to identify the specific budget elements needed for this campaign/launch

    This step involves the following participants:

    • Project lead
    • Field Marketing
    • Product Marketing
    • Branding/creative

    Outcomes of this step

    • The initial marketing budget for this campaign/launch

    Phase 2 – Validate designs with buyers and solidify product business case

    Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    2.5.1 Develop your GTM Strategy/product launch campaign budget

    Goal: Work with your workstream leads to identify all incremental costs associated with this GTM strategy and product launch

    1. Use the Go-to-Market Budget Workbook and adjust to include the areas that are identified by your workstream leads as being applicable to this GTM Strategy and Launch.
      • These should be incremental costs to normal operating and capital budgets and those areas that are fully approved for inclusion by your Steering Committee/Sponsoring Executive.
    2. Begin to Catalog all applicable costs to include all key areas such as:
      • Technology costs for internal use (typically from Marketing Ops), and “core” to product technology costs working with the product team
      • Channel marketing programs, agency (e.g. branding, naming, web design, SEO, content marketing, etc.), T&E, paid media, events, marketing assets, etc.
    3. Note that in the Align Step – Step 3, you will see your workstream leads each develop their individual contributions to both the launch plan as well a budget.

    4. Summarize your initial GTM budget findings in the Go-to-Market Strategy Presentation, including the details behind the gross margin calculation for your GTM Strategy/campaign if required. Again, you will flush out the final costs within each workstream areas in Phase 3, ”Align.”

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    Step 2.6

    Draft Initial Product Business Case

    Activities
    • 2.6.1 Here’s where you begin to pull together all the essential elements of your final business case.
      • For many organizations that require a view of return on investment, you will begin here to shape the key elements that your organization requires for a complete business case to go ahead with the needed investments.
      • The goal is to compare estimated costs to estimated revenues to ensure acceptable margins will be delivered for this GTM strategy/product launch.
      • The culmination of work to get to this calculation will continue through Phase 3; however, the following slide illustrates the kind of visualization that will be possible with our approach.

    This step will walk you through the following activities:

    • A product revenue forecast is created, alignment with sales/sales targets is created for a minimum viable product (MVP) that meets the buyer’s needs at the price point established/validated

    This step involves the following participants:

    • Project lead
    • Product management
    • Product marketing
    • Sales leadership

    Outcomes of this step

    • The important measures of:
      • Product revenue forecast
      • Supported MVP features

    Phase 2 – Validate designs with buyers and solidify product business case

    Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

    Gross Margin Estimates – part of a complete product business case

    Your goal: Earn more than you spend! This projection of estimated gross margins should be part of your product launch business case. The GTM initiative lead and workstream leads are charged with estimating incremental costs, and product and sales must work together on the revenue forecast.

    Net Return

    We estimate our 12 month gross profit to be ….

    Quarterly Revenues

    Based on sales forecast, our quarterly/monthly revenues are ….

    Estimated Expenses

    Incremental up-front costs are expected to be ….

    Example 'P&L waterfall for Product X Launch' with notes. Green bars are 'Increase', red bars are 'Decrease', and blue bars are 'Total'. Red bar note: 'Your estimated incremental up-front costs', Green bar note: 'Your estimated net incremental revenues vs. costs', Blue bar note: 'Your estimated net gross profit for this product launch and campaign', 'END' note: 'Extend for suitable period'.

    2.6.1 Develop your initial product business case

    Goal: Focused on the Product Concept areas related to product Market Fit, Buyer Needs and Market Opportunity, Product Managers will summarize in order to gain approval for Build

    1. Using the Go-to-Market Strategy Presentation, product managers should ensure the product concept slide(s) support the rationale to move to Build phase. Key areas include:
      1. Adequate market opportunity size – that is worth the incremental investment
      2. Acceptable costs/investment to pursue the opportunity – design, creative services for branding, web design, product naming, asset creation, copywriting, translation services not available in-house
      3. Well-defined product market fit – review buyer interviews that identify buyer pain points and ideas that will deliver needed business value
      4. Buyer-validated commercials – buyer-validated pricing and packaging
      5. Product development budget and staffing support to build viable MVP & beyond roadmap – development budget and staffing is in place/budgeted to deliver MVP by target date and continue to ensure attainment of product revenue targets
      6. Unique product value proposition that is competitively differentiated – to drive acceptable win rates
      7. Product Sales Forecast – that when compared to costs meets company investment hurdle rates
      8. Sales Leadership support for achieving sales forecast and supported sales/channel resourcing plan – sales leadership has taken on forecasted revenues as an incremental sales quota and has budget for additional hiring, enablement, and training for attainment.
    2. Go to the Go-to-Market Strategy Presentation and complete the slides summarizing these key areas that support the business case for the next phases of Build and Launch.

    Product Business Case Checklist:

    • Acceptably large enough product market opportunity
    • Well-defined competitive differentiation
    • Buyer-validated product-market fit
    • Buyer-validated and competitive commercials (i.e. pricing, packaging)
    • An MVP with roadmap that aligns to buyer needs and buyer-validated price points
    • A 24–36 month sales forecast with CRO sign-up and support for attainment
    • Costs of launch vs. forecasted revenues to gauge gross margins

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    Step 2.7

    Update the GTM Strategy Presentation Deck for Executive Review and Sign-off

    Activities
    • 2.7.1 Update the deck with Phase 2 findings culminating in the business case.

    This step will walk you through the following activities:

    • Drop into the GTM Strategy deck the summary findings from the team’s work
    • Write an executive summary that garners executive support for needed funds, signed-up-for sales targets, agreed upon launch timing
    • Steering Committee alignment on above and next steps

    This step involves the following participants:

    • Project lead
    • Steering Committee
    • Workstream leads

    Outcomes of this step

    • Executive support for the GTM Strategy plan and approval to proceed to Phase 3

    Phase 2 – Validate designs with buyers and solidify product business case

    Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

    2.7.1 Update your GTM Strategy deck for Design Steering Committee approval

    1. As you near completion of the Go-to-Market Strategy Phase – Design Step, while your emerging business case is important, it will be finalized in the Align Step.
    2. An important test to pass before proceeding to the Align step of the GTM Strategy, is to answer several key questions:
      1. Have you validated the product value proposition with buyers?
      2. Is the competitive differentiation clear for this offering?
      3. Did Sales support the business case by signing up for the incremental quota?
      4. Has product defined an MVP that aligns with the buyer value needed to drive purchases?
      • If the answer is “no” you need to return to these steps and ensure completion
    3. Pull together a summary review deck, schedule a meeting with the Steering Committee, and present to-date findings for approval to move onto Phase 3.

    Download the Go-to-Market Strategy Presentation Template

    Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Design Review' circled in red.

    The presentation you create contains:

    • Timelines and a work plan
    • Expanded product concept to include your packaging and pricing approach
    • Feedback from buyers on validated product concept especially commercial elements
    • Expanded campaign plan and marketing budget
    • Initial product business case

    Build a More Effective Go-to-Market Strategy

    Phase 3

    Align stakeholder plans to prep for build

    Phase 1

    1.1 Select Steering Cmte/team, build aligned vision for GTM

    1.2 Buyer personas, journey, initial messaging

    1.3 Build initial product hypothesis

    1.4 Size market opportunity

    1.5 Outline digital/tech requirements

    1.6 Competitive SWOT

    1.7 Select routes to market

    1.8 Craft GTM Strategy deck

    Phase 2

    2.1 Brand consistency check

    2.2 Formulate packaging and pricing

    2.3 Craft buyer-valid product concept

    2.4 Build campaign plan and targets

    2.5 Develop cost budgets across all areas

    2.6 Draft product business case

    2.7 Update GTM Strategy deck

    Phase 3

    3.1 Assess tech/tools support for all GTM phases

    3.2 Outline sales enablement and Customer Success plan

    3.3 Build awareness plan

    3.4 Finalize business case

    3.5 Final GTM Plan deck

    This phase will walk you through the following activities:

    1. Assess tech/tools support for all GTM phases
    2. Map lead generation plan
    3. Outline Customer Success plan
    4. Build awareness plan (PR/AR, etc.)
    5. Finalize product business case
    6. Final GTM planning deck and Steering Committee review

    This phase involves the following stakeholders:

    • Steering Committee
    • Working group leaders

    To complete this phase, you will need:

    Go-to-Market Strategy Presentation Template Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
    Sample of the Go-to-Market Strategy Presentation Template deliverable. Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.
    Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
    • Documenting your GTM Strategy Stakeholders
    • Documenting your GTM Strategy Working Team
    Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
    • Tally budgets from across key functions involved in the GTM Strategy
    • Compare with forecasted revenues to assess gross margins

    Step 3.1

    Assess Technology and Tools Support for Your GTM Strategy as Well as Future Phases of GTM

    Activities
    • 3.1.1 Have Marketing Operations document what tech stack improvements are required in order to get the team to a successful launch. Understand costs and implementation timelines and work it into the Go-to-Market Budget Workbook.

    This step will walk you through the following activities:

    • After completing your initial survey in Step 1, complete requirements building for needed technology and tools acquisition/upgrade in campaign management, sales opportunity management, and analytics.

    This step involves the following participants:

    • Project lead
    • Marketing operations/digital
    • IT

    Outcomes of this step

    • Build a business requirement against which to evaluate new/upgraded vendor tools to support the entire GTM process

    Phase 3 – Align functional plans with a compelling business case for product build

    Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

    3.1.1 Technology plan and investments

    Goal: Outline the results of our analysis and Info-Tech analyst guidance regarding supporting systems, tools, and technologies to support our go-to-market strategy

    1. Plans, timings, and incremental costs related to, but not limited to, the following apps/tools/technologies:
      1. Lead management/Marketing automation
      2. Marketing analytics
      3. Sales Opportunity Management System (OMS) and Configure, Price, and Quote (CPQ) applications
      4. Sales engagement
      5. Sales analytics
      6. Customer service and support/Customer interaction hub
      7. Customer data management and analytics
      8. Customer experience platforms
      9. Marketing content management
      10. Creative tools
      11. Share of voice and social platform management
      12. Etc.
    2. Go to the Go-to-Market Budget Workbook and complete by adding costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation completing the areas within the slides related to the Product and Launch Concepts and Business Case.

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    Step 3.2

    Outline Sales Enablement and Support for Customer Success to Include Onboarding and Ongoing Engagement

    Activities
    • 3.3.1 Sales Enablement – develop the sales enablement and training plan for Launch to include activities, responsible parties, dates for delivery, etc.

    This step will walk you through the following activities:

    • Finalize the customer success training and support plan
    • Onboarding scripts
    • Changes to help screens in application
    • Timing to plan for Quality Acceptance

    This step involves the following participants:

    • Project lead
    • Customer Success lead
    • Product management
    • Product marketing

    Outcomes of this step

    • Plan for creation of copy, assets, and rollout pan to support clients and client segments for Launch

    Phase 3 – Align functional plans with a compelling business case for product build

    Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

    3.2.1 Outline sales enablement

    Goal: Outline sales collateral, updates to sales proposals, CPQ, Opportunity Management Systems, and sales training

    1. Describe the requirements for sales enablement to include elements such as:
      1. Sales collateral
      2. Client-facing presentations
      3. Sales proposal updates
      4. Updates to Configure, Price, and Quote (CPQ) applications
      5. Updates to Opportunity Management System (OMS) applications
      6. Sales demo versions of the new product
      7. Sales communication plans
      8. Sales training and certification programs
    2. Go to the Go-to-Market Budget Workbook and add the costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record as well in the Go-to-Market Strategy Presentation completing the areas within the slides related to the Product and Launch Concepts and Business Case.

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    3.2.2 Outline customer success

    Goal: Outline customer support/success requirements and plan

    1. Plans, timings, and incremental costs for the following:
      1. Onboarding scripts for the new solution
      2. Updates to retention lifecycle
      3. FAQ answers
      4. Updates to online help/support system
      5. “How-to” videos
      6. Live chat updates
      7. Updates to “provide feedback” system
      8. Updates to Quarterly Business Review slides
    2. Go to the Go-to-Market Budget Workbook and add the costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation and complete the areas within the slides related to the Product and Launch Concepts and Business Case.

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    Step 3.3

    Build an Awareness Plan Covering Media, Social Media, and Industry Analysts

    Activities
    • 3.4.1 Corp Comms/PR/AR – develop the overall awareness plans for executive interviews, articles placed, social drops, analyst briefing dates, and internal associate comms if required.

    This step will walk you through the following activities:

    • Outline outbound communications plans including press releases, social posts, etc.
    • Describe dates for AR outreach to covering analysts
    • Develop the internal communications plan

    This step involves the following participants:

    • Project lead
    • Corporate Comms lead
    • Creative
    • Analyst relations
    • Social media marketing lead

    Outcomes of this step

    • Plan for creation of copy, assets, and rollout pan to support awareness building, external communications, and internal communications if required

    Phase 3 – Align functional plans with a compelling business case for product build

    Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

    3.3.1 Internal communications plan

    Goal: Outline complete internal communications plan. For large-scale changes (i.e. rebranding, M&A, etc.) HR may drive significant volume of employee communications working with Corporate Comms

    1. Plans, timings, and incremental costs for the following:
      1. Complete a comms plan with dates, messages, and channels
      2. Team member roles and responsibilities
      3. Intranet article and posting schedules
      4. Creation of new office signage, merchandise, etc. for employee kits
      5. Pre-launch announcements schedule
      6. Launch day communications, events, and activities
      7. Post launch update schedule and messages for launch success
      8. Incremental staffing and resources/budget requirements
    2. Go to the Go-to-Market Budget Workbook and add costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record as well in the Go-to-Market Strategy Presentation completing the areas related to the Product and Launch Concepts and Business Case.

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    3.3.2 PR and External Communications Plan

    Goal: Outline complete internal communications plan. For large scale changes (i.e. rebranding, M&A, etc.) HR may drive significant volume of employee communications working with Corporate Comms

    1. Plans, timings, and incremental costs for the following:
      1. List of Tier 1 and Tier 2 media authors covering the [product/initiative] market area
      2. Schedule of launch briefings, with any non-analyst influencers
      3. Timing of press releases
      4. Required supporting executives and stakeholders for each of the above meetings
      5. Slide deck/media kit for the above and planned questions to support needed feedback
      6. Media Site materials especially to support media questions and requests for briefings
      7. Social postings calendar of activities and key messages plan
      8. Publish data of [product/initiative] relevant articles with set-back schedules
      9. Cultivation of reference customers and client testimonials for media outreach
      10. Requirements for additional staffing to cover product/initiative new market and analysts
      11. Internal and external events calendar to invite media
    2. Go to the Go-to-Market Budget Workbook and add the costs identified in the above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation by completing the areas related to the Product and Launch Concepts and Business Case.

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    3.3.3 Analyst relations plan

    Goal: Outline incremental costs in analyst communications, engagement, and access to research

    1. Plans, timings, and incremental costs for the following:
      1. List of Tier 1 and Tier 2 analysts for the [product/initiative] market area
      2. Schedule of inquiries, pre-launch briefings, launch briefings, and post-launch feedback
      3. Required supporting executives and stakeholders for each of the above meetings
      4. Analyst deck for each of the above and planned questions to support needed feedback
      5. Analyst Site materials to support 2nd and 3rd Tier analysts’ questions and requests for briefings
      6. Social postings calendar of activities and key messages
      7. Resources to respond to analyst blogs and/or social posts regarding your product/initiative area
      8. Timing of important and relevant analyst document/methodology publishing dates with set-back schedules
      9. Cultivation of reference customers and client testimonials to coincide with analyst outreach for research and for buyer review sites/reviews data gathering
      10. Requirements for additional staffing to cover product/initiative new market and analysts
      11. Events calendar where analysts will be presenting on this product/initiative market
    2. Go to the Go-to-Market Budget Workbook and add the costs identified in the above areas that are specific to this go-to-market strategy, Build and Launch initiative. Record in the Go-to-Market Strategy Presentation by completing the areas related to the Product and Launch Concepts and Business Case.

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    Step 3.4

    Finalize Product Business Case With Collaborative Input From Product, Sales, and Marketing

    Activities
    • 3.5.1 Convene the team to align sales, marketing, and product around the business case.

    This step will walk you through the following activities:

    • Refine the product business case initiated in Phase 2
    • Align product revenue forecast with sales revenue forecast
    • Align MVP features to be developed during “GTM – Build” with customer validated product-market fit

    This step involves the following participants:

    • Project lead
    • Product management
    • Product marketing

    Outcomes of this step

    • Product business case

    Phase 3 – Align functional plans with a compelling business case for product build

    Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

    3.4.1 Final product Build and Launch business case

    Goal: Beyond the product business case, factor in costs for technology, campaigning, sales enablement, and customer success in order to gain approval for Build and Launch

    1. Using the Go-to-Market Strategy Presentation, workstream leads and Go-to-Market Initiative leaders will finalize the anticipated incremental costs, and when compared to projected product revenues, present to the Steering Committee including CFO for final approval before moving to Build and Launch.
    2. To present a complete business case, key cost areas include:
      1. All the areas outlined up through Step 3.4 plus:
      2. Technology/MarTech Stack incremental costs
      3. Channel programs, branding/agency, pricing, packaging/product, and T&E incremental costs
      4. Campaign related – creative, content marketing, paid media, events, SEO, lists/data
      5. Sales Enablement, Customer Support/Success incremental costs
      6. Internal communications/events/activities/signage costs
      7. PR/AR/Media incremental costs
    3. Compare to final Sales/Product agreed projected revenues, in order to calculate estimated gross margins

    Go to the Go-to-Market Budget Workbook as outlined in prior steps and document final incremental costs and projected revenues and summarize within the Go-to-Market Strategy Presentation.

    Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

    Download the Go-to-Market Strategy Presentation Template

    Product Build and Launch Business Case Checklist:

    • Acceptably large enough product market opportunity
    • Well-defined competitive differentiation
    • Buyer-validated product-market fit
    • Buyer-validated and competitive commercials (i.e. pricing, packaging)
    • An MVP with roadmap that aligns with buyer needs and buyer validated price points
    • A 24–36 month sales forecast with CRO sign-up and support for attainment
    • Incremental product development, tech, marketing, sales, customer success, AR/PR costs vs. forecasted revenues fall within acceptable margins

    Step 3.5

    Develop Your Final Executive Presentation to Request Approval and Proceed to GTM Build Phase

    Activities
    • 3.6.1 Update the Product, Launch, Journey, and Business Case slides included within the Go-to-Market Strategy Presentation Template with Phase 3 findings culminating in the business case.

    This step will walk you through the following activities:

    • Update the previously created slides with findings from Phase 3
    • Hold a Steering Committee meeting and present findings for approval

    This step involves the following participants:

    • Steering Committee
    • Workstream leads

    Outcomes of this step

    • GTM Strategy approved to move to GTM Build

    Phase 3 – Align functional plans with a compelling business case for product build

    Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

    3.5.1 Update your GTM Strategy deck for Align Steering Committee approval

    1. As you near completion of the Go-to-Market Strategy Phase – Align Step, an important test to pass before proceeding to the Design step of GTM Strategy, is to answer several key questions:
      1. Are Sales, Product, and Marketing all aligned and in agreement on the business case?
      2. Are the gross margin calculations acceptable to the Steering Committee? CFO? CEO?
    2. If the answer is “no” you need to return to prior steps and ensure completion.
    3. Pull together a summary review deck, schedule a meeting with the Steering Committee, present to-date findings for approval to move on to Build Phase.
    4. Once your final business case is accepted, you are ready to move on to the GTM Build and Launch phases. These phases are covered in sperate SoftwareReviews blueprints.

    Download the Go-to-Market Strategy Presentation Template

    Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Align Review' circled in red.

    The presentation you create contains:

    • Timelines and work plan updates
    • Tech stack needs/modifications
    • An expanded product concept to include packaging and pricing approach
    • Asset-type concepts for marketing campaigns, sales collateral, website, and social
    • Outline of initial Launch dates
    • Outline of initial customer success, awareness/PR/AR plans, and sales training plans
    • Final business case

    Summary of Accomplishment

    Problem Solved – A More Effective Go-to-Market Strategy

    By guiding your team through the Go-to-Market planning process applied to an actual GTM Strategy, you have built an important set of capabilities that underpins today’s well-managed software companies. By following the step-by-step process outlined in this blueprint, you have delivered a host of benefits that include the following:

    • Alignment of Product, Marketing, Sales, and Customer Success around a deeper understanding of your target buyers and what it takes to build competitive differentiation.
    • You have calculated your product market opportunity and whether it’s worth the investment in the long-term, and for the short term you have estimated gross margins as an important part of the business case.
    • Built executive support and confidence by leading a disparate team in complex decision making that is fact and evidence based to make more effective go/no go decisions related to investing in new products.
    • And finally, because you and your team have demonstrated their ability to align programs toward a common goal and program-manage a complex initiative through to successful completion, you have led your team to develop the “institutional muscle” to take on equally complex initiatives such as acquisition integration, rebranding, launching in a new region, etc.

    Therefore, developing the capabilities to manage a complex go-to-market strategy is akin to building company scalability and is sought after as a professional development opportunity that each executive should have on his/her résumé.

    If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

    Contact your account representative for more information.

    info@softwarereviews.com 1-888-670-8889

    Bibliography

    Acosta, Danette. “Average Customer Retention Rate by Industry.” Profitwell.com. Accessed Jan. 2022.

    Ashkenas, Ron, and Patrick Finn. “The Go-To-Market Approach Startups Need to Adopt.” Harvard Business Review, June 2016. Accessed Jun. 2021.

    Bilardi, Emma. “ How to Create Buyer Personas.” Product Marketing Alliance, July 2020. Accessed Dec. 2021.

    Cespedes, Frank V. “Defining a Post-Pandemic Channel Strategy.” Harvard Business Review, Apr. 2021. Accessed Jul. 2021.

    Chapman, Lawrence. “A Visual Guide to Product Launches.” Product Marketing Alliance. Accessed Jul. 2021.

    Chapman, Lawrence. “Everything You Need To Know About Go-To-Market Strategies.” Product Marketing Alliance. Accessed Jul. 2021.

    Christiansen, Clayton. “The Innovators Dilemma.” Harvard Business School Press, 1997.

    Drzewicki, Matt. “Digital Marketing Maturity: The Path to Success.” MIT Sloan Management Review. Accessed Dec. 2021.

    “Go-To-Market Refresher,” Product Marketing Alliance. Accessed Jul. 2021

    Harrison, Liz; Dennis Spillecke, Jennifer Stanley, and Jenny Tsai. “Omnichannel in B2B sales: The new normal in a year that has been anything but.” McKinsey & Company, 15 March, 2021. Accessed Dec. 2021.

    Jansen, Hasse. “Buyer Personas – 33 Mind Blowing Stats.” Boardview, 19 Feb. 2016. Accessed Jan. 2022.

    Scott, Ryan. “Creating a Brand Identity: 20 Questions to Consider.” Lean Labs, Jun 2021. Accessed Jul. 2021.

    Smith, Michael L., and James Erwin. “Role and Responsibility Charting (RACI).” DOCSearch. Accessed Jan. 2022. Web.

    “What is the Total Addressable Market (TAM).” Corporate Finance Institute (CFI), n.d. Accessed Jan. 2022.

    Related Software Reviews Research

    Sample of the Create a Buyer Persona and Journey research Create a Buyer Persona and Journey
    • A successful go-to-market strategy depends upon deep buyer understanding. Our Create a Buyer Persona and Journey blueprint will give you a step-by-step process that when followed will provide you and your team with that deep buyer understanding you need.
    • The Create a Buyer Persona and Journey blueprint provides you with an interview containing over 75 questions that, after capturing buyer answers and insights during interviews, will strengthen your value proposition, product market fit, lead gen engine and sales effectiveness.
    Sample of the Optimize Lead Generation With Lead Scoring research Optimize Lead Generation With Lead Scoring
    • Save time and money and improve your sales win rates when you apply our methodology to score contacts with your lead gen engine more accurately and pass better qualified leads over to your sellers.
    • Our methodology teaches marketers to develop your own lead scoring approach based upon lead/contact profile vs. your Ideal Customer Profile (ICP) and scores contact engagement. Applying the methodology to arrive at your own approach to scoring will mean reduced lead gen costs, higher conversion rates, and increased marketing influenced wins.

    Build a Strong Technology Foundation for Customer Experience Management

    • Buy Link or Shortcode: {j2store}526|cart{/j2store}
    • member rating overall impact: 8.6/10 Overall Impact
    • member rating average dollars saved: $340,152 Average $ Saved
    • member rating average days saved: 26 Average Days Saved
    • Parent Category Name: Customer Relationship Management
    • Parent Category Link: /customer-relationship-management
    • Technology is a fundamental enabler of an organization’s customer experience management (CXM) strategy. However, many IT departments fail to take a systematic approach when building a portfolio of applications for supporting marketing, sales, and customer service functions.
    • The result is a costly, ineffective, and piecemeal approach to CXM application deployment (including high-profile applications like CRM).

    Our Advice

    Critical Insight

    • IT must work in lockstep with their counterparts in marketing, sales, and customer service to define a unified vision and strategic requirements for enabling a strong CXM program.
    • To deploy applications that specifically align with the needs of the organization’s customers, IT leaders must work with the business to define and understand customer personas and common interaction scenarios. CXM applications are mission critical and failing to link them to customer needs can have a detrimental effect on customer satisfaction and ultimately, revenue.
    • IT must act as a valued partner to the business in creating a portfolio of CXM applications that are cost effective.
    • Organizations should create a repeatable framework for CXM application deployment that addresses critical issues, including the integration ecosystem, customer data quality, dashboards and analytics, and end-user adoption.

    Impact and Result

    • Establish strong application alignment to strategic requirements for CXM that is based on concrete customer personas.
    • Improve underlying business metrics across marketing, sales, and service, including customer acquisition, retention, and satisfaction metrics.
    • Better align IT with customer experience needs.

    Build a Strong Technology Foundation for Customer Experience Management Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a strong technology foundation for CXM, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Drive value with CXM

    Understand the benefits of a robust CXM strategy.

    • Build a Strong Technology Foundation for Customer Experience Management – Phase 1: Drive Value with CXM
    • CXM Strategy Stakeholder Presentation Template
    • CXM Strategy Project Charter Template

    2. Create the framework

    Identify drivers and objectives for CXM using a persona-driven approach and deploy the right applications to meet those objectives.

    • Build a Strong Technology Foundation for Customer Experience Management – Phase 2: Create the Framework
    • CXM Business Process Shortlisting Tool
    • CXM Portfolio Designer

    3. Finalize the framework

    Complete the initiatives roadmap for CXM.

    • Build a Strong Technology Foundation for Customer Experience Management – Phase 3: Finalize the Framework
    [infographic]

    Workshop: Build a Strong Technology Foundation for Customer Experience Management

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Create the Vision for CXM Technology Enablement

    The Purpose

    Establish a consistent vision across IT, marketing, sales, and customer service for CXM technology enablement.

    Key Benefits Achieved

    A clear understanding of key business and technology drivers for CXM.

    Activities

    1.1 CXM fireside chat

    1.2 CXM business drivers

    1.3 CXM vision statement

    1.4 Project structure

    Outputs

    CXM vision statement

    CXM project charter

    2 Conduct the Environmental Scan and Internal Review

    The Purpose

    Create a set of strategic requirements for CXM based on a thorough external market scan and internal capabilities assessment.

    Key Benefits Achieved

    Well-defined technology requirements based on rigorous, multi-faceted analysis.

    Activities

    2.1 PEST analysis

    2.2 Competitive analysis

    2.3 Market and trend analysis

    2.4 SWOT analysis

    2.5 VRIO analysis

    2.6 Channel map

    Outputs

    Completed external analysis

    Strategic requirements (from external analysis)

    Completed internal review

    Channel interaction map

    3 Build Customer Personas and Scenarios

    The Purpose

    Augment strategic requirements through customer persona and scenario development.

    Key Benefits Achieved

    Functional requirements aligned to supporting steps in customer interaction scenarios.

    Activities

    3.1 Persona development

    3.2 Scenario development

    3.3 Requirements definition for CXM

    Outputs

    Personas and scenarios

    Strategic requirements (based on personas)

    4 Create the CXM Application Portfolio

    The Purpose

    Using the requirements identified in the preceding modules, build a future-state application inventory for CXM.

    Key Benefits Achieved

    A cohesive, rationalized portfolio of customer interaction applications that aligns with identified requirements and allows investment (or rationalization) decisions to be made.

    Activities

    4.1 Build business process maps

    4.2 Review application satisfaction

    4.3 Create the CXM application portfolio

    4.4 Prioritize applications

    Outputs

    Business process maps

    Application satisfaction diagnostic

    Prioritized CXM application portfolio

    5 Review Best Practices and Confirm Initiatives

    The Purpose

    Establish repeatable best practices for CXM applications in areas such as data management and end-user adoption.

    Key Benefits Achieved

    Best practices for rollout of new CXM applications.

    A prioritized initiatives roadmap.

    Activities

    5.1 Create data integration map

    5.2 Define adoption best practices

    5.3 Build initiatives roadmap

    5.4 Confirm initiatives roadmap

    Outputs

    Integration map for CXM

    End-user adoption plan

    Initiatives roadmap

    Further reading

    Build a Strong Technology Foundation for Customer Experience Management

    Design an end-to-end technology strategy to enhance marketing effectiveness, drive sales, and create compelling customer service experiences.

    ANALYST PERSPECTIVE

    Technology is the catalyst to create – and keep! – your customers.

    "Customers want to interact with your organization on their own terms, and in the channels of their choice (including social media, mobile applications, and connected devices). Regardless of your industry, your customers expect a frictionless experience across the customer lifecycle. They desire personalized and well-targeted marketing messages, straightforward transactions, and effortless service. Research shows that customers value – and will pay more for! – well-designed experiences.

    Strong technology enablement is critical for creating customer experiences that drive revenue. However, most organizations struggle with creating a cohesive technology strategy for customer experience management (CXM). IT leaders need to take a proactive approach to developing a strong portfolio of customer interaction applications that are in lockstep with the needs of their marketing, sales, and customer service teams. It is critical to incorporate the voice of the customer into this strategy.

    When developing a technology strategy for CXM, don’t just “pave the cow path,” but instead move the needle forward by providing capabilities for customer intelligence, omnichannel interactions, and predictive analytics. This blueprint will help you build an integrated CXM technology roadmap that drives top-line revenue while rationalizing application spend."

    Ben Dickie

    Research Director, Customer Experience Strategy

    Info-Tech Research Group

    Framing the CXM project

    This Research Is Designed For:

    • IT leaders who are responsible for crafting a technology strategy for customer experience management (CXM).
    • Applications managers who are involved with the selection and implementation of critical customer-centric applications, such as CRM platforms, marketing automation tools, customer intelligence suites, and customer service solutions.

    This Research Will Help You:

    • Clearly link your technology-enablement strategy for CXM to strategic business requirements and customer personas.
    • Build a rationalized portfolio of enterprise applications that will support customer interaction objectives.
    • Adopt standard operating procedures for CXM application deployment that address issues such as end-user adoption and data quality.

    This Research Will Also Assist:

    • Business leaders in marketing, sales, and customer service who want to deepen their understanding of CXM technologies, and apply best practices for using these technologies to drive competitive advantage.
    • Marketing, sales, and customer service managers involved with defining requirements and rolling out CXM applications.

    This Research Will Help Them:

    • Work hand-in-hand with counterparts in IT to deploy high-value business applications that will improve core customer-facing metrics.
    • Understand the changing CXM landscape and use the art of the possible to transform the internal technology ecosystem and drive meaningful customer experiences.

    Executive summary

    Situation

    • Customer expectations for personalization, channel preferences, and speed-to-resolution are at an all-time high.
    • Your customers are willing to pay more for high-value experiences, and having a strong customer CXM strategy is a proven path to creating sustainable value for the organization.

    Complication

    • Technology is a fundamental enabler of an organization’s CXM strategy. However, many IT departments fail to take a systematic approach to building a portfolio of applications to support Marketing, Sales, and Customer Service.
    • The result is a costly, ineffective, and piecemeal approach to CXM application deployment (including high profile applications like CRM).

    Resolution

    • IT must work in lockstep with their counterparts in marketing, sales, and customer service to define a unified vision, strategic requirements and roadmap for enabling strong customer experience capabilities.
    • In order to deploy applications that don’t simply follow previously established patterns but are aligned with the specific needs of the organization’s customers, IT leaders must work with the business to define and understand customer personas and common interaction scenarios. CXM applications are mission critical and failing to link them to customer needs can have a detrimental effect on customer satisfaction – and ultimately revenue.
    • IT must act as a valued partner to the business in creating a portfolio of CXM applications that are cost effective.
    • Organizations should create a repeatable framework for CXM application deployment that addresses critical issues, including the integration ecosystem, customer data quality, dashboards and analytics, and end-user adoption.

    Info-Tech Insight

    1. IT can’t hide behind the firewall. IT must understand the organization’s customers to properly support marketing, sales, and service efforts.
    2. IT – or Marketing – must not build the CXM strategy in a vacuum if they want to achieve a holistic, consistent, and seamless customer experience.
    3. IT must get ahead of shadow IT. To be seen as an innovator within the business, IT must be a leading enabler in building a rationalized and integrated CXM application portfolio.

    Guide to frequently used acronyms

    CXM - Customer Experience Management

    CX - Customer Experience

    CRM - Customer Relationship Management

    CSM - Customer Service Management

    MMS - Marketing Management System

    SMMP - Social Media Management Platform

    RFP - Request for Proposal

    SaaS - Software as a Service

    Customers’ expectations are on the rise: meet them!

    Today’s consumers expect speed, convenience, and tailored experiences at every stage of the customer lifecycle. Successful organizations strive to support these expectations.

    67% of end consumers will pay more for a world-class customer experience. 74% of business buyers will pay more for strong B2B experiences. (Salesforce, 2018)

    5 CORE CUSTOMER EXPECTATIONS

    1. More personalization
    2. More product options
    3. Constant contact
    4. Listen closely, respond quickly
    5. Give front-liners more control

    (Customer Experience Insight, 2016)

    Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.

    Realize measurable value by enabling CXM

    Providing a seamless customer experience increases the likelihood of cross-sell and up-sell opportunities and boosts customer loyalty and retention. IT can contribute to driving revenue and decreasing costs by providing the business with the right set of tools, applications, and technical support.

    Contribute to the bottom line

    Cross-sell, up-sell, and drive customer acquisition.

    67% of consumers are willing to pay more for an upgraded experience. (Salesforce, 2018)

    80%: The margin by which CX leaders outperformer laggards in the S&P 500.(Qualtrics, 2017)

    59% of customers say tailored engagement based on past interactions is very important to winning their business. (Salesforce, 2018)

    Enable cost savings

    Focus on customer retention as well as acquisition.

    It is 6-7x more costly to attract a new customer than it is to retain an existing customer. (Salesforce Blog, 2019)

    A 5% increase in customer retention has been found to increase profits by 25% to 95%. (Bain & Company, n.d.)

    Strategic CXM is gaining traction with your competition

    Organizations are prioritizing CXM capabilities (and associated technologies) as a strategic investment. Keep pace with the competition and gain a competitive advantage by creating a cohesive strategy that uses best practices to integrate marketing, sales, and customer support functions.

    87% of customers share great experiences they’ve had with a company. (Zendesk, n.d.)

    61% of organizations are investing in CXM. (CX Network, 2015)

    53% of organizations believe CXM provides a competitive advantage. (Harvard Business Review, 2014)

    Top Investment Priorities for Customer Experience

    1. Voice of the Customer
    2. Customer Insight Generation
    3. Customer Experience Governance
    4. Customer Journey Mapping
    5. Online Customer Experience
    6. Experience Personalization
    7. Emotional Engagement
    8. Multi-Channel Integration/Omnichannel
    9. Quality & Customer Satisfaction Management
    10. Customer/Channel Loyalty & Rewards Programs

    (CX Network 2015)

    Omnichannel is the way of the future: don’t be left behind

    Get ahead of the competition by doing omnichannel right. Devise a CXM strategy that allows you to create and maintain a consistent, seamless customer experience by optimizing operations within an omnichannel framework. Customers want to interact with you on their own terms, and it falls to IT to ensure that applications are in place to support and manage a wide range of interaction channels.

    Omnichannel is a “multi-channel approach to sales that seeks to provide the customer with a seamless transactional experience whether the customer is shopping online from a desktop or mobile device, by telephone, or in a bricks and mortar store.” (TechTarget, 2014)

    97% of companies say that they are investing in omnichannel. (Huffington Post, 2015)

    23% of companies are doing omnichannel well.

    CXM applications drive effective multi-channel customer interactions across marketing, sales, and customer service

    The success of your CXM strategy depends on the effective interaction of various marketing, sales, and customer support functions. To deliver on customer experience, organizations need to take a customer-centric approach to operations.

    From an application perspective, a CRM platform generally serves as the unifying repository of customer information, supported by adjacent solutions as warranted by your CXM objectives.

    CXM ECOSYSTEM

    Customer Relationship Management Platform

    • Web Experience Management Platform
    • E-Commerce & Point of Sale Solutions
    • Social Media Management Platform
    • Customer Intelligence Platform
    • Customer Service Management Tools
    • Marketing Management Suite

    Application spotlight: Customer experience platforms

    Description

    CXM solutions are a broad range of tools that provide comprehensive feature sets for supporting customer interaction processes. These suites supplant more basic applications for customer interaction management. Popular solutions that fall under the umbrella of CXM include CRM suites, marketing automation tools, and customer service applications.

    Features and Capabilities

    • Manage sales pipelines, provide quotes, and track client deliverables.
    • View all opportunities organized by their current stage in the sales process.
    • View all interactions that have occurred between employees and the customer, including purchase order history.
    • Manage outbound marketing campaigns via multiple channels (email, phone, social, mobile).
    • Build visual workflows with automated trigger points and business rules engine.
    • Generate in-depth customer insights, audience segmentation, predictive analytics, and contextual analytics.
    • Provide case management, ticketing, and escalation capabilities for customer service.

    Highlighted Vendors

    Microsoft Dynamics

    Adobe

    Marketo

    sprinklr

    Salesforce

    SugarCRM

    Application spotlight: Customer experience platforms

    Key Trends

    • CXM applications have decreased their focus on departmental silos to make it easier to share information across the organization as departments demand more data.
    • Vendors are developing deeper support of newer channels for customer interaction. This includes providing support for social media channels, native mobile applications, and SMS or text-based services like WhatsApp and Facebook Messenger.
    • Predictive campaigns and channel blending are becoming more feasible as vendors integrate machine learning and artificial intelligence into their applications.
    • Content blocks are being placed on top of scripting languages to allow for user-friendly interfaces. There is a focus on alleviating bottlenecks where content would have previously needed to go through a specialist.
    • Many vendors of CXM applications are placing increased emphasis on strong application integration both within and beyond their portfolios, with systems like ERP and order fulfillment.

    Link to Digital Strategy

    • For many organizations that are building out a digital strategy, improving customer experience is often a driving factor: CXM apps enable this goal.
    • As part of a digital strategy, create a comprehensive CXM application portfolio by leveraging both core CRM suites and point solutions.
    • Ensure that a point solution aligns with the digital strategy’s technology drivers and user personas.

    CXM KPIs

    Strong CXM applications can improve:

    • Lead Intake Volume
    • Lead Conversion Rate
    • Average Time to Resolution
    • First-Contact Resolution Rate
    • Customer Satisfaction Rate
    • Share-of-Mind
    • Share-of-Wallet
    • Customer Lifetime Value
    • Aggregate Reach/Impressions

    IT is critical to the success of your CXM strategy

    Technology is the key enabler of building strong customer experiences: IT must stand shoulder-to-shoulder with the business to develop a technology framework for CXM.

    Top 5 Challenges with CXM for Marketing

    1. Maximizing customer experience ROI
    2. Achieving a single view of the customer
    3. Building new customer experiences
    4. Cultivating a customer-focused culture
    5. Measuring CX investments to business outcomes

    Top 5 Obstacles to Enabling CXM for IT

    1. Systems integration
    2. Multichannel complexity
    3. Organizational structure
    4. Data-related issues
    5. Lack of strategy

    (Harvard Business Review, 2014)

    Only 19% of organizations have a customer experience team tasked with bridging gaps between departments. (Genesys, 2018)

    IT and Marketing can only tackle CXM with the full support of each other. The cooperation of the departments is crucial when trying to improve CXM technology capabilities and customer interaction and drive a strong revenue mandate.

    CXM failure: Blockbuster

    CASE STUDY

    Industry Entertainment

    Source Forbes, 2014

    Blockbuster

    As the leader of the video retail industry, Blockbuster had thousands of retail locations internationally and millions of customers. Blockbuster’s massive marketing budget and efficient operations allowed it to dominate the competition for years.

    Situation

    Trends in Blockbuster’s consumer market changed in terms of distribution channels and customer experience. As the digital age emerged and developed, consumers were looking for immediacy and convenience. This threatened Blockbuster’s traditional, brick-and-mortar B2C operating model.

    The Competition

    Netflix entered the video retail market, making itself accessible through non-traditional channels (direct mail, and eventually, the internet).

    Results

    Despite long-term relationships with customers and competitive standing in the market, Blockbuster’s inability to understand and respond to changing technology trends and customer demands led to its demise. The organization did not effectively leverage internal or external networks or technology to adapt to customer demands. Blockbuster went bankrupt in 2010.

    Customer Relationship Management

    • Web Experience Management Platform
    • E-Commerce & Point of Sale Solutions
    • Social Media Management
    • Customer Intelligence
    • Customer Service
    • Marketing Management

    Blockbuster did not leverage emerging technologies to effectively respond to trends in its consumer network. It did not optimize organizational effectiveness around customer experience.

    CXM success: Netflix

    CASE STUDY

    Industry Entertainment

    Source Forbes, 2014

    Netflix

    Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.

    The Situation

    In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.

    The Competition

    Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience.

    Results

    Netflix’s disruptive innovation is built on the foundation of great CXM. Netflix is now a $28 billion company, which is tenfold what Blockbuster was worth.

    Customer Relationship Management Platform

    • Web Experience Management Platform
    • E-Commerce & Point of Sale Solutions
    • Social Media Management Platform
    • Customer Intelligence Platform
    • Customer Service Management Tools
    • Marketing Management Suite

    Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.

    Leverage Info-Tech’s approach to succeed with CXM

    Creating an end-to-end technology-enablement strategy for CXM requires a concerted, dedicated effort: Info-Tech can help with our proven approach.

    Build the CXM Project Charter

    Conduct a Thorough Environmental Scan

    Build Customer Personas and Scenarios

    Draft Strategic CXM Requirements

    Build the CXM Application Portfolio

    Implement Operational Best Practices

    Why Info-Tech’s Approach?

    Info-Tech draws on best-practice research and the experiences of our global member base to develop a methodology for CXM that is driven by rigorous customer-centric analysis.

    Our approach uses a unique combination of techniques to ensure that your team has done its due diligence in crafting a forward-thinking technology-enablement strategy for CXM that creates measurable value.

    A global professional services firm drives measurable value for CXM by using persona design and scenario development

    CASE STUDY

    Industry Professionals Services

    Source Info-Tech Workshop

    The Situation

    A global professional services firm in the B2B space was experiencing a fragmented approach to customer engagement, particularly in the pre-sales funnel. Legacy applications weren’t keeping pace with an increased demand for lead evaluation and routing technology. Web experience management was also an area of significant concern, with a lack of ongoing customer engagement through the existing web portal.

    The Approach

    Working with a team of Info-Tech facilitators, the company was able to develop several internal and external customer personas. These personas formed the basis of strategic requirements for a new CXM application stack, which involved dedicated platforms for core CRM, lead automation, web content management, and site analytics.

    Results

    Customer “stickiness” metrics increased, and Sales reported significantly higher turnaround times in lead evaluations, resulting in improved rep productivity and faster cycle times.

    Components of a persona
    Name Name personas to reflect a key attribute such as the persona’s primary role or motivation.
    Demographic Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.)
    Wants, needs, pain points Identify surface-level motivations for buying habits.
    Psychographic/behavioral traits Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.).

    Follow Info-Tech’s approach to build your CXM foundation

    Create the Project Vision

    • Identify business and IT drivers
    • Outputs:
      • CXM Strategy Guiding Principles

    Structure the Project

    • Identify goals and objectives for CXM project
    • Form Project Team
    • Establish timeline
    • Obtain project sponsorship
    • Outputs:
      • CXM Strategy Project Charter

    Scan the External Environment

    • Create CXM operating model
    • Conduct external analysis
    • Create customer personas
    • Outputs:
      • CXM Operating Model
    • Conduct PEST analysis
    • Create persona scenarios
    • Outputs:
      • CXM Strategic Requirements

    Assess the Current State of CXM

    • Conduct SWOT analysis
    • Assess application usage and satisfaction
    • Conduct VRIO analysis
    • Outputs:
      • CXM Strategic Requirements

    Create an Application Portfolio

    • Map current processes
    • Assign business process owners
    • Create channel map
    • Build CXM application portfolio
    • Outputs:
      • CXM Application Portfolio Map

    Develop Deployment Best Practices

    • Develop CXM integration map
    • Create mitigation plan for poor data quality
    • Outputs:
      • Data Quality Preservation Map

    Create an Initiative Rollout Plan

    • Create risk management plan
    • Identify work initiative dependencies
    • Create roadmap
    • Outputs:
      • CXM Initiative Roadmap

    Confirm and Finalize the CXM Blueprint

    • Identify success metrics
    • Create stakeholder communication plan
    • Present CXM strategy to stakeholders
    • Outputs:
      • Stakeholder Presentation

    Info-Tech offers various levels of support to suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Build a Strong Technology Foundation for CXM – project overview

    1. Drive Value With CXM 2. Create the Framework 3. Finalize the Framework
    Best-Practice Toolkit

    1.1 Create the Project Vision

    1.2 Structure the CXM Project

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Guided Implementations
    • Determine project vision for CXM.
    • Review CXM project charter.
    • Review environmental scan.
    • Review application portfolio for CXM.
    • Confirm deployment best practices.
    • Review initiatives rollout plan.
    • Confirm CXM roadmap.
    Onsite Workshop Module 1: Drive Measurable Value with a World-Class CXM Program Module 2: Create the Strategic Framework for CXM Module 3: Finalize the CXM Framework

    Phase 1 Outcome:

    • Completed drivers
    • Completed project charter

    Phase 2 Outcome:

    • Completed personas and scenarios
    • CXM application portfolio

    Phase 3 Outcome:

    • Strategic summary blueprint

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Activities

    Create the Vision for CXM Enablement

    1.1 CXM Fireside Chat

    1.2 CXM Business Drivers

    1.3 CXM Vision Statement

    1.4 Project Structure

    Conduct the Environmental Scan and Internal Review

    2.1 PEST Analysis

    2.2 Competitive Analysis

    2.3 Market and Trend Analysis

    2.4 SWOT Analysis

    2.5 VRIO Analysis

    2.6 Channel Mapping

    Build Personas and Scenarios

    3.1 Persona Development

    3.2 Scenario Development

    3.3 Requirements Definition for CXM

    Create the CXM Application Portfolio

    4.1 Build Business Process Maps

    4.2 Review Application Satisfaction

    4.3 Create the CXM Application Portfolio

    4.4 Prioritize Applications

    Review Best Practices and Confirm Initiatives

    5.1 Create Data Integration Map

    5.2 Define Adoption Best Practices

    5.3 Build Initiatives Roadmap

    5.4 Confirm Initiatives Roadmap

    Deliverables
    1. CXM Vision Statement
    2. CXM Project Charter
    1. Completed External Analysis
    2. Completed Internal Review
    3. Channel Interaction Map
    4. Strategic Requirements (from External Analysis)
    1. Personas and Scenarios
    2. Strategic Requirements (based on personas)
    1. Business Process Maps
    2. Application Satisfaction Diagnostic
    3. Prioritized CXM Application Portfolio
    1. Integration Map for CXM
    2. End-User Adoption Plan
    3. Initiatives Roadmap

    Phase 1

    Drive Measurable Value With a World-Class CXM Program

    Build a Strong Technology Foundation for Customer Experience Management

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Drive Measurable Value With a World-Class CXM Program

    Proposed Time to Completion: 2 weeks

    Step 1.1: Create the Project Vision

    Start with an analyst kick-off call:

    • Review key drivers from a technology and business perspective for CXM
    • Discuss benefits of strong technology enablement for CXM

    Then complete these activities…

    • CXM Fireside Chat
    • CXM Business and Technology Driver Assessment
    • CXM Vision Statement

    With these tools & templates:

    • CXM Strategy Stakeholder Presentation Template

    Step 1.2: Structure the Project

    Review findings with analyst:

    • Assess the CXM vision statement for competitive differentiators
    • Determine current alignment disposition of IT with different business units

    Then complete these activities…

    • Team Composition and Responsibilities
    • Metrics Definition

    With these tools & templates:

    • CXM Strategy Project Charter Template

    Phase 1 Results & Insights:

    • Defined value of strong technology enablement for CXM
    • Completed CXM project charter

    Step 1.1: Create the Project Vision

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities:

    • Fireside Chat: Discuss past challenges and successes with CXM
    • Identify business and IT drivers to establish guiding principles for CXM

    Outcomes:

    • Business benefits of a rationalized technology strategy to support CXM
    • Shared lessons learned
    • Guiding principles for providing technology enablement for CXM

    Building a technology strategy to support customer experience isn’t an option – it’s a mission-critical activity

    • Customer-facing departments supply the lifeblood of a company: revenue. In today’s fast-paced and interconnected world, it’s becoming increasingly imperative to enable customer experience processes with a wide range of technologies, from lead automation to social relationship management. CXM is the holistic management of customer interaction processes across marketing, sales, and customer service to create valuable, mutually beneficial customer experiences. Technology is a critical building block for enabling CXM.
    • The parallel progress of technology and process improvement is essential to an efficient and effective CXM program. While many executives prefer to remain at the status quo, new technologies have caused major shifts in the CXM environment. If you stay with the status quo, you will fall behind the competition.
    • However, many IT departments are struggling to keep up with the pace of change and find themselves more of a firefighter than a strategic partner to marketing, sales, and service teams. This not only hurts the business, but it also tarnishes IT’s reputation.

    An aligned, optimized CX strategy is:

    Rapid: to intentionally and strategically respond to quickly-changing opportunities and issues.

    Outcome-based: to make key decisions based on strong business cases, data, and analytics in addition to intuition and judgment.

    Rigorous: to bring discipline and science to bear; to improve operations and results.

    Collaborative: to conduct activities in a broader ecosystem of partners, suppliers, vendors, co-developers, and even competitors.

    (The Wall Street Journal, 2013)

    Info-Tech Insight

    If IT fails to adequately support marketing, sales, and customer service teams, the organization’s revenue will be in direct jeopardy. As a result, CIOs and Applications Directors must work with their counterparts in these departments to craft a cohesive and comprehensive strategy for using technology to create meaningful (and profitable) customer experiences.

    Fireside Chat, Part 1: When was technology an impediment to customer experience at your organization?

    1.1.1 30 minutes

    Input

    • Past experiences of the team

    Output

    • Lessons learned

    Materials

    • Whiteboard
    • Markers

    Participants

    • Core Team

    Instructions

    1. Think about a time when technology was an impediment to a positive customer experience at your organization. Reflect on the following:
      • What frustrations did the application or the technology cause to your customers? What was their reaction?
      • How did IT (and the business) identify the challenge in the first place?
      • What steps were taken to mitigate the impact of the problem? Were these steps successful?
      • What were the key lessons learned as part of the challenge?

    Fireside Chat, Part 2: What customer success stories has your organization created by using new technologies?

    1.1.2 30 minutes

    Input

    • Past experiences of the team

    Output

    • Lessons learned

    Materials

    • Whiteboard
    • Markers

    Participants

    • Core Team

    Instructions

    1. Think about a time when your organization successfully leveraged a new application or new technology to enhance the experience it provided to customers. Reflect on this experience and consider:
      • What were the organizational drivers for rolling out the new application or solution?
      • What obstacles had to be overcome in order to successfully deploy the solution?
      • How did the application positively impact the customer experience? What metrics improved?
      • What were the key lessons learned as part of the deployment? If you had to do it all over again, what would you do differently?

    Develop a cohesive, consistent, and forward-looking roadmap that supports each stage of the customer lifecycle

    When creating your roadmap, consider the pitfalls you’ll likely encounter in building the IT strategy to provide technology enablement for customer experience.

    There’s no silver bullet for developing a strategy. You can encounter pitfalls at a myriad of different points including not involving the right stakeholders from the business, not staying abreast of recent trends in the external environment, and not aligning sales, marketing, and support initiatives with a focus on the delivery of value to prospects and customers.

    Common Pitfalls When Creating a Technology-Enablement Strategy for CXM

    Senior management is not involved in strategy development.

    Not paying attention to the “art of the possible.”

    “Paving the cow path” rather than focusing on revising core processes.

    Misalignment between objectives and financial/personnel resources.

    Inexperienced team on either the business or IT side.

    Not paying attention to the actions of competitors.

    Entrenched management preferences for legacy systems.

    Sales culture that downplays the potential value of technology or new applications.

    IT is only one or two degrees of separation from the end customer: so take a customer-centric approach

    IT →Marketing, Sales, and Service →External Customers

    Internal-Facing Applications

    • IT enables, supports, and maintains the applications used by the organization to market to, sell to, and service customers. IT provides the infrastructural and technical foundation to operate the function.

    Customer-Facing Applications

    • IT supports customer-facing interfaces and channels for customer interaction.
    • Channel examples include web pages, mobile device applications and optimization, and interactive voice response for callers.

    Info-Tech Insight

    IT often overlooks direct customer considerations when devising a technology strategy for CXM. Instead, IT leaders rely on other business stakeholders to simply pass on requirements. By sitting down with their counterparts in marketing and sales, and fully understanding business drivers and customer personas, IT will be much better positioned to roll out supporting applications that drive customer engagement.

    A well-aligned CXM strategy recognizes a clear delineation of responsibilities between IT, sales, marketing, and service

    • When thinking about CXM, IT must recognize that it is responsible for being a trusted partner for technology enablement. This means that IT has a duty to:
      • Develop an in-depth understanding of strategic business requirements for CXM. Base your understanding of these business requirements on a clear conception of the internal and external environment, customer personas, and business processes in marketing, sales, and customer service.
      • Assist with shortlisting and supporting different channels for customer interaction (including email, telephony, web presence, and social media).
      • Create a rationalized, cohesive application portfolio for CXM that blends different enabling technologies together to support strategic business requirements.
      • Provide support for vendor shortlisting, selection, and implementation of CXM applications.
      • Assist with end-user adoption of CXM applications (i.e. training and ongoing support).
      • Provide initiatives that assist with technical excellence for CXM (such as data quality, integration, analytics, and application maintenance).
    • The business (marketing, sales, customer service) owns the business requirements and must be responsible for setting top-level objectives for customer interaction (e.g. product and pricing decisions, marketing collateral, territory management, etc.). IT should not take over decisions on customer experience strategy. However, IT should be working in lockstep with its counterparts in the business to assist with understanding business requirements through a customer-facing lens. For example, persona development is best done in cross-functional teams between IT and Marketing.

    Activity: Identify the business drivers for CXM to establish the strategy’s guiding principles

    1.1.3 30 minutes

    Input

    • Business drivers for CXM

    Output

    • Guiding principles for CXM strategy

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Define the assumptions and business drivers that have an impact on technology enablement for CXM. What is driving the current marketing, sales, and service strategy on the business side?
    Business Driver Name Driver Assumptions, Capabilities, and Constraints Impact on CXM Strategy
    High degree of customer-centric solution selling A technically complex product means that solution selling approaches are employed – sales cycles are long. There is a strong need for applications and data quality processes that support longer-term customer relationships rather than transactional selling.
    High desire to increase scalability of sales processes Although sales cycles are long, the organization wishes to increase the effectiveness of rep time via marketing automation where possible. Sales is always looking for new ways to leverage their reps for face-to-face solution selling while leaving low-level tasks to automation. Marketing wants to support these tasks.
    Highly remote sales team and unusual hours are the norm Not based around core hours – significant overtime or remote working occurs frequently. Misalignment between IT working only core hours and after-hours teams leads to lag times that can delay work. Scheduling of preventative sales maintenance must typically be done on weekends rather than weekday evenings.

    Activity: Identify the IT drivers for CXM to establish the strategy’s guiding principles

    1.1.4 30 minutes

    Input

    • IT drivers for CXM

    Output

    • Guiding principles for CXM strategy

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Define the assumptions and IT drivers that have an impact on technology enablement for CXM. What is driving the current IT strategy for supporting marketing, sales, and service initiatives?
    IT Driver Name Driver Assumptions, Capabilities, and Constraints Impact on CXM Strategy
    Sales Application Procurement Methodology Strong preference for on-premise COTS deployments over homebrewed applications. IT may not be able to support cloud-based sales applications due to security requirements for on premise.
    Vendor Relations Minimal vendor relationships; SLAs not drafted internally but used as part of standard agreement. IT may want to investigate tightening up SLAs with vendors to ensure more timely support is available for their sales teams.
    Development Methodology Agile methodology employed, some pockets of Waterfall employed for large-scale deployments. Agile development means more perfective maintenance requests come in, but it leads to greater responsiveness for making urgent corrective changes to non-COTS products.
    Data Quality Approach IT sees as Sales’ responsibility IT is not standing as a strategic partner for helping to keep data clean, causing dissatisfaction from customer-facing departments.
    Staffing Availability Limited to 9–5 Execution of sales support takes place during core hours only, limiting response times and access for on-the-road sales personnel.

    Activity: Use IT and business drivers to create guiding principles for your CXM technology-enablement project

    1.1.5 30 minutes

    Input

    • Business drivers and IT drivers from 1.1.3 and 1.1.4

    Output

    • CXM mission statement

    Materials

    • Whiteboard
    • Markers

    Participants

    • Core Team

    Instructions

    1. Based on the IT and business drivers identified, craft guiding principles for CXM technology enablement. Keep guiding principles in mind throughout the project and ensure they support (or reconcile) the business and IT drivers.

    Guiding Principle Description
    Sales processes must be scalable. Our sales processes must be able to reach a high number of target customers in a short time without straining systems or personnel.
    Marketing processes must be high touch. Processes must be oriented to support technically sophisticated, solution-selling methodologies.

    2. Summarize the guiding principles above by creating a CXM mission statement. See below for an example.

    Example: CXM Mission Statement

    To ensure our marketing, sales and service team is equipped with tools that will allow them to reach out to a large volume of contacts while still providing a solution-selling approach. This will be done with secure, on-premise systems to safeguard customer data.

    Ensure that now is the right time to take a step back and develop the CXM strategy

    Determine if now is the right time to move forward with building (or overhauling) your technology-enablement strategy for CXM.

    Not all organizations will be able to proceed immediately to optimize their CXM technology enablement. Determine if the organizational willingness, backbone, and resources are present to commit to overhauling the existing strategy. If you’re not ready to proceed, consider waiting to begin this project until you can procure the right resources.

    Do not proceed if:

    • Your current strategy for supporting marketing, sales, and service is working well and IT is already viewed as a strategic partner by these groups. Your current strategy is well aligned with customer preferences.
    • The current strategy is not working well, but there is no consensus or support from senior management for improving it.
    • You cannot secure the resources or time to devote to thoroughly examining the current state and selecting improvement initiatives.
    • The strategy has been approved, but there is no budget in place to support it at this time.

    Proceed if:

    • Senior management has agreed that technology support for CXM should be improved.
    • Sub-divisions within IT, sales, marketing, and service are on the same page about the need to improve alignment.
    • You have an approximate budget to work with for the project and believe you can secure additional funding to execute at least some improvement initiatives.
    • You understand how improving CXM alignment will fit into the broader customer interaction ecosystem in your organization.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.1.3; 1.1.4; 1.1.5 - Identify business and IT drivers to create CXM guiding principles

    The facilitator will work with stakeholders from both the business and IT to identify implicit or explicit strategic drivers that will support (or pose constraints on) the technology-enablement framework for the CXM strategy. In doing so, guiding principles will be established for the project.

    Step 1.2: Structure the Project

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities:

    • Define the project purpose, objectives, and business metrics
    • Define the scope of the CXM strategy
    • Create the project team
    • Build a RACI chart
    • Develop a timeline with project milestones
    • Identify risks and create mitigation strategies
    • Complete the strategy project charter and obtain approval

    Outcomes:

    CXM Strategy Project Charter Template

    • Purpose, objectives, metrics
    • Scope
    • Project team & RACI
    • Timeline
    • Risks & mitigation strategies
    • Project sponsorship

    Use Info-Tech’s CXM Strategy Project Charter Template to outline critical components of the CXM project

    1.2.1 CXM Strategy Project Charter Template

    Having a project charter is the first step for any project: it specifies how the project will be resourced from a people, process, and technology perspective, and it clearly outlines major project milestones and timelines for strategy development. CXM technology enablement crosses many organizational boundaries, so a project charter is a very useful tool for ensuring everyone is on the same page.

    Sections of the document:

    1. Project Drivers, Rationale, and Context
    2. Project Objectives, Metrics, and Purpose
    3. Project Scope Definition
    4. Project Team Roles and Responsibilities (RACI)
    5. Project Timeline
    6. Risk Mitigation Strategy
    7. Project Metrics
    8. Project Review & Approvals

    INFO-TECH DELIVERABLE

    CXM Strategy Project Charter Template

    Populate the relevant sections of your project charter as you complete activities 1.2.2-1.2.8.

    Understand the roles necessary to complete your CXM technology-enablement strategy

    Understand the role of each player within your project structure. Look for listed participants on the activities slides to determine when each player should be involved.

    Title Role Within Project Structure
    Project Sponsor
    • Owns the project at the management/C-suite level
    • Responsible for breaking down barriers and ensuring alignment with organizational strategy
    • CIO, CMO, VP of Sales, VP of Customer Care, or similar
    Project Manager
    • The IT individual(s) that will oversee day-to-day project operations
    • Responsible for preparing and managing the project plan and monitoring the project team’s progress
    • Applications or other IT Manager, Business Analyst, Business Process Owner, or similar
    Business Lead
    • Works alongside the IT PM to ensure that the strategy is aligned with business needs
    • In this case, likely to be a marketing, sales, or customer service lead
    • Sales Director, Marketing Director, Customer Care Director, or similar
    Project Team
    • Comprised of individuals whose knowledge and skills are crucial to project success
    • Responsible for driving day-to-day activities, coordinating communication, and making process and design decisions. Can assist with persona and scenario development for CXM.
    • Project Manager, Business Lead, CRM Manager, Integration Manager, Application SMEs, Developers, Business Process Architects, and/or similar SMEs
    Steering Committee
    • Comprised of C-suite/management level individuals that act as the project’s decision makers
    • Responsible for validating goals and priorities, defining the project scope, enabling adequate resourcing, and managing change
    • Project Sponsor, Project Manager, Business Lead, CFO, Business Unit SMEs and similar

    Info-Tech Insight

    Do not limit project input or participation to the aforementioned roles. Include subject matter experts and internal stakeholders at particular stages within the project. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CXM technology-enablement strategy.

    Activity: Kick-off the CXM project by defining the project purpose, project objectives, and business metrics

    1.2.2 30 minutes

    Input

    • Activities 1.1.1 to 1.1.5

    Output

    • Drivers & rationale
    • Purpose statement
    • Business goals
    • Business metrics
    • CXM Strategy Project Charter Template, sections 1.0, 2.0, and 2.1

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Sponsor
    • Project Manager
    • Business Lead
    • Steering Committee

    Instructions

    Hold a meeting with IT, Marketing, Sales, Service, Operations, and any other impacted business stakeholders that have input into CXM to accomplish the following:

    1. Discuss the drivers and rationale behind embarking on a CXM strategy.
    2. Develop and concede on objectives for the CXM project, metrics that will gauge its success, and goals for each metric.
    3. Create a project purpose statement that is informed by decided-upon objectives and metrics from the steps above. When establishing a project purpose, ask the question, “what are we trying to accomplish?”
    • Example: Project Purpose Statement
      • The organization is creating a CXM strategy to gather high-level requirements from the business, IT, and Marketing, Sales, and Service, to ensure that the selection and deployment of the CXM meets the needs of the broader organization and provides the greatest return on investment.
  • Document your project drivers and rationale, purpose statement, project objectives, and business metrics in Info-Tech’s CXM Strategy Project Charter Template in sections 1.0 and 2.0.
  • Info-Tech Insight

    Going forward, set up a quarterly review process to understand changing needs. It is rare that organizations never change their marketing and sales strategy. This will change the way the CXM will be utilized.

    Establish baseline metrics for customer engagement

    In order to gauge the effectiveness of CXM technology enablement, establish core metrics:

    1. Marketing Metrics: pertaining to share of voice, share of wallet, market share, lead generation, etc.
    2. Sales Metrics: pertaining to overall revenue, average deal size, number of accounts, MCV, lead warmth, etc.
    3. Customer Service Metrics: pertaining to call volumes, average time to resolution, first contact resolution, customer satisfaction, etc.
    4. IT Metrics: pertaining to end-user satisfaction with CXM applications, number of tickets, contract value, etc.
    Metric Description Current Metric Future Goal
    Market Share 25% 35%
    Share of Voice (All Channels) 40% 50%
    Average Deal Size $10,500 $12,000
    Account Volume 1,400 1,800
    Average Time to Resolution 32 min 25 min
    First Contact Resolution 15% 35%
    Web Traffic per Month (Unique Visitors) 10,000 15,000
    End-User Satisfaction 62% 85%+
    Other metric
    Other metric
    Other metric

    Understand the importance of setting project expectations with a scope statement

    Be sure to understand what is in scope for a CXM strategy project. Prevent too wide of a scope to avoid scope creep – for example, we aren’t tackling ERP or BI under CXM.

    In Scope

    Establishing the parameters of the project in a scope statement helps define expectations and provides a baseline for resource allocation and planning. Future decisions about the strategic direction of CXM will be based on the scope statement.

    Scope Creep

    Well-executed requirements gathering will help you avoid expanding project parameters, drawing on your resources, and contributing to cost overruns and project delays. Avoid scope creep by gathering high-level requirements that lead to the selection of category-level application solutions (e.g. CRM, MMS, SMMP, etc.), rather than granular requirements that would lead to vendor application selection (e.g. Salesforce, Marketo, Hootsuite, etc.).

    Out of Scope

    Out-of-scope items should also be defined to alleviate ambiguity, reduce assumptions, and further clarify expectations for stakeholders. Out-of-scope items can be placed in a backlog for later consideration. For example, fulfilment and logistics management is out of scope as it pertains to CXM.

    In Scope
    Strategy
    High-Level CXM Application Requirements CXM Strategic Direction Category Level Application Solutions (e.g. CRM, MMS, etc.)
    Out of Scope
    Software Selection
    Vendor Application Review Vendor Application Selection Granular Application System Requirements

    Activity: Define the scope of the CXM strategy

    1.2.3 30 minutes

    Input

    • N/A

    Output

    • Project scope and parameters
    • CXM Strategy Project Charter Template, section 3.0

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Sponsor
    • Project Manager
    • Business Lead

    Instructions

    1. Formulate a scope statement. Decide which people, processes, and functions the CXM strategy will address. Generally, the aim of this project is to develop strategic requirements for the CXM application portfolio – not to select individual vendors.
    2. Document your scope statement in Info-Tech’s CXM Strategy Project Charter Template in section 3.0.

    To form your scope statement, ask the following questions:

    • What are the major coverage points?
    • Who will be using the systems?
    • How will different users interact with the systems?
    • What are the objectives that need to be addressed?
    • Where do we start?
    • Where do we draw the line?

    Identify the right stakeholders to include on your project team

    Consider the core team functions when composing the project team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CXM strategy.

    Required Skills/Knowledge Suggested Project Team Members
    IT
    • Application development
    • Enterprise integration
    • Business processes
    • Data management
    • CRM Application Manager
    • Business Process Manager
    • Integration Manager
    • Application Developer
    • Data Stewards
    Business
    • Understanding of the customer
    • Departmental processes
    • Sales Manager
    • Marketing Manager
    • Customer Service Manager
    Other
    • Operations
    • Administrative
    • Change management
    • Operations Manager
    • CFO
    • Change Management Manager

    Info-Tech Insight

    Don’t let your project team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units such as marketing, sales, service, and finance, as well as IT.

    Activity: Create the project team

    1.2.4 45 minutes

    Input

    • Scope Statement (output of Activity 1.2.3).

    Output

    • Project Team
    • CXM Strategy Project Charter Template, section 4.0

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Manager
    • Business Lead

    Instructions

    1. Review your scope statement. Have a discussion to generate a complete list of key stakeholders that are needed to achieve the scope of work.
    2. Using the previously generated list, identify a candidate for each role and determine their responsibilities and expected time commitment for the CXM strategy project.
    3. Document the project team in Info-Tech’s CXM Strategy Project Charter Template in section 4.0.

    Define project roles and responsibilities to improve progress tracking

    Build a list of the core CXM strategy team members, and then structure a RACI chart with the relevant categories and roles for the overall project.

    Responsible - Conducts work to achieve the task

    Accountable - Answerable for completeness of task

    Consulted - Provides input for the task

    Informed - Receives updates on the task

    Info-Tech Insight

    Avoid missed tasks between inter-functional communications by defining roles and responsibilities for the project as early as possible.

    Benefits of Assigning RACI Early:

    • Improve project quality by assigning the right people to the right tasks.
    • Improve chances of project task completion by assigning clear accountabilities.
    • Improve project buy-in by ensuring that stakeholders are kept informed of project progress, risks, and successes.

    Activity: Build a RACI chart

    1.2.5 30 minutes

    Input

    • Project Team (output of Activity 1.2.4)

    Output

    • RACI chart
    • CXM Strategy Project Charter Template, section 4.2

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Manager
    • Business Lead

    Instructions

    1. Identify the key stakeholder teams that should be involved in the CXM strategy project. You should have a cross-functional team that encompasses both IT (various units) and the business.
    2. Determine whether each stakeholder should be responsible, accountable, consulted, and/or informed with respect to each overarching project step.
    3. Confirm and communicate the results to relevant stakeholders and obtain their approval.
    4. Document the RACI chart in Info-Tech’s CXM Strategy Project Charter Template in section 4.2.
    Example: RACI Chart Project Sponsor (e.g. CMO) Project Manager (e.g. Applications Manager) Business Lead (e.g. Marketing Director) Steering Committee (e.g. PM, CMO, CFO…) Project Team (e.g. PM, BL, SMEs…)
    Assess Project Value I C A R C
    Conduct a Current State Assessment I I A C R
    Design Application Portfolio I C A R I
    Create CXM Roadmap R R A I I
    ... ... ... ... ... ...

    Activity: Develop a timeline in order to specify concrete project milestones

    1.2.6 30 minutes

    Input

    • N/A

    Output

    • Project timeline
    • CXM Strategy Project Charter Template, section 5.0

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Manager
    • Business Lead

    Instructions

    1. Assign responsibilities, accountabilities, and other project involvement to each project team role using a RACI chart. Remember to consider dependencies when creating the schedule and identifying appropriate subtasks.
    2. Document the timeline in Info-Tech’s CXM Strategy Project Charter Template in section 5.0.
    Key Activities Start Date End Date Target Status Resource(s)
    Structure the Project and Build the Project Team
    Articulate Business Objectives and Define Vision for Future State
    Document Current State and Assess Gaps
    Identify CXM Technology Solutions
    Build the Strategy for CXM
    Implement the Strategy

    Assess project-associated risk by understanding common barriers and enablers

    Common Internal Risk Factors

    Management Support Change Management IT Readiness
    Definition The degree of understanding and acceptance of CXM as a concept and necessary portfolio of technologies. The degree to which employees are ready to accept change and the organization is ready to manage it. The degree to which the organization is equipped with IT resources to handle new systems and processes.
    Assessment Outcomes
    • Is CXM enablement recognized as a top priority?
    • Will management commit time to the project?
    • Are employees resistant to change?
    • Is there an organizational awareness of the importance of customer experience?
    • Who are the owners of process and content?
    • Is there strong technical expertise?
    • Is there strong infrastructure?
    • What are the important integration points throughout the business?
    Risk
    • Low management buy-in
    • Lack of funding
    • Lack of resources
    • Low employee motivation
    • Lack of ownership
    • Low user adoption
    • Poor implementation
    • Reliance on consultants

    Activity: Identify the risks and create mitigation strategies

    1.2.7 45 minutes

    Input

    • N/A

    Output

    • Risk mitigation strategy
    • CXM Strategy Project Charter Template, section 6.0

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Manager
    • Business Lead
    • Project Team

    Instructions

    1. Brainstorm a list of possible risks that may impede the progress of your CXM project.
    2. Classify risks as strategy based (related to planning) or systems based (related to technology).
    3. Brainstorm mitigation strategies to overcome each risk.
    4. On a scale of 1 to 3, determine the impact of each risk on project success and the likelihood of each risk occurring.
    5. Document your findings in Info-Tech’s CXM Strategy Project Charter Template in section 6.0.

    Likelihood:

    1 - High/Needs Focus

    2 - Can Be Mitigated

    3 - Unlikely

    Impact

    1 - High Impact

    2 - Moderate Impact

    3 - Minimal Impact

    Example: Risk Register and Mitigation Tactics

    Risk Impact Likelihood Mitigation Effort
    Cost of time and implementation: designing a robust portfolio of CXM applications can be a time consuming task, representing a heavy investment for the organization 1 1
    • Have a clear strategic plan and a defined time frame
    • Know your end-user requirements
    • Put together an effective and diverse strategy project team
    Availability of resources: lack of in-house resources (e.g. infrastructure, CXM application developers) may result in the need to insource or outsource resources 1 2
    • Prepare a plan to insource talent by hiring or transferring talent from other departments – e.g. marketing and customer service

    Activity: Complete the project charter and obtain approval

    1.2.8 45 minutes

    Input

    • N/A

    Output

    • Project approval
    • CXM Strategy Project Charter Template, section 8.0

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Manager
    • Business Lead
    • Project Team

    Instructions

    Before beginning to develop the CXM strategy, validate the project charter and metrics with senior sponsors or stakeholders and receive their approval to proceed.

    1. Schedule a 30-60 minute meeting with senior stakeholders and conduct a live review of your CXM strategy project charter.
    2. Obtain stakeholder approval to ensure there are no miscommunications or misunderstandings around the scope of the work that needs to be done to reach a successful project outcome. Final sign-off should only take place when mutual consensus has been reached.
      • Obtaining approval should be an iterative process; if senior management has concerns over certain aspects of the plan, revise and review again.

    Info-Tech Insight

    In most circumstances, you should have your CXM strategy project charter validated with the following stakeholders:

    • Chief Information Officer
    • IT Applications Director
    • CFO or Comptroller (for budget approval)
    • Chief Marketing Office or Head of Marketing
    • Chief Revenue Officer or VP of Sales
    • VP Customer Service

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    1.2.2 Define project purpose, objectives, and business metrics

    Through an in-depth discussion, an analyst will help you prioritize corporate objectives and organizational drivers to establish a distinct project purpose.

    1.2.3 Define the scope of the CXM strategy

    An analyst will facilitate a discussion to address critical questions to understand your distinct business needs. These questions include: What are the major coverage points? Who will be using the system?

    1.2.4; 1.2.5; 1.2.6 Create the CXM project team, build a RACI chart, and establish a timeline

    Our analysts will guide you through how to create a designated project team to ensure the success of your CXM strategy and suite selection initiative, including project milestones and team composition, as well as designated duties and responsibilities.

    Phase 2

    Create a Strategic Framework for CXM Technology Enablement

    Build a Strong Technology Foundation for Customer Experience Management

    Phase 2 outline: Steps 2.1 and 2.2

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Create a Strategic Framework for CXM Technology Enablement

    Proposed Time to Completion: 4 weeks

    Step 2.1: Scan the External Environment

    Start with an analyst kick-off call:

    • Discuss external drivers
    • Assess competitive environment
    • Review persona development
    • Review scenarios

    Then complete these activities…

    • Build the CXM operating model
    • Conduct a competitive analysis
    • Conduct a PEST analysis
    • Build personas and scenarios

    With these tools & templates:

    CXM Strategy Stakeholder Presentation Template

    Step 2.2: Assess the Current State for CRM

    Review findings with analyst:

    • Review SWOT analysis
    • Review VRIO analysis
    • Discuss strategic requirements for CXM

    Then complete these activities…

    • Conduct a SWOT analysis
    • Conduct a VRIO analysis
    • Inventory existing applications

    With these tools & templates:

    CXM Strategy Stakeholder Presentation Template

    Phase 2 outline: Steps 2.3 and 2.4

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Create a Strategic Framework for CXM Technology Enablement

    Proposed Time to Completion: 4 weeks

    Step 2.3: Create an Application Portfolio

    Start with an analyst kick-off call:

    • Discuss possible business process maps
    • Discuss strategic requirements
    • Review application portfolio results

    Then complete these activities…

    • Build business maps
    • Execute application mapping

    With these tools & templates:

    CXM Portfolio Designer

    CXM Strategy Stakeholder Presentation Template

    CXM Business Process Shortlisting Tool

    Step 2.4: Develop Deployment Best Practices

    Review findings with analyst:

    • Review possible integration maps
    • Discuss best practices for end-user adoption
    • Discuss best practices for customer data quality

    Then complete these activities…

    • Create CXM integration ecosystem
    • Develop adoption game plan
    • Create data quality standards

    With these tools & templates:

    CXM Strategy Stakeholder Presentation Template

    Phase 2 Results & Insights:

    • Application portfolio for CXM
    • Deployment best practices for areas such as integration, data quality, and end-user adoption

    Step 2.1: Scan the External Environment

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities:

    • Inventory CXM drivers and organizational objectives
    • Identify CXM challenges and pain points
    • Discuss opportunities and benefits
    • Align corporate and CXM strategies
    • Conduct a competitive analysis
    • Conduct a PEST analysis and extract strategic requirements
    • Build customer personas and extract strategic requirements

    Outcomes:

    • CXM operating model
      • Organizational drivers
      • Environmental factors
      • Barriers
      • Enablers
    • PEST analysis
    • External customer personas
    • Customer journey scenarios
    • Strategic requirements for CXM

    Develop a CXM technology operating model that takes stock of needs, drivers, barriers, and enablers

    Establish the drivers, enablers, and barriers to developing a CXM technology enablement strategy. In doing so, consider needs, environmental factors, organizational drivers, and technology drivers as inputs.

    CXM Strategy

    • Barriers
      • Lack of Resources
      • Cultural Mindset
      • Resistance to Change
      • Poor End-User Adoption
    • Enablers
      • Senior Management Support
      • Customer Data Quality
      • Current Technology Portfolio
    • Business Needs (What are your business drivers? What are current marketing, sales, and customer service pains?)
      • Acquisition Pipeline Management
      • Live Chat for Support
      • Social Media Analytics
      • Etc.
    • Organizational Goals
      • Increase Profitability
      • Enhance Customer Experience Consistency
      • Reduce Time-to-Resolution
      • Increase First Contact Resolution
      • Boost Share of Voice
    • Environmental Factors (What factors that affect your strategy are out of your control?)
      • Customer Buying Habits
      • Changing Technology Trends
      • Competitive Landscape
      • Regulatory Requirements
    • Technology Drivers (Why do you need a new system? What is the purpose for becoming an integrated organization?)
      • System Integration
      • Reporting Capabilities
      • Deployment Model

    Understand your needs, drivers, and organizational objectives for creating a CXM strategy

    Business Needs Organizational Drivers Technology Drivers Environmental Factors
    Definition A business need is a requirement associated with a particular business process (for example, Marketing needs customer insights from the website – the business need would therefore be web analytics capabilities). Organizational drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as customer retention, operation excellence, and financial performance. Technology drivers are technological changes that have created the need for a new CXM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business.
    Examples
    • Web analytics
    • Live chat capabilities
    • Mobile self-service
    • Social media listening
    • Data quality
    • Customer satisfaction
    • Branding
    • Time-to-resolution
    • Deployment model (i.e. SaaS)
    • Integration
    • Reporting capabilities
    • Fragmented technologies
    • Economic factors
    • Customer preferences
    • Competitive influencers
    • Compliance regulations

    Info-Tech Insight

    A common organizational driver is to provide adequate technology enablement across multiple channels, resulting in a consistent customer experience. This driver is a result of external considerations. Many industries today are highly competitive and rapidly changing. To succeed under these pressures, you must have a rationalized portfolio of enterprise applications for customer interaction.

    Activity: Inventory and discuss CXM drivers and organizational objectives

    2.1.1 30 minutes

    Input

    • Business needs
    • Exercise 1.1.3
    • Exercise 1.1.4
    • Environmental factors

    Output

    • CXM operating model inputs
    • CXM Strategy Stakeholder Presentation

    Materials

    • Info-Tech examples
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Brainstorm the business needs, organizational drivers, technology drivers, and environmental factors that will inform the CXM strategy. Draw from exercises 1.1.3-1.1.5.
    2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

    The image is a graphic, with a rectangle split into three sections in the centre. The three sections are: Barriers; CXM Strategy; Enablers. Around the centre are 4 more rectangles, labelled: Business Needs; Organizational Drivers; Technology Drivers; Environmental Factors. The outer rectangles are a slightly darker shade of grey than the others, highlighting them.

    Understand challenges and barriers to creating and executing the CXM technology-enablement strategy

    Take stock of internal challenges and barriers to effective CXM strategy execution.

    Example: Internal Challenges & Potential Barriers

    Understanding the Customer Change Management IT Readiness
    Definition The degree to which a holistic understanding of the customer can be created, including customer demographic and psychographics. The degree to which employees are ready to accept operational and cultural changes and the degree to which the organization is ready to manage it. The degree to which IT is ready to support new technologies and processes associated with a portfolio of CXM applications.
    Questions to Ask
    • As an organization, do we have a true understanding of our customers?
    • How might we achieve a complete understanding of the customer throughout different phases of the customer lifecycle?
    • Are employees resistant to change?
    • Are there enough resources to drive an CXM strategy?
    • To what degree is the existing organizational culture customer-centric?
    • Is there strong technical expertise?
    • Is there strong infrastructure?
    Implications
    • Uninformed creation of CXM strategic requirements
    • Inadequate understanding of customer needs and wants
    • User acceptance
    • Lack of ownership
    • Lack of accountability
    • Lack of sustainability
    • Poor implementation
    • Reliance on expensive external consultants
    • Lack of sustainability

    Activity: Identify CXM challenges and pain points

    2.1.2 30 minutes

    Input

    • Challenges
    • Pain points

    Output

    • CXM operating model barriers
    • CXM Strategy Stakeholder Presentation

    Materials

    • Info-Tech examples
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Brainstorm the challenges and pain points that may act as barriers to the successful planning and execution of a CXM strategy.
    2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

    The image is the same graphic from a previous section. In this instance, the Barriers sections is highlighted.

    Identify opportunities that can enable CXM strategy execution

    Existing internal conditions, capabilities, and resources can create opportunities to enable the CXM strategy. These opportunities are critical to overcoming challenges and barriers.

    Example: Opportunities to Leverage for Strategy Enablement

    Management Buy-In Customer Data Quality Current Technology Portfolio
    Definition The degree to which upper management understands and is willing to enable a CXM project, complete with sponsorship, funding, and resource allocation. The degree to which customer data is accurate, consistent, complete, and reliable. Strong customer data quality is an opportunity – poor data quality is a barrier. The degree to which the existing portfolio of CXM-supporting enterprise applications can be leveraged to enable the CXM strategy.
    Questions to Ask
    • Is management informed of changing technology trends and the subsequent need for CXM?
    • Are adequate funding and resourcing available to support a CXM project, from strategy creation to implementation?
    • Are there any data quality issues?
    • Is there one source of truth for customer data?
    • Are there duplicate or incomplete sets of data?
    • Does a strong CRM backbone exist?
    • What marketing, sales, and customer service applications exist?
    • Are CXM-enabling applications rated highly on usage and performance?
    Implications
    • Need for CXM clearly demonstrated
    • Financial and logistical feasibility
    • Consolidated data quality governance initiatives
    • Informed decision making
    • Foundation for CXM technology enablement largely in place
    • Reduced investment of time and money needed

    Activity: Discuss opportunities and benefits

    2.1.3 30 minutes

    Input

    • Opportunities
    • Benefits

    Output

    • Completed CXM operating model
    • CXM Strategy Stakeholder Presentation

    Materials

    • Info-Tech examples
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Brainstorm opportunities that should be leveraged or benefits that should be realized to enable the successful planning and execution of a CXM strategy.
    2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

    The image is the same graphic from earlier sections, this time with the Enablers section highlighted.

    Ensure that you align your CXM technology strategy to the broader corporate strategy

    A successful CXM strategy requires a comprehensive understanding of an organization’s overall corporate strategy and its effects on the interrelated departments of marketing, sales, and service, including subsequent technology implications. For example, a CXM strategy that emphasizes tools for omnichannel management and is at odds with a corporate strategy that focuses on only one or two channels will fail.

    Corporate Strategy

    • Conveys the current state of the organization and the path it wants to take.
    • Identifies future goals and business aspirations.
    • Communicates the initiatives that are critical for getting the organization from its current state to the future state.

    CXM Strategy

    • Communicates the company’s budget and spending on CXM applications and initiatives.
    • Identifies IT initiatives that will support the business and key CXM objectives, specific to marketing, sales, and service.
    • Outlines staffing and resourcing for CXM initiatives.

    Unified Strategy

    • The CXM implementation can be linked, with metrics, to the corporate strategy and ultimate business objectives.

    Info-Tech Insight

    Your organization’s corporate strategy is especially important in dictating the direction of the CXM strategy. Corporate strategies are often focused on customer-facing activity and will heavily influence the direction of marketing, sales, customer service, and consequentially, CXM. Corporate strategies will often dictate market targeting, sales tactics, service models, and more.

    Review sample organizational objectives to decipher how CXM technologies can support such objectives

    Identifying organizational objectives of high priority will assist in breaking down CXM objectives to better align with the overall corporate strategy and achieve buy-in from key stakeholders.

    Corporate Objectives Aligned CXM Technology Objectives
    Increase Revenue Enable lead scoring Deploy sales collateral management tools Improve average cost per lead via a marketing automation tool
    Enhance Market Share Enhance targeting effectiveness with a CRM Increase social media presence via an SMMP Architect customer intelligence analysis
    Improve Customer Satisfaction Reduce time-to-resolution via better routing Increase accessibility to customer service with live chat Improve first contact resolution with customer KB
    Increase Customer Retention Use a loyalty management application Improve channel options for existing customers Use customer analytics to drive targeted offers
    Create Customer-Centric Culture Ensure strong training and user adoption programs Use CRM to provide 360-degree view of all customer interaction Incorporate the voice of the customer into product development

    Activity: Review your corporate strategy and validate its alignment with the CXM operating model

    2.1.4 30 minutes

    Input

    • Corporate strategy
    • CXM operating model (completed in Activity 2.1.3)

    Output

    • Strategic alignment between the business and CXM strategies

    Materials

    • Info-Tech examples
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Brainstorm and create a list of organizational objectives at the corporate strategy level.
    2. Break down each organizational objective to identify how CXM may support it.
    3. Validate CXM goals and organizational objectives with your CXM operating model. Be sure to address the validity of each with the business needs, organizational drivers, technology drivers, and environmental factors identified as inputs to the operating model.

    Amazon leverages customer data to drive decision making around targeted offers and customer experience

    CASE STUDY

    Industry E-Commerce

    Source Pardot, 2012

    Situation

    Amazon.com, Inc. is an American electronic commerce and cloud computing company. It is the largest e-commerce retailer in the US.

    Amazon originated as an online book store, later diversifying to sell various forms of media, software, games, electronics, apparel, furniture, food, toys, and more.

    By taking a data-driven approach to marketing and sales, Amazon was able to understand its customers’ needs and wants, penetrate different product markets, and create a consistently personalized online-shopping customer experience that keeps customers coming back.

    Technology Strategy

    Use Browsing Data Effectively

    Amazon leverages marketing automation suites to view recent activities of prospects on its website. In doing so, a more complete view of the customer is achieved, including insights into purchasing interests and site navigation behaviors.

    Optimize Based on Interactions

    Using customer intelligence, Amazon surveys and studies standard engagement metrics like open rate, click-through rate, and unsubscribes to ensure the optimal degree of marketing is being targeted to existing and prospective customers, depending on level of engagement.

    Results

    Insights gained from having a complete understanding of the customer (from basic demographic characteristics provided in customer account profiles to observed psychographic behaviors captured by customer intelligence applications) are used to personalize Amazon’s sales and marketing approaches. This is represented through targeted suggestions in the “recommended for you” section of the browsing experience and tailored email marketing.

    It is this capability, partnered with the technological ability to observe and measure customer engagement, that allows Amazon to create individual customer experiences.

    Scan the external environment to understand your customers, competitors, and macroenvironmental trends

    Do not develop your CXM technology strategy in isolation. Work with Marketing to understand your STP strategy (segmentation, targeting, positioning): this will inform persona development and technology requirements downstream.

    Market Segmentation

    • Segment target market by demographic, geographic, psychographic, and behavioral characteristics
    • What does the competitive market look like?
    • Who are the key customer segments?
    • What segments are you going to target?

    Market Targeting

    • Evaluate potential and commercial attractiveness of each segment, considering the dynamics of the competition
    • How do you target your customers?
    • How should you target them in the future?
    • How do your products/services differ from the competition?

    Product Positioning

    • Develop detailed product positioning and marketing mixes for selected segments
    • What is the value of the product/service to each segment of the market?
    • How are you positioning your product/service in the market?

    Info-Tech Insight

    It is at this point that you should consider the need for and viability of an omnichannel approach to CXM. Through which channels do you target your customers? Are your customers present and active on a wide variety of channels? Consider how you can position your products, services, and brand through the use of omnichannel methodologies.

    Activity: Conduct a competitive analysis to understand where your market is going

    2.1.5 1 hour

    Input

    • Scan of competitive market
    • Existing customer STP strategy

    Output

    • Strategic CXM requirements
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team
    • Marketing SME

    Instructions

    1. Scan the market for direct and indirect competitors.
    2. Evaluate current and/or future segmentation, targeting, and positioning strategies by answering the following questions:
    • What does the competitive market look like?
    • Who are the key customer segments?
    • What segments are you going to target?
    • How do you target your customers?
    • How should you target them in the future?
    • How do your products/services differ from the competition?
    • What is the value of the product/service to each segment of the market?
    • How are you positioning your product/service in the market?
    • Other helpful questions include:
      • How formally do you target customers? (e.g. through direct contact vs. through passive brand marketing)
      • Does your organization use the shotgun or rifle approach to marketing?
        • Shotgun marketing: targets a broad segment of people, indirectly
        • Rifle marketing: targets smaller and more niche market segments using customer intelligence
  • For each point, identify CXM requirements.
  • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
  • Activity: Conduct a competitive analysis (cont’d)

    2.1.5 30 minutes

    Input

    • Scan of competitive market

    Output

    • Competitive analysis
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team
    • Marketing SME (e.g. Market Research Stakeholders)

    Instructions

    1. List recent marketing technology and customer experience-related initiatives that your closest competitors have implemented.
    2. For each identified initiative, elaborate on what the competitive implications are for your organization.
    3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Competitive Implications

    Competitor Organization Recent Initiative Associated Technology Direction of Impact Competitive Implication
    Organization X Multichannel E-Commerce Integration WEM – hybrid integration Positive
    • Up-to-date e-commerce capabilities
    • Automatic product updates via PCM
    Organization Y Web Social Analytics WEM Positive
    • Real-time analytics and customer insights
    • Allows for more targeted content toward the visitor or customer

    Conduct a PEST analysis to determine salient political, economic, social, and technological impacts for CXM

    A PEST analysis is a structured planning method that identifies external environmental factors that could influence the corporate and IT strategy.

    Political - Examine political factors, such as relevant data protection laws and government regulations.

    Economic - Examine economic factors, such as funding, cost of web access, and labor shortages for maintaining the site(s).

    Technological - Examine technological factors, such as new channels, networks, software and software frameworks, database technologies, wireless capabilities, and availability of software as a service.

    Social - Examine social factors, such as gender, race, age, income, and religion.

    Info-Tech Insight

    When looking at opportunities and threats, PEST analysis can help to ensure that you do not overlook external factors, such as technological changes in your industry. When conducting your PEST analysis specifically for CXM, pay particular attention to the rapid rate of change in the technology bucket. New channels and applications are constantly emerging and evolving, and seeing differential adoption by potential customers.

    Activity: Conduct and review the PEST analysis

    2.1.6 30 minutes

    Input

    • Political, economic, social, and technological factors related to CXM

    Output

    • Completed PEST analysis

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Identify your current strengths and weaknesses in managing the customer experience.
    2. Identify any opportunities to take advantage of and threats to mitigate.

    Example: PEST Analysis

    Political

    • Data privacy for PII
    • ADA legislation for accessible design

    Economic

    • Spending via online increasing
    • Focus on share of wallet

    Technological

    • Rise in mobile
    • Geo-location based services
    • Internet of Things
    • Omnichannel

    Social

    • Increased spending power by millennials
    • Changing channel preferences
    • Self-service models

    Activity: Translate your PEST analysis into a list of strategic CXM technology requirements to be addressed

    2.1.7 30 minutes

    Input

    • PEST Analysis conducted in Activity 2.1.6.

    Output

    • Strategic CXM requirements
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    For each PEST quadrant:

    1. Document the point and relate it to a goal.
    2. For each point, identify CXM requirements.
    3. Sort goals and requirements to eliminate duplicates.
    4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Parsing Requirements from PEST Analysis

    Technological Trend: There has been a sharp increase in popularity of mobile self-service models for buying habits and customer service access.

    Goal: Streamline mobile application to be compatible with all mobile devices. Create consistent branding across all service delivery applications (e.g. website, etc.).

    Strategic Requirement: Develop a native mobile application while also ensuring that resources through our web presence are built with responsive design interface.

    IT must fully understand the voice of the customer: work with Marketing to develop customer personas

    Creating a customer-centric CXM technology strategy requires archetypal customer personas. Creating customer personas will enable you to talk concretely about them as consumers of your customer experience and allow you to build buyer scenarios around them.

    A persona (or archetypal user) is an invented person that represents a type of user in a particular use-case scenario. In this case, personas can be based on real customers.

    Components of a persona Example – Organization: Grocery Store
    Name Name personas to reflect a key attribute such as the persona’s primary role or motivation Brand Loyal Linda: A stay-at-home mother dedicated to maintaining and caring for a household of 5 people
    Demographic Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.) Age: 42 years old Geographic location: London Suburbia Language: English Education: Post-secondary Job: Stay-at-home mother Annual Household Income: $100,000+
    Wants, needs, pain points Identify surface-level motivations for buying habits

    Wants: Local products Needs: Health products; child-safe products

    Pain points: Fragmented shopping experience

    Psychographic/behavioral traits Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.)

    Psychographic: Detail-oriented, creature of habit

    Behavioral: Shops at large grocery store twice a week, visits farmers market on Saturdays, buys organic products online

    Activity: Build personas for your customers

    2.1.8 2 hours

    Input

    • Customer demographics and psychographics

    Output

    • List of prioritized customer personas
    • CXM Strategy Stakeholder Presentation

    Materials

    • Info-Tech examples
    • Whiteboard
    • Markers

    Participants

    Project Team

    Instructions

    1. In 2-4 groups, list all the customer personas that need to be built. In doing so, consider the people who interact with your organization most often.
    2. Build a demographic profile for each customer persona. Include information such as age, geographic location, occupation, annual income, etc.
    3. Augment the persona with a psychographic profile of each customer. Consider the goals and objectives of each customer persona and how these might inform buyer behaviors.
    4. Introduce your group’s personas to the entire group, in a round-robin fashion, as if you are introducing your persona at a party.
    5. Summarize the personas in a persona map. Rank your personas according to importance and remove any duplicates.

    Info-Tech Insight

    For CXM, persona building is typically used for understanding the external customer; however, if you need to gain a better understanding of the organization’s internal customers (those who will be interacting with CXM applications), personas can also be built for this purpose. Examples of useful internal personas are sales managers, brand managers, customer service directors, etc.

    Sample Persona Templates

    Fred, 40

    The Family Man

    Post-secondary educated, white-collar professional, three children

    Goals & Objectives

    • Maintain a stable secure lifestyle
    • Progress his career
    • Obtain a good future for his children

    Behaviors

    • Manages household and finances
    • Stays actively involved in children’s activities and education
    • Seeks potential career development
    • Uses a cellphone and email frequently
    • Sometimes follows friends Facebook pages

    Services of Interest

    • SFA, career counselling, job boards, day care, SHHS
    • Access to information via in-person, phone, online

    Traits

    General Literacy - High

    Digital Literacy - Mid-High

    Detail-Oriented - High

    Willing to Try New Things - Mid-High

    Motivated and Persistent - Mid-High

    Time Flexible - Mid-High

    Familiar With [Red.] - Mid

    Access to [Red.] Offices - High

    Access to Internet - High

    Ashley, 35

    The Tourist

    Single, college educated, planning vacation in [redacted], interested in [redacted] job opportunities

    Goals & Objectives

    • Relax after finishing a stressful job
    • Have adventures and try new things
    • Find a new job somewhere in Canada

    Behaviors

    • Collects information about things to do in [redacted]
    • Collects information about life in [redacted]
    • Investigates and follows up on potential job opportunities
    • Uses multiple social media to keep in touch with friends
    • Shops online frequently

    Services of Interest

    • SFA, job search, road conditions, ferry schedules, hospital, police station, DL requirements, vehicle rental
    • Access to information via in-person, phone, website, SMS, email, social media

    Traits

    General Literacy - Mid

    Digital Literacy - High

    Detail-Oriented - Mid

    Willing to Try New Things - High

    Motivated and Persistent - Mid

    Time Flexible - Mid-High

    Familiar With [Red.] - Low

    Access to [Red.] Offices - Low

    Access to Internet - High

    Bill, 25

    The Single Parent

    15-year resident of [redacted], high school education, waiter, recently divorced, two children

    Goals & Objectives

    • Improve his career options so he can support his family
    • Find an affordable place to live
    • Be a good parent
    • Work through remaining divorce issues

    Behaviors

    • Tries to get training or experience to improve his career
    • Stays actively involved in his children’s activities
    • Looks for resources and supports to resolve divorce issues
    • Has a cellphone and uses the internet occasionally

    Services of Interest

    • Child care, housing authority, legal aid, parenting resources
    • Access to information via in person, word-of mouth, online, phone, email

    Traits

    General Literacy - Mid

    Digital Literacy - Mid-Low

    Detail-Oriented - Mid-Low

    Willing to Try New Things - Mid

    Motivated and Persistent - High

    Time Flexible - Mid

    Familiar With [Red.] - Mid-High

    Access to [Red.] Offices - High

    Access to Internet - High

    Marie, 19

    The Regional Youth

    Single, [redacted] resident, high school graduate

    Goals & Objectives

    • Get a good job
    • Maintain ties to family and community

    Behaviors

    • Looking for work
    • Gathering information about long-term career choices
    • Trying to get the training or experience that can help her develop a career
    • Staying with her parents until she can get established
    • Has a new cellphone and is learning how to use it
    • Plays videogames and uses the internet at least weekly

    Services of Interest

    • Job search, career counselling
    • Access to information via in-person, online, phone, email, web applications

    Traits

    General Literacy - Mid

    Digital Literacy - Mid

    Detail-Oriented - Mid-Low

    Willing to Try New Things - Mid-High

    Motivated and Persistent - Mid-Low

    Time Flexible - High

    Familiar With [Red.] - Mid-Low

    Access to [Red.] Offices - Mid-Low

    Access to Internet - Mid

    Build key scenarios for each persona to extract strategic requirements for your CXM application portfolio

    A scenario is a story or narrative that helps explore the set of interactions that a customer has with an organization. Scenario mapping will help parse requirements used to design the CXM application portfolio.

    A Good Scenario…

    • Describes specific task(s) that need to be accomplished
    • Describes user goals and motivations
    • Describes interactions with a compelling but not overwhelming amount of detail
    • Can be rough, as long as it provokes ideas and discussion

    Scenarios Are Used To…

    • Provide a shared understanding about what a user might want to do, and how they might want to do it
    • Help construct the sequence of events that are necessary to address in your user interface(s)

    To Create Good Scenarios…

    • Keep scenarios high level, not granular in nature
    • Identify as many scenarios as possible. If you’re time constrained, try to develop 2-3 key scenarios per persona
    • Sketch each scenario out so that stakeholders understand the goal of the scenario

    Activity: Build scenarios for each persona and extract strategic requirements for the CXM strategy

    2.1.9 1.5 hours

    Input

    • Customer personas (output of Activity 2.1.5)

    Output

    • CX scenario maps
    • Strategic CXM requirements
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. For each customer persona created in Activity 2.1.5, build a scenario. Choose and differentiate scenarios based on the customer goal of each scenario (e.g. make online purchase, seek customer support, etc.).
    2. Think through the narrative of how a customer interacts with your organization, at all points throughout the scenario. List each step in the interaction in a sequential order to form a scenario journey.
    3. Examine each step in the scenario and brainstorm strategic requirements that will be needed to support the customer’s use of technology throughout the scenario.
    4. Repeat steps 1-3 for each persona. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Scenario Map

    Persona Name: Brand Loyal Linda

    Scenario Goal: File a complaint about in-store customer service

    Look up “[Store Name] customer service” on public web. →Reach customer support landing page. →Receive proactive notification prompt for online chat with CSR. →Initiate conversation: provide order #. →CSR receives order context and information. →Customer articulates problem, CSR consults knowledgebase. →Discount on next purchase offered. →Send email with discount code to Brand Loyal Linda.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.1.1; 2.1.2; 2.1.3; 2.1.4 - Create a CXM operating model

    An analyst will facilitate a discussion to identify what impacts your CXM strategy and how to align it to your corporate strategy. The discussion will take different perspectives into consideration and look at organizational drivers, external environmental factors, as well as internal barriers and enablers.

    2.1.5 Conduct a competitive analysis

    Calling on their depth of expertise in working with a broad spectrum of organizations, our facilitator will help you work through a structured, systematic evaluation of competitors’ actions when it comes to CXM.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    2.1.6; 2.1.7 - Conduct a PEST analysis

    The facilitator will use guided conversation to target each quadrant of the PEST analysis and help your organization fully enumerate political, economic, social, and technological trends that will influence your CXM strategy. Our analysts are deeply familiar with macroenvironmental trends and can provide expert advice in identifying areas of concern in the PEST and drawing strategic requirements as implications.

    2.1.8; 2.1.9 - Build customer personas and subsequent persona scenarios

    Drawing on the preceding exercises as inputs, the facilitator will help the team create and refine personas, create respective customer interaction scenarios, and parse strategic requirements to support your technology portfolio for CXM.

    Step 2.2: Assess the Current State of CXM

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities:

    • Conduct a SWOT analysis and extract strategic requirements
    • Inventory existing CXM applications and assess end-user usage and satisfaction
    • Conduct a VRIO analysis and extract strategic requirements

    Outcomes:

    • SWOT analysis
    • VRIO analysis
    • Current state application portfolio
    • Strategic requirements

    Conduct a SWOT analysis to prepare for creating your CXM strategy

    A SWOT analysis is a structured planning method that evaluates the strengths, weaknesses, opportunities, and threats involved in a project.

    Strengths - Strengths describe the positive attributes that are within your control and internal to your organization (i.e. what do you do better than anyone else?)

    Weaknesses - Weaknesses are internal aspects of your business that place you at a competitive disadvantage; think of what you need to enhance to compete with your top competitor.

    Opportunities - Opportunities are external factors the project can capitalize on. Think of them as factors that represent reasons your business is likely to prosper.

    Threats - Threats are external factors that could jeopardize the project. While you may not have control over these, you will benefit from having contingency plans to address them if they occur.

    Info-Tech Insight

    When evaluating weaknesses of your current CXM strategy, ensure that you’re taking into account not just existing applications and business processes, but also potential deficits in your organization’s channel strategy and go-to-market messaging.

    Activity: Conduct a SWOT analysis

    2.2.1 30 minutes

    Input

    • CXM strengths, weaknesses, opportunities, and threats

    Output

    • Completed SWOT analysis

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Identify your current strengths and weaknesses in managing the customer experience. Consider marketing, sales, and customer service aspects of the CX.
    2. Identify any opportunities to take advantage of and threats to mitigate.

    Example: SWOT Analysis

    Strengths

    • Strong customer service model via telephony

    Weaknesses

    • Customer service inaccessible in real-time through website or mobile application

    Opportunities

    • Leverage customer intelligence to measure ongoing customer satisfaction

    Threats

    • Lack of understanding of customer interaction platforms by staff could hinder adoption

    Activity: Translate your SWOT analysis into a list of requirements to be addressed

    2.2.2 30 minutes

    Input

    • SWOT Analysis conducted in Activity 2.2.1.

    Output

    • Strategic CXM requirements
    • CXM Stakeholder Presentation Template

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    For each SWOT quadrant:

    1. Document the point and relate it to a goal.
    2. For each point, identify CXM requirements.
    3. Sort goals and requirements to eliminate duplicates.
    4. Document your outputs in the CXM Stakeholder Presentation Template.

    Example: Parsing Requirements from SWOT Analysis

    Weakness: Customer service inaccessible in real-time through website or mobile application.

    Goal: Increase the ubiquity of access to customer service knowledgebase and agents through a web portal or mobile application.

    Strategic Requirement: Provide a live chat portal that matches the customer with the next available and qualified agent.

    Inventory your current CXM application portfolio

    Applications are the bedrock of technology enablement for CXM. Review your current application portfolio to identify what is working well and what isn’t.

    Understand Your CXM Application Portfolio With a Four-Step Approach

    Build the CXM Application Inventory →Assess Usage and Satisfaction →Map to Business Processes and Determine Dependencies →Determine Grow/Maintain/ Retire for Each Application

    When assessing the CXM applications portfolio, do not cast your net too narrowly; while CRM and MMS applications are often top of mind, applications for digital asset management and social media management are also instrumental for ensuring a well-integrated CX.

    Identify dependencies (either technical or licensing) between applications. This dependency tracing will come into play when deciding which applications should be grown (invested in), which applications should be maintained (held static), and which applications should be retired (divested).

    Info-Tech Insight

    Shadow IT is prominent here! When building your application inventory, ensure you involve Marketing, Sales, and Service to identify any “unofficial” SaaS applications that are being used for CXM. Many organizations fail to take a systematic view of their CXM application portfolio beyond maintaining a rough inventory. To assess the current state of alignment, you must build the application inventory and assess satisfaction metrics.

    Understand which of your organization’s existing enterprise applications enable CXM

    Review the major enterprise applications in your organization that enable CXM and align your requirements to these applications (net-new or existing). Identify points of integration to capture the big picture.

    The image shows a graphic titled Example: Integration of CRM, SMMP, and ERP. It is a flow chart, with icons defined by a legend on the right side of the image

    Info-Tech Insight

    When assessing the current application portfolio that supports CXM, the tendency will be to focus on the applications under the CXM umbrella, relating mostly to marketing, sales, and customer service. Be sure to include systems that act as input to, or benefit due to outputs from, CRM or similar applications. Examples of these systems are ERP systems, ECM (e.g. SharePoint) applications, and more.

    Assess CXM application usage and satisfaction

    Having a portfolio but no contextual data will not give you a full understanding of the current state. The next step is to thoroughly assess usage patterns as well as IT, management, and end-user satisfaction with each application.

    Example: Application Usage & Satisfaction Assessment

    Application Name Level of Usage IT Satisfaction Management Satisfaction End-User Satisfaction Potential Business Impact
    CRM (e.g. Salesforce) Medium High Medium Medium High
    CRM (e.g. Salesforce) Low Medium Medium High Medium
    ... ... ... ... ... ...

    Info-Tech Insight

    When evaluating satisfaction with any application, be sure to consult all stakeholders who come into contact with the application or depend on its output. Consider criteria such as ease of use, completeness of information, operational efficiency, data accuracy, etc.

    Use Info-Tech’s Application Portfolio Assessment to gather end-user feedback on existing CXM applications

    2.2.3 Application Portfolio Assessment: End-User Feedback

    Info-Tech’s Application Portfolio Assessment: End-User Feedback diagnostic is a low-effort, high-impact program that will give you detailed report cards on end-user satisfaction with an application. Use these insights to identify problems, develop action plans for improvement, and determine key participants.

    Application Portfolio Assessment: End-User Feedback is an 18-question survey that provides valuable insights on user satisfaction with an application by:

    • Performing a general assessment of the application portfolio that provides a full view of the effectiveness, criticality, and prevalence of all relevant applications.
    • Measuring individual application performance with open-ended user feedback surveys about the application, organized by department to simplify problem resolution.
    • Providing targeted department feedback to identify end-user satisfaction and focus improvements on the right group or line of business.

    INFO-TECH DIAGNOSTIC

    Activity: Inventory your CXM applications, and assess application usage and satisfaction

    2.2.4 1 hour

    Input

    • List of CXM applications

    Output

    • Complete inventory of CXM applications
    • CXM Stakeholder Presentation Template

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. List all existing applications that support the creation, management, and delivery of your customer experience.
    2. Identify which processes each application supports (e.g. content deployment, analytics, service delivery, etc.).
    3. Identify technical or licensing dependencies (e.g. data models).
    4. Assess the level of application usage by IT, management, and internal users (high/medium/low).
    5. Assess the satisfaction with and performance of each application according to IT, management, and internal users (high/medium/low). Use the Info-Tech Diagnostic to assist.

    Example: CXM Application Inventory

    Application Name Deployed Date Processes Supported Technical and Licensing Dependencies
    Salesforce June 2018 Customer relationship management XXX
    Hootsuite April 2019 Social media listening XXX
    ... ... ... ...

    Conduct a VRIO analysis to identify core competencies for CXM applications

    A VRIO analysis evaluates the ability of internal resources and capabilities to sustain a competitive advantage by evaluating dimensions of value, rarity, imitability, and organization. For critical applications like your CRM platform, use a VRIO analysis to determine their value.

    Is the resource or capability valuable in exploiting an opportunity or neutralizing a threat? Is the resource or capability rare in the sense that few of your competitors have a similar capability? Is the resource or capability costly to imitate or replicate? Is the organization organized enough to leverage and capture value from the resource or capability?
    NO COMPETITIVE DISADVANTAGE
    YES NO→ COMPETITIVE EQUALITY/PARITY
    YES YES NO→ TEMPORARY COMPETITIVE ADVANTAGE
    YES YES YES NO→ UNUSED COMPETITIVE ADVANTAGE
    YES YES YES YES LONG-TERM COMPETITIVE ADVANTAGE

    (Strategic Management Insight, 2013)

    Activity: Conduct a VRIO analysis on your existing application portfolio

    2.2.5 30 minutes

    Input

    • Inventory of existing CXM applications (output of Activity 2.2.4)

    Output

    • Completed VRIO analysis
    • Strategic CXM requirements
    • CXM Stakeholder Presentation Template

    Materials

    • VRIO Analysis model
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Evaluate each CXM application inventoried in Activity 2.2.4 by answering the four VRIO questions in sequential order. Do not proceed to the following question if “no” is answered at any point.
    2. Record the results. The state of your organization’s competitive advantage, based on each resource/capability, will be determined based on the number of questions with a “yes” answer. For example, if all four questions are answered positively, then your organization is considered to have a long-term competitive advantage.
    3. Document your outputs in the CXM Stakeholder Presentation Template.

    If you want additional support, have our analysts guide your through this phase as part of an Info-Tech workshop

    2.2.1; 2.2.2 Conduct a SWOT Analysis

    Our facilitator will use a small-team approach to delve deeply into each area, identifying enablers (strengths and opportunities) and challenges (weaknesses and threats) relating to the CXM strategy.

    2.2.3; 2.2.4 Inventory your CXM applications, and assess usage and satisfaction

    Working with your core team, the facilitator will assist with building a comprehensive inventory of CXM applications that are currently in use and with identifying adjacent systems that need to be identified for integration purposes. The facilitator will work to identify high and low performing applications and analyze this data with the team during the workshop exercise.

    2.2.5 Conduct a VRIO analysis

    The facilitator will take you through a VRIO analysis to identify which of your internal technological competencies ensure, or can be leveraged to ensure, your competitiveness in the CXM market.

    Step 2.3: Create an Application Portfolio

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities

    • Shortlist and prioritize business processes for improvement and reengineering
    • Map current CXM processes
    • Identify business process owners and assign job responsibilities
    • Identify user interaction channels to extract strategic requirements
    • Aggregate and develop strategic requirements
    • Determine gaps in current and future state processes
    • Build the CXM application portfolio

    Outcomes

    CXM application portfolio map

    • Shortlist of relevant business processes
    • Current state map
    • Business process ownership assignment
    • Channel map
    • Complete list of strategic requirements

    Understand business process mapping to draft strategy requirements for marketing, sales, and customer service

    The interaction between sales, marketing, and customer service is very process-centric. Rethink sales and customer-centric workflows and map the desired workflow, imbedding the improved/reengineered process into the requirements.

    Using BPM to Capture Strategic Requirements

    Business process modeling facilitates the collaboration between the business and IT, recording the sequence of events, tasks performed, who performed them, and the levels of interaction with the various supporting applications.

    By identifying the events and decision points in the process and overlaying the people that perform the functions, the data being interacted with, and the technologies that support them, organizations are better positioned to identify gaps that need to be bridged.

    Encourage the analysis by compiling an inventory of business processes that support customer-facing operations that are relevant to achieving the overall organizational strategies.

    Outcomes

    • Operational effectiveness
    • Identification, implementation, and maintenance of reusable enterprise applications
    • Identification of gaps that can be addressed by acquisition of additional applications or process improvement/ reengineering

    INFO-TECH OPPORTUNITY

    Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.

    Leverage the APQC framework to help define your inventory of sales, marketing, and service processes

    APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

    OPERATING PROCESSES
    1.0 Develop Vision and Strategy 2.0 Develop and Manage Products and Services 3.0 Market and Sell Products and Services 4.0 Deliver Products and Services 5.0 Manage Customer Service
    MANAGEMENT AND SUPPORT SERVICES
    6.0 Develop and Manage Human Capital
    7.0 Manage Information Technology
    8.0 Manage Financial Resources
    9.0 Acquire, Construct, and Manage Assets
    10.0 Manage Enterprise Risk, Compliance, and Resiliency
    11.0 Manage External Relationships
    12.0 Develop and Manage Business Capabilities

    (APQC, 2011)

    MORE ABOUT APQC

    • APQC serves as a high-level, industry-neutral enterprise model that allows organizations to see activities from a cross-industry process perspective.
    • Sales processes have been provided up to Level 3 of the APQC framework.
    • The APQC Framework can be accessed through APQC’s Process Classification Framework.
    • Note: The framework does not list all processes within a specific organization, nor are the processes that are listed in the framework present in every organization.

    Understand APQC’s “Market and Sell Products and Services” framework

    3.0 Market and Sell Products

    3.1 Understand markets, customers, and capabilities

    • 3.1.1 Perform customer and market intelligence analysis
    • 3.1.2 Evaluate and prioritize market opportunities

    3.2 Develop marketing strategy

    • 3.2.1 Define offering and customer value proposition
    • 3.2.2 Define pricing strategy to align to value proposition
    • 3.2.3 Define and manage channel strategy

    3.3 Develop sales strategy

    • 3.3.1 Develop sales forecast
    • 3.3.2 Develop sales partner/alliance relationships
    • 3.3.3 Establish overall sales budgets
    • 3.3.4 Establish sales goals and measures
    • 3.3.5 Establish customer management measures

    3.4 Develop and manage marketing plans

    • 3.4.1 Establish goals, objectives, and metrics by products by channels/segments
    • 3.4.2 Establish marketing budgets
    • 3.4.3 Develop and manage media
    • 3.4.4 Develop and manage pricing
    • 3.4.5 Develop and manage promotional activities
    • 3.4.6 Track customer management measures
    • 3.4.7 Develop and manage packaging strategy

    3.5 Develop and manage sales plans

    • 3.5.1 Generate leads
    • 3.5.2 Manage customers and accounts
    • 3.5.3 Manage customer sales
    • 3.5.4 Manage sales orders
    • 3.5.5 Manage sales force
    • 3.5.6 Manage sales partners and alliances

    Understand APQC’s “Manage Customer Service” framework

    5.0 Manage Customer Service

    5.1 Develop customer care/customer service strategy

    • 5.1.1 Develop customer service segmentation
      • 5.1.1.1 Analyze existing customers
      • 5.1.1.2 Analyze feedback of customer needs
    • 5.1.2 Define customer service policies and procedures
    • 5.1.3 Establish service levels for customers

    5.2 Plan and manage customer service operations

    • 5.2.1 Plan and manage customer service work force
      • 5.2.1.1 Forecast volume of customer service contacts
      • 5.2.1.2 Schedule customer service work force
      • 5.2.1.3 Track work force utilization
      • 5.2.1.4 Monitor and evaluate quality of customer interactions with customer service representatives

    5.2 Plan and 5.2.3.1 Receive customer complaints 5.2.3.2 Route customer complaints 5.2.3.3 Resolve customer complaints 5.2.3.4 Respond to customer complaints manage customer service operations

    • 5.2.2 Manage customer service requests/inquiries
      • 5.2.2.1 Receive customer requests/inquiries
      • 5.2.2.2 Route customer requests/inquiries
      • 5.2.2.3 Respond to customer requests/inquiries
    • 5.2.3 Manage customer complaints
      • 5.2.3.1 Receive customer complaints
      • 5.2.3.2 Route customer complaints
      • 5.2.3.3 Resolve customer complaints
      • 5.2.3.4 Respond to customer complaints

    Leverage the APQC framework to inventory processes

    The APQC framework provides levels 1 through 3 for the “Market and Sell Products and Services” framework. Level 4 processes and beyond will need to be defined by your organization as they are more granular (represent the task level) and are often industry-specific.

    Level 1 – Category - 1.0 Develop vision and strategy (10002)

    Represents the highest level of process in the enterprise, such as manage customer service, supply chain, financial organization, and human resources.

    Level 2 – Process Group - 1.1 Define the business concept and long-term vision (10014)

    Indicates the next level of processes and represents a group of processes. Examples include perform after sales repairs, procurement, accounts payable, recruit/source, and develop sales strategy.

    Level 3 – Process - 1.1.1 Assess the external environment (10017)

    A series of interrelated activities that convert input into results (outputs); processes consume resources and require standards for repeatable performance; and processes respond to control systems that direct quality, rate, and cost of performance.

    Level 4 – Activity - 1.1.1.1 Analyze and evaluate competition (10021)

    Indicates key events performed when executing a process. Examples of activities include receive customer requests, resolve customer complaints, and negotiate purchasing contracts.

    Level 5 – Task - 12.2.3.1.1 Identify project requirements and objectives (11117)

    Tasks represent the next level of hierarchical decomposition after activities. Tasks are generally much more fine grained and may vary widely across industries. Examples include create business case and obtain funding, and design recognition and reward approaches.

    Info-Tech Insight

    Define the Level 3 processes in the context of your organization. When creating a CXM strategy, concern yourself with the interrelatedness of processes across existing departmental silos (e.g. marketing, sales, customer service). Reserve the analysis of activities (Level 4) and tasks (Level 3) for granular work initiatives involved in the implementation of applications.

    Use Info-Tech’s CXM Business Process Shortlisting Tool to prioritize processes for improvement

    2.3.1 CXM Business Process Shortlisting Tool

    The CXM Business Process Shortlisting Tool can help you define which marketing, sales, and service processes you should focus on.

    Working in concert with stakeholders from the appropriate departments, complete the short questionnaire.

    Based on validated responses, the tool will highlight processes of strategic importance to your organization.

    These processes can then be mapped, with requirements extracted and used to build the CXM application portfolio.

    INFO-TECH DELIVERABLE

    The image shows a screenshot of the Prioritize Your Business Processes for Customer Experience Management document, with sample information filled in.

    Activity: Define your organization’s top-level processes for reengineering and improvement

    2.3.2 1 hour

    Input

    • Shortlist business processes relating to customer experience (output of Tool 2.3.1)

    Output

    • Prioritized list of top-level business processes by department

    Materials

    • APQC Framework
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Inventory all business processes relating to customer experience.
    2. Customize the impacted business units and factor weightings on the scorecard below to reflect the structure and priorities of your organization.
    3. Using the scorecard, identify all processes essential to your customer experience. The scorecard is designed to determine which processes to focus on and to help you understand the impact of the scrutinized process on the different customer-centric groups across the organization.

    The image shows a chart with the headings Factor, Check If Yes, repeated. The chart lists various factors, and the Check if Yes columns are left blank.

    This image shows a chart with the headings Factor, Weights, and Scores. It lists factors, and the rest of the chart is blank.

    Current legend for Weights and Scores

    F – Finance

    H – Human Resources

    I – IT

    L – Legal

    M – Marketing

    BU1 – Business Unit 1

    BU2 – Business Unit 2

    Activity: Map top-level business processes to extract strategic requirements for the CXM application portfolio

    2.3.3 45 minutes

    Input

    • Prioritized list of top-level business processes (output of Activity 2.3.2)

    Output

    • Current state process maps
    • CXM Strategy Stakeholder Presentation

    Materials

    • APQC Framework
    • Whiteboard
    • Markers
    • Sticky notes

    Participants

    • Project Team

    Instructions

    1. List all prioritized business processes, as identified in Activity 2.3.2. Map your processes in enough detail to capture all relevant activities and system touchpoints, using the legend included in the example. Focus on Level 3 processes, as explained in the APQC framework.
    2. Record all of the major process steps on sticky notes. Arrange the sticky notes in sequential order.
    3. On a set of different colored sticky notes, record all of the systems that enable the process. Map these system touchpoints to the process steps.
    4. Draw arrows in between the steps to represent manual entry or automation.
    5. Identify effectiveness and gaps in existing processes to determine process technology requirements.
    6. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    INFO-TECH OPPORTUNITY

    Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.

    Info-Tech Insight

    Analysis of the current state is important in the context of gap analysis. It aids in understanding the discrepancies between your baseline and the future state vision, and ensures that these gaps are documented as part of the overall requirements.

    Example: map your current CXM processes to parse strategic requirements (customer acquisition)

    The image shows an example of a CXM process map, which is formatted as a flow chart, with a legend at the bottom.

    Activity: Extract requirements from your top-level business processes

    2.3.4 30 minutes

    Input

    • Current state process maps (output of Activity 2.3.3)

    Output

    • Requirements for future state mapping

    Materials

    • Info-Tech examples
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Discuss the current state of priority business processes, as mapped in Activity 2.3.3.
    2. Extract process requirements for business process improvement by asking the following questions:
    • What is the input?
    • What is the output?
    • What are the underlying risks and how can they be mitigated?
    • What conditions should be met to mitigate or eliminate each risk?
    • What are the improvement opportunities?
    • What conditions should be met to enable these opportunities?
    1. Break business requirements into functional and non-functional requirements, as outlined on this slide.

    Info-Tech Insight

    The business and IT should work together to evaluate the current state of business processes and the business requirements necessary to support these processes. Develop a full view of organizational needs while still obtaining the level of detail required to make informed decisions about technology.

    Establish process owners for each top-level process

    Identify the owners of the business processes being evaluated to extract requirements. Process owners will be able to inform business process improvement and assume accountability for reengineered or net-new processes going forward.

    Process Owner Responsibilities

    Process ownership ensures support, accountability, and governance for CXM and its supporting processes. Process owners must be able to negotiate with business users and other key stakeholders to drive efficiencies within their own process. The process owner must execute tactical process changes and continually optimize the process.

    Responsibilities include the following:

    • Inform business process improvement
    • Introduce KPIs and metrics
    • Monitor the success of the process
    • Present process findings to key stakeholders within the organization
    • Develop policies and procedures for the process
    • Implement new methods to manage the process

    Info-Tech Insight

    Identify the owners of existing processes early so you understand who needs to be involved in process improvement and reengineering. Once implemented, CXM applications are likely to undergo a series of changes. Unstructured data will multiply, the number of users may increase, administrators may change, and functionality could become obsolete. Should business processes be merged or drastically changed, process ownership can be reallocated during CXM implementation. Make sure you have the right roles in place to avoid inefficient processes and poor data quality.

    Use Info-Tech’s Process Owner Assignment Guide to aid you in choosing the right candidates

    2.3.5 Process Owner Assignment Guide

    The Process Owner Assignment Guide will ensure you are taking the appropriate steps to identify process owners for existing and net-new processes created within the scope of the CXM strategy.

    The steps in the document will help with important considerations such as key requirements and responsibilities.

    Sections of the document:

    1. Define responsibilities and level of commitment
    2. Define job requirements
    3. Receive referrals
    4. Hold formal interviews
    5. Determine performance metrics

    INFO-TECH DELIVERABLE

    Activity: Assign business process owners and identify job responsibilities

    2.3.6 30 minutes

    Input

    • Current state map (output of Activity 2.3.3)

    Output

    • Process owners assigned
    • CXM Strategy Stakeholder Presentation

    Materials

    Participants

    • Project Team

    Instructions

    1. Using Info-Tech’s Process Owner Assignment Guide, assign process owners for each process mapped out in Activity 2.3.3. To assist in doing so, answer the following questions
    • What is the level of commitment expected from each process owner?
    • How will the process owner role be tied to a formal performance appraisal?
    • What metrics can be assigned?
    • How much work will be required to train process owners?
    • Is there support staff available to assist process owners?
  • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
  • Choose the channels that will make your target customers happy – and ensure they’re supported by CXM applications

    Traditional Channels

    Face-to-Face is efficient and has a positive personalized aspect that many customers desire, be it for sales or customer service.

    Telephony (or IVR) has been a mainstay of customer interaction for decades. While not fading, it must be used alongside newer channels.

    Postal used to be employed extensively for all domains, but is now used predominantly for e-commerce order fulfillment.

    Web 1.0 Channels

    Email is an asynchronous interaction channel still preferred by many customers. Email gives organizations flexibility with queuing.

    Live Chat is a way for clients to avoid long call center wait times and receive a solution from a quick chat with a service rep.

    Web Portals permit transactions for sales and customer service from a central interface. They are a must-have for any large company.

    Web 2.0 Channels

    Social Media consists of many individual services (like Facebook or Twitter). Social channels are exploding in consumer popularity.

    HTML5 Mobile Access allows customers to access resources from their personal device through its integrated web browser.

    Dedicated Mobile Apps allow customers to access resources through a dedicated mobile application (e.g. iOS, Android).

    Info-Tech Insight

    Your channel selections should be driven by customer personas and scenarios. For example, social media may be extensively employed by some persona types (i.e. Millennials) but see limited adoption in other demographics or use cases (i.e. B2B).

    Activity: Extract requirements from your channel map

    2.3.7 30 minutes

    Input

    • Current state process maps (output of Activity 2.3.3)

    Output

    • Channel map
    • CXM Strategy Stakeholder Presentation

    Materials

    • Info-Tech examples
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Inventory which customer channels are currently used by each department.
    2. Speak with the department heads for Marketing, Sales, and Customer Service and discuss future channel usage. Identify any channels that will be eliminated or added.
    3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Business Unit Channel Use Survey

    Marketing Sales Customer Service
    Current Used? Future Use? Current Used? Future Use? Current Used? Future Use?
    Email Yes Yes No No No No
    Direct Mail Yes No No No No No
    Phone No No Yes Yes Yes Yes
    In-Person No No Yes Yes Yes No
    Website Yes Yes Yes Yes Yes Yes
    Social Channels No Yes Yes Yes No Yes

    Bring it together: amalgamate your strategic requirements for CXM technology enablement

    Discovering your organizational requirements is vital for choosing the right business-enabling initiative, technology, and success metrics. Sorting the requirements by marketing, sales, and service is a prudent mechanism for clarification.

    Strategic Requirements: Marketing

    Definition: High-level requirements that will support marketing functions within CXM.

    Examples

    • Develop a native mobile application while also ensuring that resources for your web presence are built with responsive design interface.
    • Consolidate workflows related to content creation to publish all brand marketing from one source of truth.
    • Augment traditional web content delivery by providing additional functionality such as omnichannel engagement, e-commerce, dynamic personalization, and social media functionality.

    Strategic Requirements: Sales

    Definition: High-level requirements that will support sales functions within CXM.

    Examples

    • Implement a system that reduces data errors and increases sales force efficiency by automating lead management workflows.
    • Achieve end-to-end visibility of the sales process by integrating the CRM, inventory, and order processing and shipping system.
    • Track sales force success by incorporating sales KPIs with real-time business intelligence feeds.

    Strategic Requirements: Customer Service

    Definition: High-level requirements that will support customer service functions within CXM.

    Examples

    • Provide a live chat portal that connects the customer, in real time, with the next available and qualified agent.
    • Bridge the gap between the source of truth for sales with customer service suites to ensure a consistent, end-to-end customer experience from acquisition to customer engagement and retention.
    • Use customer intelligence to track customer journeys in order to best understand and resolve customer complaints.

    Activity: Consolidate your strategic requirements for the CXM application portfolio

    2.3.8 30 minutes

    Input

    • Strategic CXM requirements (outputs of Activities 2.1.5, 2.1.6, and 2.2.2)

    Output

    • Aggregated strategic CXM requirements
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Aggregate strategic CXM requirements that have been gathered thus far in Activities 2.1.5, 2.1.6, and 2.2.2, 2.3.5, and 2.3.7.
    2. Identify and rectify any obvious gaps in the existing set of strategic CXM requirements. To do so, consider the overall corporate and CXM strategy: are there any objectives that have not been addressed in the requirements gathering process?
    3. De-duplicate the list. Prioritize the aggregated/augmented list of CXM requirements as “high/critical,” “medium/important,” or “low/desirable.” This will help manage the relative importance and urgency of different requirements to itemize respective initiatives, resources, and the time in which they need to be addressed. In completing the prioritization of requirements, consider the following:
    • Requirements prioritization must be completed in collaboration with all key stakeholders (across the business and IT). Stakeholders must ask themselves:
      • What are the consequences to the business objectives if this requirement is omitted?
      • Is there an existing system or manual process/workaround that could compensate for it?
      • What business risk is being introduced if a particular requirement cannot be implemented right away?
  • Document your outputs in the CXM Strategic Stakeholder Presentation Template.
  • Info-Tech Insight

    Strategic CXM requirements will be used to prioritize specific initiatives for CXM technology enablement and application rollout. Ensure that IT, the business, and executive management are all aligned on a consistent and agreed upon set of initiatives.

    Burberry digitizes the retail CX with real-time computing to bring consumers back to the physical storefront

    CASE STUDY

    Industry Consumer Goods, Clothing

    Source Retail Congress, 2017

    Burberry London

    Situation

    Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.

    Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.

    Technology Strategy

    RFID tags were attached to products to trigger interactive videos on the store’s screens in the common areas or in a fitting room. Consumers are to have instant access to relevant product combinations, ranging from craftsmanship information to catwalk looks. This is equivalent to the rich, immediate information consumers have grown to expect from the online shopping experience.

    Another layer of Burberry’s added capabilities includes in-memory-based analytics to gather and analyze data in real-time to better understand customers’ desires. Burberry builds customer profiles based on what items the shoppers try on from the RFID-tagged garments. Although this requires customer privacy consent, customers are willing to provide personal information to trusted brands.

    This program, called “Customer 360,” assisted sales associates in providing data-driven shopping experiences that invite customers to digitally share their buying history and preferences via their tablet devices. As the data is stored in Burberry’s customer data warehouse and accessed through an application such as CRM, it is able to arm sales associates with personal fashion advice on the spot.

    Lastly, the customer data warehouse/CRM application is linked to Burberry’s ERP system and other custom applications in a cloud environment to achieve real-time inventory visibility and fulfillment.

    Burberry digitizes the retail CX with real-time computing to bring consumers back to the physical storefront (cont'd)

    CASE STUDY

    Industry Consumer Goods, Clothing

    Source Retail Congress, 2017

    Burberry London

    Situation

    Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.

    Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.

    The Results

    Burberry achieved one of the most personalized retail shopping experiences. Immediate personal fashion advice using customer data is only one component of the experience. Not only are historic purchases and preference data analyzed, a customer’s social media posts and fashion industry trend data is proactively incorporated into the interactions between the sales associate and the customer.

    Burberry achieved CEO Angela Ahrendts’ vision of “Burberry World,” in which the brand experience is seamlessly integrated across channels, devices, retail locations, products, and services.

    The organizational alignment between Sales, Marketing, and IT empowered employees to bring the Burberry brand to life in unique ways that customers appreciated and were willing to advocate.

    Burberry is now one of the most beloved and valuable luxury brands in the world. The brand tripled sales in five years, became one of the leading voices on trends, fashion, music, and beauty while redefining what top-tier customer experience should be both digitally and physically.

    Leverage both core CRM suites and point solutions to create a comprehensive CXM application portfolio

    The debate between best-of-breed point solutions versus comprehensive CRM suites is ongoing. There is no single best answer. In most cases, an effective portfolio will include both types of solutions.

    • When the CRM market first evolved, vendors took a heavy “module-centric” approach – offering basic suites with the option to add a number of individual modules. Over time, vendors began to offer suites with a high degree of out-of-the-box functionality. The market has now witnessed the rise of powerful point solutions for the individual business domains.
    • Point solutions augment, rather than supplant, the functionality of a CRM suite in the mid-market to large enterprise context. Point solutions do not offer the necessary spectrum of functionality to take the place of a unified CRM suite.
    • Point solutions enhance aspects of CRM. For example, most CRM vendors have yet to provide truly impressive social media capabilities. An organization seeking to dominate the social space should consider purchasing a social media management platform to address this deficit in their CRM ecosystem.

    Customer Relationship Management (CRM)

    Social Media Management Platform (SMMP)

    Field Sales/Service Automation (FSA)

    Marketing Management Suites

    Sales Force Automation

    Email Marketing Tools

    Lead Management Automation (LMA)

    Customer Service Management Suites

    Customer Intelligence Systems

    Don’t adopt multiple point solutions without a genuine need: choose domains most in need of more functionality

    Some may find that the capabilities of a CRM suite are not enough to meet their specific requirements: supplementing a CRM suite with a targeted point solution can get the job done. A variety of CXM point solutions are designed to enhance your business processes and improve productivity.

    Sales

    Sales Force Automation: Automatically generates, qualifies, tracks, and contacts leads for sales representatives, minimizing time wasted on administrative duties.

    Field Sales: Allows field reps to go through the entire sales cycle (from quote to invoice) while offsite.

    Sales Compensation Management: Models, analyzes, and dispenses payouts to sales representatives.

    Marketing

    Social Media Management Platforms (SMMP): Manage and track multiple social media services, with extensive social data analysis and insight capabilities.

    Email Marketing Bureaus: Conduct email marketing campaigns and mine results to effectively target customers.

    Marketing Intelligence Systems: Perform in-depth searches on various data sources to create predictive models.

    Service

    Customer Service Management (CSM): Manages the customer support lifecycle with a comprehensive array of tools, usually above and beyond what’s in a CRM suite.

    Customer Service Knowledge Management (CSKM): Advanced knowledgebase and resolution tools.

    Field Service Automation (FSA): Manages customer support tickets, schedules work orders, tracks inventory and fleets, all on the go.

    Info-Tech Insight

    CRM and point solution integration is critical. A best-of-breed product that poorly integrates with your CRM suite compromises the value generated by the combined solution, such as a 360-degree customer view. Challenge point solution vendors to demonstrate integration capabilities with CRM packages.

    Refer to your use cases to decide whether to add a dedicated point solution alongside your CRM suite

    Know your end state and what kind of tool will get you there. Refer to your strategic requirements to evaluate CRM and point solution feature sets.

    Standalone CRM Suite

    Sales Conditions: Need selling and lead management capabilities for agents to perform the sales process, along with sales dashboards and statistics.

    Marketing or Communication Conditions: Need basic campaign management and ability to refresh contact records with information from social networks.

    Member Service Conditions: Need to keep basic customer records with multiple fields per record and basic channels such as email and telephony.

    Add a Best-of-Breed or Point Solution

    Environmental Conditions: An extensive customer base with many different interactions per customer along with industry specific or “niche” needs. Point solutions will benefit firms with deep needs in specific feature areas (e.g. social media or field service).

    Sales Conditions: Lengthy sales process and account management requirements for assessing and managing opportunities – in a technically complex sales process.

    Marketing Conditions: Need social media functionality for monitoring and social property management.

    Customer Service Conditions: Need complex multi-channel service processes and/or need for best-of-breed knowledgebase and service content management.

    Info-Tech Insight

    The volume and complexity of both customers and interactions have a direct effect on when to employ just a CRM suite and when to supplement with a point solution. Check to see if your CRM suite can perform a specific business requirement before deciding to evaluate potential point solutions.

    Use Info-Tech’s CXM Portfolio Designer to create an inventory of high-value customer interaction applications

    2.3.9 CXM Portfolio Designer

    The CXM Portfolio Designer features a set of questions geared toward understanding your needs for marketing, sales, and customer service enablement.

    These results are scored and used to suggest a comprehensive solution-level set of enterprise applications for CXM that can drive your application portfolio and help you make investment decisions in different areas such as CRM, marketing management, and customer intelligence.

    Sections of the tool:

    1. Introduction
    2. Customer Experience Management Questionnaire
    3. Business Unit Recommendations
    4. Enterprise-Level Recommendations

    INFO-TECH DELIVERABLE

    Understand the art of the possible and how emerging trends will affect your application portfolio (1)

    Cloud

    • The emergence and maturation of cloud technologies has broken down the barriers of software adoption.
    • Cloud has enabled easy-to-implement distributed sales centers for enterprises with global or highly fragmented workforces.
    • Cloud offers the agility, scalability, and flexibility needed to accommodate dynamic, evolving customer requirements while minimizing resourcing strain on IT and sales organizations.
    • It is now easier for small to medium enterprises to acquire and implement advanced sales capabilities to compete against larger competitors in a business environment where the need for business agility is key.
    • Although cost and resource reduction is a prominent view of the impact of cloud computing, it is also seen as an agile way to innovate and deliver a product/service experience that customers are looking for – the key to competitive differentiation.

    Mobile

    • Smartphones and other mobile devices were adopted faster than the worldwide web in the late 1990s, and the business and sales implications of widespread adoption cannot be ignored – mobile is changing how businesses operate.
      • Accenture’s Mobility Research Report states that 87% of companies in the study have been guided by a formal mobility strategy – either one that spans the enterprise or for specific business functions.
    • Mobile is now the first point of interaction with businesses. With this trend, gaining visibility into customer insights with mobile analytics is a top priority for organizations.
    • Enterprises need to develop and optimize mobile experiences for internal salespeople and customers alike as part of their sales strategy – use mobile to enable a competitive, differentiated sales force.
    • The use of mobile platforms by sales managers is becoming a norm. Sales enablement suites should support real-time performance metrics on mobile dashboards.

    Understand the art of the possible and how emerging trends will affect your application portfolio (2)

    Social

    • The rise of social networking brought customers together. Customers are now conversing with each other over a wide range of community channels that businesses neither own nor control.
      • The Power Shift: The use of social channels empowered customers to engage in real-time, unstructured conversations for the purpose of product/service evaluations. Those who are active in social environments come to wield considerable influence over the buying decisions of other prospects and customers.
    • Organizations need to identify the influencers and strategically engage them as well as developing an active presence in social communities that lead to sales.
    • Social media does have an impact on sales, both B2C and B2B. A study conducted in 2012 by Social Centered Selling states that 72.6% of sales people using social media as part of their sales process outperformed their peers and exceeded their quota 23% more often (see charts at right).

    The image shows two bar graphs, the one on top titled Achieving Quota: 2010-2012 and the one below titled Exceeding Quota: 2010-2012.

    (Social Centered Learning, n.d.)

    Understand the art of the possible and how emerging trends will affect your application portfolio (3)

    Internet of Things

    • Definition: The Internet of Things (IoT) is the network of physical objects accessed through the internet. These objects contain embedded technology to interact with internal states or the external environment.
    • Why is this interesting?
      • IoT will make it possible for everybody and everything to be connected at all times, processing information in real time. The result will be new ways of making business and sales decisions supported by the availability of information.
      • With ubiquitous connectivity, the current product design-centric view of consumers is changing to one of experience design that aims to characterize the customer relationship with a series of integrated interaction touchpoints.
      • The above change contributes to the shift in focus from experience and will mean further acceleration of the convergence of customer-centric business functions. IoT will blur the lines between marketing, sales, and customer service.
      • Products or systems linked to products are capable of self-operating, learning, updating, and correcting by analyzing real-time data.
      • Take for example, an inventory scale in a large warehouse connected to the company’s supply chain management (SCM) system. When a certain inventory weight threshold is reached due to outgoing shipments, the scale automatically sends out a purchase requisition to restock inventory levels to meet upcoming demand.
    • The IoT will eventually begin to transform existing business processes and force organizations to fundamentally rethink how they produce, operate, and service their customers.

    The image shows a graphic titled The Connected Life by 2020, and shows a number of statistics on use of connected devices over time.

    For categories covered by existing applications, determine the disposition for each app: grow it or cut it loose

    Use the two-by-two matrix below to structure your optimal CXM application portfolio. For more help, refer to Info-Tech’s blueprint, Use Agile Application Rationalization Instead of Going Big Bang.

    1

    0

    Richness of Functionality

    INTEGRATE RETAIN
    1
    REPLACE REPLACE OR ENHANCE

    0

    Degree of Integration

    Integrate: The application is functionally rich, so spend time and effort integrating it with other modules by building or enhancing interfaces.

    Retain: The application satisfies both functionality and integration requirements, so it should be considered for retention.

    Replace/Enhance: The module offers poor functionality but is well integrated with other modules. If enhancing for functionality is easy (e.g. through configuration or custom development), consider enhancement or replace it.

    Replace: The application neither offers the functionality sought nor is it integrated with other modules, and thus should be considered for replacement.

    Activity: Brainstorm the art of the possible, and build and finalize the CXM application portfolio

    2.3.10 1-2 hours

    Input

    • Process gaps identified (output of Activity 2.3.9)

    Output

    • CXM application portfolio
    • CXM Strategy Stakeholder Presentation

    Materials

    Participants

    • Project Team

    Instructions

    1. Review the complete list of strategic requirements identified in the preceding exercises, as well as business process maps.
    2. Identify which application would link to which process (e.g. customer acquisition, customer service resolution, etc.).
    3. Use Info-Tech’s CXM Portfolio Designer to create an inventory of high-value customer interaction applications.
    4. Define rationalization and investment areas.
    5. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Brainstorming the Art of the Possible

    Application Gap Satisfied Related Process Number of Linked Requirements Do we have the system? Priority
    LMA
    • Lead Generation
    • Social Lead Management
    • CRM Integration
    Sales 8 No Business Critical
    Customer Intelligence
    • Web Analytics
    • Customer Journey Tracking
    Customer Service 6 Yes Business Enabling
    ... ... ... ... ... ...

    Use Info-Tech’s comprehensive reports to make granular vendor selection decisions

    Now that you have developed the CXM application portfolio and identified areas of new investment, you’re well positioned to execute specific vendor selection projects. After you have built out your initiatives roadmap in phase 3, the following reports provide in-depth vendor reviews, feature guides, and tools and templates to assist with selection and implementation.

    Info-Tech Insight

    Not all applications are created equally well for each use case. The vendor reports help you make informed procurement decisions by segmenting vendor capabilities among major use cases. The strategic requirements identified as part of this project should be used to select the use case that best fits your needs.

    If you want additional support, have our analyst guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    2.3.2; 2.3.3 Shortlist and map the key top-level business processes

    Based on experience working with organizations in similar verticals, the facilitator will help your team map out key sample workflows for marketing, sales, and customer service.

    2.3.6 Create your strategic requirements for CXM

    Drawing on the preceding exercises, the facilitator will work with the team to create a comprehensive list of strategic requirements that will be used to drive technology decisions and roadmap initiatives.

    2.3.10 Create and finalize the CXM application portfolio

    Using the strategic requirements gathered through internal, external, and technology analysis up to this point, a facilitator will assist you in assembling a categorical technology application portfolio to support CXM.

    Step 2.4: Develop Deployment Best Practices

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities:

    • Develop a CXM integration map
    • Develop a mitigation plan for poor quality customer data
    • Create a framework for end-user adoption of CXM applications

    Outcomes:

    • CXM application portfolio integration map
    • Data quality preservation plan
    • End-user adoption plan

    Develop an integration map to specify which applications will interface with each other

    Integration is paramount: your CXM application portfolio must work as a unified face to the customer. Create an integration map to reflect a system of record and the exchange of data.

    • CRM
      • ERP
      • Telephony Systems (IVR, CTI)
      • Directory Services
      • Email
      • Content Management
      • Point Solutions (SMMP, MMS)

    The points of integration that you’ll need to establish must be based on the objectives and requirements that have informed the creation of the CXM application portfolio. For instance, achieving improved customer insights would necessitate a well-integrated portfolio with customer interaction point solutions, business intelligence tools, and customer data warehouses in order to draw the information necessary to build insight. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).

    Info-Tech Insight

    If the CXM application portfolio is fragmented, it will be nearly impossible to build a cohesive view of the customer and deliver a consistent customer experience. Points of integration (POIs) are the junctions between the applications that make up the CXM portfolio. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments. Be sure to include enterprise applications that are not included in the CXM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

    After identifying points of integration, profile them by business significance, complexity, and investment required

    • After enumerating points of integration between the CRM platform and other CXM applications and data sources, profile them by business significance and complexity required to determine a rank-ordering of priorities.
    • Points of integration that are of high business significance with low complexity are your must do’s – these are your quick wins that deliver maximum value without too much cost. This is typically the case when integrating a vendor-to-vendor solution with available native connectors.
    • On the opposite end of the spectrum are your POIs that will require extensive work to deliver but offer negligible value. These are your should not do’s – typically, these are niche requests for integration that will only benefit the workflows of a small (and low priority) group of end users. Only accommodate them if you have slack time and budget built into your implementation timeline.

    The image shows a square matrix with Point of Integration Value Matrix in the centre. On the X-axis is Business Significance, and on the Y-axis is POI complexity. In the upper left quadrant is Should Not Do, upper right is Should Do, lower left is Could Do, and lower right is Must do.

    "Find the absolute minimum number of ‘quick wins’ – the POIs you need from day one that are necessary to keep end users happy and deliver value." – Maria Cindric, Australian Catholic University Source: Interview

    Activity: Develop a CXM application integration map

    2.4.1 1 hour

    Input

    • CXM application portfolio (output of Activity 2.3.10)

    Output

    • CXM application portfolio integration map
    • CXM Strategy Stakeholder Presentation

    Materials

    • Sticky notes
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. On sticky notes, record the list of applications that comprise the CXM application portfolio (built in Activity 2.3.10) and all other relevant applications. Post the sticky notes on a whiteboard so you can visualize the portfolio.
    2. Discuss the key objectives and requirements that will drive the integration design of the CXM application portfolio.
    3. As deemed necessary by step 2, rearrange the sticky notes and draw connecting arrows between applications to reflect their integration. Allow the point of the arrow to indicate direction of data exchanges.
    4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Mapping the Integration of CXM Applications

    The image shows several yellow rectangles with text in them, connected by arrows.

    Plug the hole and bail the boat – plan to be preventative and corrective with customer data quality initiatives

    Data quality is king: if your customer data is garbage in, it will be garbage out. Enable strategic CXM decision making with effective planning of data quality initiatives.

    Identify and Eliminate Dead Weight

    Poor data can originate in the firm’s system of record, which is typically the CRM system. Custom queries, stored procedures, or profiling tools can be used to assess the key problem areas.

    Loose rules in the CRM system lead to records of no significant value in the database. Those rules need to be fixed, but if changes are made before the data is fixed, users could encounter database or application errors, which will reduce user confidence in the system.

    • Conduct a data flow analysis: map the path that data takes through the organization.
    • Use a mass cleanup to identify and destroy dead weight data. Merge duplicates either manually or with the aid of software tools. Delete incomplete data, taking care to reassign related data.
    • COTS packages typically allow power users to merge records without creating orphaned records in related tables, but custom-built applications typically require IT expertise.

    Create and Enforce Standards & Policies

    Now that the data has been cleaned, protect the system from relapsing.

    Work with business users to find out what types of data require validation and which fields should have changes audited. Whenever possible, implement drop-down lists to standardize values and make programming changes to ensure that truncation ceases.

    • Truncated data is usually caused by mismatches in data structures during either one-time data loads or ongoing data integrations.
    • Don’t go overboard on assigning required fields – users will just put key data in note fields.
    • Discourage the use of unstructured note fields: the data is effectively lost unless it gets subpoenaed.
    • To specify policies, use Info-Tech’s Master Data Record Tool.

    Profile your customer and sales-related data

    Applications are a critical component of how IT supports Sales, but IT also needs to help Sales keep its data current and accurate. Conducting a sales data audit is critical to ensure Sales has the right information at the right time.

    Info-Tech Insight

    Data is king. More than ever, having accurate data is essential for your organization to win in hyper-competitive marketplaces. Prudent current state analysis looks at both the overall data model and data architecture, as well as assessing data quality within critical sales-related repositories. As the amount of customer data grows exponentially due to the rise of mobility and the Internet of Things, you must have a forward-looking data model and data marts/customer data warehouse to support sales-relevant decisions.

    • A current state analysis for sales data follows a multi-step process:
      • Determine the location of all sales-relevant and customer data – the sales data inventory. Data can reside in applications, warehouses, and documents (e.g. Excel and Access files) – be sure to take a holistic approach.
    • For each data source, assess data quality across the following categories:
      • Completeness
      • Currency (Relevancy)
      • Correctness
      • Duplication
    • After assessing data quality, determine which repositories need the most attention by IT and Sales. We will look at opportunities for data consolidation later in the blueprint.

    INFO-TECH OPPORTUNITY

    Refer to Info-Tech’s Develop a Master Data Management Strategy and Roadmap blueprint for further reference and assistance in data management for your sales-IT alignment.

    Activity: Develop a mitigation plan for poor quality customer data

    2.4.2 30 minutes

    Input

    • List of departments involved in maintenance of CXM data

    Output

    • Data quality preservation plan
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Inventory a list of departments that will be interacting directly with CXM data.
    2. Identify data quality cleansing and preservation initiatives, such as those in previous examples.
    3. Assign accountability to an individual in the department as a data steward. When deciding on a data steward, consider the following:
    • Data stewards are designated full-time employees who serve as the go-to resource for all issues pertaining to data quality, including keeping a particular data silo clean and free of errors.
    • Data stewards are typically mid-level managers in the business (not IT), preferably with an interest in improving data quality and a relatively high degree of tech-savviness.
    • Data stewards can sometimes be created as a new role with a dedicated FTE, but this is not usually cost effective for small and mid-sized firms.
    • Instead, diffuse the steward role across several existing positions, including one for CRM and other marketing, sales, and service applications.
  • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
  • Example: Data Steward Structure

    Department A

    • Data Steward (CRM)
    • Data Steward (ERP)

    Department B

    • Data Steward (All)

    Department C

    • Data Steward (All)

    Determine if a customer data warehouse will add value to your CXM technology-enablement strategy

    A customer data warehouse (CDW) “is a subject-oriented, integrated, time-variant, non-volatile collection of data used to support the strategic decision-making process across marketing, sales, and service. It is the central point of data integration for customer intelligence and is the source of data for the data marts, delivering a common view of customer data” (Corporate Information Factory, n.d.).

    Analogy

    CDWs are like a buffet. All the food items are in the buffet. Likewise, your corporate data sources are centralized into one repository. There are so many food items in a buffet that you may need to organize them into separate food stations (data marts) for easier access.

    Examples/Use Cases

    • Time series analyses with historical data
    • Enterprise level, common view analyses
    • Integrated, comprehensive customer profiles
    • One-stop repository of all corporate information

    Pros

    • Top-down architectural planning
    • Subject areas are integrated
    • Time-variant, changes to the data are tracked
    • Non-volatile, data is never over-written or deleted

    Cons

    • A massive amount of corporate information
    • Slower delivery
    • Changes are harder to make
    • Data format is not very business friendly

    Activity: Assess the need for a customer data warehouse

    2.4.3. 30 minutes

    Input

    • List of data sources
    • Data inflows and outflows

    Output

    • Data quality preservation plan
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Create a shortlist of customer data sources.
    2. Profile the integration points that are necessary to support inflows and outflows of customer data.
    3. Ask the following questions around the need for a CDW based on these data sources and points of integration:
    • What is the volume of customer information that needs to be stored? The greater the capacity, the more likely that you should build a dedicated CDW.
    • How complex is the data? The more complex the data, the greater the need for a CDW.
    • How often will data interchange happen between various applications and data sources? The greater and more frequent the interchange, the greater the need for a CDW.
    • What are your organizational capabilities for building a CDW? Do you have the resources in-house to create a CDW at this time?
  • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
  • INFO-TECH OPPORTUNITY

    Refer to Info-Tech’s Build an Agile Data Warehouse blueprint for more information on building a centralized and integrated data warehouse.

    Create a plan for end-user training on new (or refocused) CXM applications and data quality processes

    All training modules will be different, but some will have overlapping areas of interest.

    – Assign Project Evangelists – Analytics Training – Mobile Training

    Application Training

    • Customer Service - Assign Project Evangelists – Analytics Training – Mobile Training
      • Focus training on:
        • What to do with inbound tickets.
        • Routing and escalation features.
        • How to use knowledge management features effectively.
        • Call center capabilities.
    • Sales – Assign Project Evangelists – Analytics Training – Mobile Training
      • Focus training on:
        • Recording of opportunities, leads, and deals.
        • How to maximize sales with sales support decision tree.
    • Marketing - Assign Project Evangelists – Analytics Training
      • Focus training on:
        • Campaign management features.
        • Social media monitoring and engagement capabilities.
    • IT
      • Focus training on:
        • Familiarization with the software.
        • Software integration with other enterprise applications.
        • The technical support needed to maintain the system in the future.

    Info-Tech Insight

    Train customers too. Keep the customer-facing sales portals simple and intuitive, have clear explanations/instructions under important functions (e.g. brief directions on how to initiate service inquiries), and provide examples of proper uses (e.g. effective searches). Make sure customers are aware of escalation options available to them if self-service falls short.

    Ensure adoption with a formal communication process to keep departments apprised of new application rollouts

    The team leading the rollout of new initiatives (be they applications, new governance structures, or data quality procedures) should establish a communication process to ensure management and users are well informed.

    CXM-related department groups or designated trainers should take the lead and implement a process for:

    • Scheduling application platform/process rollout/kick-off meetings.
    • Soliciting preliminary input from the attending groups to develop further training plans.
    • Establishing communication paths and the key communication agents from each department who are responsible for keeping lines open moving forward.

    The overall objective for inter-departmental kick-off meetings is to confirm that all parties agree on certain key points and understand alignment rationale and new sales app or process functionality.

    The kick-off process will significantly improve internal communications by inviting all affected internal IT groups, including business units, to work together to address significant issues before the application process is formally activated.

    The kick-off meeting(s) should encompass:

    • Target business-user requirements
    • The high-level application overview
    • Tangible business benefits of alignment
    • Special consideration needs
    • Other IT department needs
    • Target quality of service (QoS) metrics

    Info-Tech Insight

    Determine who in each department will send out a message about initiative implementation, the tone of the message, the medium, and the delivery date.

    Construct a formal communication plan to engage stakeholders through structured channels

    Tangible Elements of a Communications Plan

    • Stakeholder Group Name
    • Stakeholder Description
    • Message
    • Concerns Relative to Application Maintenance
    • Communication Medium
    • Role Responsible for Communication
    • Frequency
    • Start and End Date

    Intangible Elements of a Communications Plan

    • Establish biweekly meetings with representatives from sales functional groups, who are tasked with reporting on:
      • Benefits of revised processes
      • Metrics of success
      • Resource restructuring
    • Establish a monthly interdepartmental meeting, where all representatives from sales and IT leadership discuss pressing bug fixes and minor process improvements.
    • Create a webinar series, complete with Q&A, so that stakeholders can reference these changes at their leisure.

    Info-Tech Insight

    Every piece of information that you give to a stakeholder that is not directly relevant to their interests is a distraction from your core message. Always remember to tailor the message, medium, and timing accordingly.

    Carry the CXM value forward with linkage and relationships between sales, marketing, service, and IT

    Once the sales-IT alignment committees have been formed, create organizational cadence through a variety of formal and informal gatherings between the two business functions.

    • Organizations typically fall in one of three maturity stages: isolation, collaboration, or synergy. Strive to achieve business-technology synergy at the operational level.
    • Although collaboration cannot be mandated, it can be facilitated. Start with a simple gauge of the two functions’ satisfaction with each other, and determine where and how inter-functional communication and synergy can be constructed.

    Isolation

    The image shows four shapes, with the words IT, Sales, Customer Service, and Marketing in them.

    • Point solutions are implemented on an ad-hoc basis by individual departments for specific projects.
    • Internal IT is rarely involved in these projects from beginning to end.

    Collaboration

    The image features that same four shapes and text from the previous image, but this time they are connected by dotted lines.

    • There is a formal cross-departmental effort to integrate some point solutions.
    • Internal IT gets involved to integrate systems and then support system interactions.

    Synergy

    The image features the same shapes and text from previous instances, except the shapes are now connect by solid lines and the entire image is surrounded by dotted lines.

    • Cross-functional, business technology teams are established to work on IT-enabled revenue generation initiatives.
    • Team members are collocated if possible.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    2.4.1 Develop a CXM application integration map

    Using the inventory of existing CXM-supporting applications and the newly formed CXM application portfolio as inputs, your facilitator will assist you in creating an integration map of applications to establish a system of record and flow of data.

    2.4.2 Develop a mitigation plan for poor quality customer data

    Our facilitator will educate your stakeholders on the importance of quality data and guide you through the creation of a mitigation plan for data preservation.

    2.4.3 Assess the need for a customer data warehouse

    Addressing important factors such as data volume, complexity, and flow, a facilitator will help you assess whether or not a customer data warehouse for CXM is the right fit for your organization.

    Phase 3

    Finalize the CXM Framework

    Build a Strong Technology Foundation for Customer Experience Management

    Phase 3 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Finalize the CXM Framework

    Proposed Time to Completion: 1 week

    Step 3.1: Create an Initiative Rollout Plan

    Start with an analyst kick-off call:

    • Discuss strategic requirements and the associated application portfolio that has been proposed.

    Then complete these activities…

    • Initiatives prioritization

    With these tools & templates:

    • CXM Strategy Stakeholder Presentation Template

    Step 3.2: Confirm and Finalize the CXM Blueprint

    Review findings with analyst:

    • Discuss roadmap and next steps in terms of rationalizing and implementing specific technology-centric initiatives or rollouts.

    Then complete these activities…

    • Confirm stakeholder strategy presentation

    With these tools & templates:

    • CXM Strategy Stakeholder Presentation Template

    Phase 3 Results & Insights:

    • Initiatives roadmap

    Step 3.1: Create an Initiative Rollout Plan

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities:

    • Create a risk management plan
    • Brainstorm initiatives for CXM roadmap
    • Identify dependencies and enabling projects for your CXM roadmap
    • Complete the CXM roadmap

    Outcomes:

    • Risk management plan
    • CXM roadmap
      • Quick-win initiatives

    A CXM technology-enablement roadmap will provide smooth and timely implementation of your apps/initiatives

    Creating a comprehensive CXM strategy roadmap reduces the risk of rework, misallocation of resources, and project delays or abandonment.

    • People
    • Processes
    • Technology
    • Timeline
    • Tasks
    • Budget

    Benefits of a Roadmap

    1. Prioritize execution of initiatives in alignment with business, IT, and needs.
    2. Create clearly defined roles and responsibilities for IT and business stakeholders.
    3. Establish clear timelines for rollout of initiatives.
    4. Identify key functional areas and processes.
    5. Highlight dependencies and prerequisites for successful deployment.
    6. Reduce the risk of rework due to poor execution.

    Implement planning and controls for project execution

    Risk Management

    • Track risks associated with your CXM project.
    • Assign owners and create plans for resolving open risks.
    • Identify risks associated with related projects.
    • Create a plan for effectively communicating project risks.

    Change Management

    • Brainstorm a high-level training plan for various users of the CXM.
    • Create a communication plan to notify stakeholders and impacted users about the tool and how it will alter their workday and performance of role activities.
    • Establish a formal change management process that is flexible enough to meet the demands for change.

    Project Management

    • Conduct a post-mortem to evaluate the completion of the CXM strategy.
    • Design the project management process to be adaptive in nature.
    • Communication is key to project success, whether it is to external stakeholders or internal project team members..
    • Review the project’s performance against metrics and expectations.

    INFO-TECH OPPORTUNITIES

    Optimize the Change Management Process

    You need to design a process that is flexible enough to meet demand for change and strict enough to protect the live environment from change-related incidents.

    Create Project Management Success

    Investing time up front to plan the project and implementing best practices during project execution to ensure the project is delivered with the planned outcome and quality is critical to project success.

    Activity: Create a risk management plan

    3.1.1 45 minutes

    Input

    • Inventory of risks

    Output

    • Risk management plan
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Create a list of possible risks that may hamper the progress of your CXM project.
    2. Classify risks as strategy-based, related to planning, or systems-based, related to technology.
    3. Brainstorm mitigation strategies to overcome each listed risk.
    4. On a score of 1 to 3, determine the impact of each risk on the success of the project.
    5. On a score of 1 to 3, determine the likelihood of the occurrence for each risk.
    6. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Constructing a Risk Management Plan

    Risk Impact Likelihood Mitigation Effort
    Strategy Risks Project over budget
    • Detailed project plan
    • Pricing guarantees
    Inadequate content governance
    System Risks Integration with additional systems
    • Develop integration plan and begin testing integration methods early in the project
    .... ... ... ...

    Likelihood

    1 – High/ Needs Focus

    2 – Can Be Mitigated

    3 - Unlikely

    Impact

    1 - High Risk

    2 - Moderate Risk

    3 - Minimal Risk

    Prepare contingency plans to minimize time spent handling unexpected risks

    Understanding technical and strategic risks can help you establish contingency measures to reduce the likelihood that risks will occur. Devise mitigation strategies to help offset the impact of risks if contingency measures are not enough.

    Remember

    The biggest sources of risk in a CXM strategy are lack of planning, poorly defined requirements, and lack of governance.

    Apply the following mitigation tips to avoid pitfalls and delays.

    Risk Mitigation Tips

    • Upfront planning
    • Realistic timelines
    • Resource support
    • Change management
    • Executive sponsorship
    • Sufficient funding
    • Expectation setting
    1. Project Starts
    • Expectations are high
  • Project Workload Increases
    • Expectations are high
  • Pit of Despair
    • Why are we doing this?
  • Project Nears Close
    • Benefits are being realized
  • Implementation is Completed
    • Learning curve dip
  • Standardization & Optimization
    • Benefits are high
  • Identify factors to complete your CXM initiatives roadmap

    Completion of initiatives for your CXM project will be contingent upon multiple variables.

    Defining Dependencies

    Initiative complexity will define the need for enabling projects. Create a process to define dependencies:

    1. Enabling projects: complex prerequisites.
    2. Preceding tasks: direct and simplified assignments.

    Establishing a Timeline

    • Assign realistic timelines for each initiative to ensure smooth progress.
    • Use milestones and stage gates to track the progress of your initiatives and tasks.

    Defining Importance

    • Based on requirements gathering, identify the importance of each initiative to your marketing department.
    • Each initiative can be ranked high, medium, or low.

    Assigning Ownership

    • Owners are responsible for on-time completion of their assigned initiatives.
    • Populate a RACI chart to ensure coverage of all initiatives.

    Complex....Initiative

    • Enabling Project
      • Preceding Task
      • Preceding Task
    • Enabling Project
      • Preceding Task
      • Preceding Task

    Simple....Initiative

    • Preceding Task
    • Preceding Task
    • Preceding Task

    Activity: Brainstorm CXM application initiatives for implementation in alignment with business needs

    3.1.2 45 minutes

    Input

    • Inventory of CXM initiatives

    Output

    • Prioritized and quick-win initiatives
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. As a team, identify and list CXM initiatives that need to be addressed.
    2. Plot the initiatives on the complexity-value matrix to determine priority.
    3. Identify quick wins: initiatives that can realize quick benefits with little effort.
    4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Importance-Capability Matrix

    The image shows a matrix, with Initiative Complexity on the X-axis, and Business Value on the Y-axis. There are circle of different sizes in the matrix.

    Pinpoint quick wins: high importance, low effort initiatives.

    The size of each plotted initiative must indicate the effort or the complexity and time required to complete.
    Top Right Quadrant Strategic Projects
    Top Left Quadrant Quick Wins
    Bottom Right Quadrant Risky Bets
    Bottom Left Quadrant Discretionary Projects

    Activity: Identify any dependencies or enabling projects for your CXM roadmap

    3.1.3 1 hour

    Input

    • Implementation initiatives
    • Dependencies

    Output

    • CXM project dependencies

    Materials

    • Sticky notes
    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Using sticky notes and a whiteboard, have each team member rank the compiled initiatives in terms of priority.
    2. Determine preceding tasks or enabling projects that each initiative is dependent upon.
    3. Determine realistic timelines to complete each quick win, enabling project, and long-term initiative.
    4. Assign an owner for each initiative.

    Example: Project Dependencies

    Initiative: Omnichannel E-Commerce

    Dependency: WEM Suite Deployment; CRM Suite Deployment; Order Fulfillment Capabilities

    Activity: Complete the implementation roadmap

    3.1.4 30 minutes

    Input

    • Implementation initiatives
    • Dependencies

    Output

    • CXM Roadmap
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Establish time frames to highlight enabling projects, quick wins, and long-term initiatives.
    2. Indicate the importance of each initiative as high, medium, or low based on the output in Activity 3.1.2.
    3. Assign each initiative to a member of the project team. Each owner will be responsible for the execution of a given initiative as planned.
    4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Example: Importance-Capability Matrix

    Importance Initiative Owner Completion Date
    Example Projects High Gather business requirements. Project Manager MM/DD/YYYY
    Quick Wins
    Long Term Medium Implement e-commerce across all sites. CFO & Web Manager MM/DD/YYYY

    Importance

    • High
    • Medium
    • Low

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1.1 Create a risk management plan

    Based on the workshop exercises, the facilitator will work with the core team to design a priority-based risk mitigation plan that enumerates the most salient risks to the CXM project and addresses them.

    3.1.2; 3.1.3; 3.1.4 Identify initiative dependencies and create the CXM roadmap

    After identifying dependencies, our facilitators will work with your IT SMEs and business stakeholders to create a comprehensive roadmap, outlining the initiatives needed to carry out your CXM strategy roadmap.

    Step 3.2: Confirm and Finalize the CXM Blueprint

    Phase 1

    1.1 Create the Project Vision

    1.2 Structure the Project

    Phase 2

    2.1 Scan the External Environment

    2.2 Assess the Current State of CXM

    2.3 Create an Application Portfolio

    2.4 Develop Deployment Best Practices

    Phase 3

    3.1 Create an Initiative Rollout Plan

    3.2 Confirm and Finalize the CXM Blueprint

    Activities:

    • Identify success metrics
    • Create a stakeholder power map
    • Create a stakeholder communication plan
    • Complete and present CXM strategy stakeholder presentation

    Outcomes:

    • Stakeholder communication plan
    • CXM strategy stakeholder presentation

    Ensure that your CXM applications are improving the performance of targeted processes by establishing metrics

    Key Performance Indicators (KPIs)

    Key performance indicators (KPIs) are quantifiable measures that demonstrate the effectiveness of a process and its ability to meet business objectives.

    Questions to Ask

    1. What outputs of the process can be used to measure success?
    2. How do you measure process efficiency and effectiveness?

    Creating KPIs

    Specific

    Measurable

    Achievable

    Realistic

    Time-bound

    Follow the SMART methodology when developing KPIs for each process.

    Adhering to this methodology is a key component of the Lean management methodology. This framework will help you avoid establishing general metrics that aren’t relevant.

    Info-Tech Insight

    Metrics are essential to your ability to measure and communicate the success of the CXM strategy to the business. Speak the same language as the business and choose metrics that relate to marketing, sales, and customer service objectives.

    Activity: Identify metrics to communicate process success

    3.2.1 1 hour

    Input

    • Key organizational objectives

    Output

    • Strategic business metrics
    • CXM Strategy Stakeholder Presentation

    Materials

    • Whiteboard
    • Markers

    Participants

    • Project Team

    Instructions

    1. Recap the major functions that CXM will focus on (e.g. marketing, sales, customer service, web experience management, social media management, etc.)
    2. Identify business metrics that reflect organizational objectives for each function.
    3. Establish goals for each metric (as exemplified below).
    4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    5. Communicate the chosen metrics and the respective goals to stakeholders.

    Example: Metrics for Marketing, Sales, and Customer Service Functions

    Metric Example
    Marketing Customer acquisition cost X% decrease in costs relating to advertising spend
    Ratio of lifetime customer value X% decrease in customer churn
    Marketing originated customer % X% increase in % of customer acquisition driven by marketing
    Sales Conversion rate X% increase conversion of lead to sale
    Lead response time X% decrease in response time per lead
    Opportunity-to-win ratio X% increase in monthly/annual opportunity-to-win ratio
    Customer Service First response time X% decreased time it takes for customer to receive first response
    Time-to-resolution X% decrease of average time-to-resolution
    Customer satisfaction X% improvement of customer satisfaction ratings on immediate feedback survey

    Use Info-Tech’s Stakeholder Power Map Template to identify stakeholders crucial to CXM application rollouts

    3.2.2 Stakeholder Power Map Template

    Use this template and its power map to help visualize the importance of various stakeholders and their concerns. Prioritize your time according to the most powerful and most impacted stakeholders.

    Answer questions about each stakeholder:

    • Power: How much influence does the stakeholder have? Enough to drive the project forward or into the ground?
    • Involvement: How interested is the stakeholder? How involved is the stakeholder in the project already?
    • Impact: To what degree will the stakeholder be impacted? Will this significantly change how they do their job?
    • Support: Is the stakeholder a supporter of the project? Neutral? A resistor?

    Focus on key players: relevant stakeholders who have high power, should have high involvement, and are highly impacted.

    INFO-TECH DELIVERABLE

    Stakeholder Power Map Template

    Use Info-Tech’s Stakeholder Communication Planning Template to document initiatives and track communication

    3.2.3 Stakeholder Communication Planning Template

    Use the Stakeholder Communication Planning Template to document your list of initiative stakeholders so you can track them and plan communication throughout the initiative.

    Track the communication methods needed to convey information regarding CXM initiatives. Communicate how a specific initiative will impact the way employees work and the work they do.

    Sections of the document:

    1. Document the Stakeholder Power Map (output of Tool 3.2.2).
    2. Complete the Communicate Management Plan to aid in the planning and tracking of communication and training.

    INFO-TECH DELIVERABLE

    Activity: Create a stakeholder power map and communication plan

    3.2.4 1 hour

    Input

    • Stakeholder power map

    Output

    • Stakeholder communication plan
    • CXM Strategy Stakeholder Presentation

    Materials

    • Info-Tech’s Stakeholder Communication Planning Template
    • Info-Tech’s Stakeholder Power Map Template

    Participants

    • Project Team

    Instructions

    1. Using Info-Tech’s Stakeholder Power Map Template, identify key stakeholders for ensuring the success of the CXM strategy (Tool 3.2.2).
    2. Using Info-Tech’s Stakeholder Communication Plan Template, construct a communication plan to communicate and track CXM initiatives with all CXM stakeholders (Tool 3.2.3).
    3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

    Use Info-Tech’s CXM Strategy Stakeholder Presentation Template to sell your CXM strategy to the business

    3.2.5 CXM Strategy Stakeholder Presentation Template

    Complete the presentation template as indicated when you see the green icon throughout this deck. Include the outputs of all activities that are marked with this icon.

    Info-Tech has designed the CXM Strategy Stakeholder Presentation Template to capture the most critical aspects of the CXM strategy. Customize it to best convey your message to project stakeholders and to suit your organization.

    The presentation should be no longer than one hour. However, additional slides can be added at the discretion of the presenter. Make sure there is adequate time for a question and answer period.

    INFO-TECH DELIVERABLE

    After the presentation, email the deck to stakeholders to ensure they have it available for their own reference.

    Activity: Determine the measured value received from the project

    3.2.6 30 minutes

    Input

    • Project Metrics

    Output

    • Measured Value Calculation

    Materials

    • Workbook

    Participants

    • Project Team

    Instructions

    1. Review project metrics identified in phase 1 and associated benchmarks.
    2. After executing the CXM project, compare metrics that were identified in the benchmarks with the revised and assess the delta.
    3. Calculate the percentage change and quantify dollar impact (i.e. as a result of increased customer acquisition or retention).

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.2.4 Create a stakeholder power map and communication plan

    An analyst will walk the project team through the creation of a communication plan, inclusive of project metrics and their respective goals. If you are planning a variety of CXM initiatives, track how the change will be communicated and to whom. Determine the employees who will be impacted by the change.

    Insight breakdown

    Insight 1

    • IT must work in lockstep with Marketing, Sales, and Customer Service to develop a comprehensive technology-enablement strategy for CXM.
    • As IT works with its stakeholders in the business, it must endeavor to capture and use the voice of the customer in driving strategic requirements for CXM portfolio design.
    • IT must consider the external environment, customer personas, and internal processes as it designs strategic requirements to build the CXM application portfolio.

    Insight 2

    • The cloud is bringing significant disruption to the CXM space: to maintain relevancy, IT must become deeply involved in ensuring alignment between vendor capabilities and strategic requirements.
    • IT must serve as a trusted advisor on technical implementation challenges related to CXM, such as data quality, integration, and end-user training and adoption.
    • IT is responsible for technology enablement and is an indispensable partner in this regard; however, the business must ultimately own the objectives and communication strategy for customer engagement.

    Insight 3

    • When crafting a portfolio for CXM, be aware of the art of the possible: capabilities are rapidly merging and evolving to support new interaction channels. Social, mobile, and IoT are disrupting the customer experience landscape.
    • Big data and analytics-driven decision making is another significant area of value. IT must allow for true customer intelligence by providing an integration framework across customer-facing applications.

    Summary of accomplishment

    Knowledge Gained

    • Voice of the Customer for CXM Portfolio Design
    • Understanding of Strategic Requirements for CXM
    • Customer Personas and Scenarios
    • Environmental Scan
    • Deployment Considerations
    • Initiatives Roadmap Considerations

    Processes Optimized

    • CXM Technology Portfolio Design
    • Customer Data Quality Processes
    • CXM Integrations

    Deliverables Completed

    • Strategic Summary for CXM
    • CXM Project Charter
    • Customer Personas
    • External and Competitive Analysis
    • CXM Application Portfolio

    Bibliography

    Accenture Digital. “Growing the Digital Business: Accenture Mobility Research 2015.” Accenture. 2015. Web.

    Afshar, Vala. “50 Important Customer Experience Stats for Business Leaders.” Huffington Post. 15 Oct. 2015. Web.

    APQC. “Marketing and Sales Definitions and Key Measures.” APQC’s Process Classification Framework, Version 1.0.0. APQC. Mar. 2011. Web.

    CX Network. “The Evolution of Customer Experience in 2015.” Customer Experience Network. 2015. Web.

    Genesys. “State of Customer Experience Research”. Genesys. 2018. Web.

    Harvard Business Review and SAS. “Lessons From the Leading Edge of Customer Experience Management.” Harvard Business School Publishing. 2014. Web.

    Help Scout. “75 Customer Service Facts, Quotes & Statistics.” Help Scout. n.d. Web.

    Inmon Consulting Services. “Corporate Information Factory (CIF) Overview.” Corporate Information Factory. n.d. Web

    Jurevicius, Ovidijus. “VRIO Framework.” Strategic Management Insight. 21 Oct. 2013. Web.

    Keenan, Jim, and Barbara Giamanco. “Social Media and Sales Quota.” A Sales Guy Consulting and Social Centered Selling. n.d. Web.

    Malik, Om. “Internet of Things Will Have 24 Billion Devices by 2020.” Gigaom. 13 Oct. 2011. Web.

    McGovern, Michele. “Customers Want More: 5 New Expectations You Must Meet Now.” Customer Experience Insight. 30 July 2015. Web.

    McGinnis, Devon. “40 Customer Service Statistics to Move Your Business Forward.” Salesforce Blog. 1 May 2019. Web.

    Bibliography

    Reichheld, Fred. “Prescription for Cutting Costs”. Bain & Company. n.d. Web.

    Retail Congress Asia Pacific. “SAP – Burberry Makes Shopping Personal.” Retail Congress Asia Pacific. 2017. Web.

    Rouse, Margaret. “Omnichannel Definition.” TechTarget. Feb. 2014. Web.

    Salesforce Research. “Customer Expectations Hit All-Time High.” Salesforce Research. 2018. Web.

    Satell, Greg. “A Look Back at Why Blockbuster Really Failed and Why It Didn’t Have To.” Forbes. 5 Sept. 2014. Web.

    Social Centered Learning. “Social Media and Sales Quota: The Impact of Social Media on Sales Quota and Corporate Review.” Social Centered Learning. n.d. Web.

    Varner, Scott. “Economic Impact of Experience Management”. Qualtrics/Forrester. 16 Aug. 2017. Web.

    Wesson, Matt. “How to Use Your Customer Data Like Amazon.” Salesforce Pardot Blog. 27 Aug. 2012. Web.

    Winterberry Group. “Taking Cues From the Customer: ‘Omnichannel’ and the Drive For Audience Engagement.” Winterberry Group LLC. June 2013. Web.

    Wollan, Robert, and Saideep Raj. “How CIOs Can Support a More Agile Sales Organization.” The Wall Street Journal: The CIO Report. 25 July 2013. Web.

    Zendesk. “The Impact of Customer Service on Customer Lifetime Value 2013.” Z Library. n.d. Web.

    Adopt Design Thinking in Your Organization

    • Buy Link or Shortcode: {j2store}327|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $23,245 Average $ Saved
    • member rating average days saved: 13 Average Days Saved
    • Parent Category Name: Innovation
    • Parent Category Link: /innovation
    • End users often have a disjointed experience while interacting with your organization in using its products and services.
    • You have been asked by your senior leadership to start a new or revive an existing design or innovation function within your organization. However, your organization has dismissed design thinking as the latest “management fad” and does not buy into the depth and rigor that design thinking brings.
    • The design or innovation function lives on the fringes of your organization due to its apathy towards design thinking or tumultuous internal politics.
    • You, as a CIO, want to improve the user satisfaction with the IT services your team provides to both internal and external users.

    Our Advice

    Critical Insight

    • A user’s perspective while interacting with the products and services is very different from the organization’s internal perspective while implementing and provisioning those. A design-based organization balances the two perspectives to drive user-satisfaction over end-to-end journeys.
    • Top management must have a design thinker – the guardian angel of the balance between exploration (i.e. discovering new business models) and exploitation (i.e. leveraging existing business models).
    • Your approach to adopt design thinking must consider your organization’s specific goals and culture. There’s no one-size-fits-all approach.

    Impact and Result

    • User satisfaction, with the end-to-end journeys orchestrated by your organization, will significantly increase.
    • Design-centric organizations enjoy disproportionate financial rewards.

    Adopt Design Thinking in Your Organization Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should adopt design thinking in your organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. What is design thinking?

    The focus of this phase is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will formally examine the many definitions of design thinking from experts in this field. At the core of this phase are several case studies that illuminate the various aspects of design thinking.

    • Adopt Design Thinking in Your Organization – Phase 1: What Is Design Thinking?
    • Victor Scheinman's Experiment for Design

    2. How does an organization benefit from design thinking?

    This phase will illustrate the relevance of design in strategy formulation and in service-design. At the core of this phase are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization and establish a baseline of user-experience with the journeys orchestrated by your organization.

    • Adopt Design Thinking in Your Organization – Phase 2: How Does an Organization Benefit From Design Thinking?
    • Trends Matrix (Sample)

    3. How do you build a design organization?

    The focus of this phase is to:

  • Measure the design-centricity of your organization and subsequently, identify the areas for improvement.
  • Define an approach for a design program that suites your organization’s specific goals and culture.
    • Adopt Design Thinking in Your Organization – Phase 3: How Do You Build a Design Organization?
    • Report on How Design-Centric Is Your Organization (Sample)
    • Approach for the Design Program (Sample)
    • Interview With David Dunne on Design Thinking
    • Interview With David Dunne on Design Thinking (mp3)
    [infographic]

    Workshop: Adopt Design Thinking in Your Organization

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 What Is Design Thinking?

    The Purpose

    The focus of this module is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will also review the report on the design-centricity of your organization and subsequently, earmark the areas for improvement.

    Key Benefits Achieved

    An intimate understanding of the design thinking

    An assessment of design-centricity of your organization and identification of areas for improvement

    Activities

    1.1 Discuss case studies on how designers think and work

    1.2 Define design thinking

    1.3 Review report from Info-Tech’s diagnostic: How design-centric is your organization?

    1.4 Earmark areas for improvement to raise the design-centricity of your organization

    Outputs

    Report from Info-Tech’s diagnostic: ‘How design-centric is your organization?’ with identified areas for improvement.

    2 How Does an Organization Benefit From Design Thinking?

    The Purpose

    In this module, we will discuss the relevance of design in strategy formulation and service design. At the core of this module are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization. We will establish a baseline of user experience with the journeys orchestrated by your organization.

    Key Benefits Achieved

    An in-depth understanding of the relevance of design in strategy formulation and service design

    An understanding of the trends that impact your organization

    A taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those

    Activities

    2.1 Discuss relevance of design in strategy through case studies

    2.2 Articulate trends that impact your organization

    2.3 Discuss service design through case studies

    2.4 Identify critical customer journeys and baseline customers’ satisfaction with those

    2.5 Run a simulation of design in practice

    Outputs

    Trends that impact your organization.

    Taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those.

    3 How to Build a Design Organization

    The Purpose

    The focus of this module is to define an approach for a design program that suits your organization’s specific goals and culture.

    Key Benefits Achieved

    An approach for the design program in your organization. This includes aspects of the design program such as its objectives and measures, its model (one of the five archetypes or a hybrid one), and its governance.

    Activities

    3.1 Identify objectives and key measures for your design thinking program

    3.2 Structure your program after reviewing five main archetypes of a design program

    3.3 Balance between incremental and disruptive innovation

    3.4 Review best practices of a design organization

    Outputs

    An approach for your design thinking program: objectives and key measures; structure of the program, etc.

    The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

    • Buy Link or Shortcode: {j2store}598|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Manage & Coach
    • Parent Category Link: /manage-coach
    • Helping employees navigate personal and business responsibilities to find solutions that ensure both are taken care of.
    • Reducing potential disruption to business operations through employee absenteeism due to increased care-provider responsibilities.

    Our Advice

    Critical Insight

    • Remote work is complicated by children at home with school closures. Implement alternative temporary work arrangements that allow and support employees to balance work and personal obligations.
    • Adjustments to work arrangements and pay may be necessary. Temporary work arrangements while caring for dependents over a longer-term pandemic may require adjustments to the duties carried out, number of hours worked, and adjustments to employee pay.
    • Managing remotely is more than staying in touch by phone. As a leader you will need to provide clear options that provide solutions to your employees to avoid them getting overwhelmed while taking care of the business to ensure there is a business long term.

    Impact and Result

    • Develop a policy that provides parameters around mutually agreed adjustments to performance levels while balancing dependent care with work during a pandemic.
    • Take care of the business through clear guidelines on compensation while taking care of the health and wellness of your people.
    • Develop detailed work-from-home plans that lessen disruption to your work while taking care of children or aged parents.

    The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Research & Tools

    Start here. Read The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

    Read our recommendations and follow the steps to develop a policy that will help your employees work productively while managing care-provider responsibilities at home.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Storyboard
    • Pandemic Dependent Care Policy
    • COVID-19 Dependent Care Policy Manager Action Toolkit
    • COVID-19 Dependent Care Policy Employee Guide
    • Dependent-Flextime Agreement Template
    • Workforce Planning Tool
    • Nine Ways to Support Working Caregivers Today
    • Employee Resource Group (ERG) Charter Template
    [infographic]

    Build a Data Warehouse

    • Buy Link or Shortcode: {j2store}200|cart{/j2store}
    • member rating overall impact: 8.7/10 Overall Impact
    • member rating average dollars saved: $94,499 Average $ Saved
    • member rating average days saved: 30 Average Days Saved
    • Parent Category Name: Big Data
    • Parent Category Link: /big-data
    • Relational data warehouses, although reliable, centralized repositories for corporate data, were not built to handle the speed and volume of data and analytics today.
    • IT is under immense pressure from business units to provide technology that will yield greater agility and insight.
    • While some organizations are benefitting from modernization technologies, the majority of IT departments are unfamiliar with the technologies and have not yet defined clear use cases.

    Our Advice

    Critical Insight

    • The vast majority of your corporate data is not being properly leveraged. Modernize the data warehouse to get value from the 80% of unstructured data that goes unused.
    • Avoid rip and replace. Develop a future state that complements your existing data warehouse with emerging technologies.
    • Be flexible in your roadmap. Create an implementation roadmap that’s incremental and adapts to changing business priorities.

    Impact and Result

    • Establish both the business and IT perspectives of today’s data warehouse environment.
    • Explore the art-of-the-possible. Don’t get stuck trying to gather technical requirements from business users who don’t know what they don’t know. Use Info-Tech’s interview guide to discuss the pains of the current environment, and more importantly, where stakeholders want to be in the future.
    • Build an internal knowledgebase with respect to emerging technologies. The technology landscape is constantly shifting and often difficult for IT staff to keep track of. Use Info-Tech’s Data Warehouse Modernization Technology Education Deck to ensure that IT is able to appropriately match the right tools to the business’ use cases.
    • Create a compelling business case to secure investment and support.

    Build a Data Warehouse Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should be looking to modernize the relational data warehouse, review Info-Tech’s framework for identifying modernization opportunities, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess the current data warehouse environment

    Review the business’ perception and architecture of the current data warehouse environment.

    • Drive Business Innovation With a Modernized Data Warehouse Environment – Phase 1: Assess the Current Data Warehouse Environment
    • Data Warehouse Maturity Assessment Tool

    2. Define modernization drivers

    Collaborate with business users to identify the strongest motivations for data warehouse modernization.

    • Drive Business Innovation With a Modernized Data Warehouse Environment – Phase 2: Define Modernization Drivers
    • Data Warehouse Modernization Stakeholder Interview Guide
    • Data Warehouse Modernization Technology Education Deck
    • Data Warehouse Modernization Initiative Building Tool

    3. Create the modernization future state

    Combine business ideas with modernization initiatives and create a roadmap.

    • Drive Business Innovation With a Modernized Data Warehouse Environment – Phase 3: Create the Modernization Future State
    • Data Warehouse Modernization Technology Architectural Template
    • Data Warehouse Modernization Deployment Plan
    [infographic]

    Workshop: Build a Data Warehouse

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess the Current Data Warehouse Environment

    The Purpose

    Discuss the general project overview for data warehouse modernization.

    Establish the business and IT perspectives of the current state.

    Key Benefits Achieved

    Holistic understanding of the current data warehouse.

    Business user engagement from the start of the project.

    Activities

    1.1 Review data warehouse project history.

    1.2 Evaluate data warehouse maturity.

    1.3 Draw architecture diagrams.

    1.4 Review supporting data management practices.

    Outputs

    Data warehouse maturity assessment

    Data architecture diagrams

    2 Explore Business Opportunities

    The Purpose

    Conduct a user workshop session to elicit the most pressing needs of business stakeholders.

    Key Benefits Achieved

    Modernization technology selection is directly informed by business drivers.

    In-depth IT understanding of the business pains and opportunities.

    Activities

    2.1 Review general trends and drivers in your industry.

    2.2 Identify primary business frustrations, opportunities, and risks.

    2.3 Identify business processes to target for modernization.

    2.4 Capture business ideas for the future state.

    Outputs

    Business ideas for modernization

    Defined strategic direction for data warehouse modernization

    3 Review the Technology Landscape

    The Purpose

    Educate IT staff on the most common technologies for data warehouse modernization.

    Key Benefits Achieved

    Improved ability for IT to match technology with business ideas.

    Activities

    3.1 Appoint Modernization Advisors.

    3.2 Hold an open education and discussion forum for modernization technologies.

    Outputs

    Modernization Advisors identified

    Modernization technology education deck

    4 Define Modernization Solutions

    The Purpose

    Consolidate business ideas into modernization initiatives.

    Key Benefits Achieved

    Refinement of the strategic direction for data warehouse modernization.

    Activities

    4.1 Match business ideas to technology solutions.

    4.2 Group similar ideas to create modernization initiatives.

    4.3 Create future-state architecture diagrams.

    Outputs

    Identified strategic direction for data warehouse modernization

    Defined modernization initiatives

    Future-state architecture for data warehouse

    5 Establish a Modernization Roadmap

    The Purpose

    Validate and build out initiatives with business users.

    Define benefits and costs to establish ROI.

    Identify enablers and barriers to modernization.

    Key Benefits Achieved

    Completion of materials for a compelling business case and roadmap.

    Activities

    5.1 Validate use cases with business users.

    5.2 Define initiative benefits.

    5.3 Identify enablers and barriers to modernization.

    5.4 Define preliminary activities for initiatives.

    5.5 Evaluate initiative costs.

    5.6 Determine overall ROI.

    Outputs

    Validated modernization initiatives

    Data warehouse modernization roadmap

    Establish a Communication and Collaboration System Strategy

    • Buy Link or Shortcode: {j2store}293|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $6,459 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: End-User Computing Applications
    • Parent Category Link: /end-user-computing-applications
    • Communication and collaboration portfolios are overburdened with redundant and overlapping services. Between Office 365, Slack, Jabber, and WebEx, IT is supporting a collection of redundant apps. This redundancy takes a toll on IT, and on the user.
    • Shadow IT is easier than ever, and cheap sharing tools are viral. Users are literally carrying around computers in their pockets (in the form of smartphones). IT often has no visibility into how these devices – and the applications on them – are used for work.

    Our Advice

    Critical Insight

    • You don’t know what you don’t know. Unstructured conversations with users will uncover insights.
    • Security is meaningless without usability. If security controls make a tool unusable, then users will rush to adopt something that’s free and easy.
    • Training users on a new tool once isn’t effective. Engage with users throughout the collaboration tool’s lifecycle.

    Impact and Result

    • Few supported apps and fewer unsupported apps. This will occur by ensuring that your collaboration tools will be useful to and used by users. Give users a say through surveys, focus groups, and job shadowing.
    • Lower total cost of ownership and greater productivity. Having fewer apps in the workplace, and better utilizing the functionality of those apps, will mean that IT can be much more efficient at managing your ECS.
    • Higher end-user satisfaction. Tools will be better suited to users’ needs, and users will feel heard by IT.

    Establish a Communication and Collaboration System Strategy Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop a new approach to communication and collaboration apps, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Create a shared vision on the future of communication and collaboration

    Identify and validate goals and collaboration tools that are used by your users, and the collaboration capabilities that must be supported by your desired ECS.

    • Establish a Communication and Collaboration System Strategy – Phase 1: Create a Shared Vision on the Future of Communication and Collaboration
    • Enterprise Collaboration Strategy Template
    • Building Company Communication and Collaboration Technology Improvement Plan Executive Presentation
    • Communications Infrastructure Stakeholder Focus Group Guide
    • Enterprise Communication and Collaboration System Business Requirements Document

    2. Map a path forward

    Map a path forward by creating a collaboration capability map and documenting your ECS requirements.

    • Establish a Communication and Collaboration System Strategy – Phase 2: Map a Path Forward
    • Collaboration Capability Map

    3. Build an IT and end-user engagement plan

    Effectively engage everyone to ensure the adoption of your new ECS. Engagement is crucial to the overall success of your project.

    • Establish a Communication and Collaboration System Strategy – Phase 3: Proselytize the Change
    • Collaboration Business Analyst
    • Building Company Exemplar Collaboration Marketing One-Pager Materials
    • Communication and Collaboration Strategy Communication Plan
    [infographic]

    Workshop: Establish a Communication and Collaboration System Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify What Needs to Change

    The Purpose

    Create a vision for the future of your ECS.

    Key Benefits Achieved

    Validate and bolster your strategy by involving your end users.

    Activities

    1.1 Prioritize Components of Your ECS Strategy to Improve

    1.2 Create a Plan to Gather Requirements From End Users

    1.3 Brainstorm the Collaboration Services That Are Used by Your Users

    1.4 Focus Group

    Outputs

    Defined vision and mission statements

    Principles for your ECS

    ECS goals

    End-user engagement plan

    Focus group results

    ECS executive presentation

    ECS strategy

    2 Map Out the Change

    The Purpose

    Streamline your collaboration service portfolio.

    Key Benefits Achieved

    Documented the business requirements for your collaboration services.

    Reduced the number of supported tools.

    Increased the effectiveness of training and enhancements.

    Activities

    2.1 Create a Current-State Collaboration Capability Map

    2.2 Build a Roadmap for Desired Changes

    2.3 Create a Future-State Capability Map

    2.4 Identify Business Requirements

    2.5 Identify Use Requirements and User Processes

    2.6 Document Non-Functional Requirements

    2.7 Document Functional Requirements

    2.8 Build a Risk Register

    Outputs

    Current-state collaboration capability map

    ECS roadmap

    Future-state collaboration capability map

    ECS business requirements document

    3 Proselytize the Change

    The Purpose

    Ensure the system is supported effectively by IT and adopted widely by end users.

    Key Benefits Achieved

    Unlock the potential of your ECS.

    Stay on top of security and industry good practices.

    Greater end-user awareness and adoption.

    Activities

    3.1 Develop an IT Training Plan

    3.2 Develop a Communications Plan

    3.3 Create Initial Marketing Material

    Outputs

    IT training plan

    Communications plan

    App marketing one-pagers

    Safety as a secondary consideration

    • Large vertical image:
    • member rating overall impact: Very High
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A

    This is a story that should make you perk up.

    I know of a department that was eager to launch their new product. The strain was severe. The board was breathing down their necks. Rivals were catching up (or so they thought).

    What did they do?

    "Let's get this thing live, prove the market wants it, then we'll circle back and handle all the security and stability backlog items." For the product owner, at the time, that seemed the right thing to do.

    They were hacked 48 hours after going live.

    Customer information was stolen. The brand's reputation suffered. The decision led to a months-long legal nightmare. And they still had to completely rebuild the system. Making stability and security bolt-on items is never a good idea.

    The true price of "fix it later"

    See, I understand. When the product owner is pressing for user experience enhancements and you're running out of time for launch, it's easy to overlook those "non-functional requirements." Yet, we should avoid blaming the product owner. The PO is under pressure from many stakeholders, and a delayed launch may also come with significant costs.

    Load balancing isn't visible to customers, after all. Penetration testing doesn't excite them. Failure mechanisms don't matter to them. This statement is true until a malfunction impacts a client. Then it suddenly becomes the most important thing in the world.

    However, I know that ignoring non-functional requirements (NFRs) can lead to failed businesses (or business lines). This elevates these issues beyond mere technical inconveniences. NFRs are designed with the client in mind.

    Look at it this way. When your system crashes during periods of high traffic, how does the user experience change? How satisfied are customers when their personal information is stolen? When it takes 30 seconds for your website to load, how does that conversion rate look?

    Let me expose you to some consultant figures. The average cost of IT outages is $5,600 per minute, according to a 2014 Gartner study. That figure can rise to $300,000 per hour for larger businesses. The reality is that in your department, you will rarely reach these numbers. When we look at current (2020-2025) and expected (2026) trends, the typical operational loss numbers in international commercial banking or insurance are closer to 100K for high-impact incidents that are handled within 2–3 hours.

    Obviously, your numbers will vary. And if you don't know what your costs are, now would be a good time to discover that. This does not imply that you should simply accept the risks associated with such situations. You must fix or mitigate such opportunities for hackers to get in. Do so at the appropriate cost for your business.

    Data breaches are a unique phenomenon. According to IBM's Cost of a Data Breach Report 2025, a data breach typically costs $4.44 million, and detecting and containing it takes an average of 241 days. Some preview data from the 2025 report include that 97% of organizations that reported on the study indicated that they lacked access controls for their AI systems. That means that many companies don't even have the basics in order. And AI-related breaches are just going to accelerate. AI security defenses will help lower the cost of such breaches.

    Despite the decreasing cost of these breaches, I anticipate an increase in their frequency in the upcoming years.

    This means that non-functional requirements in terms of security and resilience should take a more prominent place in the prioritizations. Your client depends on your systems being safe, resilient, and performant.

    The blind spot in leadership

    And yet, this is where some leaders make mistakes. I have the impression they believe that client-focused design means more functionality and elegant interfaces. They prioritize user experience enhancements over system reliability.

    I want to share a key fact that distinguishes successful businesses: customers desire more than just a good product. It must always function for them. And that means following certain procedures. They are not there to hamper you; they are there to retain customers.

    88% of online shoppers are less likely to visit a website again after a negative experience, according to research from Forrester. Amazon found that they lose 1% of sales for every 100 ms of latency. That 100 milliseconds adds up to millions of lost profits when billions of dollars are at stake.

    You run the risk of more than just technical difficulties when you deprioritize safety. Customer trust, revenue stability, competitive advantage, adherence to the law, costs, and team morale are all at stake.

    The "happy flow" trap is costing you revenue.

    Allow me to illustrate what I see happening during development cycles.

    The team tests the happy flow. The user successfully logs in. The user navigates with ease. The user makes the purchase without any problems. The user logs off without incident.

    "Excellent! Publish it!"

    However, what occurs if 1000 users attempt to log in at once? What occurs if an attempt is made to insert malicious code into your contact form? During a transaction, what happens if your database connection fails?

    These are not extreme situations. These are real-life occurrences.

    Fifty percent of data center managers and operators reported having an impactful outage in the previous three years, according to the Uptime Institute's 2025 Global Data Center Survey. Note that this is at the infra level. The biggest contributor is power outages. What role does power play in ensuring a smooth flow? Power will not always flow as you want it, so plan for lack of power and for spikes.

    With regard to software failures, the spread of possible causes widens. AI is a big contributor. AI is typically brought in to accelerate development and assist in coding. But it tends to introduce subtle bugs and vulnerabilities that a seasoned developer has to review and solve.

    Another upcoming article will discuss how faster release cycles often lead to a rush in testing. This should not be the case; by spending some time automating your (non-)regression test bank, you will gain speed. But you have to invest time in building the test suite.

    Can your system handle success? This question should keep every executive awake at night.

    I've witnessed businesses invest millions in advertising campaigns to drive traffic to systems that fail due to their success. Consider describing to your board how your greatest marketing victory became your worst operational mishap.

    Managing traffic spikes is only one aspect of load balancing. It is about ensuring that your business can handle opportunities without being overwhelmed.

    The mindset that transforms everything

    Let's now address the most pressing issue: security.

    The majority of leaders consider security to be like insurance, something you hope you never need. The fact that security is more than just protection, however, will alter the way you approach every project. It's approval to develop.

    According to the Ponemon Institute's 2025 Cost of Insider Threats Global Report, the average annualized cost of insider threats, defined as employee negligence, criminal insiders, and credential thieves, has risen to $17.4 million per incident, up from $15.4 million in 2022. The number of discovered and analyzed incidents increased from 3,269 in 2018 to 7,868 in 2025 research studies. 

    Cybersecurity Ventures predicts that cybercrime will cost the global economy $10.5 trillion annually by 2025.

    The most fascinating thing, though, is that companies that invest in proactive security see measurable outcomes. Organizations that allocate over 10% of their IT budget to cybersecurity have a 2.5-fold higher chance of experiencing no security incidents than those that allocate less than 1%, per Deloitte's Future of Cyber Survey.

    By hardening your systems against common attack vectors, you can scale quickly without worrying about the future. You can handle sensitive data with confidence, enter new markets without fear, establish partnerships that require trust, and focus on innovation instead of crisis management.

    The non-functional needs that genuinely generate income

    Allow me to explain this in a way that will satisfy your CFO.

    Retention is equal to reliability. Customers return when a system functions reliably (given you sell items they want). The Harvard Business Review claims that a 5% increase in customer retention rates boosts profits by 25% to 95%. It is five to twenty-five times less expensive to retain customers than to acquire new ones.

    Scalability is equal to security. Secure systems can handle larger client volumes, more sensitive data, and higher-value transactions. 69% of board members and C-suite executives think that privacy and cyber risks could affect their company's ability to grow, according to PwC.

    Profit is equal to performance. You lose conversions for every second of load time. Google discovered that the likelihood of a bounce rises by 32% as page load time increases from 1 to 3 seconds. It increases by 90% from 1 second to 5 seconds. Walmart discovered that every second improvement in page load time led to a 2% increase in conversions.

    Reputation is equal to resilience. Guess which company benefits when your system works while your competitors' systems fail? Failures reduce trust. 71% of consumers will actively advocate against companies they don't trust, and 67% of consumers will stop purchasing from them, according to Edelman's 2023 Trust Barometer. While the 2025 report does not present comparative numbers, distrust impacting consumer behavior is likely to be even more prevalent. 

    The structure that reverses the script

    Reframe this discussion with your executives and team

    • The question we should not ask is, "Can we afford to build this right?" but rather, "Can we afford not to?" This consideration is crucial because we risk losing customers at every obstacle they encounter. 
    • Non-functional requirements should be viewed as competitive advantages rather than obstructions. If it suddenly does not work, the customer walks away.
    • Consider viewing system reliability as a profit center instead of a cost center. When a customer knows it will work, they will order again and refer a friend.

    The numbers support this point. Businesses that invest in operational resilience see three times higher profit margins and 2.5 times higher revenue growth than their counterparts, according to McKinsey's 2023 State of Organizations report. In 2025 we see a focus on AI, but the point remains.

    These metrics will grab the attention when you're presenting them.

    Although the average cost of downtime varies by industry, it is always high. 

    The impact of a security breach on customer lifetime value is equally uncomfortable. Following a data breach, 78% of consumers will cease interacting with a brand online, and 36% will never do so again, according to Ping Identity's 2023 Consumer Identity Breach Report.

    Every second that the system is unavailable results in a rapidly mounting loss of money. That's about $3,170 per minute of full downtime for a business that makes $100 million a year. We're talking about $31,700 per minute for billion-dollar businesses. Again, your experience may differ, but it's important to note that this cost is often unseen yet undeniable. If you want to calculate this more granularly, then I have a calculation method for you that is easy to implement.

    There is a discernible trend in the cost of rebuilding versus building correctly the first time. Resolving a problem in production can cost four to five times as much as fixing it during design, and it can cost up to 100 times as much as fixing it during the requirements and design phase, according to IBM's Systems Sciences Institute.

    The plan of action that truly works

    This is what you should do right away.

    Please begin by reviewing your current primary systems. When they're under stress, what happens? What occurs if they are attacked? What occurs if they don't work? 40% of businesses that suffer a significant system failure never reopen, although only 23% of organizations have tested their disaster recovery plans in the previous year, according to Gartner. Companies we work with test their systems at least once per year. If the results are unsatisfactory, we conduct a retest to ensure they meet our standards.

    Next, please determine the actual cost of addressing issues at a later stage. Add in the costs of customer attrition, security breaches, downtime, and reconstruction. To lend credibility to your calculations, try to work out exact numbers for your company. Industry standards (like in this article) will give you indicators, but you need to know your figures.

    Third, recast your non-functional needs as business needs. Consider focusing on strategies for managing success rather than solely discussing load balancing. Instead of discussing security testing, focus on revenue protection.

    Fourth, consider safety when defining "done." Until a feature is dependable, secure, and scalable, it isn't considered complete. Projects that incorporate non-functional requirements from the outset have a threefold higher chance of success, per the Standish Group's 2023 Chaos Report.

    Fifth, use system dependability as a differentiator in the marketplace. You're up when your rivals are down. You're safe when they're compromised.

    The bottom line

    I understand that resilience isn't sexy. I am aware that UI enhancements are more exciting than infrastructure resilience.

    And yet, I know that businesses that prioritize safety will survive and lead after seeing others thrive and fail based on this one choice. Customers trust them. They are capable of scaling without breaking. Because they are confident that their systems can manage whatever comes next, they are the ones who get a good night's sleep.

    Resilient organizations are twice as likely to surpass customer satisfaction goals and are 2.5 times more likely to achieve revenue growth of 10% or more.

    Resilience represents the most significant competitive advantage. You have a choice. Just keep in mind that your clients are depending on you to do the job correctly.

    Always happy to engage in a conversation.

    IBM i Migration Considerations

    • Buy Link or Shortcode: {j2store}109|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Strategy and Organizational Design
    • Parent Category Link: /strategy-and-organizational-design

    IBM i remains a vital platform and now many CIOs, CTOs, and IT leaders are faced with the same IBM i challenges regardless of industry focus: how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?

    Our Advice

    Critical Insight

    For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more pro-active in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.

    Impact and Result

    The most common tactic is for the organization to better understand their IBM i options and adopt some level of outsourcing for the non-commodity platform retaining the application support/development in-house. To make the evident, obvious; the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed and public cloud services.

    IBM i Migration Considerations Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. IBM i Migration Considerations – A brief deck that outlines key migration options for the IBM i platforms.

    This project will help you evaluate the future viability of this platform; assess the fit, purpose, and price; develop strategies for overcoming potential challenges; and determine the future of this platform for your organization.

    • IBM i Migration Considerations Storyboard

    2. Infrastructure Outsourcing IBM i Scoring Tool – A tool to collect vendor responses and score each vendor.

    Use this scoring sheet to help you define and evaluate IBM i vendor responses.

    • Infrastructure Outsourcing IBM i Scoring Tool
    [infographic]

    Further reading

    IBM i Migration Considerations

    Don’t be overwhelmed by IBM i migration options.

    Executive Summary

    Your Challenge

    IBM i remains a vital platform and now many CIO, CTO, and IT leaders are faced with the same IBM i challenges regardless of industry focus; how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?

    Common Obstacles

    For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more proactive in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.

    Info-Tech Approach

    The most common tactic is for the organization to better understand its IBM i options and adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. To make the evident, obvious: the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed hosting, and public cloud services.

    Info-Tech Insight

    “For over twenty years, IBM was ‘king,’ dominating the large computer market. By the 1980s, the world had woken up to the fact that the IBM mainframe was expensive and difficult, taking a long time and a lot of work to get anything done. Eager for a new solution, tech professionals turned to the brave new concept of distributed systems for a more efficient alternative. On June 21, 1988, IBM announced the launch of the AS/400, their answer to distributed computing.” (Dale Perkins)

    Review

    We help IT leaders make the most of their IBM i environment.

    Problem Statement:

    The IBM i remains a vital platform for many businesses and continues to deliver exceptional reliability and performance and play a key role in the enterprise. With the limited resources at hand, CIOs and the like must continually review and understand their migration path with the same regard as any other distributed system roadmap.

    This research is designed for:

    • IT strategic direction decision makers
    • IT managers responsible for an existing iSeries or IBM i platform
    • Organizations evaluating platforms for mission-critical applications

    This research will help you:

    1. Evaluate the future viability of this platform.
    2. Assess the fit, purpose, and price.
    3. Develop strategies for overcoming potential challenges.
    4. Determine the future of this platform for your organization.

    The “fit for purpose” plot

    Thought Model

    We will investigate the aspect of different IBM i scenarios as they impact business, what that means, and how that can guide the questions that you are asking as you move to an aligned IBM i IT strategy. Our model considers:

    • Importance to Business Outcomes
      • Important to strategic objectives
      • Provides competitive advantage
      • Non-commodity IT service or process
      • Specialized in-house knowledge required
    • Vendor’s Performance Advantage
      • Talent or access to skills
      • Economies of scale or lower cost at scale
      • Access to technology

    Info-Tech Insights

    With multiple control points to be addressed, care must be taken in simplifying your options while addressing all concerns to ease operational load.

    Map different 'IBM i' scenarios with axes 'Importance to Business Outcomes - Low to High' and 'Vendor’s Performance Advantage - Low to High'. Quadrant labels are '[LI/LA] Potentially Outsource: Service management, Help desk, desk-side support, Asset management', '[LI/HA] Outsource: Application & Infra Support, Web Hosting, SAP Support, Email Services, Infrastructure', '[HI/LA] Insource (For Now): Application development tech support', and '[HI/HA] Potentially Outsource: Onshore or offshore application maintenance'.

    IBM i environments are challenging

    “The IBM i Reality” – Darin Stahl

    Most members relying on business applications/workloads running on non-commodity platforms (zSeries, IBM i, Solaris, AIX, etc.) are first motivated to get out from under the perceived higher costs for the hardware platform.

    An additional challenge for non-commodity platforms is that from an IT Operations Management perspective they become an island with a diminishing number of integrated operations skills and solutions such as backup/restore and monitoring tools.

    The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support and development in-house.

    Key challenges with current IBM i environments:
    1. DR Requirements
      Understand what the business needs are and where users and resources are located.
    2. Market Lack of Expertise
      Skilled team members are hard to find.
    3. Cost Management
      There is a perceived cost disadvantage to managing on-prem solutions.
    4. Aging Support Teams
      Current support teams are aging with little backfill in skill and experience.

    Understand your options

    Co-Location

    A customer transitions their hardware environment to a provider’s data center. The provider can then manage the hardware and “system.”

    Onsite Outsourcing

    A provider will support the hardware/system environment at the client’s site.

    Managed Hosting

    A customer transitions their legacy application environment to an off-prem hosted, multi-tenanted environment.

    Public Cloud

    A customer can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.”

    Co-Location

    Provider manages the data center hardware environment.

    Abstract

    Here a provider manages the system data center environment and hardware; however, the client’s in-house IBM i team manages the IBM i hardware environment and the system applications. The client manages all of the licenses associated with the platform as well as the hardware asset management considerations. This is typically part of a larger services or application transformation. This effectively outsources the data center management while maintaining all IBM i technical operations in-house.

    Advantages

    • On-demand bandwidth
    • Cost effective
    • Secure and compliant environment
    • On-demand remote “hands and feet” services
    • Improved IT DR services
    • Data center compliance

    Considerations

    • Application transformation
    • CapEx cost
    • Fluctuating network bandwidth costs
    • Secure connectivity
    • Disaster recovery and availability of vendor
    • Company IT DR and BC planning
    • Remote system maintenance (HW)

    Info-Tech Insights

    This model is extremely attractive for organizations looking to reduce their data center management footprint. Idea for the SMB.

    Onsite Sourcing

    A provider will support the hardware/system environment at the client’s site.

    Abstract

    Here a provider will support and manage the hardware/system environment at the client’s site. The provider may acquire the customer’s hardware and provide software licenses. This could also include hiring or “rebadging” staff supporting the platform. This type of arrangement is typically part of a larger services or application transformation. While low risk, it is not as cost-effective as other deployment models.

    Advantages

    • Managed environment within company premises
    • Cost effective (OpEx expense)
    • Economies of scale
    • On-demand “as-a-service” model
    • Improved IT DR staffing services
    • 24x7 monitoring and support

    Considerations

    • Outsourced IT talent
    • Terms and contract conditions
    • IT staff attrition
    • Increased liability
    • Modified technical support and engagement
    • Secure connectivity and communication
    • Internal problem and change management

    Info-Tech Insights

    Depending on the application lifecycle and viability, in-house skill and technical depth is a key consideration when developing your IBM i strategy.

    Managed Hosting

    Transition legacy application environment to an off-prem hosted multi-tenanted environment.

    Abstract

    This type of arrangement is typically part of an application migration or transformation. In this model, a client can “re-platform” the application into an off-premises-hosted provider platform. This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

    Advantages

    • Turns CapEx into OpEx
    • Reduces in-house need for diminishing or scarce human resources
    • Allows the enterprise to focus on the value of the IBM i platform through the reduction of system administrative toil
    • Improved IT DR services
    • Data center compliance

    Considerations

    • Application transformation
    • Network bandwidth
    • Contract terms and conditions
    • Modified technical support and engagement
    • Secure connectivity and communication
    • Technical security and compliance
    • Limited providers; reduced options

    Info-Tech Insights

    There is a difference between a “re-host” and “re-platform” migration strategy. Determine which solution aligns to the application requirements.

    Public Cloud

    Leverage “public cloud” alternatives with AWS, Google, or Microsoft AZURE.

    Abstract

    This type of arrangement is typically part of a larger migration or application transformation. While low risk, it is not as cost-effective as other deployment models. In this model, client can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.” This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux).

    Advantages

    • Remote workforce accessibility
    • OpEx expense model
    • Improved IT DR services
    • Reduced infrastructure and system administration
    • Vendor management
    • 24x7 monitoring and support

    Considerations

    • Contract terms and conditions
    • Modified technical support and engagement
    • Secure connectivity and communication
    • Technical security and compliance
    • Limited providers; reduced options
    • Vendor/cloud lock-in
    • Application migration/”re-platform”
    • Application and system performance

    Info-Tech Insights

    This model is extremely attractive for organizations that consume primarily cloud services and have a large remote workforce.

    Understand your vendors

    • To best understand your options, you need to understand what IBM i services are provided by the industry vendors.
    • Within the following slides, you will find a defined activity with a working template that will create “vendor profiles” for each vendor.
    • As a working example, you can review the following partners:
    • Connectria (United States)
    • Rowton IT Solutions Ltd (United Kingdom)
    • Mid-Range (Canada)

    Info-Tech Insights

    Creating vendor profiles will help quickly filter the solution providers that directly meet your IBM i needs.

    Vendor Profile #1

    Rowton IT

    Summary of Vendor

    “Rowton IT thrive on creating robust and simple solutions to today's complex IT problems. We have a highly skilled and motivated workforce that will guarantee the right solution.

    Working with select business partners, we can offer competitive and cost effective packages tailored to suit your budget and/or business requirements.

    Our knowledge and experience cover vast areas of IT including technical design, provision and installation of hardware (Wintel and IBM Midrange), technical engineering services, support services, IT project management, application testing, documentation and training.”

    IBM i Services

    • ✔ IBM Power Hardware Sales
    • ✔ Co-Managed Services
    • ✔ DR/High Available Config
    • ✔ Full Managed Services
    • ✖ Co-Location Services
    • ✔ Public Cloud Services (AWS)

    URL
    rowtonit.com

    Regional Coverage:
    United Kingdom

    Logo for RowtonIT.com.

    Vendor Profile #2

    Connectria

    Summary of Vendor

    “Every journey starts with a single step and for Connectria, that step happened to be with the world’s largest bank, Deutsche Bank. Followed quickly by our second client, IBM. Since then, we have added over 1,000 clients worldwide. For 25 years, each customer, large or small, has relied on Connectria to deliver on promises made to make it easy to do business with us through flexible terms, scalable solutions, and straightforward pricing. Join us on our journey.”

    IBM i Services

    • ✔ IBM Power Hardware Sales
    • ✔ Co-Managed Services
    • ✔ DR/High Available Config
    • ✔ Full Managed Services
    • ✔ Co-Location Services
    • ✔ Public Cloud Services (AWS)

    URL
    connectria.com

    Regional Coverage:
    United States

    Logo for Connectria.

    Vendor Profile #3

    Mid-Range

    Summary of Vendor

    “Founded in 1988 and profitable throughout all of those 31 years, we have a solid track record of success. At Mid-Range, we use our expertise to assess your unique needs, in order to proactively develop the most effective IT solution for your requirements. Our full-service approach to technology and our diverse and in-depth industry expertise keep our clients coming back year after year.

    Serving clients across North America in a variety of industries, from small and emerging organizations to large, established enterprises – we’ve seen it all. Whether you need hardware or software solutions, disaster recovery and high availability, managed services or hosting or full ERP services with our JD Edwards offerings – we have the methods and expertise to help.”

    IBM i Services

    • ✔ IBM Power Hardware Sales
    • ✔ Co-Managed Services
    • ✔ DR/High Available Config
    • ✔ Full Managed Services
    • ✔ Co-Location Services
    • ✔ Public Cloud Services (AWS)

    URL
    midrange.ca

    Regional Coverage:
    Canada

    Logo for Mid-Range.

    Activity

    Understand your vendor options

    Activities:
    1. Create your vendor profiles
    2. Score vendor responses
    3. Develop and manage your vendor agenda

    This activity involves the following participants:

    • IT strategic direction decision makers
    • IT managers responsible for an existing iSeries or IBM i platform

    Outcomes of this step:

    • Vendor Profile Template
    • Completed IT Infrastructure Outsourcing Scoring Tool

    Info-Tech Insights

    This check-point process creates transparency around agreement costs with the business and gives the business an opportunity to re-evaluate its requirements for a potentially leaner agreement.

    1. Create your vendor profiles

    Define what you are looking for:

    • Create a vendor profile for every vendor of interest.
    • Leverage our starting list and template to track and record the advantages of each vendor.

    Mindshift

    First National Technology Solutions

    Key Information Systems

    MainLine

    Direct Systems Support

    T-Systems

    Horizon Computer Solutions Inc.

    Vendor Profile Template

    [Vendor Name]

    Summary of Vendor

    [Vendor Summary]
    *Detail the Vendor Services as a Summary*

    IBM i Services

    • ✔ IBM Power Hardware Sales
    • ✔ Co-Managed Services
    • ✔ DR/High Available Config
    • ✔ Full Managed Services
    • ✔ Co-Location Services
    • ✔ Public Cloud Services (AWS)
    *Itemize the Vendor Services specific to your requirements*

    URL
    https://www.url.com/
    *Insert the Vendor URL*

    Regional Coverage:
    [Country\Region]
    *Insert the Vendor Coverage & Locations*

    *Insert the Vendor Logo*

    2. Score your vendor responses

    Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses.
    Use Info-Tech’s IT Infrastructure Outsourcing Scoring Tool to systematically score your vendor responses.

    The overall quality of the IBM i questions can help you understand what it might be like to work with the vendor.

    Consider the following questions:

    • Is the vendor clear about what it’s able to offer? Is its response transparent?
    • How much effort did the vendor put into answering the questions?
    • Does the vendor seem like someone you would want to work with?

    Once you have the vendor responses, you will select two or three vendors to continue assessing in more depth leading to an eventual final selection.

    Screenshot of the IT Infrastructure Outsourcing Scoring Tool's Scoring Sheet. There are three tables: 'Scoring Scale', 'Results', and one with 'RFP Questions'. Note on Results table says 'Top Scoring Vendors', and note on questions table says 'List your IBM i questions (requirements)'.

    Info-Tech Insights

    Watch out for misleading scores that result from poorly designed criteria weightings.

    3. Develop your vendor agenda

    Vendor Conference Call

    Develop an agenda for the conference call. Here is a sample agenda:
    • Review the vendor questions.
    • Go over answers to written vendor questions previously submitted.
    • Address new vendor questions.

    Commonly Debated Question:
    Should vendors be asked to remain anonymous on the call or should each vendor mention their organization when they join the call?

    Many organizations worry that if vendors can identify each other, they will price fix. However, price fixing is extremely rare due to its consequences and most vendors likely have a good idea which other vendors are participating in the bid. Another thought is that revealing vendors could either result in a higher level of competition or cause some vendors to give up:

    • A vendor that hears its rival is also bidding may increase the competitiveness of its bid and response.
    • A vendor that feels it doesn’t have a chance may put less effort into the process.
    • A vendor that feels it doesn’t have real competition may submit a less competitive or detailed response than it otherwise would have.

    Vendor Workshop

    A vendor workshop day is an interactive way to provide context to your vendors and to better understand the vendors’ offerings. The virtual or in-person interaction also offers a great way to understand what it’s like to work with each vendor and decide whether you could build a partnership with them in the long run.

    The main focus of the workshop is the vendors’ service solution presentation. Here is a sample agenda for a two-day workshop:

    Day 1
    • Meet and greet
    • Welcome presentation with objectives, acquisition strategy, and company overview
    • Overview of the current IT environment, technologies, and company expectations
    • Question and answer session
    • Site walk
    Day 2
    • Review Day 1 activities
    • Vendor presentations and solution framing
    Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses.

    Related Info-Tech Research

    Effectively Acquire Infrastructure Services
    Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.

    Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
    There are very few IT infrastructure components you should be housing internally – outsource everything else.

    Build Your Infrastructure Roadmap
    Move beyond alignment: Put yourself in the driver’s seat for true business value.

    Define Your Cloud Vision
    Make the most of cloud for your organization.

    Document Your Cloud Strategy
    Drive consensus by outlining how your organization will use the cloud.

    Create a Right-Sized Disaster Recovery Plan
    Close the gap between your DR capabilities and service continuity requirements.

    Create a Better RFP Process
    Improve your RFPs to gain leverage and get better results.

    Research Authors

    Photo of Darin Stahl, Principal Research Advisor, Info-Tech Research Group.Darin Stahl, Principal Research Advisor, Info-Tech Research Group

    Principal Research Advisor within the Infrastructure Practice and leveraging 38+ years of experience, his areas of focus include: IT Operations Management, Service Desk, Infrastructure Outsourcing, Managed Services, Cloud Infrastructure, DRP/BCP, Printer Management, Managed Print Services, Application Performance Monitoring (APM), Managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

    Photo of Troy Cheeseman, Practice Lead, Info-Tech Research Group.Troy Cheeseman, Practice Lead, Info-Tech Research Group

    Troy has over 24 years of experience and has championed large, enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT Operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) start-ups.

    Research Contributors

    Photo of Dan Duffy, President & Owner, Mid-Range.Dan Duffy, President & Owner, Mid-Range

    Dan Duffy is the President and Founder of Mid-Range Computer Group Inc., an IBM Platinum Business Partner. Dan and his team have been providing the Canadian and American IBM Power market with IBM infrastructure solutions including private cloud, hosting and disaster recovery, high availability and data center services since 1988. He has served on numerous boards and associations including the Toronto Users Group for Mid-Range Systems (TUG), the IBM Business Partners of the Americas Advisory Council, the Cornell Club of Toronto, and the Notre Dame Club of Toronto. Dan holds a Bachelor of Science from Cornell University.

    Photo of George Goodall, Executive Advisor, Info-Tech Research Group.George Goodall, Executive Advisor, Info-Tech Research Group

    George Goodall is an Executive Advisor in the Research Executive Services practice at Info-Tech Research Group. George has over 20 years of experience in IT consulting, enterprise software sales, project management, and workshop delivery. His primary focus is the unique challenges and opportunities in organizations with small and constrained IT operations. In his long tenure at Info-Tech, George has covered diverse topics including voice communications, storage, and strategy and governance.

    Bibliography

    “Companies using IBM i (formerly known as i5/OS).” Enlyft, 21 July 2021. Web.

    Connor, Clare. “IBM i and Meeting the Challenges of Modernization.” Ensono, 22 Mar. 2022. Web.

    Huntington, Tom. “60+ IBM i User Groups and Communities to Join?” HelpSystems, 16 Dec. 2021. Web.

    Perkins, Dale. “The Road to Power Cloud: June 21st 1988 to now. The Journey Continues.” Mid-Range, 1 Nov. 2021. Web.

    Prickett Morgan, Timothy. “How IBM STACKS UP POWER8 AGAINST XEON SERVERS.” The Next Platform, 13 Oct. 2015. Web.

    “Why is AS/400 still used? Four reasons to stick with a classic.” NTT, 21 July 2016. Web.

    Appendix

    Public Cloud Provider Notes

    Appendix –
    Cloud
    Providers


    “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

    AWS

    Appendix –
    Cloud
    Providers



    “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

    Google

    • Google Cloud console supports IBM Power Systems.
    • This offering provides cloud instances running on IBM Power Systems servers with PowerVM.
    • The service uses a per-day prorated monthly subscription model for cloud instance plans with different capacities of compute, memory, storage, and network. Standard plans are listed below and custom plans are possible.
    • There is no IBM i offering yet that we are aware of.
    • For AIX on Power, this would appear to be a better option than AWS (Converge Enterprise Cloud with IBM Power for Google Cloud).

    Appendix –
    Cloud
    Providers



    “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

    Azure

    • Azure has partners using the Azure Dedicated Host offerings to deliver “native support for IBM POWER Systems to Azure data centres” (PowerWire).
    • Microsoft has installed Power servers in an couple Azure data centers and Skytap manages the IBM i, AIX, and Linux environments for clients.
    • As far as I am aware there is no ability to install IBM i or AIX within an Azure Dedicated Host via the retail interfaces – these must be worked through a partner like Skytap.
    • The cloud route for IBM i or AIX might be the easiest working with Skytap and Azure. This would appear to be a better option than AWS in my opinion.

    Appendix –
    Cloud
    Providers



    “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

    IBM

    Domino – Maintain, Commit to, or Vacate?

    If you have a Domino/Notes footprint that is embedded within your business units and business processes and is taxing your support organization, you may have met resistance from the business and been asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses and a multipurpose solution that, over the years, became embedded within core business applications and processes.

    Our Advice

    Critical Insight

    For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

    Impact and Result

    The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

    Domino – Maintain, Commit to, or Vacate? Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Domino – Maintain, Commit to, or Vacate? – A brief deck that outlines key migration options for HCL Domino platforms.

    This blueprint will help you assess the fit, purpose, and price of Domino options; develop strategies for overcoming potential challenges; and determine the future of Domino for your organization.

    • Domino – Maintain, Commit to, or Vacate? Storyboard

    2. Application Rationalization Tool – A tool to understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

    Use this tool to input the outcomes of your various application assessments.

    • Application Rationalization Tool

    Infographic

    Further reading

    Domino – Maintain, Commit to, or Vacate?

    Lotus Domino still lives, and you have options for migrating away from or remaining with the platform.

    Executive Summary

    Info-Tech Insight

    “HCL announced that they have somewhere in the region of 15,000 Domino customers worldwide, and also claimed that that number is growing. They also said that 42% of their customers are already on v11 of Domino, and that in the year or so since that version was released, it’s been downloaded 78,000 times. All of which suggests that the Domino platform is, in fact, alive and well.”
    – Nigel Cheshire in Team Studio

    Your Challenge

    You have a Domino/Notes footprint embedded within your business units and business processes. This is taxing your support organization; you are meeting resistance from the business, and you are now asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses as a multipurpose solution that, over the years, became embedded within core business applications and processes.

    Common Obstacles

    For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

    Info-Tech Approach

    The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

    Review

    Is “Lotus” Domino still alive?

    Problem statement

    The number of member engagements with customers regarding the Domino platform has, as you might imagine, dwindled in the past couple of years. While many members have exited the platform, there are still many members and organizations that have entered a long exit program, but with how embedded Domino is in business processes, the migration has slowed and been met with resistance. Some organizations had replatformed the applications but found that the replacement target state was inadequate and introduced friction because the new solution was not a low-code/business-user-driven environment. This resulted in returning the Domino platform to production and working through a strategy to maintain the environment.

    This research is designed for:

    • IT strategic direction decision-makers
    • IT managers responsible for an existing Domino platform
    • Organizations evaluating migration options for mission-critical applications running on Domino

    This research will help you:

    1. Evaluate migration options.
    2. Assess the fit and purpose.
    3. Consider strategies for overcoming potential challenges.
    4. Determine the future of this platform for your organization.

    The “everything may work” scenario

    Adopt and expand

    Believe it or not, Domino and Notes are still options to consider when determining a migration strategy. With HCL still committed to the platform, there are options organizations should seek to better understand rather than assuming SharePoint will solve all. In our research, we consider:

    Importance to current business processes

    • Importance of use
    • Complexity in migrations
    • Choosing a new platform

    Available tools to facilitate

    • Talent/access to skills
    • Economies of scale/lower cost at scale
    • Access to technology

    Info-Tech Insight

    With multiple options to consider, take the time to clearly understand the application rationalization process within your decision making.

    • Archive/retire
    • Application migration
    • Application replatform
    • Stay right where you are

    Eliminate your bias – consider the advantages

    “There is a lot of bias toward Domino; decisions are being made by individuals who know very little about Domino and more importantly, they do not know how it impacts business environment.”

    – Rob Salerno, Founder & CTO, Rivet Technology Partners

    Domino advantages include:

    Modern Cloud & Application

    • No-code/low-code technology

    Business-Managed Application

    • Business written and supported
    • Embrace the business support model
    • Enterprise class application

    Leverage the Application Taxonomy & Build

    • A rapid application development platform
    • Develop skill with HCL training

    HCL Domino is a supported and developed platform

    Why consider HCL?

    • Consider scheduling a Roadmap Session with HCL. This is an opportunity to leverage any value in the mission and brand of your organization to gain insights or support from HCL.
    • Existing Domino customers are not the only entities seeking certainty with the platform. Software solution providers that support enterprise IT infrastructure ecosystems (backup, for example) will also be seeking clarity for the future of the platform. HCL will be managing these relationships through the channel/partner management programs, but our observations indicate that Domino integrations are scarce.
    • HCL Domino should be well positioned feature-wise to support low-code/NoSQL demands for enterprises and citizen developers.

    Visualize Your Application Roadmap

    1. Focus on the application portfolio and crafting a roadmap for rationalization.
      • The process is intended to help you determine each application’s functional and technical adequacy for the business process that it supports.
    2. Document your findings on respective application capability heatmaps.
      • This drives your organization to a determination of application dispositions and provides a tool to output various dispositions for you as a roadmap.
    3. Sort the application portfolio into a disposition status (keep, replatform, retire, consolidate, etc.)
      • This information will be an input into any cloud migration or modernization as well as consolidation of the infrastructure, licenses, and support for them.

    Our external support perspective

    by Darin Stahl

    Member Feedback

    • Some members who have remaining Domino applications in production – while the retire, replatform, consolidate, or stay strategy is playing out – have concerns about the challenges with ongoing support and resources required for the platform. In those cases, some have engaged external services providers to augment staff or take over as managed services.
    • While there could be existing support resources (in house or on retainer), the member might consider approaching an external provider who could help backstop the single resource or even provide some help with the exit strategies. At this point, the conversation would be helpful in any case. One of our members engaged an external provider in a Statement of Work for IBM Domino Administration focused on one-time events, Tier 1/Tier 2 support, and custom ad hoc requests.
    • The augmentation with the managed services enabled the member to shift key internal resources to a focus on executing the exit strategies (replatform, retire, consolidate), since the business knowledge was key to that success.
    • The member also very aggressively governed the Domino environment support needs to truly technical issues/maintenance of known and supported functionality rather than coding new features (and increasing risk and cost in a migration down the road) – in short, freezing new features and functionality unless required for legal compliance or health and safety.
    • There obviously are other providers, but at this point Info-Tech no longer maintains a market view or scan of those related to Domino due to low member demand.

    Domino database assessments

    Consider the database.

    • Domino database assessments should be informed through the lens of a multi-value database, like jBase, or an object system.
    • The assessment of the databases, often led by relational database subject matter experts grounded in normalized databases, can be a struggle since Notes databases must be denormalized.
    Key/Value Column

    Use case: Heavily accessed, rarely updated, large amounts of data
    Data Model: Values are stored in a hash table of keys.
    Fast access to small data values, but querying is slow
    Processor friendly
    Based on amazon's Dynamo paper
    Example: Project Voldemort used by LinkedIn

    this is a Key/Value example

    Use case: High availability, multiple data centers
    Data Model: Storage blocks of data are contained in columns
    Handles size well
    Based on Google's BigTable
    Example: Hadoop/Hbase used by Facebook and Yahoo

    This is a Column Example
    Document Graph

    Use case: Rapid development, Web and programmer friendly
    Data Model: Stores documents made up of tagged elements. Uses Key/Value collections
    Better query abilities than Key/Value databases.
    Inspired by Lotus Notes.
    Example: CouchDB used by BBC

    This is a Document Example

    Use case: Best at dealing with complexity and relationships/networks
    Data model: Nodes and relationships.
    Data is processed quickly
    Inspired by Euler and graph theory
    Can easily evolve schemas
    Example: Neo4j

    This is a Graph Example

    Understand your options

    Archive/Retire

    Store the application data in a long-term repository with the means to locate and read it for regulatory and compliance purposes.

    Migrate

    Migrate to a new version of the application, facilitating the process of moving software applications from one computing environment to another.

    Replatform

    Replatforming is an option for transitioning an existing Domino application to a new modern platform (i.e. cloud) to leverage the benefits of a modern deployment model.

    Stay

    Review the current Domino platform roadmap and understand HCL’s support model. Keep the application within the Domino platform.

    Archive/retire

    Retire the application, storing the application data in a long-term repository.

    Abstract

    The most common approach is to build the required functionality in whatever new application/solution is selected, then archive the old data in PDFs and documents.

    Typically this involves archiving the data and leveraging Microsoft SharePoint and the new collaborative solutions, likely in conjunction with other software-as-a-service (SaaS) solutions.

    Advantages

    • Reduce support cost.
    • Consolidate applications.
    • Reduce risk.
    • Reduce compliance and security concerns.
    • Improve business processes.

    Considerations

    • Application transformation
    • eDiscovery costs
    • Legal implications
    • Compliance implications
    • Business process dependencies

    Info-Tech Insights

    Be aware of the costs associated with archiving. The more you archive, the more it will cost you.

    Application migration

    Migrate to a new version of the application

    Abstract

    An application migration is the managed process of migrating or moving applications (software) from one infrastructure environment to another.

    This can include migrating applications from one data center to another data center, from a data center to a cloud provider, or from a company’s on-premises system to a cloud provider’s infrastructure.

    Advantages

    • Reduce hardware costs.
    • Leverage cloud technologies.
    • Improve scalability.
    • Improve disaster recovery.
    • Improve application security.

    Considerations

    • Data extraction, starting from the document databases in NSF format and including security settings about users and groups granted to read and write single documents, which is a powerful feature of Lotus Domino documents.
    • File extraction, starting from the document databases in NSF format, which can contain attachments and RTF documents and embedded files.
    • Design of the final relational database structure; this activity should be carried out without taking into account the original structure of the data in Domino files or the data conversion and loading, from the extracted format to the final model.
    • Design and development of the target-state custom applications based on the new data model and the new selected development platform.

    Application replatform

    Transition an existing Domino application to a new modern platform

    Abstract

    This type of arrangement is typically part of an application migration or transformation. In this model, client can “replatform” the application into an off-premises hosted provider platform. This would yield many benefits of cloud but in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

    Two challenges are particularly significant when migrating or replatforming Domino applications:

    • The application functionality/value must be reproduced/replaced with not one but many applications, either through custom coding or a commercial-off-the-shelf/SaaS solution.
    • Notes “databases” are not relational databases and will not migrate simply to an SQL database while retaining the same business value. Notes databases are essentially NoSQL repositories and are difficult to normalize.

    Advantages

    • Leverage cloud technologies.
    • Improve scalability.
    • Align to a SharePoint platform.
    • Improve disaster recovery.
    • Improve application security.

    Considerations

    • Application replatform resource effort
    • Network bandwidth
    • New platform terms and conditions
    • Secure connectivity and communication
    • New platform security and compliance
    • Degree of complexity

    Info-Tech Insights

    There is a difference between a migration and a replatform application strategy. Determine which solution aligns to the application requirements.

    Stay with HCL

    Stay with HCL, understanding its future commitment to the platform.

    Abstract

    Following the announced acquisition of IBM Domino and up until around December 2019, HCL had published no future roadmap for the platform. The public-facing information/website at the time stated that HCL acquired “the product family and key lab services to deliver professional services.” Again, there was no mention or emphasis on upcoming new features for the platform. The product offering on their website at the time stated that HCL would leverage its services expertise to advise clients and push applications into four buckets:

    1. Replatform
    2. Retire
    3. Move to cloud
    4. Modernize

    That public-facing messaging changed with release 11.0, which had references to IBM rebranded to HCL for the Notes and Domino product – along with fixes already inflight. More information can be found on HCL’s FAQ page.

    Advantages

    • Known environment
    • Domino is a supported platform
    • Domino is a developed platform
    • No-code/low-code optimization
    • Business developed applications
    • Rapid application framework

    This is the HCL Domino Logo

    Understand your tools

    Many tools are available to help evaluate or migrate your Domino Platform. Here are a few common tools for you to consider.

    Notes Archiving & Notes to SharePoint

    Summary of Vendor

    “SWING Software delivers content transformation and archiving software to over 1,000 organizations worldwide. Our solutions uniquely combine key collaborative platforms and standard document formats, making document production, publishing, and archiving processes more efficient.”*

    Tools

    Lotus Notes Data Migration and Archiving: Preserve historical data outside of Notes and Domino

    Lotus Note Migration: Replacing Lotus Notes. Boost your migration by detaching historical data from Lotus Notes and Domino.

    Headquarters

    Croatia

    Best fit

    • Application archive and retire
    • Migration to SharePoint

    This is an image of the SwingSoftware Logo

    * swingsoftware.com

    Domino Migration to SharePoint

    Summary of Vendor

    “Providing leading solutions, resources, and expertise to help your organization transform its collaborative environment.”*

    Tools

    Notes Domino Migration Solutions: Rivit’s industry-leading solutions and hardened migration practice will help you eliminate Notes Domino once and for all.

    Rivive Me: Migrate Notes Domino applications to an enterprise web application

    Headquarters

    Canada

    Best fit

    • Application Archive & Retire
    • Migration to SharePoint

    This is an image of the RiVit Logo

    * rivit.ca

    Lotus Notes to M365

    Summary of Vendor

    “More than 300 organizations across 40+ countries trust skybow to build no-code/no-compromise business applications & processes, and skybow’s community of customers, partners, and experts grows every day.”*

    Tools

    SkyBow Studio: The low-code platform fully integrated into Microsoft 365

    Headquarters:

    Switzerland

    Best fit

    • Application Archive & Retire
    • Migration to SharePoint

    This is an image of the SkyBow Logo

    * skybow.com | About skybow

    Notes to SharePoint Migration

    Summary of Vendor

    “CIMtrek is a global software company headquartered in the UK. Our mission is to develop user-friendly, cost-effective technology solutions and services to help companies modernize their HCL Domino/Notes® application landscape and support their legacy COBOL applications.”*

    Tools

    CIMtrek SharePoint Migrator: Reduce the time and cost of migrating your IBM® Lotus Notes® applications to Office 365, SharePoint online, and SharePoint on premises.

    Headquarters

    United Kingdom

    Best fit

    • Application replatform
    • Migration to SharePoint

    This is an image of the CIMtrek Logo

    * cimtrek.com | About CIMtrek

    Domino replatform/Rapid application selection framework

    Summary of Vendor

    “4WS.Platform is a rapid application development tool used to quickly create multi-channel applications including web and mobile applications.”*

    Tools

    4WS.Platform is available in two editions: Community and Enterprise.
    The Platform Enterprise Edition, allows access with an optional support pack.

    4WS.Platform’s technical support provides support services to the users through support contracts and agreements.

    The platform is a subscription support services for companies using the product which will allow customers to benefit from the knowledge of 4WS.Platform’s technical experts.

    Headquarters

    Italy

    Best fit

    • Application replatform

    This is an image of the 4WS PLATFORM Logo

    * 4wsplatform.org

    Activity

    Understand your Domino options

    Application Rationalization Exercise

    Info-Tech Insight

    Application rationalization is the perfect exercise to fully understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

    This activity involves the following participants:

    • IT strategic direction decision-makers.
    • IT managers responsible for an existing Domino platform
    • Organizations evaluating platforms for mission-critical applications.

    Outcomes of this step:

    • Completed Application Rationalization Tool

    Application rationalization exercise

    Use this Application Rationalization Tool to input the outcomes of your various application assessments

    In the Application Entry tab:

    • Input your application inventory or subset of apps you intend to rationalize, along with some basic information for your apps.

    In the Business Value & TCO Comparison tab, determine rationalization priorities.

    • Input your business value scores and total cost of ownership (TCO) of applications.
    • Review the results of this analysis to determine which apps should require additional analysis and which dispositions should be prioritized.

    In the Disposition Selection tab:

    • Add to or adapt our list of dispositions as appropriate.

    In the Rationalization Inputs tab:

    • Add or adapt the disposition criteria of your application rationalization framework as appropriate.
    • Input the results of your various assessments for each application.

    In the Disposition Settings tab:

    • Add or adapt settings that generate recommended dispositions based on your rationalization inputs.

    In the Disposition Recommendations tab:

    • Review and compare the rationalization results and confirm if dispositions are appropriate for your strategy.

    In the Timeline Considerations tab:

    • Enter the estimated timeline for when you execute your dispositions.

    In the Portfolio Roadmap tab:

    • Review and present your roadmap and rationalization results.

    Follow the instructions to generate recommended dispositions and populate an application portfolio roadmap.

    This image depicts a scatter plot graph where the X axis is labeled Business Value, and the Y Axis is labeled Cost. On the graph, the following datapoints are displayed: SF; HRIS; ERP; ALM; B; A; C; ODP; SAS

    Info-Tech Insight

    Watch out for misleading scores that result from poorly designed criteria weightings.

    Related Info-Tech Research

    Build an Application Rationalization Framework

    Manage your application portfolio to minimize risk and maximize value.

    Embrace Business-Managed Applications

    Empower the business to implement their own applications with a trusted business-IT relationship.

    Satisfy Digital End Users With Low- and No-Code

    Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

    Maximize the Benefits from Enterprise Applications with a Center of Excellence

    Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.

    Drive Successful Sourcing Outcomes With a Robust RFP Process

    Leverage your vendor sourcing process to get better results.

    Research Authors

    Darin Stahl, Principal Research Advisor, Info-Tech Research Group

    Darin Stahl, Principal Research Advisor,
    Info-Tech Research Group

    Darin is a Principal Research Advisor within the Infrastructure practice, leveraging 38+ years of experience. His areas of focus include IT operations management, service desk, infrastructure outsourcing, managed services, cloud infrastructure, DRP/BCP, printer management, managed print services, application performance monitoring, managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

    Troy Cheeseman, Practice Lead, Info-Tech Research Group

    Troy Cheeseman, Practice Lead,
    Info-Tech Research Group

    Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

    Research Contributors

    Rob Salerno, Founder & CTO, Rivit Technology Partners

    Rob Salerno, Founder & CTO, Rivit Technology Partners

    Rob is the Founder and Chief Technology Strategist for Rivit Technology Partners. Rivit is a system integrator that delivers unique IT solutions. Rivit is known for its REVIVE migration strategy which helps companies leave legacy platforms (such as Domino) or move between versions of software. Rivit is the developer of the DCOM Application Archiving solution.

    Bibliography

    Cheshire, Nigel. “Domino v12 Launch Keeps HCL Product Strategy On Track.” Team Studio, 19 July 2021. Web.

    “Is LowCode/NoCode the best platform for you?” Rivit Technology Partners, 15 July 2021. Web.

    McCracken, Harry. “Lotus: Farewell to a Once-Great Tech Brand.” TIME, 20 Nov. 2012. Web.

    Sharwood, Simon. “Lotus Notes refuses to die, again, as HCL debuts Domino 12.” The Register, 8 June 2021. Web.

    Woodie, Alex. “Domino 12 Comes to IBM i.” IT Jungle, 16 Aug. 2021. Web.

    Build Your BizDevOps Playbook

    • Buy Link or Shortcode: {j2store}177|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Architecture & Strategy
    • Parent Category Link: /architecture-and-strategy
    • Today’s rapidly scaling and increasingly complex products create mounting pressure on delivery teams to release new features and changes quickly and with sufficient quality.
    • Many organizations see BizDevOps as a solution to help meet this demand. However, they often lack the critical cross-functional collaboration and team-sport culture that are critical for success.
    • The industry provides little consensus and guidance on how to prepare for the transition to BizDevOps.

    Our Advice

    Critical Insight

    • BizDevOps is cultural, not driven by tools. It is about delivering high-quality and valuable releases to stakeholders through collective ownership, continuous collaboration, and team-first behaviors supported by tools.
    • BizDevOps begins with a strong foundation in five key areas. The crux of successful BizDevOps is centered on the strategic adoption and optimization of building great requirements, collaborative practices, iterative delivery, application management, and high-fidelity environments.
    • Teams take STOCK of what it takes to collaborate effectively. Teams and stakeholders must show up, trust the delivery method and people, orchestrate facilitated activities, clearly communicate and knowledge share every time they collaborate.

    Impact and Result

    • Bring the right people to the table. BizDevOps brings significant organizational, process and technology changes to improve delivery effectiveness. Include the key roles in the definition and validation of your BizDevOps vision and practices.
    • Focus on the areas that matter. Review your current circumstances and incorporate the right practices that addresses your key challenges and blockers to becoming BizDevOps.
    • Build your BizDevOps playbook. Gain a broad understanding of the key plays and practices that makes a successful BizDevOps organization. Verify and validate these practices in order to tailor them to your context. Keep your playbook live.

    Build Your BizDevOps Playbook Research & Tools

    Start here – read the Executive Brief

    Find out why you should implement BizDevOps, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Get started with BizDevOps

    Set the right expectations with your stakeholders and define the context of your BizDevOps implementation.

    • Build Your BizDevOps Playbook – Phase 1: Get Started With BizDevOps
    • BizDevOps Playbook

    2. Tailor your BizDevOps playbook

    Tailor the plays in your BizDevOps playbook to your circumstances and vision.

    • Build Your BizDevOps Playbook – Phase 2: Tailor Your BizDevOps Playbook
    [infographic]

    Workshop: Build Your BizDevOps Playbook

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Set Your Expectations

    The Purpose

    Discuss the goals of your BizDevOps playbook.

    Identify the various perspectives who should be included in the BizDevOps discussion.

    Level set expectations of your BizDevOps implementation.

    Key Benefits Achieved

    Identification of the key roles who should be included in the BizDevOps discussion.

    Learning of key practices to support your BizDevOps vision and goals.

    Your vision of BizDevOps in your organization.

    Activities

    1.1 Define BizDevOps.

    1.2 Understand your key stakeholders.

    1.3 Define your objectives.

    Outputs

    Your BizDevOps definition

    List of BizDevOps stakeholders

    BizDevOps vision and objectives

    2 Set the Context

    The Purpose

    Understand the various methods to initiate the structuring of facilitated collaboration.

    Share a common way of thinking and behaving with a set of principles.

    Focus BizDevOps adoption on key areas of software product delivery.

    Key Benefits Achieved

    A chosen collaboration method (Scrum, Kanban, Scrumban) to facilitate collaboration

    A mutually understanding and beneficial set of guiding principles

    Areas where BizDevOps will see the most benefit

    Activities

    2.1 Select your foundation method.

    2.2 Define your guiding principles.

    2.3 Focus on the areas that matter.

    Outputs

    Chosen collaboration model

    List of guiding principles

    High-level assessment of delivery practices and its fit for BizDevOps

    3 Tailor Your BizDevOps Playbook

    The Purpose

    Review the good practices within Info-Tech’s BizDevOps Playbook.

    Tailor your playbook to reflect your circumstances.

    Key Benefits Achieved

    Understanding of the key plays involved in product delivery

    Product delivery plays that reflect the challenges and opportunities of your organization and support your BizDevOps vision

    Activities

    3.1 Review and tailor the plays in your playbook

    Outputs

    High-level discussion of key product delivery plays and its optimization to support BizDevOps

    Select Your Data Platform

    • Buy Link or Shortcode: {j2store}346|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $62,999 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management

    Every organization needs a data management (DM) platform that enables the DM capabilities required. This could be a daunting task because:

    • Every organization has a unique set of requirements for the DM platform.
    • Software products are difficult to compare because every vendor provides a unique set of features.
    • Software vendors are interested in getting as large a footprint as possible.
    • Some products from different categories offer the same functionalities.
    • Some products are just not compatible.

    Our Advice

    Critical Insight

    • Technology requirements start with the business goals.
    • Data platform selection should be based on common best practices and, at the same time, be optimized for the organization’s specific needs and goals and support an evolutionary platform development.
    • What is best for one organization may be totally unacceptable for another – all for very valid reasons.

    Impact and Result

    Understand your current environment and use proven reference architecture patterns to expedite building the data management platform that matches your needs.

    • Use a holistic approach.
    • Understand your goals and priorities.
    • Picture your target-state architecture.
    • Identify your current technology coverage.
    • Select the software covering the gaps in technology enablement based on feature/functional enablement descriptions as well as vendor and deployment preferences.

    Select Your Data Platform Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out what challenges are typically in the way of designing a data platform, review Info-Tech’s methodology, and understand how we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Select your data platform

    Assess your current environment, find the right reference architecture pattern, and match identified capabilities with software features.

    • Data Platform Design Assessment
    • Reference Architecture Pattern

    Infographic

    Break Open Your DAM With Intuitive Metadata

    • Buy Link or Shortcode: {j2store}389|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Organizations are facing challenges from explosive information growth in both volume and complexity, as well as the need to use more new sources of information for social media just to remain in business.
    • A lot of content can be created quickly, but managing those digital assets properly through metadata tagging that will be used consistently and effectively requires processes to be in place to create standardized and informational metadata at the source of content creation.
    • Putting these processes in place changes the way the organization handles its information, which may generate pushback, and requires socialization and proper management of the metadata strategy.

    Our Advice

    Critical Insight

    • Metadata is an imperative part of the organizations broader information management strategy. Some may believe that metadata is not needed anymore; Google search is not a magic act – it relies on information tagging that reflects cultural sentiment.
    • Metadata should be pliable. It needs to grow with the changing cultural and corporate vernacular and knowledge, and adapt to changing needs.
    • Build a map for your metadata before you dig for buried treasure. Implement metadata standards and processes for current digital assets before chasing after your treasure troves of existing artifacts.

    Impact and Result

    • Create a sustainable and effective digital asset management (DAM) program by understanding Info-Tech’s DAM framework and how the framework fits within your organization for better management of key digital assets.
    • Create an enterprise-wide metadata design principles handbook to keep track of metadata schemas and standards, as well as communicate the standards to the entire organization.
    • Gather requirements for your DAM program, as well as the DAM system and roles, by interviewing key stakeholders and identifying prevalent pains and opportunities. Understand where digital assets are created, used, and stored throughout the enterprise to gain a high-level perspective of DAM requirements.
    • Identify the organization’s current state of metadata management along with the target state, identify the gaps, and then define solutions to fill those gaps. Ensure business initiatives are woven into the mix.
    • Create a comprehensive roadmap to prioritize initiatives and delineate responsibilities.

    Break Open Your DAM With Intuitive Metadata Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop a digital asset management program focused on metadata, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build a foundation for your DAM project

    Gain an in-depth understanding of what digital asset management is as well as how it is supported by Info-Tech’s DAM framework.

    • Break Open Your DAM With Intuitive Metadata – Phase 1: Build a Foundation for Your DAM Project
    • DAM Design Principles Handbook
    • Where in the World Is My Digital Asset? Tool
    • Digital Asset Inventory Tool
    • DAM Requirements Gathering Tool

    2. Dive into the DAM strategy

    Create a metadata program execution strategy and assess current and target states for the organization’s DAM.

    • Break Open Your DAM With Intuitive Metadata – Phase 2: Dive Into the DAM Strategy
    • DAM Roadmap Tool
    • DAM Metadata Execution Strategy Document

    3. Create intuitive metadata for your DAM

    Design a governance plan for ongoing DAM and metadata management.

    • Break Open Your DAM With Intuitive Metadata – Phase 3: Create Intuitive Metadata for Your Digital Assets
    • Metadata Manager Tool
    [infographic]

    Workshop: Break Open Your DAM With Intuitive Metadata

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Structure the Metadata Project

    The Purpose

    Develop a foundation of knowledge regarding DAM and metadata, as well as the best practices for organizing the organization’s information and digital assets for ideal findability.

    Key Benefits Achieved

    Design standardized processes for metadata creation and digital asset management to help to improve findability of key assets.

    Gain knowledge of how DAM can benefit both IT and the business.

    Activities

    1.1 Build a DAM and metadata knowledge foundation.

    1.2 Kick-start creation of the organization’s DAM design principles handbook.

    1.3 Interview key business units to understand drivers for the program.

    1.4 Develop a DAM framework.

    Outputs

    DAM Design Principles Handbook

    DAM Execution Strategy Document

    2 Assess Requirements for the DAM Program

    The Purpose

    Inventory the organization’s key digital assets and their repositories.

    Gather the organization’s requirements for a full-time digital asset librarian, as well as the DAM system.  

    Key Benefits Achieved

    Determine clear and specific requirements for the organization from the DAM system and the people involved.

    Activities

    2.1 Conduct a digital asset inventory to identify key assets to include in DAM.

    2.2 Prioritize digital assets to determine their risk and value to ensure appropriate support through the information lifecycle.

    2.3 Determine the requirements of the business and IT for the DAM system and its metadata.

    Outputs

    Digital Asset Inventory Tool

    DAM Requirements Gathering Tool

    3 Design Roadmap and Plan Implementation

    The Purpose

    Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.

    Determine timing of the initiatives. 

    Key Benefits Achieved

    Establish a clear direction for the DAM program.

    Build a step-by-step outline of how to create effective metadata with true business-IT collaboration.

    Have prioritized initiatives with dependencies mapped out.

    Activities

    3.1 Assess current and target states of DAM in the organization.

    3.2 Brainstorm and document practical initiatives to close the gap.

    3.3 Discuss strategies rooted in business requirements to execute the metadata management program to improve findability of digital assets.

    Outputs

    DAM Roadmap Tool

    4 Establish Metadata Governance

    The Purpose

    Identify the roles required for effective DAM and metadata management.

    Create sample metadata according to established guiding principles and implement a feedback method to create intuitive metadata in the organization. 

    Key Benefits Achieved

    Metadata management is an ongoing project. Implementing it requires user input and feedback, which governance will help to support.

    By integrating metadata governance with larger information or data governance bodies, DAM and metadata management will gain sustainability. 

    Activities

    4.1 Discuss and assign roles and responsibilities for initiatives identified in the roadmap.

    4.2 Review policy requirements for the information assets in the organization and strategies to address enforcement.

    4.3 Integrate the governance of metadata into larger governance committees.

    Outputs

    DAM Execution Strategy

    Prepare and Defend Against a Software Audit

    • Buy Link or Shortcode: {j2store}59|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $32,499 Average $ Saved
    • member rating average days saved: 6 Average Days Saved
    • Parent Category Name: Licensing
    • Parent Category Link: /licensing
    • Audit defense starts long before you get audited. Negotiating your vendors’ audit rights and maintaining a documented consolidated licensing position ensure that you are not blindsided by a sudden audit request.
    • Notification of an impending audit can cause panic. Don't panic. While the notification will be full of strong language, your best chance of success is to take control of the situation. Prepare a measured response that buys you enough time to get your house in order before you let the vendor in.
    • If a free software asset review sounds too good to be true, then it probably is. If a vendor or one of its partners offers up a free software asset management engagement, they aren’t doing so out of the goodness of their heart — they expect to recoup their costs (and then some) from identified license discrepancies.

    Our Advice

    Critical Insight

    • The amount of business disruption depends on the scope of the audit, and the size and complexity of the organization coupled with the contractual audit clause in the contract.
    • These highly visible failures can be prevented through effective software asset management practices.
    • As complexity of licensing increases, so do penalties. If the environment is highly complex, prioritize effort by likelihood of audit and spend.
    • Ensure electronic records exist for license documentation to provide fast access for audit and information requests
    • Verify accuracy of discovered data. Ensure all devices on the network are being audited. Without a complete discovery process, data will always be inaccurate.

    Impact and Result

    • Being able to respond quickly with accurate data is critical. When deadlines are tight, and internal resources don’t exist, hire a third party as their experience will allow a faster response.
    • Negotiate terms of the audit such as deadlines, proof of license entitlement, and who will complete the audit.
    • Create a methodology to quickly and efficiently respond to audit requests.
    • Conduct annual internal audits.
    • Have a designated cross-functional IT audit team.
    • Prepare documentation in advance.
    • Manage audit logistics to minimize business disruption.
    • Dispute unwarranted findings.

    Prepare and Defend Against a Software Audit Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should be prepared and ready to defend against a software audit, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Prevent an audit

    Begin your proactive audit management journey and leverage value from your software asset management program.

    • Prepare and Defend Against a Software Audit – Phase 1: Prevent an Audit
    • Audit Defense Maturity Assessment Tool
    • Effective Licensing Position Tool
    • Audit Defence RACI Template

    2. Prepare for an audit

    Prepare for an audit by effectively scoping and consolidating organizational response.

    • Prepare and Defend Against a Software Audit – Phase 2: Prepare for an Audit
    • Software Audit Scoping Email Template
    • Audit Defense Readiness Assessment

    3. Conduct the audit

    Execute the audit in a way that preserves valuable relationships while accounting for vendor specific criteria.

    • Prepare and Defend Against a Software Audit – Phase 3: Conduct an Audit
    • Software Audit Launch Email Template

    4. Manage post-audit activities

    Conduct negotiations, settle on remuneration, and close out the audit.

    • Prepare and Defend Against a Software Audit - Phase 4: Manage Post-Audit Activities
    [infographic]

    Workshop: Prepare and Defend Against a Software Audit

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Prevent an Audit

    The Purpose

    Kick off the project

    Identify challenges and red flags

    Determine maturity and outline internal audit

    Clarify stakeholder responsibilities

    Build and structure audit team

    Key Benefits Achieved

    Leverage value from your audit management program

    Begin your proactive audit management journey

    A documented consolidated licensing position, which ensures that you are not blindsided by a sudden audit request

    Activities

    1.1 Perform a maturity assessment of the current environment

    1.2 Classify licensing contracts/vendors

    1.3 Conduct a software inventory

    1.4 Meter application usage

    1.5 Manual checks

    1.6 Gather software licensing data

    1.7 Reconcile licenses

    1.8 Create your audit team and assign accountability

    Outputs

    Maturity assessment

    Effective license position/license reconciliation

    Audit team RACI chart

    2 Prepare for an Audit

    The Purpose

    Create a strategy for audit response

    Know the types of requests

    Scope the engagement

    Understand scheduling challenges

    Know roles and responsibilities

    Understand common audit pitfalls

    Define audit goals

    Key Benefits Achieved

    Take control of the situation and prepare a measured response

    A dedicated team responsible for all audit-related activities

    A formalized audit plan containing team responsibilities and audit conduct policies

    Activities

    2.1 Use Info-Tech’s readiness assessment template

    2.2 Define the scope of the audit

    Outputs

    Readiness assessment

    Audit scoping email template

    3 Conduct the Audit

    The Purpose

    Overview of process conducted

    Kick-off and self-assessment

    Identify documentation requirements

    Prepare required documentation

    Data validation process

    Provide resources to enable the auditor

    Tailor audit management to vendor compliance position

    Enforce best-practice audit behaviors

    Key Benefits Achieved

    A successful audit with minimal impact on IT resources

    Reduced severity of audit findings

    Activities

    3.1 Communicate audit commencement to staff

    Outputs

    Audit launch email template

    4 Manage Post-Audit Activities

    The Purpose

    Clarify auditor findings and recommendations

    Access severity of audit findings

    Develop a plan for refuting unwarranted findings

    Disclose findings to management

    Analyze opportunities for remediation

    Provide remediation options and present potential solutions

    Key Benefits Achieved

    Ensure your audit was productive and beneficial

    Improve your ability to manage audits

    Come to a consensus on which findings truly necessitate organizational change

    Activities

    4.1 Don't accept the penalties; negotiate with vendors

    4.2 Close the audit and assess the financial impact

    Outputs

    A consensus on which findings truly necessitate organizational change

    Identify Opportunities to Mature the Security Architecture

    • Buy Link or Shortcode: {j2store}385|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Secure Cloud & Network Architecture
    • Parent Category Link: /secure-cloud-network-architecture
    • Organizations do not have a solid grasp on the complexity of their infrastructure and are unaware of the overall risk to their infrastructure posed by inadequate security.
    • Organizations do not understand how to properly create and deliver value propositions of technical security solutions.

    Our Advice

    Critical Insight

    • The security architecture is a living, breathing thing based on the risk profile of your organization.
    • Compliance and risk mitigation create an intertwined relationship between the business and your security architecture. The security architecture roadmap must be regularly assessed and continuously maintained to ensure security controls align with organizational objectives.

    Impact and Result

    • A right-sized security architecture can be created by assessing the complexity of the IT department, the operations currently underway for security, and the perceived value of a security architecture within the organization. This will bring about a deeper understanding of the organizational infrastructure.
    • Developing a security architecture should also result in a list of opportunities (i.e. initiatives) that an organization can integrate into a roadmap. These initiatives will seek to improve security operations and strengthen the IT department’s understanding of security’s role within the organization.
    • A better understanding of the infrastructure will help to save time on determining the correct technologies required from vendors and therefore cut down on the amount of vendor noise.
    • Creating a defensible roadmap will assist with justifying future security spend.

    Identify Opportunities to Mature the Security Architecture Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop a right-sized security architecture, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify the organization’s ideal security architecture

    Complete three unique assessments to define the ideal security architecture maturity for your organization.

    • Identify Opportunities to Mature the Security Architecture – Phase 1: Identify the Organization's Ideal Security Architecture
    • Security Architecture Recommendation Tool
    • None

    2. Create a security program roadmap

    Use the results of the assessments from Phase 1 of this research to create a roadmap for improving the security program.

    • Identify Opportunities to Mature the Security Architecture – Phase 2: Create a Security Program Roadmap
    [infographic]

    Embrace Business-Managed Applications

    • Buy Link or Shortcode: {j2store}179|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $64,999 Average $ Saved
    • member rating average days saved: 18 Average Days Saved
    • Parent Category Name: Architecture & Strategy
    • Parent Category Link: /architecture-and-strategy
    • The traditional model of managing applications does not address the demands of today’s rapidly changing market and digitally minded business, putting stress on scarce IT resources. The business is fed up with slow IT responses and overbearing desktop and system controls.
    • The business wants more control over the tools they use. Software as a service (SaaS), business process management (BPM), robotic process automation (RPA), artificial intelligence (AI), and low-code development platforms are all on their radar.
    • However, your current governance and management structures do not accommodate the risks and shifts in responsibilities to business-managed applications.

    Our Advice

    Critical Insight

    • IT is a business partner, not just an operator. Effective business operations hinge on high-quality, valuable, fit-for-purpose applications. IT provides the critical insights, guidance, and assistance to ensure applications are implemented and leveraged in a way that maximizes return on investment, whether it is being managed by end users or lines of business (LOBs). This can only happen if the organization views IT as a critical asset, not just a supporting player.
    • All applications should be business owned. You have applications because LOBs need them to meet the objectives and key performance indicators defined in the business strategy. Without LOBs, there would be no need for business applications. LOBs define what the application should be and do for it to be successful, so LOBs should own them.
    • Everything boils down to trust. The business is empowered to make their own decisions on how they want to implement and use their applications and, thus, be accountable for the resulting outcomes. Guardrails, role-based access, application monitoring, and other controls can help curb some risk factors, but it should not come at the expense of business innovation and time-sensitive opportunities. IT must trust the business will make rational application decisions, and the business must trust IT to support them in good times and bad.

    Impact and Result

    • Focus on the business units that matter. BMA can provide significant value to LOBs if teams and stakeholders are encouraged and motivated to adopt organizational and operational changes.
    • Reimagine the role of IT. IT is no longer the gatekeeper that blocks application adoption. Rather, IT enables the business to adopt the tools they need to be productive and they guide the business on successful BMA practices.
    • Instill business accountability. With great power comes great responsibility. If the business wants more control of their applications, they must be willing to take ownership of the outcomes of their decisions.

    Embrace Business-Managed Applications Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should embrace business-managed applications, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Embrace Business-Managed Applications – Phases 1-3
    • Business-Managed Applications Communication Template

    1. State your objectives

    Level-set the expectations for your business-managed applications.

    • Embrace Business- Managed Applications – Phase 1: State Your Objectives

    2. Design your framework and governance

    Identify and define your application managers and owners and build a fit-for-purpose governance model.

    • Embrace Business-Managed Applications – Phase 2: Design Your Framework & Governance

    3. Build your roadmap

    Build a roadmap that illustrates the key initiatives to implement your BMA and governance models.

    • Embrace Business-Managed Applications – Phase 3: Build Your Roadmap

    [infographic]

    Workshop: Embrace Business-Managed Applications

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 State Your Objectives

    The Purpose

    Define business-managed applications in your context.

    Identify your business-managed application objectives.

    State the value opportunities with business-managed applications.

    Key Benefits Achieved

    A consensus definition and list of business-managed applications goals

    Understanding of the business value business-managed applications can deliver

    Activities

    1.1 Define business-managed applications.

    1.2 List your objectives and metrics.

    1.3 State the value opportunities.

    Outputs

    Grounded definition of a business-managed application

    Goals and objectives of your business-managed applications

    Business value opportunity with business-managed applications

    2 Design Your Framework & Governance

    The Purpose

    Develop your application management framework.

    Tailor your application delivery and ownership structure to fit business-managed applications.

    Discuss the value of an applications committee.

    Discuss technologies to enable business-managed applications.

    Key Benefits Achieved

    Fit-for-purpose and repeatable application management selection framework

    Enhanced application governance model

    Applications committee design that meets your organization’s needs

    Shortlist of solutions to enable business-managed applications

    Activities

    2.1 Develop your management framework.

    2.2 Tune your delivery and ownership accountabilities.

    2.3 Design your applications committee.

    2.4 Uncover your solution needs.

    Outputs

    Tailored application management selection framework

    Roles definitions of application owners and managers

    Applications committee design

    List of business-managed application solution features and services

    3 Build Your Roadmap

    The Purpose

    Build your roadmap to implement busines-managed applications and build the foundations of your optimized governance model.

    Key Benefits Achieved

    Implementation initiatives

    Adoption roadmap

    Activities

    3.1 Build your roadmap.

    Outputs

    Business-managed application adoption roadmap

     

    Sprint Toward Data-Driven Culture Using DataOps

    • Buy Link or Shortcode: {j2store}199|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $10,399 Average $ Saved
    • member rating average days saved: 9 Average Days Saved
    • Parent Category Name: Enterprise Integration
    • Parent Category Link: /enterprise-integration
    • Data teams do not have a mechanism to integrate with operations teams and operate in a silo.
    • Significant delays in the operationalization of analytical/algorithms due to lack of standards and a clear path to production.
    • Raw data is shared with end users and data scientists due to poor management of data, resulting in more time spent on integration and less on insight generation and analytics.

    Our Advice

    Critical Insight

    • Data and analytics teams need a clear mechanism to separate data exploratory work and repetitive data insights generation. Lack of such separation is the main cause of significant delays, inefficiencies, and frustration for data initiatives.
    • Access to data and exploratory data analytics is critical. However, the organization must learn to share insights and reuse analytics.
    • Once analytics finds wider use in the organization, they need to adopt a disciplined approach to ensure its quality and continuous integration in the production environment.

    Impact and Result

    • Use a metrics-driven approach and common framework across silos to enable the rapid development of data initiatives using Agile principles.
    • Implement an approach that allows business, data, and operation teams to collaboratively work together to provide a better customer experience.
    • Align DataOps to an overall data management and governance program that promotes collaboration, transparency, and empathy across teams, establishes the appropriate roles and responsibilities, and ensures alignment to a common set of goals.
    • Assess the current maturity of the data operations teams and implement a roadmap that considers the necessary competencies and capabilities and their dependencies in moving towards the desired DataOps target state.

    Sprint Toward Data-Driven Culture Using DataOps Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to understand the operational challenges associated with productizing the organization's data-related initiative. Review Info-Tech’s methodology for enabling the improved practice to operationalize data analytics and how we will support you in creating an agile data environment.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Discover benefits of DataOps

    Understand the benefits of DataOps and why organizations are looking to establish agile principles in their data practice, the challenges associated with doing so, and what the new DataOps strategy needs to be successful.

    • Sprint Toward Data-Driven Culture Using DataOps – Phase 1: Discover Benefits of DataOps

    2. Assess your data practice for DataOps

    Analyze DataOps using Info-Tech’s DataOps use case framework, to help you identify the gaps in your data practices that need to be matured to truly realize DataOps benefits including data integration, data security, data quality, data engineering, and data science.

    • Sprint Toward Data-Driven Culture Using DataOps – Phase 2: Assess Your Data Practice for DataOps
    • DataOps Roadmap Tool

    3. Mature your DataOps practice

    Mature your data practice by putting in the right people in the right roles and establishing DataOps metrics, communication plan, DataOps best practices, and data principles.

    • Sprint Toward Data-Driven Culture Using DataOps – Phase 3: Mature Your DataOps Practice
    [infographic]

    Workshop: Sprint Toward Data-Driven Culture Using DataOps

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify the Drivers of the Business for DataOps

    The Purpose

    Understand the DataOps approach and value proposition.

    Key Benefits Achieved

    A clear understanding of organization data priorities and metrics along with a simplified view of data using Info-Tech’s Onion framework.

    Activities

    1.1 Explain DataOps approach and value proposition.

    1.2 Review the common business drivers and how the organization is driving a need for DataOps.

    1.3 Understand Info-Tech’s DataOps Framework.

    Outputs

    Organization's data priorities and metrics

    Data Onion framework

    2 Assess DataOps Maturity in Your Organization

    The Purpose

    Assess the DataOps maturity of the organization.

    Key Benefits Achieved

    Define clear understanding of organization’s DataOps capabilities.

    Activities

    2.1 Assess current state.

    2.2 Develop target state summary.

    2.3 Define DataOps improvement initiatives.

    Outputs

    Current state summary

    Target state summary

    3 Develop Action Items and Roadmap to Establish DataOps

    The Purpose

    Establish clear action items and roadmap.

    Key Benefits Achieved

    Define clear and measurable roadmap to mature DataOps within the organization.

    Activities

    3.1 Continue DataOps improvement initiatives.

    3.2 Document the improvement initiatives.

    3.3 Develop a roadmap for DataOps practice.

    Outputs

    DataOps initiatives roadmap

    4 Plan for Continuous Improvement

    The Purpose

    Define a plan for continuous improvements.

    Key Benefits Achieved

    Continue to improve DataOps practice.

    Activities

    4.1 Create target cross-functional team structures.

    4.2 Define DataOps metrics for continuous monitoring.

    4.3 Create a communication plan.

    Outputs

    DataOps cross-functional team structure

    DataOps metrics

    Improve IT Team Effectiveness

    • Buy Link or Shortcode: {j2store}521|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $16,549 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: Lead
    • Parent Category Link: /lead
    • Organizations rely on team-based work arrangements to provide organizational benefits and to help them better navigate the volatile, uncertain, complex, and ambiguous (VUCA) operating environment.
    • This is becoming more challenging in a hybrid model as interactions now rely less on casual encounters and now must become more intentional.
    • A high-performing team is more than productive. They are more resilient and able to recognize opportunities. They are proactive instead of reactive due to trust and a high level of communication and collaboration.
    • IT teams are more unique, which also provides unique challenges other teams don’t experience.

    Our Advice

    Critical Insight

    IT teams have:

    • Multiple disciplines that tend to operate in parallel versus within a sequence of events.
    • Multiple incumbent roles where people operate in parallel versus needing to share information to produce an outcome.
    • Multiple stakeholders who create a tension with competing priorities.

    Impact and Result

    Use Info-Tech’s phased approach to diagnose your team and use the IDEA model to drive team effectiveness.

    The IDEA model includes four factors to identify team challenges and focus on areas for improvement: identity, decision making, exchanges within the team, and atmosphere of team psychological safety.

    Improve IT Team Effectiveness Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Team Effectiveness Storyboard – A step-by-step document that walks you through how to properly assess your team’s effectiveness and activities that will identify solutions to overcome.

    The storyboard will walk you through three critical steps to assess, analyze, and build solutions to improve your team’s effectiveness.

  • Having your team members complete an assessment.
  • Reviewing and sharing the results.
  • Building a list of activities to select from based on the assessment results to ensure you target the problem you are facing.
    • Improve IT Team Effectiveness Storyboard – Phases 1-3

    2. The Team Effectiveness Survey – A tool that will determine what areas you are doing well in and where you can improve team relations and increase productivity.

    Each stage has a deliverable that will support your journey on increasing effectiveness starting with how to communicate to the assessment which will accumulate into a team charter and action plan.

    • IT Team Effectiveness Survey
    • IT Team Effectiveness Survey Tool

    3. Facilitation Guide – A collection of activities to select from and use with your team.

    The Facilitation Guide contains instructions to facilitating several activities aligned to each area of the IDEA Model to target your approach directly to your team’s results.

  • Determining roles and responsibilities on the team.
  • Creating a decision-making model that outlines levels of authority and who makes the decisions.
  • Assessing the team communications flow, which highlights the communication flow on the team and any bottlenecks.
  • Building a communication poster that articulates methods used to share different information within the team.
    • Improve IT Team Effectiveness Facilitation Guide
    • Identity – Responsibilities and Dependencies
    • Decision Making Accountability Workbook
    • Exchanges – Team Communications Flow
    • Exchanges – Communications Guide Poster Template
    • Atmosphere – SCARF Worksheet

    4. Action Plan – A template to help build your team action plan.

    The Action Plan Template captures next steps for the team on what they are committing to in order to build a more effective team.

    • Action Plan Template

    5. Team Charter – A template to create a charter for a work group or project team.

    A Team Charter captures the agreements your team makes with each other in terms of accepted behaviors and how they will communicate, make decisions, and create an environment that everyone feels safe contributing in.

    • IT Team Charter Template

    Infographic

    Workshop: Improve IT Team Effectiveness

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess the Team

    The Purpose

    Determine if proceeding is valuable.

    Key Benefits Achieved

    Set context for team members.

    Activities

    1.1 Review the business context.

    1.2 Identify IT team members to be included.

    1.3 Determine goals and objectives.

    1.4 Build execution plan and determine messaging.

    1.5 Complete IDEA Model assessment.

    Outputs

    Execution and communication plan

    IDEA Model assessment distributed

    2 Review Results and Action Plan

    The Purpose

    Review results to identify areas of strength and opportunity.

    Key Benefits Achieved

    As a team, discuss results and determine actions.

    Activities

    2.1 Debrief results with leadership team.

    2.2 Share results with team.

    2.3 Identify areas of focus.

    2.4 Identify IDEA Model activities to support objectives and explore areas of focus.

    Outputs

    IDEA assessment results

    Selection of specific activities to be facilitated

    3 Document and Measure

    The Purpose

    Review results to identify areas of strength and opportunity.

    Key Benefits Achieved

    build an action plan of solutions to incorporate into team norms.

    Activities

    3.1 Create team charter.

    3.2 Determine action plan for improvement.

    3.3 Determine metrics.

    3.4 Determine frequency of check-ins.

    Outputs

    Team Charter

    Action Plan

    Further reading

    Improve IT Team Effectiveness

    Implement the four critical factors required for all high-performing teams.

    Analyst Perspective

    All teams need to operate effectively; however, IT teams experience unique challenges.

    IT often struggles to move from an effective to a high-performing team due to the very nature of their work. They work across multiple disciplines and with multiple stakeholders.

    When operating across many disciplines it can become more difficult to identify the connections or points of interactions that define effective teams and separate them from being a working group or focus on their individual performance.

    IT employees also work in close partnership with multiple teams outside their IT domain, which can create confusion as to what team are they a primary member of. The tendency is to advocate for or on behalf of the team they primarily work with instead of bringing the IT mindset and alignment to IT roadmap and goals to serve their stakeholders.

    A Picture of Amanda Mathieson

    Amanda Mathieson
    Research Director, People & Leadership Practice
    Info-Tech Research Group

    Executive Summary

    The Challenge

    Organizations rely on team-based work arrangements to provide organizational benefits and better navigate the volatile, uncertain, complex, and ambiguous (VUCA) operating environment.

    This is becoming more challenging in a hybrid environment as interactions now rely less on casual encounters and must become more intentional.

    A high-performing team is more than productive. They are more resilient and able to recognize opportunities. They are proactive instead of reactive due to the trust and high level of communication and collaboration.

    Common Obstacles

    IT teams are more unique, which also provides unique challenges other teams don't experience:

    • Multiple disciplines that tend to operate in parallel versus within a sequence of events
    • Multiple incumbent roles where people operate in parallel versus needing to share information to produce an outcome
    • Multiple stakeholders that create a tension with competing priorities

    Info-Tech's Approach

    Use Info-Tech's phased approach to diagnose your team and use the IDEA model to drive team effectiveness.

    The IDEA model includes four factors to identify team challenges and focus on areas for improvement: identity, decision making, exchanges within the team, and atmosphere of team psychological safety.

    Info-Tech Insight

    IT teams often fail to reach their full potential because teamwork presents unique challenges and complexities due to the work they do across the organization and within their own group. Silos, not working together, and not sharing knowledge are all statements that indicate a problem. As a leader it's difficult to determine what to do first to navigate the different desires and personalities on a team.

    How this blueprint will help

    Assess, diagnose, and address issues to realize your team's full potential.

    This research helps IT support:

    • Work Teams: Operate under one organizational unit or function. Their membership is generally stable with well-defined roles.
    • Project Teams: Typically, are time-limited teams formed to produce a particular output or project. Their membership and expertise tend to vary over time.
    • Management or Leadership Teams: Provide direction and guidance to the organization and are accountable for overall performance. Membership is structured by the hierarchy of the organization and includes a diverse set of skills, experience, and expertise.

    Traditionally, organizations have tried to fix ineffective teams by focusing on these four issues: composition, leadership competencies, individual-level performance, and organizational barriers. While these factors are important, our research has shown it is beneficial to focus on the four factors of effective teams addressed in this blueprint first. Then, if additional improvement is needed, shift your focus to the traditional issue areas.

    Common obstacles

    These barriers make it difficult to address effectiveness for many IT teams:

    • Teams do not use one standard set of processes because they may have a wide variety of assignments requiring different sets of processes.
      Source: Freshworks
    • There are multiple disciplines within IT that require vastly different skill sets. Finding the connection points can be difficult when on the surface it seems like success doesn't require interconnectivity.
    • IT has many people in the same roles that act independently based on the stakeholder or internal customer they are serving. This can lead to duplication of effort if information and solutions aren't shared.
    • IT serves many parts of the organization that can bring competing priorities both across the groups they support and with the IT strategy and roadmap itself. Many IT leaders work directly in or for the business, which can see them associate with the internal client team more than their IT team – another layer of conflicting priorities.

    IT also experience challenges with maturity and data silos

    48%

    of IT respondents rate their team as low maturity.

    Maturity is defined by the value they provide the business, ranging from firefighting to innovative partner.

    Source: Info-Tech Research Group, Tech Trends, 2022

    20 Hours

    Data Silos: Teams waste more than 20 hours per month due to poor collaboration and communication.

    Source: Bloomfire, 2022

    Current realities require teams to operate effectively

    How High-Performing Teams Respond:

    Volatile: High degree of change happening at a rapid pace, making it difficult for organizations to respond effectively.

    Teams are more adaptable to change because they know how to take advantage of each others' diverse skills and experience.

    Uncertain: All possible outcomes are not known, and we cannot accurately assess the probability of outcomes that are known.

    Teams are better able to navigate uncertainty because they know how to work through complex challenges and feel trusted and empowered to change approach when needed.

    Complex: There are numerous risk factors, making it difficult to get a clear sense of what to do in any given situation.

    Teams can reduce complexity by working together to identify and plan to appropriately mitigate risk factors.

    Ambiguous: There is a lack of clarity with respect to the causes and consequences of events.

    Teams can reduce ambiguity through diverse situational knowledge, improving their ability to identify cause and effect.

    Teams struggle to realize their full potential

    Poor Communication

    To excel, teams must recognize and adapt to the unique communication styles and preferences of their members.

    To find the "just right" amount of communication for your team, communication and collaboration expectations should be set upfront.

    85% of tech workers don't feel comfortable speaking in meetings.
    Source: Hypercontext, 2022

    Decision Making

    Decision making is a key component of team effectiveness. Teams are often responsible for decisions without having proper authority.

    Establishing a team decision-making process becomes more complicated when appropriate decision-making processes vary according to the level of interdependency between team members and organizational culture.

    20% of respondents say their organization excels at decision making.
    Source: McKinsey, 2019

    Resolving Conflicts

    It is common for teams to avoid/ignore conflict – often out of fear. People fail to see how conflict can be healthy for teams if managed properly.

    Leaders assume mature adults will resolve conflicts on their own. This is not always the case as people involved in conflicts can lack an objective perspective due to charged emotions.

    56% of respondents prioritize restoring harmony in conflict and will push own needs aside.
    Source: Niagara Institute, 2022

    Teams with a shared purpose are more engaged and have higher performance

    Increased Engagement

    3.5x

    Having a shared team goal drives higher engagement. When individuals feel like part of a team working toward a shared goal, they are 3.5x more likely to be engaged.

    Source: McLean & Company, Employee Engagement Survey, IT respondents, 2023; N=5,427

    90%

    Engaged employees are stronger performers with 90% reporting they regularly accomplish more than what is expected.

    Source: McLean & Company, Employee Engagement Survey, IT respondents, 2023; N=4,363

    Effective and high-performing teams exchange information freely. They are clear on the purpose and goals of the organization, which enable empowerment.

    Info-Tech Insight

    Clear decision-making processes allow employees to focus on getting the work done versus navigating the system.

    Case Study

    Project Aristotle at Google – What makes a team effective at Google?

    INDUSTRY: Technology
    SOURCE: reWork

    Challenge

    Google wanted to clearly define what makes a team effective to drive a consistent meaning among its employees. The challenge was to determine more than quantitative measures, because more is not always better as it can just mean more mistakes to fix, and include the qualitative factors that bring some groups of people together better than others.

    Solution

    There was no pattern in the data it studied so Google stepped back and defined what a team is before embarking on defining effectiveness. There is a clear difference between a work group (a collection of people with little interdependence) and a team that is highly interdependent and relies on each other to share problems and learn from one another. Defining the different meanings took time and Google found that different levels of the organization were defining effectiveness differently.

    Results

    Google ended up with clear definitions that were co-created by all employees, which helped drive the meaning behind the behaviors. More importantly it was also able to define factors that had no bearing on effectiveness; one of which is very relevant in today's hybrid world – colocation.

    It was discovered that teams need to trust, have clarity around goals, have structure, and know the impact their work has.

    Overcoming barriers

    Teams often lack the skills or knowledge to increase effectiveness and performance.

    • Leaders struggle with team strife and ineffectiveness.
    • A leader's ability to connect with and engage team members is vital for driving desired outcomes. However, many team leads struggle to deal with low-performing or conflict-ridden teams.
    • Without adequate training on providing feedback, coaching, and managing difficult conversations, team leads often do not have the skills to positively affect team performance – and they do not appreciate the impact their actions have on desired outcomes.
    • Team leads often find it difficult to invest time and resources in addressing challenges when the team is working toward deadlines.
    • Team leads who are new to a management role within the organization often struggle to transition from independent contributor to leader – especially when they are tasked with managing team members who are former peers.
    • Some team leads believe that soliciting help will be viewed as a personal failure, so they are reluctant to seek support for team performance management from more-senior leaders.

    It's unrealistic to expect struggling teams to improve without outside help; if they were able to, they would have already done so.
    To improve, teams require:

    • A clearly defined team identity
    • A clearly defined decision-making paradigm
    • Consistently productive exchanges within the team
    • An atmosphere of psychological safety

    BUT these are the very things they are lacking when they're struggling.

    An image of Info-Tech's Insights for Improving IT Team Effectiveness.

    Improving team effectiveness

    Use the Info-Tech IDEA Model to assess and improve your team's effectiveness.

    Begin by assessing, recognizing, and addressing challenges in:

    • Identity – team goals, roles, responsibilities, and accountabilities
    • Decision-making paradigms and processes within the team.
    • Exchanges of information, motivation, and emotions between team members
    • Atmosphere of team psychological safety

    IDEA Model of Team Effectiveness

    Effective Team

    • Identity
    • Decisions
    • Exchanges
    • Atmosphere

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1: Assess the team Phase 2: Review results and action plan Phase 3: Document and measure

    Call #1: Scope requirements, objectives, and your specific challenges.
    Call #2: Prepare to assess your team(s) using the assessment tool.

    Call #3: Review the assessment results and plan next steps.
    Call #4: Review results with team and determine focus using IDEA model to identify activity based on results.
    Call #5: Complete activity to determine solutions to build your action plan.

    Call #6: Build out your team agreement.
    Call #7: Identify measures and frequency of check-ins to monitor progress.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 6 to 12 calls over the course of 4 to 6 months.

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Day 1
    (Half Day)

    Day 2

    Day 3

    Day 4

    Determine objectives and assess

    Review survey results

    Determine and conduct activities to increase effectiveness

    Bridge the gap and
    create the strategy

    Activities

    With Leader – 1 hour
    1.1 Review the business context.
    1.2 Identify IT team members to be included.
    1.3 Determine goals and objectives.
    1.4 Build execution plan and determine messaging.
    With Team – 90 minutes
    1.5 Share messaging, set context.
    1.6 Complete Team Effectiveness Survey.

    2.1 Debrief results with leadership team.
    2.2 Share results with team.
    2.3 Identify areas of focus.
    2.4 Identify IDEA Model activities to support objectives and explore areas of focus.

    3.1 Conduct IDEA Model Activities:

    • Identify – Clarify goals, roles, and responsibilities.
    • Decisions – Determine levels of authority; decision-making process.
    • Exchanges – Review information shared with communication methods and preferred styles of each team member.
    • Atmosphere – Create a psychologically safe environment.

    3.2 Record outcomes and actions.

    4.1 Create team charter or agreement.
    4.2 Identify metrics to measure progress.
    4.3 Identify risks.
    4.4 Determine frequency of check-ins to review progress.
    4.5 Check-in with sponsor.

    Deliverables

    1. Execution and communication plan
    2. Team Effectiveness Survey
    1. Assessment results
    2. IDEA Model team-building activities
    1. List of solutions to incorporate into team norms
    2. Action Plan
    1. Team Charter

    Phase 1

    Assess the team

    Phase 1

    Phase 2

    Phase 3

    1.1 Identify team members
    and behaviors to improve using IDEA Model
    1.2 Determine messaging including follow-up plan
    1.3 Send survey

    1.1 Review results with team
    1.2 Determine IDEA focus area(s)
    1.3 Conduct activity to determine solutions

    1.1 Document outcomes and actions
    1.2 Create team charter
    1.3 Identify metrics to show success
    1.4 Schedule check-in

    Improving team effectiveness

    Use the Info-Tech IDEA Model to assess and improve your team's effectiveness

    Begin by assessing, recognizing, and addressing challenges in:

    • Identity – team goals, roles, responsibilities, and accountabilities.
    • Decision-making paradigms and processes within the team.
    • Exchanges of information, motivation, and emotions between team members.
    • Atmosphere of team psychological safety.

    Effective Team

    • Identity
    • Decisions
    • Exchanges
    • Atmosphere

    Assess the shared understanding of team identity

    In addition to having a clear understanding of the team's goals and objectives, team members must also:

    • Understand their own and each other's roles, responsibilities, and accountabilities.
    • Recognize and appreciate the value of each team member.
    • Realize how their actions impact each others' work and the overall goals and objectives.
    • Understand that working in silos is considered a work group whereas a team coordinates activities, shares information, and supports each other to achieve their goals.

    Clear goals enable employees to link their contributions to overall success of the team. Those who feel their contributions are important to the success of the department are two times more likely to feel they are part of a team working toward a shared goal compared to those who don't (McLean & Company, Employee Engagement Survey, IT respondents, 2023; N=4,551).

    Goals matter in teamwork

    The goals and objectives of the team are the underlying reason for forming the team in the first place. Without a clear and agreed-upon goal, it is difficult for teams to understand the purpose of their work.

    Clear goals support creating clear roles and the contributions required for team success.

    Team Identity = Team goals and Objectives + Individual roles, responsibilities, and accountabilities

    Assess the shared understanding of decision making

    Decision making adds to the complexity of teamwork.
    Individual team members hold different information and opinions that need to be shared to make good decisions.
    Ambiguous decision-making processes can result in team members being unable to continue their work until they get clear direction.
    The most appropriate decision-making process depends on the type of team:

    • The higher the degree of interconnectivity in team members' work, the greater the need for a general consensus approach to decision making. However, if you opt for a general consensus approach, a backup decision-making method must be identified in the event consensus cannot be reached.
    • High-pressure and high-stakes environments tend to centralize decision making to make important decisions quickly.
    • Low-pressure and low-stakes environments are more likely to adopt consensus models.

    Spectrum of Decision Making

    General consensus between all team members.

    A single, final decision maker within the team.

    Ensure team members understand how decisions are made within the team. Ask:

    • Do team members recognize the importance of sharing information, opinions, and suggestions?
    • Do team members feel their voices are heard?
    • Must there be consensus between all team members?
    • Is there a single decision maker?

    Assess team exchanges by focusing on communication

    Evaluate exchanges within your team using two categories:

    These categories are related, but there is not always overlap. While some conflicts involve failures to successfully exchange information, conflict can also occur even when everyone is communicating successfully.

    Communication

    Managing Conflict

    Information, motivations, emotions

    Accepting and expressing diverse perspectives

    Resolving conflict (unified action through diverse perspectives)

    Transmission

    Reception
    (listening)

    Success is defined in terms of how well information, motivations, and emotions are transmitted and received as intended.

    Success is defined in terms of how well the team can move to united action through differences of opinion. Effective teams recognize that conflict can be healthy if managed effectively.

    Successful exchange behaviors

    • Shared understanding of how to motivate one another and how team members respond emotionally.
    • Team moving beyond conflict to united action.
    • Formalized processes used for resolving conflicts.
    • Platforms provided for expressing diverse or conflicting perspectives and opinions – and used in a constructive manner.
    • Use of agendas at meetings as well as clearly defined action items that reflect meeting outcomes.
    • Avoidance of language that is exclusive, such as jargon and inside jokes.

    Exchanges of information, emotion, and motivation

    When selecting a method of communication (for example, in-person versus email), consider how that method will impact the exchange of all three aspects – not just information.

    Downplaying the importance of emotional and motivational exchanges and focusing solely on information is very risky since emotional and motivational exchanges can impact human relationships and team psychological safety.

    • Information: data or opinions.
    • Emotions: feelings and evaluations about the data or opinions.
    • Motivations: what we feel like doing in response to the data or opinions.

    Communication affects the whole team

    Effects are not limited to the team members communicating directly:

    • How team members interact one on one transmits information and causes emotional and motivational responses in other group members not directly involved.
    • How the larger group receives information, emotions, and motivations will also impact how individuals relate to each other in group settings.

    Remember to watch the reactions and behavior of participants and observers when assessing how the team behaves.

    Managing conflict

    Identify how conflict management is embedded into team practices.

    • Resolving conflicts is difficult and uses up a lot of time and energy. This is especially true if the team needs to figure out what to do each and every time people disagree.
    • Teams that take the time to define conflict resolution processes upfront:
      • Demonstrate their commitment to resolving conflict in a healthy way.
      • Signal that diverse perspectives and opinions are valued, even if they spur disagreement sometimes.
      • Are ready for conflict when it arises – prepared to face it and thrive.

    Successfully communicating information, emotions, and motivations is not the same as managing conflict.

    Teams that are communicating well are more likely to uncover conflicting perspectives and opinions than teams that are not.

    Conflict is healthy and can be an important element of team success if it is managed.

    The team should have processes in place to resolve conflicts and move to united action.

    Assess the atmosphere

    Team psychological safety

    A team atmosphere that exists when all members feel confident that team members can do the following without suffering negative interpersonal consequences such as blame, shame, or exclusion:

    • Admit mistakes
    • Raise questions or concerns
    • Express dissenting views

    (Administrative Science Quarterly, 1999;
    The New York Times, 2016)

    What psychologically safe teams look like:

    • Open and learning-focused approach to error.
    • Effective conflict management within the team.
    • Emotional and relational awareness between team members.
    • Existence of work-appropriate interpersonal relationships between team members (i.e. beyond mere working relationships).

    (Administrative Science Quarterly, 1999;
    The New York Times, 2016)

    What "team psychological safety" is not:

    • A situation where all team members are friends.
      In some cases psychologically safe team atmospheres might be harder to create when team members are friends since they might be more reluctant to challenge or disagree with friends.
    • Merely trust. Being able to rely on people to honor their commitments is not the same as feeling comfortable admitting mistakes in front of them or disagreeing with them.

    "Psychological safety refers to an individual's perception of the consequences of taking an interpersonal risk or a belief that a team is safe for risk taking in the face of being seen as ignorant, incompetent, negative, or disruptive… They feel confident that no one on the team will embarrass or punish anyone else for admitting a mistake, asking a question, or offering a new idea."

    – re:Work

    Psychological safety

    The impact of psychological safety on team effectiveness

    Why does an atmosphere of team psychological safety matter?

    • Prevents groupthink.
      • People who do not feel safe to hold or express dissenting views gravitate to teams that think like they do, resulting in the well-known dangers of groupthink.
    • Encourages contribution and co-operation.
      • One study found that if team psychological safety is present, even people who tend to avoid teamwork will be more likely to contribute in team settings, thereby increasing the diversity of perspectives that can be drawn on (Journal of Organizational Culture, 2016).

    Creating psychological safety in a hybrid environment requires a deliberate approach to creating team connectedness.

    In the Info-Tech State of Hybrid Work in IT report autonomy and team connectedness present an interesting challenge in that higher levels of autonomy drove higher perceptions of lack of connectedness to the respondent's team. In a hybrid world, this means leaders need to be intentional in creating a safe team dynamic.

    47% of employees who experienced more control over their decisions related to where, when, and how they work than before the pandemic are feeling less connected to their teams.
    Source: Info-Tech, State of Hybrid Work in IT, 2022

    1.1 Prepare to launch the survey

    1-2 hours

    1. Review and record the objectives and outcomes that support your vision of a high-performing team:
      1. Why is this important to you?
      2. What reactions do you anticipate from the team?
    2. In your team meeting, share your vision of what a high-performing team looks like. Engage the team in a discussion:
      1. Ask how they work. Ask them to describe their best working team environment from a previous experience or an aspirational one.
      2. Option: Instruct them to write on sticky notes, one idea per note, and share. This approach will allow for theming of ideas.
    3. Introduce the survey as a way, together as a team, the current state can be assessed against the desired state discussed.
      1. Be clear that as the leader, you won't be completing the survey as you don't want to influence their perceptions of the team. As the leader, you hold authority, and therefore, experience the team differently. This is about them and their feedback.

    Input

    • Observations of team behavior
    • Clearly articulated goals for team cohesion

    Output

    • Speaking notes for introducing survey
    • Survey launch

    Materials

    • Whiteboard/flip charts
    • Sticky notes
    • IDEA Assessment

    Participants

    • Leader
    • Team Members

    Download the IT Team Effectiveness Survey

    1.2 Launch the survey

    1-2 hours

    1. Determine how the survey will be completed.
      1. Paper-based
        1. Email a copy of the Word document IT Team Effectiveness Survey for each person to complete individually.
        2. Identify one person to collect each survey and enter the results into the team effectiveness survey tool (tab 2. Data – Effectiveness Answers and tab 3. Data – Team Type Answers). This must be someone outside the team.
      2. Online direct input into Team Effectiveness Survey Tool
        1. Post the document in a shared folder.
        2. Instruct individuals to select one of the numbered columns and enter their information into tab 2. Data – Effectiveness Answers and tab 3. Data – Team Type Answers.
        3. To protect anonymity and keep results confidential, suggest each person opens document in "Cognito mode."
        4. Hide the Summary and Results tabs to avoid team members previewing them.

    Download the IT Team Effectiveness Survey Results Tool

    Paper-Based Cautions & Considerations

    • Heavily dependent on a trusted third party for genuine results
    • Can be time consuming to enter the results

    Online Direct Cautions & Considerations

    • Ensure that users keep to the same numbered column across both entry tabs
    • Seeing other team members' responses may influence others
    • Least amount of administration

    Phase 2

    Review Results and Action Plan

    Phase 1

    Phase 2

    Phase 3

    1.1 Identify team members
    and behaviors to improve using IDEA Model
    1.2 Determine messaging including follow-up plan
    1.3 Send survey

    1.1 Review results with team
    1.2 Determine IDEA focus area(s)
    1.3 Conduct activity to determine solutions

    1.1 Document outcomes and actions
    1.2 Create team charter
    1.3 Identify metrics to show success
    1.4 Schedule check-in

    This phase will walk you through the following activities:

    • Analyzing and debriefing the results to determine themes and patterns to come to a team consensus on what to focus on.
    • Facilitated activities to drive awareness, build co-created definitions of what an effective team looks like, and identify solutions the team can undertake to be more effective.

    This phase involves the following participants:

    • Leader of the team
    • All team members

    Deliverables:

    • A presentation that communicates the team assessment results
    • A plan for effectively delivering the assessment results

    Phase 2: Build a plan to review results and create an action plan

    Reviewing assessment results and creating an improvement action plan is best accomplished through a team meeting.

    Analyzing and preparing for the team meeting may be done by:

    • The person charged with team effectiveness (i.e. team coach).
    • For teams that are seriously struggling with team effectiveness, the coach should complete this step in its entirety.
    • The team coach and the team lead.
    • Truly effective teams are self-reliant. Begin upskilling team leads by involving team leads from the start.
    1. Analyze team assessment results
    2. Prepare to communicate results to the team
    3. Select team activities that will guide the identification of action items and next steps
    4. Facilitate the team meeting

    2.1 Analyze results

    Health Dials

    1. Once the results are final, review the Health Dials for each of the areas.
      1. For each area of the team's effectiveness
        • Red indicates a threat – this will derail the team and you will require an external person to help facilitate conversations.
          It would be recommended to contact us for additional guidance if this is one of your results.
        • Yellow is a growth opportunity.
        • Green is a strength and pay attention to where the dial is – deep into strength or just past the line?
      2. Think about these questions and record your initial reactions.
        1. What surprises you – either positively or negatively?
        2. What areas are as expected?
        3. What behaviors are demonstrated that support the results?

    Prioritize one to two factors for improvement by selecting those with:

    • The lowest overall score.
    • The highest variance in responses.
    • If psychological safety is low, be sure to prioritize this factor; it is the foundation of any effective team.

    An image of the Health dials for each area.

    2.2 Analyze results

    Alignment of Responses

    1. The alignment of responses area provides you with an overview of the range of responses from the team for each area.
      • The more variety in the bars indicates how differently each person is experiencing the team.
      • The more aligned the bars are the more shared the experiences.

    The flatter the bars are across the top, the more agreement there was. Factors that show significant differences in opinion should be discussed to diagnose what is causing the misalignment within your team.

    1. Recommendation is to look at high scores and the alignment and lower scores and the alignment to determine where you may want to focus.

    The alignment chart below shows varied responses; however, there are two distinct patterns. This will be an important area to review.
    Things to think about:

    • Are there new team members?
    • Has there been a leadership change?
    • Has there been a change that has impacted the team?
    An image showing the alignment of responses for Identity, Decisions; Exchange; and Atmosphere.

    2.3 Analyze results

    Team Characteristics and Stakes

    1. Team Characteristics. Use the Team Type Results tab in the IT Team Effectiveness Assessment Tool to identify how the team characterizes itself along the High-Low Scale. The closer the dark blue bar is to the right or left suggests to which degree the team views the characteristic.
      1. Interdependence highlights the team's view on how interconnected and dependent they are on each other to get work done. Think of examples where they should be sharing or collaborating, and they are not.
      2. Virtual describes the physicality of the team. This area has changed a lot since 2020; however, it's still important to note if the team shares the same understanding of work location. Are they thinking of team members in a different geography or referring to hybrid work?
      3. Decision making describes the scale of one decision maker or many. Where are most decisions made by on your team or who is making them?
      4. Stability refers to the degree to which the team stays the same – no membership change or turnover. It can be defined by length of time the group has been together. Looking at this will help understand alignment results. If alignment is varied, one might expect a less stable team.
    2. Stakes and Pressure
      1. Pressure refers to the conditions in which the team must work. How urgent are requests?
      2. Stakes refers to the degree of impact the work has. Will outputs impact safety, health, or a service?
      3. This category can be reviewed against decision making – high pressure, high stakes environments usually have a high concentration of authority. Low pressure, low stakes decisions can also be made either by one person as there is relatively no impact or with many as you have time to get many perspectives.
      4. This area informs what your decision-making protocols should look like.

    A bar graph for Team Characteristics, and a quadrant analysis for comparing Stakes and Pressure.

    2.4 Prepare for meeting

    1-2 hours

    1. Select a facilitator
      • The right person to facilitate the meeting and present the results is dependent upon the results themselves, the team lead's comfort level, and the root and degree of team dysfunction.
      • Typically, the team lead will facilitate and present the results. However, it will be more appropriate to have a member of the HR team or an external third party facilitate.
    2. Set the agenda (recommended sample to the right) that ensures:
      • Team members reflect on the results and discuss reaction to the results. (E.g. Are they surprised? Why/why not?)
      • Results are clearly understood and accepted by team members before moving on to activities.
      • The aim of the meeting is kept in mind. The purpose of the team meeting is to involve all team members in the creation of an effectiveness improvement plan.
    3. Customize the Facilitation Guide and activities in the Improve IT Team Effectiveness Facilitation Guide. (Activities are aligned with the four factors in the IDEA model.)
      • Identify a clear objective for each activity given the team assessment results. (E.g. What are the areas of improvement? What is the desired outcome of the activity?)
      • Review and select the activities that will best achieve the objectives.
      • Customize and prepare for chosen activities appropriately.
      • Obtain all necessary materials.
      • Practice by anticipating and preparing for questions, objectives, and what you will say and do.

    Facilitation Factors
    Select a third-party facilitator if:

    • The team lead is uncomfortable.
    • The leadership or organization is implicated in the team's dysfunction, a third party can be sought in place of HR.
    • Regardless of who facilitates, it is critical that the team lead understands the process and results and is comfortable answering any questions that arise.

    Agenda

    • Review the IDEA Model.
    • Discuss the assessment results.
    • Invite team members to reflect on the results and discuss reaction to the results.
    • Ensure results are clearly understood and accepted.
    • Examine team challenges and strengths through selected team activities.
    • Create a team charter and effectiveness improvement plan.

    Materials

    • IT Team Effectiveness Activities Facilitation Guide
    • IT Team Effectiveness Survey results

    Participants

    • Leader

    2.5 Run the meeting

    2-3 hours

    Facilitate the team meeting and agree on the team effectiveness improvement plan.

    Work with the team to brainstorm and agree on an action plan of continuous improvements.

    By creating an action plan together with the team, there is greater buy-in and commitment to the activities identified within the action plan.

    Don't forget to include timelines and task owners in the action plan – it isn't complete without them.

    Document final decisions in Info-Tech's Improve IT Team Effectiveness Action Plan Tool.

    Review activity Develop Team Charter in the Improve IT Team Effectiveness Facilitation Guide and conclude the team meeting by creating a team charter. With a team charter, teams can better understand:

    • Team objectives
    • Team membership and roles
    • Team ground rules

    Facilitation Factors

    Encourage and support participation from everyone.

    Be sure no one on the team dismisses anyone's thoughts or opinions – they present the opportunity for further discussion and deeper insight.

    Watch out for anything said or done during the activities that should be discussed in the activity debrief.

    Debrief after each activity, outlining any lessons learned, action items, and next steps.

    Agenda

    • Review the IDEA Model.
    • Discuss the assessment results.
    • Invite team members to reflect on the results and discuss reaction to the results.
    • Ensure results are clearly understood and accepted.
    • Examine team challenges and strengths through selected team activities.
    • Create a team charter and effectiveness improvement plan.

    Materials

    • IT Team Effectiveness Activities Facilitation Guide
    • Whiteboard/flip charts
    • Sticky notes
    • IT Team Effectiveness Survey results

    Participants

    • Leader
    • Team Members
    • Optional – External Facilitator

    Phase 3

    Document and measure

    Phase 1

    Phase 2

    Phase 3

    1.1 Identify team members
    and behaviors to improve using IDEA Model
    1.2 Determine messaging including follow-up plan
    1.3 Send survey

    1.1 Review results with team
    1.2 Determine IDEA focus area(s)
    1.3 Conduct activity to determine solutions

    1.1 Document outcomes and actions
    1.2 Create team charter
    1.3 Identify metrics to show success
    1.4 Schedule check-in

    This phase will walk you through the following activities:
    Building your team charter that will include:

    • Team vision, mission, and goals
    • Roles and responsibilities of each member
    • Decision-making responsibilities and process
    • How information will be shared and by whom
    • Ways to build psychological safety on the team

    This phase involves the following participants:

    • Leader of the team
    • All team members

    Document and agree to regular check-ins to reassess.

    As a team it will be important to drive your brainstormed solutions into an output that is co-created.

    • Agree to what actions can be implemented.
    • Capture agreed-to team goals, roles, responsibilities, and decision process into a team charter. Also include your communication protocol that articulates how information will be shared in future.
    1. Review suggestions and actions
    2. Capture in team charter
    3. Assign metrics to measure success and determine when to review
    4. Complete ongoing check-ins with team through team meeting and plan to reassess if agreed to

    Team Charter

    Never assume everyone "just knows."

    Set clear expectations for the team's interactions and behaviors.

    • Some teams call this a team agreement, team protocol, or ways of working. Determine the naming convention that works best for your team and culture.
    • This type of document saw a renewed popularity during COVID-19 as face-to-face interactions were more difficult, and as teams, news ways to work needed to be discovered, shared, and documented.
    • A co-created team charter is a critical component to onboarding new employees in the hybrid world.

    Info-Tech Insight – State of Hybrid Work in IT

    One contributor to the report shared the effort and intention around maintaining their culture during the pandemic. The team agreement created became a critical tool to enable conversations between leaders and their team – it was not a policy document.

    Team effectiveness is driven through thoughtful planned conversations. And it's a continued conversation.

    A screenshot of the IT Team Charter Template page

    Download the IT Team Charter Template

    Establish Baseline Metrics

    Baseline metrics will be improved through:

    Identify the impact that improved team effectiveness will have on the organization.
    Determine your baseline metrics to assess the success of your team interventions and demonstrate the impact to the rest of the organization using pre-determined goals and metrics.
    Share success stories through:

    • Newsletters or email announcements
    • Team meetings
    • Presentations to business partners or the organization

    Sample effectiveness improvement goal

    Sample Metric

    Increase employee engagement
    Increase overall employee engagement scores in the Employee Engagement survey by 5% by December 31, 2023.

    • Overall employee engagement

    Strengthen manager/employee relationships
    Increase manager driver scores in the Employee Engagement survey by 5% by December 31, 2023.

    • Employee engagement – manager driver
    • Employee engagement – senior leadership driver

    Reduce employee turnover (i.e. increase retention)
    Reduce voluntary turnover by 5% by December 31, 2023.

    • Voluntary turnover rate
    • Turnover by department or manager
    • Cost of turnover

    Increase organizational productivity
    Increase the value added by human capital by 5% by December 31, 2023.

    • Value added by human capital
    • Employee productivity
    • Human capital return on investment
    • Employee engagement

    Reassess team effectiveness

    Reassess and identify trends after they have worked on key focus areas for improvement.

    Track the team's progress by reassessing their effectiveness six to twelve months after the initial assessment.
    Identify if:

    • Team characteristics have changed.
    • Areas of team strengths are still a source of strength.
    • Areas for improvement have, in fact, improved.
    • There are opportunities for further improvement.

    As the team matures, priorities and areas of concern may shift; it is important to regularly reassess team effectiveness to ensure ongoing alignment and suitability.
    Note: It is not always necessary to conduct a full formal assessment; once teams become more effective and self-sufficient, informal check-ins by team leads will be sufficient.

    If you assess team effectiveness for multiple teams, you have the opportunity to identify trends:

    • Are there common challenges within teams?
    • If so, what are they?
    • How comfortable are teams with intervention?
    • How often is outside help required?

    Identifying these trends, initiatives, training, or tactics may be used to improve team effectiveness across the department – or even the organization.

    Teams are ultimately accountable for their own effectiveness.

    As teams mature, the team lead should become less involved in action planning. However, enabling truly effective teams takes significant time and resources from the team lead.

    Use the action plan created and agreed upon during the team meeting to hold teams accountable:

    • Ensure teams follow through on action items.
    • Ensure you are continuously assessing team effectiveness (formally or informally).

    The team coach should have a plan to transition into a supportive role by:

    • Providing teams with the knowledge, resources, and tools required to improve and sustain high effectiveness.
    • Providing team members and leads with a safe, open, and honest environment.
    • Stepping in as an objective third party when required.

    If the team continues to face barriers

    Other important information: If team effectiveness has not significantly improved, other interventions may be required that are beyond the scope of this project.

    The four factors outlined in the IDEA Model of team effectiveness are very important, but they are not the only things that have a positive or negative impact on teams. If attempts to improve the four factors have not resulted in the desired level of team effectiveness, evaluate other barriers:

    For organizational culture, ask if performance and reward programs do the following:

    • Value teamwork alongside individual achievement and competition
    • Provide incentives that promote a focus on individual performance over team performance
    • Reward or promote those who sabotage their teams

    For learning and development, ask:

    • Is team effectiveness included in our manager or leadership training?
    • Do we offer resources to employees seeking to improve their teamwork competencies?

    If an individual team member's or leader's performance is not meeting expectations, potential remedies include a performance improvement plan, reassignment, and termination of employment.

    These kinds of interventions are beyond the control of the team itself. In these cases, we recommend you consult with your HR department; HR professionals can be important advocates because they possess the knowledge, influence, and authority in the company to promote changes that support teamwork.

    Related Info-Tech Research

    Redesign Your IT Department

    • You could have the best IT employees in the world, but if they aren't structured well your organization will still fail in reaching its vision.
    • Increase the effectiveness of IT as a function.
    • Provide employees with clarity in their roles and responsibilities.

    Build an IT Employee Engagement Program

    • With the growing IT job market, turnover is a serious threat to IT's ability to deliver seamless value and continuously drive innovation.
    • Engagement initiatives are often seen as being HR's responsibility; however, IT leadership needs to take accountability for the retention and productivity of their employees in order to drive business value.

    Info-Tech Leadership Programs

    • Development of the leadership mind should never stop. This program will help IT leaders continue to craft their leadership competencies to navigate the ever-changing world in which we operate.
    • Actively delegate responsibilities and opportunities that engage and develop team members to build on current skills and prepare for the future.

    Research Contributors and Experts

    A picture of Carlene McCubbin

    Carlene McCubbin
    Practice Lead
    Info-Tech Research Group

    A picture of Nick Kozlo

    Nick Kozlo
    Senior Research Analyst
    Info-Tech Research Group

    A picture of Heather Leier-Murray

    Heather Leier-Murray
    Senior Research Analyst
    Info-Tech Research Group

    A picture of Stephen O'Conner

    Stephen O'Conner
    Executive Counselor
    Info-Tech Research Group

    A picture of Jane Kouptsova

    Jane Kouptsova
    Research Director
    Info-Tech Research Group

    Dr. Julie D. Judd, Ed.D.
    Chief Technology Officer
    Ventura County Office of Education

    Works Cited

    Aminov, I., A. DeSmet, and G. Jost. "Decision making in the age of urgency." McKinsey. April 2019. Accessed January 2023.
    Duhigg, Charles. "What Google Learned From Its Quest to Build the Perfect Team." The New York Times, 25 Feb. 2016. Accessed January 2023.
    Edmondson, Amy. "Psychological Safety and Learning Behavior in Work Teams." Administrative Science Quarterly, vol. 44, no. 2, June 1999, pp. 350-383.
    Gardner, Kate. "Julie Judd – Ventura County Office of Education." Toggle, 12 Sept. 2022. Accessed January 2023.
    Google People Operations. "Guide: Understand Team Effectiveness." reWork, n.d. Accessed February 2023.
    Harkins, Phil. "10 Leadership Techniques for Building High-Performing Teams." Linkage Inc., 2014. Accessed 10 April 2017.
    Heath, C. and D. Heath. Decision: How to make better choices in life and work. Random House, 2013, ISBN 9780307361141.
    Hill, Jon. "What is an Information Silo and How Can You Avoid It." Bloomfire, 23 March 2022. Accessed January 2023.
    "IT Team Management Software for Enhanced Productivity." Freshworks, n.d. Accessed January 2023.
    Jackson, Brian. "2022 Tech Trends." Info-Tech Research Group, 2022. Accessed December 2022.
    Kahneman, Daniel. Thinking fast and slow. Farrar, Straus and Giroux. 2011.
    Kouptsova, J., and A. Mathieson. "State of Hybrid Work in IT." Info-Tech Research Group, 2023. Accessed January 2023.
    Mayfield, Clifton, et al. "Psychological Collectivism and Team Effectiveness: Moderating Effects of Trust and Psychological Safety." Journal of Organizational Culture, Communications and Conflict, vol. 20, no. 1, Jan. 2016, pp. 78-94.
    Rock, David. "SCARF: A Brain-Based Model for Collaborating With and Influencing Others." NeuroLeadership Journal, 2008. Web.
    "The State of High Performing Teams in Tech Hypercontext." Hypercontext. 2022. Accessed November 2022.
    Weick, Carl, and Kathleen Sutcliff. Managing the unexpected. John Wiley & Sons, 2007.
    "Workplace Conflict Statistics: How we approach conflict at work." The Niagara Institute, August 2022. Accessed December 2022.

    Make IT a Successful Partner in M&A Integration

    • Buy Link or Shortcode: {j2store}79|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy
    • Many organizations forget the essential role IT plays during M&A integration. IT is often unaware of a merger or acquisition until the deal is announced, making it very difficult to adequately interpret business goals and appropriately assess the target organization.
    • IT-related integration activities are amongst the largest cost items in an M&A, yet these costs are often overlooked or underestimated during due diligence.
    • IT is expected to use the M&A team’s IT due diligence report and estimated IT integration budget, which may not have been generated appropriately.
    • IT involvement in integration is critical to providing a better view of risks, improving the ease of integration, and optimizing synergies.

    Our Advice

    Critical Insight

    • Anticipate that you are going to be under pressure. Fulfill short-term, tactical operational imperatives while simultaneously conducting discovery and designing the technology end-state.
    • To migrate risks and guide discovery, select a high-level IT integration posture that aligns with business objectives.

    Impact and Result

    • Once a deal has been announced, use this blueprint to set out immediately to understand business M&A goals and expected synergies.
    • Assemble an IT Integration Program to conduct discovery and begin designing the technology end-state, while simultaneously identifying and delivering operational imperatives and quick-wins as soon as possible.
    • Following discovery, use this blueprint to build initiatives and put together an IT integration budget. The IT Integration Program has an obligation to explain the IT cost implications of the M&A to the business.
    • Once you have a clear understanding of the cost of your IT integration, use this blueprint to build a long-term action plan to achieve the planned technology end-state that best supports the business capabilities of the organization.

    Make IT a Successful Partner in M&A Integration Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should follow Info-Tech’s M&A IT integration methodology and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Launch the project

    Define the business’s M&A goals, assemble an IT Integration Program, and select an IT integration posture that aligns with business M&A strategy.

    • Make IT a Successful Partner in M&A Integration – Phase 1: Launch the Project
    • IT Integration Charter

    2. Conduct discovery and design the technology end-state

    Refine the current state of each IT domain in both organizations, and then design the end-state of each domain.

    • Make IT a Successful Partner in M&A Integration – Phase 2: Conduct Discovery and Design the Technology End-State
    • IT Integration Roadmap Tool

    3. Initiate operational imperatives and quick-wins

    Generate tactical operational imperatives and quick-wins, and then develop an interim action plan to maintain business function and capture synergies.

    • Make IT a Successful Partner in M&A Integration – Phase 3: Initiate Operational Imperatives and Quick-Wins

    4. Develop an integration roadmap

    Generate initiatives and put together a long-term action plan to achieve the planned technology end-state.

    • Make IT a Successful Partner in M&A Integration – Phase 4: Develop an Integration Roadmap
    [infographic]

    Workshop: Make IT a Successful Partner in M&A Integration

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Launch the Project

    The Purpose

    Identification of staffing and skill set needed to manage the IT integration.

    Generation of an integration communication plan to highlight communication schedule during major integration events.

    Identification of business goals and objectives to select an IT Integration Posture that aligns with business strategy.

    Key Benefits Achieved

    Defined IT integration roles & responsibilities.

    Structured communication plan for key IT integration milestones.

    Creation of the IT Integration Program.

    Generation of an IT Integration Posture.

    Activities

    1.1 Define IT Integration Program responsibilities.

    1.2 Build an integration communication plan.

    1.3 Host interviews with senior management.

    1.4 Select a technology end-state and IT integration posture.

    Outputs

    Define IT Integration Program responsibilities and goals

    Structured communication plan

    Customized interview guide for each major stakeholder

    Selected technology end-state and IT integration posture

    2 Conduct Discovery and Design the Technology End-State

    The Purpose

    Identification of information sources to begin conducting discovery.

    Definition of scope of information that must be collected about target organization.

    Definition of scope of information that must be collected about your own organization.

    Refinement of the technology end-state for each IT domain of the new entity. 

    Key Benefits Achieved

    A collection of necessary information to design the technology end-state of each IT domain.

    Adequate information to make accurate cost estimates.

    A designed end-state for each IT domain.

    A collection of necessary, available information to make accurate cost estimates. 

    Activities

    2.1 Define discovery scope.

    2.2 Review the data room and conduct onsite discovery.

    2.3 Design the technology end-state for each IT domain.

    2.4 Select the integration strategy for each IT domain.

    Outputs

    Tone set for discovery

    Key information collected for each IT domain

    Refined end-state for each IT domain

    Refined integration strategy for each IT domain

    3 Initiate Tactical Initiatives and Develop an Integration Roadmap

    The Purpose

    Generation of tactical initiatives that are operationally imperative and will help build business credibility.

    Prioritization and execution of tactical initiatives.

    Confirmation of integration strategy for each IT domain and generation of initiatives to achieve technology end-states.

    Prioritization and execution of integration roadmap.

    Key Benefits Achieved

    Tactical initiatives generated and executed.

    Confirmed integration posture for each IT domain.

    Initiatives generated and executed upon to achieve the technology end-state of each IT domain. 

    Activities

    3.1 Build quick-win and operational imperatives.

    3.2 Build a tactical action plan and execute.

    3.3 Build initiatives to close gaps and redundancies.

    3.4 Finalize your roadmap and kick-start integration.

    Outputs

    Tactical roadmap to fulfill short-term M&A objectives and synergies

    Confirmed IT integration strategies

    Finalized integration roadmap

    Manage an IT Budget

    • Buy Link or Shortcode: {j2store}70|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Cost & Budget Management
    • Parent Category Link: /cost-and-budget-management
    • IT is viewed as a cost center without a clear understanding of the value it provides.
    • After completing the budget, the CIO is faced with changing expectations, disruptions, new risks, and new threats.
    • IT departments often lack a reliable budget management process to keep itself on track towards its budget goals.
    • Over budgeting risks credibility if projects are not all delivered, while under budgeting risks not being able to execute important projects.

    Our Advice

    Critical Insight

    • Managing your budget is not just about numbers; it’s also about people and processes. Better relationships and a proper process leads to better management of your budget. Understand how your relationships and current processes might be leveraged to manage your budget.
    • No one likes to be over budget, but being under budget isn’t necessarily good either. Coming in under budget may mean that you are not accomplishing the initiatives that you promised you would, reflecting poor job performance.

    Impact and Result

    • Implement a formal budget management process that documents your planned budget and actual expenditures, tracks variances, and responds to those variances to stay on track towards budget goals.
    • Manage the expectations of business stakeholders by communicating the links between IT spend and business value in a way that is easily understood by the business.
    • Control for under- or overspending by using Info Tech’s budget management tool and tactics.

    Manage an IT Budget Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to understand the increasing expectations for IT departments to better manage their budgets, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Document

    Create a streamlined documentation process that also considers the elements of people and technology.

    • Manage an IT Budget – Phase 1: Document
    • Manage Your IT Budget Tool

    2. Track

    Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner.

    • Manage an IT Budget – Phase 2: Track

    3. Control

    Leverage control mechanisms to manage variances in your budget.

    • Manage an IT Budget – Phase 3: Control
    [infographic]

    Workshop: Manage an IT Budget

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Document Budget

    The Purpose

    The first step of managing your IT budget is to make sure there is a properly documented budget that everyone agrees upon.

    Key Benefits Achieved

    A properly documented budget facilitates management and communication of the budget.

    Activities

    1.1 Review budget for the year.

    1.2 Document each budget in the tool.

    1.3 Review CAPEX vs. OPEX.

    1.4 Customize accounts to match your organization.

    Outputs

    Budget broken out into monthly increments and by each account.

    Budget documented in tool.

    Tool customized to reflect organization's specific accounts and terminology.

    2 Optimize Documentation Process

    The Purpose

    A proper documentation process forms the backbone for effective budget management.

    Key Benefits Achieved

    A streamlined documentation process with accurate inputs that also considers the elements of people and technology.

    Activities

    2.1 Draw out process flow of current documentation.

    2.2 Identify bottlenecks.

    2.3 Discuss and develop roadmap to solving bottlenecks.

    Outputs

    Process flow of current documentation process with identified bottlenecks.

    Plan to mitigate bottlenecks.

    3 Track and Control for Over- and Underspending

    The Purpose

    Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner. Then, leverage control mechanisms to manage variances in your budget.

    Key Benefits Achieved

    Tracking and controlling for variances will help the IT department stay on track towards its budget goals. It will also help with communicating IT’s value to the business.

    Activities

    3.1 Walk through the “Overview Bar.”

    3.2 Document actual expenses incurred in fiscal to date.

    3.3 Review the risk of over- and underspending.

    3.4 Use the reforecast column to control for over- and underspend.

    Outputs

    Assess the “Overview Bar.”

    Document actual expenditures and committed expenses up to the current date.

    Develop a strategy and roadmap for how you will mitigate any current under- or overspends.

    Reforecast expenditures for each account for each month for the remainder of the fiscal year.

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Drive Real Business Value with an HRIS Strategy

      • Buy Link or Shortcode: {j2store}586|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $43,457 Average $ Saved
      • member rating average days saved: 36 Average Days Saved
      • Parent Category Name: Human Resource Systems
      • Parent Category Link: /human-resource-systems
      • In most organizations, the HR application portfolio has evolved tactically on an as-needed basis, resulting in un-integrated systems and significant effort spent on manual workarounds.
      • The relationship between HR and IT is not optimal for technology decision making. System-related decisions are made by HR and IT is typically involved only post-purchase to fix issues as they arise and offer workarounds.
      • IT systems for HR are not viewed as a strategic differentiator or business enabler, thereby leading to a limited budget and resources for HR IT systems and subsequently hindering the adoption of a strategic, holistic perspective.
      • Some organizations overinvest, while others underinvest in lightweight, point-to-point solutions. Finding the sweet spot between a full suite and lightweight functionality is no easy task.

      Our Advice

      Critical Insight

      • Align HRIS goals with the business. Organizations must position HR as a partner prior to embarking on an HRIS initiative, aligning technology goals with organizational objectives before looking at software.
      • Communication is key. Often, HR and IT speak different languages. Maintain a high degree of communication by engaging stakeholder groups early.
      • Plan where you want to go. Designing a roadmap based on clear requirements, alignment with the business, and an understanding of priorities will contribute to success.

      Impact and Result

      • Evaluate the current state of HRIS, understand the pain points, and visualize your ideal processes prior to choosing a solution.
      • Explore the different solution alternatives: maintain current system, integrate and consolidate, augment, or replace system entirely.
      • Create a plan to engage IT and HR throughout the project. Equip HR with the decision-making tools to meet business objectives and drive business strategy. Establish a common language for IT and HR to effectively communicate.
      • Develop a practical and actionable roadmap that the entire organization can buy into.

      Drive Real Business Value with an HRIS Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop an HRIS strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Conduct an environmental scan

      Create a clear project vision that outlines the goals and objectives for the HRIS strategy. Subsequently, construct an HRIS business model that is informed by enablers, barriers, and the organizational, IT, and HR needs.

      • Drive Real Business Value with an HRIS Strategy – Phase 1: Conduct an Environmental Scan
      • Establish an HRIS Strategy Project Charter Template
      • HRIS Readiness Assessment Checklist

      2. Design the future state

      Gather high-level requirements to determine the ideal future state. Explore solution alternatives and choose the path that is best aligned with the organization's needs.

      • Drive Real Business Value with an HRIS Strategy – Phase 2: Design the Future State
      • HRIS Strategy Stakeholder Interview Guide
      • Process Owner Assignment Guide

      3. Finalize the roadmap

      Identify roadmap initiatives. Prioritize initiatives based on importance and effort.

      • Drive Real Business Value with an HRIS Strategy – Phase 3: Finalize the Roadmap
      • Initiative Roadmap Tool
      • HRIS Stakeholder Presentation Template
      [infographic]

      Workshop: Drive Real Business Value with an HRIS Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Conduct an Environmental Scan

      The Purpose

      Understand the importance of creating an HRIS strategy before proceeding with software selection and implementation.

      Learn why a large percentage of HRIS projects fail and how to avoid common mistakes.

      Set expectations for the HRIS strategy and understand Info-Tech’s HRIS methodology.

      Complete a project charter to gain buy-in, build a project team, and track project success.   

      Key Benefits Achieved

      A go/no-go decision on the project appropriateness.

      Project stakeholders identified.

      Project team created with defined roles and responsibilities.

      Finalized project charter to gain buy-in.  

      Activities

      1.1 Set a direction for the project by clarifying the focus.

      1.2 Identify the right stakeholders for your project team.

      1.3 Identify HRIS needs, barriers, and enablers.

      1.4 Map the current state of your HRIS.

      1.5 Align your business goals with your HR goals and objectives.

      Outputs

      Project vision

      Defined project roles and responsibilities

      Completed HRIS business model

      Completed current state map and thorough understanding of the HR technology landscape

      Strategy alignment between HR and the business

      2 Design the Future State

      The Purpose

      Gain a thorough understanding of the HRIS-related pains felt throughout the organization.

      Use stakeholder-identified pains to directly inform the HRIS strategy and long-term solution.

      Visualize your ideal processes and realize the art of the possible.  

      Key Benefits Achieved

      Requirements to strengthen the business case and inform the strategy.

      The art of the possible.

      Activities

      2.1 Requirements gathering.

      2.2 Sketch ideal future state processes.

      2.3 Establish process owners.

      2.4 Determine guiding principles.

      2.5 Identify metrics.

      Outputs

      Pain points classified by data, people, process, and technology

      Ideal future process vision

      Assigned process owners, guiding principles, and metrics for each HR process in scope

      3 Create Roadmap and Finalize Deliverable

      The Purpose

      Brainstorm and prioritize short- and long-term HRIS tasks.

      Key Benefits Achieved

      Understand next steps for the HRIS project.

      Activities

      3.1 Create a high-level implementation plan that shows dependencies.

      3.2 Identify risks and mitigation efforts.

      3.3 Finalize stakeholder presentation.

      Outputs

      Completed implementation plan

      Completed risk management plan

      HRIS stakeholder presentation

      Automate Work Faster and More Easily With Robotic Process Automation

      • Buy Link or Shortcode: {j2store}237|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Your organization has many business processes that rely on repetitive, routine manual data collection and processing work, and there is high stakeholder interest in automating them.
      • You’re investigating whether robotic process automation (RPA) is a suitable technological enabler for automating such processes.
      • Being a trending technology, especially with its association with artificial intelligence (AI), there is much marketing fluff, hype, and misunderstanding about RPA.
      • Estimating the potential impact of RPA on business is difficult, as the relevant industry statistics often conflict each other and you aren’t sure how applicable it is to your business.

      Our Advice

      Critical Insight

      • There are no physical robots in RPA. RPA is about software “bots” that interact with applications as if they were human users to perform routine, repetitive work in your place. It’s for any business in any industry, not just for manufacturing.
      • RPA is lightweight IT; it reduces the cost of entry, maintenance, and teardown of automation as well as the technological requirement of resources that maintain it, as it complements existing automation solutions in your toolkit.
      • RPA is rules-based. While AI promises to relax the rigidity of rules, it adds business risks that are poorly understood by both businesses and subject-matter experts. Rules-based “RPA 1.0” is mature and may pose a stronger business case than AI-enabled RPA.
      • RPA’s sweet spot is “swivel chair automation”: processes that require human workers to act as a conduit between several systems, moving between applications, manually keying, re-keying, copying, and pasting information. A bot can take their place.

      Impact and Result

      • Discover RPA and how it differentiates from other automation solutions.
      • Understand the benefits and risks of complementing RPA with AI.
      • Identify existing business processes best suited for automation with RPA.
      • Communicate RPA’s potential business benefits to stakeholders.

      Automate Work Faster and More Easily With Robotic Process Automation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should use RPA to automate routine, repetitive data collection and processing work, review Info-Tech’s methodology, and understand the ways we can support you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Discover robotic process automation

      Learn about RPA, including how it compares to IT-led automation rooted in business process management practices and the role of AI.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 1: Discover Robotic Process Automation
      • Robotic Process Automation Communication Template

      2. Identify processes best suited for robotic process automation

      Identify and prioritize candidate processes for RPA.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 2: Identify Processes Best Suited for Robotic Process Automation
      • Process Evaluation Tool for Robotic Process Automation
      • Minimum Viable Business Case Document
      [infographic]

      Implement an IT Chargeback System

      • Buy Link or Shortcode: {j2store}71|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • Business units voraciously consume IT services and don’t understand the actual costs of IT. This is due to lack of IT cost transparency and business stakeholder accountability for consumption of IT services.
      • Business units perceive IT costs as uncompetitive, resulting in shadow IT and a negative perception of IT.
      • Business executives have decided to implement an IT chargeback program and IT must ensure the program succeeds.

      Our Advice

      Critical Insight

      Price IT services so that business consumers find them meaningful, measurable, and manageable:

      • The business must understand what they are being charged for. If they can’t understand the value, you’ve chosen the wrong basis for charge.
      • Business units must be able to control and track their consumption levels, or they will feel powerless to control costs and you’ll never attain real buy-in.

      Impact and Result

      • Explain IT costs in ways that matter to the business. Instead of focusing on what IT pays for, discuss the value that IT brings to the business by defining IT services and how they serve business users.
      • Develop a chargeback model that brings transparency to the flow of IT costs through to business value. Demonstrate how a good chargeback model can bring about fair “pay-for-value” and “pay-for-what-you-use” pricing.
      • Communicate IT chargeback openly and manage change effectively. Business owners will want to know how their profit and loss statements will be affected by the new pricing model.

      Implement an IT Chargeback System Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement an IT chargeback program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch

      Make the case for IT chargeback, then assess the financial maturity of the organization and identify a pathway to success. Create a chargeback governance model.

      • Implement IT Chargeback – Phase 1: Launch
      • IT Chargeback Kick-Off Presentation

      2. Define

      Develop a chargeback model, including identifying user-facing IT services, allocating IT costs to services, and setting up the chargeback program.

      • Implement IT Chargeback – Phase 2: Define
      • IT Chargeback Program Development & Management Tool

      3. Implement

      Communicate the rollout of the IT chargeback model and establish a process for recovering IT services costs from business units.

      • Implement IT Chargeback – Phase 3: Implement
      • IT Chargeback Communication Plan
      • IT Chargeback Rollout Presentation
      • IT Chargeback Financial Presentation

      4. Revise

      Gather and analyze feedback from business owners, making necessary modifications to the chargeback model and communicating the implications.

      • Implement IT Chargeback – Phase 4: Revise
      • IT Chargeback Change Communication Template
      [infographic]

      Workshop: Implement an IT Chargeback System

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Kick-Off IT Chargeback

      The Purpose

      Make the case for IT chargeback.

      Identify the current and target state of chargeback maturity.

      Establish a chargeback governance model.

      Key Benefits Achieved

      Investigated the benefits and challenges of implementing IT chargeback.

      Understanding of the reasons why traditional chargeback approaches fail.

      Identified the specific pathway to chargeback success.

      Activities

      1.1 Investigate the benefits and challenges of implementing IT chargeback

      1.2 Educate business owners and executives on IT chargeback

      1.3 Identify the current and target state of chargeback maturity

      1.4 Establish chargeback governance

      Outputs

      Defined IT chargeback mandate

      IT chargeback kick-off presentation

      Chargeback maturity assessment

      IT chargeback governance model

      2 Develop the Chargeback Model

      The Purpose

      Develop a chargeback model.

      Identify the customers and user-facing services.

      Allocate IT costs.

      Determine chargeable service units.

      Key Benefits Achieved

      Identified IT customers.

      Identified user-facing services and generated descriptions for them.

      Allocated IT costs to IT services.

      Identified meaningful, measurable, and manageable chargeback service units.

      Activities

      2.1 Identify user-facing services and generate descriptions

      2.2 Allocate costs to user-facing services

      2.3 Determine chargeable service units and pricing

      2.4 Track consumption

      2.5 Determine service charges

      Outputs

      High-level service catalog

      Chargeback model

      3 Communicate IT Chargeback

      The Purpose

      Communicate the implementation of IT chargeback.

      Establish a process for recovering the costs of IT services from business units.

      Share the financial results of the charge cycle with business owners.

      Key Benefits Achieved

      Managed the transition to charging and recovering the costs of IT services from business units.

      Communicated the implementation of IT chargeback and shared the financial results with business owners.

      Activities

      3.1 Create a communication plan

      3.2 Deliver a chargeback rollout presentation

      3.3 Establish a process for recovering IT costs from business units

      3.4 Share the financial results from the charge cycle with business owners

      Outputs

      IT chargeback communication plan

      IT chargeback rollout presentation

      IT service cost recovery process

      IT chargeback financial presentation

      4 Review the Chargeback Model

      The Purpose

      Gather and analyze feedback from business owners on the chargeback model.

      Make necessary modifications to the chargeback model and communicate implications.

      Key Benefits Achieved

      Gathered business stakeholder feedback on the chargeback model.

      Made necessary modifications to the chargeback model to increase satisfaction and accuracy.

      Managed changes by communicating the implications to business owners in a structured manner.

      Activities

      4.1 Address stakeholder pain points and highly disputed costs

      4.2 Update the chargeback model

      4.3 Communicate the chargeback model changes and implications to business units

      Outputs

      Revised chargeback model with business feedback, change log, and modifications

      Chargeback change communication

      Improve Your Statements of Work to Hold Your Vendors Accountable

      • Buy Link or Shortcode: {j2store}233|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $10,638 Average $ Saved
      • member rating average days saved: 16 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • SOW reviews are tedious, and reviewers may lack the skills and experience to effectively complete the process.
      • Vendors draft provisions that shift the performance risk to the customer in subtle ways that are often overlooked or not identified by customers.
      • Customers don’t understand the power and implications of SOWs, treating them as an afterthought or formality.

      Our Advice

      Critical Insight

      • There is often a disconnect between what is sold and what is purchased. To gain the customer’s approval, vendors will present a solution- or outcome-based proposal. However, the SOW is task or activity based, shifting the risk for success to the customer.
      • A good SOW takes time and should not be rushed. The quality of the requirements and of the SOW wording drive success. Not allocating enough time to address both increases the risk of the project’s failure.

      Impact and Result

      • Info-Tech’s guidance and insights will help you navigate the complex process of SOW review and identify the key details necessary to maximize the protections for your organization and hold vendors accountable.
      • This blueprint provides direction on spotting vendor-biased terms and conditions and offers tips for mitigating the risk associated with words and phrases that shift responsibilities and obligations from the vendor to the customer.

      Improve Your Statements of Work to Hold Your Vendors Accountable Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should spend more time assessing your statements of work, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess SOW Terms and Conditions

      Use Info-Tech’s SOW review guidance to find common pitfalls and gotchas, to maximize the protections for your organization, and to hold vendors accountable.

      • Improve Your Statements of Work to Hold Your Vendors Accountable – Storyboard
      • Contract or SOW Guide
      • SOW Maps Tool
      • Red-Flag Words and Phrases Tool
      [infographic]

      Workshop: Improve Your Statements of Work to Hold Your Vendors Accountable

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess SOW Terms and Conditions

      The Purpose

      Gain a better understanding of common SOW clauses and phrases.

      Key Benefits Achieved

      Reduce risk

      Increase vendor accountability

      Improve negotiation positions

      Activities

      1.1 Review sample SOW provisions, identify the risks, and develop a negotiation position.

      1.2 Review Info-Tech tools.

      Outputs

      Awareness and increased knowledge

      Familiarity with the Info-Tech tools

      Design a VIP Experience for Your Service Desk

      • Buy Link or Shortcode: {j2store}480|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • VIPs and executives expect to get immediate service for every IT issue, no matter how minor, and the service desk is constantly in reactive mode trying to quickly resolve these issues.
      • VIPs don’t understand or have input into service desk processes, procedures, and SLAs, especially when it comes to prioritization of their issues over other tickets.
      • The C-suite calls the CIO directly with every issue they have, tying them up and forcing them to redirect resources with little notice.
      • VIP tickets sit in the queue too long without a response or resolution, and VIPs are dissatisfied with the service they receive.

      Our Advice

      Critical Insight

      • Service desk and IT leaders are unclear on VIPs' service delivery expectations or the best support model to meet their needs while continuing to meet SLAs for the rest of the organization.
      • Deploying resources to service VIPs ahead of other users or more critical problems can result in inappropriate prioritization of issues and poor service delivery to the rest of the organization.
      • The reality for most organizations is that VIPs need special treatment; but providing VIP service shouldn’t come at the expense of good service delivery for the rest of the organization.

      Impact and Result

      • Stop being reactive to VIP requests and start planning for them so you can formally define the service and set expectations.
      • Talk to all relevant stakeholders to clarify their expectations before choosing a VIP service delivery model. Once you have designed your model, define and document the VIP service processes and procedures and communicate them to your stakeholders so everyone is clear on what is in and out of scope.
      • Once you’ve launched the service, track and report on key service desk metrics associated with VIP requests so you can properly allocate resources, budget accurately, evaluate the effectiveness of the service and demonstrate it to executives.

      Design a VIP Experience for Your Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Design a VIP Experience for Your Service Desk Storyboard – A guide to defining your VIP service desk support model

      Follow the seven steps outlined in this blueprint to design a VIP support model that best suits your organization, then communicate and evaluate the service to ensure it delivers results.

      • Design a VIP Experience for Your Service Desk Storyboard

      2. Service Desk VIP Procedures Template – A customizable template to document your service desk procedures for handling VIP tickets.

      This template is designed to assist with documenting your service desk procedures for handling VIP or executive tickets. It can be adapted and customized to reflect your specific support model and procedures.

      • Service Desk VIP Procedures Template

      3. VIP Support Process Workflow Example – A Visio template to document your process for resolving VIP tickets.

      This Visio template provides an example of a VIP support process, with every step involved in resolving or fulfilling VIP service desk tickets. Use this as an example to follow and a template to document your own process.

      • VIP Support Process Workflow Example

      4. VIP Support Service Communication Template – A customizable PowerPoint template to communicate and market the service to VIP users.

      This template can be customized to use as an executive presentation to communicate and market the service to VIP users and ensure everyone is on the same page.

      • VIP Support Service Communication Template
      [infographic]

      Further reading

      Design a VIP Experience for Your Service Desk

      Keep the C-suite satisfied without sacrificing service to the rest of the organization.

      Analyst Perspective

      Stop being reactive to VIP demands and formalize their service offering.

      Natalie Sansone, PHD

      Natalie Sansone, PHD

      Research Director,
      Infrastructure & Operations
      Info-Tech Research Group

      In a perfect world, executives wouldn’t need any special treatment because the service desk could rapidly resolve every ticket, regardless of the submitter, keeping satisfaction levels high across the board.

      But we know that’s not the case for most organizations. Executives and VIPs demand higher levels of service because the reality in most companies is that their time is worth more. And any IT leader who’s had a VIP complain about their service knows that their voice also carries more weight than that of a regular dissatisfied user.

      That said, most service desks feel strapped for resources and don’t know how to improve service for VIPs without sacrificing service to the rest of the organization.

      The key is to stop being reactive to VIP demands and formalize your VIP service procedures so that you can properly set expectations for the service, monitor and measure it, and continually evaluate it to make changes if necessary.

      A VIP offering doesn’t have to mean a white glove concierge service, either – it could simply mean prioritizing VIP tickets differently. How do you decide which level of service to offer? Start by assessing your specific needs based on demand, gather requirements from relevant stakeholders, choose the right approach to fit your business needs and capabilities, clearly define and document all aspects of the service then communicate it so that everyone is on the same page as to what is in and out of scope, and continually monitor and evaluate the service to make changes and improvements as needed.

      Executive Summary

      Your Challenge

      • VIPs and executives expect to get immediate service for every IT issue, no matter how minor, and the service desk is constantly in reactive mode trying to quickly resolve these issues.
      • VIPs don’t understand or have input into service desk processes, procedures, and SLAs, especially when it comes to prioritization of their issues over other tickets.
      • The C-suite calls the CIO directly with every issue they have, tying them up and forcing them to redirect resources with little notice.
      • VIP tickets sit in the queue too long without a response or resolution, and VIPs are dissatisfied with the service they receive.

      Common Obstacles

      • Service desk and IT leaders are unclear on the expectations that VIPs have for service delivery, or they disagree about the best support model to meet their needs while continuing to meet SLAs for the rest of the organization.
      • Service desk teams with limited resources are unsure how best to allocate those resources to handle VIP tickets in a timely manner.
      • There aren’t enough resources available at the service desk to provide the level of service that VIPs expect for their issues.
      • Deploying resources to service VIPs ahead of other users can result in inappropriate prioritization of issues and poor service delivery to the rest of the organization

      Info-Tech's Approach

      • Stop being reactive to VIP requests and start planning for them so you can formally define the service and set expectations.
      • Talk to all relevant stakeholders to clarify their expectations before choosing a VIP service delivery model.
      • Define and document the VIP service processes and procedures, including exactly what is in and out of scope.
      • Track and report on metrics associated with VIP requests so you can properly allocate resources and budget for the service.
      • Continually evaluate the service to expand, reduce, or redefine it, as necessary.

      Info-Tech Insight

      The reality for most organizations is that VIPs need special treatment. But providing VIP service shouldn’t come at the expense of good service delivery for the rest of the organization. To be successful with your approach, formalize the VIP offering to bring consistency and clear expectations for both users and the IT staff delivering the service.

      Do any of these scenarios sound familiar?

      All these familiar scenarios can occur when the service desk treats VIP issues reactively and doesn’t have a defined, documented, and agreed-upon VIP process in place.
      • A VIP calls because their personal printer isn’t working, but you also have a network issue affecting payroll being able to issue paychecks. The VIP wants their issue fixed immediately despite there being a workaround and a higher priority incident needing resources.
      • The COO calls the CIO after hours about issues they’re having with their email. The CIO immediately deploys a field tech back to the office to help the COO. Once the tech arrives, the COO says the issue could have waited until the morning.
      • The company president wants IT to spend a day at their house setting up their new personal laptop to be able to connect into the office before their vacation tomorrow. It would take away one FTE from an already understaffed service desk.
      • The CEO brings their child’s new iPhone in and asks the service desk if they have time to set it up as a favor today. The service desk manager instructs the T2 apps specialist to drop his other tickets to work on this immediately.
      • Two tickets come in at the same time – one is from an SVP who can’t log in to Teams and has an online meeting in half an hour, and the other is for a department of 10 who can’t access the network. The service desk doesn’t know who to help first.

      Different organizations can take very different approaches to VIP requests

      CASE STUDIES

      Providing VIP support helped this company grow

      Allocating a dedicated VIP technician slowed down service delivery for this company

      Situation

      A SaaS company looking to build and scale its services and customers decided to set up a VIP support program, which involved giving their most valuable customers white glove treatment to ensure they had a great experience, became long-term customers, and thus had a positive influence on others to build up the company’s customer base. VIPs were receiving executive-level support with a dedicated person for VIP tickets. The VIPs were happy with the service, but the VIP technician’s regular work was frequently impeded by having to spend most of her time doing white glove activities. The service desk found that in some cases, more critical work was slipping as a result of prioritizing all executive tickets.

      Resolution

      First, they defined who would receive VIP support, then they clearly defined the service, including what VIP support includes, who gets the service, and what their SLAs for service are. They found that the program was an effective way to focus their limited resources on the customers with the highest value potential to increase sales.
      While this model differs from an IT service desk VIP support program, the principles of dedicating resources to provide elevated support to your most important and influential customers for the benefit and growth of the company as a whole remain the same.
      The service desk decided to remove the VIP function. They demonstrated that the cost per contact was too high for dedicated executive support, and reallocating that dedicated technician to the service desk would improve the resolution time of all business incidents and requests. VIPs could still receive prioritized support through the escalation process, but they would contact the regular service desk with their issues. VIPs approved the change, and as a result of removing the dedicated support function, the service desk reduced average incident resolution times by 28% and request fulfillment times by 33%.

      A well-designed and communicated VIP support service can deliver many benefits

      The key to deciding whether a VIP service is right for your organization is to first analyze your needs, match them against your resources, then clearly define and document exactly what is in scope for the service.

      A successfully designed VIP service will lead to:

      • Executives and VIPs can easily contact the service desk and receive exceptional support and customer service from a knowledgeable technician, increasing their trust in the service desk.
      • All service desk tickets are prioritized appropriately and effectively in order to maximize overall ticket resolution and fulfillment times.
      • All users have a clear understanding of how to get in touch with the service desk and expected SLAs for specific ticket types.
      • Critical, business-impacting issues still receive priority service ahead of minor tickets submitted by a VIP.
      • All service desk technicians are clear on processes and procedures for prioritizing and handling VIP tickets.
      • Executives are satisfied with the service they receive and the value that IT provides
      • Reduced VIP downtime, contributing to overall organization productivity and growth.

      A poorly designed or reactive VIP service will lead to:

      • VIPs expect immediate service for non-critical issues, including after-hours.
      • VIPs circumvent the correct process and contact the CIO or service desk manager directly for all their issues.
      • Service desk resources stretched thin, or poor allocation of resources leads to degraded service for the majority of users.
      • More critical business issues are pushed back in order to fix non-critical executive issues.
      • Service desk is not clear how to prioritize tickets and always addresses VIP tickets first regardless of priority.
      • The service desk automatically acts on VIP tickets even when the VIP doesn’t require it or realize they’re getting a different level of service.
      • Non-VIP users are aware of the different service levels and try to request the same priority for their tickets. Support costs are over budget.

      Follow Info-Tech’s approach to design a successful VIP support model

      Follow the seven steps in this blueprint to design a VIP support model that works for your organization:
      1. Understand the support models available, from white glove service to the same service for everyone.
      2. Gather business requirements from all relevant stakeholders.
      3. Based on your business needs, choose the right approach.
      4. Define and document all details of the VIP service offering.
      5. Communicate and market the offering to VIPs so they’re aware of what’s in scope.
      6. Monitor volume and track metrics to evaluate what’s working.
      7. Continually improve or modify the service as needed over time.

      Blueprint deliverables

      The templates listed below are designed to assist you with various stages of this project. This storyboard will direct you when and how to complete them.

      Service Desk VIP Procedures Template

      Use this template to assist with documenting your service desk procedures for handling VIP or executive tickets.

      VIP Support Process Workflow Example

      Use this Visio template to document your process for resolving or fulfilling VIP tickets, from when the ticket is submitted to when it’s closed.

      VIP Support Service Communication Template

      Use this template to customize your executive presentation to communicate and market the service to VIP users.

      Insight Summary

      Key Insight

      The reality for most organizations is that VIPs need special treatment. But providing VIP service shouldn’t be at the expense of good service delivery for the rest of the organization. To be successful with your approach, formalize the VIP offering to bring consistency and clear expectations for both users and the IT staff delivering the service.

      Additional insights:

      Insight 1

      VIP service doesn’t have to mean concierge service. There are different levels and models of VIP support that range in cost and level of service provided. Carefully evaluate your needs and capacity to choose the approach that works best for your organization.

      Insight 2

      This service is for your most valued users, so design it right from the start to ensure their satisfaction. Involve stakeholders from the beginning, incorporate their feedback and requirements, keep them well-informed about the service, and continually collect and act on feedback to deliver the intended value.

      Insight 3

      Intentional, continual monitoring and measurement of the program must be part of your strategy. If your metrics or feedback show that something isn’t working, fix it. If you find that the perceived value isn’t worth the high cost of the program, make changes. Even if everything seems to be working fine, identify ways to improve it or make it more efficient.

      Step 1: Understand the different support models

      Step overview:

      • Understand the support models available, from white glove service to the same service for everyone

      First, define what “VIP support” means in your organization

      VIP support from the service desk usually refers to an elevated level of service (i.e. faster, after-hours, off-site, and/or with more experienced resources) that is provided to those at the executive level of the organization.

      A VIP typically includes executives across the business (e.g. CIO, CEO, CxO, VPs) and sometimes the executive assistants who work directly with them. However, it can also include non-executive-level but critical business roles in some organizations.

      The level of VIP service provided can differ from receiving prioritization in the queue to having a dedicated, full-time technician providing “white glove” service.

      Info-Tech Insight

      You don’t have to use the term “VIP”, as long as you clearly define the terms you are using. Some organizations use the term “VIR” to refer to very important roles rather than people, and some define “critical users” to reflect who should receive prioritized service, for example.

      There are essentially two options for VIP support, but multiple determining factors

      While the details are more specific, your options for VIP support really come down to two: they either receive some kind of enhanced service (either from a dedicated support team or through prioritization from the regular support team) or they don’t. Which option you choose will depend on a wide range of factors, some of which are represented in the diagram below. Factors such as IT budget, size of organization help determine which VIP support model you choose: Enhanced, or the same as everyone else. With enhanced service, you can opt to a dedicated support team or same support team but with prioritized service.

      Option 1: Same service for everyone

      What does it look like?

      VIP tickets are prioritized in the same way as every other ticket – with an assessment by impact and urgency. This allows every ticket to be prioritized appropriately according to how big the impact of the issue is and how quickly it needs to be resolved – regardless of who the submitter is. This means that VIPs with very urgent issues will still receive immediate support, as would a non-VIP user with a critical issue.

      Who is it best suited for?

      • Small organizations and IT teams.
      • Executives don’t want special treatment.
      • Not enough service desk resources or budget to provide prioritized or dedicated VIP service.
      • Service desk is already efficient and meeting SLAs for all requests and incidents.

      Pros

      • Highest level of consistency in service because the same process is followed for all user groups.
      • Ensures that service doesn’t suffer for non-VIP users for teams with a limited number of service desk staff.
      • No additional cost.
      • Potential to argue for more resources if executive service expectations aren’t met.

      Cons

      • Does not work if executives expect or require elevated service regardless of issue type.
      • Potential for increase in management escalations or complaints from dissatisfied executives. Some may end up jumping the queue as a result, which results in unstandardized VIP treatment only for some users.

      Info-Tech Insight

      Don’t design a VIP service solely out of fear that VIPs will be unhappy with the standard level of support the service desk provides. In some cases, it is better to focus your efforts on improving your standard support for everyone rather than only for a small percentage of users, especially if providing that elevated VIP support would further deteriorate service levels for the rest of the organization.

      Option 2: Prioritized service for VIPs

      What does it look like?

      • VIPs still go through the service desk but receive higher priority than non-VIP tickets.
      • Requests from VIP submitters are still evaluated using the standard prioritization matrix but are bumped up in urgency or priority. More critical issues can still take precedence.
      • Existing service desk resources are still used to resolve the request, but requests are just placed closer to the “front of the line.”
      • VIP users are identified in the ticketing system and may have a separate number to call or are routed differently/skip the queue within the ACD/IVR.

      Who is it best suited for?

      • Organizations that want or need to give VIPs expedited or enhanced service, but that don’t have the resources to dedicate to a completely separate VIP service desk team.

      Pros

      • Meets the need of executives for faster service.
      • Balances the need for prioritized service to VIPs while not sacrificing resources to handle most user requests.
      • All tickets still go through a single point of contact to be triaged and monitored by the service desk.
      • Easy to measure and compare performance of VIP service vs. standard service because processes are the same.

      Cons

      • Slight cost associated with implementing changes to phone system if necessary.
      • Makes other users aware that VIPs receive “special treatment” – some may try to jump the queue themselves.
      • May not meet the expectations of some executives who prefer dedicated, face-to-face resources to resolve their issues.

      Info-Tech Insight

      If you’re already informally bumping VIP tickets up the queue, this may be the most appropriate model for you. Bring formalization to your process by clearly defining exactly where VIP tickets fit in your prioritization matrix to ensure they are handled consistently and that VIPs are aware of the process.

      Option 3: Dedicated VIP service

      What does it look like?

      • VIPs contact a dedicated service desk and receive immediate/expedited support, often face to face.
      • Often a separate phone number or point of contact.
      • Similar to concierge service or “white glove” service models.
      • At least one dedicated FTE with good customer service skills and technical knowledge who builds trust with executives.

      Who is it best suited for?

      • Larger enterprises with many VIP users to support, but where VIPs are geographically clustered (as geography sprawls, the cost of the service will spiral).
      • IT organizations with enough resources on the service desk to support a dedicated VIP function.
      • Organizations where executives require immediate, in-person support.

      Pros

      • Most of the time, this model results in the fastest service delivery to executives.
      • Most personal method of delivering support with help often provided in person and from familiar, trusted technicians.
      • Usually leads to the highest level of satisfaction with the service desk from executives.

      Cons

      • Most expensive model; usually requires at least one dedicated, experienced FTE to support and sometimes after-hours support.
      • Essentially two separate service desks; can result in a disconnect between staff.
      • Career path and cross-training opportunities for the dedicated staff may be limited; role can be exhausting.
      • Reporting on the service can be more complicated and tickets are often logged after the fact.
      • If not done well, quality of service can suffer for the rest of the organization.

      Info-Tech Insight

      This type of model is essential in many large enterprises where the success of the company can depend on VIPs having access to dedicated support to minimize downtime as much as possible. However, it also requires the highest level of planning and dedication to get right. Without carefully documented processes and procedures and highly trained staff to support the model, it will fail to deliver the expected benefits.

      Step 2: Capture business needs

      Step overview:

      • Analyze your data and gather requirements to determine whether there is a need for a VIP service.

      Assess current state and metrics

      You can’t define your target state without a clear understanding of your current state. Analyze your ticket data and reports to identify the type and volume of VIP requests the service desk receives and how well you’re able to meet these requests with your current resources and structure.

      Analyze ticket data

      • What volume of tickets are you supporting? How many of those tickets come from VIP users?
      • What is your current resolution time for incidents and requests? How well are you currently meeting SLAs?
      • How quickly are executive/VIP tickets being resolved? How long do they have to wait for a response?
      • How many after-hours requests do you receive?

      Assess resourcing

      • How many users do you support; what percentage of them would be identified as VIP users?
      • How many service desk technicians do you have at each tier?
      • How well are you currently meeting demand? Would you be able to meet demand if you dedicated one or more Tier 2 technicians to VIP support?
      • If you would need to hire additional resources, is there budget to do so?

      Use the data to inform your assessment

      • Do you have a current problem with service delivery to VIPs and/or all users that needs to be addressed by changing the VIP support model?
      • Do you have the demand to support the need for a VIP service?
      • Do you have the resources to support providing VIP service?

      Leverage Info-Tech’s tools to inform your assessment

      Analyze your ticket data and reports to understand how well you’re currently meeting SLAs, your average response and resolution times, and the volume and type of requests you get from VIPs in order to understand the need for changing your current model. If you don’t have the ticket data to inform your assessment, leverage Info-Tech’s Service Desk Ticket Analysis Tool.

      Service Desk Ticket Analysis Tool

      Use this tool to identify trends and patterns in your ticket data. The ticket summary dashboard contains multiple reports analyzing how tickets come in, who requests them, who resolves them, and how long it takes to resolve them.

      If you need help understanding how well your current staff is able to handle your current ticket volume, leverage Info-Tech’s Service Desk Staffing Calculator to analyze demand and ticket volume trends. While not specifically designed to analyze VIP tickets, you could run the assessment separately for VIP volume if you have that data available.

      Service Desk Staffing Calculator

      Use this tool to help you estimate the optimal resource allocation to support your demand over time.

      Engage stakeholders to understand their requirements

      Follow your organization’s requirements gathering process to identify and prioritize stakeholders, conduct stakeholder interviews, and identify, track, and prioritize their requirements and expectations for service delivery.

      Gather requirements from VIP stakeholders

      1. Identify which stakeholders need to be consulted.
      2. Prioritize stakeholders in terms of influence and interest in order to identify who to engage in the requirements gathering process.
      3. Build a plan for gathering the requirements of key stakeholders in terms of VIP service delivery.
      4. Conduct requirements gathering and record the results of each stakeholder interaction.
      5. Analyze and summarize the results to determine the top expectations and requirements for VIP service desk support.

      If your organization does not have a defined requirements gathering process or template, leverage Info-Tech tools and templates:

      The Improve Requirements Gathering blueprint can be adapted from software requirements gathering to service desk.

      The PMO Requirements Gathering Tool can be adapted from interviewing stakeholders on their PMO requirements to service desk requirements.

      Info-Tech Insight

      Don’t guess at what your VIPs need or want – ask them and involve them in the service design. Many IT leaders sacrifice overall service quality to prioritize VIPs, thinking they expect immediate service. However, they later find out that the VIPs just assumed the service they were receiving was the standard service and many of their issues can wait.

      Identify additional challenges and opportunities by collecting perceptions of business users and stakeholders

      Formally measuring perceptions from your end users and key business stakeholders will help to inform your needs and determine how well the service desk is currently meeting demands from both VIP users and the entire user base.

      CIO Business Vision

      Info-Tech's CIO Business Vision program is a low-effort, high-impact program that will give you detailed report cards on the organization’s satisfaction with IT’s core services. Use these insights to understand your key business stakeholders, find out what is important to them, and improve your interactions.

      End User Satisfaction

      Info-Tech’s End User Satisfaction Program helps you measure end-user satisfaction and importance ratings of core IT services, IT communications, and business enablement to help you decide which IT service capabilities need to be addressed to meet the demands of the business.

      Learn more about Info-Tech’s CIO Business Vision or End User Satisfaction Program .

      Step 3: Choose the right approach

      Step overview:

      • Based on your assessment from Step 2, decide on the best way to move forward with your VIP service model.

      Use your assessment results to choose the most appropriate support model

      The table below is a rough guide for how the results of your assessments may line up to the most appropriate model for your organization:

      Example assessment results for: Dedicated service, prioritized service, and same servce based off of the assessment source: Ticket analysis, staffing analysis, or stakeholder.

      Info-Tech Insight

      If you’re in the position of deciding how to improve service to VIPs, it’s unlikely that you will end up choosing the “same service” model. If your data analysis tells you that you are currently meeting every metric target for all users, this may actually indicate that you’re overstaffed at the service desk.

      If you choose a specialized VIP support model, ensure there is a strong, defined need before moving forward

      Do not proceed if:

      • Your decision is purely reactive in response to a perceived need or challenges you’re currently experiencing
      • The demand is coming from a single dissatisfied executive without requirements from other VIPs being collected.
      • Your assessment data does not support the demand for a dedicated VIP function.
      • You don’t have the resources or support required to be successful in the approach.

      Proceed with a VIP model if:

      • You’re prepared to scale and support the model over the long term.
      • Business stakeholders have clearly expressed a need for improved VIP service.
      • Data shows that there is a high volume of urgent requests from VIPs.
      • You have the budget and resources required to support an enhanced VIP service delivery model.

      Step 4: Design the service offering

      Step overview:

      • Define and document all processes, procedures, and responsibilities relevant to the VIP support offering.

      Clearly define the service and eligible users

      Once you’ve decided on the most appropriate model, clearly describe the service and document who is eligible to receive it.

      1. Define exactly what the service is before going into the procedural details. High-level examples to start from are provided below:

      Prioritized Service Model

      When a designated VIP user contacts the service desk with a question, incident, or service request, their ticket will be prioritized over non-VIP tickets following the prioritization matrix. This process has been designed in accordance with business needs and requirements, as defined VIP users have more urgent demands on their time and the impact of downtime is greater as it has the potential to impact the business. However, all tickets, VIP tickets included, must still be prioritized by impact and urgency. Incidents that are more critical will still be resolved before VIP tickets in accordance with the prioritization process.

      Dedicated Service Model

      VIP support is a team of dedicated field technicians available to provide an elevated level of service including deskside support for executives and designated VIP users. VIP users have the ability to contact the VIP support service through a dedicated phone number and will receive expedited ticket handling and resolution by dedicated Tier 2 specialists with experience dealing with executives and their unique needs and requirements. This process has been designed in accordance with business needs and requirements.

      2 Identify VIP-eligible users

      • Define who qualifies as a VIP to receive VIP support or be eligible to contact the dedicated VIP service desk/concierge desk.
      • If other users or EAs can submit tickets on behalf of VIPs, identify those individuals as well.
      • Review the list and cut back if necessary. Less is usually more here, especially when starting out. If everyone is a VIP, then no one is truly a VIP.
      • Identify who maintains ownership over the list of eligible VIP users and how any changes to the list or requests for changes will be handled.
      • Ensure that all VIP-eligible users are clearly identified in the ITSM system.

      Map out the VIP process in a workflow

      Use a visual workflow to document the process for resolving or fulfilling VIP tickets, from when the ticket is submitted to when it gets closed.

      Your workflow should address the following:

      • How should the ticket be prioritized?
      • When are escalations necessary?
      • What happens if a user requests VIP service but is not defined as eligible?
      • Should the user verify that the issue is resolved before the ticket is closed?
      • What automatic notifications or communications need to go out and when?
      • What manual communications or notifications need to be sent out (e.g. when a ticket is escalated or reassigned)?
      VIP Support Process Example.

      Use the VIP Support Process Workflow Example as a template to map out your own process.

      Define and document all VIP processes and procedures

      Clearly describe the service and all related processes and procedures so that both the service delivery team and users are on the same page.

      Define all aspects of the service so that every VIP request will follow the same standardized process and VIPs will have clear expectations for the service they receive. This may include:

      • How VIPs should contact the service desk
      • How VIP tickets will be prioritized
      • SLAs and service expectations for VIP tickets
      • Ticket resolution or fulfillment steps and process
      • Escalation points and contacts
      • After-hours requests process

      If VIP user requests receive enhanced priority, for example, define exactly how those requests should be prioritized using your prioritization matrix. An example is found below and in the Service Desk VIP Procedures Template.

      Prioritization matrix for classification of incidents and requests.

      Use Info-Tech’s Service Desk VIP Procedures Template as a guide

      This template is designed to assist with documenting your service desk procedures for handling VIP or executive tickets. The template is not meant to cover all possible VIP support models but is an example of one support model only. It should be adapted and customized to reflect your specific support model and procedures.

      It includes the following sections:

      1. VIP support description/overview
      2. VIP support entitlement (who is eligible)
      3. Procedures
        • Ticket submission and triage
        • Ticket prioritization
        • SLAs and escalation
        • VIP ticket resolution process
        • After-hours requests
      4. Monitoring and reporting

      Download the Service Desk VIP Procedures Template

      Allocate resources or assign responsibilities specific to VIP support

      Regardless of the support model you choose, you’ll need to be clear on service desk agents’ responsibilities when dealing with VIP users.
      • Clarify the expectations of any service desk agent who will be handling VIP tickets; they should demonstrate excellent customer service skills and expertise, respect for the VIP and the sensitivity of their data, and prompt service.
      • Use a RACI chart to clarify responsibility and accountability for VIP-specific support tasks.
      • If you will be moving to a dedicated VIP support team, clearly define the responsibilities of any new roles or tasks. Sample responsibilities can be found on the right.
      • If you will be changing the role of an existing service desk agent to become focused solely on providing VIP support, clarify how the responsibilities of other service desk agents may change too, if at all.
      • Be clear on expectations of agents for after-hours support, especially if there will be a change to the current service provision.

      Sample responsibilities for a dedicated VIP support technician/specialist may include:

      • Resolve support tickets for all eligible VIP users following established processes and procedures.
      • Provide both onsite and remote support to executives.
      • Quickly and effectively diagnose and resolve technical issues with minimal disruption to the executive team.
      • Establish trust with executives/VIPs by maintaining confidentiality and privacy while providing technical support.
      • Set up, monitor, and support high-priority meetings, conferences, and events.
      • Demonstrate excellent communication and customer service skills when providing support to executives.
      • Coordinate more complex support issues with higher level support staff and track tickets through to resolution when needed.
      • Learn new technology and software ahead of implementation to train and support executive teams for use.
      • Conduct individual or group training as needed to educate on applications or how to best use technology to enhance productivity.
      • Proactively manage, maintain, update, and upgrade end-user devices as needed.

      Configure your ITSM tool to support your processes

      Configure your tool to support your processes, not the other way around.
      • Identify and configure VIP users in the system to ensure that they are easily identifiable in the system (e.g. there may be a symbol beside their name).
      • Configure automations or build ticket templates that would automatically set the urgency or priority of VIP tickets.
      • Configure any business rules or workflows that apply to the VIP support process.
      • Define any automated notifications that need to be sent when a VIP ticket is submitted, assigned, escalated, or resolved (e.g. notify service desk manager or a specific DL).
      • Define metrics and customize dashboards and reports to monitor VIP tickets and measure the success of the VIP service.
      • Configure any SLAs that apply only to VIPs to ensure displayed SLAs are accurate.

      Step 5: Launch the service

      Step overview:

      • Communicate and market the service to all relevant stakeholders so everyone is on the same page as to how it works and what’s in scope.

      Communicate the new or revised service to relevant stakeholders ahead of the launch

      If you did your due diligence, the VIP service launch won’t be a surprise to executives. However, it’s critical to

      continue the engagement and communicate the details of the service well to ensure there are no misperceptions about the

      service when it launches.

      Goals of communicating and marketing the service:

      1. Create awareness and understanding of the purpose of the VIP service and what it means for eligible users.
      2. Solidify commitment and buy-in for the service from all stakeholders.
      3. Ensure that all users know how to access the service and any changes to the way they should interact with the service desk.
      4. Set expectations for new/revised service levels.
      5. Reduce and address any concerns about the change in process.

      Info-Tech Insight

      This step isn’t only for the launch of new services. Even if you’re enhancing or right-sizing an existing VIP service, take the opportunity to market the improvements, remind users of the correct processes, and collect feedback.

      Leverage Info-Tech’s communication template to structure your presentation

      This template can be customized to use as an executive presentation to communicate and market the service to VIP users. It includes:

      • Key takeaways
      • Current-state assessment
      • Requirements gathering and feedback results
      • Objectives for the service
      • Anticipated benefits
      • Service entitlement
      • How the service works
      • Escalations and feedback contacts
      • Timeline of next steps

      Info-Tech Insight

      If you’re launching a dedicated concierge service for VIPs, highlight the exclusivity of the service in your marketing to draw users in. For example, if eligible VIPs get a separate number to call, expedited SLAs, or access to more tenured service desk experts, promote this added value of the service.

      Download the VIP Support Service Communication Template

      Step 6: Monitor and measure

      Step overview:

      • Measure and monitor the success of the program by tracking and reporting on targeted metrics.

      Evaluate and demonstrate the success of the program with key metrics

      Targeted metrics to evaluate the success of the VIP program will be critical to understanding and demonstrating whether the service is delivering the intended value. Track key metrics to:

      • Track if and how well you’re meeting your defined SLAs for VIP support.
      • Measure demand for VIP support (i.e. ticket volume and types of tickets) and evaluate against resource supply to determine whether a staffing adjustment is needed to meet demand.
      • Measure the cost of providing the VIP service in order to report back to executives.
      • Leverage real data to quantitatively demonstrate that you’re providing enhanced service to VIPs if there is an escalation or negative feedback from one individual.
      • Monitor service delivery to non-VIP users to ensure that service to the rest of the organization isn’t impacted by the VIP service
      • Evaluate the types of ticket that are submitted to the VIP service to inform training plans, self-service options, device upgrades, or alternatives to reduce future volume.

      Info-Tech Insight

      If your data definitively shows the VIP offering delivers enhanced service levels, publish these results to business leadership. A successful VIP service is a great accomplishment to market and build credibility for the service desk.

      Tie metrics to critical success factors

      Apart from your regular service desk metrics, identify the top metrics to tie to the key performance indicators of the program’s success factors.

      Sample Critical Success Factors

      • Increased executive satisfaction with the service desk
      • Improved response and resolution times to VIP tickets
      • Demand for the service is matched by supply

      Sample Metrics

      • End-user satisfaction scores on VIP tickets
      • Executive satisfaction with the service desk as measured on a broader annual survey
      • Response and resolution times for VIP tickets
      • Percentage of SLAs met for VIP tickets
      • VIP ticket volume
      • Average speed of answer for VIP calls

      Download Define Service Desk Metrics that Matter and the Service Desk Metrics Workbook for help defining CSFs, KPIs, and key metrics

      Step 7: Continually improve

      Step overview:

      • Continually evaluate the program to identify opportunities for improvement or modifications to the service support model.

      Continually evaluate the service to identify improvements

      Executives are happy, resolution times are on target – now what? Even if everything seems to be working well, never stop monitoring, measuring, and evaluating the service. Not only can metrics change, but there can also always be ways to improve service.

      • Continual improvement should be a mindset – there are always opportunities for improvement, and someone should be responsible for identifying and tracking these opportunities so that they actually get done.
      • Just as you asked for feedback and involvement from VIPs (and their assistants who may submit tickets on their behalf) in designing the service, you should continually collect that feedback and use it to inform improvements to the service.
      • End-user satisfaction surveys, especially broader, more targeted surveys, are also a great source of improvement ideas.
      • Even if end users don’t perceive any need for improvement, IT should still assess how they can make their own processes more efficient or offer alternatives to make delivery easier.

      Download Info-Tech’s Build a Continual Improvement Program blueprint to help you build a process around continual improvement, and use the Continual Improvement Register tool to help you identify and prioritize improvement initiatives.

      Info-Tech Insight

      Don’t limit your continual improvement efforts to the VIP service. Once you’ve successfully elevated the VIP service, look to how you can apply elements of that service to elevate support to the rest of the organization. For example, through providing a roaming service desk, a concierge desk, a Genius-Bar-style walk-in service, etc.

      Expand, reduce, or modify as needed

      Don’t stop with a one-time program evaluation. Continually use your metrics to evaluate whether the service offering needs to change to better suit the needs of your executives and organization. It may be fine as is, or you may find you need to do one of the following:

      Expand

      • If the service offering has been successful and/or your data shows underuse of VIP-dedicated resources, you may be able to expand the offering to identify additional roles as VIP-eligible.
      • Be cautious not to expand the service too widely; not only should it feel exclusive to VIPs, but you need to be able to support it.
      • Also consider whether elements that have been successful in the VIP program (e.g. a concierge desk, after-hours support) should be expanded to be offered to non-VIPs.

      Reduce

      • If VIPs are not using the service as much as anticipated or data shows supply outweighs demand, you may consider scaling back the service to save costs and resources.
      • However, be careful in how you approach this – it shouldn’t negatively impact service to existing users.
      • Rather, evaluate costly services like after-hours support and whether it’s necessary based on demand, adjust SLAs if needed, or reallocate service desk resources or responsibilities. For example, if demand doesn’t justify a dedicated service desk technician, either add non-VIP tasks to their responsibilities or consider moving to a prioritized model.

      Modify

      • The support model doesn’t need to be set in stone. If elements aren’t working, change them! If the entire support model isn’t working, reevaluate if it’s the best model for your organization.
      • Don’t make decisions in a vacuum, though. Just as executives were involved in decision-making at the outset, continually gather their feedback and use it to inform the service design.

      Related Info-Tech Research

      Standardize the Service Desk

      This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management to create a sustainable service desk.

      Optimize the Service Desk With a Shift-Left Strategy

      This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

      Build a Continual Improvement Plan

      This project will help you build a continual improvement plan for the service desk to review key processes and services and manage the progress of improvement initiatives.

      Deliver a Customer Service Training Program to Your IT Department

      This project will help you deliver a targeted customer service training program to your IT team to enhance their customer service skills when dealing with end users, improve overall service delivery, and increase customer satisfaction.

      Works Cited

      Munger, Nate. “Why You Should Provide VIP Customer Support.” Intercom, 13 Jan. 2016. Accessed Jan. 2023.

      Ogilvie, Ryan. “We Did Away With VIP Support and Got More Efficient.” HDI, 17 Sep. 2020. Accessed Jan. 2023.

      Get Started With FinOps

      • Buy Link or Shortcode: {j2store}473|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy
      • Runaway cloud costs are wrecking the CIO’s budget, but cloud costs are hard to reign in because vendors are not always up front about the true costs, it’s easy to oversubscribe to services and quickly run up costs with pay-as-you-go service, and cloud bills are complex.
      • While IT isn’t the business owner for cloud services, they often carry the cost of overruns on their budget, and don’t have the skills or influence to more effectively manage cloud costs.
      • Truly optimizing cloud spend and maximizing business value from cloud requires insight and collaboration from IT/engineering, finance, and business owners, but those teams are often siloed and manage their cloud usage or spend differently.

      Our Advice

      Critical Insight

      • The business units that need to collaborate to make FinOps work are often siloed, with different processes, data, metrics and cloud expertise. Coordinating their efforts to encourage shared responsibility can be a big obstacle to overcome.
      • FinOps requires a cultural shift to empower every cloud user to take accountability for cloud cost optimization.
      • To get started with FinOps, it’s essential to first break down those silos and get the multiple teams involved on the same page. Everyone must understand how FinOps is part of their responsibilities.

      Impact and Result

      • Implementing FinOps will lead to improved visibility and control over cloud spend, optimized resource allocation and reduced cloud waste, enhanced transparency, improved forecasting and budgeting, and increased accountability over cloud costs across business units.
      • This blueprint will help you get started with FinOps by identifying the roles involved in FinOps, defining the key activities that must be conducted, and assigning ownership to each task. This will help foster a shared responsibility for FinOps and encourage everyone to work toward common goals.

      Get Started With FinOps Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Get Started With FinOps Deck – A guide to defining and assigning the roles and activities involved in FinOps.

      This storyboard will help you define FinOps roles and structure of the FinOps and other teams, identify key activities, and assign ownership to each. It will also provide guidance on analyzing the results of the RACI chart.

      • Get Started With FinOps Storyboard

      2. FinOps RACI Chart – A tool to help you assess the current state of FinOps activities and assign ownership to each.

      This tool will help you assess the current state of FinOps activities and assign ownership to each activity. Use the outputs of the exercise to define how roles across the organization will be involved in FinOps and where to focus efforts in maturing in FinOps.

      • FinOps RACI Chart
      [infographic]

      Further reading

      Get Started With FinOps

      FinOps goes beyond identifying cloud savings. It empowers every cloud user to maximize the value of their spend.

      Executive Brief

      Analyst Perspective

      The first step of FinOps is collectively realizing that maximizing value is every cloud user's responsibility.

      Natalie Sansone

      Natalie Sansone, PhD
      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      As cloud adoption increases, and with it the complexity of cloud environments, managing and optimizing cloud spend has become both a top challenge and priority for IT organizations. In response, the practice of FinOps has emerged to help organizations maximize the value they get from the cloud. As its popularity surges, organizations are told they must do FinOps, but many feel their practice is not yet mature. One of their biggest obstacles is empowering engineers and other cloud users to work toward this shared goal with other teams.

      To grow and mature your FinOps practice, your first challenge is breaking down silos, encouraging collaboration across varying business units, and getting all cloud users to be accountable for their cloud usage and spend and to understand the shared goals of FinOps. Beyond finding ways to reduce cloud costs, FinOps is a cultural shift that enables better collaboration between distributed teams. It allows them to leverage data to identify opportunities to maximize business value from cloud investments.

      Whether you’re starting the FinOps journey or looking to mature your practice, this blueprint will help you organize by defining the required role and tasks. Then you can work through a collective exercise to ensure everyone understands who is involved and responsible for each activity. You’ll gain the information you need and be better positioned to continuously improve and mature your processes, but success begins with everyone understanding that FinOps is a shared responsibility.

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • Runaway cloud costs are wrecking the CIO’s budget, but these are hard to rein in because cloud vendors are not always upfront about the true costs. It’s easy to oversubscribe to services and quickly run up costs with pay-as-you-go service and complex bills.
      • While IT isn’t the business owner for cloud services, they often carry the cost of overruns on their budget, and don’t have the skills or influence to more effectively manage cloud costs.
      • Truly optimizing cloud spend and maximizing its business value requires insight and collaboration from IT/engineering, finance, and business owners, but those teams are often siloed and manage their cloud usage/spend differently.
      • IT leaders are instructed to implement a FinOps practice, but don’t truly understand what that is, who needs to be involved, or where to start.
      • Business units that must collaborate to make FinOps work are often siloed and have different processes, data, metrics, and cloud expertise. Coordinating efforts to encourage shared responsibility can be a challenge. FinOps requires a cultural shift to empower every cloud user to take accountability for cost optimization.
      • Lack of visibility into cloud usage, spending patterns, and cost drivers along with inadequate tools to get the required data to drive decision making. This leads to hindered progress.
      • Implementing FinOps will improve visibility and control over cloud spend, optimize resource allocation and reduce waste, enhance transparency, improve forecasting and budgeting, and improve cost accountability across business units.
      • To get started with FinOps, first it’s essential to break down those silos and coordinate the multiple teams involved. Everyone must understand how FinOps is part of their responsibilities.
      • This blueprint will help you identify the roles involved in FinOps, define the key activities that must be conducted, and assign ownership to each task. This will help foster a shared responsibility for FinOps and encourage everyone to work toward common goals.

      Info-Tech Insight

      FinOps is not just about driving cloud savings. It’s a cultural shift empowering every cloud user to maximize the value of their spend. The first step of FinOps is therefore to help everyone understand their share of responsibility.

      What is FinOps?

      Definition

      “FinOps is an evolving cloud financial management discipline and cultural practice that enables organizations to get maximum business value by helping engineering, finance, technology, and business teams to collaborate on data-driven spending decisions.”

      Definition Updated: November 2021 by the FinOps Foundation Technical Advisory Council

      The ultimate purpose of FinOps is to bring business value to your organization by reducing cloud waste.

      • FinOps is the people, processes, and tools you use to eliminate waste and ensure you get the most value from your cloud spend.
      • FinOps is the framework within which teams can operate to ensure they are optimizing their use of cloud resources.
      • FinOps brings financial accountability to cloud spend.
      • FinOps is a culture practice where everyone collaborates and takes ownership for their cloud usage while being supported and governed by a central group. It breaks down silos so teams that haven’t worked closely together in the past collaborate toward shared goals.
      • It brings financial accountability and cultural change to cloud spend by enabling distributed teams to better collaborate and leverage data to decide where/when to invest in cloud for maximum business value.
      • FinOps is not done by an individual or just one team. It’s a change in the way that many disparate teams work together, from engineering to finance to business teams.

      Common misconceptions about FinOps

      FinOps is not

      FinOps is

      • Only about saving money
      • Only focused on activities related to cost optimization
      • IT financial management, which involves tracking and analyzing all costs associated with IT services
      • An activity (or set of activities) done by one person or team
      • Short for financial operations
      • About maximizing value. FinOps is optimizing cloud costs to provide maximum business value and support scalability (sometimes this means investing more money in cloud)
      • FinOps also involves building a culture of accountability, visibility, and collaboration around cloud usage and cost
      • Focused specifically on managing/optimizing cloud costs
      • A cultural shift around how disparate teams work together, people from all areas of the organization can play a role
      • The term is a portmanteau (combination) of Finance and (Dev)Ops, emphasizing the collaboration between business and engineering teams1
      1 “What is FinOps?” FinOps Foundation, 2023

      FinOps’ popularity has exploded in recent years

      2012 - The practice of FinOps begins to emerge through early scalers in public cloud like Adobe and Intuit

      2017 - Many IT departments begin to use the cloud for limited use cases, but very few enterprises are all in the cloud

      2019 - Many companies begin moving to a cloud-first strategy, shifting IT spend from capital to operational expenditure (CapEx to OpEx), complicating cloud bills

      February 2019 - The FinOps Foundation is born out of Cloudability’s Customer Advisory Board meeting where many cloud practitioners discuss the need for a community of practitioners

      June 2020 - The FinOps Foundation merges with Linux Foundation and sets the standard for cloud financial management

      Sources: Carr, 2022; Linux Foundation, 2023, Storment & Fuller, 2023.

      The image contains a graph that demonstrates the increasing number of people listing FinOps as a skill.

      Where did the term come from?

      The term FinOps has risen in popularity over the last few years. Originally, organizations used the term cloud cost management, then cloud cost optimization, then more broadly, cloud financial management. The latter has now been largely replaced by FinOps.

      Why is FinOps so essential? (1/2)

      The shift from fixed to variable spend has changed the way organizations must manage and report on costs.

      In the traditional data center era:

      • The enterprise procured infrastructure through large capital refreshes of data center hardware.
      • Infrastructure teams tried their best to avoid running out of storage before the next hardware refresh. Equipment was intentionally oversized to accommodate unexpected growth.
      • IT teams would not worry about how much infrastructure resources they consumed, provided they stayed within planned capacity limits. If capacity ran low, resource usage would be adjusted.
      • The business might not like laying out large capital expenditures, but it had full visibility into the cost and got to approve spending in advance using financial controls.
      • Monthly costs were well-understood and monthly or infrequent reporting was acceptable because day-to-day costs did not vary.
      • Mature organizations might chargeback or showback costs to application teams based on number of virtual machines or other measures, but traditional on-premises chargeback wouldn't save money overall.

      Why is FinOps so essential? (2/2)

      The shift from fixed to variable spend has changed the way organizations must manage and report on costs.

      In the cloud era:

      • Infrastructure resources must no longer be provisioned in advance through spending capital budgets.
      • Capacity management isn’t a major concern. Spare capacity is always available, and savings can result from not paying for unnecessary capacity.
      • Cloud services often offer pay-as-you-go pricing models, allowing more control and flexibility to pay only for the resources you consume.
      • When services use more resources than they need, running costs increase. Cost reductions are realized through reducing the size of allocated resources.
      • The variable consumption model can reduce operating costs but can make budgeting and forecasting difficult. IT and the business can no longer predict what they will pay for infrastructure resources.
      • Billing is no longer straightforward and monthly. Resources are individually charged in micro amounts. Costs must be regularly reviewed as unexpected or forgotten resource usage can add up significantly.

      Managing cloud spend remains a challenge for many organizations

      Given the variable nature of cloud costs and complex pricing structures, it can be easy to overspend without mature FinOps processes in place. Indeed, 82% of organizations cite managing cloud spend as one of their top challenges.

      Respondents reported that public cloud spend was over budget by an average of 18%, up from 13% the previous year.

      Source: Flexera 2023 State of the Cloud Report, n=750

      Organization's top cloud challenges.

      While FinOps adoption has rapidly increased, maturity has not

      Most organizations understand the value of FinOps but are not mature in their practice.

      NetApp’s 2023 State of CloudOps Report found that:

      96% say FinOps is important to their cloud strategy

      9% have a mature FinOps practice

      92% report that they struggle with FinOps

      Source: NetApp, 2023 State of CloudOps Report, n=310 IT decision makers in the United States responsible for public cloud infrastructure investments.

      Flexera’s 2023 State of the Cloud report found that 72% of organizations have a dedicated FinOps team.

      Flexera’s annual report also found that year over year, cloud cost responsibilities are increasingly shifting away from Finance/Accounting and Vendor Management teams and over to FinOps teams as they emerge and mature.

      Source: Flexera, 2023 State of the Cloud Report, n=750 decision-makers and users around the world

      Mergers & Acquisitions: The Sell Blueprint

      • Buy Link or Shortcode: {j2store}324|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy

      There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:

      • IT can suggest a divestiture to meet the business objectives of the organization.
      • IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and complies with the purchasing organization’s asks.
      • IT needs to reactively prepare its environment to enable the separation.

      Consider the ideal scenario for your IT organization.

      Our Advice

      Critical Insight

      Divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      • The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      • A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      • Transactions that are driven by digital motivations, requiring IT’s expertise.
      • There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.

      Impact and Result

      Prepare for a sale/divestiture transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Mergers & Acquisitions: The Sell Blueprint Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how your organization can excel its reduction strategy by engaging in M&A transactions. Review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Proactive Phase

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      • One-Pager: M&A Proactive
      • Case Study: M&A Proactive
      • Information Asset Audit Tool
      • Data Valuation Tool
      • Enterprise Integration Process Mapping Tool
      • Risk Register Tool
      • Security M&A Due Diligence Tool
      • Service Catalog Internal Service Level Agreement Template

      2. Discovery & Strategy

      Create a standardized approach for how your IT organization should address divestitures or sales.

      • One-Pager: M&A Discovery & Strategy – Sell
      • Case Study: M&A Discovery & Strategy – Sell

      3. Due Diligence & Preparation

      Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan.

      • One-Pager: M&A Due Diligence & Preparation – Sell
      • Case Study: M&A Due Diligence & Preparation – Sell
      • IT Due Diligence Charter
      • IT Culture Diagnostic
      • M&A Separation Project Management Tool (SharePoint)
      • SharePoint Template: Step-by-Step Deployment Guide
      • M&A Separation Project Management Tool (Excel)

      4. Execution & Value Realization

      Deliver on the separation project plan successfully and communicate IT’s transaction value to the business.

      • One-Pager: M&A Execution & Value Realization – Sell
      • Case Study: M&A Execution & Value Realization – Sell

      Infographic

      Workshop: Mergers & Acquisitions: The Sell Blueprint

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Pre-Transaction Discovery & Strategy

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for divesting or selling.

      Formalize the program plan.

      Create the valuation framework.

      Strategize the transaction and finalize the M&A strategy and approach.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Set up crucial elements to facilitate the success of the transaction.

      Have a repeatable transaction strategy that can be reused for multiple organizations.

      Activities

      1.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics.

      1.2 Identify key stakeholders and outline their relationship to the M&A process.

      1.3 Understand the rationale for the company's decision to pursue a divestiture or sale.

      1.4 Assess the IT/digital strategy.

      1.5 Identify pain points and opportunities tied to the divestiture/sale.

      1.6 Create the IT vision statement and mission statement and identify IT guiding principles and the transition team.

      1.7 Document the M&A governance.

      1.8 Establish program metrics.

      1.9 Create the valuation framework.

      1.10 Establish the separation strategy.

      1.11 Conduct a RACI.

      1.12 Create the communication plan.

      1.13 Prepare to assess target organizations.

      Outputs

      Business perspectives of IT

      Stakeholder network map for M&A transactions

      Business context implications for IT

      IT’s divestiture/sale strategic direction

      Governance structure

      M&A program metrics

      IT valuation framework

      Separation strategy

      RACI

      Communication plan

      Prepared to assess target organization(s)

      2 Mid-Transaction Due Diligence & Preparation

      The Purpose

      Establish the foundation.

      Discover the motivation for separation.

      Identify expectations and create the carve-out roadmap.

      Prepare and manage employees.

      Plan the separation roadmap.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Methodology identified to enable compliance during due diligence.

      Employees are set up for a smooth and successful transition.

      Separation activities are planned and assigned.

      Activities

      2.1 Gather and evaluate the stakeholders involved, M&A strategy, future-state operating model, and governance.

      2.2 Review the business rationale for the divestiture/sale.

      2.3 Establish the separation strategy.

      2.4 Create the due diligence charter.

      2.5 Create a list of IT artifacts to be reviewed in the data room.

      2.6 Create a carve-out roadmap.

      2.7 Create a service/technical transaction agreement.

      2.8 Measure staff engagement.

      2.9 Assess the current culture and identify the goal culture.

      2.10 Create employee transition and functional workplans.

      2.11 Establish the separation roadmap.

      2.12 Establish and align project metrics with identified tasks.

      2.13 Estimate integration costs.

      Outputs

      Stakeholder map

      IT strategy assessed

      IT operating model and IT governance structure defined

      Business context implications for IT

      Separation strategy

      Due diligence charter

      Data room artifacts

      Carve-out roadmap

      Service/technical transaction agreement

      Engagement assessment

      Culture assessment

      Employee transition and functional workplans

      Integration roadmap and associated resourcing

      3 Post-Transaction Execution & Value Realization

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for separation.

      Plan the separation roadmap.

      Prepare employees for the transition.

      Engage in separation.

      Assess the transaction outcomes.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Separation activities are planned and assigned.

      Employees are set up for a smooth and successful transition.

      Separation strategy and roadmap are executed to benefit the organization.

      Review what went well and identify improvements to be made in future transactions.

      Activities

      3.1 Identify key stakeholders and outline their relationship to the M&A process.

      3.2 Gather and evaluate the M&A strategy, future-state operating model, and governance.

      3.3 Review the business rationale for the divestiture/sale.

      3.4 Establish the separation strategy.

      3.5 Prioritize separation tasks.

      3.6 Establish the separation roadmap.

      3.7 Establish and align project metrics with identified tasks.

      3.8 Estimate separation costs.

      3.9 Measure staff engagement.

      3.10 Assess the current culture and identify the goal culture.

      3.11 Create employee transition and functional workplans.

      3.12 Complete the separation by regularly updating the project plan.

      3.13 Assess the service/technical transaction agreement.

      3.14 Confirm separation costs.

      3.15 Review IT’s transaction value.

      3.16 Conduct a transaction and separation SWOT.

      3.17 Review the playbook and prepare for future transactions.

      Outputs

      M&A transaction team

      Stakeholder map

      IT strategy assessed

      IT operating model and IT governance structure defined

      Business context implications for IT

      Separation strategy

      Separation roadmap and associated resourcing

      Engagement assessment

      Culture assessment

      Employee transition and functional workplans

      Updated separation project plan

      Evaluated service/technical transaction agreement

      SWOT of transaction

      M&A Sell Playbook refined for future transactions

      Further reading

      Mergers & Acquisitions: The Sell Blueprint

      For IT leaders who want to have a role in the transaction process when their business is engaging in an M&A sale or divestiture.

      EXECUTIVE BRIEF

      Analyst Perspective

      Don’t wait to be invited to the M&A table, make it.

      Photo of Brittany Lutes, Research Analyst, CIO Practice, Info-Tech Research Group.
      Brittany Lutes
      Research Analyst,
      CIO Practice
      Info-Tech Research Group
      Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice, Info-Tech Research Group.
      Ibrahim Abdel-Kader
      Research Analyst,
      CIO Practice
      Info-Tech Research Group

      IT has always been an afterthought in the M&A process, often brought in last minute once the deal is nearly, if not completely, solidified. This is a mistake. When IT is brought into the process late, the business misses opportunities to generate value related to the transaction and has less awareness of critical risks or inaccuracies.

      To prevent this mistake, IT leadership needs to develop strong business relationships and gain respect for their innovative suggestions. In fact, when it comes to modern M&A activity, IT should be the ones suggesting potential transactions to meet business needs, specifically when it comes to modernizing the business or adopting digital capabilities.

      IT needs to stop waiting to be invited to the acquisition or divestiture table. IT needs to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.

      Executive Summary

      Your Challenge

      There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:

      • IT can suggest a divestiture to meet the business objectives of the organization.
      • IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and complies with the purchasing organization’s asks.
      • IT needs to reactively prepare its environment to enable the separation.

      Consider the ideal scenario for your IT organization.

      Common Obstacles

      Some of the obstacles IT faces include:

      • IT is often told about the transaction once the deal has already been solidified and is now forced to meet unrealistic business demands.
      • The business does not trust IT and therefore does not approach IT to define value or reduce risks to the transaction process.
      • The people and culture element is forgotten or not given adequate priority.

      These obstacles often arise when IT waits to be invited into the transaction process and misses critical opportunities.

      Info-Tech's Approach

      Prepare for a sale/divestiture transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Info-Tech Insight

      As the number of merger, acquisition, and divestiture transactions continues to increase, so too does IT’s opportunity to leverage the growing digital nature of these transactions and get involved at the onset.

      The changing M&A landscape

      Businesses will embrace more digital M&A transactions in the post-pandemic world

      • When the pandemic occurred, businesses reacted by either pausing (61%) or completely cancelling (46%) deals that were in the mid-transaction state (Deloitte, 2020). The uncertainty made many organizations consider whether the risks would be worth the potential benefits.
      • However, many organizations quickly realized the pandemic is not a hindrance to M&A transactions but an opportunity. Over 16,000 American companies were involved in M&A transactions in the first six months of 2021 (The Economist). For reference, this had been averaging around 10,000 per six months from 2016 to 2020.
      • In addition to this transaction growth, organizations have increasingly been embracing digital. These trends increase the likelihood that, as an IT leader, you will engage in an M&A transaction. However, it is up to you when you get involved in the transactions.

      The total value of transactions in the year after the pandemic started was $1.3 billion – a 93% increase in value compared to before the pandemic. (Nasdaq)

      71% of technology companies anticipate that divestitures will take place as a result of the COVID-19 pandemic. (EY, 2020)

      Your challenge

      IT is often not involved in the M&A transaction process. When it is, it’s often too late.

      • The most important driver of an acquisition is the ability to access new technology (DLA Piper), and yet 50% of the time, IT isn’t involved in the M&A transaction at all (IMAA Institute, 2017).
      • Additionally, IT’s lack of involvement in the process negatively impacts the business:
        • Most organizations (60%) do not have a standardized approach to integration (Steeves and Associates), let alone separation.
        • Two-thirds of the time, the divesting organization and acquiring organization will either fail together or succeed together (McKinsey, 2015).
        • Less than half (47%) of organizations actually experience the positive results sought by the M&A transaction (Steeves and Associates).
      • Organizations pursuing M&A and not involving IT are setting themselves up for failure.

      Only half of M&A deals involve IT (Source: IMAA Institute, 2017)

      Common Obstacles

      These barriers make this challenge difficult to address for many organizations:

      • IT is rarely afforded the opportunity to participate in the transaction deal. When IT is invited, this often happens later in the process where separation will be critical to business continuity.
      • IT has not had the opportunity to demonstrate that it is a valuable business partner in other business initiatives.
      • One of the most critical elements that IT often doesn’t take the time or doesn’t have the time to focus on is the people and leadership component.
      • IT waits to be invited to the process rather then actively involving themselves and suggesting how value can be added to the process.

      In hindsight, it’s clear to see: Involving IT is just good business.

      47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion. (Source: IMAA Institute, 2017)

      “Solutions exist that can save well above 50 percent on divestiture costs, while ensuring on-time delivery.” (Source: SNP)

      Info-Tech's approach

      Acquisitions & Divestitures Framework

      Acquisitions and divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      1. The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      2. Transactions that are driven by digital motivations, requiring IT’s expertise.
      3. A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      4. There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.
      A diagram highlighting the 'IT Executives' Role in Acquisitions and Divestitures' when they are integrated at different points in the 'Core Business Timeline'. There are four main entry points 'Proactive', 'Discovery and Strategy', 'Due Diligence and Preparation', and 'Execution and Value Realized'. It is highlighted that IT can and should start at 'Proactive', but most organizations start at 'Execution and Value Realized'. 'Proactive': suggest opportunities to evolve the organization; prove IT's value and engage in growth opportunities early. Innovators start here. Steps of the business timeline in 'Proactive' are 'Organization strategies are defined' and 'M and A is considered to enable strategy'. After a buy or sell transaction is initiated is 'Discovery and Strategy': pre-transaction state. If it is a Buy transaction, 'Establish IT's involvement and approach'. If it is a Sell transaction, 'Prepare to engage in negotiations'. Business Partners start here. Steps of the business timeline in 'Discovery and Strategy' are 'Searching criteria is set', 'Potential candidates are considered', and 'LOI is sent/received'. 'Due Diligence and Preparation': mid-transaction state. If it is a Buy transaction, 'Identify potential transaction benefits and risks'. If it is a Sell transaction, 'Comply, communicate, and collaborate in transaction'. Trusted Operators start here. Steps of the business timeline in 'Due Diligence and Preparation' are 'Due diligence engagement occurs', 'Final agreement is reached', and 'Preparation for transaction execution occurs'. 'Execution and Value Realization': post-transaction state. If it is a Buy transaction, 'Integrate the IT environments and achieve business value'. If it is a Sell transaction, 'Separate the IT environment and deliver on transaction terms'. Firefighters start here. Steps of the business timeline in 'Execution and Value Realization' are 'Staff and operations are addressed appropriately', 'Day 1 of implementation and integration activities occurs', '1st 100 days of new entity state occur' and 'Ongoing risk mitigating and value creating activities occur'.

      The business’ view of IT will impact how soon IT can get involved

      There are four key entry points for IT

      A colorful visualization of the four key entry points for IT and a fifth not-so-key entry point. Starting from the top: 'Innovator', Information and Technology as a Competitive Advantage, 90% Satisfaction; 'Business Partner', Effective Delivery of Strategic Business Projects, 80% Satisfaction; 'Trusted Operator', Enablement of Business Through Application and Work Orders, 70% Satisfaction; 'Firefighter', Reliable Infrastructure and IT Service Desk, 60% Satisfaction; and then 'Unstable', Inability to Consistently Deliver Basic Services, <60% Satisfaction.
      1. Innovator: IT suggests a sale or divestiture to meet the business objectives of the organization.
      2. Business Partner: IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspective.
      3. Trusted Operator: IT participates in due diligence activities and complies with the purchasing organization’s asks.
      4. Firefighter: IT needs to reactively prepare its environment in order to enable the separation.

      Merger, acquisition, and divestiture defined

      Merger

      A merger looks at the equal combination of two entities or organizations. Mergers are rare in the M&A space, as the organizations will combine assets and services in a completely equal 50/50 split. Two organizations may also choose to divest business entities and merge as a new company.

      Acquisition

      The most common transaction in the M&A space, where an organization will acquire or purchase another organization or entities of another organization. This type of transaction has a clear owner who will be able to make legal decisions regarding the acquired organization.

      Divestiture

      An organization may decide to sell partial elements of a business to an acquiring organization. They will separate this business entity from the rest of the organization and continue to operate the other components of the business.

      Info-Tech Insight

      A true merger does not exist, as there is always someone initiating the discussion. As a result, most M&A activity falls into acquisition or divestiture categories.

      Selling vs. buying

      The M&A process approach differs depending on whether you are the selling or buying organization

      This blueprint is only focused on the sell side:

      • Examples of sell-related scenarios include:
        • Your organization is selling to another organization with the intent of keeping its regular staff, operations, and location. This could mean minimal separation is required.
        • Your organization is selling to another organization with the intent of separating to be a part of the purchasing organization.
        • Your organization is engaging in a divestiture with the intent of:
          • Separating components to be part of the purchasing organization permanently.
          • Separating components to be part of a spinoff and establish a unit as a standalone new company.
      • As the selling organization, you could proactively seek out suitors to purchase all or components of your organization, or you could be approached by an organization.

      The buy side is focused on:

      • More than two organizations could be involved in a transaction.
      • Examples of buy-related scenarios include:
        • Your organization is buying another organization with the intent of having the purchased organization keep its regular staff, operations, and location. This could mean minimal integration is required.
        • Your organization is buying another organization in its entirety with the intent of integrating it into your original company.
        • Your organization is buying components of another organization with the intent of integrating them into your original company.
      • As the purchasing organization, you will probably be initiating the purchase and thus will be valuating the selling organization during due diligence and leading the execution plan.

      For more information on acquisitions or purchases, check out Info-Tech’s Mergers & Acquisitions: The Buy Blueprint.

      Core business timeline

      For IT to be valuable in M&As, you need to align your deliverables and your support to the key activities the business and investors are working on.

      Info-Tech’s methodology for Selling Organizations in Mergers, Acquisitions, or Divestitures

      1. Proactive

      2. Discovery & Strategy

      3. Due Diligence & Preparation

      4. Execution & Value Realization

      Phase Steps

      1. Identify Stakeholders and Their Perspective of IT
      2. Assess IT’s Current Value and Future State
      3. Drive Innovation and Suggest Growth Opportunities
      1. Establish the M&A Program Plan
      2. Prepare IT to Engage in the Separation or Sale
      1. Engage in Due Diligence and Prepare Staff
      2. Prepare to Separate
      1. Execute the Transaction
      2. Reflection and Value Realization

      Phase Outcomes

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      Create a standardized approach for how your IT organization should address divestitures or sales.

      Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan.

      Deliver on the separation project plan successfully and communicate IT’s transaction value to the business.

      Metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Valuation & Due Diligence

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT separation
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      IT's role in the selling transaction

      And IT leaders have a greater likelihood than ever of needing to support a merger, acquisition, or divestiture.

      1. Reduced Risk

        IT can identify risks that may go unnoticed when IT is not involved.
      2. Increased Accuracy

        The business can make accurate predictions around the costs, timelines, and needs of IT.
      3. Faster Integration

        Faster integration means faster value realization for the business.
      4. Informed Decision Making

        IT leaders hold critical information that can support the business in moving the transaction forward.
      5. Innovation

        IT can suggest new opportunities to generate revenue, optimize processes, or reduce inefficiencies.

      The IT executive’s critical role is demonstrated by:

      • Reduced Risk

        47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion (IMAA Institute, 2017).
      • Increased Accuracy

        Sellers often only provide 15 to 30 days for the acquiring organization to decide (Forbes, 2018), increasing the necessity of accurate pricing.
      • Faster Integration

        36% of CIOs have visibility into only business unit data, making the divestment a challenge (EY, 2021).
      • Informed Decision Making

        Only 38% of corporate and 22% of private equity firms include IT as a significant aspect in their transaction approach (IMAA Institute, 2017).
      • Innovation

        Successful CIOs involved in M&As can spend 70% of their time on aspects outside of IT and 30% of their time on technology and delivery (CIO).

      Playbook benefits

      IT Benefits

      • IT will be seen as an innovative partner to the business, and its suggestions and involvement in the organization will lead to benefits, not hindrances.
      • Develop a streamlined method to prepare the IT environment for potential carve-out and separations, ensuring risk management concerns are brought to the business’ attention immediately.
      • Create a comprehensive list of items that IT needs to do during the separation that can be prioritized and actioned.

      Business Benefits

      • The business will get accurate and relevant information about its IT environment in order to sell or divest the company to the highest bidder for a true price.
      • Fewer business interruptions will happen, because IT can accurately plan for and execute the high-priority separation tasks.
      • The business can obtain a high-value offer for the components of IT being sold and can measure the ongoing value the sale will bring.

      Insight summary

      Overarching Insight

      IT controls if and when it gets invited to support the business through a purchasing growth transaction. Take control of the process, demonstrate the value of IT, and ensure that separation of IT environments does not lead to unnecessary and costly decisions.

      Proactive Insight

      CIOs on the forefront of digital transformation need to actively look for and suggest opportunities to acquire or partner on new digital capabilities to respond to rapidly changing business needs.

      Discovery & Strategy Insight

      IT organizations that have an effective M&A program plan are more prepared for the transaction, enabling a successful outcome. A structured strategy is particularly necessary for organizations expected to deliver M&As rapidly and frequently.

      Due Diligence & Preparation Insight

      IT often faces unnecessary separation challenges because of a lack of preparation. Secure the IT environment and establish how IT will retain employees early in the transaction process.

      Execution & Value Realization Insight

      IT needs to demonstrate value and cost savings within 100 days of the transaction. The most successful transactions are when IT continuously realizes synergies a year after the transaction and beyond.

      Blueprint deliverables

      Key Deliverable: M&A Sell Playbook

      The M&A Sell Playbook should be a reusable document that enables your IT organization to successfully deliver on any divestiture transaction.

      Screenshots of the 'M and A Sell Playbook' deliverable.

      M&A Sell One-Pager

      See a one-page overview of each phase of the transaction.

      Screenshots of the 'M and A Sell One-Pagers' deliverable.

      M&A Sell Case Studies

      Read a one-page case study for each phase of the transaction.

      Screenshots of the 'M and A Sell Case Studies' deliverable.

      M&A Separation Project Management Tool (SharePoint)

      Manage the separation process of the divestiture/sale using this SharePoint template.

      Screenshots of the 'M and A Separation Project Management Tool (SharePoint)' deliverable.

      M&A Separation Project Management Tool (Excel)

      Manage the separation process of the divestiture/sale using this Excel tool if you can’t or don’t want to use SharePoint.

      Screenshots of the 'M and A Separation Project Management Tool (Excel)' deliverable.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 10 calls over the course of 2 to 4 months.

        Proactive Phase

      • Call #1: Scope requirements, objectives, and your specific challenges.
      • Discovery & Strategy Phase

      • Call #2: Determine stakeholders and business perspectives on IT.
      • Call #3: Identify how M&A could support business strategy and how to communicate.
      • Due Diligence & Preparation Phase

      • Call #4: Establish a transaction team and divestiture/sale strategic direction.
      • Call #5: Create program metrics and identify a standard separation strategy.
      • Call #6: Prepare to carve out the IT environment.
      • Call #7: Identify the separation program plan.
      • Execution & Value Realization Phase

      • Call #8: Establish employee transitions to retain key staff.
      • Call #9: Assess IT’s ability to deliver on the divestiture/sale transaction.

      The Sell Blueprint

      Phase 1

      Proactive

      Phase 1

      Phase 2 Phase 3 Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Conduct the CEO-CIO Alignment diagnostic
      • Conduct the CIO Business Vision diagnostic
      • Visualize relationships among stakeholders to identify key influencers
      • Group stakeholders into categories
      • Prioritize your stakeholders
      • Plan to communicate
      • Valuate IT
      • Assess the IT/digital strategy
      • Determine pain points and opportunities
      • Align goals to opportunities
      • Recommend reduction opportunities

      This phase involves the following participants:

      • IT and business leadership

      What is the Proactive phase?

      Embracing the digital drivers

      As the number of merger, acquisition, or divestiture transactions driven by digital means continues to increase, IT has an opportunity to not just be involved in a transaction but actively seek out potential deals.

      In the Proactive phase, the business is not currently considering a transaction. However, the business could consider one to reach its strategic goals. IT organizations that have developed respected relationships with the business leaders can suggest these potential transactions.

      Understand the business’ perspective of IT, determine who the critical M&A stakeholders are, valuate the IT environment, and examine how it supports the business goals in order to suggest an M&A transaction.

      In doing so, IT isn’t waiting to be invited to the transaction table – it’s creating it.

      Goal: To support the organization in reaching its strategic goals by suggesting M&A activities that will enable the organization to reach its objectives faster and with greater-value outcomes.

      Proactive Prerequisite Checklist

      Before coming into the Proactive phase, you should have addressed the following:

      • Understand what mergers, acquisitions, and divestitures are.
      • Understand what mergers, acquisitions, and divestitures mean for the business.
      • Understand what mergers, acquisitions, and divestitures mean for IT.

      Review the Executive Brief for more information on mergers, acquisitions, and divestitures for selling organizations.

      Proactive

      Step 1.1

      Identify M&A Stakeholders and Their Perspective of IT

      Activities

      • 1.1.1 Conduct the CEO-CIO Alignment diagnostic
      • 1.1.2 Conduct the CIO Business Vision diagnostic
      • 1.1.3 Visualize relationships among stakeholders to identify key influencers
      • 1.1.4 Group stakeholders into categories
      • 1.1.5 Prioritize your stakeholders
      • 1.16 Plan to communicate

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Understand how the business perceives IT and establish strong relationships with critical M&A stakeholders.

      Business executives' perspectives of IT

      Leverage diagnostics and gain alignment on IT’s role in the organization

      • To suggest or get involved with a merger, acquisition, or divestiture, the IT executive leader needs to be well respected by other members of the executive leadership team and the business.
      • Specifically, the Proactive phase relies on the IT organization being viewed as an Innovator within the business.
      • Identify how the CEO/business executive currently views IT and where they would like IT to move within the Maturity Ladder.
      • Additionally, understand how other critical department leaders view IT and how they view the partnership with IT.
      A colorful visualization titled 'Maturity Ladder' detailing levels of IT function that a business may choose from based on the business executives' perspectives of IT. Starting from the bottom: 'Struggle', Does not embarrass, Does not crash; 'Support', Keeps business happy, Keeps costs low; 'Optimize', Increases efficiency, Decreases costs; 'Expand', Extends into new business, Generates revenue; 'Transform', Creates new industry.

      Misalignment in target state requires further communication between the CIO and CEO to ensure IT is striving toward an agreed-upon direction.

      Info-Tech’s CIO Business Vision (CIO BV) diagnostic measures a variety of high-value metrics to provide a well-rounded understanding of stakeholder satisfaction with IT.

      Sample of Info-Tech's CIO Business Vision diagnostic measuring percentages of high-value metrics like 'IT Satisfaction' and 'IT Value' regarding business leader satisfaction. A note for these two reads 'Evaluate business leader satisfaction with IT this year and last year'. A section titled 'Relationship' has metrics such as 'Understands Needs' and 'Trains Effectively'. A note for this section reads 'Examine relationship indicators between IT and the business'. A section titled 'Security Friction' has metrics such as 'Regulatory Compliance-Driven' and 'Office/Desktop Security'.

      Business Satisfaction and Importance for Core Services

      The core services of IT are important when determining what IT should focus on. The most important services with the lowest satisfaction offer the largest area of improvement for IT to drive business value.

      Sample of Info-Tech's CIO Business Vision diagnostic specifically comparing the business satisfaction of 12 core services with their importance. Services listed include 'Service Desk', 'IT Security', 'Requirements Gathering', 'Business Apps', 'Data Quality', and more. There is a short description of the services, a percentage for the business satisfaction with the service, a percentage comparing it to last year, and a numbered ranking of importance for each service. A note reads 'Assess satisfaction and importance across 12 core IT capabilities'.

      1.1.1 Conduct the CEO-CIO Alignment diagnostic

      2 weeks

      Input: IT organization expertise and the CEO-CIO Alignment diagnostic

      Output: An understanding of an executive business stakeholder’s perception of IT

      Materials: M&A Sell Playbook, CEO-CIO Alignment diagnostic

      Participants: IT executive/CIO, Business executive/CEO

      1. The CEO-CIO Alignment diagnostic can be a powerful input. Speak with your Info-Tech account representative to conduct the diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret and draw conclusions from the results.
      3. Examine the results of the survey and note where there might be specific capabilities that could be improved.
      4. Determine whether there are any areas of significant disagreement between the you and the CEO. Mark down those areas for further conversations. Additionally, take note of areas that could be leveraged to support transactions or support your rationale in recommending transactions.

      Download the sample report.

      Record the results in the M&A Sell Playbook.

      1.1.2 Conduct the CIO Business Vision diagnostic

      2 weeks

      Input: IT organization expertise, CIO BV diagnostic

      Output: An understanding of business stakeholder perception of certain IT capabilities and services

      Materials: M&A Buy Playbook, CIO Business Vision diagnostic

      Participants: IT executive/CIO, Senior business leaders

      1. The CIO Business Vision (CIO BV) diagnostic can be a powerful tool for identifying IT capability focus areas. Speak with your account representative to conduct the CIO BV diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret the results and draw conclusions from the diagnostic.
      3. Examine the results of the survey and take note of any IT services that have low scores.
      4. Read through the diagnostic comments and note any common themes. Especially note which stakeholders identified they have a favorable relationship with IT and which stakeholders identified they have an unfavorable relationship. For those who have an unfavorable relationship, identify if they will have a critical role in a growth transaction.

      Download the sample report.

      Record the results in the M&A Sell Playbook.

      Create a stakeholder network map for M&A transactions

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Example:

      Diagram of stakeholders and their relationships with other stakeholders, such as 'Board Members', 'CFO/Finance', 'Compliance', etc. with 'CIO/IT Leader' highlighted in the middle. There are unidirectional black arrows and bi-directional green arrows indicating each connection.

        Legend
      • Black arrows indicate the direction of professional influence
      • Dashed green arrows indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape that the M&A transaction will occur within. This will identify who holds various levels of accountability and decision-making authority when a transaction does take place.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.

      1.1.3 Visualize relationships among stakeholders to identify key influencers

      1-3 hours

      Input: List of M&A stakeholders

      Output: Relationships among M&A stakeholders and influencers

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership

      1. The purpose of this activity is to list all the stakeholders within your organization that will have a direct or indirect impact on the M&A transaction.
      2. Determine the critical stakeholders, and then determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        • Use black arrows to indicate the direction of professional influence.
        • Use dashed green arrows to indicate bidirectional, informal influence relationships.

      Record the results in the M&A Sell Playbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps IT leaders categorize their stakeholders by their level of influence and ownership in the merger, acquisition, or divestiture process.

      A prioritization map of stakeholder categories split into four quadrants. The vertical axis is 'Influence', from low on the bottom to high on top. The horizontal axis is 'Ownership/Interest', from low on the left to high on the right. 'Spectators' are low influence, low ownership/interest. 'Mediators' are high influence, low ownership/interest. 'Noisemakers' are low influence, high ownership/interest. 'Players' are high influence, high ownership/interest.

      There are four areas in the map, and the stakeholders within each area should be treated differently.

      Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

      Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

      Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

      Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      1.1.4 Group stakeholders into categories

      30 minutes

      Input: Stakeholder map, Stakeholder list

      Output: Categorization of stakeholders and influencers

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership, Stakeholders

      1. Identify your stakeholders’ interest in and influence on the M&A process as high, medium, or low by rating the attributes below.
      2. Map your results to the model to the right to determine each stakeholder’s category.

      Same prioritization map of stakeholder categories as before. This one has specific stakeholders mapped onto it. 'CFO' is mapped as low interest and middling influence, between 'Mediator' and 'Spectator'. 'CIO' is mapped as higher than average interest and high influence, a 'Player'. 'Board Member' is mapped as high interest and high influence, a 'Player'.

      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      Record the results in the M&A Sell Playbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Level of Support

      Supporter

      Evangelist

      Neutral

      Blocker

      Stakeholder Category Player Critical High High Critical
      Mediator Medium Low Low Medium
      Noisemaker High Medium Medium High
      Spectator Low Irrelevant Irrelevant Low

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How significant is that stakeholder to the M&A or divestiture process?

      These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.

      1.1.5 Prioritize your stakeholders

      30 minutes

      Input: Stakeholder matrix

      Output: Stakeholder and influencer prioritization

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      1. Identify the level of support of each stakeholder by answering the following question: How significant is that stakeholder to the M&A transaction process?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.

      Stakeholder

      Category

      Level of Support

      Prioritization

      CMO Spectator Neutral Irrelevant
      CIO Player Supporter Critical

      Record the results in the M&A Sell Playbook.

      Define strategies for engaging stakeholders by type

      A revisit to the map of stakeholder categories, but with strategies listed for each one, and arrows on the side instead of an axis. The vertical arrow is 'Authority', which increases upward, and the horizontal axis is Ownership/Interest which increases as it moves to the right. The strategy for 'Players' is 'Engage', for 'Mediators' is 'Satisfy', for 'Noisemakers' is 'Inform', and for 'Spectators' is 'Monitor'.

      Type

      Quadrant

      Actions

      Players High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.
      Mediators High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.
      Noisemakers Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
      Spectators Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying stakeholder groups, the IT executive leader can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of Mediators and Players are met.

      1.1.6 Plan to communicate

      30 minutes

      Input: Stakeholder priority, Stakeholder categorization, Stakeholder influence

      Output: Stakeholder communication plan

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      The purpose of this activity is to make a communication plan for each of the stakeholders identified in the previous activities, especially those who will have a critical role in the M&A transaction process.

      1. In the M&A Sell Playbook, input the type of influence each stakeholder has on IT, how they would be categorized in the M&A process, and their level of priority. Use this information to create a communication plan.
      2. Determine the methods and frequency of communication to keep the necessary stakeholder satisfied and maintain or enhance IT’s profile within the organization.

      Record the results in the M&A Sell Playbook.

      Proactive

      Step 1.2

      Assess IT’s Current Value and Method to Achieve a Future State

      Activities

      • 1.2.1 Valuate IT
      • 1.2.2 Assess the IT/digital strategy

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical stakeholders to M&A

      Outcomes of Step

      Identify critical opportunities to optimize IT and meet strategic business goals through a merger, acquisition, or divestiture.

      How to valuate your IT environment

      And why it matters so much

      • Valuating your current organization’s IT environment is a critical step that all IT organizations should take, whether involved in an M&A or not, to fully understand what it might be worth.
      • The business investments in IT can be directly translated into a value amount. For every $1 invested in IT, the business might be gaining $100 in value back or possibly even loosing $100.
      • Determining, documenting, and communicating this information ensures that the business takes IT’s suggestions seriously and recognizes why investing in IT is so critical.
      • There are three ways a business or asset can be valuated:
        • Cost Approach: Look at the costs associated with building, purchasing, replacing, and maintaining a given aspect of the business.
        • Market Approach: Look at the relative value of a particular aspect of the business. Relative value can fluctuate and depends on what the markets and consequently society believe that particular element is worth.
        • Discounted Cash Flow Approach: Focus on what the potential value of the business could be or the intrinsic value anticipated due to future profitability.
      • (Source: “Valuation Methods,” Corporate Finance Institute)

      Four ways to create value through digital

      1. Reduced costs
      2. Improved customer experience
      3. New revenue sources
      4. Better decision making
      5. (Source: McKinsey & Company)

      1.2.1 Valuate IT

      1 day

      Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk

      Output: Valuation of IT

      Materials: Relevant templates/tools listed on the following slides, Capital budget, Operating budget, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership

      The purpose of this activity is to demonstrate that IT is not simply an operational functional area that diminishes business resources. Rather, IT contributes significant value to the business.

      1. Review each of the following slides to valuate IT’s data, applications, infrastructure and operations, and security and risk. These valuations consider several tangible and intangible factors and result in a final dollar amount.
      2. Input the financial amounts identified for each critical area into a summary slide. Use this information to determine where IT is delivering value to the organization.

      Info-Tech Insight

      Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.

      Record the results in the M&A Sell Playbook.

      Data valuation

      Data valuation identifies how you monetize the information that your organization owns.

      Create a data value chain for your organization

      When valuating the information and data that exists in an organization, there are many things to consider.

      Info-Tech has two tools that can support this process:

      1. Information Asset Audit Tool: Use this tool first to take inventory of the different information assets that exist in your organization.
      2. Data Valuation Tool: Once information assets have been accounted for, valuate the data that exists within those information assets.

      Data Collection

      Insight Creation

      Value Creation

      Data Valuation

      01 Data Source
      02 Data Collection Method
      03 Data
      04 Data Analysis
      05 Insight
      06 Insight Delivery
      07 Consumer
      08 Value in Data
      09 Value Dimension
      10 Value Metrics Group
      11 Value Metrics
      Screenshots of Tab 2 of Info-Tech's Data Valuation Tool.

      Instructions

      1. Using the Data Valuation Tool, start gathering information based on the eight steps above to understand your organization’s journey from data to value.
      2. Identify the data value spectrum. (For example: customer sales service, citizen licensing service, etc.)
      3. Fill out the columns for data sources, data collection, and data first.
      4. Capture data analysis and related information.
      5. Then capture the value in data.
      6. Add value dimensions such as usage, quality, and economic dimensions.
        • Remember that economic value is not the only dimension, and usage/quality has a significant impact on economic value.
      7. Collect evidence to justify your data valuation calculator (market research, internal metrics, etc.).
      8. Finally, calculate the value that has a direct correlation with underlying value metrics.

      Application valuation

      Calculate the value of your IT applications

      When valuating the applications and their users in an organization, consider using a business process map. This shows how business is transacted in the company by identifying which IT applications support these processes and which business groups have access to them. Info-Tech has a business process mapping tool that can support this process:

      • Enterprise Integration Process Mapping Tool: Complete this tool first to map the different business processes to the supporting applications in your organization.

      Instructions

      1. Start by calculating user costs. This is the multiplication of: (# of users) × (% of time spent using IT) × (fully burdened salary).
      2. Identify the revenue per employee and divide that by the average cost per employee to calculate the derived productivity ratio (DPR).
      3. Once you have calculated the user costs and DPR, multiply those total values together to get the application value.
      4. User Costs

        Total User Costs

        Derived Productivity Ratio (DPR)

        Total DPR

        Application Value

        # of users % time spent using IT Fully burdened salary Multiply values from the 3 user costs columns Revenue per employee Average cost per employee (Revenue P.E) ÷ (Average cost P.E) (User costs) X (DPR)

      5. Once the total application value is established, calculate the combined IT and business costs of delivering that value. IT and business costs include inflexibility (application maintenance), unavailability (downtime costs, including disaster exposure), IT costs (common costs statistically allocated to applications), and fully loaded cost of active (full-time equivalent [FTE]) users.
      6. Calculate the net value of applications by subtracting the total IT and business costs from the total application value calculated in step 3.
      7. IT and Business Costs

        Total IT and Business Costs

        Net Value of Applications

        Application maintenance Downtime costs (include disaster exposure) Common costs allocated to applications Fully loaded costs of active (FTE) users Sum of values from the four IT and business costs columns (Application value) – (IT and business costs)

      (Source: CSO)

      Infrastructure valuation

      Assess the foundational elements of the business’ information technology

      The purpose of this exercise is to provide a high-level infrastructure valuation that will contribute to valuating your IT environment.

      Calculating the value of the infrastructure will require different methods depending on the environment. For example, a fully cloud-hosted organization will have different costs than a fully on-premises IT environment.

      Instructions:

      1. Start by listing all of the infrastructure-related items that are relevant to your organization.
      2. Once you have finalized your items column, identify the total costs/value of each item.
        • For example, total software costs would include servers and storage.
      3. Calculate the total cost/value of your IT infrastructure by adding all of values in the right column.

      Item

      Costs/Value

      Hardware Assets Total Value +$3.2 million
      Hardware Leased/Service Agreement -$
      Software Purchased +$
      Software Leased/Service Agreement -$
      Operational Tools
      Network
      Disaster Recovery
      Antivirus
      Data Centers
      Service Desk
      Other Licenses
      Total:

      For additional support, download the M&A Runbook for Infrastructure and Operations.

      Risk and security

      Assess risk responses and calculate residual risk

      The purpose of this exercise is to provide a high-level risk assessment that will contribute to valuating your IT environment. For a more in-depth risk assessment, please refer to the Info-Tech tools below:

      1. Risk Register Tool
      2. Security M&A Due Diligence Tool

      Instructions

      1. Review the probability and impact scales below and ensure you have the appropriate criteria that align to your organization before you conduct a risk assessment.
      2. Identify the probability of occurrence and estimated financial impact for each risk category detail and fill out the table on the right. Customize the table as needed so it aligns to your organization.
      3. Probability of Risk Occurrence

        Occurrence Criteria
        (Classification; Probability of Risk Event Within One Year)

        Negligible Very Unlikely; ‹20%
        Very Low Unlikely; 20 to 40%
        Low Possible; 40 to 60%
        Moderately Low Likely; 60 to 80%
        Moderate Almost Certain; ›80%

      Note: If needed, you can customize this scale with the severity designations that you prefer. However, make sure you are always consistent with it when conducting a risk assessment.

      Financial & Reputational Impact

      Budgetary and Reputational Implications
      (Financial Impact; Reputational Impact)

      Negligible (‹$10,000; Internal IT stakeholders aware of risk event occurrence)
      Very Low ($10,000 to $25,000; Business customers aware of risk event occurrence)
      Low ($25,000 to $50,000; Board of directors aware of risk event occurrence)
      Moderately Low ($50,000 to $100,000; External customers aware of risk event occurrence)
      Moderate (›$100,000; Media coverage or regulatory body aware of risk event occurrence)

      Risk Category Details

      Probability of Occurrence

      Estimated Financial Impact

      Estimated Severity (Probability X Impact)

      Capacity Planning
      Enterprise Architecture
      Externally Originated Attack
      Hardware Configuration Errors
      Hardware Performance
      Internally Originated Attack
      IT Staffing
      Project Scoping
      Software Implementation Errors
      Technology Evaluation and Selection
      Physical Threats
      Resource Threats
      Personnel Threats
      Technical Threats
      Total:

      1.2.2 Assess the IT/digital strategy

      4 hours

      Input: IT strategy, Digital strategy, Business strategy

      Output: An understanding of an executive business stakeholder’s perception of IT, Alignment of IT/digital strategy and overall organization strategy

      Materials: Computer, Whiteboard and markers, M&A Sell Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to review the business and IT strategies that exist to determine if there are critical capabilities that are not being supported.

      Ideally, the IT and digital strategies would have been created following development of the business strategy. However, sometimes the business strategy does not directly call out the capabilities it requires IT to support.

      1. On the left half of the corresponding slide in the M&A Sell Playbook, document the business goals, initiatives, and capabilities. Input this information from the business or digital strategies. (If more space for goals, initiatives, or capabilities is needed, duplicate the slide).
      2. On the other half of the slide, document the IT goals, initiatives, and capabilities. Input this information from the IT strategy and digital strategy.

      For additional support, see Build a Business-Aligned IT Strategy.

      Record the results in the M&A Sell Playbook.

      Proactive

      Step 1.3

      Drive Innovation and Suggest Growth Opportunities

      Activities

      • 1.3.1 Determine pain points and opportunities
      • 1.3.2 Align goals with opportunities
      • 1.3.3 Recommend reduction opportunities

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Establish strong relationships with critical M&A stakeholders and position IT as an innovative business partner that can suggest reduction opportunities.

      1.3.1 Determine pain points and opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade

      Output: List of pain points or opportunities that IT can address

      Materials: Computer, Whiteboard and markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine the pain points and opportunities that exist for the organization. These can be external or internal to the organization.

      1. Identify what opportunities exist for your organization. Opportunities are the potential positives that the organization would want to leverage.
      2. Next, identify pain points, which are the potential negatives that the organization would want to alleviate.
      3. Spend time considering all the options that might exist, and keep in mind what has been identified previously.

      Opportunities and pain points can be trends, other departments’ initiatives, business perspectives of IT, etc.

      Record the results in the M&A Sell Playbook.

      1.3.2 Align goals with opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade, List of pain points and opportunities

      Output: An understanding of an executive business stakeholder’s perception of IT, Foundations for reduction strategy

      Materials: Computer, Whiteboard and markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine whether a growth or separation strategy might be a good suggestion to the business in order to meet its business objectives.

      1. For the top three to five business goals, consider:
        1. Underlying drivers
        2. Digital opportunities
        3. Whether a growth or reduction strategy is the solution
      2. Just because a growth or reduction strategy is a solution for a business goal does not necessarily indicate M&A is the way to go. However, it is important to consider before you pursue suggesting M&A.

      Record the results in the M&A Sell Playbook.

      1.3.3 Recommend reduction opportunities

      1-2 hours

      Input: Growth or separation strategy opportunities to support business goals, Stakeholder communication plan, Rationale for the suggestion

      Output: M&A transaction opportunities suggested

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to recommend a merger, acquisition, or divestiture to the business.

      1. Identify which of the business goals the transaction would help solve and why IT is the one to suggest such a goal.
      2. Leverage the stakeholder communication plan identified previously to give insight into stakeholders who would have a significant level of interest, influence, or support in the process.

      Info-Tech Insight

      With technology and digital driving many transactions, leverage your organizations’ IT environment as an asset and reason why the divestiture or sale should happen, suggesting the opportunity yourself.

      Record the results in the M&A Sell Playbook.

      By the end of this Proactive phase, you should:

      Be prepared to suggest M&A opportunities to support your company’s goals through sale or divestiture transactions

      Key outcome from the Proactive phase

      Develop progressive relationships and strong communication with key stakeholders to suggest or be aware of transformational opportunities that can be achieved through sale or divestiture strategies.

      Key deliverables from the Proactive phase
      • Business perspective of IT examined
      • Key stakeholders identified and relationship to the M&A process outlined
      • Ability to valuate the IT environment and communicate IT’s value to the business
      • Assessment of the business, digital, and IT strategies and how M&As could support those strategies
      • Pain points and opportunities that could be alleviated or supported through an M&A transaction
      • Sale or divestiture recommendations

      The Sell Blueprint

      Phase 2

      Discovery & Strategy

      Phase 1

      Phase 2

      Phase 3Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Create the mission and vision
      • Identify the guiding principles
      • Create the future-state operating model
      • Determine the transition team
      • Document the M&A governance
      • Create program metrics
      • Establish the separation strategy
      • Conduct a RACI
      • Create the communication plan
      • Assess the potential organization(s)

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for Divesting or SellingFormalize the Program PlanCreate the Valuation FrameworkStrategize the TransactionNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics
      • 0.2 Identify key stakeholders and outline their relationship to the M&A process
      • 0.3 Identify the rationale for the company's decision to pursue a divestiture or sale
      • 1.1 Review the business rationale for the divestiture/sale
      • 1.2 Assess the IT/digital strategy
      • 1.3 Identify pain points and opportunities tied to the divestiture/sale
      • 1.4 Create the IT vision statement, create the IT mission statement, and identify IT guiding principles
      • 2.1 Create the future-state operating model
      • 2.2 Determine the transition team
      • 2.3 Document the M&A governance
      • 2.4 Establish program metrics
      • 3.1 Valuate your data
      • 3.2 Valuate your applications
      • 3.3 Valuate your infrastructure
      • 3.4 Valuate your risk and security
      • 3.5 Combine individual valuations to make a single framework
      • 4.1 Establish the separation strategy
      • 4.2 Conduct a RACI
      • 4.3 Review best practices for assessing target organizations
      • 4.4 Create the communication plan
      • 5.1 Complete in-progress deliverables from previous four days
      • 5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables

      1. Business perspectives of IT
      2. Stakeholder network map for M&A transactions
      1. Business context implications for IT
      2. IT’s divestiture/sale strategic direction
      1. Operating model for future state
      2. Transition team
      3. Governance structure
      4. M&A program metrics
      1. IT valuation framework
      1. Separation strategy
      2. RACI
      3. Communication plan
      1. Completed M&A program plan and strategy
      2. Prepared to assess target organization(s)

      What is the Discovery & Strategy phase?

      Pre-transaction state

      The Discovery & Strategy phase during a sale or divestiture is a unique opportunity for many IT organizations. IT organizations that can participate in the transaction at this stage are likely considered a strategic partner of the business.

      For one-off sales/divestitures, IT being invited during this stage of the process is rare. However, for organizations that are preparing to engage in many divestitures over the coming years, this type of strategy will greatly benefit from IT involvement. Again, the likelihood of participating in an M&A transaction is increasing, making it a smart IT leadership decision to, at the very least, loosely prepare a program plan that can act as a strategic pillar throughout the transaction.

      During this phase of the pre-transaction state, IT may be asked to participate in ensuring that the IT environment is able to quickly and easily carve out components/business lines and deliver on service-level agreements (SLAs).

      Goal: To identify a repeatable program plan that IT can leverage when selling or divesting all or parts of the current IT environment, ensuring customer satisfaction and business continuity

      Discovery & Strategy Prerequisite Checklist

      Before coming into the Discovery & Strategy phase, you should have addressed the following:

      • Understand the business perspective of IT.
      • Know the key stakeholders and have outlined their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT's value to the business.
      • Understand the rationale for the company's decision to pursue a sale or divestiture and the opportunities or pain points the sale should address.

      Discovery & Strategy

      Step 2.1

      Establish the M&A Program Plan

      Activities

      • 2.1.1 Create the mission and vision
      • 2.1.2 Identify the guiding principles
      • 2.1.3 Create the future-state operating model
      • 2.1.4 Determine the transition team
      • 2.1.5 Document the M&A governance
      • 2.1.6 Create program metrics

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Establish an M&A program plan that can be repeated across sales/divestitures.

      The vision and mission statements clearly articulate IT’s aspirations and purpose

      The IT vision statement communicates a desired future state of the IT organization, whereas the IT mission statement portrays the organization’s reason for being. While each serves its own purpose, they should both be derived from the business context implications for IT.

      Vision Statements

      Mission Statements

      Characteristics

      • Describe a desired future
      • Focus on ends, not means
      • Concise
      • Aspirational
      • Memorable
      • Articulate a reason for existence
      • Focus on how to achieve the vision
      • Concise
      • Easy to grasp
      • Sharply focused
      • Inspirational

      Samples

      To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce. (Source: Business News Daily) IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset. (Source: Forbes, 2013)

      2.1.1 Create the mission and vision statements

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction

      Output: IT’s mission and vision statements for reduction strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create mission and vision statements that reflect IT’s intent and method to support the organization as it pursues a reduction strategy.

      1. Review the definitions and characteristics of mission and vision statements.
      2. Brainstorm different versions of the mission and vision statements.
      3. Edit the statements until you get to a single version of each that accurately reflects IT’s role in the reduction process.

      Record the results in the M&A Sell Playbook.

      Guiding principles provide a sense of direction

      IT guiding principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting IT investment portfolio management, solution development, and procurement decisions.

      A diagram illustrating the place of 'IT guiding principles' in the process of making 'Decisions on the use of IT'. There are four main items, connecting lines naming the type of process in getting from one step to the next, and a line underneath clarifying the questions asked at each step. On the far left, over the question 'What decisions should be made?', is 'Business context and IT implications'. This flows forward to 'IT guiding principles', and they are connected by 'Influence'. Next, over the question 'How should decisions be made?', is the main highlighted section. 'IT guiding principles' flows forward to 'Decisions on the use of IT', and they are connected by 'Guide and inform'. On the far right, over the question 'Who has the accountability and authority to make decisions?', is 'IT policies'. This flows back to 'Decisions on the use of IT', and they are connected by 'Direct and control'.

      IT principles must be carefully constructed to make sure they are adhered to and relevant

      Info-Tech has identified a set of characteristics that IT principles should possess. These characteristics ensure the IT principles are relevant and followed in the organization.

      Approach focused. IT principles should be focused on the approach – how the organization is built, transformed, and operated – as opposed to what needs to be built, which is defined by both functional and non-functional requirements.

      Business relevant. Create IT principles that are specific to the organization. Tie IT principles to the organization’s priorities and strategic aspirations.

      Long lasting. Build IT principles that will withstand the test of time.

      Prescriptive. Inform and direct decision making with actionable IT principles. Avoid truisms, general statements, and observations.

      Verifiable. If compliance can’t be verified, people are less likely to follow the principle.

      Easily Digestible. IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren’t a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.

      Followed. Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously communicated to all stakeholders to achieve and maintain buy-in.

      In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.

      Consider the example principles below

      IT Principle Name

      IT Principle Statement

      1. Risk Management We will ensure that the organization’s IT Risk Management Register is properly updated to reflect all potential risks and that a plan of action against those risks has been identified.
      2. Transparent Communication We will ensure employees are spoken to with respect and transparency throughout the transaction process.
      3. Separation for Success We will create a carve-out strategy that enables the organization and clearly communicates the resources required to succeed.
      4. Managed Data We will handle data creation, modification, separation, and use across the enterprise in compliance with our data governance policy.
      5.Deliver Better Customer Service We will reduce the number of products offered by IT, enabling a stronger focus on specific products or elements to increase customer service delivery.
      6. Compliance With Laws and Regulations We will operate in compliance with all applicable laws and regulations for both our organization and the potentially purchasing organization.
      7. Defined Value We will create a plan of action that aligns with the organization’s defined value expectations.
      8. Network Readiness We will ensure that employees and customers have immediate access to the network with minimal or no outages.
      9. Value Generator We will leverage the current IT people, processes, and technology to turn the IT organization into a value generator by developing and selling our services to purchasing organizations.

      2.1.2 Identify the guiding principles

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction, Mission and vision statements

      Output: IT’s guiding principles for reduction strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create the guiding principles that will direct the IT organization throughout the reduction strategy process.

      1. Review the role of guiding principles and the examples of guiding principles that organizations have used.
      2. Brainstorm different versions of the guiding principles. Each guiding principle should start with the phrase “We will…”
      3. Edit and consolidate the statements until you have a list of approximately eight to ten statements that accurately reflect IT’s role in the reduction process.
      4. Review the guiding principles every six months to ensure they continue to support the delivery of the business’ reduction strategy goals.

      Record the results in the M&A Sell Playbook.

      Create two IT teams to support the transaction

      IT M&A Transaction Team

      • The IT M&A Transaction Team should consist of the strongest members of the IT team who can be expected to deliver on unusual or additional tasks not asked of them in normal day-to-day operations.
      • The roles selected for this team will have very specific skills sets or deliver on critical separation capabilities, making their involvement in the combination of two or more IT environments paramount.
      • These individuals need to have a history of proving themselves very trustworthy, as they will likely be required to sign an NDA as well.
      • Expect to have to certain duplicate capabilities or roles across the M&A Team and Operational Team.

      IT Operational Team

      • This group is responsible for ensuring the business operations continue.
      • These employees might be those who are newer to the organization but can be counted on to deliver consistent IT services and products.
      • The roles of this team should ensure that end users or external customers remain satisfied.

      Key capabilities to support M&A

      Consider the following capabilities when looking at who should be a part of the IT Transaction Team.

      Employees who have a significant role in ensuring that these capabilities are being delivered will be a top priority.

      Infrastructure & Operations

      • System Separation
      • Data Management
      • Helpdesk/Desktop Support
      • Cloud/Server Management

      Business Focus

      • Service-Level Management
      • Enterprise Architecture
      • Stakeholder Management
      • Project Management

      Risk & Security

      • Privacy Management
      • Security Management
      • Risk & Compliance Management

      Build a lasting and scalable operating model

      An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy.

      It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design.

      The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.

      As you assess the current operating model, consider the following:

      • Does the operating model contain all the necessary capabilities your IT organization requires to be successful?
      • What capabilities should be duplicated?
      • Are there individuals with the skill set to support those roles? If not, is there a plan to acquire or develop those skills?
      • A dedicated project team strictly focused on M&A is great. However, is it feasible for your organization? If not, what blockers exist?
      A diagram with 'Initiatives' and 'Solutions' on the left and right of an area chart, 'Customer' at the top, the area between them labelled 'Functional Area n', and six horizontal bars labelled 'IT Capability' stacked on top of each other. The 'IT Capability' bars are slightly skewed to the 'Solutions' side of the chart.

      Info-Tech Insight

      Investing time up-front getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and allowing your model to change as the business changes.

      2.1.3 Create the future-state operating model

      4 hours

      Input: Current operating model, IT strategy, IT capabilities, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Future-state operating model for divesting organizations

      Materials: Operating model, Capability overlay, Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to establish what the future-state operating model will be if your organization needs to adjust to support a divestiture transaction. If your organization plans to sell in its entirety, you may choose to skip this activity.

      1. Ensuring that all the IT capabilities are identified by the business and IT strategy, document your organization’s current operating model.
      2. Identify what core capabilities would be critical to the divesting transaction process and separation. Highlight and make copies of those capabilities in the M&A Sell Playbook. As a result of divesting, there may also be capabilities that will become irrelevant in your future state.
      3. Ensure the capabilities that will be decentralized are clearly identified. Decentralized capabilities do not exist within the central IT organization but rather in specific lines of businesses, products, or locations to better understand needs and deliver on the capability.

      An example operating model is included in the M&A Sell Playbook. This process benefits from strong reference architecture and capability mapping ahead of time.

      Record the results in the M&A Sell Playbook.

      2.1.4 Determine the transition team

      3 hours

      Input: IT capabilities, Future-state operating model, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a team that will support your IT organization throughout the transaction. Determining which capabilities and therefore which roles will be required ensures that the business will continue to get the operational support it needs.

      1. Based on the outcome of activity 2.1.3, review the capabilities that your organization will require on the transition team. Group capabilities into functional groups containing capabilities that are aligned well with one another because they have similar responsibilities and functionalities.
      2. Replace the capabilities with roles. For example, stakeholder management, requirements gathering, and project management might be one functional group. Project management and stakeholder management might combine to create a project manager role.
      3. Review the examples in the M&A Sell Playbook and identify which roles will be a part of the transition team.

      For more information, see Redesign Your Organizational Structure

      What is governance?

      And why does it matter so much to IT and the M&A process?

      • Governance is the method in which decisions get made, specifically as they impact various resources (time, money, and people).
      • Because M&A is such a highly governed transaction, it is important to document the governance bodies that exist in your organization.
      • This will give insight into what types of governing bodies there are, what decisions they make, and how that will impact IT.
      • For example, funds to support separation need to be discussed, approved, and supplied to IT from a governing body overseeing the acquisition.
      • A highly mature IT organization will have automated governance, while a seemingly non-existent governance process will be considered ad hoc.
      A pyramid with four levels representing the types of governing bodies that are available with differing levels of IT maturity. An arrow beside the pyramid points upward. The bottom of the arrow is labelled 'Traditional (People and document centric)' and the top is labelled 'Adaptive (Data centric)'. Starting at the bottom of the pyramid is level 1 'Ad Hoc Governance', 'Governance that is not well defined or understood within the organization. It occurs out of necessity but often not by the right people'. Level 2 is 'Controlled Governance', 'Governance focused on compliance and decisions driven by hierarchical authority. Levels of authority are defined and often driven by regulatory'. Level 3 is 'Agile Governance', 'Governance that is flexible to support different needs and quick response in the organization. Driven by principles and delegated throughout the company'. At the top of the pyramid is level 4 'Automated Governance', 'Governance that is entrenched and automated into organizational processes and product/service design. Empowered and fully delegated governance to maintain fit and drive organizational success and survival'.

      2.1.5 Document M&A governance

      1-2 hours

      Input: List of governing bodies, Governing body committee profiles, Governance structure

      Output: Documented method on how decisions are made as it relates to the M&A transaction

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine the method in which decisions are made throughout the M&A transaction as it relates to IT. This will require understanding both governing bodies internal to IT and those external to IT.

      1. First, determine the other governance structures within the organization that will impact the decisions made about M&A. List out these bodies or committees.
      2. Create a profile for each committee that looks at the membership, purpose of the committee, decision areas (authority), and the process of inputs and outputs. Ensure IT committees that will have a role in this process are also documented. Consider the benefits realized, risks, and resources required for each.
      3. Organize the committees into a structure, identifying the committees that have a role in defining the strategy, designing and building, and running.

      Record the results in the M&A Sell Playbook.

      Current-state structure map – definitions of tiers

      Strategy: These groups will focus on decisions that directly connect to the strategic direction of the organization.

      Design & Build: The second tier of groups will oversee prioritization of a certain area of governance as well as design and build decisions that feed into strategic decisions.

      Run: The lowest level of governance will be oversight of more-specific initiatives and capabilities within IT.

      Expect tier overlap. Some committees will operate in areas that cover two or three of these governance tiers.

      Measure the IT program’s success in terms of its ability to support the business’ M&A goals

      Upper management will measure IT’s success based on your ability to support the underlying reasons for the M&A. Using business metrics will help assure business stakeholders that IT understands their needs and is working with the business to achieve them.

      Business-Specific Metrics

      • Revenue Growth: Increase in the top line as seen by market expansion, product expansion, etc. by percentage/time.
      • Synergy Extraction: Reduction in costs as determined by the ability to identify and eliminate redundancies over time.
      • Profit Margin Growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs over time.

      IT-Specific Metrics

      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure over time.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT separation on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-separation estimates: Delivering successful IT carve-out on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Business capability support: Delivering the end state of IT that supports the expected business capabilities and growth.

      Establish your own metrics to gauge the success of IT

      Establish SMART M&A Success Metrics

      S pecific Make sure the objective is clear and detailed.
      M easurable Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective.
      A ctionable Objectives become actionable when specific initiatives designed to achieve the objective are identified.
      R ealistic Objectives must be achievable given your current resources or known available resources.
      T ime-Bound An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.
      • What should IT consider when looking to identify potential additions, deletions, or modifications that will either add value to the organization or reduce costs/risks?
      • Provide a definition of synergies.
      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT separation on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-separation estimates: Delivering successful IT carve-out on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Revenue growth: Increase in the top line as a result, as seen by market expansion, product expansion, etc., as a result of divesting lines of the business and selling service-level agreements to the purchasing organization.
      • Synergy extraction: Reduction in costs, as determined by the ability to identify and eliminate redundancies.
      • Profit margin growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs.

      Metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Valuation & Due Diligence

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT separation
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      2.1.6 Create program metrics

      1-2 hours

      Input: IT capabilities, Mission, vision, and guiding principles, Rationale for the acquisition

      Output: Program metrics to support IT throughout the M&A process

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine how IT’s success throughout a growth transaction will be measured and determined.

      1. Document a list of appropriate metrics on the whiteboard. Remember to include metrics that demonstrate the business impact. You can use the sample metrics listed on the previous slide as a starting point.
      2. Set a target and deadline for each metric. This will help the group determine when it is time to evaluate progression.
      3. Establish a baseline for each metric based on information collected within your organization.
      4. Assign an owner for tracking each metric as well as someone to be accountable for performance.

      Record the results in the M&A Sell Playbook.

      Discovery & Strategy

      Step 2.2

      Prepare IT to Engage in the Separation or Sale

      Activities

      • 2.2.1 Establish the separation strategy
      • 2.2.2 Conduct a RACI
      • 2.2.3 Create the communication plan
      • 2.2.4 Assess the potential organization(s)

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Identify IT’s plan of action when it comes to the separation/sale and align IT’s separation/sale strategy with the business’ M&A strategy.

      Separation strategies

      There are several IT separation strategies that will let you achieve your target technology environment.

      IT Separation Strategies
      • Divest. Carve out elements of the IT organization and sell them to a purchasing organization with or without a service-level agreement.
      • Sell. Sell the entire IT environment to a purchasing organization. The purchasing organization takes full responsibility in delivering and running the IT environment.
      • Spin-Off Joint Venture. Carve out elements of the IT organization and combine them with elements of a new or purchasing organization to create a new entity.

      The approach IT takes will depend on the business objectives for the M&A.

      • Generally speaking, the separation strategy is well understood and influenced by the frequency of and rationale for selling.
      • Based on the initiatives generated by each business process owner, you need to determine the IT separation strategy that will best support the desired target technology environment, especially if you are still operating or servicing elements of that IT environment.

      Key considerations when choosing an IT separation strategy include:

      • What are the main business objectives of the M&A?
      • What are the key synergies expected from the transaction?
      • What IT separation strategy best helps obtain these benefits?
      • What opportunities exist to position the business for sustainable and long-term growth?

      Separation strategies in detail

      Review highlights and drawbacks of different separation strategies

      Divest
        Highlights
      • Recommended for businesses striving to reduce costs and potentially even generate revenue for the business through the delivery of SLAs.
      • Opportunity to reduce or scale back on lines of business or products that are not driving profits.
        Drawbacks
      • May be forced to give up critical staff that have been known to deliver high value.
      • The IT department is left to deliver services to the purchasing organization with little support or consideration from the business.
      • There can be increased risk and security concerns that need to be addressed.
      Sell
        Highlights
      • Recommended for businesses looking to gain capital to exit the market profitably or to enter a new market with a large sum of capital.
      • The business will no longer exist, and as a result all operational costs, including IT, will become redundant.
        Drawbacks
      • IT is no longer needed as an operating or capital service for the organization.
      • Lost resources, including highly trained and critical staff.
      • May require packaging employees off and using the profit or capital generated to cover any closing costs.
      Spin-Off or Joint Venture
        Highlights
      • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
      • Each side has a unique offering but complementing capabilities.
        Drawbacks
      • As much as the organization is going through a separation from the original company, it will be going through an integration with the new company.
      • There could be differences in culture.
      • This could require a large amount of investment without a guarantee of profit or success.

      2.2.1 Establish the separation strategy

      1-2 hours

      Input: Business separation strategy, Guiding principles, M&A governance

      Output: IT’s separation strategy

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine IT’s approach to separating or selling. This approach might differ slightly from transaction to transaction. However, the businesses approach to transactions should give insight into the general separation strategy IT should adopt.

      1. Make sure you have clearly articulated the business objectives for the M&A, the technology end state for IT, and the magnitude of the overall separation.
      2. Review and discuss the highlights and drawbacks of each type of separation.
      3. Use Info-Tech’s Separation Posture Selection Framework on the next slide to select the separation posture that will appropriately enable the business. Consider these questions during your discussion:
        1. What are the main business objectives of the M&A? What key IT capabilities will need to support business objectives?
        2. What key synergies are expected from the transaction? What opportunities exist to position the business for sustainable growth?
        3. What IT separation best helps obtain these benefits?

      Record the results in the M&A Sell Playbook.

      Separation Posture Selection Framework

      Business M&A Strategy

      Resultant Technology Strategy

      M&A Magnitude (% of Seller Assets, Income, or Market Value)

      IT Separation Posture

      A. Horizontal Adopt One Model ‹100% Divest
      ›99% Sell
      B. Vertical Create Links Between Critical Systems Any Divest
      C. Conglomerate Independent Model Any Joint Venture
      Divest
      D. Hybrid: Horizontal & Conglomerate Create Links Between Critical Systems Any Divest
      Joint Venture

      M&A separation strategy

      Business M&A Strategy Resultant Technology Strategy M&A Magnitude (% of Seller Assets, Income, or Market Value) IT Separation Posture

      You may need a hybrid separation posture to achieve the technology end state.

      M&A objectives may not affect all IT domains and business functions in the same way. Therefore, the separation requirements for each business function may differ. Organizations will often choose to select and implement a hybrid separation posture to realize the technology end state.

      Each business division may have specific IT domain and capability needs that require an alternative separation strategy.

      • Example: Even when conducting a joint venture by forming a new organization, some partners might view themselves as the dominant partner and want to influence the IT environment to a greater degree.
      • Example: Some purchasing organizations will expect service-level agreements to be available for a significant period of time following the divestiture, while others will be immediately independent.

      2.2.2 Conduct a RACI

      1-2 hours

      Input: IT capabilities, Transition team, Separation strategy

      Output: Completed RACI for Transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to identify the core accountabilities and responsibilities for the roles identified as critical to your transition team. While there might be slight variation from transaction to transaction, ideally each role should be performing certain tasks.

      1. First, identify a list of critical tasks that need to be completed to support the sale or separation. For example:
        • Communicate with the company M&A team.
        • Identify the key IT solutions that can and cannot be carved out.
        • Gather data room artifacts and provide them to acquiring organization.
      2. Next, identify at the activity level which role is accountable or responsible for each activity. Enter an A for accountable, R for responsible, or A/R for both.

      Record the results in the M&A Sell Playbook.

      Communication and change

      Prepare key stakeholders for the potential changes

      • Anytime you are starting a project or program that will depend on users and stakeholders to give up their old way of doing things, change will force people to become novices again, leading to lost productivity and added stress.
      • Change management can improve outcomes for any project where you need people to adopt new tools and procedures, comply with new policies, learn new skills and behaviors, or understand and support new processes.
      • M&As move very quickly, and it can be very difficult to keep track of which stakeholders you need to be communicating with and what you should be communicating.
      • Not all organizations embrace or resist change in the same ways. Base your change communications on your organization’s cultural appetite for change in general.
        • Organizations with a low appetite for change will require more direct, assertive communications.
        • Organizations with a high appetite for change are more suited to more open, participatory approaches.

      Three key dimensions determine the appetite for cultural change:

      • Power Distance. Refers to the acceptance that power is distributed unequally throughout the organization.
        In organizations with a high power distance, the unequal power distribution is accepted by the less powerful employees.
      • Individualism. Organizations that score high in individualism have employees who are more independent. Those who score low in individualism fall into the collectivism side, where employees are strongly tied to one another or their groups.
      • Uncertainty Avoidance. Describes the level of acceptance that an organization has toward uncertainty. Those who score high in this area find that their employees do not favor uncertain situations, while those that score low in this area find that their employees are comfortable with change and uncertainty.

      2.2.3 Create the communication plan

      1-2 hours

      Input: IT’s M&A mission, vision, and guiding principles, M&A transition team, IT separation strategy, RACI

      Output: IT’s M&A communication plan

      Materials: Flip charts/whiteboard, Markers, RACI, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a communication plan that IT can leverage throughout the initiative.

      1. Create a structured communication plan that allows for continuous communication with the integration management office, senior management, and the business functional heads.
      2. Outline key topics of communication, with stakeholders, inputs, and outputs for each topic.
      3. Review Info-Tech’s example communication plan in the M&A Sell Playbook and update it with relevant information.
      4. Does this communication plan make sense for your organization? What doesn’t make sense? Adjust the communication guide to suit your organization.

      Record the results in the M&A Sell Playbook.

      Assessing potential organizations

      As soon as you have identified organizations to consider, it’s imperative to assess critical risks. Most IT leaders can attest that they will receive little to no notice when the business is pursuing a sale and IT has to assess the IT organization. As a result, having a standardized template to quickly assess the potential acquiring organization is important.

      Ways to Assess

      1. News: Assess what sort of news has been announced in relation to the organization. Have they had any risk incidents? Has a critical vendor announced working with them?
      2. LinkedIn: Scan through the LinkedIn profiles of employees. This will give you a sense of what platforms they have based on employees. It will also give insight into positive or negative employee experiences that could impact retention.
      3. Trends: Some industries will have specific solutions that are relevant and popular. Assess what the key players are (if you don’t already know) to determine the solution.
      4. Business Architecture: While this assessment won’t perfect, try to understand the business’ value streams and the critical business and IT capabilities that would be needed to support them. Will your organization or employee skills be required to support these long term?

      Info-Tech Insight

      Assessing potential organizations is not just for the purchaser. The seller should also know what the purchasing organization’s history with M&As is and what potential risks could occur if remaining connected through ongoing SLAs.

      2.2.4 Assess the potential organization(s)

      1-2 hours

      Input: Publicized historical risk events, Solutions and vendor contracts likely in the works, Trends

      Output: IT’s valuation of the potential organization(s) for selling or divesting

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to assess the organization(s) that your organization is considering selling or divesting to.

      1. Complete the Historical Valuation Worksheet in the M&A Sell Playbook to understand the type of IT organization that your company may support.
        • The business likely isn’t looking for in-depth details at this time. However, as the IT leader, it is your responsibility to ensure critical risks are identified and communicated to the business.
      2. Use the information identified to help the business narrow down which organizations could be the right organizations to sell or divest to.

      Record the results in the M&A Sell Playbook.

      By the end of this pre-transaction phase you should:

      Have a program plan for M&As and a repeatable M&A strategy for IT when engaging in reduction transactions

      Key outcomes from the Discovery & Strategy phase
      • Prepare the IT environment to support the potential sale or divestiture by identifying critical program plan elements and establishing a separation or carve-out strategy that will enable the business to reach its goals.
      • Create a M&A strategy that accounts for all the necessary elements of a transaction and ensures sufficient governance, capabilities, and metrics exist.
      Key deliverables from the Discovery & Strategy phase
      • Create vision and mission statements
      • Establish guiding principles
      • Create a future-state operating model
      • Identify the key roles for the transaction team
      • Identify and communicate the M&A governance
      • Determine target metrics
      • Identify the M&A operating model
      • Select the separation strategy framework
      • Conduct a RACI for key transaction tasks for the transaction team
      • Document the communication plan

      M&A Sell Blueprint

      Phase 3

      Due Diligence & Preparation

      Phase 1Phase 2

      Phase 3

      Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Drive value with a due diligence charter
      • Gather data room artifacts
      • Measure staff engagement
      • Assess culture
      • Create a carve-out roadmap
      • Prioritize separation tasks
      • Establish the separation roadmap
      • Identify the buyer’s IT expectations
      • Create a service/transaction agreement
      • Estimate separation costs
      • Create an employee transition plan
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Purchasing organization
      • Transition team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for SeparationIdentify Expectations and Create the Carve-Out RoadmapPrepare and Manage EmployeesPlan the Separation RoadmapNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Identify the rationale for the company's decision to pursue a divestiture/sale.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the divestiture/sale.
      • 1.2 Identify pain points and opportunities tied to the divestiture/sale.
      • 1.3 Establish the separation strategy.
      • 1.4 Create the due diligence charter.
      • 2.1 Identify the buyer’s IT expectations.
      • 2.2 Create a list of IT artifacts to be reviewed in the data room.
      • 2.3 Create a carve-out roadmap.
      • 2.4 Create a service/technical transaction agreement.
      • 3.1 Measure staff engagement.
      • 3.2 Assess the current culture and identify the goal culture.
      • 3.3 Create an employee transition plan.
      • 3.4 Create functional workplans for employees.
      • 4.1 Prioritize separation tasks.
      • 4.2 Establish the separation roadmap.
      • 4.3 Establish and align project metrics with identified tasks.
      • 4.4 Estimate separation costs.
      • 5.1 Complete in-progress deliverables from previous four days.
      • 5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Separation strategy
      3. Due diligence charter
      1. Data room artifacts identified
      2. Carve-out roadmap
      3. Service/technical transaction agreement
      1. Engagement assessment
      2. Culture assessment
      3. Employee transition plans and workplans
      1. Separation roadmap and associated resourcing
      1. Divestiture separation strategy for IT

      What is the Due Diligence & Preparation phase?

      Mid-transaction state

      The Due Diligence & Preparation phase during a sale or divestiture is a critical time for IT. If IT fails to proactively participate in this phase, IT will have to merely react to separation expectations set by the business.

      If your organization is being sold in its entirety, staff will have major concerns about their future in the new organization. Making this transition as smooth as possible and being transparent could go a long way in ensuring their success in the new organization.

      In a divestiture, this is the time to determine where it’s possible for the organization to divide or separate from itself. A lack of IT involvement in these conversations could lead to an overcommitment by the business and under-delivery by IT.

      Goal: To ensure that, as the selling or divesting organization, you comply with regulations, prepare staff for potential changes, and identify a separation strategy if necessary

      Due Diligence Prerequisite Checklist

      Before coming into the Due Diligence & Preparation phase, you must have addressed the following:

      • Understand the rationale for the company's decision to pursue a sale or divestiture and what opportunities or pain points the sale should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics.
      • Select a separation strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.

      Before coming into the Due Diligence & Preparation phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT’s value to the business.

      The Technology Value Trinity

      Delivery of Business Value & Strategic Needs

      • Digital & Technology Strategy
        The identification of objectives and initiatives necessary to achieve business goals.
      • IT Operating Model
        The model for how IT is organized to deliver on business needs and strategies.
      • Information & Technology Governance
        The governance to ensure the organization and its customers get maximum value from the use of information and technology.

      All three elements of the Technology Value Trinity work in harmony to deliver business value and achieve strategic needs. As one changes, the others need to change as well.

      • Digital and IT Strategy tells you what you need to achieve to be successful.
      • IT Operating Model and Organizational Design is the alignment of resources to deliver on your strategy and priorities.
      • Information & Technology Governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy. It’s the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy. This oversight evaluates, directs, and monitors the delivery of outcomes to ensure that the use of resources results in the achieving the organization’s goals.

      Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest – not based on what is in the best interest of the organization.

      Due Diligence & Preparation

      Step 3.1

      Engage in Due Diligence and Prepare Staff

      Activities

      • 3.1.1 Drive value with a due diligence charter
      • 3.1.2 Gather data room artifacts
      • 3.1.3 Measure staff engagement
      • 3.1.4 Assess culture

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Prospective IT organization
      • Transition team

      Outcomes of Step

      This step of the process is when IT should prepare and support the business in due diligence and gather the necessary information about staff changes.

      3.1.1 Drive value with a due diligence charter

      1-2 hours

      Input: Key roles for the transaction team, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team

      Output: IT Due Diligence Charter

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a charter leveraging the items completed in the previous phase, as listed on the Due Diligence Prerequisite Checklist slide, to gain executive sign-off.

      1. In the IT Due Diligence Charter in the M&A Sell Playbook, complete the aspects of the charter that are relevant for you and your organization.
      2. We recommend including these items in the charter:
        • Communication plan
        • Transition team roles
        • Goals and metrics for the transaction
        • Separation strategy
        • Sale/divestiture RACI
      3. Once the charter has been completed, ensure that business executives agree to the charter and sign off on the plan of action.

      Record the results in the M&A Sell Playbook.

      3.1.2 Gather data room artifacts

      4 hours

      Input: Future-state operating model, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team

      Output: List of items to acquire and verify can be provided to the purchasing organization while in the data room

      Materials: Critical domain lists on following slides, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team, Legal team, Compliance/privacy officers

      The purpose of this activity is to create a list of the key artifacts that you could be asked for during the due diligence process.

      1. Review the lists on the following pages as a starting point. Identify which domains, stakeholders, artifacts, and information should be requested for the data room.
      2. IT leadership may or may not be asked to enter the data room directly. The short notice for having to find these artifacts for the purchasing organization can leave your IT organization scrambling. Identify the critical items worth obtaining ahead of time.
      3. Once you have identified the artifacts, provide the list to the legal team or compliance/privacy officers and ensure they also agree those items can be provided. If changes to the documents need to be made, take the time to do so.
      4. Store all items in a safe and secure file or provide to the M&A team ahead of due diligence.

      **Note that if your organization is not leading/initiating the data room, then you can ignore this activity.

      Record the results in the M&A Sell Playbook.

      Critical domains

      Understand the key stakeholders and outputs for each domain

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Business
      • Enterprise Architecture
      • Business Relationship Manager
      • Business Process Owners
      • Business capability map
      • Capability map (the M&A team should be taking care of this, but make sure it exists)
      • Business satisfaction with various IT systems and services
      Leadership/IT Executive
      • CIO
      • CTO
      • CISO
      • IT budgets
      • IT capital and operating budgets (from current year and previous year)
      Data & Analytics
      • Chief Data Officer
      • Data Architect
      • Enterprise Architect
      • Master data domains, system of record for each
      • Unstructured data retention requirements
      • Data architecture
      • Master data domains, sources, and storage
      • Data retention requirements
      Applications
      • Applications Manager
      • Application Portfolio Manager
      • Application Architect
      • Applications map
      • Applications inventory
      • Applications architecture
      • Copy of all software license agreements
      • Copy of all software maintenance agreements
      Infrastructure
      • Head of Infrastructure
      • Enterprise Architect
      • Infrastructure Architect
      • Infrastructure Manager
      • Infrastructure map
      • Infrastructure inventory
      • Network architecture (including which data centers host which infrastructure and applications)
      • Inventory (including separation capabilities of vendors, versions, switches, and routers)
      • Copy of all hardware lease or purchase agreements
      • Copy of all hardware maintenance agreements
      • Copy of all outsourcing/external service provider agreements
      • Copy of all service-level agreements for centrally provided, shared services and systems
      Products and Services
      • Product Manager
      • Head of Customer Interactions
      • Product lifecycle
      • Product inventory
      • Customer market strategy

      Critical domains (continued)

      Understand the key stakeholders and outputs for each domain

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Operations
      • Head of Operations
      • Service catalog
      • Service overview
      • Service owners
      • Access policies and procedures
      • Availability and service levels
      • Support policies and procedures
      • Costs and approvals (internal and customer costs)
      IT Processes
      • CIO
      • IT Management
      • VP of IT Governance
      • VP of IT Strategy
      • IT process flow diagram
      • Processes in place and productivity levels (capacity)
      • Critical processes/processes the organization feels they do particularly well
      IT People
      • CIO
      • VP of Human Resources
      • IT organizational chart
      • Competency & capacity assessment
      • IT organizational structure (including resources from external service providers such as contractors) with appropriate job descriptions or roles and responsibilities
      • IT headcount and location
      Security
      • CISO
      • Security Architect
      • Security posture
      • Information security staff
      • Information security service providers
      • Information security tools
      • In-flight information security projects
      Projects
      • Head of Projects
      • Project portfolio
      • List of all future, ongoing, and recently completed projects
      Vendors
      • Head of Vendor Management
      • License inventory
      • Inventory (including what will and will not be transitioning, vendors, versions, number of licenses)

      Retain top talent throughout the transition

      Focus on retention and engagement

      • People are such a critical component of this process, especially in the selling organization.
      • Retaining employees, especially the critical employees who hold specific skills or knowledge, will ensure the success and longevity of the divesting organization, purchasing organization, or the new company.
      • Giving employees a role in the organization and ensuring they do not see their capabilities as redundant will be critical to the process.
      • It is okay if employees need to change what they were doing temporarily or even long-term. However, being transparent about these changes and highlighting their value to the process and organization(s) will help.
      • The first step to moving forward with retention is to look at the baseline engagement and culture of employees and the organization. This will help determine where to focus and allow you to identify changes in engagement that resulted from the transaction.
      • Job engagement drivers are levers that influence the engagement of employees in their day-to-day roles.
      • Organizational engagement drivers are levers that influence an employee’s engagement with the broader organization.
      • Retention drivers are employment needs. They don’t necessarily drive engagement, but they must be met for engagement to be possible.

      3.1.3 Measure staff engagement

      3-4 hours

      Input: Engagement survey

      Output: Baseline engagement scores

      Materials: Build an IT Employee Engagement Program

      Participants: IT executive/CIO, IT senior leadership, IT employees of current organization

      The purpose of this activity is to measure current staff engagement to have a baseline to measure against in the future state. This is a good activity to complete if you will be divesting or selling in entirety.

      The results from the survey should act as a baseline to determine what the organization is doing well in terms of employee engagement and what drivers could be improved upon.

      1. Review Info-Tech’s Build an IT Employee Engagement Program research and select a survey that will best meet your needs.
      2. Conduct the survey and note which drivers employees are currently satisfied with. Likewise, note where there are opportunities.
      3. Document actions that should be taken to mitigate the negative engagement drivers throughout the transaction and enhance or maintain the positive engagement drivers.

      Record the results in the M&A Sell Playbook.

      Assess culture as a part of engagement

      Culture should not be overlooked, especially as it relates to the separation of IT environments

      • There are three types of culture that need to be considered.
      • Most importantly, this transition is an opportunity to change the culture that might exist in your organization’s IT environment.
      • Make a decision on which type of culture you’d like IT to have post transition.

      Target Organization's Culture. The culture that the target organization is currently embracing. Their established and undefined governance practices will lend insight into this.

      Your Organization’s Culture. The culture that your organization is currently embracing. Examine people’s attitudes and behaviors within IT toward their jobs and the organization.

      Ideal Culture. What will the future culture of the IT organization be once separation is complete? Are there aspects that your current organization and the target organization embrace that are worth considering?

      Culture categories

      Map the results of the IT Culture Diagnostic to an existing framework

      Competitive
      • Autonomy
      • Confront conflict directly
      • Decisive
      • Competitive
      • Achievement oriented
      • Results oriented
      • High performance expectations
      • Aggressive
      • High pay for good performance
      • Working long hours
      • Having a good reputation
      • Being distinctive/different
      Innovative
      • Adaptable
      • Innovative
      • Quick to take advantage of opportunities
      • Risk taking
      • Opportunities for professional growth
      • Not constrained by rules
      • Tolerant
      • Informal
      • Enthusiastic
      Traditional
      • Stability
      • Reflective
      • Rule oriented
      • Analytical
      • High attention to detail
      • Organized
      • Clear guiding philosophy
      • Security of employment
      • Emphasis on quality
      • Focus on safety
      Cooperative
      • Team oriented
      • Fair
      • Praise for good performance
      • Supportive
      • Calm
      • Developing friends at work
      • Socially responsible

      Culture Considerations

      • What culture category was dominant for each IT organization?
      • Do you share the same dominant category?
      • Is your current dominant culture category the most ideal to have post-separation?

      3.1.4 Assess Culture

      3-4 hours

      Input: Cultural assessments for current IT organization, Cultural assessment for target IT organization

      Output: Goal for IT culture

      Materials: IT Culture Diagnostic

      Participants: IT executive/CIO, IT senior leadership, IT employees of current organization, IT employees of target organization, Company M&A team

      The purpose of this activity is to assess the different cultures that might exist within the IT environments of the organizations involved. By understanding the culture that exists in the purchasing organization, you can identify the fit and prepare impacted staff for potential changes.

      1. Complete this activity by leveraging the blueprint Fix Your IT Culture, specifically the IT Culture Diagnostic.
      2. Fill out the diagnostic for the IT department in your organization:
        1. Answer the 16 questions in tab 2, Diagnostic.
        2. Find out your dominant culture and review recommendations in tab 3, Results.
      3. Document the results from tab 3, Results, in the M&A Sell Playbook if you are trying to record all artifacts related to the transaction in one place.
      4. Repeat the activity for the purchasing organization.
      5. Leverage the information to determine what the goal for the culture of IT will be post-separation if it will differ from the current culture.

      Record the results in the M&A Sell Playbook.

      Due Diligence & Preparation

      Step 3.2

      Prepare to Separate

      Activities

      • 3.2.1 Create a carve-out roadmap
      • 3.2.2 Prioritize separation tasks
      • 3.2.3 Establish the separation roadmap
      • 3.2.4 Identify the buyer’s IT expectations
      • 3.2.5 Create a service/transaction agreement
      • 3.2.6 Estimate separation costs
      • 3.2.7 Create an employee transition plan
      • 3.2.8 Create functional workplans for employees
      • 3.2.9 Align project metrics with identified tasks

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team
      • Purchasing organization

      Outcomes of Step

      Have an established plan of action toward separation across all domains and a strategy toward resources.

      Don’t underestimate the importance of separation preparation

      Separation involves taking the IT organization and dividing it into two or more separate entities.

      Testing the carve capabilities of the IT organization often takes 3 months. (Source: Cognizant, 2014)

      Daimler-Benz lost nearly $19 billion following its purchase of Chrysler by failing to recognize the cultural differences that existed between the two car companies. (Source: Deal Room)

      Info-Tech Insight

      Separating the IT organization requires more time and effort than business leaders will know. Frequently communicate challenges and lost opportunities when carving the IT environment out.

      Separation needs

      Identify the business objectives of the sale to determine the IT strategy

      Set up a meeting with your IT due diligence team to:

      • Ensure there will be no gaps in the delivery of products and services in the future state.
      • Discuss the people and processes necessary to achieve the target technology environment and support M&A business objectives.

      Use this opportunity to:

      • Identify data and application complexities between the involved organizations.
      • Identify the IT people and process gaps, initiatives, and levels of support expected.
      • Determine your infrastructure needs to ensure effectiveness and delivery of services:
        • Does IT have the infrastructure to support the applications and business capabilities?
        • Identify any gaps between the current infrastructure in both organizations and the infrastructure required.
        • Identify any redundancies/gaps.
        • Determine the appropriate IT separation strategies.
      • Document your gaps, redundancies, initiatives, and assumptions to help you track and justify the initiatives that must be undertaken and help estimate the cost of separation.

      Separation strategies

      There are several IT separation strategies that will let you achieve your target technology environment.

      IT Separation Strategies
      • Divest. Carve out elements of the IT organization and sell them to a purchasing organization with or without a service-level agreement.
      • Sell. Sell the entire IT environment to a purchasing organization. The purchasing organization takes full responsibility in delivering and running the IT environment.
      • Spin-Off Joint Venture. Carve out elements of the IT organization and combine them with elements of a new or purchasing organization to create a new entity.

      The approach IT takes will depend on the business objectives for the M&A.

      • Generally speaking, the separation strategy is well understood and influenced by the frequency of and rationale for selling.
      • Based on the initiatives generated by each business process owner, you need to determine the IT separation strategy that will best support the desired target technology environment, especially if you are still operating or servicing elements of that IT environment.

      Key considerations when choosing an IT separation strategy include:

      • What are the main business objectives of the M&A?
      • What are the key synergies expected from the transaction?
      • What IT separation strategy best helps obtain these benefits?
      • What opportunities exist to position the business for sustainable and long-term growth?

      Separation strategies in detail

      Review highlights and drawbacks of different separation strategies

      Divest
        Highlights
      • Recommended for businesses striving to reduce costs and potentially even generate revenue for the business through the delivery of SLAs.
      • Opportunity to reduce or scale back on lines of business or products that are not driving profits.
        Drawbacks
      • May be forced to give up critical staff that have been known to deliver high value.
      • The IT department is left to deliver services to the purchasing organization with little support or consideration from the business.
      • There can be increased risk and security concerns that need to be addressed.
      Sell
        Highlights
      • Recommended for businesses looking to gain capital to exit the market profitably or to enter a new market with a large sum of capital.
      • The business will no longer exist, and as a result all operational costs, including IT, will become redundant.
        Drawbacks
      • IT is no longer needed as an operating or capital service for the organization.
      • Lost resources, including highly trained and critical staff.
      • May require packaging employees off and using the profit or capital generated to cover any closing costs.
      Spin-Off or Joint Venture
        Highlights
      • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
      • Each side has a unique offering but complementing capabilities.
        Drawbacks
      • As much as the organization is going through a separation from the original company, it will be going through an integration with the new company.
      • There could be differences in culture.
      • This could require a large amount of investment without a guarantee of profit or success.

      Preparing the carve-out roadmap

      And why it matters so much

      • When carving out the IT environment in preparation for a divestiture, it’s important to understand the infrastructure, application, and data connections that might exist.
      • Much to the business’ surprise, carving out the IT environment is not easy, especially when considering the services and products that might depend on access to certain applications or data sets.
      • Once the business has indicated which elements they anticipate divesting, be prepared for testing the functionality and ability of this carve-out, either through automation or manually. There are benefits and drawbacks to both methods:
        • Automated requires a solution and a developer to code the tests.
        • Manual requires time to find the errors, possibly more time than automated testing.
      • Identify if there are dependencies that will make the carve-out difficult.
        • For example, the business is trying to divest Product X, but that product is integrated with Product Y, which is not being sold.
        • Consider all the processes and products that specific data might support as well.
        • Moreover, the data migration tool will need to enter the ERP system and identify not just the data but all supporting and historical elements that underlie the data.

      Critical components to consider:

      • Selecting manual or automated testing
      • Determining data dependencies
      • Data migration capabilities
      • Auditing approval
      • People and skills that support specific elements being carved out

      3.2.1 Create a carve-out roadmap

      6 hours

      Input: Items included in the carve-out, Dependencies, Whether testing is completed, If the carve-out will pass audit, If the carve-out item is prepared to be separated

      Output: Carve-out roadmap

      Materials: Business’ divestiture plan, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Business leaders, Transition team

      The purpose of this activity is to prepare the IT environment by identifying a carve-out roadmap, specifically looking at data, infrastructure, and applications. Feel free to expand the roadmap to include other categories as your organization sees fit.

      1. In the Carve-Out Roadmap in the M&A Sell Playbook, identify the key elements of the carve-out in the first column.
      2. Note any dependencies the items might have. For example:
        • The business is selling Product X, which is linked to Data X and Data Y. The organization does not want to sell Data Y. Data X would be considered dependent on Data Y.
      3. Once the dependencies have been confirmed, begin automated or manual testing to examine the possibility of separating the data sets (or other dependencies) from one another.
      4. After identifying an acceptable method of separation, inform the auditing individual or body and confirm that there would be no repercussions for the planned process.

      Record the results in the M&A Sell Playbook.

      3.2.2 Prioritize separation tasks

      2 hours

      Input: Separation tasks, Transition team, M&A RACI

      Output: Prioritized separation list

      Materials: Separation task checklist, Separation roadmap

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to prioritize the different separation tasks that your organization has identified as necessary to this transaction. Some tasks might not be relevant for this particular transaction, and others might be critical.

      1. Begin by downloading the SharePoint or Excel version of the M&A Separation Project Management Tool.
      2. Identify which separation tasks you want to have as part of your project plan. Alter or remove any tasks that are irrelevant to your organization. Add in tasks you think are missing.
      3. When deciding criticality of the task, consider the effect on stakeholders, those who are impacted or influenced in the process of the task, and dependencies (e.g. data strategy needs to be addressed first before you can tackle its dependencies, like data quality).
      4. Feel free to edit the way you measure criticality. The standard tool leverages a three-point scale. At the end, you should have a list of tasks in priority order based on criticality.

      Record the updates in the M&A Separation Project Management Tool (SharePoint).

      Record the updates in the M&A Separation Project Management Tool (Excel).

      Separation checklists

      Prerequisite Checklist
      • Build the project plan for separation and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the sale or divestiture
      • Develop IT's sale/divestiture strategy
        • Determine goal opportunities
        • Create the mission and vision statements
        • Create the guiding principles
        • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Establish a service/technical transaction agreement
      • Plan and communicate culture changes
      • Create an employee transition plan
      • Assess baseline engagement
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Meet compliance and regulatory standards
      • Identify and assess all of IT's risks
      Applications
      • Prioritize and address critical applications
        • CRM
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
        • ERP
        • Email
      • Develop method of separating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      • Prioritize and address critical applications
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Build a data architecture roadmap
      • Analyze data sources and domains
      • Evaluate data storage (on-premises vs. cloud)
      • Develop an enterprise content management strategy and roadmap
      • Ensure cleanliness/usability of data sets
      • Identify data sets that can remain operational if reduced/separated
      • Develop reporting and analytics capabilities
      • Confirm data strategy
      Operations
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Separate/terminate phone lists and extensions
      • Split email address books
      • Communicate helpdesk/service desk information

      Separation checklists (continued)

      Infrastructure
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      • Determine network access concerns
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Identify the licensing grant
      • Rationalize vendor services and solutions
      People
      • Design an IT operating model
      • Design your future IT organizational structure
      • Conduct a RACI for prioritized activities
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Define new job descriptions with meaningful roles and responsibilities
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Identify projects to be on hold
      • Communicate project intake process
      • Reprioritize projects
      Products & Services
      • Redefine service catalog
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      • Plan service-level agreements
      Security
      • Conduct a security assessment
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be changed/terminated
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies
      • Evaluate current process models

      3.2.2 Establish the separation roadmap

      2 hours

      Input: Prioritized separation tasks, Carve-out roadmap, Employee transition plan, Separation RACI, Costs for activities, Activity owners

      Output: Separation roadmap

      Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel), SharePoint Template: Step-by-Step Deployment Guide

      Participants: IT executive/CIO, IT senior leadership, Transition team, Company M&A team

      The purpose of this activity is to create a roadmap to support IT throughout the separation process. Using the information gathered in previous activities, you can create a roadmap that will ensure a smooth separation.

      1. Use our Separation Project Management Tool to help track critical elements in relation to the separation project. There are a few options available:
        1. Follow the instructions on the next slide if you are looking to upload our SharePoint project template. Additional instructions are available in the SharePoint Template Step-by-Step Deployment Guide.
        2. If you cannot or do not want to use SharePoint as your project management solution, download our Excel version of the tool.
          **Remember that this your tool, so customize to your liking.
      2. Identify who will own or be accountable for each of the separation tasks and establish the time frame for when each project should begin and end. This will confirm which tasks should be prioritized.

      Record the updates in the M&A Separation Project Management Tool (SharePoint).

      Record the updates in the M&A Separation Project Management Tool (Excel).

      Separation Project Management Tool (SharePoint Template)

      Follow these instructions to upload our template to your SharePoint environment

      1. Create or use an existing SP site.
      2. Download the M&A Separation Project Management Tool (SharePoint) .wsp file from the Mergers & Acquisitions: The Sell Blueprint landing page.
      3. To import a template into your SharePoint environment, do the following:
        1. Open PowerShell.
        2. Connect-SPO Service (need to install PowerShell module).
        3. Enter in your tenant admin URL.
        4. Enter in your admin credentials.
        5. Set-SPO Site https://YourDomain.sharepoint.com/sites/YourSiteHe... -DenyAddAndCustomizePages 0
        OR
        1. Turn on both custom script features to allow users to run custom
      4. Screenshot of the 'Custom Script' option for importing a template into your SharePoint environment. Feature description reads 'Control whether users can run custom script on personal sites and self-service created sites. Note: changes to this setting might take up to 24 hours to take effect. For more information, see http://go.microsoft.com/fwlink/?LinkIn=397546'. There are options to prevent or allow users from running custom script on personal/self-service created sites.
      5. Enable the SharePoint Server feature.
      6. Upload the .wsp file in Solutions Gallery.
      7. Deploy by creating a subsite and select from custom options.
        • Allow or prevent custom script
        • Security considerations of allowing custom script
        • Save, download, and upload a SharePoint site as a template
      8. Refer to Microsoft documentation to understand security considerations and what is and isn’t supported:

      For more information, check out the SharePoint Template: Step-by-Step Deployment Guide.

      Supporting the transition and establishing service-level agreements

      The purpose of this part of the transition is to ensure both buyer and seller have a full understanding of expectations for after the transaction.

      • Once the organizations have decided to move forward with a deal, all parties need a clear level of agreement.
      • IT, since it is often seen as an operational division of an organization, is often expected to deliver certain services or products once the transaction has officially closed.
      • The purchasing organization or the new company might depend on IT to deliver these services until they are able to provide those services on their own.
      • Having a clear understanding of what the buyer’s expectations are and what your company, as the selling organization, can provide is important.
      • Have a conversation with the buyer and document those expectations in a signed service agreement.

      3.2.4 Identify the buyer's IT expectations

      3-4 hours

      Input: Carve-out roadmap, Separation roadmap, Up-to-date version of the agreement

      Output: Buyer’s IT expectations

      Materials: Questions for meeting

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership

      The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization. By identifying, documenting, and agreeing on what services your IT organization will be responsible for, you can obtain a final agreement to protect you as the selling organization.

      1. Buyers should not assume certain services will be provided. Organize a meeting with IT leaders and the company M&A teams to determine what services will be provided.
      2. The next slide has a series of questions that you can start from. Ensure you get detailed information about each of the services.
      3. Once you fully understand the buyer’s IT expectations, create an SLA in the next activity and obtain sign-off from both organizations.

      Questions to ask the buyer

      1. What services would you like my IT organization to provide?
      2. How long do you anticipate those services will be provided to you?
      3. How do you expect your staff/employees to communicate requests or questions to my staff/employees?
      4. Are there certain days or times that you expect these services to be delivered?
      5. How many staff do you expect should be available to support you?
      6. What should be the acceptable response time on given service requests?
      7. When it comes to the services you require, what level of support should we provide?
      8. If a service requires escalation to Level 2 or Level 3 support, are we still expected to support this service? Or are we only Level 1 support?
      9. What preventative security methods does your organization have to protect our environment during this agreement period?

      3.2.5 Create a service/ transaction agreement

      6 hours

      Input: Buyer's expectations, Separation roadmap

      Output: SLA for the purchasing organization

      Materials: Service Catalog Internal Service Level Agreement Template, M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership

      The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization post-transaction that your IT organization is agreeing to provide.

      1. Document the expected services and the related details in a service-level agreement.
      2. Provide the SLA to the purchasing organization.
      3. Obtain sign-off from both organizations on the level of service that is expected of IT.
      4. Update the M&A Separation Project Management Tool Excel or SharePoint document to reflect any additional items that the purchasing organization identified.

      *For organizations being purchased in their entirety, this activity may not be relevant.

      Modify the Service Catalog Internal Service Level Agreement with the agreed-upon terms of the SLA.

      Importance of estimating separation costs

      Change is the key driver of separation costs

      Separation costs are dependent on the following:
      • Meeting synergy targets – whether that be cost saving or growth related.
        • Employee-related costs, licensing, and reconfiguration fees play a huge part in meeting synergy targets.
      • Adjustments related to compliance or regulations – especially if there are changes to legal entities, reporting requirements, or risk mitigation standards.
      • Governance or third party–related support required to ensure timelines are met and the separation is a success.
      Separation costs vary by industry type.
      • Certain industries may have separation costs made up of mostly one type, differing from other industries, due to the complexity and demands of the transaction. For example:
        • Healthcare separation costs are mostly driven by regulatory, safety, and quality standards, as well as consolidation of the research and development function.
        • Energy and Utilities tend to have the lowest separation costs due to most transactions occurring within the same sector rather than as cross-sector investments. For example, oil and gas transactions tend to be for oil fields and rigs (strategic fixed assets), which can easily be added to the buyer’s portfolio.

      Separation costs are more related to the degree of change required than the size of the transaction.

      3.2.6 Estimate separation costs

      3-4 hours

      Input: Separation tasks, Transition team, Valuation of current IT environment, Valuation of target IT environment, Outputs from data room, Technical debt, Employees

      Output: List of anticipated costs required to support IT separation

      Materials: Separation task checklist, Separation roadmap, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to estimate the costs that will be associated with the separation. Identify and communicate a realistic figure to the larger M&A team within your company as early in the process as possible. This ensures that the funding required for the transaction is secured and budgeted for in the overarching transaction.

      1. On the associated slide in the M&A Sell Playbook, input:
        • Task
        • Domain
        • Cost type
        • Total cost amount
        • Level of certainty around the cost
      2. Provide a copy of the estimated costs to the company’s M&A team. Also provide any additional information identified earlier to help them understand the importance of those costs.

      Record the results in the M&A Sell Playbook.

      Employee transition planning

      Considering employee impact will be a huge component to ensure successful separation

      • Meet With Leadership
      • Plan Individual and Department Redeployment
      • Plan Individual and Department Layoffs
      • Monitor and Manage Departmental Effectiveness
      • For employees, the transition could mean:
        • Changing from their current role to a new role to meet requirements and expectations throughout the transition.
        • Being laid off because the role they are currently occupying has been made redundant.
      • It is important to plan for what the M&A separation needs will be and what the IT operational needs will be.
      • A lack of foresight into this long-term plan could lead to undue costs and headaches trying to retain critical staff, rehiring positions that were already let go, and keeping redundant employees longer then necessary.

      Info-Tech Insight

      Being transparent throughout the process is critical. Do not hesitate to tell employees the likelihood that their job may be made redundant. This will ensure a high level of trust and credibility for those who remain with the organization after the transaction.

      3.2.7 Create an employee transition plan

      3-4 hours

      Input: IT strategy, IT organizational design

      Output: Employee transition plans

      Materials: M&A Sell Playbook, Whiteboard, Sticky notes, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to create a transition plan for employees.

      1. Transition planning can be done at specific individual levels or more broadly to reflect a single role. Consider these four items in the transition plan:
        • Understand the direction of the employee transitions.
        • Identify employees that will be involved in the transition (moved or laid off).
        • Prepare to meet with employees.
        • Meet with employees.
      2. For each employee that will be facing some sort of change in their regular role, permanent or temporary, create a transition plan.
      3. For additional information on transitioning employees, review the blueprint Streamline Your Workforce During a Pandemic.

      **Note that if someone’s future role is a layoff, then there is no need to record anything for skills needed or method for skill development.

      Record the results in the M&A Sell Playbook.

      3.2.8 Create functional workplans for employees

      3-4 hours

      Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners

      Output: Employee functional workplans

      Materials: M&A Sell Playbook, Learning and development tools

      Participants: IT executive/CIO, IT senior leadership, IT management team, Company M&A team, Transition team

      The purpose of this activity is to create a functional workplan for the different employees so that they know what their key role and responsibilities are once the transaction occurs.

      1. First complete the transition plan from the previous activity (3.2.7) and the separation roadmap. Have these documents ready to review throughout this process.
      2. Identify the employees who will be transitioning to a new role permanently or temporarily. Creating a functional workplan is especially important for these employees.
      3. Identify the skills these employees need to have to support the separation. Record this in the corresponding slide in the M&A Sell Playbook.
      4. For each employee, identify someone who will be a point of contact for them throughout the transition.

      It is recommended that each employee have a functional workplan. Leverage the IT managers to support this task.

      Record the results in the M&A Sell Playbook.

      Metrics for separation

      Valuation & Due Diligence

      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target

      Execution & Value Realization

      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT separation
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      3.2.9 Align project metrics with identified tasks

      3-4 hours

      Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners, M&A goals

      Output: Separation-specific metrics to measure success

      Materials: Separation roadmap, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Transition team

      The purpose of this activity is to understand how to measure the success of the separation project by aligning metrics to each identified task.

      1. Review the M&A goals identified by the business. Your metrics will need to tie back to those business goals.
      2. Identify metrics that align to identified tasks and measure achievement of those goals. For each metric you consider, ask the following questions:
        • What is the main goal or objective that this metric is trying to solve?
        • What does success look like?
        • Does the metric promote the right behavior?
        • Is the metric actionable? What is the story you are trying to tell with this metric?
        • How often will this get measured?
        • Are there any metrics it supports or is supported by?

      Record the results in the M&A Sell Playbook.

      By the end of this mid-transaction phase you should:

      Have successfully evaluated your IT people, processes, and technology to determine a roadmap forward for separating or selling.

      Key outcomes from the Due Diligence & Preparation phase
      • Participate in due diligence activities to comply with regulatory and auditing standards and prepare employees for the transition.
      • Create a separation roadmap that considers the tasks that will need to be completed and the resources required to support separation.
      Key deliverables from the Due Diligence & Preparation phase
      • Drive value with a due diligence charter
      • Gather data room artifacts
      • Measure staff engagement
      • Assess culture
      • Create a carve-out roadmap
      • Prioritize separation tasks
      • Establish the separation roadmap
      • Identify the buyer’s IT expectations
      • Create a service/transaction agreement
      • Estimate separation costs
      • Create an employee transition plan
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      M&A Sell Blueprint

      Phase 4

      Execution & Value Realization

      Phase 1Phase 2Phase 3

      Phase 4

      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Monitor service agreements
      • Continually update the project plan
      • Confirm separation costs
      • Review IT’s transaction value
      • Conduct a transaction and separation SWOT
      • Review the playbook and prepare for future transactions

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Engage in Separation

      Day 4

      Establish the Transaction FoundationDiscover the Motivation for IntegrationPlan the Separation RoadmapPrepare Employees for the TransitionEngage in SeparationAssess the Transaction Outcomes (Must be within 30 days of transaction date)

      Activities

      • 0.1 Identify the rationale for the company's decision to pursue a divestiture/sale.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the divestiture/sale.
      • 1.2 Identify pain points and opportunities tied to the divestiture/sale.
      • 1.3 Establish the separation strategy.
      • 1.4 Create the due diligence charter.
      • 2.1 Prioritize separation tasks.
      • 2.2 Establish the separation roadmap.
      • 2.3 Establish and align project metrics with identified tasks.
      • 2.4 Estimate separation costs.
      • 3.1 Measure staff engagement
      • 3.2 Assess the current culture and identify the goal culture.
      • 3.3 Create an employee transition plan.
      • 3.4 Create functional workplans for employees.
      • S.1 Complete the separation by regularly updating the project plan.
      • S.2 Assess the service/technical transaction agreement.
      • 4.1 Confirm separation costs.
      • 4.2 Review IT’s transaction value.
      • 4.3 Conduct a transaction and separation SWOT.
      • 4.4 Review the playbook and prepare for future transactions.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Separation strategy
      3. Due diligence charter
      1. Separation roadmap and associated resourcing
      1. Engagement assessment
      2. Culture assessment
      3. Employee transition plans and workplans
      1. Evaluate service/technical transaction agreement
      2. Updated separation project plan
      1. SWOT of transaction
      2. M&A Sell Playbook refined for future transactions

      What is the Execution & Value Realization phase?

      Post-transaction state

      Once the transaction comes to a close, it’s time for IT to deliver on the critical separation tasks. As the selling organization in this transaction, you need to ensure you have a roadmap that properly enables the ongoing delivery of your IT environment while simultaneously delivering the necessary services to the purchasing organization.

      Throughout the separation transaction, some of the most common obstacles IT should prepare for include difficulty separating the IT environment, loss of key personnel, disengaged employees, and security/compliance issues.

      Post-transaction, the business needs to understands the value they received by engaging in the transaction and the ongoing revenue they might obtain as a result of the sale. You also need to ensure that the IT environment is functioning and mitigating any high-risk outcomes.

      Goal: To carry out the planned separation activities and deliver the intended value to the business.

      Execution Prerequisite Checklist

      Before coming into the Execution & Value Realization phase, you must have addressed the following:

      • Understand the rationale for the company's decisions to pursue a sale or divestiture and what opportunities or pain points the sale should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics.
      • Select a separation strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.
      • Create a carve-out roadmap.
      • Prioritize separation tasks.
      • Establish the separation roadmap.
      • Create employee transition plans.

      Before coming into the Execution & Value Realization phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Establish a due diligence charter.
      • Be able to valuate the IT environment and communicate IT’s value to the business.
      • Gather and present due diligence data room artifacts.
      • Measure staff engagement.
      • Assess and plan for culture.
      • Estimate separation costs.
      • Create functional workplans for employees.
      • Identify the buyer’s IT expectations.
      • Create a service/ transaction agreement.

      Separation checklists

      Prerequisite Checklist
      • Build the project plan for separation and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the sale or divestiture
      • Develop IT's sale/divestiture strategy
        • Determine goal opportunities
        • Create the mission and vision statements
        • Create the guiding principles
        • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Establish a service/technical transaction agreement
      • Plan and communicate culture changes
      • Create an employee transition plan
      • Assess baseline engagement
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Meet compliance and regulatory standards
      • Identify and assess all of IT's risks
      Applications
      • Prioritize and address critical applications
        • CRM
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
        • ERP
        • Email
      • Develop method of separating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      • Prioritize and address critical applications
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Build a data architecture roadmap
      • Analyze data sources and domains
      • Evaluate data storage (on-premises vs. cloud)
      • Develop an enterprise content management strategy and roadmap
      • Ensure cleanliness/usability of data sets
      • Identify data sets that can remain operational if reduced/separated
      • Develop reporting and analytics capabilities
      • Confirm data strategy
      Operations
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Separate/terminate phone lists and extensions
      • Split email address books
      • Communicate helpdesk/service desk information

      Separation checklists (continued)

      Infrastructure
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      • Determine network access concerns
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Identify the licensing grant
      • Rationalize vendor services and solutions
      People
      • Design an IT operating model
      • Design your future IT organizational structure
      • Conduct a RACI for prioritized activities
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Define new job descriptions with meaningful roles and responsibilities
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Identify projects to be on hold
      • Communicate project intake process
      • Reprioritize projects
      Products & Services
      • Redefine service catalog
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      • Plan service-level agreements
      Security
      • Conduct a security assessment
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be changed/terminated
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies
      • Evaluate current process models

      Execution & Value Realization

      Step 4.1

      Execute the Transaction

      Activities

      • 4.1.1 Monitor service agreements
      • 4.1.2 Continually update the project plan

      This step will walk you through the following activities:

      • Monitor service agreements
      • Continually update the project plan

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Outcomes of Step

      Successfully execute the separation of the IT environments and update the project plan, strategizing against any roadblocks as they come.

      Key concerns to monitor during separation

      If you are entering the transaction at this point, consider and monitor the following three items above all else.

      Your IT environment, reputation as an IT leader, and impact on key staff will depend on monitoring these aspects.

      • Risk & Security. Make sure that the channels of communication between the purchasing organization and your IT environment are properly determined and protected. This might include updating or removing employees’ access to certain programs.
      • Retaining Employees. Employees who do not see a path forward in the organization or who feel that their skills are being underused will be quick to move on. Make sure they are engaged before, during, and after the transaction to avoid losing employees.
      • IT Environment Dependencies. Testing the IT environment several times and obtaining sign-off from auditors that this has been completed correctly should be completed well before the transaction occurs. Have a strong architecture outlining technical dependencies.

      For more information, review:

      • Reduce and Manage Your Organization’s Insider Threat Risk
      • Map Technical Skills for a Changing Infrastructure Operations Organization
      • Build a Data Architecture Roadmap

      4.1.1 Monitor service agreements

      3-6 months

      Input: Original service agreement, Risk register

      Output: Service agreement confirmed

      Materials: Original service agreement

      Participants: IT executive/CIO, IT senior leadership, External organization IT senior leadership

      The purpose of this activity is to monitor the established service agreements on an ongoing basis. Your organization is most at risk during the initial months following the transaction.

      1. Ensure the right controls exist to prevent the organization from unnecessarily opening itself up to risks.
      2. Meet with the purchasing organization/subsidiary three months after the transaction to ensure that everyone is satisfied with the level of services provided.
      3. This is not a quick and completed activity, but one that requires ongoing monitoring. Repeatedly identify potential risks worth mitigating.

      For additional information and support for this activity, see the blueprint Build an IT Risk Management Program.

      4.1.2 Continually update the project plan

      Reoccurring basis following transition

      Input: Prioritized separation tasks, Separation RACI, Activity owners

      Output: Updated separation project plan

      Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)

      Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team

      The purpose of this activity is to ensure that the project plan is continuously updated as your transaction team continues to execute on the various components outlined in the project plan.

      1. Set a regular cadence for the transaction team to meet, update the project plan, review the status of the various separation task items, and strategize how to overcome any roadblocks.
      2. Employ governance best practices in these meetings to ensure decisions can be made effectively and resources allocated strategically.

      Record the updates in the M&A Separation Project Management Tool (SharePoint).

      Record the updates in the M&A Separation Project Management Tool (Excel).

      Execution & Value Realization

      Step 4.2

      Reflection and Value Realization

      Activities

      • 4.2.1 Confirm separation costs
      • 4.2.2 Review IT’s transaction value
      • 4.2.3 Conduct a transaction and separation SWOT
      • 4.2.4 Review the playbook and prepare for future transactions

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team

      Outcomes of Step

      Review the value that IT was able to generate around the transaction and strategize about how to improve future selling or separating transactions.

      4.2.1 Confirm separation costs

      3-4 hours

      Input: Separation tasks, Carve-out roadmap, Transition team, Previous RACI, Estimated separation costs

      Output: Actual separation costs

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Transaction team, Company M&A team

      The purpose of this activity is to confirm the associated costs around separation. While the separation costs would have been estimated previously, it’s important to confirm the costs that were associated with the separation in order to provide an accurate and up-to-date report to the company’s M&A team.

      1. Taking all the original items identified previously in activity 3.2.6, identify if there were changes in the estimated costs. This can be an increase or a decrease.
      2. Ensure that each cost has a justification for why the cost changed from the original estimation.

      Record the results in the M&A Sell Playbook.

      Track cost savings and revenue generation

      Throughout the transaction, the business would have communicated its goals, rationales, and expectations for the transaction. Sometimes this is done explicitly, and other times the information is implicit. Either way, IT needs to ensure that metrics have been defined and are measuring the intended value that the business expects. Ensure that the benefits realized to the organization are being communicated regularly and frequently.

      1. Define Metrics: Select metrics to track synergies through the separation.
        1. You can track value by looking at percentages of improvement in process-level metrics depending on the savings or revenue being pursued.
        2. For example, if the value being pursued is decreasing costs, metrics could range from capacity to output, highlighting that the output remains high despite smaller IT environments.
      2. Prioritize Value-Driving Initiatives: Estimate the cost and benefit of each initiative's implementation to compare the amount of business value to the cost. The benefits and costs should be illustrated at a high level. Estimating the exact dollar value of fulfilling a synergy can be difficult and misleading.
          Steps
        • Determine the benefits that each initiative is expected to deliver.
        • Determine the high-level costs of implementation (capacity, time, resources, effort).
      3. Track Cost Savings and Revenue Generation: Develop a detailed workplan to resource the roadmap and track where costs are saved and revenue is generated as the initiatives are undertaken.

      4.2.2 Review IT’s transaction value

      3-4 hours

      Input: Prioritized separation tasks, Separation RACI, Activity owners, M&A company goals

      Output: Transaction value

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company's M&A team

      The purpose of this activity is to track how your IT organization performed against the originally identified metrics.

      1. If your organization did not have the opportunity to identify metrics, determine from the company M&A what those metrics might be. Review activity 3.2.9 for more information on metrics.
      2. Identify whether the metric (which should support a goal) was at, below, or above the original target metric. This is a very critical task for IT to complete because it allows IT to confirm that they were successful in the transaction and that the business can count on them in future transactions.
      3. Be sure to record accurate and relevant information on why the outcomes (good or bad) are supporting the M&A goals set out by the business.

      Record the results in the M&A Sell Playbook.

      4.2.3 Conduct a transaction and separation SWOT

      2 hours

      Input: Separation costs, Retention rates, Value that IT contributed to the transaction

      Output: Strengths, weaknesses, opportunities, and threats

      Materials: Flip charts, Markers, Sticky notes

      Participants: IT executive/CIO, IT senior leadership, Business transaction team

      The purpose of this activity is to assess the positive and negative elements of the transaction.

      1. Consider the internal and external elements that could have impacted the outcome of the transaction.
        • Strengths. Internal characteristics that are favorable as they relate to your development environment.
        • Weaknesses Internal characteristics that are unfavorable or need improvement.
        • Opportunities External characteristics that you may use to your advantage.
        • Threats External characteristics that may be potential sources of failure or risk.

      Record the results in the M&A Sell Playbook.

      M&A Sell Playbook review

      With an acquisition complete, your IT organization is now more prepared then ever to support the business through future M&As

      • Now that the transaction is more than 80% complete, take the opportunity to review the key elements that worked well and the opportunities for improvement.
      • Critically examine the M&A Sell Playbook your IT organization created and identify what worked well to help the transaction and where your organization could adjust to do better in future transactions.
      • If your organization were to engage in another sale or divestiture under your IT leadership, how would you go about the transaction to make sure the company meets its goals?

      4.2.4 Review the playbook and prepare for future transactions

      4 hours

      Input: Transaction and separation SWOT

      Output: Refined M&A playbook

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to revise the playbook and ensure it is ready to go for future transactions.

      1. Using the outputs from the previous activity, 4.2.3, determine what strengths and opportunities there were that should be leveraged in the next transaction.
      2. Likewise, determine which threats and weaknesses could be avoided in the future transactions.
        Remember, this is your M&A Sell Playbook, and it should reflect the most successful outcome for you in your organization.

      Record the results in the M&A Sell Playbook.

      By the end of this post-transaction phase you should:

      Have completed the separation post-transaction and be fluidly delivering the critical value that the business expected of IT.

      Key outcomes from the Execution & Value Realization phase
      • Ensure the separation tasks are being completed and that any blockers related to the transaction are being removed.
      • Determine where IT was able to realize value for the business and demonstrate IT’s involvement in meeting target goals.
      Key deliverables from the Execution & Value Realization phase
      • Monitor service agreements
      • Continually update the project plan
      • Confirm separation costs
      • Review IT’s transaction value
      • Conduct a transaction and separation SWOT
      • Review the playbook and prepare for future transactions

      Summary of Accomplishment

      Problem Solved

      Congratulations, you have completed the M&A Sell Blueprint!

      Rather than reacting to a transaction, you have been proactive in tackling this initiative. You now have a process to fall back on in which you can be an innovative IT leader by suggesting how and why the business should engage in a separation or sale transaction. You have:

      • Created a standardized approach for how your IT organization should address divestitures or sales.
      • Retained critical staff and complied with any regulations throughout the transaction.
      • Delivered on the separation project plan successfully and communicated IT’s transaction value to the business.

      Now that you have done all of this, reflect on what went well and what can be improved if you were to engage in a similar divestiture or sale again.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8899

      Research Contributors and Experts

      Ibrahim Abdel-Kader
      Research Analyst | CIO
      Info-Tech Research Group
      Brittany Lutes
      Senior Research Analyst | CIO
      Info-Tech Research Group
      John Annand
      Principal Research Director | Infrastructure
      Info-Tech Research Group
      Scott Bickley
      Principal Research Director | Vendor Management
      Info-Tech Research Group
      Cole Cioran
      Practice Lead | Applications
      Info-Tech Research Group
      Dana Daher
      Research Analyst | Strategy & Innovation
      Info-Tech Research Group
      Eric Dolinar
      Manager | M&A Consulting
      Deloitte Canada
      Christoph Egel
      Director, Solution Design & Deliver
      Cooper Tire & Rubber Company
      Nora Fisher
      Vice President | Executive Services Advisory
      Info-Tech Research Group
      Larry Fretz
      Vice President | Industry
      Info-Tech Research Group

      Research Contributors and Experts

      David Glazer
      Vice President of Analytics
      Kroll
      Jack Hakimian
      Senior Vice President | Workshops and Delivery
      Info-Tech Research Group
      Gord Harrison
      Senior Vice President | Research & Advisory
      Info-Tech Research Group
      Valence Howden
      Principal Research Director | CIO
      Info-Tech Research Group
      Jennifer Jones
      Research Director | Industry
      Info-Tech Research Group
      Nancy McCuaig
      Senior Vice President | Chief Technology and Data Office
      IGM Financial Inc.
      Carlene McCubbin
      Practice Lead | CIO
      Info-Tech Research Group
      Kenneth McGee
      Research Fellow | Strategy & Innovation
      Info-Tech Research Group
      Nayma Naser
      Associate
      Deloitte
      Andy Neill
      Practice Lead | Data & Analytics, Enterprise Architecture
      Info-Tech Research Group

      Research Contributors and Experts

      Rick Pittman
      Vice President | Research
      Info-Tech Research Group
      Rocco Rao
      Research Director | Industry
      Info-Tech Research Group
      Mark Rosa
      Senior Vice President & Chief Information Officer
      Mohegan Gaming and Entertainment
      Tracy-Lynn Reid
      Research Lead | People & Leadership
      Info-Tech Research Group
      Jim Robson
      Senior Vice President | Shared Enterprise Services (retired)
      Great-West Life
      Steven Schmidt
      Senior Managing Partner Advisory | Executive Services
      Info-Tech Research Group
      Nikki Seventikidis
      Senior Manager | Finance Initiative & Continuous Improvement
      CST Consultants Inc.
      Allison Straker
      Research Director | CIO
      Info-Tech Research Group
      Justin Waelz
      Senior Network & Systems Administrator
      Info-Tech Research Group
      Sallie Wright
      Executive Counselor
      Info-Tech Research Group

      Bibliography

      “5 Ways for CIOs to Accelerate Value During Mergers and Acquisitions.” Okta, n.d. Web.

      Altintepe, Hakan. “Mergers and acquisitions speed up digital transformation.” CIO.com, 27 July 2018. Web.

      “America’s elite law firms are booming.” The Economist, 15 July 2021. Web.

      Barbaglia, Pamela, and Joshua Franklin. “Global M&A sets Q1 record as dealmakers shape post-COVID world.” Nasdaq, 1 April 2021. Web.

      Boyce, Paul. “Mergers and Acquisitions Definition: Types, Advantages, and Disadvantages.” BoyceWire, 8 Oct. 2020. Web.

      Bradt, George. “83% Of Mergers Fail -- Leverage A 100-Day Action Plan For Success Instead.” Forbes, 27 Jan. 2015. Web.

      Capgemini. “Mergers and Acquisitions: Get CIOs, IT Leaders Involved Early.” Channel e2e, 19 June 2020. Web.

      Chandra, Sumit, et al. “Make Or Break: The Critical Role Of IT In Post-Merger Integration.” IMAA Institute, 2016. Web.

      Deloitte. “How to Calculate Technical Debt.” The Wall Street Journal, 21 Jan. 2015. Web.

      Ernst & Young. “IT As A Driver Of M&A Success.” IMAA Institute, 2017. Web.

      Fernandes, Nuno. “M&As In 2021: How To Improve The Odds Of A Successful Deal.” Forbes, 23 March 2021. Web.

      “Five steps to a better 'technology fit' in mergers and acquisitions.” BCS, 7 Nov. 2019. Web.

      Fricke, Pierre. “The Biggest Opportunity You’re Missing During an M&Aamp; IT Integration.” Rackspace, 4 Nov. 2020. Web.

      Garrison, David W. “Most Mergers Fail Because People Aren't Boxes.” Forbes, 24 June 2019. Web.

      Harroch, Richard. “What You Need To Know About Mergers & Acquisitions: 12 Key Considerations When Selling Your Company.” Forbes, 27 Aug. 2018. Web.

      Hope, Michele. “M&A Integration: New Ways To Contain The IT Cost Of Mergers, Acquisitions And Migrations.” Iron Mountain, n.d. Web.

      “How Agile Project Management Principles Can Modernize M&A.” Business.com, 13 April 2020. Web.

      Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 Jan. 2013. Web.

      Kanter, Rosabeth Moss. “What We Can Learn About Unity from Hostile Takeovers.” Harvard Business Review, 12 Nov. 2020. Web.

      Koller, Tim, et al. “Valuation: Measuring and Managing the Value of Companies, 7th edition.” McKinsey & Company, 2020. Web.

      Labate, John. “M&A Alternatives Take Center Stage: Survey.” The Wall Street Journal, 30 Oct. 2020. Web.

      Lerner, Maya Ber. “How to Calculate ROI on Infrastructure Automation.” DevOps.com, 1 July 2020. Web.

      Loten, Angus. “Companies Without a Tech Plan in M&A Deals Face Higher IT Costs.” The Wall Street Journal, 18 June 2019. Web.

      Low, Jia Jen. “Tackling the tech integration challenge of mergers today” Tech HQ, 6 Jan. 2020. Web.

      Lucas, Suzanne. “5 Reasons Turnover Should Scare You.” Inc. 22 March 2013. Web.

      “M&A Trends Survey: The future of M&A. Deal trends in a changing world.” Deloitte, Oct. 2020. Web.

      Maheshwari, Adi, and Manish Dabas. “Six strategies tech companies are using for successful divesting.” EY, 1 Aug. 2020. Web.

      Majaski, Christina. “Mergers and Acquisitions: What's the Difference?” Investopedia, 30 Apr. 2021.

      “Mergers & Acquisitions: Top 5 Technology Considerations.” Teksetra, 21 Jul. 2020. Web.

      “Mergers Acquisitions M&A Process.” Corporate Finance Institute, n.d. Web.

      “Mergers and acquisitions: A means to gain technology and expertise.” DLA Piper, 2020. Web.

      Nash, Kim S. “CIOs Take Larger Role in Pre-IPO Prep Work.” The Wall Street Journal, 5 March 2015. Web.

      O'Connell, Sean, et al. “Divestitures: How to Invest for Success.” McKinsey, 1 Aug. 2015. Web

      Paszti, Laila. “Canada: Emerging Trends In Information Technology (IT) Mergers And Acquisitions.” Mondaq, 24 Oct. 2019. Web.

      Patel, Kiison. “The 8 Biggest M&A Failures of All Time” Deal Room, 9 Sept. 2021. Web.

      Peek, Sean, and Paula Fernandes. “What Is a Vision Statement?” Business News Daily, 7 May 2020. Web.

      Ravid, Barak. “How divestments can re-energize the technology growth story.” EY, 14 July 2021. Web.

      Ravid, Barak. “Tech execs focus on growth amid increasingly competitive M&A market.” EY, 28 April 2021. Web.

      Resch, Scott. “5 Questions with a Mergers & Acquisitions Expert.” CIO, 25 June 2019. Web.

      Salsberg, Brian. “Four tips for estimating one-time M&A integration costs.” EY, 17 Oct. 2019. Web.

      Samuels, Mark. “Mergers and acquisitions: Five ways tech can smooth the way.” ZDNet, 15 Aug. 2018. Web.

      “SAP Divestiture Projects: Options, Approach and Challenges.” Cognizant, May, 2014. Web.

      Steeves, Dave. “7 Rules for Surviving a Merger & Acquisition Technology Integration.” Steeves and Associates, 5 Feb. 2020. Web.

      Tanaszi, Margaret. “Calculating IT Value in Business Terms.” CSO, 27 May 2004. Web.

      “The CIO Playbook. Nine Steps CIOs Must Take For Successful Divestitures.” SNP, 2016. Web.

      “The Role of IT in Supporting Mergers and Acquisitions.” Cognizant, Feb. 2015. Web.

      Torres, Roberto. “M&A playbook: How to prepare for the cost, staff and tech hurdles.” CIO Dive, 14 Nov. 2019. Web.

      “Valuation Methods.” Corporate Finance Institute, n.d. Web.

      Weller, Joe. “The Ultimate Guide to the M&A Process for Buyers and Sellers.” Smartsheet, 16 May 2019. Web.

      Build an IT Risk Taxonomy

      • Buy Link or Shortcode: {j2store}197|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Business leaders, driven by the need to make more risk-informed decisions, are putting pressure on IT to provide more timely and consistent risk reporting.
      • IT risk managers need to balance the emerging threat landscape with not losing sight of the risks of today.
      • IT needs to strengthen IT controls and anticipate risks in an age of disruption.

      Our Advice

      Critical Insight

      A common understanding of risks, threats, and opportunities gives organizations the flexibility and agility to adapt to changing business conditions and drive corporate value.

      Impact and Result

      • Use this blueprint as a baseline to build a customized IT risk taxonomy suitable for your organization.
      • Learn about the role and drivers of integrated risk management and the benefits it brings to enterprise decision-makers.
      • Discover how to set up your organization up for success by understanding how risk management links to organizational strategy and corporate performance.

      Build an IT Risk Taxonomy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build an IT Risk Taxonomy – Develop a common approach to managing risks to enable faster, more effective decision making.

      Learn how to develop an IT risk taxonomy that will remain relevant over time while providing the granularity and clarity needed to make more effective risk-based decisions.

      • Build an IT Risk Taxonomy – Phases 1-3

      2. Build an IT Risk Taxonomy Guideline and Template – A set of tools to customize and design an IT risk taxonomy suitable for your organization.

      Leverage these tools as a starting point to develop risk levels and definitions appropriate to your organization. Take a collaborative approach when developing your IT risk taxonomy to gain greater acceptance and understanding of accountability.

      • IT Risk Taxonomy Committee Charter Template
      • Build an IT Risk Taxonomy Guideline
      • Build an IT Risk Taxonomy Definitions
      • Build an IT Risk Taxonomy Design Template

      3. IT Risk Taxonomy Workbook – A place to complete activities and document decisions that may need to be communicated.

      Use this workbook to document outcomes of activities and brainstorming sessions.

      • Build an IT Risk Taxonomy Workbook

      4. IT Risk Register – An internal control tool used to manage IT risks. Risk levels archived in this tool are instrumental to achieving an integrated and holistic view of risks across an organization.

      Leverage this tool to document risk levels, risk events, and controls. Smaller organizations can leverage this tool for risk management while larger organizations may find this tool useful to structure and define risks prior to using a risk management software tool.

      • Risk Register Tool

      Infographic

      Workshop: Build an IT Risk Taxonomy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review IT Risk Fundamentals and Governance

      The Purpose

      Review IT risk fundamentals and governance.

      Key Benefits Achieved

      Learn how enterprise risk management and IT risk management intersect and the role the IT taxonomy plays in integrated risk management.

      Activities

      1.1 Discuss risk fundamentals and the benefits of integrated risk.

      1.2 Create a cross-functional IT taxonomy working group.

      Outputs

      IT Risk Taxonomy Committee Charter Template

      Build an IT Risk Taxonomy Workbook

      2 Identify Level 1 Risk Types

      The Purpose

      Identify suitable IT level 1 risk types.

      Key Benefits Achieved

      Level 1 IT risk types are determined and have been tested against ERM level one risk types.

      Activities

      2.1 Discuss corporate strategy, business risks, macro trends, and organizational opportunities and constraints.

      2.2 Establish level 1 risk types.

      2.3 Test soundness of IT level 1 types by mapping to ERM level 1 types.

      Outputs

      Build an IT Risk Taxonomy Workbook

      3 Identify Level 2 and Level 3 Risk Types

      The Purpose

      Define level 2 and level 3 risk types.

      Key Benefits Achieved

      Level 2 and level 3 risk types have been determined.

      Activities

      3.1 Establish level 2 risk types.

      3.2 Establish level 3 risk types (and level 4 if appropriate for your organization).

      3.3 Begin to test by working backward from controls to ensure risk events will aggregate consistently.

      Outputs

      Build an IT Risk Taxonomy Design Template

      Risk Register Tool

      4 Monitor, Report, and Respond to IT Risk

      The Purpose

      Test the robustness of your IT risk taxonomy by populating the risk register with risk events and controls.

      Key Benefits Achieved

      Your IT risk taxonomy has been tested and your risk register has been updated.

      Activities

      4.1 Continue to test robustness of taxonomy and iterate if necessary.

      4.2 Optional activity: Draft your IT risk appetite statements.

      4.3 Discuss communication and continual improvement plan.

      Outputs

      Build an IT Risk Taxonomy Design Template

      Risk Register Tool

      Build an IT Risk Taxonomy Workbook

      Further reading

      Build an IT Risk Taxonomy

      If integrated risk is your destination, your IT risk taxonomy is the road to get you there.

      Analyst Perspective

      Donna Bales.

      The pace and uncertainty of the current business environment introduce new and emerging vulnerabilities that can disrupt an organization’s strategy on short notice.

      Having a long-term view of risk while navigating the short term requires discipline and a robust and strategic approach to risk management.

      Managing emerging risks such as climate risk, the impact of digital disruption on internal technology, and the greater use of third parties will require IT leaders to be more disciplined in how they manage and communicate material risks to the enterprise.

      Establishing a hierarchical common language of IT risks through a taxonomy will facilitate true aggregation and integration of risks, enabling more effective decision making. This holistic, disciplined approach to risk management helps to promote a more sustainable risk culture across the organization while adding greater rigor at the IT control level.

      Donna Bales
      Principal Research Director
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      IT has several challenges when managing and responding to risk events:

      • Business leaders, driven by the need to make more risk-informed decisions, are putting pressure on IT to provide more timely and consistent risk reporting.
      • Navigating today’s ever-evolving threat landscape is complex. IT risk managers need to balance the emerging threat landscape while not losing sight of the risks of today.
      • IT needs to strengthen IT controls and anticipate risks in an age of disruption.

      Many IT organizations encounter obstacles in these areas:

      • Ensuring an integrated, well-coordinated approach to risk management across the organization.
      • Developing an IT risk taxonomy that will remain relevant over time while providing sufficient granularity and definitional clarity.
      • Gaining acceptance and ensuring understanding of accountability. Involving business leaders and a wide variety of risk owners when developing your IT risk taxonomy will lead to greater organizational acceptance.

      .

      • Take a collaborative approach when developing your IT risk taxonomy to gain greater acceptance and understanding of accountability.
      • Spend the time to fully analyze your current and future threat landscape when defining your level 1 IT risks and consider the causal impact and complex linkages and intersections.
      • Recognize that the threat landscape will continue to evolve and that your IT risk taxonomy is a living document that must be continually reviewed and strengthened.

      Info-Tech Insight

      A common understanding of risks, threats, and opportunities gives organizations the flexibility and agility to adapt to changing business conditions and drive corporate value.

      Increasing threat landscape

      The risk landscape is continually evolving, putting greater pressure on the risk function to work collaboratively throughout the organization to strengthen operational resilience and minimize strategic, financial, and reputational impact.

      Financial Impact

      Strategic Risk

      Reputation Risk

      In IBM’s 2021 Cost of a Data Breach Report, the Ponemon Institute found that data security breaches now cost companies $4.24 million per incident on average – the highest cost in the 17-year history of the report.

      58% percent of CROs who view inability to manage cyber risks as a top strategic risk.

      EY’s 2022 Global Bank Risk Management survey revealed that Chief Risk Officers (CROs) view the inability to manage cyber risk and the inability to manage cloud and data risk as the top strategic risks.

      Protiviti’s 2023 Executive Perspectives on Top Risks survey featured operational resilience within its top ten risks. An organization’s failure to be sufficiently resilient or agile in a crisis can significantly impact operations and reputation.

      Persistent and emerging threats

      Organizations should not underestimate the long-term impact on corporate performance if emerging risks are not fully understood, controlled, and embedded into decision-making.

      Talent Risk

      Sustainability

      Digital Disruption

      Protiviti’s 2023 Executive Perspectives on Top Risks survey revealed talent risk as the top risk organizations face, specifically organizations’ ability to attract and retain top talent. Of the 38 risks in the survey, it was the only risk issue rated at a “significant impact” level.

      Sustainability is at the top of the risk agenda for many organizations. In EY’s 2022 Global Bank Risk Management survey, environmental, social, and governance (ESG) risks were identified as a risk focus area, with 84% anticipating it to increase in priority over the next three years. Yet Info-Tech’s Tech Trends 2023 report revealed that only 24% of organizations could accurately report on their carbon footprint.

      Source: Info-Tech 2023 Tech Trends Report

      The risks related to digital disruption are vast and evolving. In the short term, risks surface in compliance and skills shortage, but Protiviti’s 2023 Executive Perspectives survey shows that in the longer term, executives are concerned that the speed of change and market forces may outpace an organization’s ability to compete.

      Build an IT risk taxonomy: As technology and digitization continue to advance, risk management practices must also mature. To strengthen operational and financial resiliency, it is essential that organizations move away from a siloed approach to IT risk management wart an integrated approach. Without a common IT risk taxonomy, effective risk assessment and aggregation at the enterprise level is not possible.

      Blueprint benefits

      IT Benefits

      Business Benefits

      • Simple, customizable approach to build an IT risk taxonomy
      • Improved satisfaction with IT for senior leadership and business units
      • Greater ability to respond to evolving threats
      • Improved understanding of IT’s role in enterprise risk management (ERM)
      • Stronger, more reliable internal control framework
      • Reduced operational surprises and failures
      • More dynamic decision making
      • More proactive risk responses
      • Improve transparency and comparability of risks across silos
      • Better financial resilience and confidence in meeting regulatory requirements
      • More relevant risk assurance for key stakeholders

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      IT Risk Taxonomy Committee Charter Template

      Create a cross-functional IT risk taxonomy committee.

      The image contains a screenshot of the IT risk taxonomy committee charter template.

      Build an IT Risk Taxonomy Guideline

      Use IT risk taxonomy as a baseline to build your organization’s approach.

      The image contains a screenshot of the build an it risk taxonomy guideline.

      Build an IT Risk Taxonomy Design Template

      Use this template to design and test your taxonomy.

      The image contains a screenshot of the build an IT risk taxonomy design template.

      Risk Register Tool

      Update your risk register with your IT risk taxonomy.

      The image contains a screenshot of the risk register tool.

      Key deliverable:

      Build an IT Risk Taxonomy Workbook

      Use the tools and activities in each phase of the blueprint to customize your IT risk taxonomy to suit your organization’s needs.

      The image contains a screenshot of the build an IT risk taxonomy workbook.

      Benefit from industry-leading best practices

      As a part of our research process, we used the COSO, ISO 31000, and COBIT 2019 frameworks. Contextualizing IT risk management within these frameworks ensures that our project-focused approach is grounded in industry-leading best practices for managing IT risk.

      COSO’s Enterprise Risk Management —Integrating with Strategy and Performance addresses the evolution of enterprise risk management and the need for organizations to improve their approach to managing risk to meet the demands of an evolving business environment.

      ISO 31000 – Risk Management can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats, and effectively allocate and use resources for risk treatment.

      COBIT 2019’s IT functions were used to develop and refine the ten IT risk categories used in our top-down risk identification methodology.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      Phase 1 Phase 2 Phase 3

      Call #1: Review risk management fundamentals.

      Call #2: Review the role of an IT risk taxonomy in risk management.

      Call #3: Establish a cross-functional team.

      Calls #4-5: Identify level 1 IT risk types. Test against enterprise risk management.

      Call #6: Identify level 2 and level 3 risk types.

      Call #7: Align risk events and controls to level 3 risk types and test.

      Call #8: Update your risk register and communicate taxonomy internally.

      A Guided Implementation (GI) is a series

      of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 8 calls over the course of 3 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5

      Review IT Risk Fundamentals and Governance

      Identify Level 1 IT Risk Types

      Identify Level 2 and Level 3 Risk Types

      Monitor, Report, and Respond to IT Risk

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Discuss risk fundamentals and the benefits of integrated risk.

      1.2 Create a cross-functional IT taxonomy working group.

      2.1 Discuss corporate strategy, business risks, macro trends, and organizational opportunities and constraints.

      2.2 Establish level 1 risk types.

      2.3 Test soundness of IT level 1 types by mapping to ERM level 1 types.

      3.1 Establish level 2 risk types.

      3.2 Establish level 3 risk types (and level 4 if appropriate for your organization).

      3.3 Begin to test by working backward from controls to ensure risk events will aggregate consistently.

      4.1 Continue to test robustness of taxonomy and iterate if necessary.

      4.2 Optional activity: Draft your IT risk appetite statements.

      4.3 Discuss communication and continual improvement plan.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables
      1. T Risk Taxonomy Committee Charter Template
      2. Build an IT Risk Taxonomy Workbook
      1. Build an IT Risk Taxonomy Workbook
      1. IT Risk Taxonomy Design Template
      2. Risk Register
      1. IT Risk Taxonomy Design Template
      2. Risk Register
      3. Build an IT Risk Taxonomy Workbook
      1. Workshop Report

      Phase 1

      Understand Risk Management Fundamentals

      Phase 1

      Phase 2

      Phase 3

      • Governance, Risk, and Compliance
      • Enterprise Risk Management
      • Enterprise Risk Appetite
      • Risk Statements and Scenarios
      • What Is a Risk Taxonomy?
      • Functional Role of an IT Risk Taxonomy
      • Connection to Enterprise Risk Management
      • Establish Committee
      • Steps to Define IT Risk Taxonomy
      • Define Level 1
      • Test Level 1
      • Define Level 2 and 3
      • Test via Your Control Framework

      Governance, risk, and compliance (GRC)

      Risk management is one component of an organization’s GRC function.

      GRC principles are important tools to support enterprise management.

      Governance sets the guardrails to ensure that the enterprise is in alignment with standards, regulations, and board decisions. A governance framework will communicate rules and expectations throughout the organization and monitor adherence.

      Risk management is how the organization protects and creates enterprise value. It is an integral part of an organization’s processes and enables a structured decision-making approach.

      Compliance is the process of adhering to a set of guidelines; these could be external regulations and guidelines or internal corporate policies.

      GRC principles are tightly bound and continuous

      The image contains a screenshot of a continuous circle that is divided into three parts: risk, compliance, and governance.

      Enterprise risk management

      Regardless of size or structure, every organization makes strategic and operational decisions that expose it to uncertainties.

      Enterprise risk management (ERM) is a strategic business discipline that supports the achievement of an organization’s objectives by addressing the full spectrum of its risks and managing the combined impact of those risks as an interrelated risk portfolio (RIMS).

      An ERM is program is crucial because it will:

      • Help shape business objectives, drive revenue growth, and execute risk-based decisions.
      • Enable a deeper understanding of risks and assessment of current risk profile.
      • Support forward-looking risk management and more constructive dialogue with the board and regulatory agencies.
      • Provide insight on the robustness and efficacy of risk management processes, tools, and controls.
      • Drive a positive risk culture.

      ERM is supported by strategy, effective processes, technology, and people

      The image contains a screenshot that demonstrates how ERM is supported by strategy, effective processes, technology, and people.

      Risk frameworks

      Risk frameworks are leveraged by the industry to “provide a structure and set of definitions to allow enterprises of all types and sizes to understand and better manage their risk environments.” COSO Enterprise Risk Management, 2nd edition

      • Many organizations lean on the Committee of Sponsoring Organizations’ Enterprise Risk Management framework (COSO ERM) and ISO 31000 to view organizational risks from an enterprise perspective.
      • Prior to the introduction of standardized risk frameworks, it was difficult to quantify the impact of a risk event on the entire enterprise, as the risk was viewed in a silo or as an individual risk component.
      • Recently, the National Institute of Science and Technology (NIST) published guidance on developing an enterprise risk management approach. The guidance helps to bridge the gap between best practices in enterprise risk management and processes and control techniques that cybersecurity professionals use to meet regulatory cybersecurity risk requirements.

      The image contains a screenshot of NIST ERM approach to strategic risk.

      Source: National Institute of Standards and Technology

      New NIST guidance (NISTIR 8286) emphasizes the complexity of risk management and the need for the risk management process to be carried out seamlessly across three tiers with the overall objective of continuous improvement.

      Enterprise risk appetite

      “The amount of risk an organization is willing to take in pursuit of its objectives”

      – Robert R. Moeller, COSO ERM Framework Model
      • A primary role of the board and senior management is to balance value creation with effectively management of enterprise risks.
      • As part of this role, the board will approve the enterprise’s risk appetite. Placing this responsibility with the board ensures that the risk appetite is aligned with the company’s strategic objectives.
      • The risk appetite is used throughout the organization to assess and respond to individual risks, acting as a constant to make sure that risks are managed within the organization’s acceptable limits.
      • Each year, or in reaction to a risk trigger, the enterprise risk appetite will be updated and approved by the board.
      • Risk appetite will vary across organizations for several reasons, such as industry, company culture, competitors, the nature of the objectives pursued, and financial strength.

      Change or new risks » adjust enterprise risk profile » adjust risk appetite

      Risk profile vs. risk appetite

      Risk profile is the broad parameters an organization considers in executing its business strategy. Risk appetite is the amount of risk an entity is willing to accept in pursuit of its strategic objectives. The risk appetite can be used to inform the risk profile or vice versa. Your organization’s risk culture informs and is used to communicate both.

      Risk Tolerant

      Moderate

      Risk Averse

      • You have no compliance requirements.
      • You have no sensitive data.
      • Customers do not expect you to have strong security controls.
      • Revenue generation and innovative products take priority and risk is acceptable.
      • The organization does not have remote locations.
      • It is likely that your organization does not operate within the following industries:
        • Finance
        • Healthcare
        • Telecom
        • Government
        • Research
        • Education
      • You have some compliance requirements, such as:
        • HIPAA
        • PIPEDA
      • You have sensitive data and are required to retain records.
      • Customers expect strong security controls.
      • Information security is visible to senior leadership.
      • The organization has some remote locations.
      • Your organization most likely operates within the following industries:
        • Government
        • Research
        • Education
      • You have multiple strict compliance and/or regulatory requirements.
      • You house sensitive data, such as medical records.
      • Customers expect your organization to maintain strong and current security controls.
      • Information security is highly visible to senior management and public investors.
      • The organization has multiple remote locations.
      • Your organization operates within the following industries:
        • Finance
        • Healthcare
        • Telecom

      Where the IT risk appetite fits into the risk program

      • Your organization’s strategy and associated risk appetite cascade down to each business department. Overall strategy and risk appetite also set a strategy and risk appetite for each department.
      • Both risk appetite and risk tolerances set boundaries for how much risk an organization is willing or prepared to take. However, while appetite is often broad, tolerance is tactical and focused.
      • Tolerances apply to specific objectives and provide guidance to those executing on a day-to-day basis. They measure the variation around performance expectations that the organization will tolerate.
      • Ideally, they are incorporated into existing governance, risk, and compliance systems and are also considered when evaluated business cases.
      • IT risk appetite statements are based on IT level 1 risk types.

      The risk appetite has a risk lens but is also closely linked to corporate performance.

      The image contains a screenshot of a diagram that demonstrates how risk appetite has a risk lens, and how it is linked to corporate performance.

      Statements of risk

      The image contains a screenshot of a diagram of the risk landscape.

      Risk Appetite

      Risk Tolerance

      • The general amount of risk an organization is willing to accept while pursuing its objectives.
      • Proactive, future view of risks that reflects the desired range of enterprise performance.
      • Reflects the longer-term strategy of what needs to be achieved and the resources available to achieve it, expressed in quantitative criteria.
      • Risk appetites will vary for several reasons, such as the company culture, financial strength, and capabilities.
      • Risk tolerance is the acceptable deviation from the level set by the risk appetite.
      • Risk tolerance is a tactical tool often expressed in quantitative terms.
      • Key risk indicators are often used to align to risk tolerance limits to ensure the organization stays within the set risk boundary.

      Risk scenarios

      Risk scenarios serve two main purposes: to help decision makers understand how adverse events can affect organizational strategy and objectives and to prepare a framework for risk analysis by clearly defining and decomposing the factors contributing to the frequency and the magnitude of adverse events.

      ISACA
      • Organizations’ pervasive use of and dependency on technology has increased the importance of scenario analysis to identify relevant and important risks and the potential impacts of risk events on the organization if the risk event were to occur.
      • Risk scenarios provide “what if” analysis through a structured approach, which can help to define controls and document assumptions.
      • They form a constructive narrative and help to communicate a story by bringing in business context.
      • For the best outcome, have input from business and IT stakeholders. However, in reality, risk scenarios are usually driven by IT through the asset management practice.
      • Once the scenarios are developed, they are used during the risk analysis phase, in which frequency and business impacts are estimated. They are also a useful tool to help the risk team (and IT) communicate and explain risks to various business stakeholders.

      Top-down approach – driven by the business by determining the business impact, i.e. what is the impact on my customers, reputation, and bottom line if the system that supports payment processing fails?

      Bottom-up approach – driven by IT by identifying critical assets and what harm could happen if they were to fail.

      Example risk scenario

      Use level 1 IT risks to derive potential scenarios.

      Risk Scenario Description

      Example: IT Risks

      Risk Scenario Title

      A brief description of the risk scenario

      The enterprise is unable to recruit and retain IT staff

      Risk Type

      The process or system that is impacted by the risk

      • Service quality
      • Product and service cost

      Risk Scenario Category

      Deeper insight into how the risk might impact business functions

      • Inadequate capacity to support business needs
      • Talent and skills gap due to inability to retain talent

      Risk Statement

      Used to communicate the potential adverse outcomes of a particular risk event and can be used to communicate to stakeholders to enable informed decisions

      The organization chronically fails to recruit sufficiently skilled IT workers, leading to a loss of efficiency in overall technology operation and an increased security exposure.

      Risk Owner

      The designated party responsible and accountable for ensuring that the risk is maintained in accordance with enterprise requirements

      • Head of Human Resources
      • Business Process Owner

      Risk Oversight

      The person (role) who is responsible for risk assessments, monitoring, documenting risk response, and establishing key risk indicators

      CRO/COO

      Phase 2

      Set Your Organization Up for Success

      Phase 1

      Phase 2

      Phase 3

      • Governance, Risk, and Compliance
      • Enterprise Risk Management
      • Enterprise Risk Appetite
      • Risk Statements and Scenarios
      • What Is a Risk Taxonomy?
      • Functional Role of an IT Risk Taxonomy
      • Connection to Enterprise Risk Management
      • Establish Committee
      • Steps to Define IT Risk Taxonomy
      • Define Level 1
      • Test Level 1
      • Define Level 2 and 3
      • Test via Your Control Framework

      This phase will walk you through the following activities:

      • How to set up a cross-functional IT risk taxonomy committee

      This phase involves the following participants:

      • CIO
      • CISO
      • CRO
      • IT Risk Owners
      • Business Leaders
      • Human Resources

      What is a risk taxonomy?

      A risk taxonomy provides a common risk view and enables integrated risk

      • A risk taxonomy is the (typically hierarchical) categorization of risk types. It is constructed out of a collection of risk types organized by a classification scheme.
      • Its purpose is to assist with the management of an organization’s risk by arranging risks in a classification scheme.
      • It provides foundational support across the risk management lifecycle in relation to each of the key risks.
      • More material risk categories form the root nodes of the taxonomy, and risk types cascade into more granular manifestations (child nodes).
      • From a risk management perspective, a taxonomy will:
        • Enable more effective risk aggregation and interoperability.
        • Provide the organization with a complete view of risks and how risks might be interconnected or concentrated.
        • Help organizations form a robust control framework.
        • Give risk managers a structure to manage risks proactively.

      Typical Tree Structure

      The image contains a screenshot of the Typical Tree Structure.

      What is integrated risk management?

      • Integrated risk management is the process of ensuring all forms of risk information, including risk related to information and technology, are considered and included in the organization’s risk management strategy.
      • It removes the siloed approach of classifying risks related to specific departments or areas of the organization, recognizing that each risk is a potential threat to the overarching enterprise.
      • By aggregating the different threats or uncertainty that might exist within an organization, integrated risk management enables more informed decisions to be made that align to strategic goals and continue to drive value back to the business.
      • By holistically considering the different risks, the organization can make informed decisions on the best course of action that will reduce any negative impacts associated with the uncertainty and increase the overall value.

      The image contains a screenshot of the ERM.

      Integrated risk management: A strategic and collaborative way to manage risks across the organization. It is a forward-looking, business-specific outlook with the objective of improving risk visibility and culture.

      Drivers and benefits of integrated risk

      Drivers for Integrated Risk Management

      • Business shift to digital experiences
      • The breadth and number of risks requiring oversight
      • The need for faster risk analysis and decision making

      Benefits of Integrated Risk Management

      • Enables better scenario planning
      • Enables more proactive risk responses
      • Provides more relevant risk assurance to key stakeholders
      • Improves transparency and comparability of risks across organizational silos
      • Supports better financial resilience

      Business velocity and complexity are making real-time risk management a business necessity.

      If integrated risk is the destination, your taxonomy is your road to get you there

      Info-Tech’s Model for Integrated Risk

      The image contains a screenshot of Info-Tech's Model for Integrated Risk.

      How the risk practices intersect

      The risk taxonomy provides a common classification of risks that allows risks to roll up systematically to enterprise risk, enabling more effective risk responses and more informed decision making.

      The image contains a screenshot of a diagram that demonstrates how the risk practices intersect.

      ERM taxonomy

      Relative to the base event types, overall there is an increase in the number of level 1 risk types in risk taxonomies

      Oliver Wyman
      • The changing risk profile of organizations and regulatory focus in some industries is pushing organizations to rethink their risk taxonomies.
      • Generally, the expansion of level 1 risk types is due to the increase in risk themes under the operational risk umbrella.
      • Non-financial risks are risks that are not considered to be traditional financial risks, such as operational risk, technology risk, culture, and conduct. Environmental, social, and governance (ESG) risk is often referred to as a non-financial risk, although it can have both financial and non-financial implications.
      • Certain level 1 ERM risks, such as strategic risk, reputational risk, and ESG risk, cover both financial and non-financial risks.

      The image contains a screenshot of a diagram of the Traditional ERM Structure.

      Operational resilience

      • The concept of operational resiliency was first introduced by European Central Bank (ECB) in 2018 as an attempt to corral supervisory cooperation on operational resiliency in financial services.
      • The necessity for stronger operational resiliency became clear during the early stages of COVID-19 when many organizations were not prepared for disruption, leading to serious concern for the safety and soundness of the financial system.
      • It has gained traction and is now defined in global supervisory guidance. Canada’s prudential regulator, Office of the Superintendent of Financial Institutions (OSFI), defines it as “the ability of a financial institution to deliver its operations, including its critical operations, through disruption.”
      • Practically, its purpose is to knit together several operational risk management categories such as business continuity, security, and third-party risk.
      • The concept has been adopted by information and communication technology (ICT) companies, as technology and cyber risks sit neatly under this risk type.
      • It is now not uncommon to see operational resiliency as a level 1 risk type in a financial institution’s ERM framework.

      Operational resilience will often feature in ERM frameworks in organizations that deliver critical services, products, or functions, such as financial services

      Operational Resilience.

      ERM level 1 risk categories

      Although many organizations have expanded their enterprise risk management taxonomies to address new threats, most organizations will have the following level 1 risk types:

      ERM Level 1

      Definition

      Definition Source

      Financial

      The ability to obtain sufficient and timely funding capacity.

      Global Association of Risk Professionals (GARP)

      Non-Financial

      Non-financial risks are risks that are not considered to be traditional financial risks such as operational risk, technology risk, culture and conduct.

      Office of the Superintendent of Financial Institutions (OSFI)

      Reputational

      Potential negative publicity regarding business practices regardless of validity.

      US Federal Reserve

      Global Association of Risk Professionals (GARP)

      Strategic

      Risk of unsuccessful business performance due to internal or external uncertainties, whether the event is event or trend driven. Actions or events that adversely impact an organizations strategies and/or implementation of its strategies.

      The Risk Management Society (RIMS)

      Sustainability (ESG)

      This risk of any negative financial or reputational impact on an organizations stemming from current or prospective impacts of ESG factors on its counterparties or invested assets.

      Open Risk Manual

      Info-Tech Research Group

      Talent and Risk Culture

      The widespread behaviors and mindsets that can threaten sound decision-making, prudent risk-taking, and effective risk management and can weaken an institution’s financial and operational resilience.

      Info-Tech Research Group

      Different models of ERM

      Some large organizations will elevate certain operational risks to level 1 organizational risks due to risk materiality.

      Every organization will approach its risk management taxonomy differently; the number of level 1 risk types will vary and depend highly on perceived impact.

      Some of the reasons why an organization would elevate a risk to a level 1 ERM risk are:

      • The risk has significant impact on the organization's strategy, reputation, or financial performance.
      • The regulator has explicitly called out board oversight within legislation.
      • It is best practice in the organization’s industry or business sector.
      • The organization has structured its operations around a particular risk theme due to its potential negative impact. For example, the organization may have a dedicated department for data privacy.

      Level 1

      Potential Rationale

      Industries

      Risk Definition

      Advanced Analytics

      Use of advanced analytics is considered material

      Large Enterprise, Marketing

      Risks involved with model risk and emerging risks posed by artificial intelligence/machine learning.

      Anti-Money Laundering (AML) and Fraud

      Risk is viewed as material

      Financial Services, Gaming, Real Estate

      The risk of exposure to financial crime and fraud.

      Conduct Risk

      Sector-specific risk type

      Financial Services

      The current or prospective risk of losses to an institution arising from inappropriate supply of financial services including cases of willful or negligent misconduct.

      Operational Resiliency

      Sector-specific risk type

      Financial Services, ICT

      Organizational risk resulting from an organization’s failure to deliver its operations, including its critical operations, through disruption.

      Privacy

      Board driven – perceived as material risk to organization

      Healthcare, Financial Services

      The potential loss of control over personal information.

      Information Security

      Board driven – regulatory focus

      All may consider

      The people, processes, and technology involved in protecting data (information) in any form – whether digital or on paper – through its creation, storage, transmission, exchange, and destruction.

      Risk and impact

      Mapping risks to business outcomes happens within the ERM function and by enterprise fiduciaries.

      • When mapping risk events to enterprise risk types, the relationship is rarely linear. Rather, risk events typically will have multiple impacts on the enterprise, including strategic, reputational, ESG, and financial impacts.
      • As risk information is transmitted from lower levels, it informs the next level, providing the appropriate information to prioritize risk.
      • In the final stage, the enterprise portfolio view will reflect the enterprise impacts according to risk dimensions, such as strategic, operational, reporting, and compliance.

      Rolling Up Risks to a Portfolio View

      The image contains a screenshot to demonstrate rolling up risks to a portfolio view.

      1. A risk event within IT will roll up to the enterprise via the IT risk register.
      2. The impact of the risk on cash flow and operations will be aggregated and allocated in the enterprise risk register by enterprise fiduciaries (e.g. CFO).
      3. The impacts are translated into full value exposures or modified impact and likelihood assessments.

      Common challenges

      How to synthesize different objectives between IT risk and enterprise risk

      Commingling risk data is a major challenge when developing a risk taxonomy, but one of the underlying reasons is that the enterprise and IT look at risk from different dimensions.

      • The role of the enterprise in risk management is to provide and preserve value, and therefore the enterprise evaluates risk on an adjusted risk-return basis.
      • To do this effectively, the enterprise must break down silos and view risk holistically.
      • ERM is a top-down process of evaluating risks that may impact the entity. As part of the process, ERM must manage risks within the enterprise risk framework and provide reasonable assurances that enterprise objectives will be met.
      • IT risk management focuses on internal controls and sits as a function within the larger enterprise.
      • IT takes a bottom-up approach by applying an ongoing process of risk management and constantly identifying, assessing, prioritizing, and mitigating risks.
      • IT has a central role in risk mitigation and, if functioning well, will continually reduce IT risks, simplifying the role for ERM.

      Establish a team

      Cross-functional collaboration is key to defining level 1 risk types.

      Establish a cross-functional working group.

      • Level 1 IT risk types are the most important to get right because they are the root nodes that all subtypes of risk cascade from.
      • To ensure the root nodes (level 1 risk types) address the risks of your organization, it is vital to have a strong understanding or your organization’s value chain, so your organizational strategy is a key input for defining your IT level 1 risk types.
      • Since the taxonomy provides the method for communicating risks to the people who need to make decisions, a wide understanding and acceptance of the taxonomy is essential. This means that multiple people across your organization should be involved in defining the taxonomy.
      • Form a cross-functional tactical team to collaborate and agree on definitions. The team should include subject matter experts and leaders in key risk and business areas. In terms of governance structure, this committee might sit underneath the enterprise risk council, and members of your IT risk council may also be good candidates for this tactical working group.
      • The committee would be responsible for defining the taxonomy as well as performing regular reviews.
      • The importance of collaboration will become crystal clear as you begin this work, as risks should be connected to only one risk type.

      Governance Layer

      Role/ Responsibilities

      Enterprise

      Defines organizational goals. Directs or regulates the performance and behavior of the enterprise, ensuring it has the structure and capabilities to achieve its goals.

      Enterprise Risk Council

      • Approve of risk taxonomy

      Strategic

      Ensures business and IT initiatives, products, and services are aligned to the organization’s goals and strategy and provide expected value. Ensures adherence to key principles.

      IT Risk Council

      • Provide input
      • May review taxonomy ahead of going to the enterprise risk council for approval

      Tactical

      Ensures key activities and planning are in place to execute strategic initiatives.

      Subcommittee

      • Define risk types and definitions
      • Establish and maintain taxonomy
      • Recommend changes
      • Advocate and communicate internally

      2.1 Establish a cross-functional working group

      2-3 hours

      1. Consider your organization’s operating model and current governance framework, specifically any current risk committees.
      2. Consider the members of current committees and your objectives and begin defining:
        1. Committee mandate, goals, and success factors.
        2. Responsibility and membership.
        3. Committee procedures and policies.
      3. Make sure you define how this tactical working group will interact with existing committees.

      Download Build an IT Risk Taxonomy Workbook

      Input Output
      • Organization chart and operating model
      • Corporate governance framework and existing committee charters
      • Cross-functional working group charter
      Materials Participants
      • Whiteboard/flip charts
      • Build an IT Risk Taxonomy Workbook
      • IT Taxonomy Committee Charter
      • CISO
      • Human resources
      • Corporate communications
      • CRO or risk owners
      • Business leaders

      Phase 3

      Structure Your IT Risk Taxonomy

      Phase 1

      Phase 2

      Phase 3

      • Governance, Risk, and Compliance
      • Enterprise Risk Management
      • Enterprise Risk Appetite
      • Risk Statements and Scenarios
      • What Is a Risk Taxonomy?
      • Functional Role of an IT Risk Taxonomy
      • Connection to Enterprise Risk Management
      • Establish Committee
      • Steps to Define IT Risk Taxonomy
      • Define Level 1
      • Test Level 1
      • Define Level 2 and 3
      • Test via Your Control Framework

      This phase will walk you through the following activities:

      • Establish level 1 risk types
      • Test level 1 risk types
      • Define level 2 and level 3 risk types
      • Test the taxonomy via your control framework

      This phase involves the following participants:

      • CIO
      • CISO
      • CRO
      • IT Risk Owners
      • Business Leaders
      • Human Resources

      Structuring your IT risk taxonomy

      Do’s

      • Ensure your organization’s values are embedded into the risk types.
      • Design your taxonomy to be forward looking and risk based.
      • Make level 1 risk types generic so they can be used across the organization.
      • Ensure each risk has its own attributes and belongs to only one risk type.
      • Collaborate on and communicate your taxonomy throughout organization.

      Don’ts

      • Don’t develop risk types based on function.
      • Don’t develop your taxonomy in a silo.

      A successful risk taxonomy is forward looking and codifies the most frequently used risk language across your organization.

      Level 1

      Parent risk types aligned to organizational values

      Level 2

      Subrisks to level 1 risks

      Level 3

      Further definition

      Steps to define your IT risk taxonomy

      Step 1

      Leverage Info-Tech’s Build an IT Risk Taxonomy Guideline and identify IT level 1 risk types. Consider corporate inputs and macro trends.

      Step 2

      Test level 1 IT risk types by mapping to your enterprise's ERM level 1 risk types.

      Step 3

      Draft your level 2 and level 3 risk types. Be mutually exclusive to the extent possible.

      Step 4

      Work backward – align risk events and controls to the lowest level risk category. In our examples, we align to level 3.

      Step 5

      Add risk levels to your risk registry.

      Step 6

      Optional – Add IT risk appetite statements to risk register.

      Inputs to use when defining level 1

      To help you define your IT risk taxonomy, leverage your organization’s strategy and risk management artifacts, such as outputs from risk assessments, audits, and test results. Also consider macro trends and potential risks unique to your organization.

      Step 1 – Define Level 1 Risk Types

      Use corporate inputs to help structure your taxonomy

      • Corporate Strategy
      • Risk Assessment
      • Audit
      • Test Results

      Consider macro trends that may have an impact on how you manage IT risks

      • Geopolitical Risk
      • Economic Downturn
      • Regulation
      • Competition
      • Climate Risk
      • Industry Disruption

      Evaluate from an organizational lens

      Ask risk-based questions to help define level 1 IT risks for your organization.

      IT Risk Type

      Example Questions

      Technology

      How reliant is our organization on critical assets for business operations?

      How resilient is the organization to an unexpected crisis?

      How many planned integrations do we have (over the next 24 months)?

      Talent Risk

      What is our need for specialized skills, like digital, AI, etc.?

      Does our culture support change and innovation?

      How susceptible is our organization to labor market changes?

      Strategy

      What is the extent of digital adoption or use of emerging technologies in our organization?

      How aligned is IT with strategy/corporate goals?

      How much is our business dependent on changing customer preferences?

      Data

      How much sensitive data does our organization use?

      How much data is used and stored aggregately?

      How often is data moved? And to what locations?

      Third-party

      How many third-party suppliers do we have?

      How reliant are we on the global supply chain?

      What is the maturity level of our third-party suppliers?

      Do we have any concentration risk?

      Security

      How equipped is our organization to manage cyber threats?

      How many security incidents occur per year/quarter/day?

      Do we have regulatory obligations? Is there risk of enforcement action?

      Level 1 IT taxonomy structure

      Step 2 – Consider your organization’s strategy and areas where risks may manifest and use this guidance to advance your thinking. Many factors may influence your taxonomy structure, including internal organizational structure, the size of your organization, industry trends and organizational context, etc.

      Most IT organizations will include these level 1 risks in their IT risk taxonomy

      IT Level 1

      Definition

      Definition Source

      Technology

      Risk arising from the inadequacy, disruption, destruction, failure, damage from unauthorized access modifications, or malicious use of information technology assets, people or processes that enable and support business needs, and can result in financial loss and/or reputational damage.

      Open Risk Manual

      Note how this definition by OSFI includes cyber risk as part of technology risk. Smaller organizations and organizations that do not use large amounts of sensitive information will typically fold cyber risks under technology risks. Not all organizations will take this approach. Some organizations may elevate security risk to level 1.

      “Technology risk”, which includes “cyber risk”, refers to the risk arising from the inadequacy, disruption, destruction, failure, damage from unauthorized access, modifications, or malicious use of information technology assets, people or processes that enable and support business needs, and can result in financial loss and/or reputational damage.

      Office of the Superintendent of Financial Institutions (OSFI)

      Talent

      The risk of not having the right knowledge and skills to execute strategy.

      Info-Tech Research Group/McLean & Company

      Human capital challenges including succession challenges and the ability to attract and retain top talent are considered the most dominant risk to organizations’ ability to meet their value proposition (Protiviti, 2023).

      Strategic

      Risks that threaten IT’s ability to deliver expected business outcomes.

      Info-Tech Research Group

      IT’s role as strategic enabler to the business has never been so vital. With the speed of disruptive innovation, IT must be able to monitor alignment, support opportunities, and manage unexpected crises.

      Level 1 IT taxonomy structure cont'd

      Step 2 – Large and more complex organizations may have more level 1 risk types. Variances in approaches are closely linked to the type of industry and business in which the organization operates as well as how they view and position risks within their organization.

      IT Level 1

      Definition

      Definition Source

      Data

      Data risk is the exposure to loss of value or reputation caused by issues or limitations to an organization’s ability to acquire, store, transform, move, and use its data assets.

      Deloitte

      Data risk encompasses the risk of loss value or reputation resulting from inadequate or failed internal processes, people and systems or from external events impacting on data.

      Australian Prudential Regulation Authority (APRA) CPG 235 -2013)

      Data is increasingly being used for strategic growth initiatives as well as for meeting regulatory requirements. Organizations that use a lot of data or specifically sensitive information will likely have data as a level 1 IT risk type.

      Third-Party

      The risk adversely impacting the institutions performance by engaging a third party, or their associated downstream and upstream partners or another group entity (intragroup outsourcing) to provide IT systems or related services.

      European Banking Association (EBA)

      Open Risk Manual uses EBA definition

      Third-party risk (supply chain risk) received heightened attention during COVID-19. If your IT organization is heavily reliant on third parties, you may want to consider elevating third-party risk to level 1.

      Security

      The risk of unauthorized access to IT systems and data from within or outside the institution (e.g., cyber-attacks). An incident is viewed as a series of events that adversely affects the information assets of an organization. The overall narrative of this type of risk event is captured as who, did what, to what (or whom), with what result.

      Open Risk Manual

      Some organizations and industries are subject to regulatory obligations, which typically means the board has strict oversight and will elevate security risk to a level 1.

      Common challenges

      Considerations when defining level 1 IT risk types

      • Ultimately, the identification of a level 1 IT risk type will be driven by the potential for and materiality of vulnerabilities that may impede an organization from delivering successful business outcomes.
      • Senior leaders within organizations play a central role in protecting organizations against vulnerabilities and threats.
      • The size and structure of your organization will influence how you manage risk.
      • The following slide shows typical roles and responsibilities for data privacy.
      • Large enterprises and organizations that use a lot of personal identifiable information (PII) data, such as those in healthcare, financial services, and online retail, will typically have data as a level 1 IT risk and data privacy as a level 2 risk type.
      • However, smaller organizations or organizations that do not use a lot of data will typically fold data privacy under either technology risk or security risk.

      Deciding placement in taxonomy

      Deciding Placement in Taxonomy.

      • In larger enterprises, data risks are managed within a dedicated functional department with its own governance structure. In small organizations, the CIO is typically responsible and accountable for managing data privacy risk.

      Global Enterprise

      Midmarket

      Privacy Requirement

      What Is Involved

      Accountable

      Responsible

      Accountable & Responsible

      Privacy Legal and Compliance Obligations

      • Ensuring the relevant Accountable roles understand privacy obligations for the jurisdictions operated in.

      Privacy Officer (Legal)

      Privacy Officer (Legal)

      Privacy Policy, Standards, and Governance

      • Defining polices and ensuring they are in place to ensure all privacy obligations are met.
      • Monitoring adherence to those policies and standards.

      Chief Risk Officer (Risk)

      Head of Risk Function

      Data Classification and Security Standards and Best-Practice Capabilities

      • Defining the organization’s data classification and security standards and ensuring they align to the privacy policy.
      • Designing and building the data security standards, processes, roles, and technologies required to ensure all security obligations under the privacy policy can be met.
      • Providing oversight of the effectiveness of data security practices and leading resolution of data security issues/incidents.

      Chief Information Security Officer (IT)

      Chief Information Security Officer (IT)

      Technical Application of Data Classification, Management and Security Standards

      • Ensuring all technology design, implementation, and operational decisions adhere to data classification, data management, and data security standards.

      Chief Information Officer (IT)

      Chief Data Architect (IT)

      Chief Information Officer (IT)

      Data Management Standards and Best-Practice Capabilities

      • Defining the organization’s data management standards and ensuring they align to the privacy policy.
      • Designing and building the data management standards, processes, roles, and technologies required to ensure data classification, access, and sharing obligations under the privacy policy can be met.
      • Providing oversight of the effectiveness of data classification, access, and sharing practices and leading resolution of data management issues/incidents.

      Chief Data Officer

      Where no Head of Data Exists and IT, not the business, is seen as de facto owner of data and data quality

      Execution of Data Management

      • Ensuring business processes that involve data classification, sharing, and access related to their data domain align to data management standards (and therefore privacy obligations).

      L1 Business Process Owner

      L2 Business Process Owner

      Common challenges

      Defining security risk and where it resides in the taxonomy

      • For risk management to be effective, risk professionals need to speak the same language, but the terms “information security,” “cybersecurity,” and “IT security” are often used interchangeably.
      • Traditionally, cyber risk was folded under technology risk and therefore resided at a lower level of a risk taxonomy. However, due to heightened attention from regulators and boards stemming from the pervasiveness of cyber threats, some organizations are elevating security risks to a level 1 IT risk.
      • Furthermore, regulatory cybersecurity requirements have emphasized control frameworks. As such, many organizations have adopted NIST because it is comprehensive, regularly updated, and easily tailored.
      • While NIST is prescriptive and action oriented, it start with controls and does not easily integrate with traditional ERM frameworks. To address this, NIST has published new guidance focused on an enterprise risk management approach. The guidance helps to bridge the gap between best practices in enterprise risk management and processes and control techniques that cybersecurity professionals use to meet regulatory cybersecurity risk requirements.

      Definitional Nuances

      “Cybersecurity” describes the technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.

      “IT security” describes a function as well as a method of implementing policies, procedures, and systems to defend the confidentiality, integrity, and availability of any digital information used, transmitted, or stored throughout the organization’s environment.

      “Information security” defines the people, processes, and technology involved in protecting data (information) in any form – whether digital or on paper – through its creation, storage, transmission, exchange, and destruction.

      3.1 Establish level 1 risk types

      2-3 hours

      1. Consider your current and future corporate goals and business initiatives, risk management artifacts, and macro industry trends.
      2. Ask questions to understand risks unique to your organization.
      3. Review Info-Tech’s IT level 1 risk types and identify the risk types that apply to your organization.
      4. Add any risk types that are missing and unique to your organization.
      5. Refine the definitions to suit your organization.
      6. Be mutually exclusive and collectively exhaustive to the extent possible.

      Download Build an IT Risk Taxonomy Workbook

      InputOutput
      • Organization's strategy
      • Other organizational artifacts if available (operating model, outputs from audits and risk assessments, risk profile, and risk appetite)
      • Build an IT Risk Taxonomy Guideline
      • IT Risk Taxonomy Definitions
      • Level 1 IT risk types customized to your organization
      MaterialsParticipants
      • Whiteboard/flip charts
      • Build an IT Risk Taxonomy Workbook
      • CISO
      • Human resources
      • Corporate communications
      • CRO or risk owners
      • Business leaders

      3.2 Map IT risk types against ERM level 1 risk types

      1-2 hours

      1. Using the output from Activity 3.1, map your IT risk types to your ERM level 1 risk types.
      2. Record in the Build an IT Risk Taxonomy Workbook.

      Download Build an IT Risk Taxonomy Workbook

      InputOutput
      • IT level 1 risk types customized to your organization
      • ERM level 1 risk types
      • Final level 1 IT risk types
      MaterialsParticipants
      • Whiteboard/flip charts
      • Build an IT Risk Taxonomy Workbook
      • CISO
      • Human resources
      • Corporate communications
      • CRO or risk owners
      • Business leaders

      Map IT level 1 risk types to ERM

      Test your level 1 IT risk types by mapping to your organization’s level 1 risk types.

      Step 2 – Map IT level 1 risk types to ERM

      The image contains two tables. 1 table is ERM Level 1 Risks, the other table is IT Level 1 Risks.

      3.3 Establishing level 2 and 3 risk types

      3-4 hours

      1. Using the level 1 IT risk types that you have defined and using Info-Tech’s Risk Taxonomy Guideline, first begin to identify level 2 risk types for each level 1 type.
      2. Be mutually exclusive and collectively exhaustive to the extent possible.
      3. Once satisfied with your level 2 risk types, break them down further to level 3 risk types.

      Note: Smaller organizations may only define two risk levels, while larger organizations may define further to level 4.

      Download Build an IT Risk Taxonomy Design Template

      InputOutput
      • Output from Activity 3.1, Establish level 1 risk types
      • Build an IT Risk Taxonomy Workbook
      • Build an IT Risk Taxonomy Guideline
      • Level 2 and level 3 risk types recorded in Build an IT Risk Taxonomy Design Template
      MaterialsParticipants
      • Whiteboard/flip charts
      • Build an IT Risk Taxonomy Workbook
      • CISO
      • Human resources
      • Corporate communications
      • CRO or risk owners
      • Business leaders

      Level 2 IT taxonomy structure

      Step 3 – Break down your level 1 risk types into subcategories. This is complicated and may take many iterations to reach a consistent and accepted approach. Try to make your definitions intuitive and easy to understand so that they will endure the test of time.

      The image contains a screenshot of Level 2 IT taxonomy Structure.

      Security vulnerabilities often surface through third parties, but where and how you manage this risk is highly dependent on how you structure your taxonomy. Organizations with a lot of exposure may have a dedicated team and may manage and report security risks under a level 1 third-party risk type.

      Level 3 IT taxonomy structure

      Step 3 – Break down your level 2 risk types into lower-level subcategories. The number of levels of risk you have will depend on the size of and magnitude of risks within your organization. In our examples, we demonstrate three levels.

      The image contains a screenshot of Level 3 IT taxonomy Structure.

      Risk taxonomies for smaller organizations may only include two risk levels. However, large enterprises or more complex organizations may extend their taxonomy to level 3 or even 4. This illustration shows just a few examples of level 3 risks.

      Test using risk events and controls

      Ultimately risk events and controls need to roll up to level 1 risks in a consistent manner. Test the robustness of your taxonomy by working backward.

      Step 4 – Work backward to test and align risk events and controls to the lowest level risk category.

      • A key function of IT risk management is to monitor and maintain internal controls.
      • Internal controls help to reduce the level of inherent risk to acceptable levels, known as residual risk.
      • As risks evolve, new controls may be needed to upgrade protection for tech infrastructure and strengthen connections between critical assets and third-party suppliers.

      Example – Third Party Risk

      Third Party Risk example.

      3.4 Test your IT taxonomy

      2-3 hours

      1. Leveraging the output from Activities 3.1 to 3.3 and your IT Risk Taxonomy Design Template, begin to test the robustness of the taxonomy by working backward from controls to level 1 IT risks.
      2. The lineage should show clearly that the control will mitigate the impact of a realized risk event. Refine the control or move the control to another level 1 risk type if the control will not sufficiently reduce the impact of a realized risk event.
      3. Once satisfied, update your risk register or your risk management software tool.

      Download Build an IT Risk Taxonomy Design Template

      InputOutput
      • Output from Activities 3.1 to 3.3
      • IT risk taxonomy documented in the IT Risk Taxonomy Design Template
      MaterialsParticipants
      • Whiteboard/flip charts
      • IT risk register
      • Build an IT Risk Taxonomy Workbook
      • CISO
      • Human resources
      • Corporate communications
      • CRO or risk owners
      • Business leaders

      Update risk register

      Step 5 – Once you are satisfied with your risk categories, update your risk registry with your IT risk taxonomy.

      Use Info-Tech’s Risk Register Tool or populate your internal risk software tool.

      Risk Register.

      Download Info-Tech’s Risk Register Tool

      Augment the risk event list using COBIT 2019 processes (Optional)

      Other industry-leading frameworks provide alternative ways of conceptualizing the functions and responsibilities of IT and may help you uncover additional risk events.

      1. Managed IT Management Framework
      2. Managed Strategy
      3. Managed Enterprise Architecture
      4. Managed Innovation
      5. Managed Portfolio
      6. Managed Budget and Costs
      7. Managed Human Resources
      8. Managed Relationships
      9. Managed Service Agreements
      10. Managed Vendors
      11. Managed Quality
      12. Managed Risk
      13. Managed Security
      14. Managed Data
      15. Managed Programs
      16. Managed Requirements Definition
      17. Managed Solutions Identification and Build
      18. Managed Availability and Capacity
      19. Managed Organizational Change Enablement
      20. Managed IT Changes
      21. Managed IT Change Acceptance and Transitioning
      22. Managed Knowledge
      23. Managed Assets
      24. Managed Configuration
      25. Managed Projects
      26. Managed Operations
      27. Managed Service Requests and Incidents
      28. Managed Problems
      29. Managed Continuity
      30. Managed Security Services
      31. Managed Business Process Controls
      32. Managed Performance and Conformance Monitoring
      33. Managed System of Internal Control
      34. Managed Compliance with External Requirements
      35. Managed Assurance
      36. Ensured Governance Framework Setting and Maintenance
      37. Ensured Benefits Delivery
      38. Ensured Risk Optimization
      39. Ensured Resource Optimization
      40. Ensured Stakeholder Engagement

      Example IT risk appetite

      When developing your risk appetite statements, ensure they are aligned to your organization’s risk appetite and success can be measured.

      Example IT Risk Appetite Statement

      Risk Type

      Technology Risk

      IT should establish a risk appetite statement for each level 1 IT risk type.

      Appetite Statement

      Our organization’s number-one priority is to provide high-quality trusted service to our customers. To meet this objective, critical systems must be highly performant and well protected from potential threats. To meet this objective, the following expectations have been established:

      • No appetite for unauthorized access to systems and confidential data.
      • Low appetite for service downtime.
        • Service availability objective of 99.9%.
        • Near real-time recovery of critical services – ideally within 30 minutes, no longer than 3 hours.

      The ideal risk appetite statement is qualitative and supported by quantitative measures.

      Risk Owner

      Chief Information Officer

      Ultimately, there is an accountable owner(s), but involve business and technology stakeholders when drafting to gain consensus.

      Risk Oversight

      Enterprise Risk Committee

      Supporting Framework(s)

      Business Continuity Management, Information Security, Internal Audit

      The number of supporting programs and frameworks will vary with the size of the organization.

      3.5 Draft your IT risk appetite statements

      Optional Activity

      2-3 hours

      1. Using your completed taxonomy and your organization’s risk appetite statement, draft an IT risk appetite statement for each level 1 risk in your workbook.
      2. Socialize the statements and gain approval.
      3. Add the approved risk appetite statements to your IT risk register.

      Download Build an IT Risk Taxonomy Workbook

      Input Output
      • Organization’s risk appetite statement
      • Build an IT Risk Taxonomy Workbook
      • IT Risk Taxonomy Design Template
      • IT risk appetite statements
      Materials Participants
      • Whiteboard/flip charts
      • Build an IT Risk Taxonomy Workbook
      • CISO, CIO
      • Human resources
      • Corporate communications
      • CRO or risk owners
      • Business leaders

      Key takeaways and next steps

      • The risk taxonomy is the backbone of a robust enterprise risk management program. A good taxonomy is frequently used and well understood.
      • Not only is the risk taxonomy used to assess organizational impact, but it is also used for risk reporting, scenarios analysis and horizon scanning, and risk appetite expression.
      • It is essential to capture IT risks within the ERM framework to fully understand the impact and allow for consistent risk discussions and meaningful aggregation.
      • Defining an IT risk taxonomy is a team sport, and organizations should strive to set up a cross-functional working group that is tasked with defining the taxonomy, monitoring its effectiveness, and ensuring continual improvement.
      • The work does not end when the taxonomy is complete. The taxonomy should be well socialized throughout the organization after inception through training and new policies and procedures. Ultimately, it should be an activity embedded into risk management practices.
      • The taxonomy is a living document and should be continually improved upon.

      3.6 Prepare to communicate the taxonomy internally

      1-2 hours

      To gain acceptance of your risk taxonomy within your organization, ensure it is well understood and used throughout the organization.

      1. Consider your audience and agree on the key elements you want to convey.
      2. Prepare your presentation.
      3. Test your presentation with a smaller group before communicating to senior leadership or the board.

      Coming soon: Look for our upcoming research Communicate Any IT Initiative.

      InputOutput
      • Build an IT Risk Taxonomy Workbook
      • Upcoming research: Communicate Any IT Initiative
      • Presentation
      MaterialsParticipants
      • Whiteboard/flip charts
      • Upcoming research: Communicate Any IT Initiative
      • Internal communication templates
      • CISO, CIO
      • Human resources
      • Corporate communications
      • CRO or risk owners
      • Business leaders

      Related Info-Tech Research

      Build an IT Risk Management Program

      • Use this blueprint to transform your ad hoc risk management processes into a formalized ongoing program and increase risk management success.
      • Learn how to take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest's risks before they occur.

      Integrate IT Risk Into Enterprise Risk

      • Use this blueprint to understand gaps in your organization’s approach to risk management.
      • Learn how to integrate IT risks into the foundational risk practice

      Coming Soon: Communicate Any IT initiative

      • Use this blueprint to compose an easy-to-understand presentation to convey the rationale of your initiative and plan of action.
      • Learn how to identify your target audience and tailor and deliver the message in an authentic and clear manner.

      Risk definitions

      Term Description
      Emergent Risk Risks that are poorly understood but expected to grow in significance.
      Residual Risk The amount of risk you have left after you have removed a source of risk or implemented a mitigation approach (controls, monitoring, assurance).
      Risk Acceptance If the risk is within the enterprise's risk tolerance or if the cost of otherwise mitigating the risk is higher than the potential loss, the enterprise can assume the risk and absorb any losses.
      Risk Appetite An organization’s general approach and attitude toward risk; the total exposed amount that an organization wishes to undertake on the basis of risk-return trade-offs for one or more desired and expected outcomes.
      Risk Assessment The process of estimating and evaluating risk.
      Risk Avoidance The risk response where an organization chooses not to perform a particular action or maintain an existing engagement due to the risk involved.
      Risk Event A risk occurrence (actual or potential) or a change of circumstances. Can consist of more than one occurrence or of something not happening. Can be referred to as an incident or accident.
      Risk Identification The process of finding, recognizing, describing, and documenting risks that could impact the achievement of objectives.
      Risk Management The capability and related activities used by an organization to identify and actively manage risks that affect its ability to achieve goals and strategic objectives. Includes principles, processes, and framework.
      Risk Likelihood The chance of a risk occurring. Usually measured mathematically using probability.
      Risk Management Policy Expresses an organization’s commitment to risk management and clarifies its use and direction.
      Risk Mitigation The risk response where an action is taken to reduce the impact or likelihood of a risk occurring.
      Risk Profile A written description of a set of risks.

      Risk definitions

      Term Description
      Risk Opportunity A cause/trigger of a risk with a positive outcome.
      Risk Owner The designated party responsible and accountable for ensuring that the risk is maintained in accordance with enterprise requirements.
      Risk Register A tool used to identify and document potential and active risks in an organization and to track the actions in place to manage each risk.
      Risk Response How you choose to respond to risk (accept, mitigate, transfer, or avoid).
      Risk Source The element that, alone or in combination, has potential to give rise to a risk. Usually this is the root cause of the risk.
      Risk Statement A description of the current conditions that may lead to the loss, and a description of the loss.
      Risk Tolerance The amount of risk you are prepared or able to accept (in terms of volume or impact); the amount of uncertainty an organization is willing to accept in the aggregate (or more narrowly within a certain business unit or for a specific risk category). Expressed in quantitative terms that can be monitored (such as volatility or deviation measures), risk tolerance often is communicated in terms of acceptable/unacceptable outcomes or as limited levels of risk. Risk tolerance statements identify the specific minimum and maximum levels beyond which the organization is unwilling to accept variations from the expected outcome.
      Risk Transfer The risk response where you transfer the risk to a third party.

      Research Contributors and Experts

      LynnAnn Brewer
      Director
      McLean & Company

      Sandi Conrad
      Principal Research Director
      Info-Tech Research Group

      Valence Howden
      Principal Research Director
      Info-Tech Research Group

      John Kemp
      Executive Counsellor – Executive Services
      Info-Tech Research Group

      Brittany Lutes
      Research Director
      Info-Tech Research Group

      Carlene McCubbin
      Practice Lead – CIO Practice
      Info-Tech Research Group

      Frank Sargent
      Senior Workshop Director
      Info-Tech Research Group

      Frank Sewell
      Advisory Director
      Info-Tech Research Group

      Ida Siahaan
      Research Director
      Info-Tech Research Group

      Steve Willis
      Practice Lead – Data Practice
      Info-Tech Research Group

      Bibliography

      Andrea Tang, “Privacy Risk Management”. ISACA Journal, June 2020, Accessed January 2023
      Anthony Kruizinga, “Reshaping the risk taxonomy”. PwC, April 2021, Accessed January 2023
      Auditboard, "The Essentials of Integrated Risk Management (IRM)", June 2022, Accessed January 2023
      Brenda Boultwood, “How to Design an ERM-Friendly Risk Data Architecture”. Global Association of Risk Professionals, February 2020, Accessed January 2023
      BSI Standards Publication, "Risk Management Guidelines", ISO 31000, 2018
      Dan Swinhoe, "What is Physical Security, How to keep your facilities and devices safe from onsite attackers", August 2021, Accessed January 2023
      Eloise Gratton, “Data governance and privacy risk in Canada: A checklist for boards and c-suite”. Borden Ladner Gervais, November 2022 , Accessed January 2023
      European Union Agency for Cyber Security Glossary
      European Banking Authority, "Guidelines on ICT Risk Assessment under the Supervisory Review and Evaluation process (SREP)", September 2017, Accessed February 2023
      European Banking Authority, "Regulatory Framework for Mitigating Key Resilient Risks", Sept 2018, Accessed February 2023
      EY, "Seeking stability within volatility: How interdependent risks put CROs at the heart of the banking business", 12th annual EY/IFF global bank risk management survey, 2022, Accessed February 2023
      Financial Stability Board, "Cyber Lexicon", November 2018, Accessed February 2023
      Financial Stability Board, "Principles for Effective Risk Appetite Framework", November 2013, Accessed January 2023
      Forbes Technology Council, "14 Top Data Security Risks Every Business Should Address", January 2020, Accessed January 2023
      Frank Martens, Dr. Larry Rittenberg, "COSO, Risk Appetite Critical for Success, Using Risk Appetite to Thrive in a Changing World", May 2020, Accessed January 2023
      Gary Stoneurmer, Alice Goguen and Alexis Feringa, "NIST, Risk Management Guide for Information Technology Systems", Special Publication, 800-30, September 2012, Accessed February 2023
      Guy Pearce, "Real-World Data Resilience Demands and Integrated Approach to AI, Data Governance and the Cloud", ISACA Journal, May 2022
      InfoTech Tech Trends Report, 2023
      ISACA, "Getting Started with Risk Scenarios", 2022, Accessed February 2023
      James Kaplan, "Creating a technology risk and cyber risk appetite framework," McKinsey & Company, August 2022, Accessed February 2023
      Jean-Gregorie Manoukian, Wolters Kluwer, "Risk appetite and risk tolerance: what’s the difference?", Sept 2016, Accessed February 2023
      Jennifer Bayuk, “Technology’s Role in Enterprise Risk Management”, ISACA Journal, March 2018, Accessed in February 2023
      John Thackeray, "Global Association of Risk Professionals, 7 Key Elements of Effective ERM", January 2020, Accessed January 2023
      KPMG, "Regulatory rigor: Managing technology and cyber risk, How FRFI’s can achieve outcomes laid out in OSFI B-13", October 2022, Accessed January 2023
      Marc Chiapolino et al, “Risk and resilience priorities, as told by chief risk officers”, McKinsey and Company, December 2022, Accessed January 2023
      Mike Rost, Workiva, "5 Steps to Effective Strategic Management", Updated February 2023. Accessed February 2023
      NIST, "Risk Management Framework for Information Systems and Organization, The System Life Cycle Approach for Security and Privacy," December 2018, Accessed February 2023
      NIST, NISTIR, "Integrating CyberSecurity and Enterprise Risk", October 2020, Accessed February 2023
      Oliver Wyman, "The ORX Reference Taxonomy for operational and non-financial risk summary report", 2019, Accessed February 2023.
      Office of the Superintendent of Financial Institutions, "Operational Resilience Consultation Results Summary", December 2021, Accessed January 2023
      Open Risk Manual, Risk Taxonomy Definitions
      Ponemon. "Cost of a Data Breach Report 2021." IBM, July 2021. Web.
      Protiviti, "Executive Perspectives on Top Risks, 2023 & 2032, Key Issues being discussed in the boardroom and c-suite", February 2023, Accessed February 2023
      RIMS, ISACA, "Bridging the Digital Gap, How Collaboration Between IT and Risk Management can Enhance Value Creation", September 2019, Accessed February 2023
      Robert, R. Moeller, "COSO, Enterprise Risk Management, Second Edition, 2011", Accessed February 2023
      Robert Putrus, "Effective Reporting to the BoD on Critical Assets, Cyberthreats and Key Controls: The Qualitative and Quantitative Model", ISACA Journal, January 2021, Accessed January 2023
      Ron Brash, "Prioritizing Asset Risk Management in ICS Security", August 2020, Accessed February 2023
      Ronald Van Loon, "What is Data Culture and How to Implement it?", November 2023, Accessed February 2023
      SAS, "From Crisis to Opportunity, Redefining Risk Management", 2021Accessed January 2023
      Satori, Cloudian, "Data Protection and Privacy: 12 Ways to Protect User Data", Accessed January 2023
      Spector Information Security, "Building your Asset and Risk Register to Manage Technology Risk", November 2021, Accessed January 2023
      Talend, "What is data culture", Accessed February 2023
      Tom Schneider, "Managing Cyber Security Risk as Enterprise Risk", ISACA Journal, September 2022, Accessed February 2023
      Tony Martin –Vegue, "How to Write Strong Risk Scenarios and Statements", ISACA Journal, September 2021, Accessed February 2023
      The Wall Street Journal, "Making Data Risk a Top Priority", April 2018, Accessed February 2023

      Define Requirements for Outsourcing the Service Desk

      • Buy Link or Shortcode: {j2store}493|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • In organizations where technical support is viewed as non-strategic, many see outsourcing as a cost-effective way to provide this support. However, outsourced projects often fall short of their goals in terms of cost savings and the quality of support. 
      • Significant administrative work and up-front costs are required to outsource the service desk, and poor planning often results in project failure and a decrease of end-user satisfaction.
      • A complete turnover of the service desk can result in lost knowledge and control over processes, and organizations without an exit strategy can struggle to bring their service desk back in house and return the confidence of end users.

      Our Advice

      Critical Insight

      • Outsourcing is easy. Realizing the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.
      • You don’t need to standardize before you outsource, but you still need to conduct your due diligence. If you outsource without thinking about how you want the future to work, you will likely be unsatisfied with the result.
      • If cost is your only driver for outsourcing, understand that it comes at a cost. Customer service quality will likely be less, and your outsourcer may not add on frills such as Continual Improvement. Be careful that your specialists don’t end up spending more time working on incidents and service requests.

      Impact and Result

      • First decide if outsourcing is the correct step; there may be more preliminary work to do beforehand.
      • Assess requirements and make necessary adjustments before developing an outsource RFP.
      • Clearly define the project and produce an RFP to provide to vendors.
      • Plan for long-term success, not short-term gain.
      • Prepare to retain some of the higher-level service desk work.

      Define Requirements for Outsourcing the Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define Requirements for Outsourcing the Service Desk Deck – A step-by-step document to walk you through building a strategy for efficient service desk outsourcing.

      This storyboard will help you craft a project charter, create an RFP, and outline strategies to build a long-term relationship with the vendor.

      • Define Requirements for Outsourcing the Service Desk – Storyboard
      • Service Desk Outsourcing Requirements Database Library

      2. Service Desk Outsourcing Project Charter Template and Requirements Library – Best-of-breed templates to help you determine processes and build a strategy to outsource them.

      These templates will help you determine your service desk requirements and document your proposed service desk outsourcing strategy.

      • Service Desk Outsourcing Project Charter Template

      3. Service Desk Outsourcing RFP Template – A structured document to help you outline expectations and communicate requirements to managed service providers.

      This template will allow you to create a detailed RFP for your outsourcing agreement, document the statement of work, provide service overview, record exit conditions, and document licensing model and estimated pricing.

      • Service Desk Outsourcing RFP Template

      4. Service Desk Outsourcing Reference Interview Template and Scoring Tool – Materials to help you conduct efficient briefings and select the best vendor to fulfill your service desk requirements.

      Use the Reference Interview Template to outline a list of questions for interviewing current/previous customers of your candidate vendors. These interviews will help you with unbiased vendor scoring. The RFP Vendor Scoring Tool will help you facilitate vendor briefings with your list of questions and score candidate vendors efficiently through quantifying evaluations.

      • Service Desk Outsourcing Reference Interview Template
      • Service Desk Outsourcing RFP Scoring Tool

      Infographic

      Further reading

      Define Requirements for Outsourcing the Service Desk

      Prepare your RFP for long-term success, not short-term gains

      Define Requirements for Outsourcing the Service Desk

      Prepare your RFP for long-term success, not short-term gains

      EXECUTIVE BRIEF

      Analyst Perspective

      Outsource services with your eyes wide open.

      Cost reduction has traditionally been an incentive for outsourcing the service desk. This is especially the case for organizations that don't have minimal processes in place and those that need resources and skills to fill gaps.

      Although cost reduction is usually the main reason to outsource the service desk, in most cases service desk outsourcing increases the cost in a short run. But without a proper model, you will only outsource your problems rather than solving them. A successful outsourcing strategy follows a comprehensive plan that defines objectives, assigns accountabilities, and sets expectations for service delivery prior to vendor outreach.

      For outsourcing the service desk, you should plan ahead, work as a group, define requirements, prepare a strong RFP, and contemplate tension metrics to ensure continual improvement. As you build a project charter to outline your strategy for outsourcing your IT services, ensure you focus on better customer service instead of cost optimization. Ensure that the outsourcer can support your demands, considering your long-term achievement.

      Think about outsourcing like a marriage deed. Take into account building a good relationship before beginning the contract, ensure to include expectations in the agreement, and make it possible to exit the agreement if expectations are not satisfied or service improvement is not achieved.

      This is a picture of Mahmoud Ramin, PhD, Senior Research Analyst, Infrastructure and Operations, Info-Tech Research Group

      Mahmoud Ramin, PhD
      Senior Research Analyst
      Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      In organizations where technical support is viewed as non-strategic, many see outsourcing as a cost-effective way to provide this support. However, outsourcing projects often fall short of their goals in terms of cost savings and quality of support.

      Common Obstacles

      Significant administrative work and up-front costs are required to outsource the service desk, and poor planning often results in project failure and the decrease of end-user satisfaction.

      A complete turnover of the service desk can result in lost knowledge and control over processes, and organizations without an exit strategy can struggle to bring their service desk back in house and reestablish the confidence of end users.

      Info-Tech's Approach

      • First decide if outsourcing is the correct step; there may be more preliminary work to do beforehand.
      • Assess requirements and make necessary adjustments before developing an outsource RFP.
      • Clearly define the project and produce an RFP to provide to vendors.
      • Plan for long-term success, not short-term gains.
      • Prepare to retain some of the higher-level service desk work.

      Info-Tech Insight

      Outsourcing is easy. Realizing all of the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.

      Your challenge

      This research is designed to help organizations that need to:

      • Outsource the service desk or portions of service management to improve service delivery.
      • Improve and repatriate existing outsourcing outcomes by becoming more engaged in the management of the function. Regular reviews of performance metrics, staffing, escalation, knowledge base content, and customer satisfaction are critical.
      • Understand the impact that outsourcing would have on the service desk.
      • Understand the potential benefits that outsourcing can bring to the organization.

      This image contains a donut chart with the following information: Salaries and Benefits - 68.50%; Technology - 9.30%; Office Space and Facilities Expense - 14.90%; Travel, Training, and Office Supplies - 7.30%

      Source: HDI 2017

      About 68.5% of the service desk fund is allocated to agent salaries, while only 9.3% of the service desk fund is spent on technology. The high ratio of salaries and expenses over other expense drives organizations to outsource their service desk without taking other considerations into account.

      Info-Tech Insight

      The outsourcing contract must preserve your control, possession, and ownership of the intellectual property involved in the service desk operation. From the beginning of the process, repatriation should be viewed as a possibility and preserved as a capability.

      Your challenge

      This research helps organizations who would like to achieve these goals:

      • Determine objectives and requirements to outsource the service desk.
      • Develop a project charter and build an outsourcing strategy to efficiently define processes to reduce risk of failure.
      • Build an outsourcing RFP and conduct interviews to identify the best candidate for service delivery.
      • Build a long-term relationship with an outsourcing vendor, making sure the vendor is able to satisfy all requirements.
      • Include a continual improvement plan in the outsourcing strategy and contain the option upon service delivery dissatisfaction.

      New hires require between 10 and 80 hours of training (Forward Bpo Inc., 2019).

      A benchmark study by Zendesk from 45,000 companies reveals that timely resolution of issues and 24/7 service are the biggest factors in customer service experience.

      This image contains a bar graph with the following data: Timely issue resolution; 24/7 support; Friendly agent; Desired contact method; Not to repeat info; Proactive support; Self-serve; Call back; Rewards & freebies

      These factors push many businesses to consider service desk outsourcing to vendors that have capabilities to fulfill such requirements.

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • In most cases, organizations must perform significant administrative work before they can make a move. Those that fail to properly prepare impede a smooth transition, the success of the vendor, and the ability to repatriate.
      • Successful outsourcing comes from the recognition that an organization is experiencing complete turnover of its service desk staff. These organizations engage the vendor to transition knowledge and process to ensure continuity of quality.
      • IT realizes the most profound hidden costs of outsourcing when the rate of ticket escalation increases, diminishing the capacity of senior technical staff for strategic project work.

      Many organizations may not get the value they expect from outsourcing in their first year.

      Common Reasons:

      • Overall lack of due diligence in the outsourcing process
      • Unsuitable or unclear service transition plan
      • Poor service provider selection and management

      Poor transition planning results in delayed benefits and a poor relationship with your outsourcing service provider. A poor relationship with your service provider results in poor communication and knowledge transfer.

      Key components of a successful plan:

      1. Determine goals and identify requirements before developing an RFP.
      2. Finalize your outsourcing project charter and get ready for vendor evaluation.
      3. Assess and select the most appropriate provider; manage the transition and vendor relationship.

      Outsource the service desk properly, and you could see a wide range of benefits

      Service Desk Outsourcing: Ability to scale up/down; Reduce fixed costs; Refocus IT efforts on core activities; Access to up-to-date technology; Adhere to  ITSM best practices; Increased process optimization; Focus IT efforts on advanced expertise; Reframe to shift-left;

      Info-Tech Insight

      In your service desk outsourcing strategy, rethink downsizing first-level IT service staff. This can be an opportunity to reassign resources to more valuable roles, such as asset management, development or project backlog. Your current service desk staff are most likely familiar with the current technology, processes, and regulations within IT. Consider the ways to better use your existing resources before reducing headcount.

      Info-Tech's Approach

      Determine Goals

      Conduct activities in the blueprint to pinpoint your current challenges with the service desk and find out objectives to outsource customer service.

      Define Requirements

      You need to be clear about the processes that will be outsourced. Considering your objectives, we'll help you discover the processes to outsource, to help you achieve your goals.

      Develop RFP

      Your expectations should be documented in a formal proposal to help vendors provide solid information about how they will satisfy your requirements and what their plan is.

      Build Long-Term Relationship

      Make sure to plan for continual improvement by setting expectations, tracking the services with proper metrics, and using efficient communication with the provider. Think about the rainy day and include exit conditions for ending the relationship if needed.

      Info-Tech's methodology

      1. Define the Goal

      2. Design an Outsourcing Strategy

      3. Develop an RFP and Make a Long-Term Relationship

      Phase Steps

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare service overview and responsibility matrix

      3.2 Define approach to vendor relationship management

      3.3 Manage the outsource relationship

      Phase Outcomes

      Service Desk Outsourcing Vision and Goals

      Service Desk Processes to Outsource

      Outsourcing Roles and Responsibilities

      Outsourcing Risks and Constraints

      Service Desk Outsourcing Project Charter

      Service Desk Outsourcing RFP

      Continual Improvement Plan

      Exit Strategy

      This is an image of the strategy which you will use to build your requirements for outsourcing the service desk.  it includes: 1. Define the Goal; 2. Design an Outsourcing Strategy; 3. Develop RFP and long-term relationship.

      Insight summary

      Focus on value

      Outsourcing is easy. Realizing all of the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.

      Define outsourcing requirements

      You don't need to standardize before you outsource, but you still need to conduct your due diligence. If you outsource without thinking about how you want the future to work, you will likely be unsatisfied with the result.

      Don't focus on cost

      If cost is your only driver for outsourcing, understand that there will be other challenges. Customer service quality will likely be less, and your outsourcer may not add on frills such as Continual Improvement. Be careful that your specialists don't end up spending more time working on incidents and service requests.

      Emphasize on customer service

      A bad outsourcer relationship will result in low business satisfaction with IT overall. The service desk is the face of IT, and if users are dissatisfied with the service desk, then they are much likelier to be dissatisfied with IT overall.

      Vendors are not magicians

      They have standards in place to help them succeed. Determine ITSM best practices, define your requirements, and adjust process workflows accordingly. Your staff and end users will have a much easier transition once outsourcing proceeds.

      Plan ahead to guarantee success

      Identify outsourcing goals, plan for service and system integrations, document standard incidents and requests, and track tension metrics to make sure the vendor does the work efficiently. Aim for building a long-term relationship but contemplate potential exit strategy.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      This is a screenshot from the Service Desk Outsourcing Requirements Database Library

      Service Desk Outsourcing Requirements Database Library

      Use this library to guide you through processes to outsource

      This is a screenshot from the Service Desk Outsourcing RFP Template

      Service Desk Outsourcing RFP Template

      Use this template to craft a proposal for outsourcing your service desk

      This is a screenshot from the Service Desk Outsourcing Reference Interview Template

      Service Desk Outsourcing Reference Interview Template

      Use this template to verify vendor claims on service delivery with pervious or current customers

      This is a screenshot from the Service Desk Outsourcing Vendor Proposal Scoring Tool

      Service Desk Outsourcing Vendor Proposal Scoring Tool

      Use this tool to evaluate RFP submissions

      Key deliverable:

      This is a screenshot from the key deliverable, Service Desk Outsourcing Project Charter

      Service Desk Outsourcing Project Charter

      Document your project scope and outsourcing strategy in this template to organize the project for efficient resource and requirement allocation

      Blueprint benefits

      IT Benefits

      Business Benefits

      • Determine current challenges with the service desk and identify services to outsource.
      • Make the project charter for an efficient outsourcing strategy that will lead to higher satisfaction from IT.
      • Select the best outsource vendor that will satisfy most of the identified requirements.
      • Reduce the risk of project failure with efficient planning.
      • Understand potential feasibility of service desk outsourcing and its possible impact on business satisfaction.
      • Improve end-user satisfaction through a better service delivery.
      • Conduct more efficient resource allocation with outsourcing customer service.
      • Develop a long-term relationship between the enterprise and vendor through a continual improvement plan.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1Phase 2Phase 3

      Call #1: Scope your specific challenges and objectives

      Call #3: Identify project stakeholders, and potential risks and constraints

      Call #5: Create a detailed RFP

      Call #6: Identify strategy risks.

      Call #2: Assess outsourcing feasibility and processes to outsourceCall #4: Create a list of metrics to ensure efficient reporting

      Call #7: Prepare for vendor briefing and scoring each vendor

      Call #8: Build a communication plan

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 10 calls over the course of 4 to 6 months.

      Phase 1

      Define the goal

      Define the goal

      Design an outsourcing strategy

      Develop an RFP and make a long-term relationship

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare a service overview and responsibility matrix

      3.2 Define your approach to vendor relationship management

      3.3 Manage the outsource relationship

      This phase will walk you through the following activities:

      • Analysis outsourcing objectives
      • Assess outsourcing feasibility
      • Identify services and processes to outsource

      This phase involves the following participants:

      • Service Desk Team
      • IT Leadership

      Define requirements for outsourcing service desk support

      Step 1.1

      Identify goals and objectives

      Activities

      1.1.1 Find out why you want to outsource your service desk

      1.1.2 Document the benefits of outsourcing your service desk

      1.1.3 Identify your outsourcing vision and goals

      1.1.4 Prioritize service desk outsourcing goals to help structure your mission statement

      1.1.5 Craft a mission statement that demonstrates your decision to reach your outsourcing objectives

      Define the goal

      This step requires the following inputs:

      • List of strengths and weaknesses of the service desk
      • Challenges with the service desk

      This step involves the following participants:

      • CIO
      • IT Leadership
      • Service Desk Manager
      • IT Managers

      Outcomes of this step

      • Service desk outsourcing vision and goals
      • Benefits of outsourcing the service desk
      • Mission statement

      What is your rationale to outsource the service desk?

      Potential benefits of outsourcing the service desk:

      • Bring in the expertise and knowledge to manage tickets according to best-practice guidelines
      • Reduce the timeline to response and resolution
      • Improve IT productivity
      • Enhance IT services and improve performance
      • Augment relationship between IT and business through service-level improvement
      • Free up the internal team and focus IT on complex projects and higher priority tasks
      • Speed up service desk optimization
      • Improve end-user satisfaction through efficient IT services
      • Reduce impact of incidents through effective incident management
      • Increase service consistency via turnover reduction
      • Expand coverage hour and access points
      • Expand languages to service different geographical areas

      1.1.1 Find out why you want to outsource your service desk

      1 hour

      Service desk is the face of IT. Service desk improvement increases IT efficiency, lowers operation costs, and enhances business satisfaction.

      Common challenges that result in deciding to outsource the service desk are:

      Participants: IT Director, Service Desk Manager, Service Desk Team

      ChallengeExample
      Lack of tier 1 supportStartup does not have a dedicated service desk to handle incidents and provide services to end users.
      Inefficient ticket handlingMTTR is very high and end users are frustrated with their issues not getting solved quickly. Even if they call service desk, they are put on hold for a long time. Due to these inefficiencies, their daily work is greatly impacted.
      Restricted service hoursCompany headquartered in Texas does not have resources to provide 24/7 IT service. When users in the East Asia branch have a laptop issue, they must wait until the next day to get response from IT. This has diminished their satisfaction.
      Restricted languagesCompany X is headquartered in New York. An end user not fluent in English from Madrid calls in for support. It takes five minutes for the agent to understand the issue and log a ticket.
      Ticket backlogIT is in firefighting mode, very busy with taking care of critical incidents and requests from upper management. Almost no one is committed to the SLA because of their limited availability.

      Brainstorm your challenges with the service desk. Why have you decided to outsource your service desk? Use the above table as a sample.

      1.1.2 Document benefits of outsourcing your service desk

      1 hour

      1. Review the challenges with your current service desk identified in activity 1.1.1.
      2. Discuss possible ways to tackle these challenges. Be specific and determine ways to resolve these issues if you were to do it internally.
      3. Determine potential benefits of outsourcing the service desk to IT, business, and end users.
      4. For each benefit, describe dependencies. For instance, to reduce the number of direct calls (benefit), users should have access to service desk as a single point of contact (dependency).
      5. Document this activity in the Service Desk Outsourcing Project Charter Template.

      Download the Project Charter Template

      Input

      • List of challenges with the current service desk from activity 1.1.1

      Output

      • Benefits of outsourcing the service desk

      Materials

      • Whiteboard/flip charts
      • Markers
      • Sticky notes
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team
      • IT Managers

      Why should you not consider cost reduction as a primary incentive to outsourcing the service desk?

      Assume that some of the costs will not go away with outsourcing

      When you outsource, the vendor's staff tend to gradually become less effective as:

      • They are managed by metrics to reduce costs by escalating sooner, reducing talk time, and proposing questionable solutions.
      • Turnover results in new employees that get insufficient training.

      You must actively manage the vendor to identify and resolve these issues. Many organizations find that service desk management takes more time after they outsource.

      You need to keep spending on service desk management, and you may not get away from technology infrastructure spending.

      Info-Tech Insight

      In their first year, almost 42% of Info-Tech's clients do not get the real value of outsourcing services as expected. This iss primarily because of misalignment of organizational goals with outcomes of the outsourced services.

      Consider the hidden costs of outsourcing

      Expected Costs

      Unexpected Costs

      Example

      Transition CostsSeverance and staff retention
      • Cost to adapt to vendor standards
      • Training cost of vendor staff
      • Lost productivity
      • Format for requirements
      • Training report developers to work with vendor systems
      FeesPrice of the engagement
      • Extra fees for additional services
      • Extra charges for uploading data to cloud storage
      • Portal access
      Management CostsTime directing account
      • Time directly managing vendor staff
      • Checking deliverables for errors
      • Disputing penalty amounts
      Rework CostsDowntime, defect rate, etc. (quality metrics measured in SLAs)
      • Time spent adapting deliverables for unanticipated requirements
      • Time spent assuring the quality and usefulness of deliverables
      • Completing quality assurance and updating knowledgebase articles
      • Adapting reporting for presentation to stakeholders

      Determine strategies to avoid each hidden cost

      Costs related to transitioning into the engagementAdapting to standards and training costs

      Adapting to standards: Define the process improvements you will need to work with each potential vendor.

      Training costs for vendor staff: Reduce training costs by keeping the same vendor staff on all of your projects.

      Fee-related costs

      Fees for additional services (that you thought were included)

      Carefully review each proposed statement of work to identify and reduce extra fees. Understand why extra fees occur in the SLA, the contract, and the proposed statement of work, and take steps to protect yourself and the vendor.

      Management-related costs

      Direct management of vendor staff and dispute resolution

      Direct management of vendor staff: Avoid excessive management costs by defining a two-tier management structure on both sides of the engagement.

      Time spent resolving disputes: Avoid prolonged resolution costs by defining terms of divorce for the engagement up front.

      Rework costs

      Unanticipated requirements and integration with existing systems

      Unanticipated requirements: Use a two-stage process to define requirements, starting with business people and then with review by technical staff.

      Integration with existing systems: Obtain a commitment from vendors that deliverables will conform to standards at points of integration with your systems.

      Your outsourcing strategy should address the reasons you decided to outsource

      A clear vision of strategic objectives prior to entering an outsourcing agreement will allow you to clearly communicate these objectives to the Managed Service Provider (MSP) and use them as a contracted basis for the relationship.

      • Define the business' overall approach to outsourcing along with the priorities, rules, and principles that will drive the outsourcing strategy and every subsequent outsourcing decision and activity.
      • Define specific business, service, and technical goals for the outsourcing project and relevant measures of success.

      "People often don't have a clear direction around what they're trying to accomplish. The strategic goals should be documented. Is this a cost-savings exercise? Is it because you're deficient in one area? Is it because you don't have the tools or expertise to run the service desk yourself? Figure out what problem you're trying to solve by outsourcing, then build your strategy around that.
      – Jeremy Gagne, Application Support Delivery Manager, Allegis Group

      Most organizations are driven to consider outsourcing their service desk hoping to improve the following:

      • Ability to scale (train people and acquire skills)
      • Focus on core competencies
      • Decrease capital costs
      • Access latest technology without large investment
      • Resolve labor force constraints
      • Gain access to special expertise without paying a full salary
      • Save money overall

      Info-Tech Insight

      Use your goals and objectives as a management tool. Clearly outline your desired project outcomes to both your in-house team and the vendor during implementation and monitoring. It will allow a common ground to unite both parties as the project progresses.

      Mitigate pitfalls that lay in the way of desired outcomes of outsourcing

      Desired outcomePitfalls to overcome
      IT can focus on core competencies and strategic initiatives rather than break-fix tasks.Escalation to second- and third-level support usually increases when the first level has been outsourced. Outsourcers will have less experience with your typical incidents and will give up on trying to solve some issues more quickly than your internal level-one staff.
      Low outsourcing costs compared to the costs needed to employ internal employees in the same role. Due to lack of incentive to decrease ticket volume, costs are likely to increase. As a result, organizations often find themselves paying more overall for an outsourced service desk than if they had a few dedicated IT service desk employees in-house.
      Improved employee morale as a result of being able to focus on more interesting tasks.Management often expects existing employee morale to increase as a result of shifting their focus to core and strategic tasks, but the fear of diminished job security often spreads to the remaining non-level-one employees.

      1.1.3 Identify outsourcing vision and goals

      Identify the goals and objectives of outsourcing to inform your strategy.

      Participants: IT Director, Service Desk Manager, Service Desk Team

      1-2 hours

      1. Meet with key business stakeholders and the service desk staff who were involved in the decision to outsource.
      2. As a group, review the results from activity 1.1.1 (challenges with current service desk operations) and identify the goals and objectives of the outsourcing initiative.
      3. Determine the key performance indicator (KPI) for each goal.
      4. Identify the impacted stakeholder/s for each goal.
      5. Discuss checkpoint schedule for each goal to make sure the list stays updated.

      Use the sample table as a starting point:

      1. Document your table in the Service Desk Outsourcing Project Charter Template.
      IDGoal DescriptionKPIImpacted StakeholdersCheckpoint Schedule
      1Provide capacity to take calls outside of current service desk work hours
      • Decreased in time to response
      • Decreased time to resolve
      • IT Entire organization
      • Every month
      2Take calls in different languages
      • Improved service delivery in different geographical regions
      • Improved end-user satisfaction
      • End users
      • Every month
      3Provide field support at remote sites with no IT presence without having to fly out an employee
      • 40% faster incident resolution and request fulfillment
      • Entire organization
      • Every month
      4Improve ease of management by vendor helping with managing and optimizing service desk tasks
      • Improved service management efficiency
      • Entire organization
      • Every 3 months

      Download the Project Charter Template

      Evaluate organizational demographics to assess outsourcing rationale

      The size, complexity, and maturity of your organization are good indicators of service desk direction with regards to outsourcing.

      Organization Size

      • As more devices, applications, systems, and users are added to the mix, vendor costs will increase but their ability to meet business needs will decrease.
      • Small organizations are often either rejected by vendors for being too small or locked into a contract that is overkill for their actual needs (and budget).

      Complexity

      • Highly customized environments and organizations with specialized applications or stringent regulatory requirements are very difficult to outsource for a reasonable cost and acceptable quality.
      • In these cases, the vendor is required to train skilled support or ends up escalating more tickets back to second- and third-level support.

      Requirements

      • Organizations looking to outsource must have defined outsourcing requirements before looking at vendors.
      • Without a requirement assessment, the vendor won't have guidelines to follow and you won't be able to measure their adherence.

      Info-Tech Insight

      Although less adherence to service desk best practices can be one of the main incentives to outsourcing the service desk, IT should have minimal processes in place to be able to set expectations with targeting vendors.

      1.1.4 Prioritize service desk outsourcing goals to help structure mission statement

      0.5-1 hour

      The evaluation process for outsourcing the service desk should be done very carefully. Project leaders should make sure they won't panic internal resources and impact their performance through the transition period.

      If the outsourcing process is rushed, it will result in poor evaluation, inefficient decision making, and project failure.

      1. Refer to results in activity 1.1.3. Discuss the service desk outsourcing goals once again.
      2. Brainstorm the most important objectives. Use sticky notes to prioritize the items from the most important to the least important.
      3. Edit the order accordingly.

      Input

      • Project goals from activity 1.1.3

      Output

      • Prioritized list of outsourcing goals

      Materials

      • Whiteboard/flip charts
      • Markers
      • Sticky notes
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team
      • IT Managers

      Download the Project Charter Template

      1.1.5 Craft a mission statement that demonstrates your decision to reach outsourcing objectives

      Participants: IT Director, Service Desk Manager

      0.5-1 hour

      The IT mission statement specifies the function's purpose or reason for being. The mission should guide each day's activities and decisions. The mission statement should use simple and concise terminology and speak loudly and clearly, generating enthusiasm for the organization.

      Strong IT mission statements:

      • Articulate the IT function's purpose and reason for existence
      • Describe what the IT function does to achieve its vision
      • Define the customers of the IT function
      • Can be described as:
        • Compelling
        • Easy to grasp
        • Sharply focused
        • Inspirational
        • Memorable
        • Concise

      Sample mission statements:

      • To help fulfill organizational goals, IT has decided to empower business stakeholders with outsourcing the service desk.
      • To support efficient IT service provision, better collaboration, and effective communication, [Company Name] has decided to outsource the service desk.
      • [Company Name] plans to outsource the service desk so it can identify bottlenecks and inefficiencies with current service desk processes and enable [Company Name] to innovate and support business growth.
      • Considering the goals and benefits determined in the previous activities, outline a mission statement.
      • Document your outsourcing mission statement in the "Project Overview" section of the Project Charter Template.

      Download the Project Charter Template

      Step 1.2

      Assess outsourcing feasibility

      Activities

      1.2.1 Create a baseline of customer experience

      1.2.2 Identify service desk processes to outsource

      1.2.3 Design an outsourcing decision matrix for service desk processes and services

      1.2.4 Discuss if you need to outsource only service desk or if additional services would benefit from outsourcing too

      Define the goal

      This step requires the following inputs:

      • List of service desk tasks and responsibilities

      This step involves the following participants:

      • CIO
      • IT Leadership
      • Service Desk Manager
      • Infrastructure Manager

      Outcomes of this step

      • End-user satisfaction with the service desk
      • List of processes and services to outsource

      1.2.1 Create a baseline of customer experience

      Solicit targeted department feedback on IT's core service capabilities, communications, and business enablement from end users. Use this feedback to assess end-user satisfaction with each service, broken down by department and seniority level.

      1. Complete an end-user satisfaction survey to define the current state of your IT services, including service desk (timeliness and effectiveness). With Info-Tech's end-user satisfaction program, an analyst will help you set up the diagnostic and will go through the report with you.
      2. Evaluate survey results.
      3. Communicate survey results with team leads and discuss the satisfaction rates and comments of the end users.
      4. Schedule to launch another survey one year after outsourcing the service desk.
      5. Your results will be compared to the following year's results to analyze the overall success/failure of your outsourcing project.

      A decrease of business and end-user satisfaction is a big drive to outsourcing the service desk. Conduct a customer service survey to discover your end-user experience prior to and after outsourcing the service desk.

      Don't get caught believing common misconceptions: outsourcing doesn't mean sending away all the work

      First-time outsourcers often assume they are transferring most of the operations over to the vendor, but this is often not the case.

      1. Management of performance, SLAs, and customer satisfaction remain the responsibility of your organization.
      2. Service desk outsource vendors provide first-line response. This includes answering the phones, troubleshooting simple problems, and redirecting requests that are more complex.
      3. The vendor is often able to provide specialized support for standard applications (and for customized applications if you'll pay for it). However, the desktop support still needs someone onsite, and that service is very expensive to outsource.
      4. Tickets that are focused on custom applications and require specialized or advanced support are escalated back to your organization's second- and third-level support teams.

      Switching to a vendor won't necessarily improve your service desk maturity

      You should have minimal requirements before moving.

      Whether managing in-house or outsourcing, it is your job to ensure core issues have been clarified, processes defined, and standards maintained. If your processes are ad-hoc or non-existent right now, outsourcing won't fix them.

      You must have the following in place before looking to outsource:

      • Defined reporting needs and plans
      • Formalized skill-set requirements
      • Problem management and escalation guidelines
      • Ticket templates and classification rules
      • Workflow details
      • Knowledge base standards

      Info-Tech Insight

      If you expect your problems to disappear with outsourcing, they might just get worse.

      Define long-term requirements

      Anticipate growth throughout the lifecycle of your outsourcing contract and build that into the RFP

      • Most outsourcing agreements typically last three to five years. In that time, you risk outgrowing your service provider by neglecting to define your long-term service desk requirements.
      • Outgrowing your vendor before your contract ends can be expensive due to high switching costs. Managing multiple vendors can also be problematic.
      • It is crucial to define your service desk requirements before developing a request for proposal to make sure the service you select can meet your organization's needs.
      • Make sure that the business is involved in this planning stage, as the goals of IT need to scale with the growth strategy of the business. You may select a vendor with no additional capacity despite the fact that your organization has a major expansion planned to begin two years from now. Assessing future requirements also allows you to culture match with the vendor. If your outlooks and practices are similar, the match will likely click.

      Info-Tech Insight

      Don't select a vendor for what your company is today – select a vendor for what your company will be years from now. Define your future service desk requirements in addition to your current requirements and leave room for growth and development.

      You can't outsource everything

      Manage the things that stay in-house well or suffer the consequences.

      "You can't outsource management; you can only outsource supervision." Barry Cousins, Practice Lead, Info-Tech Research Group

      What can be the vendor in charge of?

      What stays in-house?

      • Call and email answering
      • Ongoing daily ticket creation and tracking
      • Tier 1 support
      • Internal escalation to Level 2 support
      • External escalation to specialized Level 2 and Level 3 support
      • Knowledge base article creation
      • Service desk-related hardware acquisition and maintenance
      • Service desk software acquisition and maintenance
      • Security and access management
      • Disaster recovery
      • Staff acquisition
      • Facilities
      • The role of the Service Desk Manager
      • Skills and training standards
      • Document standardization
      • Knowledge base quality assurance and documentation standardization
      • Self-service maintenance, promotion, and ownership
      • Short and long-term tracking of vendor performance

      Info-Tech Insight

      The need for a Service Desk Manager does not go away when you outsource. In fact, the need becomes even stronger and never diminishes.

      Assess current service desk processes before outsourcing

      Process standards with areas such as documentation, workflow, and ticket escalation should be in place before the decision to outsource has been made.

      Every effective service desk has a clear definition of the services that they are performing for the end user. You can't provide a service without knowing what the services are.

      MSPs typically have their own set of standards and processes in play. If your service desk is not at a similar level of maturity, outsourcing will not be pleasant.

      Make sure that your metrics are reported consistently and that they tell a story.

      "Establish baseline before outsourcing. Those organizations that don't have enough service desk maturity before outsourcing should work with the outsourcer to establish the baseline."
      – Yev Khobrenkov, Enterprise Consultant, Solvera Solutions

      Info-Tech Insight

      Outsourcing vendors are not service desk builders; they're service desk refiners. Switching to a vendor won't improve your maturity; you must have a certain degree of process maturity and standardization before moving.

      Case Study

      INDUSTRY: Cleaning Supplies

      SOURCE: PicNet

      Challenge

      • Reckitt Benckiser of Australia determined that its core service desk needed to be outsourced.
      • It would retain its higher level service desk staff to work on strategic projects.
      • The MSP needed to fulfill key requirements outlined by Reckitt Benckiser.

      Solution

      • Reckitt Benckiser recognized that its rapidly evolving IT needs required a service desk that could fulfill the following tasks:
      • Free up internal IT staff.
      • Provide in-depth understanding of business apps.
      • Offer efficient, cost-effective support onsite.
      • Focus on continual service improvement (CSI).

      Results

      • An RFP was developed to support the outsourcing strategy.
      • With the project structure outlined and the requirements of the vendor for the business identified, Reckitt Benckiser could now focus on selecting a vendor that met its needs.

      1.2.1 Identify service desk processes to outsource

      2-3 hours

      Review your prioritized project goals from activity 1.1.4.

      Brainstorm requirements and use cases for each goal and describe each use case. For example: To improve service desk timeliness, IT should improve incident management, to resolve incidents according to the defined SLA and based on ticket priority levels.

      Discuss if you're outsourcing just incident management or both incident management and request fulfillment. If both, determine what level of service requests will be outsourced? Will you ask the vendor to provide a service catalog? Will you outsource self-serve and automation?

      Document your findings in the service desk outsourcing requirements database library.

      Input

      • Outsourcing project goals from activity 1.1.4

      Output

      • List of processes to outsource

      Materials

      • Sticky notes
      • Markers
      • Whiteboard/flip charts
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Requirements Database Library

      1.2.2 Design an outsourcing decision matrix for service desk processes and services

      Participants: IT Director, Service Desk Manager, Infrastructure manager

      2-3 hours

      Most successful service desk outsourcing engagements have a primary goal of freeing up their internal resources to work on complex tasks and projects. The key outsourcing success factor is to find out internal services and processes that are standardized or should be standardized, and then determine if they can be outsourced.

      1. Review the list of identified service desk processes from activity 1.2.1.
      2. Discuss the maturity level of each process (low, medium, high) and document under the maturity column of the Outsource the Service Desk Requirements Database Library.
      3. Use the following decision matrix for each process. Discuss which tasks are important to strategic objectives, which ones provide competitive advantage, and which ones require specialized in-house knowledge.
      4. Identify processes that receive high vendor's performance advantage. For instance, access to talent, lower cost at scale, and access to technology.
      5. In your outsourcing assessment, consider a narrow scope of engagement and a broad view of what is important to business outcome.
      6. Based on your findings, determine the priority of each process to be outsourced. Document results in the service desk outsourcing requirements database library, and section 4.1 of the service desk outsourcing project charter.
      • Important to strategic objectives
      • Provides competitive advantage
      • Specialized in-house knowledge required

      This is an image of a quadrant analysis, where the X axis is labeled Vendor's Performance Advantage, and the Y axis is labeled Importance to Business Outcomes.

      • Talent/access to skills
      • Economies of scale/lower cost at scale
      • Access to technology

      Download the Requirements Database Library

      Download the Project Charter Template

      Maintain staff and training: you need to know who is being hired, how, and why

      Define documentation rules to retain knowledge

      • Establish a standard knowledge article template and list of required information.
      • Train staff on the requirements of knowledge base creation and management. Help them understand the value of the time spent recording their work.
      • It is your responsibility to assure the quality of each knowledge article. Outline accountabilities for internal staff and track for performance evaluations.

      For information on better knowledge management, refer to Info-Tech's blueprint Optimize the Service Desk With a Shift-Left Strategy.

      Expect to manage stringent skills and training standards

      • Plan on being more formal about a Service Manager position and spending more time than you allocated previously.
      • Complete a thorough assessment of the skills you need to keep the service desk running smoothly.
      • Don't forget to account for any customized or proprietary systems. How will you train vendor staff to accommodate your needs? What does their turnaround look like: would it be more likely that you acquire a dependable employee in-house?
      • Staffing requirements need to be actively monitored to ensure the outsourcer doesn't have degradation of quality or hiring standards. Don't assume that things run well – complete regular checks and ask for access to audit results.
      • Are the systems and data being accessed by the vendor highly sensitive or subject to regulatory requirements? If so, it is your job to ensure that vendor staff are being screened appropriately.

      Does your service desk need to integrate to other IT services?

      A common challenge when outsourcing multiple services to more than one vendor is a lack of collaboration and communication between vendors.

      • Leverage SIAM capabilities to integrate service desk tasks to other IT services, if needed.
      • "Service Integration and Management (SIAM) is a management methodology that can be applied in an environment that includes services sourced from a number of service providers" (Scopism Limited, 2020).
      • SIAM supports cross-functional integrations. Organizations that look for a single provider will be less likely to get maximum benefits from SIAM.

      There are three layers of entities in SIAM:

      • Customer Organization: The customer who receives services, who defines the relationship with service providers.
      • Service Integrator: End-to-end service governance and integration is done at this layer, making sure all service providers are committed to their services.
      • Service Provider: Responsible party for service delivery according to contract. It can be combination of internal provider, managed by internal agreements, and external provider, managed by SLAs between providers and customer organization.

      Use SIAM to obtain better results from multiple service providers

      In the SIAM model, the customer organization keeps strategic, governance, and business activities, while integrating other services (either internally or externally).

      This is an image of the SIAM model

      SIAM Layers. Source: SIAM Foundation BoK

      Utilize SIAM to obtain better results from multiple service providers

      SIAM reduces service duplication and improves service delivery via managing internal and external service providers.

      To utilize the SIAM model, determine the following components:

      • Service providers
      • Service consumers
      • Service outcomes
      • Service obstacles and boundaries
      • Service dependencies
      • Technical requirements and interactions for each service
      • Service data and information including service levels

      To learn more about adopting SIAM, visit Scopism.

      1.2.3 Discuss if you need to outsource only service desk or if additional services would benefit from outsourcing too

      1-2 hours

      • Discuss principles and goals of SIAM and how integrating other services can apply within your processes.
      • Review the list of service desk processes and tasks to be outsourced from activities 1.2.1 and 1.2.2.
      • Brainstorm a list of other services that are outsourced/need to be outsourced.
      • Determine providers of each service (both internal and external). Document the other services to be integrated in the project charter template and requirements database library.

      Input

      • SIAM objectives
      • List of service desk processes to outsource

      Output

      • List of other services to outsource and integrate in the project

      Materials

      • Sticky notes
      • Markers
      • Whiteboard/flip charts
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Requirements Database Library

      Download the Project Charter Template

      Establish requirements for problem management in the outsourcing plan

      Your MSP should not just fulfill SLAs – they should be a proactive source of value.

      Problem management is a group effort. Make sure your internal team is assisted with sufficient and efficient data by the outsourcer to conduct a better problem management.

      Clearly state your organization's expectations for enabling problem management. MSPs may not necessarily need, and cannot do, problem management; however, they should provide metrics to help you discover trends, define recurring issues, and enable root cause analysis.

      For more information on problem management, refer to Info-Tech's blueprint Improve Incident and Problem Management.

      PROBLEM MANAGEMENT

      INCIDENT MANAGEMENT

      INTAKE: Ticket data from incident management is needed for incident matching to identify problems. Critical Incidents are also a main input to problem management.

      EVENT MANAGEMENT

      INTAKE: SMEs and operations teams monitoring system health events can identify indicators of potential future issues before they become incidents.

      APPLICATION, INFRASTRUCTURE, and SECURITY TEAMS

      ACTION: Problem tickets require investigation from relevant SMEs across different IT teams to identify potential solutions or workarounds.

      CHANGE MANAGEMENT

      OUTPUT: Problem resolution may need to go through Change Management for proper authorization and risk management.

      Outline problem management protocols to gain value from your service provider

      • For example, with a deep dive into ticket trend analysis, your MSP should be able to tell you that you've had a large number of tickets on a particular issue in the past month, allowing you to look into means to resolve the issue and prevent it from reoccurring.
      • A proactive MSP should be able to help your service levels improve over time. This should be built into the KPIs and metrics you ask for from the outsourcer.

      Sample Scenario

      Your MSP tracks ticket volume by platform.

      There are 100 network tickets/month, 200 systems tickets/month, and 5,000 end-user tickets/month.

      Tracking these numbers is a good start, but the real value is in the analysis. Why are there 5,000 end-user tickets? What are the trends?

      Your MSP should be providing a monthly root-cause analysis to help improve service quality.

      Outcomes:

      1. Meeting basic SLAs tells a small part of the story. The MSP is performing well in a functional sense, but this doesn't shed any insight on what kind of knowledge or value is being added.
      2. The MSP should provide routine updates on ticket trends and other insights gained through data analysis.
      3. A commitment to continual improvement will provide your organization with value throughout the duration of the outsourcing agreement.

      Phase 2

      Design an Outsourcing Strategy

      Define the goal

      Design an outsourcing strategy

      Develop an RFP and make a long-term relationship

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare a service overview and responsibility matrix

      3.2 Define your approach to vendor relationship management

      3.3 Manage the outsource relationship

      This phase will walk you through the following activities:

      • Identify roles and responsibilities
      • Determine potential risks of outsourcing the service desk
      • Build a list of metrics

      This phase involves the following participants:

      • Service Desk Team
      • IT Leadership

      Define requirements for outsourcing service desk support

      Step 2.1

      Identify project stakeholders

      Activity

      2.1.1 Identify internal outsourcing roles and responsibilities

      Design an Outsourcing Strategy

      This step requires the following inputs:

      • List of service desk roles
      • Service desk outsourcing goals

      This step involves the following participants:

      • IT Managers
      • Project Team
      • Service Desk Manager

      Outcome of this step

      • Outsourcing roles and responsibilities

      Design an outsourcing strategy to capture the vision of your service desk

      An outsourcing strategy is crucial to the proper accomplishment of an outsourcing project. By taking the time to think through your strategy beforehand, you will have a clear idea of your desired outcomes. This will make your RFP of higher quality and will result in a much easier negotiation process.

      Most MSPs are prepared to offer a standard proposal to clients who do not know what they want. These are agreements that are doomed to fail. A clearly defined set of goals (discussed in Phase 1), risks, and KPIs and metrics (covered in this phase) makes the agreement more beneficial for both parties in the long run.

      1. Identify goals and objectives
      2. Determine mission statement
      3. Define roles and responsibilities
      4. Identify risks and constraints
      5. Define KPIs and metrics
      6. Complete outsourcing strategy

      A successful outsourcing initiative depends on rigorous preparation

      Outsourcing is a garbage in, garbage out initiative. You need to give your service provider the information they need to provide an effective product.

      • Data quality is critical to your outsourcing initiative's success.
      • Your vendor will be much better equipped to help you and to better price its services if it has a thorough understanding of your IT environment.
      • This means more than just building a catalog of your hardware and software. You will need to make available documented policies and processes so you and your vendor can understand where they fit in.
      • Failure to completely document your environment can lead to a much longer time to value as your provider will have to spend much more time (and thus much more money) getting their service up and running.

      "You should fill the gap before outsourcing. You should make sure how to measure tickets, how to categorize, and what the cost of outsourcing will be. Then you'll be able to outsource the execution of the service. Start your own processes and then outsource their execution."
      – Kris Krishan, Head of IT and business systems, Waymo

      Case Study

      Digital media company built an outsourcing strategy to improve customer satisfaction

      INDUSTRY: Digital Media

      SOURCE: Auxis

      Challenge

      A Canadian multi-business company with over 13,000 employees would like to maintain a growing volume of digital content with their endpoint management.

      The client operated a tiered model service desk. Tier 1 was outsourced, and tier 2 tasks were done internally, for more complex tasks and projects.

      As a result of poor planning and defining goals, the company had issues with:

      • Low-quality ticket handling
      • High volume of tickets escalated to tier 2, restraining them from working on complex tickets
      • High turn over and a challenge with talent retention
      • Insufficient documentation to train external tier 1 team
      • Long resolution time and low end-user satisfaction

      Solution

      The company structured a strategy for outsourcing service desk and defined their expectations and requirements.

      They engaged with another outsourcer that would fulfill their requirements as planned.

      With the help of the outsourcer's consulting team, the client was able to define the gaps in their existing processes and system to:

      • Implement a better ticketing system that could follow best-practices guidelines
      • Restructure the team so they would be able to handle processes efficiently

      Results

      The proactive planning led to:

      • Significant improvement in first call resolution (82%).
      • MTTR improvement freed tier 2 to focus on business strategic objectives and allowed them to work on higher-value activities.
      • With a better strategy around outsourcing planning, the company saved 20% of cost compared to the previous outsourcer.
      • As a result of this partnership, the company is providing a 24/7 structure in multiple languages, which is aligned with the company's growth.
      • Due to having a clear strategy built for the project, the client now has better visibility into metrics that support long-term continual improvement plans.

      Define roles and responsibilities for the outsourcing transition to form the base of your outsourcing strategy

      There is no "I" in outsource; make sure the whole team is involved

      Outsourcing is a complete top-to-bottom process that involves multiple levels of engagement:

      • Management must make high-level decisions about staffing and negotiate contract details with the vendor.
      • Service desk employees must execute on the documentation and standardization of processes in an effort to increase maturity.
      • Roles and responsibilities need to be clearly defined to ensure that all aspects of the transition are completed on time.
      • Implement a full-scale effort that involves all relevant staff. The most common mistake is to have the project design follow the same top-down pattern as the decision-making process.

      Info-Tech Insight

      The service desk doesn't operate in isolation. The service desk interfaces with many other parts of the organization (such as finance, purchasing, field support, etc.), so it's important to ensure you engage stakeholders from other departments as well. If you only engage the service desk staff in your discussions around outsourcing strategy and RFP development, you may miss requirements that will come up when it's too late.

      2.1.1 Identify internal outsourcing roles and responsibilities

      2 hours

      1. The sample RACI chart in section 5 of the Project Charter Template outlines which positions are responsible, accountable, consulted, and informed for each major task within the outsourcing project.
      2. Responsible, is the group that is responsible for the execution and oversight of activities for the project. Accountable is the owner of the task/process, who is accountable for the results and outcomes. Consulted is the subject matter expert (SME) who is actively involved in the task/process and consulted on decisions. Informed is not actively involved with the task/process and is updated about decisions around the task/process.
      3. Make sure that you assign only one person as accountable per process. There can be multiple people responsible for each task. Consulted and Informed are optional for each task.
      4. Complete the RACI chart with recommended participants, and document in your service desk outsourcing project charter, under section 5.

      Input

      • RACI template
      • Org chart

      Output

      • List of roles and responsibilities for outsource project

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Project Charter Template

      Step 2.2

      Outline potential risks and constraints

      Activities

      2.2.1 Identify potential risks and constraints that may impact achievement of objectives

      2.2.2 Arrange groups of tension metrics to balance your reporting

      Design an Outsourcing Strategy

      This step will walk you through the following activities:

      • Outsourcing objectives
      • Potential risks

      This step involves the following participants:

      • IT Managers
      • Project Team
      • Service Desk Manager

      Outcomes of this step

      • Mitigation strategy for each risk
      • Service desk metrics

      Know your constraints to reduce surprises during project implementation

      No service desk is perfect; know your limits and plan accordingly

      Define your constraints to outsourcing the service desk.

      Consider all types of constraints and opportunities, including:

      • Business forces
      • Economic cycles
      • Disruptive tech
      • Regulation and compliance issues
      • Internal organizational issues

      Within the scope of a scouring decision, define your needs and objectives, measure those as much as possible, and compare them with the "as-is" situation.

      Start determining what alternative approaches/scenarios the organization could use to fill the gaps. Start a comparison of scenarios against drivers, goals, and risks.

      Constraints

      Goals and objectives

      • Budget
      • Maturity
      • Compliance
      • Regulations
      • Outsourcing Strategy

      Plan ahead for potential risks that may impede your strategy

      Risk assessment must go hand-in-hand with goal and objective planning

      Risk is inherent with any outsourcing project. Common outsourcing risks include:

      • Lack of commitment to the customer's goals from the vendor.
      • The distraction of managing the relationship with the vendor.
      • A perceived loss of control and a feeling of over-dependence on your vendor.
      • Managers may feel they have less influence on the development of strategy.
      • Retained staff may feel they have become less skilled in their specialist field.
      • Unanticipated expenses that were assumed to be offered by the vendor.
      • Savings only result from high capital investment in new projects on the part of the customer.

      Analyze the risks associated with a specific scenario. This analysis should identify and understand the most common sourcing and vendor risks using a risk-reward analysis for selected scenarios. Use tools and guidelines to assess and manage vendor risk and tailor risk evaluation criteria to the types of vendors and products.

      Info-Tech Insight

      Plan for the worst to prevent it from happening. Evaluating risk should cover a wide variety of scenarios including the worst possible cases. This type of thinking will be crucial when developing your exit strategy in a later exercise.

      2.2.1 Identify potential risks and constraints that may impact achievement of objectives

      1-3 hours

      1. Brainstorm any potential risks that may arise through the outsourcing project. Describe each risk and categorize both its probability of occurring and impact on the organization as high (H), medium (M), or low (L), using the table below:
      Risk Description

      Probability(H/M/L)

      Impact(H/M/L)Planned Mitigation
      Lack of documentationMMUse cloud-based solution to share documents.
      Knowledge transferLMDetailed knowledge-sharing agreement in place in the RFP.
      Processes not followedLHClear outline and definition of current processes.
      1. Identify any constraints for your outsourcing strategy that may restrict, limit, or place certain conditions on the outsourcing project.
        • This may include budget restrictions or staffing limitations.
        • Identifying constraints will help you be prepared for risks and will lessen their impact.
      2. Document risks and constraints in section 6 of the Service Desk Outsourcing Project Charter Template.

      Input

      • RACI template
      • Org chart

      Output

      • List of roles and responsibilities for outsource project

      Materials

      • Whiteboard/flip charts
      • Markers

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Project Charter Template

      Define service tiers and roles to develop clear vendor SLAs

      Management of performance, SLAs, and customer satisfaction remain the responsibility of your organization.

      Define the tiers and/or services that will be the responsibility of the MSP, as well as escalations and workflows across tiers. A sample outsourced structure is displayed here:

      External Vendor

      Tickets beyond the scope of the service desk staff need to be escalated back to the vendor responsible for the affected system.

      Tier 3

      Tickets that are focused on custom applications and require specialized or advanced support are escalated back to your organization's second- and third-level support teams.

      Tier 2

      The vendor is often able to provide specialized support for standard applications. However, the desktop support still needs someone onsite as that service is very expensive to outsource.

      Tier 1

      Service desk outsource vendors provide first-line response. This includes answering the phones, troubleshooting simple problems, and redirecting requests that are more complex.

      Info-Tech Insight

      If you outsource everything, you'll be at the mercy of consultancy or professional services shops later on. You won't have anyone in-house to help you deploy anything; you're at the mercy of a consultant to come in and tell you what to do and how much to spend. Keep your highly skilled people in-house to offset what you'd have to pay for consultancy. If you need to repatriate your service desk later on, you will need skills in-house to do so.

      Don't become obsessed with managing by short-term metrics – look at the big picture

      "Good" metric results may simply indicate proficient reactive fixing; long-term thinking involves implementing proactive, balanced solutions.

      KPIs demonstrate that you are running an effective service desk because:

      • You close an average of 300 tickets per week
      • Your first call resolution is above 90%
      • Your talk time is less than five minutes
      • Surveys reveal clients are satisfied

      While these results may appear great on the surface, metrics don't tell the whole story.

      The effort from any support team seeks to balance three elements:

      FCR: Time; Resources; Quality

      First-Contact Resolution (FCR) Rate

      Percentage of tickets resolved during first contact with user (e.g. before they hang up or within an hour of submitting ticket). Could be measured as first-contact, first-tier, or first-day resolution.

      End-User Satisfaction

      Perceived value of the service desk measured by a robust annual satisfaction survey of end users and/or transactional satisfaction surveys sent with a percentage of tickets.

      Ticket Volume and Cost Per Ticket

      Monthly operating expenses divided by average ticket volume per month. Report ticket volume by department or ticket category, and look at trends for context.

      Average Time to Resolve (incidents) or Fulfill (service requests)

      Time elapsed from when a ticket is "open" to "resolved." Distinguish between ticket resolution vs. closure, and measure time for incidents and service requests separately.

      Focus on tension metrics to achieve long-term success

      Tension metrics help create a balance by preventing teams from focusing on a single element.

      For example, an MSP built incentives around ticket volume for their staff, but not the quality of tickets. As a result, the MSP staff rushed through tickets and gamed the system while service quality suffered.

      Use metrics to establish baselines and benchmarking data:

      • If you know when spikes in ticket volumes occur, you can prepare to resource more appropriately for these time periods
      • Create KB articles to tackle recurring issues and assist tier 1 technicians and end users.
        • Employ a root cause analysis to eliminate recurring tickets.

      "We had an average talk time of 15 minutes per call and I wanted to ensure they could handle those calls in 15 minutes. But the behavior was opposite, [the vendor] would wrap up the call, transfer prematurely, or tell the client they'd call them back. Service levels drive behavior so make sure they are aligned with your strategic goals with no unintended consequences."
      – IT Services Manager, Banking

      Info-Tech Insight

      Make sure your metrics work cooperatively. Metrics should be chosen that cause tension on one another. It's not enough to rely on a fast service desk that doesn't have a high end-user satisfaction rate or runs at too high a cost; there needs to be balance.

      2.2.2 Arrange groups of tension metrics to balance your reporting

      1-3 hours

      1. Define KPIs and metrics that will be critical to service desk success.
      2. Distribute sticky notes of different colors to participants around the table.
      3. Select a space to place the sticky notes – a table, whiteboard, flip chart, etc. – and divide it into three zones.
      4. Refer to your defined list of goals and KPIs from activity 1.1.3 and discuss metrics to fulfill each KPI. Note that each goal (critical success factor, CSF) may have more than one KPI. For instance:
        1. Goal 1: Increase end-user satisfaction; KPI 1: Improve average transactional survey score. KPI 2: Improve annual relationship survey score.
        2. Goal 2: Improve service delivery; KPI 1: Reduce time to resolve incidents. KPI 2: Reduce time to fulfill service requests.
      5. Recall that tension metrics must form a balance between:
        1. Time
        2. Resources
        3. Quality
      6. Record the results in section 7 of the Service Desk Outsourcing Project Charter Template.

      Input

      • Service desk outsourcing goals
      • Service desk outsourcing KPIs

      Output

      • List of service desk metrics

      Materials

      • Whiteboard/flip charts
      • Sticky notes
      • Markers
      • Laptops

      Participants

      • Project Team
      • Service Desk Manager

      Download the Project Charter Template

      Phase 3

      Develop an RFP and make a long-term relationship

      Define the goal

      Design an outsourcing strategy

      Develop an RFP and make a long-term relationship

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare a service overview and responsibility matrix

      3.2 Define your approach to vendor relationship management

      3.3 Manage the outsource relationship

      This phase will walk you through the following activities:

      • Build your outsourcing RFP
      • Set expectations with candidate vendors
      • Score and select your vendor
      • Manage your relationship with the vendor

      This phase involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Define requirements for outsourcing service desk support

      Step 3.1

      Prepare a service overview and responsibility matrix

      Activities

      3.1.1 Evaluate your technology, people, and process requirements

      3.1.2 Outline which party will be responsible for which service desk processes

      This step requires the following inputs:

      • Service desk processes and requirements

      This step involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Outcomes of this step

      • Knowledge management and technology requirements
      • Self-service requirements

      Develop an RFP and make a long-term relationship

      Create a detailed RFP to ensure your candidate vendor will fulfill all your requirements

      At its core, your RFP should detail the outcomes of your outsourcing strategy and communicate your needs to the vendor.

      The RFP must cover business needs and the more detailed service desk functions required. Many enterprises only consider the functionality they need, while ignoring operational and selection requirements.

      Negotiate a supply agreement with the preferred outsourcer for delivery of the required services. Ensure your RFP covers:

      1. Service specification
      2. Service levels
      3. Roles and responsibilities
      4. Transition period and acceptance
      5. Prices, payment, and duration
      6. Agreement administration
      7. Outsourcing issues

      In addition to defining your standard requirements, don't forget to take into consideration the following factors when developing your RFP:

      • Employee onboarding and hardware imaging for new users
      • Applications you need current and future support for
      • Reporting requirements
      • Self-service options
      • Remote support needs and locations

      Although it may be tempting, don't throw everything over the wall at your vendor in the RFP. Evaluate your service desk functions in terms of quality, cost effectiveness, and the value provided from the vendor. Organizations should only outsource functions that the vendor can operate better, faster, or cheaper.

      Info-Tech Insight

      Involve the right stakeholders in developing your RFP, not just service desk. If only service desk is involved in RFP discussion, the connection between tier 1 and specialists will be broken, as some processes are not considered from IT's point of view.

      Identify ITSM solution requirements

      Your vendor probably uses a different tool to manage their processes; make sure its capabilities align with the vision of your service desk.

      Your service desk and outsourcing strategy were both designed with your current ITSM solution in mind. Before you hand the reins to an MSP, it is crucial that you outline how your current ITSM solution is being used in terms of functionality.

      Find out if it's better to have the MSP use their own ITSM tools or your ITSM solution.

      Benefits of operating within your own ITSM while outsourcing the service desk:

      Disadvantages of using your own ITSM while outsourcing the service desk:

      • If you provide the service catalog, it's easier to control your ITSM tool yourself.
      • Using your own ITSM and giving access to the outsourcer will allow you to build your dashboard and access your operational metrics rather than relying on the MSP to provide you with metrics.
      • Usage of the current tool may be extended across multiple departments, so it may be in the best interest of your business to have the vendor adopt usage of the current tool.
      • While many ITSM solutions have similar functions, innate differences do exist between them. Outsourcers mostly want to operate in their own ticketing solution. As other departments besides IT may be using the service management tool, you will need to have the same tool across the organization. This makes purchasing the new ITSM license very expensive, unless you operate in the same ITSM as the outsourcer.
      • You need your vendor to be able to use the system you have in order to meet your requirements, which will limit your options in the market.
      • If the outsourcer is using your ITSM, you should provide training to them.

      Info-Tech Insight

      Defining your tool requirements can be a great opportunity to get the tool functionality you always wanted. Many MSPs offer enterprise-level ITSM tools and highly mature processes that may tempt you to operate within their ITSM environment. However, first define your goals for such a move, as well as pros and cons of operating in their service management tool to weigh if its benefits overweigh its downfalls.

      Case Study

      Lone Star College learned that it's important to select a vendor whose tool will work with your service desk

      INDUSTRY: Education

      SOURCE: ServiceNow

      Challenge

      Lone Star College has an end-user base of over 100,000 staff and students.

      The college has six campuses across the state of Texas, and each campus was using its own service desk and ITSM solution.

      Initially, the decision was to implement a single ITSM solution, but organizational complexity prevented that initiative from succeeding.

      A decision was made to outsource and consolidate the service desks of each of the campuses to provide more uniform service to end users.

      Solution

      Lone Star College selected a vendor that implemented FrontRange.

      Unfortunately, the tool was not the right fit for Lone Star's service and reporting needs.

      After some discussion, the outsourcing vendor made the switch to ServiceNow.

      Some time later, a hybrid outsourced model was implemented, with Lone Star and the vendor combining to provide 24/7 support.

      Results

      The consolidated, standardized approach used by Lone Star College and its vendor has created numerous benefits:

      • Standardized reporting
      • High end-user satisfaction
      • All SLAs are being met
      • Improved ticket resolution times
      • Automated change management.

      Lone Star outsourced in order to consolidate its service desks quickly, but the tools didn't quite match.

      It's important to choose a tool that works well with your vendor's, otherwise the same standardization issues can persist.

      Design your RFP to help you understand what the vendor's standard offerings are and what it is capable of delivering

      Your RFP should be worded in a way that helps you understand what your vendor's standard offerings are because that's what they're most capable of delivering. Rather than laying out all your requirements in a high level of detail, carefully craft your questions in a probing way. Then, understand what your current baseline is, what your target requirements are, and assess the gap.

      Design the RFP so that responses can easily be compared against one another.

      It is common to receive responses that are very different – RFPs don't provide a response framework. Comparing vastly different responses can be like comparing apples to oranges. Not only are they immensely time consuming to score, their scores also don't end up accurately reflecting the provider's capabilities or suitability as a vendor.

      If your RFP is causing a ten minute printer backlog, you're doing something wrong.

      Your RFP should not be hundreds of pages long. If it is, there is too much detail.

      Providing too much detail can box your responses in and be overly limiting on your responses. It can deter potentially suitable provider candidates from sending a proposal.

      Request
      For
      Proposal

      "From bitter experience, if you're too descriptive, you box yourself in. If you're not descriptive enough, you'll be inundated with questions or end up with too few bidders. We needed to find the best way to get the message across without putting too much detail around it."
      – Procurement Manager, Utilities

      Info-Tech's Service Desk Outsourcing RFP Template contains nine sections

      1. Statement of work
        • Purpose, coverage, and participation ààInsert the purpose and goals of outsourcing your service desk, using steps 1.1 findings in this blueprint as reference.
      2. General information
        • Information about the document, enterprise, and schedule of events ààInsert the timeline you developed for the RFP issue and award process in this section.
      3. Proposal preparation instructions
        • The vendor's understanding of the RFP, good faith statement, points of contact, proposal submission, method of award, selection and notification.
      4. Service overview
        • Information about organizational perspective, service desk responsibility matrix, vendor requirements, and service level agreements (SLAs).
      5. Scope of work, specifications and requirements
        • Technical and functional requirements à Insert the requirements gathered in Phase 1 in this section of the RFP. Remember to include both current and future requirements.
      6. Exit conditions
        • Overview of exit strategy and transition process.
      7. Vendor qualifications and references
      8. Account management and estimated pricing
      9. Vendor certification
      This is a screenshot of the Service Desk Outsourcing RFP Template.

      The main point of focus in this document is defining your requirements (discussed in Phase 1) and developing proposal preparation instructions.

      The rest of the RFP consists mostly of standard legal language. Review the rest of the RFP template and adapt the language to suit your organization's standards. Check with your legal departments to make sure the RFP adheres to company policies.

      3.1.1 Evaluate your technology, people, and process requirements

      1-2 hours

      1. Review the outsourcing goals you identified in Phase 1 (activity 1.1.3).
      2. For each goal, divide the defined requirements from your requirements database library (activity 1.2.1) into three areas:
        1. People Requirements
        2. Process Requirements
        3. Technical Requirements
      3. Group your requirements based on characteristics (e.g. recovery capabilities, engagement methodology, personnel, etc.).
      4. Validate these requirements with the relevant stakeholders.
      5. Document your results in section 4 of the Service Desk Outsourcing RFP Template.

      Input

      • Identified key requirements

      Output

      • Refined requirements to input into the RFP

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      Assess knowledge management and technology requirements to enable the outsourcer with higher quality work

      Retain ownership of the knowledgebase to foster long-term growth of organizational intelligence

      With end users becoming more and more tech savvy, organizational intelligence is becoming an increasingly important aspect of IT support. Modern employees are able and willing to troubleshoot on their own before calling into the service desk. The knowledgebase and FAQs largely facilitate self-serve trouble shooting, both of which are not core concerns for the outsource vendor.

      Why would the vendor help you empower end users and decrease ticket volume when it will lead to less revenue in the future? Ticket avoidance is not simply about saving money by removing support. It's about the end-user community developing organizational intelligence so that it doesn't need as much technical support.

      Organizational intelligence occurs when shared knowledge and insight is used to make faster, better decisions.

      When you outsource, the flow of technical insight to your end-user community slows down or stops altogether unless you proactively drive it. Retain ownership of the knowledgebase and ensure that the content is:

      1. Validated to ensure it accurately describes the best solution.
      2. Actionable to ensure it prescribes repeatable, verifiable steps.
      3. Contextual to ensure the reader knows when NOT to apply the knowledge.
      4. Maintained to ensure the solution remains current.
      5. Applied, since knowledge is a cost with no benefit unless you apply it and turn it into organizational intelligence.

      Info-Tech Insight

      Include knowledge management process in your ticket handling workflows to make sure knowledge is transferred to the MSP and end users. For more information on knowledge management, refer to Info-Tech's Standardize the Service Desk and Optimize the Service Desk With a Shift-Left Strategy blueprints.

      Assess self-service requirements in your outsourcing plan

      When outsourcing the service desk, determine who will take ownership of the self-service portal.

      Nowadays, outsourcers provide innovative services such as self-serve options. However, bear in mind that the quality of such services is a differentiating factor. A well-maintained portal makes it easy to:

      • Report incidents efficiently via use-case-based forms
      • Place requests via a business-oriented service catalog
      • Automate request processes
      • Give visibility on ticket status
      • Access knowledgebase articles
      • Provide status on critical systems
      • Look for services by both clicking service lists and searching them
      • Provide 24/7 service via interactive communication with live agent and AI-powered machine
      • Streamline business process in multiple departments rather than only IT

      In the outsourcing process, determine your expectations from your vendor on self-serve options and discuss how they will fulfill these requirements. Similar to other processes, work internally to define a list of services your organization is providing that you can pass over to the outsourcer to convert to a service catalog.

      Use Info-Tech's Sample Enterprise Services document to start determining your business's services.

      Assess admin rights in your outsourcing plan to give access to the outsourcer while you keep ownership

      Provide accessibility to account management to improve self-service, which enables:

      • Group owners to be named who can add or remove people from their operating units
      • Users to update attributes such as photos, address, phone number
      • Synchronization with HRIS (Human Resource Information Systems) to enable two-way communication on attribute updates
      • Password reset self-service

      Ensure the vendor has access rights to execute regular clean up to help:

      • Find stale and inactive user and computer accounts (inactive, expired, stale, never logged in)
      • Bulk move and disable capabilities
      • Find empty groups and remove
      • Find and assess NTFS permissions
      • Automated tasks to search and remediate

      Give admin rights to outsourcer to enable reporting and auditing capabilities, such as:

      • Change tracking and notifications
      • Password reset attempts, account unlocks, permission and account changes
      • Anomaly detection and remediation
      • Privilege abuse, such as password sharing

      Info-Tech Insight

      Provide your MSP with access rights to enable the service desk to have account management without giving too much authentication. This way you'll enable moving tickets to the outsourcer while you keep ownership and supervision.

      3.1.2 Outline which party will be responsible for which service desk processes

      1-2 hours

      This activity is an expansion to the outcomes of activity 1.2.1, where you determined the outsourcing requirements and the party to deliver each requirement.

      1. Add your identified tasks from the requirements database library to the service desk responsibility matrix (section 4.2 of the Service Desk Outsourcing RFP Template).
      2. Break each task down into more details. For instance, incident management may include tier 1, tier 2/3, KB creation and update, reporting, and auditing.
      3. Refer to section 4.1 of your Project Charter to review the responsible party for each use case.
      4. Considering the use cases, assess whether your organization, the MSP, or both parties will be responsible for the task.
      5. Document the results in section 4.2 of the RFP.

      Input

      • Identified key requirements

      Output

      • Responsible party to deliver each task

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      Step 3.2

      Define your approach to vendor relationship management

      Activities

      3.2.1 Define your SLA requirements

      3.2.2 Score each vendor to mitigate the risk of failure

      3.2.3 Score RFP responses

      3.2.4 Get referrals, conduct reference interviews and evaluate responses for each vendor

      Develop an RFP and make a long-term relationship

      This step requires the following inputs:

      • Service desk outsourcing RFP
      • List of service desk outsourcing requirements

      This step involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Outcomes of this step

      • Service desk SLA
      • RFP scores

      Don't rush to judgment; apply due diligence when selecting your vendor

      The most common mistake in vendor evaluation is moving too quickly. The process leading to an RFP evaluation can be exhausting, and many organizations simply want to be done with the whole process and begin outsourcing.

      The most common mistake in vendor evaluation is moving too quickly. The process leading to an RFP evaluation can be exhausting, and many organizations simply want to be done with the whole process and begin outsourcing.

      1. Call around to get referrals for each vendor
      2. Create a shortlist
      3. Review SLAs and contract terms
      4. Select your vendor

      Recognize warning signs in the MSP's proposal to ensure a successful negotiation

      Vendors often include certain conditions in their proposals that masquerade as appealing but may spell disaster. Watch for these red flags:

      1. Discounted Price
        • Vendors know the market value of their competitors' services. Price is not what sets them apart; it's the type of services offered as well as the culture present.
        • A noticeably low price is often indicative of a desperate organization that is not focused on quality managed services.
      2. No Pushback
        • Vendors should work to customize their proposal to suit both their capabilities and your needs. No pushback means they are not invested in your project as deeply as they should be.
        • You should be prepared for and welcome negotiations; they're a sign that both sides are reaching a mutually beneficial agreement.
      3. Continual SLA Improvement
        • Continual improvement is a good quality that your vendor should have, but it needs to have some strategic direction.
        • Throwing continual SLA improvement into the deal may seem great, but make sure that you'll benefit from the value-added service. Otherwise, you'll be paying for services that you don't actually need.

      Clearly define core vendor qualities before looking at any options

      Vendor sales and marketing people know just what to say to sway you: don't talk to them until you know what you're looking for.

      Geography

      Do you prefer global or local data centers? Do you need multiple locations for redundancy in case of disaster? Will language barriers be a concern?

      Contract Length

      Ensure you can terminate a poor arrangement by having shorter terms with optional renewals. It's better to renew and renegotiate if one side is losing in the deal in order to keep things fair. Don't assume that proposed long-term cost savings will provide a satisfactory service.

      Target Market

      Vendors are aiming at different business segments, from startups to large enterprises. Some will accept existing virtual machines, and others enforce compliance to appeal to government and health agencies.

      SLA

      A robust SLA strengthens a vendor's reliability and accountability. Agencies with special needs should have room in negotiations for customization. Providers should also account for regular SLA reviews and updates. Vendors should be tracking call volume and making projections that should translate directly to SLAs.

      Support

      Even if you don't need a vendor with 24/7 availability, vendors who cannot support this timing should be eliminated. You may want to upgrade later and will want to avoid the hassle of switching.

      Maturity

      Vendors must have the willingness and ability to improve processes and efficiencies over time. Maintaining the status-quo isn't acceptable in the constantly evolving IT world.

      Cost

      Consider which model makes the most sense: will you go with per call or per user pricing? Which model will generate vendor motivation to continually improve and meet your long-term goals? Watch out for variable pricing models.

      Define your SLA requirements so your MSP can create a solution that fits

      SLAs ensure accountability from the service provider and determine service price

      SLAs define the performance of the service desk and clarify what the provider and customer can expect in their outsourcing relationship.

      • Service categories
      • The acceptable range of end-user satisfaction
      • The scope of what functions of the service desk are being measured (availability, time to resolve, time to respond, etc.)
      • Credits and penalties for achieving or missing targets
      • Frequency of measurement/reporting
      • Provisions and penalties for ending the contractual relationship early
      • Management and communication structure
      • Escalation protocol for incidents relating to tiers 2 or 3

      Each MSP's RFP response will help you understand their basic SLA terms and enhanced service offerings. You need to understand the MSP's basic SLA terms to make sure they are adequate enough for your requirements. A well-negotiated SLA will balance the requirements of the customer and limit the liability of the provider in a win/win scenario.

      For more information on defining service level requirements, refer to Info-Tech's blueprint Reduce Risk With Rock-Solid Service-Level Agreements.

      3.2.1 Define your SLA requirements

      2-3 hours

      • As a team, review your current service desk SLA for the following items:
        • Response time
        • Resolution time
        • Escalation time
        • End-user satisfaction
        • Service availability
      • Use the sample table as a starting point to determine your current incident management SLA:
      • Determine your SLA expectations from the outsourcer.
      • Document your SLA expectations in section 4.4 of the RFP template.

      Participants: IT Managers, Service Desk Manager, Project Team

      Response
      PriorityResponse SLOResolution SLOEscalation Time
      T1
      Severity 1CriticalWithin 10 minutes4 hours to resolveImmediate
      Severity 2HighWithin 1 business hour8 business hours to resolve20 minutes
      Severity 3MediumWithin 4 business hours24 business hours to resolveAfter 20 minutes without progress
      Severity 4LowSame day (8 hours)72 business hours to resolve After 1 hour without progress
      SLO ResponseTime it takes for service desk to respond to service request or incident. Target response is 80% of SLO
      SLO ResolutionTime it takes to resolve incident and return business services to normal. Target resolution is 80% of SLO

      Download the Service Desk Outsourcing RFP Template

      Get a detailed plan from your selected vendor before signing a contract

      Build a standard process to evaluate candidate vendors

      Use section 5 of Info-Tech's Service Desk Outsourcing RFP Template for commonly used questions and requirements for outsourcing the service desk. Ask the right questions to secure an agreement that meets your needs. If you are already in a contract with an MSP, tale the opportunity of contract renewal to improve the contract and service.

      This is a screenshot of the Service Desk Outsourcing RFP Template.

      Download the Service Desk Outsourcing RFP Template

      Add your finalized assessment questions into Info-Tech's Service Desk Outsourcing RFP Scoring Tool to aggregate responses in one repository for comparison. Since the vendors are asked to respond in a standard format, it is easier to bring together all the responses to create a complete view of your options.

      This is an image of the Service Desk Vendor Proposal Scoring Tool

      Download the Service Desk Vendor Proposal Scoring Tool

      3.2.2 Score each vendor to mitigate the risk of failure

      1-2 hours

      Include the right requirements for your organization and analyze candidate vendors on their capability to satisfy them.

      1. Use section 5 of the RFP template to convert your determined requirements into questions to address in vendor briefings.
      2. Review the questions in the context of near- and long-term service desk outsourcing needs. In the template, we have separated requirements into 7 categories:
        • Vendor Requirements (VR)
        • Vendor Qualifications/Engagement/Administration Capabilities (VQ)
        • Service Operations (SO)
        • Service Support (SS)
        • Service Level Agreement (SLA)
        • Transition Processes (TP)
        • Account Management (AM)
      3. Define the priority for each question:
        • Required
        • Desired
        • Optional
      4. Leave the compliance and comments to when you brief with vendors.

      Input

      • Technical and functional requirements

      Output

      • Priority level for each requirement
      • Completed list of requirement questions

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      3.2.3 Score RFP responses

      2-3 hours

      1. Enter the requirements questions into the RFP Scoring Tool and use it during vendor briefings.
      2. Copy the Required and Desired priority requirements from the previous activity into the RFP Questions column.
      3. Evaluate each RFP response against the RFP criteria based on the scoring scale.
      4. The Results section in the tool shows the vendor ranking based on their overall scores.
      5. Compare potential outsourcing partners considering scores on individual requirements categories and based on overall scores.

      Input

      • Completed list of requirement questions
      • Priority level for each requirement

      Output

      • List of top vendors for outsourcing the service desk

      Materials

      • Service Desk Vendor Proposal Scoring Tool

      Participants

      • Service Desk Manager
      • IT Managers
      • Project Managers
      • IT Director/CIO

      Download the Service Desk Vendor Proposal Scoring Tool

      3.2.3 Get referrals, conduct reference interviews, and evaluate responses for each vendor

      1. Outline a list of questions to conduct reference interviews with past/present clients of your candidate vendors.
      2. Use the reference interview template as a starting point. As a group review the questions and edit them to a list that will fulfill your requirements.
      3. Ask your candidate vendors to provide you with a list of three to five clients that have/had used their services. Make sure that vendors enforce the interview will be kept anonymous and names and results won't be disclosed.
      4. Ask vendors to book a 20-30 minute call with you and their client.
      5. Document your interview comments in your updated reference interview template.
      6. Update the RFP scoring tool accordingly.

      Input

      • List of top vendors for outsourcing the service desk

      Output

      • Updated list of top vendors for outsourcing the service desk

      Materials

      • Service Desk Outsourcing Reference Interview Template
      • Service Desk Vendor Proposal Scoring Tool

      Participants

      • Service Desk Manager
      • IT Managers
      • Project Managers

      Download the Service Desk Vendor Proposal Scoring Tool

      Compare pricing models of outsourcing services

      It's a common sales tactic to use a low price as an easy solution. Carefully evaluate the vendors on your short-list and ensure that SLAs, culture, and price all match to your organization.

      Research different pricing models and accurately assess which model fits your organization. Consider the following pricing models:

      Pay per technician

      In this model, a flat rate is allocated to agents tackling your service desk tickets. This is a good option for building long-term relationship with outsourcer's agents and efficient knowledge transfer to the external team; however, it's not ideal for small organizations that deal with few tickets. This is potentially an expensive model for small teams.

      Pay per ticket

      This model considers the number of tickets handled by the outsourcer. This model is ideal if you only want to pay for your requirement. Although the internal team needs to have a close monitoring strategy to make sure the outsourcer's efficiency in ticket resolution.

      Pay per call

      This is based on outbound and inbound calls. This model is proper for call centers and can be less expensive than the other models; however, tracking is not easy, as you should ensure service desk calls result in efficient resolution rather than unnecessary follow-up.

      Pay per time (minutes or hours)

      The time spent on tickets is considered in this model. With this model, you pay for the work done by agents, so that it may be a good and relatively cheap option. As quicker resolution SLA is usually set by the organization, customer satisfaction may drop, as agents will be driven to faster resolution, not necessarily quality of work.

      Pay per user

      This model is based on number of all users, or number of users for particular applications. In this model, correlation between number of users and number of tickets should be taken into account. This is an ideal model if you want to deal with impact of staffing changes on service price. Although you should first track metrics such as mean time to resolve and average number of tickets so you can prevent unnecessary payment based on number of users when most users are not submitting tickets.

      Step 3.3

      Manage the outsource relationship

      Activities

      3.3.1 Analyze your outsourced service desk for continual improvement

      3.3.2 Make a case to either rehabilitate your outsourcing agreement or exit

      3.3.3 Develop an exit strategy in case you need to end your contract early

      Develop an RFP and make a long-term relationship

      This step requires the following inputs:

      • Service desk SLA
      • List of impacted stakeholder groups
      • List of impacts and benefits of the outsourced service desk

      This step involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Outcomes of this step

      • Communication plan
      • Vendor management strategy

      Ensure formality of your vendor management practice

      A service desk outsourcing project is an ongoing initiative. Build a relationship plan to make sure the outsourcer complies with the agreement.

      This is an iamge of the cycle of relationship management and pre-contract management.

      Monitor Vendor Performance

      Key Activity:

      Measure performance levels with an agreed upon standard scorecard.

      Manage Vendor Risk

      Key Activity:

      Periodical assessment of the vendors to ensure they are meeting compliance standards.

      Manage Vendor Contracts and Relationships

      Key Activity:
      Manage the contracts and renewal dates, the level of demand for the services/products provided, and the costs accrued.

      COMPLETE Identify and Evaluate Vendors

      Key Activity:
      Develop a plan with procurement and key internal stakeholders to define clear, consistent, and stable requirements.

      COMPLETE Select a Vendor

      Key Activity:
      Develop a consistent and effective process for selecting the most appropriate vendor.

      Manage Vendor Contracts and Relationships

      Key Activity:
      Contracts are consistently negotiated to ensure the vendor and the client have a documented and consistent understanding of mutual expectations.

      Expect the vendor to manage processes according to your standards

      You need this level of visibility into the service desk process, whether in-house or outsourced

      Each of these steps requires documentation – either through standard operating procedures, SLAs, logs, or workflow diagrams.

      • Define key operating procedures and workflows
      • Record, classify, and prioritize tickets
      • Verify, approve, and fulfill tickets
      • Investigate, diagnose, and allocate tickets
      • Resolve, recover, and close tickets
      • Track and report

      "Make sure what they've presented to you is exactly what's happening."
      – Service Desk Manager, Financial Services

      Manage the vendor relationship through regular communication

      Regular contact with your MSP provides opportunities to address issues that emerge

      Designate a relationship manager to act as a liaison at the business to be a conduit between the business and the MSP.

      • The relationship manager will take feedback from the MSP and relate it back to you to bridge the technical and business gap between the two.

      Who should be involved

      • Routine review meetings should involve the MSP and your relationship manager.
      • Technical knowledge may be needed to address specific issues, but business knowledge and relationship management skills are absolutely required.
      • Other stakeholders and people who are deeply invested in the vendor relationship should be invited or at least asked to contribute questions and concerns.

      What is involved

      • Full review of the service desk statistics, escalations, staffing changes, process changes, and drivers of extra billing or cost.
      • Updates to key documentation for the issues listed above and changes to the knowledgebase.
      • Significant drivers of customer satisfaction and dissatisfaction.
      • Changes that have/are being proposed that can impact any of the above.

      Communicate changes to end users to avoid push back and get buy-in

      Top-down processes for outsourcing will leave end users in the dark

      • Your service desk staff has been involved in the outsourcing process the entire time, but end users are affected all the same.
      • The service desk is the face of IT. A radical shift in service processes and points of contact can be detrimental to not only the service desk, but all of IT.
      • Communicating the changes early to end users will both help them cope with the change and help the MSP achieve better results.
        • An internal communication plan should be rolled out in order to inform and educate end users about the changes associated with outsourcing the service desk.
      • Your relationship manager should be tasked with communicating the changes to end users. The focus should be on addressing questions or concerns about the transition while highlighting the value gained through outsourcing to an MSP.
      • Service quality is a two-way street; the end user needs to be informed of proper protocols and points of contact so that the service desk technicians can fulfill their duties to the best of their ability.

      "When my company decided to outsource, I performed the same role but for a different company. There was a huge disruption to the business flow and a lack of communication to manage the change. The transition took weeks before any end users figured out what the new processes were for submitting a ticket and who to ask for help, and from a personal side, it became difficult to maintain relationships with colleagues."
      – IT Specialist for a financial institution

      Info-Tech Insight

      Educate the enterprise on expectations and processes that are handled by the MSP. Identify stakeholder groups affected by the outsourced processes then build a communication plan on what's been changed, what the benefits are, and how they will be impacted. Determine a timeline for communicating these initiatives and how these announcements will be made. Use InfoTech's Sample Communication Plan as a starting point.

      Build a continual improvement plan to make sure your MSP is efficiently delivering services according to expectations

      Ensure that your quality assurance program is repeatable and applicable to the outsourced services

      1. Design a QA scorecard that can help you assess steps the outsourcer agents should follow. Keep the questionnaire high level but specific to your environment. The scorecard should include questions that follow the steps to take considering your intake channels. For instance, if end users can reach the service desk via phone, chat, and email, build your QA around assessing customer service for call, chat, and ticket quality.
      2. Build a training program for agents: Develop an internal monitoring plan to relay detailed feedback to your MSP. Assess performance and utilize KBs as training materials for coaching agents on challenging transactions.
      3. Everything that goes to your service desk has to be documented; there will be no organic transfer of knowledge and experience.
      4. You need to let your MSP know how their efforts are impacting the performance of your organization. Measure your internal performance against the external performance of your service desk.
      5. Constant internal check-ins ensure that your MSP is meeting the SLAs outlined in the RFP.
      6. Routine reporting of metrics and ticket trends allow you to enact problem management. Otherwise, you risk your MSP operating your service desk with no internal feedback from its owner.
      7. Use metrics to determine the service desk functionality.

      Consider the success story of your outsourced service desk

      Build a feedback program for your outsourced services. Utilize transactional surveys to discover and tell outsourcing success to the impacted stakeholders.

      Ensure you apply steps for providing feedback to make sure processes are handled as expected. Service desk is the face of IT. Customer satisfaction on ticket transactions reflects satisfaction with IT and the organization.

      Build customer satisfaction surveys and conduct them for every transaction to get a better sense of outsourced service desk functionality. Collaborate with the vendor to make sure you build a proper strategy.

      • Build a right list of questions. Multiple and lengthy questions may lead to survey taking fatigue. Make sure you ask the right questions and give an option to the customer to comment any additional notes.
      • Give the option to users to rate the transaction. Make the whole process very seamless and doable in a few seconds.
      • Ensure to follow-up on negative feedback. This will help you find gaps in services and provide training to improve customer service.

      3.3.1 Analyze your outsourced service desk for continual improvement

      1 hour

      1. In this project, you determined the KPIs based on your service desk objectives (activity 2.2.2).
      2. Refer to your list of metrics in section 7 of the Service Desk Outsourcing Project Charter.
      3. Think about what story you want to tell and determine what factors will help move the narrative.
      4. Discuss how often you would like to track these metrics. Determine the audience for each metric.
      5. Provide the list to the MSP to create reports with auto-distribution.

      Input

      • Determined CSFs and KPIs

      Output

      • List of metrics to track, including frequency to report and audience to report to

      Materials

      • Service Desk Outsourcing Project Charter

      Participants

      • Service Desk Manager
      • IT Managers
      • Project Managers

      Download the Project Charter Template

      Reward the MSP for performance instead of "punishing" them for service failure

      Turn your vendor into a true partner by including an "earn back" condition in the contract

      MSPs often offer clients credit requests (service credits) for their service failures, which are applied to the previous month's monthly recurring charge. They are applied to the last month's MRC (monthly reoccurring charges) at the end of term and then the vendor pays out the residual.

      However, while common, service credits are not always perceived to be a strong incentive for the provider to continually focus on improvement of mean-time-to-respond/mean-time-to-resolve.

      • Engage the vendor as a true partner within a relationship only based upon Service Credits.
      • Suggest the vendor include a minor change to the non-performance processes within the final agreement: the vendor implements an "earn back" condition in the agreement.
      • Where a bank of service credits exists because of non-performance, if the provider exceeds the SLA performance metrics for a number of consecutive months (two is common), then an amount of any prior credits received by client is returned to the provider as an earn back for improved performance.
      • This can be a useful mechanism to drive improved performance.

      Measure the outsourced service desk ROI constantly to drive efficient decisions for continual improvement or an exit plan

      Efficient outsourced service desk causes positive impacts on business satisfaction. To address the true value of the services outsourced, you should evaluate the return on investment (ROI) in these areas: Emotional ROI, Time ROI, Financial ROI

      Emotional ROI

      Service desk's main purpose should be to provide topnotch services to end users. Build a customer experience program and leverage transactional surveys and relationship surveys to constantly analyze customer feedback on service quality.

      Ask yourself:

      • How have the outsourced services improved customer satisfaction?
      • How has the service desk impacted the business brand?
      • Have these services improved agents' job satisfaction?
      • What is the NPS score of the service desk?
      • What should we do to reduce the detractor rate and improve satisfaction leveraging the outsourced service desk?

      Time ROI

      Besides customer satisfaction, SLA commitment is a big factor to consider when conducting ROI analysis.

      Ask these questions:

      • Have we had improvement in FCR?
      • What are the mean time to resolve incidents and mean time to fulfill requests?
      • Is the cost incurred to outsourced services worth improvement in such metrics?

      Financial ROI

      As already mentioned in Phase 1, the main motivation for outsourcing the service desk should not be around cost reduction, but to improve performance. Regardless, it's still important to understand the financial implications of your decision.

      To evaluate the financial impact of your outsourced service desk, ask these questions:

      • How much have the outsourced services impacted our business financially?
      • How much are we paying compared to when it was done internally?
      • Considering the emotional, time, and effort factors, is it worth bringing the services in house or changing the vendor?

      3.3.2 Make a case to either rehabilitate your outsourcing agreement or exit

      3-4 hours

      1. Refer to the results of activity 2.2.2. for the list of metrics and the metrics dashboard over the past quarter.
      2. Consider emotional and time ROI, assess end-user satisfaction and SLA, and run a report comparison with the baseline that you built prior to outsourcing the service desk.
      3. Estimate the organization's IT operating expenses over the next five years if you stay with the vendor.
      4. Estimate the organization's IT operating expenses over the next five years if you switch the vendor.
      5. Estimate the organization's IT operating expenses over the next five years if you repatriate the service desk.
      6. Estimate the non-recurring costs associated with the move, such as the penalty for early contract termination, data center moving costs, and cost of potential business downtime during the move. Sum them to determine the investment.
      7. Calculate the return on investment. Discuss and decide whether the organization should consider rehabilitating the vendor agreement or ending the partnership.

      Input

      • Outsourced service desk metrics
      • Operating expenses

      Output

      • Return on investment

      Materials

      • List of metrics
      • Laptop
      • Markers
      • Flip chart/whiteboard

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      For more information on conducting this activity, refer to InfoTech's blueprint Terminate the IT Infrastructure Outsourcing Relationship

      Define exit conditions to complete your contract with your MSP

      The end of outsourcing is difficult. Your organization needs to maintain continuity of service during the transition. Your MSP needs to ensure that its resources can be effectively transitioned to the next deployment with minimal downtime. It is crucial to define your exit conditions so that both sides can prepare accordingly.

      • Your exit conditions must be clearly laid out in the contract. Create a list of service desk functions and metrics that are important to your organization's success. If your MSP is not meeting those needs or performance levels, you should terminate your services.
      • Most organizations accomplish this through a clear definition of hard and measurable KPIs and metrics that must be achieved and what will happen in the case these metrics are not being regularly met. If your vendor doesn't meet these requirements as defined in your contract, you then have a valid reason and the ability to leave the agreement.

      Examples of exit conditions:

      • Your MSP did not meet their SLAs on priority 1 or 2 tickets two times within a month.
      • If they didn't meet the SLA twice in that 30 days, you could terminate the contract penalty-free.

      Info-Tech Insight

      If things start going south with your MSP, negotiate a "get well plan." Outline your problems to the MSP and have them come back to you with a list of how they're going to fix these problems to get well before you move forward with the contract.

      Try to rehabilitate before you repatriate

      Switching service providers or ending the contract can be expensive and may not solve your problems. Try to rehabilitate your vendor relationship before immediately ending it.

      You may consider terminating your outsourcing agreement if you are dissatisfied with the current agreement or there has been a change in circumstances (either the vendor has changed, or your organization has changed).

      Before doing so, consider the challenges:

      1. It can be very expensive to switch providers or end a contract.
      2. Switching vendors can be a large project involving transfer of knowledge, documentation, and data.
      3. It can be difficult to maintain service desk availability, functionality, and reliability during the transition.

      Diagnose the cause of the problem before assuming it's the MSP's fault. The issue may lie with poorly defined requirements and processes, lack of communication, poor vendor management, or inappropriate SLAs. Re-assess your strategy and re-negotiate your contract if necessary.

      Info-Tech Insight

      There are many reasons why outsourcing relationships fail, but it's not always the vendor's fault.

      Clients often think their MSP isn't doing a great job, but a lot of the time the reason comes back to the client. They may not have provided sufficient documentation on processes, were not communicating well, didn't have a regular point of contact, and weren't doing regular service reviews. Before exiting the relationship, evaluate why it's not working and try to fix things first.

      Don't stop with an exit strategy, you also need to develop a transition plan

      Plan out your transition timeline, taking into account current contract terms and key steps required. Be prepared to handle tickets immediately upon giving notice.

      • Review your outsourcing contract with legal counsel to identify areas of concern for lock-in or breech.
      • Complete a cost/benefit analysis.
      • Bring intellectual property (including ticket data, knowledge base articles, and reports) back in-house (if you'd like to repatriate the service desk) or transfer to the next service desk vendor (if you're outsourcing to another MSP).
      • Review and update service desk standard processes (escalation, service levels, ticket templates, etc.).
      • Procure service desk software, licenses, and necessary hardware as needed.
      • Train the staff (internal for repatriating the service desk, or external for the prospective MSP).
      • Communicate the transition plan and be prepared to start responding to tickets immediately.

      Info-Tech Insight

      Develop a transition plan about six months before the contract notice date. Be proactive by constantly tracking the MSP, running ROI analyses and training staff before moving the services to the internal team or the next MSP. This will help you manage the transition smoothly and handle intake channels so that upon potential exit, users won't be disrupted.

      3.3.3 Develop an exit strategy in case you need to end your contract early

      3-4 hours

      Create a plan to be prepared in case you need to end your contract with the MSP early.

      Your exit strategy should encompass both the conditions under which you would need to end your contract with the MSP and the next steps you will take to transition your services.

      1. Define the exit conditions you plan to negotiate into your contract with the MSP:
        • Identify the performance levels you will require your MSP to meet.
        • Identify the actions you expect the MSP to take if they fail to meet these performance levels.
        • Identify the conditions under which you would leave the contract early.
      2. Develop a strategy for transitioning services in the event you need to leave your contract with the MSP:
        • Will you hand the responsibility to a new MSP or repatriate the service desk back in-house?
        • How will you maintain services through the transition?
      3. Document your exit strategy in section 6 of the Service Desk Outsourcing RFP Template.

      Input

      • Outsourced service desk metrics
      • Operating expenses

      Output

      • Return on investment

      Materials

      • List of metrics
      • Laptop
      • Markers
      • Flip chart/whiteboard

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      Summary of Accomplishment

      Problem Solved

      You have now re-envisioned your service desk by building a solid strategy for outsourcing it to a vendor. You first analyzed your challenges with the current service desk and evaluated the benefits of outsourcing services. Then you went through requirements assessment to find out which processes should be outsourced. Thereafter, you developed an RFP to communicate your proposal and evaluate the best candidates.

      You have also developed a continual improvement plan to ensure the outsourcer provides services according to your expectations. Through this plan, you're making sure to build a good relationship through incentivizing the vendor for accomplishments rather than punishing for service failures. However, you've also contemplated an exit plan in the RFP for potential consistent service failures.

      Ideally, this blueprint has helped you go beyond requirements identification and served as a means to change your mindset and strategy for outsourcing the service desk efficiently to gain long-term benefits.

      if you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

      This is a picture of Info-Tech analyst Mahmoud Ramin

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      This is a screenshot of activity 1.2.1 found in this blueprint

      Identify Processes to Outsource
      Identify service desk tasks that will provide the most value upon outsourcing.

      This is a screenshot of activity 3.2.2 found in this blueprint

      Score Candidate Vendors
      Evaluate vendors on their capabilities for satisfying your service desk requirements.

      Related Info-Tech Research

      Standardize the Service Desk

      • Improve customer service by driving consistency in your support approach and meeting SLAs.

      Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery

      • There are very few IT infrastructure components you should be housing internally – outsource everything else.

      Terminate the IT Infrastructure Outsourcing Relationship

      • There must be 50 ways to leave your vendor.

      Research Contributors and Experts

      Yev Khovrenkov; Enterprise Consultant, Solvera Solutions

      Kamil Salagan; I&O Manager, Bartek Ingredients

      Satish Mekerira; VP of IT, Coherus BioSciences

      Kris Krishan; Head of IT and Business Systems, Waymo

      Kris Arthur; Infra & Security Director, SEKO Logistics

      Valance Howden; Principal Research Advisor, Info-Tech Research Group

      Sandi Conrad; Principal Research Director, Info-Tech Research Group

      Graham Price; Senior Director of Executive Services, Info-Tech Research Group

      Barry Cousins; Practice Lead, Info-Tech Research Group

      Mark Tauschek; VP of I&O Research, Info-Tech Research Group

      Darin Stahl; Principal Research Advisor, Info-Tech Research Group

      Scott Yong; Principal Research Advisor, Info-Tech Research Group

      A special thank-you to five anonymous contributors

      Bibliography

      Allnutt, Charles. "The Ultimate List of Outsourcing Statistics." MicroSourcing, 2022. Accessed July 2022.
      "Considerations for outsourcing the service desk. A guide to improving your service desk and service delivery performance through outsourcing." Giva. Accessed May 2022.
      Hurley, Allison. "Service Desk Outsourcing | Statistics, Challenges, & Benefits." Forward BPO Inc., 2019. Accessed June 2022.
      Mtsweni, Patricia, et al. "The impact of outsourcing information technology services on business operations." South African Journal of Information Management, 2021, Accessed May 2022.
      "Offshore, Onshore or Hybrid–Choosing the Best IT Outsourcing Model." Calance, 2021. Accessed June 2022. Web.
      "Service Integration and Management (SIAM) Foundation Body of Knowledge." Scopism, 2020. Accessed May 2022.
      Shultz, Aaron. "IT Help Desk Outsourcing Pricing Models Comparison." Global Help Desk Services. Accessed June 2022. Web.
      Shultz, Aaron. "4 Steps to Accurately Measure the ROI of Outsourced Help Desk Services" Global Help Desk Services, Accessed June 2022. Web.
      Sunberg, John. "Great Expectations: What to Look for from Outsourced Service Providers Today." HDI. Accessed June 2022. Web.
      Walters, Grover. "Pivotal Decisions in outsourcing." Muma Case Review, 2019. Accessed May 2022.
      Wetherell, Steve. "Outsourced IT Support Services: 10 Steps to Better QA" Global Held Desk Services. Accessed May 2022. Web.

      Build a Digital Workspace Strategy

      • Buy Link or Shortcode: {j2store}294|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,399 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: End-User Computing Strategy
      • Parent Category Link: /end-user-computing-strategy
      • IT must figure out what a digital workspace is, why they’re building one, and what type they want.
      • Remote work creates challenges that cannot be solved by technology alone.
      • Focusing solely on technology risks building something the business doesn’t want or can’t use.

      Our Advice

      Critical Insight

      Building a smaller digital workspace doesn’t mean that the workspace will have a smaller impact on the business.

      Impact and Result

      • Partner with the business to create a team of digital workspace champions.
      • Empower employees with a tool that makes remote work easier.

      Build a Digital Workspace Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should partner with the business for building a digital workspace, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the digital workspace you want to build

      Create a list of benefits that the organization will find compelling and build a cross-functional team to champion the workspace.

      • Build a Digital Workspace Strategy – Phase 1: Identify the Digital Workspace You Want to Build
      • Digital Workspace Strategy Template
      • Digital Workspace Executive Presentation Template

      2. Identify high-level requirements

      Design the digital workspace’s value proposition to drive your requirements.

      • Build a Digital Workspace Strategy – Phase 2: Identify High-Level Requirements
      • Sample Digital Workspace Value Proposition
      • Flexible Work Location Policy
      • Flexible Work Time Policy
      • Flexible Work Time Off Policy
      • Mobile Device Remote Wipe Waiver Template
      • Mobile Device Connectivity & Allowance Policy
      • General Security – User Acceptable Use Policy

      3. Identify initiatives and a high-level roadmap

      Take an agile approach to building your digital workspace.

      • Build a Digital Workspace Strategy – Phase 3: Identify Initiatives and a High-Level Roadmap
      [infographic]

      Workshop: Build a Digital Workspace Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify the Digital Workspace You Want to Build

      The Purpose

      Ensure that the digital workspace addresses real problems the business is facing.

      Key Benefits Achieved

      Defined benefits that will address business problems

      Identified strategic business partners

      Activities

      1.1 Identify the digital workspace’s direction.

      1.2 Prioritize benefits and define a vision.

      1.3 Assemble a team of digital workspace champions.

      Outputs

      Vision statement

      Mission statement

      Guiding principles

      Prioritized business benefits

      Metrics and key performance indicators

      Service Owner, Business Owner, and Project Sponsor role definitions

      Project roles and responsibilities

      Operational roles and responsibilities

      2 Identify Business Requirements

      The Purpose

      Drive requirements through a well-designed value proposition.

      Key Benefits Achieved

      Identified requirements that are based in employees’ needs

      Activities

      2.1 Design the value proposition.

      2.2 Identify required policies.

      2.3 Identify required level of input from users and business units.

      2.4 Document requirements for user experiences, processes, and services.

      2.5 Identify in-scope training and culture requirements.

      Outputs

      Prioritized functionality requirements

      Value proposition for three business roles

      Value proposition for two service provider roles

      Policy requirements

      Interview and focus group plan

      Business process requirements

      Training and culture initiatives

      3 Identify IT and Service Provider Requirements

      The Purpose

      Ensure that technology is an enabler.

      Key Benefits Achieved

      Documented requirements for IT and service provider technology

      Activities

      3.1 Identify systems of record requirements.

      3.2 Identify requirements for apps.

      3.3 Identify information storage requirements.

      3.4 Identify management and security integrations.

      3.5 Identify requirements for internal and external partners.

      Outputs

      Requirements for systems for record

      Prioritized list of apps

      Storage system requirements

      Data and security requirements

      Outsourcing requirements

      Achieve Digital Resilience by Managing Digital Risk

      • Buy Link or Shortcode: {j2store}375|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $123,999 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance

      Businesses are expected to balance achieving innovation through initiatives that transform the organization with effective risk management. While this is nothing new, added challenges arise due to:

      • An increasingly large vendor ecosystem within which to manage risk.
      • A fragmented approach to risk management that separates cyber and IT risk from enterprise risk.
      • A rapidly growing number of threat actors and a larger attack surface.

      Our Advice

      Critical Insight

      • All risks are digital risks.
      • Manage digital risk with a collaborative approach that supports digital transformation, ensures digital resilience, and distributes responsibility for digital risk management across the organization.

      Impact and Result

      Address digital risk to build digital resilience. In the process, you will drive transformation and maintain digital trust among your employees, end users, and consumers by:

      • Defining digital risk, including primary risk categories and prevalent risk factors.
      • Leveraging industry examples to help identify external risk considerations.
      • Building a digital risk profile, addressing core risk categories, and creating a correlating plan for digital risk management.

      Achieve Digital Resilience by Managing Digital Risk Research & Tools

      Start here – read the Executive Brief

      Risk does not exist in isolation and must extend beyond your cyber and IT teams. Read our concise Executive Brief to find out how to manage digital risk to help drive digital transformation and build your organization's digital resilience.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redefine digital risk and resilience

      Discover an overview of what digital risk is, learn how to assess risk factors for the five primary categories of digital risk, see several industry-specific scenarios, and explore how to plan for and mitigate identified risks.

      • Achieve Digital Resilience by Managing Digital Risk – Phases 1-2
      • Digital Risk Management Charter

      2. Build your digital risk profile

      Begin building the digital risk profile for your organization, identify where your key areas of risk exposure exist, and assign ownership and accountability among the organization’s business units.

      • Digital Risk Profile Tool
      • Digital Risk Management Executive Report
      [infographic]

      Workshop: Achieve Digital Resilience by Managing Digital Risk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope and Define Digital Risk

      The Purpose

      Develop an understanding and standard definition of what digital risk is, who it impacts, and its relevance to the organization.

      Key Benefits Achieved

      Understand what digital risk means and how it differs from traditional enterprise or cybersecurity risk.

      Develop a definition of digital risk that recognizes the unique external and internal considerations of your organization.

      Activities

      1.1 Review the business context

      1.2 Review the current roles of enterprise, IT, and cyber risk management within the organization

      1.3 Define digital transformation and list transformation initiatives

      1.4 Define digital risk in the context of the organization

      1.5 Define digital resilience in the context of the organization

      Outputs

      Digital risk drivers

      Applicable definition of digital risk

      Applicable definition of digital resilience

      2 Make the Case for Digital Risk Management

      The Purpose

      Understand the roles digital risk management and your digital risk profile have in helping your organization achieve safe, transformative growth.

      Key Benefits Achieved

      An overview and understanding of digital risk categories and subsequent individual digital risk factors for the organization

      Industry considerations that highlight the importance of managing digital risk

      A structured approach to managing the categories of digital risk

      Activities

      2.1 Review and discuss industry case studies and industry examples of digital transformation and digital risk

      2.2 Revise the organization's list of digital transformation initiatives (past, current, and future)

      2.3 Begin to build your organization's Digital Risk Management Charter (with inputs from Module 1)

      2.4 Revise, customize, and complete a Digital Risk Management Charter for the organization

      Outputs

      Digital Risk Management Charter

      Industry-specific digital risks, factors, considerations, and scenarios

      The organization's digital risks mapped to its digital transformation initiatives

      3 Build Your Digital Risk Profile

      The Purpose

      Develop an initial digital risk profile that identifies the organization’s core areas of focus in managing digital risk.

      Key Benefits Achieved

      A unique digital risk profile for the organization

      Digital risk management initiatives that are mapped against the organization's current strategic initiatives and aligned to meet your digital resilience objectives and benchmarks

      Activities

      3.1 Review category control questions within the Digital Risk Profile Tool

      3.2 Complete all sections (tabs) within the Digital Risk Profile Tool

      3.3 Assess the results of your Digital Risk Profile Tool

      3.4 Discuss and assign initial weightings for ownership of digital risk among the organization's stakeholders

      Outputs

      Completion of all category tabs within the Digital Risk Profile Tool

      Initial stakeholder ownership assignments of digital risk categories

      4 Manage Your Digital Risk

      The Purpose

      Refine the digital risk management plan for the organization.

      Key Benefits Achieved

      A targeted, organization-specific approach to managing digital risk as a part of the organization's projects and initiatives on an ongoing basis

      An executive presentation that outlines digital risk management for your senior leadership team

      Activities

      4.1 Conduct brief information sessions with the relevant digital risk stakeholders identified in Module 3.

      4.2 Review and revise the organization's Digital Risk Profile as necessary, including adjusting weightings for the digital risk categories

      4.3 Begin to build an actionable digital risk management plan

      4.4 Present your findings to the organization's relevant risk leaders and executive team

      Outputs

      A finalized and assessed Digital Risk Profile Tool

      Stakeholder ownership for digital risk management

      A draft Digital Risk Management plan and Digital Risk Management Executive Report

      Key Metrics for Every CIO

      • Buy Link or Shortcode: {j2store}119|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Performance Measurement
      • Parent Category Link: /performance-measurement
      • As a CIO, you are inundated with data and information about how your IT organization is performing based on the various IT metrics that exist.
      • The information we receive from metrics is often just that – information. Rarely is it used as a tool to drive the organization forward.
      • CIO metrics need to consider the goals of key stakeholders in the organization.

      Our Advice

      Critical Insight

      • The top metrics for CIOs don’t have anything to do with IT.
      • CIOs should measure and monitor metrics that have a direct impact on the business.
      • Be intentional with the metric and number of metrics that you monitor on a regular basis.
      • Be transparent with your stakeholders on what and why you are measuring those specific metrics.

      Impact and Result

      • Measure fewer metrics, but measure those that will have a significant impact on how your deliver value to your organization.
      • Focus on the metrics that you can take action against, rather than simply monitor.
      • Ensure your metrics tie to your top priorities as a CIO.

      Key Metrics for Every CIO Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Key Metrics for Every CIO deck – The top metrics every CIO should measure and act on

      Leverage the top metrics for every CIO to help focus your attention and provide insight into actionable steps.

      • Key Metrics for Every CIO Storyboard
      [infographic]

      Further reading

      Key Metrics for Every CIO

      The top six metrics for CIOs – and they have very little to do with IT

      Analyst Perspective

      Measure with intention

      Be the strategic CIO who monitors the right metrics relevant to their priorities – regardless of industry or organization. When CIOs provide a laundry list of metrics they are consistently measuring and monitoring, it demonstrates a few things.

      First, they are probably measuring more metrics than they truly care about or could action. These “standardized” metrics become something measured out of expectation, not intention; therefore, they lose their meaning and value to you as a CIO. Stop spending time on these metrics you will be unable or unwilling to address.

      Secondly, it indicates a lack of trust in the IT leadership team, who can and should be monitoring these commonplace operational measures. An empowered IT leader will understand the responsibility they have to inform the CIO should a metric be derailing from the desired outcome.

      Photo of Brittany Lutes, Senior Research Analyst, Organizational Transformation Practice, Info-Tech Research Group. Brittany Lutes
      Senior Research Analyst
      Organizational Transformation Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      CIOs need to measure a set of specific metrics that:

      • Will support the organization’s vision, their career, and the IT function all in one.
      • Can be used as a tool to make informed decisions and take appropriate actions that will improve the IT function’s ability to deliver value.
      • Consider the influence of critical stakeholders, especially the end customer.
      • Are easily measured at any point in time.
      Common Obstacles

      CIOs often cannot define these metrics because:

      • We confuse the operational metrics IT leaders need to monitor with strategic metrics CIOs need to monitor.
      • Previously monitored metrics did not deliver value.
      • It is hard to decide on a metric that will prove both insightful and easily measurable.
      • We measure metrics without any method or insight on how to take actionable steps forward.
      Info-Tech’s Approach

      For every CIO, there are six areas that should be a focus, no matter your organization or industry. These six priorities will inform the metrics worth measuring:

      • Risk management
      • Delivering on business objectives
      • Customer satisfaction
      • Employee engagement
      • Business leadership relations
      • Managing to a budget

      Info-Tech Insight

      The top metrics for a CIO to measure and monitor have very little to do with IT and everything to do with ensuring the success of the business.

      Your challenge

      CIOs are not using metrics as a personal tool to advance the organization:
      • Metrics should be used as a tool by the CIO to help inform the future actions that will be taken to reach the organization’s strategic vision.
      • As a CIO, you need to have a defined set of metrics that will support your career, the organization, and the IT function you are accountable for.
      • CIO metrics must consider the most important stakeholders across the entire ecosystem of the organization – especially the end customer.
      • The metrics for a CIO are distinctly different from the metrics you use to measure the operational effectiveness of the different IT functions.
      “CIOs are businesspeople first and technology people second.” (Myles Suer, Source: CIO, 2019.)

      Common obstacles

      These barriers make this challenge difficult to address for many CIOs:
      • CIOs often do not measure metrics because they are not aware of what should or needs to be measured.
      • As a result of not wanting to measure the wrong thing, CIOs can often choose to measure nothing at all.
      • Or they get too focused on the operational metrics of their IT organization, leaving the strategic business metrics forgotten.
      • Moreover, narrowing the number of metrics that are being measured down to an actionable number is very difficult.
      • We rely only on physical data sets to help inform the measurements, not considering the qualitative feedback received.
      CIO priorities are business priorities

      46% of CIOs are transforming operations, focused on customer experiences and employee productivity. (Source: Foundry, 2022.)

      Finances (41.3%) and customers (28.1%) remain the top two focuses for CIOs when measuring IT effectiveness. All other focuses combine for the remaining 30.6%. (Source: Journal of Informational Technology Management, 2018.)

      Info-Tech’s approach

      Organizational goals inform CIO metrics

      Diagram with 'CIO Metrics' at the center surrounded by 'Directive Goals', 'Product/Service Goals', 'IT Goals', and 'Operations Goals', each of which are connected to eachother by 'Customers'.

      The Info-Tech difference:
      1. Every CIO has the same set of priorities regardless of their organization or industry given that these metrics are influenced by similar goals of organizations.
      2. CIO metrics are a tool to help inform the actions that will support each core area in reaching their desired goals.
      3. Be mindful of the goals different business units are using to reach the organization’s strategic vision – this includes your own IT goals.
      4. Directly or indirectly, you will always influence the ability to acquire and retain customers for the organization.

      CIO priorities

      MANAGING TO A BUDGET
      Reducing operational costs and increasing strategic IT spend.
      Table centerpiece for CIO Priorities. DELIVERING ON BUSINESS OBJECTIVES
      Aligning IT initiatives to the vision of the organization.
      CUSTOMER SATISFACTION
      Directly and indirectly impacting customer experience.
      EMPLOYEE ENGAGEMENT
      Creating an IT workforce of engaged and purpose-driven people.
      RISK MANAGEMENT
      Actively knowing and mitigating threats to the organization.
      BUSINESS LEADERSHIP RELATONS
      Establishing a network of influential business leaders.

      High-level process flow

      How do we use the CIO metrics?
      Process flow that starts at 'Consider - Identify and analyze CIO priorities', and is followed by 'Select priorities - Identify the top priorities for CIOs (see previous slide)', 'Create a measure - Determine a measure that aligns to each priority', 'Make changes & improvements - Take action to improve the measure and reach the goal you are trying to achieve', 'Demonstrate progress - Use the metrics to demonstrate progress against priorities'. Using priority-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process.

      Example CIO dashboard

      Example CIO dashboard.
      * Arrow indicates month-over-month trend

      Harness the value of metric data

      Metrics are rarely used accurately as a tool
      • When you have good metrics, you can:
        • Ensure employees are focused on the priorities of the organization
        • Have insight to make better decisions
        • Communicate with the business using language that resonates with each stakeholder
        • Increase the performance of your IT function
        • Continually adapt to meet changing business demands
      • Metrics are tools that quantifiably indicate whether a goal is on track to being achieved (proactive) or if the goal was successfully achieved (retroactive)
      • This is often reflected through two metric types:
        • Leading Metrics: The metric indicates if there are actions that should be taken in the process of achieving a desired outcome.
        • Lagging Metrics: Based on the desired outcome, the metric can indicate where there were successes or failures that supported or prevented the outcome from being achieved.
      • Use the data from the metrics to inform your actions. Do not collect this data if your intent is simply to know the data point. You must be willing to act.
      "The way to make a metric successful is by understanding why you are measuring it." (Jeff Neyland CIO)

      CIOs measure strategic business metrics

      Keep the IT leadership accountable for operational metrics
      • Leveraging the IT leadership team, empower and hold each leader accountable for the operational metrics specific to their functional area
      • As a CIO, focus on the metrics that are going to impact the business. These are often tied to people or stakeholders:
        • The customers who will purchase the product or service
        • The decision makers who will fund IT initiatives
        • The champions of IT value
        • The IT employees who will be driven to succeed
        • The owner of an IT risk event
      • By focusing on these priority areas, you can regularly monitor aspects that will have major business impacts – and be able to address those impacts.
      As a CIO, avoid spending time on operational metrics such as:
      • Time to deliver
      • Time to resolve
      • Project delivery (scope, time, money)
      • Application usage
      • User experiences
      • SLAs
      • Uptime/downtime
      • Resource costs
      • Ticket resolution
      • Number of phishing attempts
      Info-Tech Insight

      While operational metrics are important to your organization, IT leaders should be empowered and responsible for their management.

      SECTION 1

      Actively Managing IT Risks

      Actively manage IT risks

      The impact of IT risks to your organization cannot be ignored any further
      • Few individuals in an organization understand IT risks and can proactively plan for the prevention of those threats, making the CIO the responsible and accountable individual when it comes to IT risks – especially the components that tie into cybersecurity.
      • When the negative impacts of an IT threat event are translated into terms that can be understood and actioned by all in the organization, it increases the likelihood of receiving the sponsorship and funding support necessary.
      • Moreover, risk management can be used as a tool to drive the organization toward its vision state, enabling informed risk decisions.

      Risk management metric:

      Number of critical IT threats that were detected and prevented before impact to the organization.

      Beyond risk prevention
      Organizations that have a clear risk tolerance can use their risk assessments to better inform their decisions.
      Specifically, taking risks that could lead to a high return on investment or other key organizational drivers.

      Protect the organization from more than just cyber threats

      Other risk-related metrics:
      • Percentage of IT risks integrated into the organization’s risk management approach.
      • Number of risk management incidents that were not identified by your organization (and the potential financial impact of those risks).
      • Business satisfaction with IT actions to reduce impact of negative IT risk events.
      • Number of redundant systems removed from the organizations portfolio.
      Action steps to take:
      • Create a risk-aware culture, not just with IT folks. The entire organization needs to understand how IT risks are preventable.
      • Clearly demonstrate the financial and reputational impact of potential IT risks and ensure that this is communicated with decision-makers in the organization.
      • Have a single source of truth to document possible risk events and report prevention tactics to minimize the impact of risks.
      • Use this information to recommend budget changes and help make risk-informed decisions.

      49%

      Investing in Risk

      Heads of IT “cited increasing cybersecurity protections as the top business initiative driving IT investments this year” (Source: Foundry, 2022.)

      SECTION 2

      Delivering on Business Objectives

      Delivering on business objectives

      Deliver on initiatives that bring value to your organization and stop benchmarking
      • CIOs often want to know how they are performing in comparison to their competitors (aka where do you compare in the benchmarking?)
      • While this is a nice to know, it adds zero value in demonstrating that you understand your business, let alone the goals of your business
      • Every organization will have a different set of goals it is striving toward, despite being in the same industry, sector, or market.
      • Measuring your performance against the objectives of the organization prevents CIOs from being more technical than it would do them good.

      Business Objective Alignment Metric:

      Percentage of IT metrics have a direct line of impact to the business goals

      Stop using benchmarks to validate yourself against other organizations. Benchmarking does not provide:
      • Insight into how well that organization performed against their goals.
      • That other organizations goals are likely very different from your own organization's goals.
      • It often aggregates the scores so much; good and bad performers stop being clearly identified.

      Provide a clear line of sight from IT metrics to business goals

      Other business alignment metrics:
      • Number of IT initiatives that have a significant impact on the success of the organization's goals.
      • Number of IT initiatives that exceed the expected value.
      • Positive impact ($) of IT initiatives on driving business innovation.
      Action steps to take:
      • Establish a library or dashboard of all the metrics you are currently measuring as an IT organization, and align each of them to one or more of the business objectives your organization has.
      • Leverage the members of the organization’s executive team to validate they understand how your metric ties to the business objective.
      • Any metric that does not have a clear line of sight should be reconsidered.
      • IT metrics should continue to speak in business terms, not IT terms.

      50%

      CIOs drive the business

      The percentage of CEOs that recognize the CIO as the main driver of the business strategy in the next 2-3 years. (Source: Deloitte, 2020.)

      SECTION 3

      Impact on Customer Satisfaction

      Influencing end-customer satisfaction

      Directly or indirectly, IT influences how satisfied the customer is with their product or service
      • Now more than ever before, IT can positively influence the end-customer’s satisfaction with the product or service they purchase.
      • From operational redundancies to the customer’s interaction with the organization, IT can and should be positively impacting the customer experience.
      • IT leaders who take an interest in the customer demonstrate that they are business-focused individuals and understand the intention of what the organization is seeking to achieve.
      • With the CIO role becoming a strategic one, understanding why a customer would or would not purchase your organization’s product or service stops being a “nice to have.”

      Customer satisfaction metric:

      What is the positive impact ($ or %) of IT initiatives on customer satisfaction?

      Info-Tech Insight

      Be the one to suggest new IT initiatives that will impact the customer experience – stop waiting for other business leaders to make the recommendation.

      Enhance the end-customer experience with I&T

      Other customer satisfaction metrics:
      • Amount of time CIO spends interacting directly with customers.
      • Customer retention rate.
      • Customer attraction rate.
      Action steps to take:
      • Identify the core IT capabilities that support customer experience. Automation? Mobile application? Personal information secured?
      • Suggest an IT-supported or-led initiative that will enhance the customer experience and meet the business goals. Retention? Acquisition? Growth in spend?
      • This is where operational metrics or dashboards can have a real influence on the customer experience. Be mindful of how IT impacts the customer journey.

      41%

      Direct CX interaction

      In 2022, 41% of IT heads were directly interacting with the end customer. (Source: Foundry, 2022.)

      SECTION 4

      Keeping Employees Engaged

      Keeping employees engaged

      This is about more than just an annual engagement survey
      • As a leader, you should always have a finger on the pulse of how engaged your employees are
      • Employee engagement is high when:
        • Employees have a positive disposition to their place of work
        • Employees are committed and willing to contribute to the organization's success
      • Employee engagement comprises three types of drivers: organizational, job, and retention. As CIO, you have a direct impact on all three drivers.
      • Providing employees with a positive work environment where they are empowered to complete activities in line with their desired skillset and tied to a clear purpose can significantly increase employee engagement.

      Employee engagement metric:

      Number of employees who feel empowered to complete purposeful activities related to their job each day

      Engagement leads to increases in:
      • Innovation
      • Productivity
      • Performance
      • Teamwork
      While reducing costs associated with high turnover.

      Employees daily tasks need to have purpose

      Other employee engagement metrics:
      • Tenure of IT employees at the organization.
      • Number of employees who seek out or use a training budget to enhance their knowledge/skills.
      • Degree of autonomy employees feel they have in their work on a daily basis.
      • Number of collaboration tools provided to enable cross-organizational work.
      Action steps to take:
      • If you are not willing to take actionable steps to address engagement, don’t bother asking employees about it.
      • Identify the blockers to empowerment. Common blockers include insufficient team collaboration, bureaucracy, inflexibility, and feeling unsupported and judged.
      • Ensure there is a consistent understanding of what “purposeful” means. Are you talking about “purposeful” to the organization or the individual?
      • Provide more clarity on what the organization’s purpose is and the vision it is driving toward. Just because you understand does not mean the employees do.

      26%

      Act on engagement

      Only 26% of leaders actually think about and act on engagement every single day. (Source: SHRM, 2022.)

      SECTION 5

      Establishing Trusted Business Relationships

      Establishing trusted business partnerships

      Leverage your relationships with other C-suite executives to demonstrate IT’s value
      • Your relationship with other business peers is critical – and, funny enough, it is impacted by the use of good metrics and data.
      • The performance of your IT team will be recognized by other members of the executive leadership team (ELT) and is a direct reflection of you as a leader.
      • A good relationship with the ELT can alleviate issues if concerns about IT staff surface.
        • Of the 85% of IT leaders working on transformational initiatives, only 30% are trying to cultivate an IT/business partnership (Foundry, 2022).
      • Don’t let other members of the organizations ELT overlook you or the value IT has. Build the key relationships that will drive trust and partnerships.

      Business leadership relationship metric:

      Ability to influence business decisions with trusted partners.

      Some key relationships that are worth forming with other C-suite executives right now include:
      • Chief Sustainability Officer
      • Chief Revenue Officer
      • Chief Marketing Officer
      • Chief Data Officer

      Influence business decisions with trusted partners

      Other business relations metrics:
      • The frequency with which peers on the ELT complain about the IT organization to other ELT peers.
      • Percentage of business leaders who trust IT to make the right choices for their accountable areas.
      • Number of projects that are initiated with a desired solution versus problems with no desired solution.
      Action steps to take:
      • From lunch to the boardroom, it is important you make an effort to cultivate relationships with the other members of the ELT.
      • Identify who the most influential members of the ELT are and what their primary goals or objectives are.
      • Follow through on what you promise you will deliver – if you do not know, do not promise it!
      • What will work for one member of the ELT will not work for another – personalize your approach.

      60%

      Enterprise-wide collaboration

      “By 2023, 60% of CIOs will be primarily measured for their ability to co-create new business models and outcomes through extensive enterprise and ecosystem-wide collaboration.” (Source: IDC, 2021.)

      SECTION 6

      Managing to a Budget

      Managing to a budget

      Every CIO needs to be able to spend within budget while increasing their strategic impact
      • From security, to cloud, to innovating the organization's products and services, IT has a lot of initiatives that demand funds and improve the organization.
      • Continuing to demonstrate good use of the budget and driving value for the organization will ensure ongoing recognition in the form of increased money.
      • 29% of CIOs indicated that controlling costs and expense management was a key duty of a functional CIO (Foundry, 2022).
      • Demonstrating the ability to spend within a defined budget is a key way to ensure the business trusts you.
      • Demonstrating an ability to spend within a defined budget and reducing the cost of operational expenses while increasing spend on strategic initiatives ensures the business sees the value in IT.

      Budget management metric:

      Proportion of IT budget that is strategic versus operational.

      Info-Tech Insight

      CIOs need to see their IT function as its own business – budget and spend like a CEO.

      Demonstrate IT’s ability to spend strategically

      Other budget management metrics:
      • Cost required to lead the organization through a digital transformation.
      • Reduction in operational spend due to retiring legacy solutions.
      • Percentage of budget in the run, grow, and transform categories.
      • Amount of money spent keeping the lights on versus investing in new capabilities.

      Action steps to take:

      • Consider opportunities to automate processes and reduce the time/talent required to spend.
      • Identify opportunities and create the time for resources to modernize or even digitize the organization to enable a better delivery of the products or services to the end customer.
      • Review the previous metrics and tie it back to running the business. If customer satisfaction will increase or risk-related threats decrease through an initiative IT is suggesting, you can make the case for increased strategic spend.

      90%

      Direct CX interaction

      Ninety percent of CIOs expect their budget to increase or remain the same in their next fiscal year. (Source: Foundry, 2022.)

      Research contributors and experts

      Photo of Jeff Neyland. Jeff Neyland
      Chief Information Officer – University of Texas at Arlington
      Photo of Brett Trelfa. Brett Trelfa
      SVP and CIO – Arkansas Blue Cross Blue Shield
      Blank photo template. Lynn Fyhrlund
      Chief Information Officer – Milwaukee County Department of Administrative Services

      Info-Tech Research Group

      Vicki Van Alphen Executive Counselor Ibrahim Abdel-Kader Research Analyst
      Mary Van Leer Executive Counselor Graham Price Executive Counselor
      Jack Hakimian Vice President Research Valence Howden Principal Research Director
      Mike Tweedie CIO Practice Lead Tony Denford Organization Transformation Practice Lead

      Related Info-Tech Research

      Sample of the 'IT Metrics Library'. IT Metrics Library
      • Use this tool to review commonly used KPIs for each practice area
      • Identify KPI owners, data sources, baselines, and targets. It also suggests action and research for low-performing KPIs.
      • Use the "Action Plan" tab to keep track of progress on actions that were identified as part of your KPI review.
      Sample of 'Define Service Desk Metrics That Matter'. Define Service Desk Metrics That Matter
      • Consolidate your metrics and assign context and actions to those currently tracked.
      • Establish tension metrics to see and tell the whole story.
      • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard.
      Sample of 'CIO Priorities 2022'. CIO Priorities 2022
      • Understand how to respond to trends affecting your organization.
      • Determine your priorities based on current state and relevant internal factors.
      • Assign the right resources to accomplish your vision.
      • Consider what new challenges outside of your control will demand a response.

      Bibliography

      “Developing and Sustaining Employee Engagement.” SHRM, 2022.

      Dopson, Elise. “KPIs Vs. Metrics: What’s the Difference & How Do You Measure Both?” Databox, 23 Jun. 2021.

      Shirer, Michael, and Sarah Murray. “IDC Unveils Worldwide CIO Agenda 2022 Predictions.” IDC, 27 Oct. 2021.

      Suer, Myles. “The Most Important Metrics to Drive IT as a Business.” CIO, 19 Mar. 2019.

      “The new CIO: Business Savvy.” Deloitte Insights. Deloitte, 2020.

      “2022 State of the CIO: Rebalancing Act: CIO’s Operational Pandemic-Era Innovation.” Foundry, 2022.

      “Why Employee Engagement Matters for Leadership at all Levels.” Walden University, 20 Dec. 2019.

      Zhang, Xihui, et al. “How to Measure IT Effectiveness: The CIO’s Perspective.” Journal of Informational Technology Management, 29(4). 2018.

      How to build a Service Desk Chatbot POC

      • Buy Link or Shortcode: {j2store}16|cart{/j2store}
      • Related Products: {j2store}16|crosssells{/j2store}
      • member rating overall impact: 9.7/10
      • member rating average dollars saved: 11,197
      • member rating average days saved: 8
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk

      The challenge

      Build a chatbot that creates value for your business

       

      • Ensure your chatbot meets your business needs.
      • Bring scalability to your customer service delivery in a cost-effective manner.
      • Measure your chatbot objectives with clear metrics.
      • Pre-determine your ticket categories to use during the proof of concept.

      Our advice

      Insight

      • Build your chatbot to create business value. Whether increasing service or resource efficiency, keep value creation in mind when making decisions with your proof of concept.

      Impact and results 

      • When implemented effectively, chatbots can help save costs, generate new revenue, and ultimately increase customer satisfaction for external and internal-facing customers.

      The roadmap

      Read our concise Executive Brief to find out why you building a chatbot proof of concept is a good idea, review our methodology, and understand the four ways we can support you to successfully complete this project. Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Start here

      Form your chatbot strategy.

      Build the right metrics to measure the success of your chatbot POC

      • Chatbot ROI Calculator (xls)
      • Chatbot POC Metrics Tool (xls)

      Build the foundation for your chatbot.

      Architect the chatbot to maximize business value

      • Chatbot Conversation Tree Library

      Continue to improve your chatbot.

      Now take your chatbot proof of concept to production

      • Chatbot POC RACI (doc)
      • Chatbot POC Implementation Roadmap (xls)
      • Chatbot POC Communication Plan (doc)Chatbot ROI Calculator (xls)

      Data security consultancy

      Data security consultancy

      Based on experience
      Implementable advice
      human-based and people-oriented

      Data security consultancy makes up one of Tymans Group’s areas of expertise as a corporate consultancy firm. We are happy to offer our insights and solutions regarding data security and risk to businesses, both through online and offline channels. Read on and discover how our consultancy company can help you set up practical data security management solutions within your firm.

      How our data security consultancy services can help your company

      Data security management should be an important aspect of your business. As a data security consultancy firm, Tymans Group is happy to assist your small or medium-sized enterprise with setting up clear protocols to keep your data safe. As such, we can advise on various aspects comprising data security management. This ranges from choosing a fit-for-purpose data architecture to introducing IT incident management guidelines. Moreover, we can perform an external IT audit to discover which aspects of your company’s data security are vulnerable and which could be improved upon.

      Security and risk management

      Our security and risk services

      Security strategy

      Security Strategy

      Embed security thinking through aligning your security strategy to business goals and values

      Read more

      Disaster Recovery Planning

      Disaster Recovery Planning

      Create a disaster recovey plan that is right for your company

      Read more

      Risk Management

      Risk Management

      Build your right-sized IT Risk Management Program

      Read more

      Check out all our services

      Discover our practical data security management solutions

      Data security is just one aspect with which our consultancy firm can assist your company. Tymans Group offers its extensive expertise in various corporate management domains, such as quality management and risk management. Our solutions all stem from our vast expertise and have proven their effectiveness. Moreover, when you choose to employ our consultancy firm for your data security management, you benefit from a holistic, people-oriented approach.

      Set up an appointment with our experts

      Do you wish to learn more about our data security management solutions and services for your company? We are happy to analyze any issues you may be facing and offer you a practical solution if you contact us for an appointment. You can book a one-hour online talk or elect for an on-site appointment with our experts. Contact us to set up your appointment now.

      Register to read more …

      Select an EA Tool Based on Business and User Need

      • Buy Link or Shortcode: {j2store}274|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $62,999 Average $ Saved
      • member rating average days saved: 18 Average Days Saved
      • Parent Category Name: Architecture Domains
      • Parent Category Link: /architecture-domains
      • A mature EA function is increasingly becoming an organizational priority to drive innovation, provide insight, and define digital capabilities.
      • Proliferation of digital technology has increased complexity, straining the EA function to deliver insights.
      • An EA tool increases the efficiency with which the EA function can deliver insights, but a large number of organizations have not a selected an EA tool that suits their needs.

      Our Advice

      Critical Insight

      • EA tool value largely comes from tying organizational context and requirements to the selection process.
      • Organizations that have selected an EA tool often fail to have it adopted and show its true value. To ensure successful adoption and value delivery, the EA tool selection process must account for the needs of business stakeholders and tool users.

      Impact and Result

      • Link the need for the EA tool to your organization’s EA value proposition. The connection enables the EA tool to address the future needs of stakeholders and the design style of the EA team.
      • Use Info-Tech’s EA Solution Recommendation Tool to create a shortlist of EA tools that is suited to the preferences of the organization.
      • Gather additional information on the shortlist of EA tool vendors to narrow down the selection using the EA Tool Request for Information Template.

      Select an EA Tool Based on Business and User Need Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should procure an EA tool in the digital age, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Select an EA Tool Based on Business and User Need – Executive Brief
      • Select an EA Tool Based on Business and User Need – Phases 1-3

      1. Make the case

      Decide if an EA tool is needed in your organization and define the requirements of EA tool users.

      • Select an EA Tool Based on Business and User Need – Phase 1: Make the Case
      • EA Value Proposition Template
      • EA Tool User Requirements Template

      2. Shortlist EA tools

      Determine your organization’s preferences in terms of product capabilities and vendor characteristics.

      • Select an EA Tool Based on Business and User Need – Phase 2: Shortlist EA Tools
      • EA Solution Recommendation Tool

      3. Select and communicate the process

      Gather information on shortlisted vendors and make your final decision.

      • Select an EA Tool Based on Business and User Need – Phase 3: Select and Communicate the Process
      • EA Tool Request for Information Template
      • EA Tool Demo Script Template
      • Request for Proposal (RFP) Template
      • EA Tool Selection Process Template
      [infographic]

      Portfolio Management

      • Buy Link or Shortcode: {j2store}47|cart{/j2store}
      • Related Products: {j2store}47|crosssells{/j2store}
      • member rating overall impact: 9.6/10
      • member rating average dollars saved: $40,234
      • member rating average days saved: 30
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • Typically your business wants much more than your IT development organization can deliver with the available resources at the requested quality levels.
      • Over-damnd has a negative influence on delivery throughput. IT starts many projects (or features) but has trouble delivering most of them within the set parameters of scope, time, budget, and quality. Some requested deliverables may even be of questionable value to the business.
      • You may not have the right project portfolio management (PPM) strategy to bring order in IT's delivery activities and to maximize business value.

      Our advice

      Insight

      • Many in IT mix PPM and project management. Your project management playbook does not equate to the holistic view a real PPM practice gives you.
      • Some organizations also mistake PPM for a set of processes. Processes are needed, but a real strategy works towards tangible goals.
      • PPM works at the strategic level of the company; hence executive buy-in is critical. Without executive support, any effort to reconcile supply and demand will be tough to achieve.

      Impact and results 

      • PPM is a coherent business-aligned strategy that maximizes business value creation across the entire portfolio, rather than in each project.
      • Our methodology tackles the most pressing challenge upfront: get executive buy-in before you start defining your goals. With senior management behind the plan, implementation will become easier.
      • Create PPM processes that are a cultural fit for your company. Define your short and long-term goals for your strategy and support them with fully embedded portfolio management processes.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should develop a PPM strategy and understand how our methodology can help you. We show you how we can support you.

      Obtain executive buy-in for your strategy

      Ensure your strategy is a cultural fit or cultural-add for your company.

      • Develop a Project Portfolio Management Strategy – Phase 1: Get Executive Buy-In for Your PPM Strategy (ppt)
      • PPM High-Level Supply-Demand Calculator (xls)
      • PPM Strategic Plan Template (ppt)
      • PPM Strategy-Process Goals Translation Matrix Template (xls)

      Align the PPM processes to your company's strategic goals

      Use the advice and tools in this stage to align the PPM processes.

      • Develop a Project Portfolio Management Strategy – Phase 2: Align PPM Processes to Your Strategic Goals (ppt)
      • PPM Strategy Development Tool (xls)

      Refine and complete your plan

      Use the inputs from the previous stages and add a cost-benefit analysis and tool recommendation.

      • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

      Streamline your maintenance delivery

      Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

      • Develop a Project Portfolio Management Strategy – Phase 3: Complete Your PPM Strategic Plan (ppt)
      • Project Portfolio Analyst / PMO Analyst (doc)

       

       

      Redesign Your IT Organizational Structure

      • Buy Link or Shortcode: {j2store}275|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $71,830 Average $ Saved
      • member rating average days saved: 25 Average Days Saved
      • Parent Category Name: Organizational Design
      • Parent Category Link: /organizational-design

      Most organizations go through an organizational redesign to:

      • Better align to the strategic objectives of the organization.
      • Increase the effectiveness of IT as a function.
      • Provide employees with clarity in their roles and responsibilities.
      • Support new capabilities.
      • Better align IT capabilities to suit the vision.
      • Ensure the IT organization can support transformation initiatives.

      Our Advice

      Critical Insight

      • Organizational redesign is only as successful as the process leaders engage in. It shapes a story framed in a strong foundation of need and a method to successfully implement and adopt the new structure.
      • Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context. It’s important to focus on your organization, not someone else's.
      • You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Impact and Result

      • We are often unsuccessful in organizational redesign because we lack an understanding of why this initiative is required or fail to recognize that it is a change initiative.
      • Successful organizational design requires a clear understanding of why it is needed and what will be achieved by operating in a new structure.
      • Additionally, understanding the impact of the change initiative can lead to greater adoption by core stakeholders.

      Redesign Your IT Organizational Structure Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redesign Your IT Organizational Structure Deck – A defined method of redesigning your IT structure that is founded by clear drivers and consistently considering change management practices.

      The purpose of this storyboard is to provide a four-phased approach to organizational redesign.

      • Redesign Your IT Organizational Structure – Phases 1-4

      2. Communication Deck – A method to communicate the new organizational structure to critical stakeholders to gain buy-in and define the need.

      Use this templated Communication Deck to ensure impacted stakeholders have a clear understanding of why the new organizational structure is needed and what that structure will look like.

      • Organizational Design Communications Deck

      3. Redesign Your IT Organizational Structure Executive Summary Template – A template to secure executive leadership buy-in and financial support for the new organizational structure to be implemented.

      This template provides IT leaders with an opportunity to present their case for a change in organizational structure and roles to secure the funding and buy-in required to operate in the new structure.

      • Redesign Your IT Organizational Structure Executive Summary

      4. Redesign Your IT Organizational Structure Workbook – A method to document decisions made and rationale to support working through each phase of the process.

      This Workbook allows IT and business leadership to work through the steps required to complete the organizational redesign process and document key rationale for those decisions.

      • Redesign Your IT Organizational Structure Workbook

      5. Redesign Your IT Organizational Structure Operating Models and Capability Definitions – A tool that can be used to provide clarity on the different types of operating models that exist as well as the process definitions of each capability.

      Refer to this tool when working through the redesign process to better understand the operating model sketches and the capability definitions. Each capability has been tied back to core frameworks that exist within the information and technology space.

      • Redesign Your IT Organizational Structure Operating Models and Capability Definitions

      Infographic

      Workshop: Redesign Your IT Organizational Structure

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Organizational Design Foundation

      The Purpose

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Key Benefits Achieved

      Clearly articulate why this organizational redesign is needed and the implications the strategies and context will have on your structure.

      Activities

      1.1 Define the org design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      Outputs

      Clear definition of the need to redesign the organizational structure

      Understanding of the business context implications on the organizational structure creation.

      Strategic impact of strategies on organizational design.

      Customized Design Principles to rationalize and guide the organizational design process.

      2 Create the Operating Model Sketch

      The Purpose

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Key Benefits Achieved

      A customized operating model sketch that informs what capabilities will make up your IT organization and how those capabilities will align to deliver value to your organization.

      Activities

      2.1 Augmented list of IT capabilities.

      2.2 Capability gap analysis

      2.3 Identified capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      Outputs

      Customized list of IT processes that make up your organization.

      Analysis of which capabilities require dedicated focus in order to meet goals.

      Definition of why capabilities will be outsourced and the method of outsourcing used to deliver the most value.

      Customized IT operating model reflecting sourcing, centralization, and intended delivery of value.

      3 Formalize the Organizational Structure

      The Purpose

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Key Benefits Achieved

      A detailed organizational chart reflecting team structures, reporting structures, and role responsibilities.

      Activities

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      Outputs

      Capabilities Organized Into Functional Groups

      Functional Work Unit Mandates

      Organizational Chart

      4 Plan for the Implementation & Change

      The Purpose

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Key Benefits Achieved

      A clear plan of action on how to transition to the new structure, communicate the new organizational structure, and measure the effectiveness of the new structure.

      Activities

      4.1 Identify and mitigate key org design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      Outputs

      Risk Mitigation Plan

      Change Communication Message

      Standard FAQs

      Implementation and sustainment metrics.

      Further reading

      Redesign Your IT Organizational Structure

      Designing an IT structure that will enable your strategic vision is not about an org chart – it’s about how you work.

      EXECUTIVE BRIEF

      Analyst Perspective

      Structure enables strategy.

      The image contains a picture of Allison Straker.

      Allison Straker

      Research Director,

      Organizational Transformation

      The image contains a picture of Brittany Lutes.

      Brittany Lutes

      Senior Research Analyst,

      Organizational Transformation

      An organizational structure is much more than a chart with titles and names. It defines the way that the organization operates on a day-to-day basis to enable the successful delivery of the organization’s information and technology objectives. Moreover, organizational design sees beyond the people that might be performing a specific role. People and role titles will and often do change frequently. Those are the dynamic elements of organizational design that allow your organization to scale and meet specific objectives at defined points of time. Capabilities, on the other hand, are focused and related to specific IT processes.

      Redesigning an IT organizational structure can be a small or large change transformation for your organization. Create a structure that is equally mindful of the opportunities and the constraints that might exist and ensure it will drive the organization towards its vision with a successful implementation. If everyone understands why the IT organization needs to be structured that way, they are more likely to support and adopt the behaviors required to operate in the new structure.

      Executive Summary

      Your Challenge

      Your organization needs to reorganize itself because:

      • The current IT structure does not align to the strategic objectives of the organization.
      • There are inefficiencies in how the IT function is currently operating.
      • IT employees are unclear about their role and responsibilities, leading to inconsistencies.
      • New capabilities or a change in how the capabilities are organized is required to support the transformation.

      Common Obstacles

      Many organizations struggle when it comes redesigning their IT organizational structure because they:

      • Jump right into creating the new organizational chart.
      • Do not include the members of the IT leadership team in the changes.
      • Do not include the business in the changes.
      • Consider the context in which the change will take place and how to enable successful adoption.

      Info-Tech’s Approach

      Successful IT organization redesign includes:

      • Understanding the drivers, context, and strategies that will inform the structure.
      • Remaining objective by focusing on capabilities over people or roles.
      • Identifying gaps in delivery, sourcing strategies, customers, and degrees of centralization.
      • Remembering that organizational design is a change initiative and will require buy-in.

      Info-Tech Insight

      A successful redesign requires a strong foundation and a plan to ensure successful adoption. Without these, the organizational chart has little meaning or value.

      Your challenge

      This research is designed to help organizations who are looking to:

      • Redesign the IT structure to align to the strategic objectives of the enterprise.
      • Increase the effectiveness in how the IT function is operating in the organization.
      • Provide clarity to employees around their roles and responsibilities.
      • Ensure there is an ability to support new IT capabilities and/or align capabilities to better support the direction of the organization.
      • Align the IT organization to support a business transformation such as becoming digitally enabled or engaging in M&A activities.

      Organizational design is a challenge for many IT and digital executives

      69% of digital executives surveyed indicated challenges related to structure, team silos, business-IT alignment, and required roles when executing on a digital strategy.

      Source: MIT Sloan, 2020

      Common obstacles

      These barriers make IT organizational redesign difficult to address for many organizations:

      • Confuse organizational design and organizational charts as the same thing.
      • Start with the organizational chart, not taking into consideration the foundational elements that will make that chart successful.
      • Fail to treat organizational redesign as a change management initiative and follow through with the change.
      • Exclude impacted or influential IT leaders and/or business stakeholders from the redesign process.
      • Leverage an operating model because it is trending.

      To overcome these barriers:

      • Understand the context in which the changes will take place.
      • Communicate the changes to those impacted to enable successful adoption and implementation of a new organizational structure.
      • Understand that organizational design is for more than just HR leaders now; IT executives should be driving this change.

      Succeed in Organizational Redesign

      75% The percentage of change efforts that fail.

      Source: TLNT, 2019

      55% The percentage of practitioners who identify how information flows between work units as a challenge for their organization.

      Source: Journal of Organizational Design, 2019

      Organizational design defined

      If your IT strategy is your map, your IT organizational design represents the optimal path to get there.

      IT organizational design refers to the process of aligning the organization’s structure, processes, metrics, and talent to the organization’s strategic plan to drive efficiency and effectiveness.

      Why is the right IT organizational design so critical to success?

      Adaptability is at the core of staying competitive today

      Structure is not just an organizational chart

      Organizational design is a never-ending process

      Digital technology and information transparency are driving organizations to reorganize around customer responsiveness. To remain relevant and competitive, your organizational design must be forward looking and ready to adapt to rapid pivots in technology or customer demand.

      The design of your organization dictates how roles function. If not aligned to the strategic direction, the structure will act as a bungee cord and pull the organization back toward its old strategic direction (ResearchGate.net, 2014). Structure supports strategy, but strategy also follows structure.

      Organization design is not a one-time project but a continuous, dynamic process of organizational self-learning and continuous improvement. Landing on the right operating model will provide a solid foundation to build upon as the organization adapts to new challenges and opportunities.

      Understand the organizational differences

      Organizational Design

      Organizational design the process in which you intentionally align the organizational structure to the strategy. It considers the way in which the organization should operate and purposely aligns to the enterprise vision. This process often considers centralization, sourcing, span of control, specialization, authority, and how those all impact or are impacted by the strategic goals.

      Operating Model

      Operating models provide an architectural blueprint of how IT capabilities are organized to deliver value. The placement of the capabilities can alter the culture, delivery of the strategic vision, governance model, team focus, role responsibility, and more. Operating model sketches should be foundational to the organizational design process, providing consistency through org chart changes.

      Organizational Structure

      The organizational structure is the chosen way of aligning the core processes to deliver. This can be strategic, or it can be ad hoc. We recommend you take a strategic approach unless ad hoc aligns to your culture and delivery method. A good organizational structure will include: “someone with authority to make the decisions, a division of labor and a set of rules by which the organization operates” (Bizfluent, 2019).

      Organizational Chart

      The capstone of this change initiative is an easy-to-read chart that visualizes the roles and reporting structure. Most organizations use this to depict where individuals fit into the organization and if there are vacancies. While this should be informed by the structure it does not necessarily depict workflows that will take place. Moreover, this is the output of the organizational design process.

      Sources: Bizfluent, 2019; Strategy & Business, 2015; SHRM, 2021

      The Technology Value Trinity

      The image contains a diagram of the Technology Value Trinity as described in the text below.

      All three elements of the Technology Value Trinity work in harmony to delivery business value and achieve strategic needs. As one changes, the others need to change as well.

      How do these three elements relate?

      • Digital and IT strategy tells you what you need to achieve to be successful.
      • Operating model and organizational design align resources to deliver on your strategy and priorities. This is done by strategically structuring IT capabilities in a way that enables the organizations vision and considers the context in which the structure will operate.
      • I&T governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy and is the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy.

      Too often strategy, organizational design, and governance are considered separate practices – strategies are defined without teams and resources to support. Structure must follow strategy.

      Info-Tech’s approach to organizational design

      Like a story, a strategy without a structure to deliver on it is simply words on paper.

      Books begin by setting the foundation of the story.

      Introduce your story by:

      • Defining the need(s) that are driving this initiative forward.
      • Introducing the business context in which the organizational redesign must take place.
      • Outlining what’s needed in the redesign to support the organization in reaching its strategic IT goals.

      The plot cannot thicken without the foundation. Your organizational structure and chart should not exist without one either.

      The steps to establish your organizational chart - with functional teams, reporting structure, roles, and responsibilities defined – cannot occur without a clear definition of goals, need, and context. An organizational chart alone won’t provide the insight required to obtain buy-in or realize the necessary changes.

      Conclude your story through change management and communication.

      Good stories don’t end without referencing what happened before. Use the literary technique of foreshadowing – your change management must be embedded throughout the organizational redesign process. This will increase the likelihood that the organizational structure can be communicated, implemented, and reinforced by stakeholders.

      Info-Tech uses a capability-based approach to help you design your organizational structure

      Once your IT strategy is defined, it is critical to identify the capabilities that are required to deliver on those strategic initiatives. Each initiative will require a combination of these capabilities that are only supported through the appropriate organization of roles, skills, and team structures.

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      Embed change management into organizational design

      Change management practices are needed from the onset to ensure the implementation of an organizational structure.

      For each phase of this blueprint, its important to consider change management. These are the points when you need to communicate the structure changes:

      • Phase 1: Begin to socialize the idea of new organizational structure with executive leadership and explain how it might be impactful to the context of the organization. For example, a new control, governance model, or sourcing approach could be considered.
      • Phase 2: The chosen operating model will influence your relationships with the business and can create/eliminate silos. Ensure IT and business leaders have insight into these possible changes and a willingness to move forward.
      • Phase 3: The new organizational structure could create or eliminate teams, reduce or increase role responsibilities, and create different reporting structures than before. It’s time to communicate these changes with those most impacted and be able to highlight the positive outcomes of the various changes.
      • Phase 4: Should consider the change management practices holistically. This includes the type of change and length of time to reach the end state, communication, addressing active resistors, acquiring the right skills, and measuring the success of the new structure and its adoption.

      Info-Tech Insight

      Do not undertake an organizational redesign initiative if you will not engage in change management practices that are required to ensure its successful adoption.

      Measure the value of the IT organizational redesign

      Given that the organizational redesign is intended to align with the overall vision and objectives of the business, many of the metrics that support its success will be tied to the business. Adapt the key performance indicators (KPIs) that the business is using to track its success and demonstrate how IT can enable the business and improve its ability to reach those targets.

      Strategic Resources

      The percentage of resources dedicated to strategic priorities and initiatives supported by IT operating model. While operational resources are necessary, ensuring people are allocating time to strategic initiatives as well will drive the business towards its goal state. Leverage Info-Tech’s IT Staffing Assessment diagnostic to benchmark your IT resource allocation.

      Business Satisfaction

      Assess the improvement in business satisfaction overall with IT year over year to ensure the new structure continues to drive satisfaction across all business functions. Leverage Info-Tech’s CIO Business Vision diagnostic to see how your IT organization is perceived.

      Role Clarity

      The degree of clarity that IT employees have around their role and its core responsibilities can lead to employee engagement and retention. Consider measuring this core job driver by leveraging Info-Tech’s Employee Engagement Program.

      Customer & User Satisfaction

      Measure customer satisfaction with technology-enabled business services or products and improvements in technology-enabled client acquisition or retention processes. Assess the percentage of users satisfied with the quality of IT service delivery and leverage Info-Tech’s End-User Satisfaction Survey to determine improvements.

      Info-Tech’s methodology for Redesigning Your IT Organization

      Phase

      1. Establish the Organizational Design Foundation

      2. Create the Operating Model Sketch

      3. Formalize the Organizational Structure

      4. Plan for Implementation and Change

      Phase Outcomes

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Insight summary

      Overarching insight

      Organizational redesign processes focus on defining the ways in which you want to operate and deliver on your strategy – something an organizational chart will never be able to convey.

      Phase 1 insight

      Focus on your organization, not someone else's’. Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context.

      Phase 2 insight

      An operating model sketch that is customized to your organization’s specific situation and objectives will significantly increase the chances of creating a purposeful organizational structure.

      Phase 3 insight

      If you follow the steps outlined in the first three phases, creating your new organizational chart should be one of the fastest activities.

      Phase 4 insight

      Throughout the creation of a new organizational design structure, it is critical to involve the individuals and teams that will be impacted.

      Tactical insight

      You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:


      Communication Deck

      Communicate the changes to other key stakeholders such as peers, managers, and staff.

      Workbook

      As you work through each of the activities, use this workbook as a place to document decisions and rationale.

      Reference Deck

      Definitions for every capability, base operating model sketches, and sample organizational charts aligned to those operating models.

      Job Descriptions

      Key deliverable:

      Executive Presentation

      Leverage this presentation deck to gain executive buy-in for your new organizational structure.

      Blueprint benefits

      IT Benefits

      • Create an organizational structure that aligns to the strategic goals of IT and the business.
      • Provide IT employees with clarity on their roles and responsibilities to ensure the successful delivery of IT capabilities.
      • Highlight and sufficiently staff IT capabilities that are critical to the organization.
      • Define a sourcing strategy for IT capabilities.
      • Increase employee morale and empowerment.

      Business Benefits

      • IT can carry out the organization’s strategic mission and vision of all technical and digital initiatives.
      • Business has clarity on who and where to direct concerns or questions.
      • Reduce the likelihood of turnover costs as IT employees understand their roles and its importance.
      • Create a method to communicate how the organizational structure aligns with the strategic initiatives of IT.
      • Increase ability to innovate the organization.

      Executive Brief Case Study

      IT design needs to support organizational and business objectives, not just IT needs.

      INDUSTRY: Government

      SOURCE: Analyst Interviews and Working Sessions

      Situation

      IT was tasked with providing equality to the different business functions through the delivery of shared IT services. The government created a new IT organizational structure with a focus on two areas in particular: strategic and operational support capabilities.

      Challenge

      When creating the new IT structure, an understanding of the complex and differing needs of the business functions was not reflected in the shared services model.

      Outcome

      As a result, the new organizational structure for IT did not ensure adequate meeting of business needs. Only the operational support structure was successfully adopted by the organization as it aligned to the individual business objectives. The strategic capabilities aspect was not aligned to how the various business lines viewed themselves and their objectives, causing some partners to feel neglected.

      Info-Tech offers various levels of support to best suit your needs.

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Phase 1

      Call #1: Define the process, understand the need, and create a plan of action.

      Phase 2

      Call #2: Define org. design drivers and business context.

      Call #3: Understand strategic influences and create customized design principles.

      Call #4: Customize, analyze gaps, and define sourcing strategy for IT capabilities.

      Call #5: Select and customize the IT operating model sketch.

      Phase 3

      Call #6: Establish functional work units and their mandates.

      Call #7: Translate the functional organizational chart to an operational organizational chart with defined roles.

      Phase 4

      Call #8: Consider risks and mitigation tactics associated with the new structure and select a transition plan.

      Call #9: Create your change message, FAQs, and metrics to support the implementation plan.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Organizational Redesign Foundation

      Create the Operating Model Sketch

      Formalize the Organizational Structure

      Plan for Implementation and Change

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Define the org. design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      2.1 Augment list of IT capabilities.

      2.2 Analyze capability gaps.

      2.3 Identify capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      4.1 Identify and mitigate key org. design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Foundational components to the organizational design
      2. Customized design principles
      1. Heat mapped IT capabilities
      2. Defined outsourcing strategy
      3. Customized operating model
      1. Capabilities organized into functional groups
      2. Functional work unit mandates
      3. Organizational chart
      1. Risk mitigation plan
      2. Change communication message
      3. Standard FAQs
      4. Implementation and sustainment metrics
      1. Completed organizational design communications deck

      This blueprint is part one of a three-phase approach to organizational transformation

      PART 1: DESIGN

      PART 2: STRUCTURE

      PART 3: IMPLEMENT

      IT Organizational Architecture

      Organizational Sketch

      Organizational Structure

      Organizational Chart

      Transition Strategy

      Implement Structure

      1. Define the organizational design drivers, business context, and strategic alignment.

      2. Create customized design principles.

      3. Develop and customize a strategically aligned operating model sketch.

      4. Define the future-state work units.

      5. Create future-state work unit mandates.

      6. Define roles by work unit.

      7. Turn roles into jobs with clear capability accountabilities and responsibilities.

      8. Define reporting relationships between jobs.

      9. Assess options and select go-forward organizational sketch.

      11. Validate organizational sketch.

      12. Analyze workforce utilization.

      13. Define competency framework.

      14. Identify competencies required for jobs.

      15. Determine number of positions per job

      16. Conduct competency assessment.

      17. Assign staff to jobs.

      18. Build a workforce and staffing plan.

      19. Form an OD implementation team.

      20. Develop change vision.

      21. Build communication presentation.

      22. Identify and plan change projects.

      23. Develop organizational transition plan.

      24. Train managers to lead through change.

      25. Define and implement stakeholder engagement plan.

      26. Develop individual transition plans.

      27. Implement transition plans.

      Risk Management: Create, implement, and monitor risk management plan.

      HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

      Monitor and Sustain Stakeholder Engagement

      Phase 1

      Establish the Organizational Redesign Foundation

      This phase will walk you through the following activities:

      1.1 Define the organizational redesign driver(s)

      1.2 Create design principles based on the business context

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1.3b Identify the capabilities required to deliver on your strategies

      1.4 Finalize your list of design principles

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Articulate the Why

      Changes are most successful when leaders clearly articulate the reason for the change – the rationale for the organizational redesign of the IT function. Providing both staff and executive leaders with an understanding for this change is imperative to its success. Despite the potential benefits to a redesign, they can be disruptive. If you are unable to answer the reason why, a redesign might not be the right initiative for your organization.

      Employees who understand the rationale behind decisions made by executive leaders are 3.6 times more likely to be engaged.

      McLean & Company Engagement Survey Database, 2021; N=123,188

      Info-Tech Insight

      Successful adoption of the new organizational design requires change management from the beginning. Start considering how you will convey the need for organizational change within your IT organization.

      The foundation of your organizational design brings together drivers, context, and strategic implications

      All aspects of your IT organization’s structure should be designed with the business’ context and strategic direction in mind.

      Use the following set of slides to extract the key components of your drivers, business context, and strategic direction to land on a future structure that aligns with the larger strategic direction.

      REDESIGN DRIVERS

      Driver(s) can originate from within the IT organization or externally. Ensuring the driver(s) are easy to understand and articulate will increase the successful adoption of the new organizational structure.

      BUSINESS CONTEXT

      Defines the interactions that occur throughout the organization and between the organization and external stakeholders. The context provides insight into the environment by both defining the purpose of the organization and the values that frame how it operates.

      STRATEGY IMPLICATIONS

      The IT strategy should be aligned to the overall business strategy, providing insight into the types of capabilities required to deliver on key IT initiatives.

      Understand IT’s desired maturity level, alignment with business expectations, and capabilities of IT

      Where are we today?

      Determine the current overall maturity level of the IT organization.

      Where do we want to be as an organization?

      Use the inputs from Info-Tech’s diagnostic data to determine where the organization should be after its reorganization.

      How can you leverage these results?

      The result of these diagnostics will inform the design principles that you’ll create in this phase.

      Leverage Info-Tech’s diagnostics to provide an understanding of critical areas your redesign can support:

      CIO Business Vision Diagnostic

      Management & Governance Diagnostic

      IT Staffing Diagnostic

      The image contains a picture of Info-Tech's maturity ladder.

      Consider the organizational design drivers

      Consider organizational redesign if …

      Effectiveness is a concern:

      • Insufficient resources to meet demand
      • Misalignment to IT (and business) strategies
      • Lack of clarity around role responsibility or accountability
      • IT functions operating in silos

      New capabilities are needed:

      • Organization is taking on new capabilities (digital, transformation, M&A)
      • Limited innovation
      • Gaps in the capabilities/services of IT
      • Other external environmental influences or changes in strategic direction

      Lack of business understanding

      • Misalignment between business and IT or how the organization does business
      • Unhappy customers (internal or external)

      Workforce challenges

      • Frequent turnover or inability to attract new skills
      • Low morale or employee empowerment

      These are not good enough reasons …

      • New IT leader looking to make a change for the sake of change or looking to make their legacy known
      • To work with specific/hand-picked leaders over others
      • To “shake things up” to see what happens
      • To force the organization to see IT differently

      Info-Tech Insight

      Avoid change for change’s sake. Restructuring could completely miss the root cause of the problem and merely create a series of new ones.

      1.1 Define the organizational redesign driver(s)

      1-2 hours

      1. As a group, brainstorm a list of current pain points or inhibitors in the current organizational structure, along with a set of opportunities that can be realized during your restructuring. Group these pain points and opportunities into themes.
      2. Leverage the pain points and opportunities to help further define why this initiative is something you’re driving towards. Consider how you would justify this initiative to different stakeholders in the organization.
      3. Questions to consider:
        1. Who is asking for this initiative?
        2. What are the primary benefits this is intended to produce?
        3. What are you optimizing for?
        4. What are we capable of achieving as an IT organization?
        5. Are the drivers coming from inside or outside the IT organization?
      4. Once you’ve determined the drivers for redesigning the IT organization, prioritize those drivers to ensure there is clarity when communicating why this is something you are focusing time and effort on.

      Input

      Output

      • Knowledge of the current organization
      • Pain point and opportunity themes
      • Defined drivers of the initiative

      Materials

      Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Frame the organizational design within the context of the business

      Workforce Considerations:

      • How does your organization view its people resources? Does it have the capacity to increase the number of resources?
      • Do you currently have sufficient staff to meet the demands of the organization? Are you able to outsource resources when demand requires it?
      • Are the members of your IT organization unionized?
      • Is your workforce distributed? Do time zones impact how your team can collaborate?

      Business Context Consideration

      IT Org. Design Implication

      Culture:

      Culture, "the way we do things here,” has huge implications for executing strategy, driving engagement, and providing a guiding force that ensures organizations can work together toward common goals.

      • What is the culture of your organization? Is it cooperative, traditional, competitive, or innovative? (See appendix for details.)
      • Is this the target culture or a stepping-stone to the ideal culture?
      • How do the attitudes and behaviors of senior leaders in the organization reinforce this culture?

      Consider whether your organization’s culture can accept the operating model and organizational structure changes that make sense on paper.

      Certain cultures may lean toward particular operating models. For example, the demand-develop-service operating model may be supported by a cooperative culture. A traditional organization may lean towards the plan-build-run operating model.

      Ensure you have considered your current culture and added exercises to support it.

      If more capacity is required to accomplish the goals of the organization, you’ll want to prepare the leaders and explain the need in your design principles (to reflect training, upskilling, or outsourcing). Unionized environments require additional consideration. They may necessitate less structural changes, and so your principles will need to reflect other alternatives (hiring additional resources, creative options) to support organizational needs. Hybrid or fully remote workforces may impact how your organization interacts.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Control & Governance:

      It is important to consider how your organization is governed, how decisions are made, and who has authority to make decisions.

      Strategy tells what you do, governance validates you’re doing the right things, and structure is how you execute on what’s been approved.

      • How do decisions get considered and approved in your organization? Are there specific influences that impact the priorities of the organization?
      • Are those in the organization willing to release decision-making authority around specific IT components?
      • Should the organization take on greater accountability for specific IT components?

      Organizations that require more controls may lean toward more centralized governance. Organizations that are looking to better enable and empower their divisions (products, groups, regions, etc.) may look to embed governance in these parts of the organization.

      For enterprise organizations, consider where IT has authority to make decisions (at the global, local, or system level). Appropriate governance needs to be built into the appropriate levels.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Financial Constraints:

      Follow the money: You may need to align your IT organization according to the funding model.

      • Do partners come to IT with their budgets, or does IT have a central pool that they use to fund initiatives from all partners?
      • Are you able to request finances to support key initiatives/roles prioritized by the organization?
      • How is funding aligned: technology, data, digital, etc.? Is your organization business-line funded? Pooled?
      • Are there special products or digital transformation initiatives with resources outside IT? Product ownership funding?
      • How are regulatory changes funded?
      • Do you have the flexibility to adjust your budget throughout the fiscal year?
      • Are chargebacks in place? Are certain services charged back to business units

      Determine if you can move forward with a new model or if you can adjust your existing one to suit the financial constraints.

      If you have no say over your funding, pre-work may be required to build a business case to change your funding model before you look at your organizational structure – without this, you might have to rule out centralized and focus on hybrid/centralized. If you don’t control the budget (funding comes from your partners), it will be difficult to move to a more centralized model.

      A federated business organization may require additional IT governance to help prioritize across the different areas.

      Budgets for digital transformation might come from specific areas of the business, so resources may need to be aligned to support that. You’ll have to consider how you will work with those areas. This may also impact the roles that are going to exist within your IT organization – product owners or division owners might have more say.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Business Perspective of IT:

      How the business perceives IT and how IT perceives itself are sometimes not aligned. Make sure the business’ goals for IT are well understood.

      • Are your business partners satisfied if IT is an order taker? Do they agree with the need for IT to become a business partner? Is IT expected to innovate and transform the organization?
      • Is what the business needs from IT the same as what IT is providing currently?

      Business Organization Structure and Growth:

      • How is the overall organization structured: Centralized/decentralized? Functionally aligned? Divided by regions?
      • In what areas does the organization prioritize investments?
      • Is the organization located across a diverse geography?
      • How big is the organization?
      • How is the organization growing and changing – by mergers and acquisitions?

      If IT needs to become more of a business partner, you’ll want to define what that means to your organization and focus on the capabilities to enable this. Educating your partners might also be required if you’re not aligned.

      For many organizations, this will include stakeholder management, innovation, and product/project management. If IT and its business partners are satisfied with an order-taker relationship, be prepared for the consequences of that.

      A global organization will require different IT needs than a single location. Specifically, site reliability engineering (SRE) or IT support services might be deployed in each region. Organizations growing through mergers and acquisitions can be structured differently depending on what the organization needs from the transaction. A more centralized organization may be appropriate if the driver is reuse for a more holistic approach, or the organization may need a more decentralized organization if the acquisitions need to be handled uniquely.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Sourcing Strategy:

      • What are the drivers for sourcing? Staff augmentation, best practices, time zone support, or another reason?
      • What is your strategy for sourcing?
      • Does IT do all of your technology work, or are parts being done by business or other units?
      • Are we willing/able to outsource, and will that place us into non-compliance (regulations)?
      • Do you have vendor management capabilities in areas that you might outsource?
      • How cloud-driven is your organization?
      • Do you have global operations?

      Change Tolerance:

      • What’s your organization’s tolerance to make changes around organizational design?
      • What's the appetite and threshold for risk?

      Your sourcing strategy affects your organizational structure, including what capabilities you group together. Since managing outsourced capabilities also includes the need for vendor management, you’ll need to ensure there aren’t too many capabilities required per leader. Look closely at what can be achieved through your operating model if IT is done through other groups. Even though these groups may not be in scope of your organization changes, you need to ensure your IT team works with them effectively.

      If your organization is going to push back if there are big structural changes, consider whether the changes are truly necessary. It may be preferred to take baby steps – use an incremental versus big-bang approach.

      A need for incremental change might mean not making a major operating model change.

      Business context considerations

      Business Context Consideration

      IT Org Design. Implication

      Stakeholder Engagement & Focus:

      Identify who your customers and stakeholders are; clarify their needs and engagement model.

      • Who is the customer for IT products and services?
      • Is your customer internal? External? Both?
      • How much of a priority is customer focus for your organization?
      • How will IT interact with customers, end users, and partners? What is the engagement model desired?

      Business Vision, Services, and Products:

      Articulate what your organization was built to do.

      • What does the organization create or provide?
      • Are these products and services changing?
      • What are the most critical capabilities to your organization?
      • What makes your organization a success? What are critical success factors of the organization and how are they measuring this to determine success?

      For a customer or user focus, ensure capabilities related to understanding needs (stakeholder, UX, etc.) are prioritized. Hybrid, decentralized, or demand-develop-service models often have more of a focus on customer needs.

      Outsourcing the service desk might be a consideration if there’s a high demand for the service. A differentiation between these users might mean there’s a different demand for services.

      Think broadly in terms of your organizational vision, not just the tactical (widget creation). You might need to choose an operating model that supports vision.

      Do you need to align your organization with your value stream? Do you need to decentralize specific capabilities to enable prioritization of the key capabilities?

      1.2 Create design principles based on the business context

      1-3 hours

      1. Discuss the business context in which the IT organizational redesign will be taking place. Consider the following standard components of the business context; include other relevant components specific to your organization:
      • Culture
      • Workforce Considerations
      • Control and Governance
      • Financial Constraints
      • Business Perspective of IT
      • Business Organization Structure and Growth
      • Sourcing Strategy
      • Change Tolerance
      • Stakeholder Engagement and Focus
      • Business Vision, Services, and Products
    • Different stakeholders can have different perspectives on these questions. Be sure to consider a holistic approach and engage these individuals.
    • Capture your findings and use them to create initial design principles.
    • Input

      Output

      • Business context
      • Design principles reflecting how the business context influences the organizational redesign for IT

      Materials

      Participants

      • Whiteboard/flip charts (physical or electronic)
      • List of Context Questions
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      How your IT organization is structured needs to reflect what it must be built to do

      Structure follows strategy – the way you design will impact what your organization can produce.

      Designing your IT organization requires an assessment of what it needs to be built to do:

      • What are the most critical capabilities that you need to deliver, and what does success look like in those different areas?
      • What are the most important things that you deliver overall in your organization?

      The IT organization must reflect your business needs:

      • Understand your value stream and/or your prioritized business goals.
      • Understand the impact of your strategies – these can include your overall digital strategy and/or your IT strategy

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1 hour

      1. Identify your organization’s value stream – what your overall organization needs to do from supplier to consumer to provide value. Leverage Info-Tech’s industry reference architectures if you haven’t identified your value stream, or use the Document Your Business Architecture blueprint to create yours.
      2. For each item in your value stream, list capabilities that are critical to your organizational strategy and IT needs to further invest in to enable growth.
      3. Also, list those that need further support, e.g. those that lead to long wait times, rework time, re-tooling, down-time, unnecessary processes, unvaluable processes.*
      4. Capture the IT capabilities required to enable your business in your draft principles.
      The image contains a screenshot of the above activity: Sampling Manufacturing Business Capabilities.
      Source: Six Sigma Study Guide, 2014
      Input Output
      • Organization’s value stream
      • List of IT capabilities required to support the IT strategy
      Materials Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Your strategy will help you decide on your structure

      Ensure that you have a clear view of the goals and initiatives that are needed in your organization. Your IT, digital, business, and/or other strategies will surface the IT capabilities your organization needs to develop. Identify the goals of your organization and the initiatives that are required to deliver on them. What capabilities are required to enable these? These capabilities will need to be reflected in your design principles.

      Sample initiatives and capabilities from an organization’s strategies

      The image contains a screenshot of sample initiatives and capabilities from an organization's strategies.

      1.3b Identify the capabilities required to deliver on your strategies

      1 hour

      1. For each IT goal, there may be one or more initiatives that your organization will need to complete in order to be successful.
      2. Document those goals and infinitives. For each initiative, consider which core IT capabilities will be required to deliver on that goal. There might be one IT capability or there might be several.
      3. Identify which capabilities are being repeated across the different initiatives. Consider whether you are currently investing in those capabilities in your current organizational structure.
      4. Highlight the capabilities that require IT investment in your design principles.
      InputOutput
      • IT goals
      • IT initiatives
      • IT, digital, and business strategies
      • List of IT capabilities required to support the IT strategy
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Create your organizational design principles

      Your organizational design principles should define a set of loose rules that can be used to design your organizational structure to the specific needs of the work that needs to be done. These rules will guide you through the selection of the appropriate operating model that will meet your business needs. There are multiple ways you can hypothetically organize yourself to meet these needs, and the design principles will point you in the direction of which solution is the most appropriate as well as explain to your stakeholders the rationale behind organizing in a specific way. This foundational step is critical: one of the key reasons for organizational design failure is a lack of requisite time spent on the front-end understanding what is the best fit.

      The image contains an example of organizing design principles as described above.

      1.4 Finalize your list of design principles

      1-3 hours

      1. As a group, review the key outputs from your data collection exercises and their implications.
      2. Consider each of the previous exercises – where does your organization stand from a maturity perspective, what is driving the redesign, what is the business context, and what are the key IT capabilities requiring support. Identify how each will have an implication on your organizational redesign. Leverage this conversation to generate design principles.
      3. Vote on a finalized list of eight to ten design principles that will guide the selection of your operating model. Have everyone leave the meeting with these design principles so they can review them in more detail with their work units or functional areas and elicit any necessary feedback.
      4. Reconvene the group that was originally gathered to create the list of design principles and make any final amendments to the list as necessary. Use this opportunity to define exactly what each design principle means in the context of your organization so everyone has the same understanding of what this means moving forward.
      InputOutput
      • Organizational redesign drivers
      • Business context
      • IT strategy capabilities
      • Organizational design principles to help inform the selection of the right operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Example design principles

      Your eight to ten design principles will be those that are most relevant to YOUR organization. Below are samples that other organizations have created, but yours will not be the same.

      Design Principle

      Description

      Decision making

      We will centralize decision making around the prioritization of projects to ensure that the initiatives driving the most value for the organization as a whole are executed.

      Fit for purpose

      We will build and maintain fit-for-purpose solutions based on business units’ unique needs.

      Reduction of duplication

      We will reduce role and application duplication through centralized management of assets and clearly differentiated roles that allow individuals to focus within key capability areas.

      Managed security

      We will manage security enterprise-wide and implement compliance and security governance policies.

      Reuse > buy > build

      We will maximize reuse of existing assets by developing a centralized application portfolio management function and approach.

      Managed data

      We will create a specialized data office to provide data initiatives with the focus they need to enable our strategy.

      Design Principle

      Description

      Controlled technical diversity

      We will control the variety of technology platforms we use to allow for increased operability and reduction of costs.

      Innovation

      R&D and innovation are critical – we will build an innovation team into our structure to help us meet our digital agenda.

      Resourcing

      We will separate our project and maintenance activities to ensure each are given the dedicated support they need for success and to reduce the firefighting mentality.

      Customer centricity

      The new structure will be directly aligned with customer needs – we will have dedicated roles around relationship management, requirements, and strategic roadmapping for business units.

      Interoperability

      We will strengthen our enterprise architecture practices to best prepare for future mergers and acquisitions.

      Cloud services

      We will move toward hosted versus on-premises infrastructure solutions, retrain our data center team in cloud best practices, and build roles around effective vendor management, cloud provisioning, and architecture.

      Phase 2

      Create the Operating Model Sketch

      This phase will walk you through the following activities:

      2.1 Augment the capability list

      2.2 Heatmap capabilities to determine gaps in service

      2.3 Identify the target state of sourcing for your IT capabilities

      2.4 Review and select a base operating model sketch

      2.5 Customize the selected overlay to reflect the desired future state

      This phase involves the following participants:

      • CIO
      • IT Leadership

      Embed change management into the organizational design process

      Gain Buy-In

      Obtain desire from stakeholders to move forward with organizational redesign initiative by involving them in the process to gain interest. This will provide the stakeholders with assurance that their concerns are being heard and will help them to understand the benefits that can be anticipated from the new organizational structure.

      “You’re more likely to get buy-in if you have good reason for the proposed changes – and the key is to emphasize the benefits of an organizational redesign.”

      Source: Lucid Chart

      Info-Tech Insight

      Just because people are aware does not mean they agree. Help different stakeholders understand how the change in the organizational structure is a benefit by specifically stating the benefit to them.

      Info-Tech uses capabilities in your organizational design

      We differentiate between capabilities and competencies.

      Capabilities

      • Capabilities are focused on the entire system that would be in place to satisfy a particular need. This includes the people who are competent to complete a specific task and also the technology, processes, and resources to deliver.
      • Capabilities work in a systematic way to deliver on specific need(s).
      • A functional area is often made up of one or more capabilities that support its ability to deliver on that function.
      • Focusing on capabilities rather then the individuals in organizational redesign enables a more objective and holistic view of what your organization is striving toward.

      Competencies

      • Competencies on the other hand are specific to an individual. It determines if the individual poses the skills or ability to perform.
      • Competencies are rooted in the term competent, which looks to understand if you are proficient enough to complete the specific task at hand.
      • Source: The People Development Magazine, 2020

      Use our IT capabilities to establish your IT organization design

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      2.1 Augment the capability list

      1-3 hours

      1. Using the capability list on the previous slide, go through each of the IT capabilities and remove any capabilities for which your IT organization is not responsible and/or accountable. Refer to the Operating Model and Capability Definition List for descriptions of each of the IT capabilities.
      2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
      • For example, some organizations may refer to their service desk capability as help desk or regional support. Use a descriptive term that most accurately reflects the terminology used inside the organization today.
    • Add any core capabilities from your organization that are missing from the provided IT capability list.
      • For example, organizations that leverage DevOps capabilities for their product development may desire to designate this in their operating model.
    • Document the rationale for decisions made for future reference.
    • Input Output
      • Baseline list of IT capabilities
      • IT capabilities required to support IT strategy
      • Customized list of IT capabilities
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Gaps in delivery

      Identify areas that require greater focus and attention.

      Assess the gaps between where you currently are and where you need to be. Evaluate how critical and how effective your capabilities are:

      • Criticality = Importance
        • Try to focus on those which are highly critical to the organization.
        • These may be capabilities that have been identified in your strategies as areas to focus on.
      • Effectiveness = Performance
        • Identify those where the process or system is broken or ineffective, preventing the team from delivering on the capability.
        • Effectiveness could take into consideration how scalable, adaptable, or sustainable each capability is.
        • Focus on the capabilities that are low or medium in effectiveness but highly critical. Addressing the delivery of these capabilities will lead to the most positive outcomes in your organization.

      Remember to identify what allows the highly effective capabilities to perform at the capacity they are. Leverage this when increasing effectiveness elsewhere.

      High Gap

      There is little to no effectiveness (high gap) and the capability is highly important to your organization.

      Medium Gap

      Current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.

      Low Gap

      Current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.

      2.2 Heatmap capabilities to determine gaps in delivery

      1-3 hours

      1. At this point, you should have identified what capabilities you need to have to deliver on your organization's goals and initiatives.
      2. Convene a group of the key stakeholders involved in the IT organizational design initiative.
      3. Review your IT capabilities and color each capability border according to the effectiveness and criticality of that capability, creating a heat map.
      • Green indicates current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.
      • Yellow indicates current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.
      • Red indicates that there is little to no effectiveness (high gap) and the capability is highly important to your organization.
      Input Output
      • Selected capabilities from activity 2.1
      • Gap analysis in delivery of capabilities currently
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Don’t forget the why: why are you considering outsourcing?

      There are a few different “types” of outsourcing:

      1. Competitive Advantage – Working with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      2. Managed Service– The third party manages a capability or function for your organization.
      3. Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.

      Weigh which sourcing model(s) will best align with the needed capabilities to deliver effectively

      Insourcing

      Staff Augmentation

      Managed Service

      Competitive Advantage

      Description

      The organization maintains full responsibility for the management and delivery of the IT capability or service.

      Vendor provides specialized skills and enables the IT capability or service together with the organization to meet demand.

      Vendor completely manages the delivery of value for the IT capability, product or service.

      Vendor has unique skills, insights, and best practices that can be taught to staff to enable insourced capability and competency.

      Benefits

      • Retains in-house control over proprietary knowledge and assets that provide competitive or operational advantage.
      • Gains efficiency due to integration into the organization’s processes.
      • Provision of unique skills.
      • Addresses variation in demand for resources.
      • Labor cost savings.
      • Improves use of internal resources.
      • Improves effectiveness due to narrow specialization.
      • Labor cost savings.
      • Gain insights into aspects that could provide your organization with advantages over competitors.
      • Long-term labor cost savings.
      • Short-term outsourcing required.
      • Increase in-house competencies.

      Drawbacks

      • Quality of services/capabilities might not be as high due to lack of specialization.
      • No labor cost savings.
      • Potentially inefficient distribution of labor for the delivery of services/capabilities.
      • Potential conflicts in management or delivery of IT services and capabilities.
      • Negative impact on staff morale.
      • Limited control over services/capabilities.
      • Limited integration into organization’s processes.
      • Short-term labor expenses.
      • Requires a culture of continuous learning and improvement.

      Your strategy for outsourcing will vary with capability and capacity

      The image contains a diagram to show the Develop Vendor Management Capabilities, as described in the text below.

      Capability

      Capacity

      Outsourcing Model

      Low

      Low

      Your solutions may be with you for a long time, so it doesn’t matter whether it is a strategic decision to outsource development or if you are not able to attract the talent required to deliver in your market. Look for a studio, agency, or development shop that has a proven reputation for long-term partnership with its clients.

      Low

      High

      Your team has capacity but needs to develop new skills to be successful. Look for a studio, agency, or development shop that has a track record of developing its customers and delivering solutions.

      High

      Low

      Your organization knows what it is doing but is strapped for people. Look at “body shops” and recruiting agencies that will support short-term development contracts that can be converted to full-time staff or even a wholesale development shop acquisition.

      High

      High

      You have capability and capacity for delivering on your everyday demands but need to rise to the challenge of a significant, short-term rise in demand on a critical initiative. Look for a major system integrator or development shop with the specific expertise in the appropriate technology.

      Use these criteria to inform your right sourcing strategy

      Sourcing Criteria

      Description

      Determine whether you’ll outsource using these criteria

      1. Critical or commodity

      Determine whether the component to be sourced is critical to your organization or if it is a commodity. Commodity components, which are either not strategic in nature or related to planning functions, are likely candidates for outsourcing. Will you need to own the intellectual property created by the third party? Are you ok if they reuse that for their other clients?

      2. Readiness to outsource

      Identify how easy it would be to outsource a particular IT component. Consider factors such as knowledge transfer, workforce reassignment or reduction, and level of integration with other components.

      Vendor management readiness – ensuring that you have sufficient capabilities to manage vendors – should also be considered here.

      3. In-house capabilities

      Determine if you have the capability to deliver the IT solutions in-house. This will help you establish how easy it would be to insource an IT component.

      4. Ability to attract resources (internal vs. outsourced)

      Determine if the capability is one that is easily sourced with full-time, internal staff or if it is a specialty skill that is best left for a third-party to source.

      Determine your sourcing model using these criteria

      5. Cost

      Consider the total cost (investment and ongoing costs) of the delivery of the IT component for each of the potential sourcing models for a component.

      6. Quality

      Define the potential impact on the quality of the IT component being sourced by the possible sourcing models.

      7. Compliance

      Determine whether the sourcing model would fit with regulations in your industry. For example, a healthcare provider would only go for a cloud option if that provider is HIPAA compliant.

      8. Security

      Identify the extent to which each sourcing option would leave your organization open to security threats.

      9. Flexibility

      Determine the extent to which the sourcing model will allow your organization to scale up or down as demand changes.

      2.3 Identify capabilities that could be outsourced

      1-3 hours

      1. For each of the capabilities that will be in your future-state operating model, determine if it could be outsourced. Review the sourcing criteria available on the previous slide to help inform which sourcing strategy you will use for each capability.
      2. When looking to outsource or co-source capabilities, consider why that capability would be outsourced:
      • Competitive Advantage – Work with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      • Managed Service – The third party manages a capability or function for your organization.
      • Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.
    • Place an asterisk (*) around the capabilities that will be leveraging one of the three previous sourcing options.
    • InputOutput
      • Customized IT capabilities
      • Sourcing strategy for each IT capability
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      What is an operating model?

      Leverage a cohesive operating model throughout the organizational design process.

      An IT operating model sketch is a visual representation of the way your IT organization needs to be designed and the capabilities it requires to deliver on the business mission, strategic objectives, and technological ambitions. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint.

      The visual should be the optimization and alignment of the IT organization’s structure to deliver the capabilities required to achieve business goals. Additionally, it should clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization. Investing time in the front end getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and your model to change as the business changes.

      The image contains an example of an operating model as described in the text above.

      Info-Tech Insight

      Every structure decision you make should be based on an identified need, not on a trend.Build your IT organization to enable the priorities of the organization.

      Each IT operating model is characterized by a variety of advantages and disadvantages

      Centralized

      Hybrid

      Decentralized

      Advantages
      • Maximum flexibility to allocate IT resources across business units.
      • Low-cost delivery model and greatest economies of scale.
      • Control and consistency offers opportunity for technological rationalization and standardization and volume purchasing at the highest degree.
      • Centralizes processes and services that require consistency across the organization.
      • Decentralizes processes and services that need to be responsive to local market conditions.
      • Eliminates duplication and redundancy by allowing effective use of common resources (e.g. shared services, standardization).
      • Goals are aligned to the distinct business units or functions.
      • Greater flexibility and more timely delivery of services.
      • Development resources are highly knowledgeable about business-unit-specific applications.
      • Business unit has greatest control over IT resources and can set and change priorities as needed.

      Disadvantages

      • Less able to respond quickly to local requirements with flexibility.
      • IT can be resistant to change and unwilling to address the unique needs of end users.
      • Business units can be frustrated by perception of lack of control over resources.
      • Development of special business knowledge can be limited.
      • Requires the most disciplined governance structure and the unwavering commitment of the business; therefore, it can be the most difficult to maintain.
      • Requires new processes as pooled resources must be staffed to approved projects.
      • Redundancies, conflicts, and incompatible technologies can result from business units having differentiated services and applications – increasing cost.
      • Ability to share IT resources is low due to lack of common approaches.
      • Lack of integration limits the communication of data between businesses and reduces common reporting.

      Decentralization can take many forms – define what it means to your organization

      Decentralization can take a number of different forms depending on the products the organization supports and how the organization is geographically distributed. Use the following set of explanations to understand the different types of decentralization possible and when they may make sense for supporting your organizational objectives.

      Line of Business

      Decentralization by lines of business (LoB) aligns decision making with business operating units based on related functions or value streams. Localized priorities focus the decision making from the CIO or IT leadership team. This form of decentralization is beneficial in settings where each line of business has a unique set of products or services that require specific expertise or flexible resourcing staffing between the teams.

      Product Line

      Decentralization by product line organizes your team into operationally aligned product families to improve delivery throughput, quality, and resource flexibility within the family. By adopting this approach, you create stable product teams with the right balance between flexibility and resource sharing. This reinforces value delivery and alignment to enterprise goals within the product lines.

      Geographical

      Geographical decentralization reflects a shift from centralized to regional influences. When teams are in different locations, they can experience a number of roadblocks to effective communication (e.g. time zones, regulatory differences in different countries) that may necessitate separating those groups in the organizational structure, so they have the autonomy needed to make critical decisions.

      Functional

      Functional decentralization allows the IT organization to be separated by specialty areas. Organizations structured by functional specialization can often be organized into shared service teams or centers of excellence whereby people are grouped based on their technical, domain, or functional area within IT (Applications, Data, Infrastructure, Security, etc.). This allows people to develop specialized knowledge and skills but can also reinforce silos between teams.

      2.4 Review and select a base operating model sketch

      1 hour

      1. Review the set of base operating model sketches available on the following slides.
      2. For each operating model sketch, there are benefits and risks to be considered. Make an informed selection by understanding the risks that your organization might be taking on by adopting that particular operating model.
      3. If at any point in the selection process the group is unsure about which operating model will be the right fit, refer back to your design principles established in activity 1.4. These should guide you in the selection of the right operating model and eliminate those which will not serve the organization.
      InputOutput
      • Organizational design principles
      • Customized list of IT capabilities
      • Operating model sketch examples
      • Selected operating model sketch
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Centralized Operating Model #1: Plan-Build-Run

      I want to…

      • Establish a formalized governance process that takes direction from the organization on which initiatives should be prioritized by IT.
      • Ensure there is a clear separation between teams that are involved in strategic planning, building solutions, and delivering operational support.
      • Be able to plan long term by understanding the initiatives that are coming down the pipeline and aligning to an infrequent budgeting plan.

      BENEFITS

      • Effective at implementing long-term plans efficiently; separates maintenance and projects to allow each to have the appropriate focus.
      • More oversight over financials; better suited for fixed budgets.
      • Works across centralized technology domains to better align with the business’ strategic objectives – allows for a top-down approach to decision making.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Well-suited for a project-driven environment that employs waterfall or a hybrid project management methodology that is less iterative.

      RISKS

      • Creates artificial silos between the build (developers) and run (operations staff) teams, as both teams focus on their own responsibilities and often fail to see the bigger picture.
      • Miss opportunities to deliver value to the organization or innovate due to an inability to support unpredictable/shifting project demands as decision making is centralized in the plan function.
      • The portfolio of initiatives being pursued is often determined before requirements analysis takes place, meaning the initiative might be solving the wrong need or problem.
      • Depends on strong hand-off processes to be defined and strong knowledge transfer from build to run functions in order to be successful.
      The image contains an example of a Centralized Operating Model: Plan-Build-Run.

      Centralized Operating Model #2: Demand-Develop-Service

      I want to…

      • Listen to the business to understand new initiatives or service enhancements being requested.
      • Enable development and operations to work together to seamlessly deliver in a DevOps culture.
      • Govern and confirm that initiatives being requested by the business are still aligned to IT’s overarching strategy and roadmap before prioritizing those initiatives.

      BENEFITS

      • Aligns well with an end-to-end services model; constant attention to customer demand and service supply.
      • Centralizes service operations under one functional area to serve shared needs across lines of business.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Elevates sourcing and vendor management as its own strategic function; lends well to managed service and digital initiatives.
      • Development and operations housed together; lends well to DevOps-related initiatives and reduces the silos between these two core groups.

      RISKS

      • IT prioritizes the initiatives it thinks are a priority to the business based on how well it establishes good stakeholder relations and communications.
      • Depends on good governance to prevent enhancements and demands from being prioritized without approval from those with accountability and authority.
      • This model thrives in a DevOps culture but does not mean it ensures your organization is a “DevOps” organization. Be sure you're encouraging the right behaviors and attitudes.

      The image contains an example of a Centralized Operating Model: Demand, Develop, Service.

      Hybrid Operating Model #1: LOB/Functional Aligned

      I want to…

      • Better understand the various needs of the organization to align IT priorities and ensure the right services can be delivered.
      • Keep all IT decisions centralized to ensure they align with the overarching strategy and roadmap that IT has set.
      • Organize your shared services in a strategic manner that enables delivery of those services in a way that fits the culture of the organization and the desired method of operating.

      BENEFITS

      • Best of both worlds of centralization and decentralization; attempts to channel benefits from both centralized and decentralized models.
      • Embeds key IT functions that require business knowledge within functional areas, allowing for critical feedback and the ability to understand those business needs.
      • Places IT in a position to not just be “order takers” but to be more involved with the different business units and promote the value of IT.
      • Achieves economies of scale where necessary through the delivery of shared services that can be requested by the function.
      • Shared services can be organized to deliver in the best way that suits the organization.

      RISKS

      • Different business units may bypass governance to get their specific needs met by functions – to alleviate this, IT must have strong governance and prioritize amongst demand.
      • Decentralized role can be viewed as an order taker by the business if not properly embedded and matured.
      • No guaranteed synergy and integration across functions; requires strong communication, collaboration, and steering.
      • Cannot meet every business unit’s needs – can cause tension from varying effectiveness of the IT functions.

      The image contains an example of a Hybrid Operating Model: LOB/Functional Aligned.

      Hybrid Model #2: Product-Aligned Operating Model

      I want to…

      • Align my IT organization into core products (services) that IT provides to the organization and establish a relationship with those in the organization that have alignment to that product.
      • Have roles dedicated to the lifecycle of their product and ensure the product can continuously deliver value to the organization.
      • Maintain centralized set of standards as it applies to overall IT strategy, security, and architecture to ensure consistency across products and reduce silos.

      BENEFITS

      • Focus is on the full lifecycle of a product – takes a strategic view of how technology enables the organization.
      • Promotes centralized backlog around a specific value creator, rather than a traditional project focus that is more transactional.
      • Dedicated teams around the product family ensure you have all of the resources required to deliver on your product roadmap.
      • Reduces barriers between IT and business stakeholders; focuses on technology as a key strategic enabler.
      • Delivery is largely done through frequent releases that can deliver value.

      RISKS

      • If there is little or no business involvement, it could prevent IT from truly understanding business demand and prioritizing the wrong work.
      • A lack of formal governance can create silos between the IT products, causing duplication of efforts, missed opportunities for collaboration, and redundancies in application or vendor contracts.
      • Members of each product can interpret the definition of standards (e.g. architecture, security) differently.

      The image contains an example of the Hybrid Operating Model: Product-Aligned Operating Model.

      Hybrid Operating Model #3: Service-Aligned Operating Model

      I want to…

      • Decentralize the IT organization by the various IT services it offers to the organization while remaining centralized with IT strategy, governance, security and operational services.
      • Ensure IT services are defined and people resources are aligned to deliver on those services.
      • Enable each of IT’s services to have the autonomy to understand the business needs and be able to manage the operational and new project initiatives with a dedicated service owner or business relationship manager.

      BENEFITS

      • Strong enabler of agility as each service has the autonomy to make decisions around operational work versus project work based on their understanding of the business demand.
      • Individuals in similar roles that are decentralized across services are given coaching to provide common direction.
      • Allows teams to efficiently scale with service demand.
      • This is a structurally baseline DevOps model. Each group will have services built within that have their own dedicated teams that will handle the full gambit of responsibilities, from new features to enhancements and maintenance.

      RISKS

      • Service owners require a method to collaborate to avoid duplication of efforts or projects that conflict with the efforts of other IT services.
      • May result in excessive cost through role redundancies across different services, as each will focus on components like integration, stakeholder management, project management, and user experiences.
      • Silos cause a high degree of specialization, making it more difficult for team members to imagine moving to another defined service group, limiting potential career advancement opportunities.
      • The level of complex knowledge required by shared services (e.g. help desk) is often beyond what they can provide, causing them to rely on and escalate to defined service groups more than with other operating models.

      The image contains an example of the Hybrid Operating Model: Service-Aligned Operating Model.

      Decentralized Model: Division Decentralization (LoB, Geography, Function, Product)

      I want to…

      • Decentralize the IT organization to enable greater autonomy within specific groups that have differing customer demands and levels of support.
      • Maintain a standard level of service that can be provided by IT for all divisions.
      • Ensure each division has access to critical data and reports that supports informed decision making.

      BENEFITS

      • Organization around functions allows for diversity in approach in how areas are run to best serve a specific business unit’s needs.
      • Each functional line exists largely independently, with full capacity and control to deliver service at the committed SLAs.
      • Highly responsive to shifting needs and demands with direct connection to customers and all stages of the solution development lifecycle.
      • Accelerates decision making by delegating authority lower into the function.
      • Promotes a flatter organization with less hierarchy and more direct communication with the CIO.

      RISKS

      • Requires risk and security to be centralized and have oversight of each division to prevent the decisions of one division from negatively impacting other divisions or the enterprise.
      • Less synergy and integration across what different lines of business are doing can result in redundancies and unnecessary complexity.
      • Higher overall cost to the IT group due to role and technology duplication across different divisions.
      • It will be difficult to centralize aspects of IT in the future, as divisions adopt to a culture of IT autonomy.

      The image contains an example of the Decentralized Model: Division Decentralization.

      Enterprise Model: Multi-Modal

      I want to…

      • Have an organizational structure that leverages several different operating models based on the needs and requirements of the different divisions.
      • Provide autonomy and authority to the different divisions so they can make informed and necessary changes as they see fit without seeking approval from a centralized IT group.
      • Support the different initiatives the enterprise is focused on delivering and ensure the right model is adopted based on those initiatives.

      BENEFITS

      • Allows for the organization to work in ways that best support individual areas; for example, areas that support legacy systems can be supported through traditional operating models while areas that support digital transformations may be supported through more flexible operating models.
      • Enables a specialization of knowledge related to each division.

      RISKS

      • Inconsistency across the organization can lead to confusion on how the organization should operate.
      • Parts of the organization that work in more traditional operating models may feel limited in career growth and innovation.
      • Cross-division initiatives may require greater oversight and a method to enable operations between the different focus areas.

      The image contains an example of the Enterprise Model: Multi-Modal.

      Create enabling teams that bridge your divisions

      The following bridges might be necessary to augment your divisions:

      • Specialized augmentation: There might not be a sufficient number of resources to support each division. These teams will be leveraged across the divisions; this means that the capabilities needed for each division will exist in this bridge team, rather than in the division.
      • Centers of Excellence: Capabilities that exist within divisions can benefit from shared knowledge across the enterprise. Your organization might set up centers of excellence to support best practices in capabilities organization wide. These are Forums in the unfix model, or communities of practice and support capability development rather than deliveries of each division.
      • Facilitation teams might be required to support divisions through coaching. This might include Agile or other coaches who can help teams adopt practices and embed learnings.
      • Holistic teams provide an enterprise view as they work with various divisions. This can include capabilities like user experience, which can benefit from the holistic perspective rather than a siloed one. People with these capabilities augment the divisions on an as-needed basis.
      The image contains a diagram to demonstrate the use of bridges on divisions.

      2.5 Customize the selected sketch to reflect the desired future state

      1-3 hours

      1. Using the baseline operating model sketch, walk through each of the IT capabilities. Based on the outputs from activity 2.1:
        1. Remove any capabilities for which your IT organization is not responsible and/or accountable.
        2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
        3. Add any core capabilities from your organization that are missing from the provided IT capability list.
      2. Move capabilities to the right places in the operating model to reflect how each of the core IT processes should interact with one another.
      3. Add bridges as needed to support the divisions in your organization. Identify which capabilities will sit in these bridges and define how they will enable the operating model sketch to deliver.
      InputOutput
      • Selected base operating model sketch
      • Customized list of IT capabilities
      • Understanding of outsourcing and gaps
      • Customized operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts
      • Operating model sketch examples
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Document the final operating model sketch in the Communications Deck

      Phase 3

      Formalize the Organizational Structure

      This phase will walk you through the following activities:

      3.1 Create work units

      3.2 Create work unit mandates

      3.3 Define roles inside the work units

      3.4 Finalize the organizational chart

      3.5 Identify and mitigate key risks

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Enable adoption of the new structure.

      You don’t have to make the change in one big bang. You can adopt alternative transition plans such as increments or pilots. This allows people to see the benefits of why you are undergoing the change, allows the change message to be repeated and applied to the individuals impacted, and provides people with time to understand their role in making the new organizational structure successful.

      “Transformational change can be invigorating for some employees but also highly disruptive and stressful for others.”

      Source: OpenStax, 2019

      Info-Tech Insight

      Without considering the individual impact of the new organizational structure on each of your employees, the change will undoubtedly fail in meeting its intended goals and your organization will likely fall back into old structured habits.

      Use a top-down approach to build your target-state IT organizational sketch

      The organizational sketch is the outline of the organization that encompasses the work units and depicts the relationships among them. It’s important that you create the structure that’s right for your organization, not one that simply fits with your current staff’s skills and knowledge. This is why Info-Tech encourages you to use your operating model as a mode of guidance for structuring your future-state organizational sketch.

      The organizational sketch is made up of unique work units. Work units are the foundational building blocks on which you will define the work that IT needs to get done. The number of work units you require and their names will not match your operating model one to one. Certain functional areas will need to be broken down into smaller work units to ensure appropriate leadership and span of control.

      Use your customized operating model to build your work units

      WHAT ARE WORK UNITS?

      A work unit is a functional group or division that has a discrete set of processes or capabilities that it is responsible for, which don’t overlap with any others. Your customized list of IT capabilities will form the building blocks of your work units. Step one in the process of building your structure is grouping IT capabilities together that are similar or that need to be done in concert in the case of more complex work products. The second step is to iterate on these work units based on the organizational design principles from Phase 1 to ensure that the future-state structure is aligned with enablement of the organization’s objectives.

      Work Unit Examples

      Here is a list of example work units you can use to brainstorm what your organization’s could look like. Some of these overlap in functionality but should provide a strong starting point and hint at some potential alternatives to your current way of organizing.

      • Office of the CIO
      • Strategy and Architecture
      • Architecture and Design
      • Business Relationship Management
      • Projection and Portfolio Management
      • Solution Development
      • Solution Delivery
      • DevOps
      • Infrastructure and Operations
      • Enterprise Information Security
      • Security, Risk & Compliance
      • Data and Analytics

      Example of work units

      The image contains an example of work units.

      3.1 Create functional work units

      1-3 hours

      1. Using a whiteboard or large tabletop, list each capability from your operating model on a sticky note and recreate your operating model. Use one color for centralized activities and a second color for decentralized activities.
      2. With the group of key IT stakeholders, review the operating model and any important definitions and rationale for decisions made.
      3. Starting with your centralized capabilities, review each in turn and begin to form logical groups of compatible capabilities. Review the decentralized capabilities and repeat the process, writing additional sticky notes for capabilities that will be repeated in decentralized units.
      4. Note: Not all capabilities need to be grouped. If you believe that a capability has a high enough priority, has a lot of work, or is significantly divergent from others put this capability by itself.
      5. Define a working title for each new work unit, and discuss the pros and cons of the model. Ensure the work units still align with the operating model and make any changes to the operating model needed.
      6. Review your design principles and ensure that they are aligned with your new work units.
      InputOutput
      • Organizational business objectives
      • Customized operating model
      • Defined work units
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Group formation

      Understand the impact of the functional groups you create.

      A group consists of two or more individuals who are working toward a common goal. Group formation is how those individuals are organized to deliver on that common goal. It should take into consideration the levels of hierarchy in your structure, the level of focus you give to processes, and where power is dispersed within your organizational design.

      Importance: Balance highly important capabilities with lower priority capabilities

      Specialization: The scope of each role will be influenced by specialized knowledge and a dedicated leader

      Effectiveness: Group capabilities that increase their efficacy

      Span of Control: Identify the right number of employees reporting to a single leader

      Choose the degree of specialization required

      Be mindful of the number of hats you’re placing on any one role.

      • Specialization exists when individuals in an organization are dedicated to performing specific tasks associated with a common goal and requiring a particular skill set. Aligning the competencies required to carry out the specific tasks based on the degree of complexity associated with those tasks ensures the right people and number of people can be assigned.
      • When people are organized by their specialties, it reduces the likelihood of task switching, reduces the time spent training or cross-training, and increases the focus employees can provide to their dedicated area of specialty.
      • There are disadvantages associated with aligning teams by their specialization, such as becoming bored and seeing the tasks they are performing as monotonous. Specialization doesn’t come without its problems. Monitor employee motivation

      Info-Tech Insight

      Smaller organizations will require less specialization simply out of necessity. To function and deliver on critical processes, some people might be asked to wear several hats.

      Avoid overloading the cognitive capacity of employees

      Cognitive load refers to the number of responsibilities that one can successfully take on.

      • When employees are assigned an appropriate number of responsibilities this leads to:
        • Engaged employees
        • Less task switching
        • Increased effectiveness on assigned responsibilities
        • Reduced bottlenecks
      • While this cognitive load can differ from employee to employee, when assigning role responsibilities, ensure each role isn’t being overburdened and spreading their focus thin.
      • Moreover, capable does not equal successful. Just because someone has the capability to take on more responsibilities doesn’t mean they will be successful.
      • Leverage the cognitive load being placed on your team to help create boundaries between teams and demonstrate clear role expectations.
      Source: IT Revolution, 2021

      Info-Tech Insight

      When you say you are looking for a team that is a “jack of all trades,” you are likely exceeding appropriate cognitive loads for your staff and losing productivity to task switching.

      Factors to consider for span of control

      Too many and too few direct reports have negative impacts on the organization.

      Complexity: More complex work should have fewer direct reports. This often means the leader will need to provide lots of support, even engaging in the work directly at times.

      Demand: Dynamic shifts in demand require more managerial involvement and therefore should have a smaller span of control. Especially if this demand is to support a 24/7 operation.

      Competency Level: Skilled employees should require less hands-on assistance and will be in a better position to support the business as a member of a larger team than those who are new to the role.

      Purpose: Strategic leaders are less involved in the day-to-day operations of their teams, while operational leaders tend to provide hands-on support, specifically when short-staffed.

      Group formation will influence communication structure

      Pick your poison…

      It’s important to understand the impacts that team design has on your services and products. The solutions that a team is capable of producing is highly dependent on how teams are structured. For example, Conway’s Law tells us that small distributed software delivery teams are more likely to produce modular service architecture, where large collocated teams are better able to create monolithic architecture. This doesn’t just apply to software delivery but also other products and services that IT creates. Note that small distributed teams are not the only way to produce quality products as they can create their own silos.

      Sources: Forbes, 2017

      Create mandates for each of your identified work units

      WHAT ARE WORK UNIT MANDATES?

      The work unit mandate should provide a quick overview of the work unit and be clear enough that any reader can understand why the work unit exists, what it does, and what it is accountable for.

      Each work unit will have a unique mandate. Each mandate should be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option. The mandate will vary by organization based on the agreed upon work units, design archetype, and priorities.

      Don’t just adopt an example mandate from another organization or continue use of the organization’s pre-existing mandate – take the time to ensure it accurately depicts what that group is doing so that its value-added activities are clear to the larger organization.

      Examples of Work Unit Mandates

      The Office of the CIO will be a strategic enabler of the IT organization, driving IT organizational performance through improved IT management and governance. A central priority of the Office of the CIO is to ensure that IT is able to respond to evolving environments and challenges through strategic foresight and a centralized view of what is best for the organization.

      The Project Management Office will provide standardized and effective project management practices across the IT landscape, including an identified project management methodology, tools and resources, project prioritization, and all steps from project initiation through to evaluation, as well as education and development for project managers across IT.

      The Solutions Development Group will be responsible for the high-quality development and delivery of new solutions and improvements and the production of customized business reports. Through this function, IT will have improved agility to respond to new initiatives and will be able to deliver high-quality services and insights in a consistent manner.

      3.2 Create work unit mandates

      1-3 hours

      1. Break into teams of three to four people and assign an equal number of work units to each team.
      2. Have each team create a set of statements that describe the overall purpose of that working group. Each mandate statement should:
      • Be clear enough that any reader can understand.
      • Explain why the work unit exists, what it does, and what it is accountable for.
      • Be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option.
    • Have each group present their work unit mandates and make changes wherever necessary.
    • InputOutput
      • Work units
      • Work unit mandates
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Identify the key roles and responsibilities for the target IT organization

      Now that you have identified the main units of work in the target IT organization, it is time to identify the roles that will perform that work. At the end of this step, the key roles will be identified, the purpose statement will be built, and accountability and responsibility for roles will be clearly defined. Make sure that accountability for each task is assigned to one role only. If there are challenges with a role, change the role to address them (e.g. split roles or shift responsibilities).

      The image contains an example of two work units: Enterprise Architecture and PMO. It then lists the roles of the two work units.

      Info-Tech Insight

      Do not bias your role design by focusing on your existing staff’s competencies. If you begin to focus on your existing team members, you run the risk of artificially narrowing the scope of work or skewing the responsibilities of individuals based on the way it is, rather than the way it should be.

      3.3 Define roles inside the work units

      1-3 hours

      1. Select a work unit from the organizational sketch.
      2. Describe the most senior role in that work unit by asking, “what would the leader of this group be accountable or responsible for?” Define this role and move the capabilities they will be accountable for under that leader. Repeat this activity for the capabilities this leader would be responsible for.
      3. Continue to define each role that will be required in that work unit to deliver or provide oversight related to those capabilities.
      4. Continue until key roles are identified and the capabilities each role will be accountable or responsible for are clarified.
      5. Remember, only one role can have accountability for each capability but several can have responsibility.
      6. For each role, use the list of capabilities that the position will be accountable, responsible, or accountable and responsible for to create a job description. Leverage your own internal job descriptions or visit our Job Descriptions page.
      InputOutput
      • Work units
      • Work unit mandates
      • Responsibilities
      • Accountabilities
      • Roles with clarified responsibilities and accountabilities
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Delivery model for product or solution development

      Can add additional complexity or clarity

      • Certain organizational structures will require a specific type of resourcing model to meet expectations and deliver on the development or sustainment of core products and solutions.
      • There are four common methods that we see in IT organizations:
        • Functional Roles: Completed work is handed off from functional team to functional team sequentially as outlined in the organization’s SDLC.
        • Shared Service & Resource Pools (Matrix): Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.
        • Product or System: Work is directly sent to the teams who are directly managing the product or directly supporting the requestor.
        • Skills & Competencies: Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.
      • Each of these will lead to a difference in how the functional team is skilled. They could have a great understanding of their customer, the product, the solution, or their service.

      Info-Tech Insight

      Despite popular belief, there is no such thing as the Spotify model, and organizations that structured themselves based on the original Spotify drawing might be missing out on key opportunities to obtain productivity from employees.

      Sources: Indeed, 2020; Agility Scales

      There can be different patterns to structure and resource your product delivery teams

      The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.

      Delivery Team Structure Patterns

      How Are Resources and Work Allocated?

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC.

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Work is directly sent to the teams who are directly managing the product or directly supporting the requester.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, Finance).

      Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.

      Delivery teams will be structured according to resource and development needs

      Functional Roles

      Shared Service and Resource Pools

      Product or System

      Skills and Competencies

      When your people are specialists versus having cross-functional skills

      Leveraged when specialists such as Security or Operations will not have full-time work on the product

      When you have people with cross-functional skills who can self-organize around a product’s needs

      When you have a significant investment in a specific technology stack

      The image contains a diagram of functional roles.The image contains a diagram of shared service and resource pools.The image contains a diagram of product or system.The image contains a diagram of skills and competencies.

      For more information about delivering in a product operating model, refer to our Deliver Digital Products at Scale blueprint.

      3.4 Finalize the organizational chart

      1-3 hours

      1. Import each of your work units and the target-state roles that were identified for each.
      2. In the place of the name of each work unit in your organizational sketch, replace the work unit name with the prospective role name for the leader of that group.
      3. Under each of the leadership roles, import the names of team members that were part of each respective work unit.
      4. Validate the final structure as a group to ensure each of the work units includes all the necessary roles and responsibilities and that there is clear delineation of accountabilities between the work units.

      Input

      Output

      • Work units
      • Work unit mandates
      • Roles with accountabilities and responsibilities
      • Finalized organizational chart

      Materials

      Participants

      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook & Executive Communications Deck

      Proactively consider and mitigate redesign risks

      Every organizational structure will include certain risks that should have been considered and accepted when choosing the base operating model sketch. Now that the final organizational structure has been created, consider if those risks were mitigated by the final organizational structure that was created. For those risks that weren’t mitigated, have a tactic to control risks that remain present.

      3.5 Identify and mitigate key risks

      1-3 hours

      1. For each of the operating model sketch options, there are specific risks that should have been considered when selecting that model.
      2. Take those risks and transfer them into the correct slide of the Organizational Design Workbook.
      3. Consider if there are additional risks that need to be considered with the new organizational structure based on the customizations made.
      4. For each risk, rank the severity of that risk on a scale of low, medium, or high.
      5. Determine one or more mitigation tactic(s) for each of the risks identified. This tactic should reduce the likelihood or impact of the risk event happening.
      InputOutput
      • Final organizational structure
      • Operating model sketch benefits and risks
      • Redesign risk mitigation plan
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Phase 4

      Plan for Implementation & Change

      This phase will walk you through the following activities:

      4.1 Select a transition plan

      4.2 Establish the change communication messages

      4.3 Be consistent with a standard set of FAQs

      4.4 Define org. redesign resistors

      4.5 Create a sustainment plan

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership
      • HR Business Partners

      All changes require change management

      Change management is:

      Managing a change that requires replanning and reorganizing and that causes people to feel like they have lost control over aspects of their jobs.

      – Padar et al., 2017
      People Process Technology

      Embedding change management into organizational design

      PREPARE A

      Awareness: Establish the need for organizational redesign and ensure this is communicated well.

      This blueprint is mostly focused on the prepare and transition components.

      D

      Desire: Ensure the new structure is something people are seeking and will lead to individual benefits for all.

      TRANSITION K

      Knowledge: Provide stakeholders with the tools and resources to function in their new roles and reporting structure.

      A

      Ability: Support employees through the implementation and into new roles or teams.

      FUTURE R

      Reinforcement: Emphasize and reward positive behaviors and attitudes related to the new organizational structure.

      Implementing the new organizational structure

      Implementing the organizational structure can be the most difficult part of the process.

      • To succeed in the process, consider creating an implementation plan that adequately considers these five components.
      • Each of these are critical to supporting the final organizational structure that was established during the redesign process.

      Implementation Plan

      Transition Plan: Identify the appropriate approach to making the transition, and ensure the transition plan works within the context of the business.

      Communication Strategy: Create a method to ensure consistent, clear, and concise information can be provided to all relevant stakeholders.

      Plan to Address Resistance: Given that not everyone will be happy to move forward with the new organizational changes, ensure you have a method to hear feedback and demonstrate concerns have been heard.

      Employee Development Plan: Provide employees with tools, resources, and the ability to demonstrate these new competencies as they adjust to their new roles.

      Monitor and Sustain the Change: Establish metrics that inform if the implementation of the new organizational structure was successful and reinforce positive behaviors.

      Define the type of change the organizational structure will be

      As a result, your organization must adopt OCM practices to better support the acceptance and longevity of the changes being pursued.

      Incremental Change

      Transformational Change

      Organizational change management is highly recommended and beneficial for projects that require people to:

      • Adopt new tools and workflows.
      • Learn new skills.
      • Comply with new policies and procedures.
      • Stop using old tools and workflows.

      Organizational change management is required for projects that require people to:

      • Move into different roles, reporting structures, and career paths.
      • Embrace new responsibilities, goals, reward systems, and values.
      • Grow out of old habits, ideas, and behaviors.
      • Lose stature in the organization.

      Info-Tech Insight

      How you transition to the new organizational structure can be heavily influenced by HR. This is the time to be including them and leveraging their expertise to support the transition “how.”

      Transition Plan Options

      Description

      Pros

      Cons

      Example

      Big Bang Change

      Change that needs to happen immediately – “ripping the bandage off.”

      • It puts an immediate stop to the current way of operating.
      • Occurs quickly.
      • More risky.
      • People may not buy into the change immediately.
      • May not receive the training needed to adjust to the change.

      A tsunami in Japan stopped all imports and exports. Auto manufacturers were unable to get parts shipped and had to immediately find an alternative supplier.

      Incremental Change

      The change can be rolled out slower, in phases.

      • Can ensure that people are bought in along the way through the change process, allowing time to adjust and align with the change.
      • There is time to ensure training takes place.
      • It can be a timely process.
      • If the change is dragged on for too long (over several years) the environment may change and the rationale and desired outcome for the change may no longer be relevant.

      A change in technology, such as HRIS, might be rolled out one application at a time to ensure that people have time to learn and adjust to the new system.

      Pilot Change

      The change is rolled out for only a select group, to test and determine if it is suitable to roll out to all impacted stakeholders.

      • Able to test the success of the change initiative and the implementation process.
      • Able to make corrections before rolling it out wider, to aid a smooth change.
      • Use the pilot group as an example of successful change.
      • Able to gain buy-in and create change champions from the pilot group who have experienced it and see the benefits.
      • Able to prevent an inappropriate change from impacting the entire organization.
      • Lengthy process.
      • Takes time to ensure the change has been fully worked through.

      A retail store is implementing a new incentive plan to increase product sales. They will pilot the new incentive plan at select stores, before rolling it out broadly.

      4.1 Select a transition plan approach

      1-3 hours

      1. List each of the changes required to move from your current structure to the new structure. Consider:
        1. Changes in reporting structure
        2. Hiring new members
        3. Eliminating positions
        4. Developing key competencies for staff
      2. Once you’ve defined all the changes required, consider the three different transition plan approaches: big bang, incremental, and pilot. Each of the transition plan approaches will have drawbacks and benefits. Use the list of changes to inform the best approach.
      3. If you are proceeding with the incremental or the pilot, determine the order in which you will proceed with the changes or the groups that will pilot the new structure first.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes to move from current to future state
      • Transition plan to support changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • HR Business Partners

      Record the results in the Organizational Design Workbook

      Make a plan to effectively manage and communicate the change

      Success of your new organizational structure hinges on adequate preparation and effective communication.

      The top challenge facing organizations in completing the organizational redesign is their organizational culture and acceptance of change. Effective planning for the implementation and communication throughout the change is pivotal. Make sure you understand how the change will impact staff and create tailored plans for communication.

      65% of managers believe the organizational change is effective when provided with frequent and clear communication.

      Source: SHRM, 2021

      Communicate reasons for organizational structure changes and how they will be implemented

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Five elements of communicating change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • How long will it take us to do it?
      • What will the role be for each department and individual?
      Source: Cornelius & Associates, 2010

      4.2 Establish the change communication messages

      2 hours

      1. The purpose of this activity is to establish a change communication message you can leverage when talking to stakeholders about the new organizational structure.
      2. Review the questions in the Organizational Design Workbook.
      3. Establish a clear message around the expected changes that will have to take place to help realize the new organizational structure.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes
      • Transition plan
      • Change communication message for new organizational structure
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Apply the following communication principles to make your IT organization redesign changes relevant to stakeholders

      Be Clear

      • Say what you mean and mean what you say.
      • Choice of language is important: “Do you think this is a good idea? I think we could really benefit from your insights and experience here.” Or do you mean: “I think we should do this. I need you to do this to make it happen.”
      • Don’t use jargon.

      Be Consistent

      • The core message must be consistent regardless of audience, channel, or medium.
      • Test your communication with your team or colleagues to obtain feedback before delivering to a broader audience.
      • A lack of consistency can be interpreted as an attempt at deception. This can hurt credibility and trust.

      Be Concise

      • Keep communication short and to the point so key messages are not lost in the noise.
      • There is a risk of diluting your key message if you include too many other details.

      Be Relevant

      • Talk about what matters to the stakeholder.
      • Talk about what matters to the initiative.
      • Tailor the details of the message to each stakeholder’s specific concerns.
      • IT thinks in processes but stakeholders only care about results: talk in terms of results.
      • IT wants to be understood but this does not matter to stakeholders. Think: “what’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.

      Frequently asked questions (FAQs) provide a chance to anticipate concerns and address them

      As a starting point for building an IT organizational design implementation, look at implementing an FAQ that will address the following:

      • The what, who, when, why, and where
      • The transition process
      • What discussions should be held with clients in business units
      • HR-centric questions

      Questions to consider answering:

      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?

      4.3 Be consistent with a standard set of FAQs

      1 hour

      1. Beyond the completed communications plans, brainstorm a list of answers to the key “whats” of your organizational design initiative:
      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
    • Think about any key questions that may rise around the transition:
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?
    • Determine the best means of socializing this information. If you have an internal wiki or knowledge-sharing platform, this would be a useful place to host the information.
    • InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • FAQs to provide to staff about the organizational design changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      The change reaction model

      The image contains a picture of the change reaction model. The model includes a double arrow pointing in both directions of left and right. On top of the arrow are 4 circles spread out on the arrow. They are labelled: Active Resistance, Detachment, Questioning, Acceptance.

      (Adapted from Cynthia Wittig)

      Info-Tech Insight

      People resist changes for many reasons. When it comes to organizational redesign changes, some of the most common reasons people resist change include a lack of understanding, a lack of involvement in the process, and fear.

      Include employees in the employee development planning process

      Prioritize

      Assess employee to determine competency levels and interests.

      Draft

      Employee drafts development goals; manager reviews.

      Select

      Manager helps with selection of development activities.

      Check In

      Manager provides ongoing check-ins, coaching, and feedback.

      Consider core and supplementary components that will sustain the new organizational structure

      Supplementary sustainment components:

      • Tools & Resources
      • Structure
      • Skills
      • Work Environment
      • Tasks
      • Disincentives

      Core sustainment components:

      • Empowerment
      • Measurement
      • Leadership
      • Communication
      • Incentives

      Sustainment Plan

      Sustain the change by following through with stakeholders, gathering feedback, and ensuring that the change rationale and impacts are clearly understood. Failure to so increases the potential that the change initiative will fail or be a painful experience and cost the organization in terms of loss of productivity or increase in turnover rates.

      Support sustainment with clear measurements

      • Measurement is one of the most important components of monitoring and sustaining the new organizational structure as it provides insight into where the change is succeeding and where further support should be added.
      • There should be two different types of measurements:
      1. Standard Change Management Metrics
      2. Organizational Redesign Metrics
    • When gathering data around metrics, consider other forms of measurement (qualitative) that can provide insights on opportunities to enhance the success of the organizational redesign change.
      1. Every measurement should be rooted to a goal. Many of the goals related to organizational design will be founded in the driver of this change initiative
      2. Once the goals have been defined, create one or more measurements that determines if the goal was successful.
      3. Use specific key performance indicators (KPIs) that contain a metric that is being measured and the frequency of that measurement.

      Info-Tech Insight

      Obtaining qualitative feedback from employees, customers, and business partners can provide insight into where the new organizational structure is operating optimally versus where there are further adjustments that could be made to support the change.

      4.4 Consider sustainment metrics

      1 hour

      1. Establish metrics that bring the entire process together and that will ensure the new organizational design is a success.
      2. Go back to your driver(s) for the organizational redesign. Use these drivers to help inform a particular measurement that can be used to determine if the new organizational design will be successful. Each measurement should be related to the positive benefits of the organization, an individual, or the change itself.
      3. Once you have a list of measurements, use these to determine the specific KPI that can be qualified through a metric. Often you are looking for an increase or decrease of a particular measurement by a dollar or percentage within a set time frame.
      4. Use the example metrics in the workbook and update them to reflect your organization’s drivers.
      InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • Sustainment metrics
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Related Info-Tech Research

      Build a Strategic IT Workforce Plan

      • Continue into the second phase of the organizational redesign process by defining the required workforce to deliver.
      • Leveraging trends, data, and feedback from your employees, define the competencies needed to deliver on the defined roles.

      Implement a New IT Organizational Structure

      • Organizational design implementations can be highly disruptive for IT staff and business partners.
      • Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.

      Define the Role of Project Management in Agile and Product-Centric Delivery

      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.

      Research Contributors and Experts

      The image contains a picture of Jardena London.

      Jardena London

      Transformation Catalyst, Rosetta Technology Group

      The image contains a picture of Jodie Goulden.

      Jodie Goulden

      Consultant | Founder, OrgDesign Works

      The image contains a picture of Shan Pretheshan.

      Shan Pretheshan

      Director, SUPA-IT Consulting

      The image contains a picture of Chris Briley.

      Chris Briley

      CIO, Manning & Napier

      The image contains a picture of Dean Meyer.

      Dean Meyer

      President N. Dean Meyer and Associates Inc.

      The image contains a picture of Jimmy Williams.

      Jimmy Williams

      CIO, Chocktaw Nation of Oklahoma

      Info-Tech Research Group

      Cole Cioran, Managing Partner

      Dana Daher, Research Director

      Hans Eckman, Principal Research Director

      Ugbad Farah, Research Director

      Ari Glaizel, Practice Lead

      Valence Howden, Principal Research Director

      Youssef Kamar, Senior Manager, Consulting

      Carlene McCubbin, Practice Lead

      Baird Miller, Executive Counsellor

      Josh Mori, Research Director

      Rajesh Parab, Research Director

      Gary Rietz, Executive Counsellor

      Bibliography

      “A Cheat Sheet for HR Professionals: The Organizational Development Process.” AIHR, 2021. Web.

      Acharya, Ashwin, Roni Lieber, Lissa Seem, and Tom Welchman. “How to identify the right ‘spans of control’ for your organization.” McKinsey, 21 December 2017. Web.

      Anand. N., and Jean-Louis Barsoux. “What everyone gets wrong about change management. Harvard Business Review, December 2017. Web.

      Atiken, Chris. “Operating model design-first principles.” From Here On, 24 August 2018. Web.

      “Avoid common digital transformation challenges: Address your IT Operating Model Now.” Sofigate, 5 May 2020. Web.

      Baumann, Oliver, and Brian Wu. “The many dimensions of research on designing flat firms.” Journal of Organizational Design, no. 3, vol. 4. 09 May 2022.Web.

      Bertha, Michael. “Cross the project to product chasm.” CIO, 1 May 2020. Web.

      Blenko, Marcia, and James Root. “Design Principles for a Robust Operating Model.” Bain & Company, 8 April 2015. Web.

      Blenko, Marcia, Leslie Mackrell, and Kevin Rosenberg. “Operating models: How non-profits get from strategy to results.” The Bridge Span Group, 15 August 2019. Web.

      Boulton, Clint. “PVH finds perfect fit in hybrid IT operating model amid pandemic.” CIO, 19 July 2021. Web.

      Boulton, Clint. “Why digital disruption leaves no room for bimodal IT.” CIO, 11 May 2017. Web.

      Bright, David, et al. “Chapter 10: Organizational Structure & Change.” Principles of Management, OpenStax, Rice University, 20 March 2019. Book.

      Campbell, Andrew. “Design Principles: How to manage them.” Ashridge Operating Models. 1 January 2022. Web.

      D., Maria. “3 Types of IT Outsourcing Models and How to Choose Between Them.” Cleveroad, 29 April 2022. Web.

      Devaney, Eric. “9 Types of Organizational Structure Every Company Should Consider.” HubSpot, 11 February 2022. Web.

      Devaney, Erik. “The six building blocks of organizational structure.” Hubspot, 3 June 2020. Web.

      Eisenman, M., S. Paruchuri, and P. Puranam. “The design of emergence in organizations.” Journal of Organization Design, vol. 9, 2020. Web.

      Forbes Business Development Council. “15 Clear Signs It’s Time to Restructure the Business.” Forbes, 10 February 2020. Web.

      Freed, Joseph. “Why Cognitive Load Could Be The Most Important Employee Experience Metric In The Next 10 Years.” Forbes, 30 June 2020. Web.

      Galibraith, Jay. “The Star Model.” JayGalbraith.com, n.d. Web.

      Girod, Stéphane, and Samina Karim. “Restructure or reconfigure?” Harvard Business Review, April 2017. Web.

      Goldman, Sharon. “The need for a new IT Operating Model: Why now?” CIO, 27 August 2019. Web.

      Halapeth, Milind. “New age IT Operating Model: Creating harmony between the old and the new.” Wirpo, n.d. Web.

      Harvey, Michelle. “Why a common operating model is efficient for business productivity.” CMC, 10 May 2020. Web.

      Helfand, Heidi. “Dynamic Reteaming.” O’Reilly Media, 7 July 2020. Book.

      JHeller, Martha. “How Microsoft CIO Jim DuBois changed the IT Operating Model.” CIO, 2 February 2016. Web.

      Heller, Martha. “How Stryker IT Shifted to a global operating model.” CIO, 19 May 2021. Web.

      Heller, Michelle. “Inside blue Shields of California’s IT operating model overhaul.” CIO, 24 February 2021. Web.

      Hessing, Ted. “Value Stream Mapping.” Six Sigma Study Guide, 11 April 2014. Web.

      Huber, George, P. “What is Organization Design.” Organizational Design Community, n.d. Web.

      Indeed Editorial Team. “5 Advantages and Disadvantages of the Matrix Organizational Structure.” Indeed, 23 November 2020. Web.

      Indeed Editorial Team. “How to plan an effective organization restructure.” Indeed, 10 June 2021. Web.

      “Insourcing vs Outsourcing vs Co-Sourcing.” YML Group, n.d. Web.

      “Investing in more strategic roles.” CAPS Research, 3 February 2022. Web.

      Jain, Gagan. “Product IT Operating Model: The next-gen model for a digital work.” DevOps, 22 July 2019. Web.

      Kane, Gerald, D. Plamer, and Anh Phillips. “Accelerating Digital Innovation Inside and Out.” Deloitte Insights, 4 June 2019. Web.

      Krush, Alesia. “IT companies with ‘flat’ structures: utopia or innovative approach?” Object Style, 18 October 2018. Web.

      Law, Michael. “Adaptive Design: Increasing Customer Value in Your Organisation.” Business Agility Institute, 5 October 2020. Web.

      LucidContent Team. “How to get buy-in for changes to your organizational structure.” Lucid Chart, n.d. Web.

      Matthews, Paul. “Do you know the difference between competence and capability?” The People Development Magazine, 25 September 2020. Web.

      Meyer, Dean N. “Analysis: Common symptoms of organizational structure problems.” NDMA, n.d. Web.

      Meyer, N. Dean. “Principle-based Organizational Structure.” NDMA Publishing, 2020. Web.

      Morales Pedraza, Jorge. Answer to posting, “What is the relationship between structure and strategy?” ResearchGate.net, 5 March 2014. Web.

      Nanjad, Len. “Five non-negotiables for effective organization design change.” MNP, 01 October 2021. Web.

      Neilson, Gary, Jaime Estupiñán, and Bhushan Sethi. “10 Principles of Organizational Design.” Strategy & Business, 23 March 2015. Web.

      Nicastro, Dom. “Understanding the Foundational Concepts of Organizational Design.” Reworked, 24 September 2020. Web.

      Obwegeser, Nikolaus, Tomoko Yokoi, Michael Wade, and Tom Voskes. “7 Key Principles to Govern Digital Initiatives.” MIT Sloan, 1 April 2020. Web.

      “Operating Models and Tools.” Business Technology Standard, 23 February 2021. Web.

      “Organizational Design Agility: Journey to a combined community.” ODF-BAI How Space, Organizational Design Forum, 2022. Web.

      “Organizational Design: Understanding and getting started.” Ingentis, 20 January 2021. Web.

      Padar, Katalin, et al. “Bringing project and change management roles into sync.” Journal of Change Management, 2017. Web.

      Partridge, Chris. “Evolve your Operating Model- It will drive everything.” CIO, 30 July 2021. Web.

      Pijnacker, Lieke. “HR Analytics: role clarity impacts performance.” Effectory, 25 September 2019. Web.

      Pressgrove, Jed. “Centralized vs. Federated: Breaking down IT Structures.” Government Technology, March 2020. Web.

      Sherman, Fraser. “Differences between Organizational Structure and Design.” Bizfluent, 20 September 2019. Web.

      Skelton, Matthew, and Manual Pais. “Team Cognitive Load.” IT Revolution, 19 January 2021. Web.

      Skelton, Matthew, and Manual Pais. Team Topologies. IT Revolution Press, 19 September 2019. Book

      Spencer, Janet, and Michael Watkins. “Why organizational change fails.” TLNT, 26 November 2019. Web.

      Storbakken, Mandy. “The Cloud Operating Model.” VMware, 27 January 2020. Web.

      "The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.

      “Understanding Organizational Structures.” SHRM, 31 August 2021. Web.

      "unfix Pattern: Base.” AgilityScales, n.d. Web.

      Walker, Alex. “Half-Life: Alyx helped change Valve’s Approach to Development.” Kotaku, 10 July 2020. Web.

      "Why Change Management.” Prosci, n.d. Web.

      Wittig, Cynthia. “Employees' Reactions to Organizational Change.” OD Practioner, vol. 44, no. 2, 2012. Web.

      Woods, Dan. “How Platforms are neutralizing Conway’s Law.” Forbes, 15 August 2017. Web.

      Worren, Nicolay, Jeroen van Bree, and William Zybach. “Organization Design Challenges. Results from a practitioner survey.” Journal of Organizational Design, vol. 8, 25 July 2019. Web.

      Appendix

      IT Culture Framework

      This framework leverages McLean & Company’s adaptation of Quinn and Rohrbaugh’s Competing Values Approach.

      The image contains a diagram of the IT Culture Framework. The framework is divided into four sections: Competitive, Innovative, Traditional, and Cooperative, each with their own list of descriptors.

      Create a Transparent and Defensible IT Budget

      • Buy Link or Shortcode: {j2store}291|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $29,682 Average $ Saved
      • member rating average days saved: 12 Average Days Saved
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • IT struggles to gain budget approval year after year, largely driven by a few key factors:
        • For a long time, IT has been viewed as a cost center whose efficiency needs to be increasingly optimized over time. IT’s relationship to strategy is not yet understood or established in many organizations.
        • IT is one of the biggest areas of cost for many organizations. Often, executives don’t understand or even believe that all that IT spending is necessary to advance the organization’s objectives, let alone keep it up and running.

      Our Advice

      Critical Insight

      Internal and external obstacles beyond IT’s control make these challenges with gaining IT budget approval even harder to overcome:

      • Economic pressures can quickly drive IT’s budgetary focus from strategic back to tactical.
      • Corporate-driven categorizations of expenditure, plus disconnected approval mechanisms for capital vs. operational spend, hide key interdependencies and other aspects of IT’s financial reality.
      • Connecting the dots between IT activities and business benefits rarely forms a straight line.

      Impact and Result

      • CIOs need a straightforward way to create and present an approval-ready budget.
        • Info-Tech recognizes that connecting the dots to demonstrate value is key to budgetary approval.
        • Info-Tech also recognizes that key stakeholders require different perspectives on the IT budget.
        • This blueprint provides a framework, method, and templated exemplars for creating and presenting an IT budget to stakeholders that will speed up the approval process and ensure more of it is approved.

      Create a Transparent and Defensible IT Budget Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create a Transparent and Defensible IT Budget Storyboard – A step-by-step guide to developing a proposed IT budget that’s sensitive to stakeholder perspectives and ready to approve.

      This deck applies Info-Tech’s proven ITFM Cost Model to the IT budgeting process and offers five phases that cover the purpose of your IT budget and what it means to your stakeholders, key budgeting resources, forecasting, selecting and fine-tuning your budget message, and delivering your IT budget executive presentation for approval.

      • Create a Transparent and Defensible IT Budget Storyboard

      2. IT Cost Forecasting and Budgeting Workbook – A structured Excel tool that allows you to forecast your IT budget for next fiscal year across four key stakeholder views, analyze it in the context of past expenditure, and generate high-impact visualizations.

      This Excel workbook offers a step-by-step approach for mapping your historical and forecasted IT expenditure and creating visualizations you can use to populate your IT budget executive presentation.

      • IT Cost Forecasting and Budgeting Workbook

      3. Sample: IT Cost Forecasting and Budgeting Workbook – A completed IT Cost Forecasting & Budgeting Workbook to review and use as an example.

      This sample workbook offers a completed example of the “IT Cost Forecasting and Budgeting Workbook” that accompanies the Create a Transparent & Defensible IT Budget blueprint.

      • Sample: IT Cost Forecasting and Budgeting Workbook

      4. IT Budget Executive Presentation – A PowerPoint template and full example for pulling together your proposed IT budget presentation.

      This presentation template offers a recommended structure for presenting your proposed IT budget for next fiscal year to your executive stakeholders for approval. 

      [infographic]

      Workshop: Create a Transparent and Defensible IT Budget

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Get into budget-starting position

      The Purpose

      Understand your IT budget in the context of your organization and key stakeholders, as well as gather your budgeting data and review previous years’ financial performance.

      Key Benefits Achieved

      Understand your organization’s budget process and culture.

      Understand your stakeholders’ priorities and perspectives regarding your IT budget.

      Gain insight into your historical IT expenditure.

      Set next fiscal year’s IT budget targets.

      Activities

      1.1 Review budget purpose. 

      1.2 Understand stakeholders and approvers.

      1.3 Gather your data.

      1.4 Map and review historical financial performance.

      1.5 Rationalize last year’s variances and set next year's budget targets.

      Outputs

      Budget process and culture assessment.

      Stakeholder alignment assessment and pre-selling strategy.

      Data prepared for next steps.

      Mapped historical expenditure.

      Next fiscal year’s budget targets.

      2 Forecast project CapEx

      The Purpose

      Develop a forecast of next fiscal year’s proposed capital IT expenditure driven by your organization’s strategic projects.

      Key Benefits Achieved

      Develop project CapEx forecast according to the four different stakeholder views of Info-Tech’s ITFM Cost Model.

      Ensure that no business projects that have IT implications (and their true costs) are missed.

      Activities

      2.1 Review the ITFM cost model

      2.2 List projects.

      2.3 Review project proposals and costs.

      2.4 Map and tally total project CapEx.

      2.5 Develop and/or confirm project-business alignment, ROI, and cost-benefit statements.

      Outputs

      Confirmed ITFM cost mdel.

      A list of projects.

      Confirmed list of project proposals and costs.

      Forecasted project-based capital expenditure mapped against the four views of the ITFM Cost Model.

      Projects financials in line.

      3 Forecast non-project CapEx and OpEx

      The Purpose

      Develop a forecast of next fiscal year’s proposed “business as usual” non-project capital and operating IT expenditure.

      Key Benefits Achieved

      Develop non-project CapEx and non-project OpEx forecasts according to the four different stakeholder views of Info-Tech’s ITFM Cost Model.

      Make “business as usual” costs fully transparent and rationalized.

      Activities

      3.1 Review non-project capital and costs. 

      3.2 Review non-project operations and costs.

      3.3 Map and tally total non-project CapEx and OpEx.

      3.4 Develop and/or confirm proposed expenditure rationales.

      Outputs

      Confirmation of non-project capital and costs.

      Confirmation of non-project operations and costs.

      Forecasted non-project-based capital expenditure and operating expenditure against the four views of the ITFM Cost Model.

      Proposed expenditure rationales.

      4 Finalize budget and develop presentation

      The Purpose

      Aggregate and sanity-check your forecasts, harden your rationales, and plan/develop the content for your IT budget executive presentation.

      Key Benefits Achieved

      Create a finalized proposed IT budget for next fiscal year that offers different views on your budget for different stakeholders.

      Select content for your IT budget executive presentation that will resonate with your stakeholders and streamline approval.

      Activities

      4.1 Aggregate forecast totals and sanity check.

      4.2 Generate graphical outputs and select content to include in presentation.

      4.3 Fine-tune rationales.

      4.4 Develop presentation and write commentary.

      Outputs

      Final proposed IT budget for next fiscal year.

      Graphic outputs selected for presentation.

      Rationales for budget.

      Content for IT Budget Executive Presentation.

      5 Next steps and wrap-up (offsite)

      The Purpose

      Finalize and polish the IT budget executive presentation.

      Key Benefits Achieved

      An approval-ready presentation that showcases your business-aligned proposed IT budget backed up with rigorous rationales.

      Activities

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Outputs

      Completed IT Budget Executive Presentation.

      Review scheduled.

      Further reading

      Create a Transparent and Defensible IT Budget

      Build in approvability from the start.

      EXECUTIVE BRIEF

      Analyst Perspective

      A budget’s approvability is about transparency and rationale, not the size of the numbers.

      Jennifer Perrier.

      It’s that time of year again – budgeting. Most organizations invest a lot of time and effort in a capital project selection process, tack a few percentage points onto last year’s OpEx, do a round of trimming, and call it a day. However, if you want to improve IT financial transparency and get your business stakeholders and the CFO to see the true value of IT, you need to do more than this.

      Yourcrea IT budget is more than a once-a-year administrative exercise. It’s an opportunity to educate, create partnerships, eliminate nasty surprises, and build trust. The key to doing these things rests in offering a range of budget perspectives that engage and make sense to your stakeholders, as well as providing iron-clad rationales that tie directly to organizational objectives.

      The work of setting and managing a budget never stops – it’s a series of interactions, conversations, and decisions that happen throughout the year. If you take this approach to budgeting, you’ll greatly enhance your chances of creating and presenting a defensible annual budget that gets approved the first time around.

      Jennifer Perrier
      Principal Research Director
      IT Financial Management Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      IT struggles to gain budget approval year after year, largely driven by a few key factors:

      • For a long time, IT has been viewed as a cost center whose efficiency needs to be increasingly optimized over time. IT’s relationship to strategy is not yet understood or established in many organizations.
      • IT is one of the biggest areas of cost for many organizations. Often, executives don’t understand, or even believe, that all that IT spending is necessary to advance the organization’s objectives, let alone keep it running.

      Internal and external obstacles beyond IT’s control make these challenges even harder to overcome:

      • Economic pressures can quickly drive IT’s budgetary focus from strategic back to tactical.
      • Corporate-driven categorizations of expenditure, plus disconnected approval mechanisms for capital vs. operational spend, hide key interdependencies and other aspects of IT’s financial reality.
      • Connecting the dots between IT activities and business benefits rarely forms a straight line.

      CIOs need a straightforward way to create and present an approval-ready budget.

      • Info-Tech recognizes that connecting the dots to demonstrate value is key to budgetary approval.
      • Info-Tech also recognizes that key stakeholders require different perspectives on the IT budget.
      • This blueprint provides a framework, method, and templated exemplars for creating and presenting an IT budget to stakeholders. It will speed the approval process and ensure more of it is approved.

      Info-Tech Insight
      CIOs need a straightforward way to create and present an approval-ready IT budget that demonstrates the value IT is delivering to the business and speaks directly to different stakeholder priorities.

      IT struggles to get budgets approved due to low transparency and failure to engage

      Capability challenges

      Administrative challenges

      Operating challenges

      Visibility challenges

      Relationship challenges

      IT is seen as a cost center, not an enabler or driver of business strategy.

      IT leaders are not seen as business leaders.

      Economic pressures drive knee-jerk redirection of IT’s budgetary focus from strategic initiatives back to operational tactics.

      The vast majority of IT’s
      real-life expenditure is in the form of operating expenses i.e. keeping the lights on.

      Most business leaders don’t know how many IT resources their business units are really consuming.

      Other departments in the organization see IT as a competitor for funding, not a business partner.

      Lack of transparency

      IT and the business aren’t speaking the same language.

      IT leaders don’t have sufficient access to information about, or involvement in, business decisions and objectives.

      Outmoded finance department expenditure categorizations don’t accommodate IT’s real cost categories.

      IT absorbs unplanned spend because business leaders don’t realize or consider the impact of their decisions on IT.

      The business doesn’t understand what IT is, what it does, or what it can offer.

      IT and the business don’t have meaningful conversations about IT costs, opportunities, or investments.

      Defining and demonstrating the value of IT and its investments isn’t straightforward.

      IT leaders may not have the financial literacy or acumen needed to translate IT activities and needs into business terms.

      CapEx and OpEx approval and tracking mechanisms are handled separately when, in reality, they’re highly interdependent.

      IT activities usually have an indirect relationship with revenue, making value calculations more complicated.

      Much of IT, especially infrastructure, is invisible to the business and is only noticed if it’s not working.

      The relationship between IT spending and how it supports achievement of business objectives is not clear.

      Reflect on the numbers…

      The image contains a screenshot of five graphs. The graphs depict Cost and budget management, Cost optimization, Business value, perception of improvement, and intensity of business frustration.

      To move forward, first you need to get unstuck

      Today’s IT budgeting challenges have been growing for a long time. Overcoming these challenges means untangling yourself from the grip of the root causes.

      Principle 1:
      IT and the business are fighting diverging forces. Technology has changed monumentally, while financial management hasn’t changed much at all.

      Principle 2:
      Different stakeholders have different perspectives on your IT budget. Learn and acknowledge what’s important to them so that you can potentially deliver it.

      Principle 3:
      Connecting the dots to clearly demonstrate IT’s value to the organization is the key to budgetary approval. But those connected dots don’t always result in a straight line.

      The three principles above are all about IT’s changing relationship to the business. IT leaders need a systematic and repeatable approach to budgeting that addresses these principles by:

      • Clearly illustrating the alignment between the IT budget and business objectives.
      • Showing stakeholders the overall value that IT investment will bring them.
      • Demonstrating where IT is already realizing efficiencies and economies of scale.
      • Gaining consensus on the IT budget from all parties affected by it.

      “The culture of the organization will drive your success with IT financial management.”

      – Dave Kish, Practice Lead, IT Financial Management Practice, Info-Tech Research Group

      Info-Tech’s approach

      CIOs need a straightforward way to convince approval-granting CFOs, CEOs, boards, and committees to spend money on IT to advance the organization’s strategies.

      IT budget approval cycle

      The image contains a screenshot of the IT budget approval cycle.

      The Info-Tech difference:

      This blueprint provides a framework, method, and templated exemplars for building and presenting your IT budget to different stakeholders. These will speed the approval process and ensure that a higher percentage of your proposed spend is approved.

      Info-Tech’s methodology for how to create a transparent and defensible it budget

      1. Lay Your Foundation

      2. Get Into Budget-Starting Position

      3. Develop Your Forecasts

      4. Build Your Proposed Budget

      5. Create and Deliver Your Budget Presentation

      Phase steps

      1. Understand budget purpose
      2. Know your stakeholders
      3. Continuously pre-sell your budget
      1. Gather your data
      2. Review historical performance
      3. Set budget goals
      1. Develop alternate scenarios
      2. Develop project CapEx forecasts
      3. Develop non-project CapEx and OpEx forecasts
      1. Aggregate your forecasts
      2. Stress-test your forecasts
      3. Challenge and perfect your rationales
      1. Plan your presentation content
      2. Build your budget presentation
      3. Present, finalize, and submit your budget

      Phase outcomes

      An understanding of your stakeholders and what your IT budget means to them.

      Information and goals for planning next fiscal year’s IT budget.

      Completed forecasts for project and non-project CapEx and OpEx.

      A final IT budget for proposal including scenario-based alternatives.

      An IT budget presentation.

      Insight summary

      Overarching insight: Create a transparent and defensible IT budget

      CIOs need a straightforward way to create and present an approval-ready IT budget that demonstrates the value IT is delivering to the business and speaks directly to different stakeholder priorities.

      Phase 1 insight: Lay your foundation

      IT needs to step back and look at it’s budget-creation process by first understanding exactly what a budget is intended to do and learning what the IT budget means to IT’s various business stakeholders.

      Phase 2 Insight: Get into budget-starting position

      Presenting your proposed IT budget in the context of past IT expenditure demonstrates a pattern of spend behavior that is fundamental to next year’s expenditure rationale.

      Phase 3 insight: Develop your forecasts

      Forecasting costs according to a range of views, including CapEx vs. OpEx and project vs. non-project, and then positioning it according to different stakeholder perspectives, is key to creating a transparent budget.

      Phase 4 insight: Build your proposed budget

      Fine-tuning and hardening the rationales behind every aspect of your proposed budget is one of the most important steps for facilitating the budgetary approval process and increasing the amount of your budget that is ultimately approved.

      Phase 5 insight: Create and deliver your budget presentation

      Selecting the right content to present to your various stakeholders at the right level of granularity ensures that they see their priorities reflected in IT’s budget, driving their interest and engagement in IT financial concerns.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      IT Cost Forecasting and Budgeting Workbook

      This Excel tool allows you to capture and work through all elements of your IT forecasting from the perspective of multiple key stakeholders and generates compelling visuals to choose from to populate your final executive presentation.

      The image contains a screenshot of the IT Cost Forecasting and Budgeting Workbook.

      Also download this completed sample:

      Sample: IT Cost Forecasting and Budgeting Workbook

      Key deliverable

      IT Budget Executive Presentation Template

      Phase 5: Create a focused presentation for your proposed IT budget that will engage your audience and facilitate approval.

      The image contains a screenshot of the IT Budget Executive Presentation Template.

      Blueprint benefits

      IT benefits

      Business benefits

      • Improve IT’s overall financial management capability.
      • Streamline the administration of annual IT budget development.
      • Legitimize the true purpose and value of IT operations and associated expenditure.
      • Create visibility on the part of both IT and the business into IT’s mandate, what needs to be in place, and what it costs to fund it.
      • Foster better relationships with business stakeholders by demonstrating IT’s business and financial competency, working in partnership with business leaders on IT investment decisions, and building mutual trust.
      • Better understand the different types of expenditure occurring in IT, including project CapEx, non-project CapEx, and non-project OpEx.
      • Gain insight into the relationship between one-time CapEx on ongoing OpEx and its ramifications.
      • See business priorities and concerns clearly reflected in IT’s budget down to the business-unit level.
      • Receive thorough return on investment calculations and cost-benefit analyses for all aspects of IT expenditure.
      • Understand the direct relationship between IT expenditure and the depth, breadth, and quality of IT service delivery to the business.

      Measure the value of this blueprint

      Ease budgetary approval and improve its accuracy.

      Near-term goals

      • Percentage of budget approved: Target 95%
      • Percentage of IT-driven projects approved: Target 100%
      • Number of iterations/re-drafts required to proposed budget: One iteration

      Long-term goal

      • Variance in budget vs. actuals: Actuals less than budget and within 2%

      In Phases 1 and 2 of this blueprint, we will help you understand what your approvers are looking for and gather the right data and information.

      In Phase 3, we will help you forecast your IT costs it terms of four stakeholder views so you can craft a more meaningful IT budget narrative.

      In Phases 4 and 5, we will help you build a targeted presentation for your proposed IT budget.

      Value you will receive:

      1. Increased forecast accuracy through using a sound cost-forecasting methodology.
      2. Improved budget accuracy by applying more thorough and transparent techniques.
      3. Increased budget transparency and completeness by soliciting input earlier and validating budgeting information.
      4. Stronger alignment between IT and enterprise goals through building a better understanding of the business values and using language they understand.
      5. A more compelling budget presentation by offering targeted, engaging, and rationalized information.
      6. A faster budgeting rework process by addressing business stakeholder concerns the first time.

      An analogy…

      “A budget isn’t like a horse and cart – you can’t get in front of it or behind it like that. It’s more like a river…

      When developing an annual budget, you have a good idea of what the OpEx will be – last year’s with an annual bump. You know what that boat is like and if the river can handle it.

      But sometimes you want to float bigger boats, like capital projects. But these boats don’t start at the same place at the same time. Some are full of holes. And does your river even have the capacity to handle a boat of that size?

      Some organizations force project charters by a certain date and only these are included in the following year’s budget. The project doesn’t start until 8-12 months later and the charter goes stale. The river just can’t float all these boats! It’s a failed model. You have to have a great governance processes and clear prioritization so that you can dynamically approve and get boats on the river throughout the year.”

      – Mark Roman, Managing Partner, Executive Services,
      Info-Tech Research Group and Former Higher Education CIO

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      Phase 1: Lay Your Foundation

      Phase 2: Get Into Budget-Starting Position

      Phase 3: Develop Your Forecasts

      Phase 4: Build Your Proposed Budget

      Phase 5: Create and Deliver Your Budget Presentation

      Call #1: Discuss the IT budget, processes, and stakeholders in the context of your unique organization.

      Call #2: Review data requirements for transparent budgeting.

      Call #3: Set budget goals and process improvement metrics.

      Call #4: Review project CapEx forecasts.

      Call #5: Review non-project CapEx and OpEx forecasts.

      Call #6: Review proposed budget logic and rationales.

      Call #7: Identify presentation inclusions and exclusions.

      Call #8: Review final budget presentation.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5

      Get into budget-starting position

      Forecast project CapEx

      Forecast non-project CapEx and OpEx

      Finalize budget and develop presentation

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Review budget purpose.

      1.2 Understand stakeholders and approvers.

      1.3 Gather your data.

      1.4 Map and review historical financial performance.

      1.5 Rationalize last year’s variances.

      1.5 Set next year’s budget targets.

      2.1 Review the ITFM Cost Model.

      2.2 List projects.

      2.3 Review project proposals and costs.

      2.4 Map and tally total project CapEx.

      2.5 Develop and/or confirm project-business alignment, ROI, and cost-benefit statements.

      3.1 Review non-project capital and costs.

      3.2 Review non-project operations and costs.

      3.3 Map and tally total non-project CapEx and OpEx.

      3.4 Develop and/or confirm proposed expenditure rationales.

      4.1 Aggregate forecast totals and sanity check.

      4.2 Generate graphical outputs and select content to include in presentation.

      4.3 Fine-tune rationales.

      4.4 Develop presentation and write commentary.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Budget process and culture assessment.
      2. Stakeholder alignment assessment and pre-selling strategy.
      3. Mapped historical expenditure.
      4. Next fiscal year’s budget targets.
      1. Forecasted project-based capital expenditure mapped against the four views of the ITFM Cost Model.
      1. Forecasted non-project-based capital expenditure and operating expenditure against the four views of the ITFM Cost Model.
      1. Final proposed IT budget for next fiscal year.
      2. Plan and build content for IT Budget Executive Presentation.
      1. Completed IT Budget Executive Presentation.

      Phase 1

      Lay Your Foundation

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Seeing your budget as a living governance tool
      • Understanding the point of view of different stakeholders
      • Gaining tactics for setting future IT spend expectations

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Lay Your Foundation

      Before starting any process, you need to understand exactly why you’re doing it.

      This phase is about understanding the what, why, and who of your IT budget.

      • Understand what your budget is and does. A budget isn’t just an annual administrative event – it’s an important governance tool. Understand exactly what a budget is and your budgetary accountabilities as an IT leader.
      • Know your stakeholders. The CFO, CEO, and CXOs in your organization have their own priorities, interests, and professional mandates. Get to know what their objectives are and what IT’s budget means to them.
      • Continuously pre-sell your budget. Identifying, creating, and capitalizing on opportunities to discuss your budget well in advance of its formal presentation will get influential stakeholders and approvers on side, foster collaborations, and avoid unpleasant surprises on all fronts.

      “IT finance is more than budgeting. It’s about building trust and credibility in where we’re spending money, how we’re spending money. It’s about relationships. It’s about financial responsibility, financial accountability. I rely on my entire leadership team to all understand what their spend is. We are a steward of other people’s money.”

      – Rick Hopfer, CIO, Hawaii Medical Service Association

      What does your budget actually do?

      A budget is not just a painful administrative exercise that you go through once a year.

      Most people know what a budget is, but it’s important to understand its true purpose and how it’s used in your organization before you engage in any activity or dialogue about it.

      In strictly objective terms:

      • A budget is a calculated estimate of income vs. expenditure for a period in the future, often one year. Basically, it’s an educated guess about how much money will come into a business entity or unit and how much money will go out of it.
      • A balanced budget is where income and expenditure amounts are equal.
      • The goal in most organizations is for the income component of the budget to match or exceed the expenditure component.
        If it doesn’t, this results in a deficit that may lead to debt.

      Simply put, a budget’s fundamental purpose is to plan and communicate how an organization will avoid deficit and debt and remain financially viable while meeting its various accountabilities and responsibilities to its internal and external stakeholders.

      “CFOs are not thinking that they want to shut down IT spend. Nobody wants to do that. I always looked at things in terms of revenue streams – where the cash inflow is coming from, where it’s going to, and if I can align my cash outflows to my revenue stream. Where I always got suspicious as a CFO is if somebody can’t articulate spending in terms of a revenue stream. I think that’s how most CFOs operate.”

      – Carol Carr, Technical Counselor,
      Info-Tech Research Group and Former CFO

      Put your IT budget in context

      Your IT budget is just one of several budgets across your organization that, when combined, create an organization-wide budget. In this context, IT’s in a tough spot.

      It’s a competition: The various units in your organization are competing for the biggest piece they can get of the limited projected income pie. It’s a zero-sum game. The organization’s strategic and operational priorities will determine how this projected income is divvied up.

      Direct-to-revenue units win: Business units that directly generate revenue often get bigger relative percentages of the organizational budget since they’re integral to bringing in the projected income part of the budget that allows the expenditure across all business units to happen in the first place.

      Indirect-to-revenue units lose: Unlike sales units, for example, IT’s relationship to projected income tends to be indirect, which means that IT must connect a lot more dots to illustrate its positive impact on projected income generation.

      In financial jargon, IT really is a cost center: This indirect relationship to revenue also explains why the focus of IT budget conversations is usually on the expenditure side of the equation, meaning it doesn’t have a clear positive impact on income.

      Contextual metrics like IT spend as a percentage of revenue, IT OpEx as a percentage of organizational OpEx, and IT spend per organizational employee are important baseline metrics to track around your budget, internally benchmark over time, and share, in order to illustrate exactly where IT fits into the broader organizational picture.

      Budgeting isn’t a once-a-year thing

      Yet, many organizations treat it like a “one and done” point of annual administration. This is a mistake that misses out on the real benefits of budgeting.

      Many organizations have an annual budgeting and planning event that takes place during the back half of the fiscal year. This is where all formal documentation around planned projects and proposed spend for the upcoming year is consolidated, culminating in final presentation, adjustment, and approval. It’s basically a consolidation and ranking of organization-wide priorities at the highest level.

      If things are running well, this culmination point in the overall budget development and management process is just a formality, not the beginning, middle, and end of the real work. Ideally:

      • Budgets are actually used: The whole organization uses budgets as tools to actively manage day-to-day operations and guide decision making throughout the year in alignment with priorities as opposed to something that’s put on a shelf or becomes obsolete within a few months.
      • Interdependencies are evident: No discrete area of spend focus is an island – it’s connected directly or indirectly with other areas of spend, both within IT and across the organization. For example, one server interacts with multiple business applications, IT and business processes, multiple IT staff, and even vendors or external managed service providers. Cost-related decisions about that one server – maintain, repurpose, consolidate, replace, discard – will drive other areas of spend up or down.
      • There are no surprises: While this does happen, your budget presentation isn’t a great time to bring up a new point of significant spend for the first time. The items in next year’s proposed budget should be priorities that are already known, vetted, supported, and funded.

      "A well developed and presented budget should be the numeric manifestation of your IT strategy that’s well communicated and understood by your peers. When done right, budgets should merely affirm what’s already been understood and should get approved with minimal pushback.“

      – Patrick Gray, TechRepublic, 2020

      Understand your budgetary responsibilities as the IT leader

      It’s in your job description. For some stakeholders, it’s the most important part of it.

      While not a contract per se, your IT budget is an objective and transparent statement made in good faith that shows:

      • You know what it takes to keep the organization viable.
      • You understand the organization’s accountabilities and responsibilities as well as those of its leaders.
      • You’re willing and able to do your part to meet these accountabilities and responsibilities.
      • You know what your part of this equation is, as well as what parts should and must be played by others.

      When it comes to your budget (and all things financial), your job is to be ethical, careful, and wise:

      1. Be honest. Business ethics matter.
      2. Be as accurate as possible. Your expenditure predictions won’t be perfect, but they need to be best-effort and defensible.
      3. Respect the other players. They have their own roles, motivations, and mandates. Accept and respect these by being a supporter of their success instead of an obstacle to them achieving it.
      4. Connect the dots to income. Always keep the demonstration of business value in your sights. Often, IT can’t draw a straight line to income, but demonstrating how IT expenditure supports and benefits future, current, and past (but still relevant) business goals and strategies, which in turn affect income, is the best course.
      5. Provide alternatives. There are only so many financial levers your organization can pull. An action on one lever will have wanted and unwanted consequences on another. Aim to put financial discussions in terms of risk-focused “what if” stories and let your business partners decide if those risks are satisfactory.

      Budgeting processes tend to be similar – it’s budgeting cultures that drive differences

      The basic rules of good budgeting are the same everywhere. Bad budgeting processes, however, are usually caused by cultural factors and can be changed.

      What’s the same everywhere…

      What’s unchangeable…

      What’s changeable…

      For right or wrong, most budgeting processes follow these general steps:

      There are usually only three things about an organization’s budgeting process that are untouchable and can’t be changed:

      Budgeting processes are rarely questioned. It never occurs to most people to challenge this system, even if it doesn’t work. Who wants to challenge the CFO? No one.

      Review your organization’s budgeting culture to discover the negotiable and non-negotiable constraints. Specifically, look at these potentially-negotiable factors if they’re obstacles to IT budgeting success:

      1. Capital project vetting and selection for the next fiscal year starts three-to-six months before the end of the current fiscal year.
      2. Operational expenditure, including salaries, is looked at later with much less formality and scrutiny with an aim to cut.
      3. Each business unit does a budget presentation and makes directed amendments (usually trimming).
      4. The approved budget numbers are plugged into a standard, sub-optimal budget template provided by Finance.
      1. The legal and regulatory mandates that govern financial funding, accounting, and reporting practices. These are often specific to industries and spend types.
      2. The accounting rules your organization follows, such as GAAP, or IFRS. These too may be legally mandated for government entities and publicly-traded companies.
      3. Hard limits on the projected available income the CFO has to distribute.
      • Timeframes and deadlines
      • Order of operations
      • Areas of focus (CapEx vs. OpEx)
      • Funding sources and ownership
      • Review/approval mechanisms
      • Templates and tools

      1.1 Review your budgeting process and culture

      1 hour

      1. Review the following components of your budget process using the questions provided for each as a guideline.
        1. Legal and regulatory mandates. What are the external rules that govern how we do financial tracking and reporting? How do they manifest in our processes?
        2. Accounting rules used. What rules does our finance department use and why? Do these rules allow for more meaningful representations of IT spend? Are there policies or practices in place that don’t appear to be backed by any external standards?
        3. Timeframes and deadlines. Are we starting the budgeting process too late? Do we have enough time to do proper due diligence? Will expenditures approved now be out of date when we go to execute? Are there mechanisms to update spend plans mid-cycle?
        4. Order of operations. What areas of spend do we always look at first, such as CapEx? Are there any benefits to changing the order in which we do things, such as examining OpEx first?
        5. Areas of focus. Is CapEx taking up most of our budgeting cycle time? Are we spending enough time examining OpEx? Is IT getting enough time from the CFO compared to other units?
        6. Funding sources and ownership. Is IT footing most of the technology bills? Are business unit leaders fronting any technology business case pitches? Is IT appropriately included in business case development? Is there any benefit to implementing show-back or charge-back?
        7. Review/approval mechanisms. Are strategies and priorities used to rank proposed spend clear and well communicated? Are spend approvers objective in their decision making? Do different approvers apply the same standards and tools?
        8. Templates and tools. Are the ones provided by Finance, the PMO, and other groups sufficient to document what we need to document? Are they accessible and easy to use? Are they automated and integrated so we only have to enter data once?
      2. On the slide following these activity instructions, rate how effective each of the above is on a scale of 1-10 (where 10 is very effective) in supporting the budgeting process. Note specific areas of challenge and opportunity for change.

      1.1 Review your budgeting process and culture

      Input Output Materials Participants
      • Organizational knowledge of typical budgeting processes
      • Copies of budgeting policies, procedures, and tools
      • Rated assessment of your organization’s budget process and culture, as well as major areas of challenge and opportunity for change
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Budget process and culture assessment

      Document the outcomes of your assessment. Examples are provided below.

      Budgeting area of assessment

      Rating

      1 = very ineffective

      10 = very effective

      Challenges

      Opportunities for change

      Legal and regulatory mandates

      7

      Significant regulation but compliance steps not clear or supported within departments.

      Create, communicate, and train management on compliance procedures and align the financial management tools accordingly.

      Accounting rules

      6

      IT not very familiar with them.

      Learn more about them and their provisions to see if IT spend can be better represented.

      Timeframes and deadlines

      5

      Finalize capital project plans for next fiscal four months before end of current fiscal.

      Explore flexible funding models that allow changes to budget closer to project execution.

      Order of operations

      3

      Setting CapEx before OpEx leads to paring of necessary OpEx based on CapEx commitments.

      Establish OpEx first as a baseline and then top up to target budget with CapEx.

      Areas of focus

      6

      Lack of focus on OpEx means incremental budgeting – we don’t know what’s in there.

      Perform zero-based budgeting on OpEx every few years to re-rationalize this spend.

      Funding sources and ownership

      4

      IT absorbing unplanned mid-cycle spend due to impact of unknown business actions.

      Implement a show-back mechanism to change behavior or as precursor to limited charge-back.

      Review/approval mechanisms

      8

      CFO is fair and objective with information presented but could demand more evidence.

      Improve business sponsorship/fronting of new initiative business cases and IT partnership.

      Templates and tools

      2

      Finance budget template largely irrelevant and unreflective of IT: only two relevant categories.

      Adjust account buckets over a period of time, starting with SW/HW and cloud breakouts.

      Receptive audiences make communication a lot easier

      To successfully communicate anything, you need to be heard and understood.

      The key to being heard and understood is first to hear and understand the perspective of the people with whom you’re trying to communicate – your stakeholders. This means asking some questions:

      • What context are they operating in?
      • What are their goals and responsibilities?
      • What are their pressures and stresses?
      • How do they deal with novelty and uncertainty?
      • How do they best take in information and learn?

      The next step of this blueprint shows the perspectives of IT’s key stakeholders and how they’re best able to absorb and accept the important information contained in your IT budget. You will:

      • Learn a process for discovering these stakeholders’ IT budget information needs within the context of your organization’s industry, goals, culture, organizational structure, personalities, opportunities, and constraints.
      • Document key objectives and messages when communicating with these various key stakeholders.

      There are certain principles, mandates, and priorities that drive your stakeholders; they’ll want to see these reflected in you, your work, and your budget.

      Your IT budget means different things to different stakeholders

      Info-Tech’s ITFM Cost Model lays out what matters most from various points of view.

      The image contains a screenshot of Info-Tech's ITFM Cost Model.

      The CFO: Understand their role

      The CFO is the first person that comes to mind in dealing with budgets. They’re personally and professionally on the line if anything runs amiss with the corporate purse.

      What are the CFO’s role and responsibilities?

      • Tracking cash flow and balancing income with expenditures.
      • Ensuring fiscal reporting and legal/regulatory compliance.
      • Working with the CEO to ensure financial-strategic alignment.
      • Working with business unit heads to set aligned budgets.
      • Seeing the big picture.

      What’s important to the CFO?

      • Costs
      • Benefits
      • Value
      • Analysis
      • Compliance
      • Risk Management
      • Strategic alignment
      • Control
      • Efficiency
      • Effectiveness
      • Reason
      • Rationale
      • Clarity
      • Objectivity
      • Return on investment

      “Often, the CFO sees IT requests as overhead rather than a need. And they hate increasing overhead.”

      – Larry Clark, Executive Counselor, Info-Tech Research Group and Former CIO

      The CFO carries big responsibilities focused on mitigating organizational risks. It’s not their job to be generous or flexible when so much is at stake. While the CEO appears higher on the organizational chart than the CFO, in many ways the CFO’s accountabilities and responsibilities are on par with, and in some cases greater than, those of the CEO.

      The CFO: What they want from the IT budget

      What they need should look familiar, so do your homework and be an open book.

      Your CFO’s IT budget to-do list:

      Remember to:

      • A review of the previous year financial performance. This demonstrates to the CFO your awareness, savvy, and overall competence in the financial management realm. This is also your opportunity to start laying out the real-life context within which IT has been operating. Information to show includes:
        • Budget vs. actuals, including an overview of factors that led to major variances.
        • Percentage difference in proposed budget versus previous year’s budget, and major contributing factors to those differences (i.e. unanticipated projects, changes, or events).
      • Presentation of information according to Finance’s existing categories. This makes it as easy as possible for them to plug your numbers into their system.
      • Separate views of overall workforce vs. overall vendor spending. This is a traditional view.
      • Separate views of capital expenditure (CapEx) and operating expenditure (OpEx). This also includes information on expected lifespan of proposed new capital assets to inform depreciation/amortization decisions.
      • Explanation of anticipated sources of funding. Specifically, indicate whether the funding required is a brand-new net increase or a reallocation from the existing pool.
      • Details (upon request). Have these available for every aspect of your proposed budget.
      • Avoid being flashy. Exclude proposed expenditures with a lot of bells and whistles that don’t directly tie to concrete business objectives.
      • Be a conservationist. Show how you plan to re-use or extend assets that you already have.
      • Act like a business leader. Demonstrate your understanding of near-term (12-month) realities, priorities, and goals.
      • Think like them. Present reliable and defensible calculations of benefits versus risks as well as projected ROI for major areas of new or different spending.

      The CFO: Budget challenges and opportunities

      Budget season is a great time to start changing the conversation and building trust.

      Potential challenges

      Low trust

      Poor financial literacy and historical sloppiness among business unit leaders means that a CFO may come into budget conversations with skepticism. This can put them on the offensive and put you on the defensive. You have to prove yourself.

      Competition

      You’re not the only department the CFO is dealing with. Everyone is competing for their piece of the pie, and some business unit leaders are persistent. A good CFO will stay out of the politics and not be swayed by sweet talk, but it can be an exhausting experience for them.

      Mismatched buckets

      IT’s spend classes and categories probably won’t match what’s in Finance’s budget template or general ledger. Annual budgeting isn’t the best time to bring this up. Respect Finance’s categories, but plan to tackle permanent changes at a less busy time.

      Potential opportunities

      Build confidence

      Engaging in the budgeting process is your best chance to demonstrate your knowledge about the business and your financial acumen. The more that the CFO sees that you get it and are taking it seriously, the more confidence and trust they’ll have in you.

      Educate

      The CFO will not know as much as you about the role technology could and should play in the organization. Introduce new language around technology focused on capabilities and benefits. This will start to shift the conversation away from costs and toward value.

      Initiate alignment

      An important governance objective is to change the way IT expenditure is categorized and tracked to better reveal and understand what’s really happening. This process should be done gradually over time, but definitely communicate what you want to do and why.

      The CXO: Understand their role

      CXOs are a diverse group who lead a range of business functions including admin, operations, HR, legal, production, sales and service, and marketing, to name a few.

      What are the CXO’s role and responsibilities?

      Like you, the CXO’s job is to help the organization realize its goals and objectives. How each CXO does this is specific to the domain they lead. Variations in roles and responsibilities typically revolve around:

      • Law and regulation. Some functions have compliance as a core mandate, including legal, HR, finance, and corporate risk groups.
      • Finance and efficiency. Other functions prioritize time, money, and process such as finance, sales, customer service, marketing, production, operations, and logistics units.
      • Quality. These functions prioritize consistency, reliability, relationship, and brand such as production, customer service, and marketing.

      What’s important to the CXO?

      • Staffing
      • Skills
      • Reporting
      • Funding
      • Planning
      • Performance
      • Predictability
      • Customers
      • Visibility
      • Inclusion
      • Collaboration
      • Reliability
      • Information
      • Knowledge
      • Acknowledgement

      Disagreement is common between business-function leaders – they have different primary focus areas, and conflict and misalignment are natural by-products of that fact. It’s also hard to make someone care as much about your priorities as you do. Focus your efforts on sharing and partnering, not converting.

      The CXO: What they want from the IT budget

      Focus on their unique part of the organization and show that you see them.

      Your CXO’s IT budget to-do list:

      Remember to:

      • A review of the previous year’s IT expenditure on the business function. This includes:
        • Budget vs. actuals (if available) for the business function, and overview of any situations or factors that led to major variances.
        • Percentage difference in proposed budget for that business function vs. the previous year’s spend, and major contributing factors to those differences, i.e. unanticipated projects, changes, or events.
        • Last year’s IT expenditure per business function employee vs. proposed IT expenditure per business function employee (if available). This is a good metric to use going forward as it’s a fair comparative internal benchmark.
      • Separate views of proposed IT workforce vs. proposed IT vendor spending for the business function. Do a specific breakout of proposed expenditure for the major applications that business unit explicitly uses.
      • Separate views of proposed IT capital expenditure (CapEx) and proposed IT operating expenditure (OpEx) for the business function. Show breakdowns for each capital project,
        as well as summaries for their core applications and portion of shared IT services.
      • Celebrate any collaborative wins from last year. You want to reinforce that working together is in both of your best interests and you’d like to keep it going.
      • Get to the apps fast. Apps are visible, concrete, and relatable – this is what the CXO cares about. Core IT infrastructure, on the other hand, is technobabble about something that’s invisible, boring, and disengaging for most CXOs.
      • Focus on the business function’s actual technology needs and consumption. Show them where they stand in relation to others. This will get their attention and serve as an opportunity to provide some education.

      The CXO: Budget challenges and opportunities

      Seek out your common ground and be the solution for their real problems.

      Potential challenges

      Different priorities

      Other business unit leaders will have bigger concerns than your IT budget. They have their own budget to figure out plus other in-flight issues. The head of sales, for instance, is going to be more concerned with hitting sales goals for this fiscal year than planning for next.

      Perceived irrelevance

      Some business unit leaders may be completely unaware of how they use IT, how much they use, and how they could use it more or differently to improve their performance. They may have a learning curve to tackle before they can start to see your relationship as collaborative.

      Bad track record

      If a business unit has had friction with IT in the past or has historically been underserved, they may be hesitant to let you in, may be married to their own solutions, or perhaps do not know how to express what they need.

      Potential opportunities

      Start collaborating

      You and other business unit leaders have a lot in common. You all share the objective of helping the organization succeed. Focus in on your shared concerns and how you can make progress on them together before digging into your unique challenges.

      Practice perspective taking

      Be genuinely curious about the business unit, how it works, and how they overcome obstacles. See the organization from their point of view. For now, keep your technologies completely out of the discussion – that will come later on.

      Build relationships

      You only need to solve one problem for a business unit to change how they think of you. Just one. Find that one thing that will make a real difference – ideally small but impactful – and work it into your budget.

      The CEO: Understand their role

      A CEO sets the tone for an organization, from its overall direction and priorities to its values and culture. What’s possible and what’s not is usually determined by them.

      What are the CEO’s role and responsibilities?

      • Assemble an effective team of executives and advisors.
      • Establish, communicate, and exemplify the organizations core values.
      • Study the ecosystem within which the organization exists.
      • Identify and evaluate opportunities.
      • Set long-term directions, priorities, goals, and strategies.
      • Ensure ongoing organizational performance, profitability, and growth.
      • Connect the inside organization to the outside world.
      • Make the big decisions no one else can make.

      What’s important to the CEO?

      • Strategy
      • Leadership
      • Vision
      • Values
      • Goals
      • Priorities
      • Performance
      • Metrics
      • Accountability
      • Stakeholders
      • Results
      • Insight
      • Growth
      • Cohesion
      • Context

      Unlike the CFO and CXOs, the CEO is responsible for seeing the big picture. That means they’re operating in the realm of big problems and big ideas – they need to stay out of the weeds. IT is just one piece of that big picture, and your problems and ideas are sometimes small in comparison. Use any time you get with them wisely.

      The CEO: What they want from the IT budget

      The CEO wants what the CFO wants, but at a higher level and with longer-term vision.

      Your CEO’s IT budget to-do list:

      Remember to:

      • A review of the previous year’s financial performance. In addition to last year’s budget vs. actuals vs. proposed budget and any rationales for variances, the CEO’s interest is in seeing numbers in terms of strategic delivery. Focus on performance against last year’s goals and concrete benefits realized.
      • A review of initiatives undertaken to optimize/reduce operating costs. Note overall gains with a specific look at initiatives that had a substantial positive financial impact.
      • A specific summary of the cost landscape for new strategic or capital projects. Ideally, these projects have already been committed to at the executive level. A more fine-tuned analysis of anticipated costs and variables may be required, including high-level projects with long-term impact on operational expenditure. Categorize these expenditures as investments in innovation, growth, or keeping the lights on.
      • Details (upon request). Have these available for every aspect of your proposed budget.
      • Be brief. Hopefully, the CEO is already well versed on the strategic spend plans. Stay high-level, reserve the deep dive for your documentation, and let the CEO decide if they want to hash anything out in more detail.
      • Be strategic. If you can’t tie it to a strategic objective, don’t showcase it.
      • Use performance language. This means citing goals, metrics, and progress made against them.
      • Ensure the CFO can translate. You may not get a direct audience with the CEO – the CFO may be your proxy for that. Ensure that everything is crystal clear so that the CFO can summarize your budget on your behalf.

      The CEO: Budget challenges and opportunities

      Strategically address the big issues, but don’t count on their direct assistance.

      Potential challenges

      Lack of interest

      Your CEO may just not be enthusiastic about technology. For them, IT is strictly a cost center operating on the margins. If they don’t have a strategic vision that includes technology, IT’s budget will always be about efficiency and cost control and not investment.

      Deep hierarchy

      The executive-level CIO role isn’t yet pervasive in every industry. There may be one or more non-IT senior management layers between IT and the office of the CEO, as well as other bureaucratic hurdles, which prohibit your direct access.

      Uncertainty

      What’s happening on the outside will affect what needs to be done on the inside. The CEO has to assess and respond quickly, changing priorities and plans in an instant. An indecisive CEO that’s built an inflexible organization will make it difficult to pivot as needed.

      Potential opportunities

      Grow competency

      Sometimes, IT just needs to wait it out. The biggest shifts in technology interest often come with an outright change in the organization’s leadership. In the meantime, fine-tune your operational excellence, brush up on business skills, and draft out your best ideas on paper.

      Build partnerships

      Other business-function executives may need to be IT’s voice. Investment proposals may be more compelling coming from them anyway. Behind-the-scenes partnerships and high-profile champions are something you want regardless of your degree of CEO access.

      Bake in resilience

      Regardless of who’s at the helm, systematic investment in agile and flexible solutions that can be readily scaled, decoupled, redeployed, or decommissioned is a good strategy. Use recent crises to help make the strategic case for a more resilient posture.

      What about the CIO view on the IT budget?

      IT leaders tend to approach budgeting from an IT services perspective. After all, that’s how their departments are typically organized.

      The CFO expense view, CXO business view, and CEO innovation view represent IT’s stakeholders. The CIO service view, however, represents you, the IT budget creator. This means that the CIO service view plays a slightly different role in developing your IT budget communications.

      An IT team effort…

      A logical starting point

      A supporting view

      Most budget drafts start with internal IT management discussion. These managers are differentially responsible for apps dev and maintenance, service desk and user support, networks and data center, security, data and analytics, and so forth.

      These common organizational units and their managers tend to represent discrete IT service verticals. This means the CIO service view is a natural structural starting point for your budget-building process. Stakeholder views of your budget will be derived from this first view.

      You probably don’t want to lead your budget presentation with IT’s perspective – it won’t make sense to your stakeholders. Instead, select certain impactful pieces of your view to drop in where they provide valued information and augment the IT budget story.

      Things to bring forward…

      Things to hold back…

      • All major application costs
      • Security/compliance costs
      • Strategic project costs
      • End-user support and enablement costs
      • Data and BI initiative costs
      • Minor applications costs
      • Day-to-day network and data center costs
      • Other infrastructure costs
      • IT management and administration costs

      1.2 Assess your stakeholders

      1 hour

      1. Use the “Stakeholder alignment assessment” template slide following this one to document the outcomes of this activity.
      2. As an IT management team, identify your key budget stakeholders and specifically those in an approval position.
      3. Use the information provided in this blueprint about various stakeholder responsibilities, areas of focus, and what’s typically important to them to determine each key stakeholder’s needs regarding the information contained in your IT budget. Note their stated needs, any idiosyncrasies, and IT’s current relationship status with the stakeholder (positive, neutral, or negative).
      4. Assess previous years’ IT budgets to determine how well they targeted each different stakeholder’s needs. Note any gaps or areas for future improvement.
      5. Develop a high-level list of items or elements to stop, start, or continue during your next budgeting cycle.
      Input Output
      • Organizational awareness of key stakeholders and budget approvers
      • Previous years’ budgets
      • Assessment of key stakeholder needs and a list of potential changes or additions to the IT budget/budget process
      Materials Participants
      • Whiteboard/flip charts
      • Stakeholder alignment assessment template (following slide)
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Stakeholder alignment assessment

      Document the outcomes of your assessment below. Examples are provided below.

      Stakeholder

      Relationship status

      Understanding of needs

      Budget changes/additions

      CFO

      Positive

      Wants at least 30% of budget to be CapEx. Needs more detail concerning benefits and tracking of realization.

      Do more detailed breakouts of CapEx vs. OpEx as 30% CapEx not realistic – pre-meet. Talk to Enterprise PMO about improving project benefits statement template.

      VP of Sales

      Negative

      Only concerned with hitting sales targets. Needs to respond/act quickly based on reliable data.

      Break out sales consumption of IT resources in detail focusing on CRM and SFA tool costs. Propose business intelligence enhancement project.

      Director of Marketing

      Neutral

      Multiple manual processes – would benefit from increased automation of campaign management and social media posting.

      Break out marketing consumption of IT resources and publicly share/compare to generate awareness/support for tech investment. Work together to build ROI statements

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      Set your IT budget pre-selling strategy

      Pre-selling is all about ongoing communication with your stakeholders. This is the most game-changing thing you can do to advance a proposed IT budget’s success.

      When IT works well, nobody notices. When it doesn’t, the persistent criticism about IT not delivering value will pop up, translating directly into less funding. Cut this off at the pass with an ongoing communications strategy based on facts, transparency, and perspective taking.

      1. Know your channels
      2. Identify all the communication channels you can leverage including meetings, committees, reporting cycles, and bulletins. Set up new channels if they don’t exist.

      3. Identify partners
      4. Nothing’s better than having a team of supporters when pitch day comes. Quietly get them on board early and be direct about the role each of you will play.

      5. Always be prepared
      6. Have information and materials about proposed initiatives at-the-ready. You never know when you’ll get your chance. But if your facts are still fuzzy, do more homework first.

      7. Don’t be annoying
      8. Talking about IT all the time will turn people off. Plan chats that don’t mention IT at all. Ask questions about their world and really listen. Empathy’s a powerful tool.

      9. Communicate IT initiatives at launch
      10. Describe what you will be doing and how it will benefit the business in language that makes sense to the beneficiaries of the initiative.

      11. Communicate IT successes
      12. Carry the same narrative forward through to the end and tell the whole story. Include comments from stakeholders and beneficiaries about the value they’re receiving.

      Pre-selling with partners

      The thing with pre-selling to partners is not to take a selling approach. Take a collaborative approach instead.

      A partner is an influencer, advocate, or beneficiary of the expenditure or investment you’re proposing. Partners can:

      • Advise you on real business impacts.
      • Voice their support for your funding request.
      • Present the initial business case for funding approval themselves.
      • Agree to fund all or part of an initiative from their own budget.

      When partners agree to pitch or fund an initiative, IT can lose control of it. Make sure you set specific expectations about what IT will help with or do on an ongoing basis, such as:

      • Calculating the upfront and ongoing technology maintenance/support costs of the initiative.
      • Leading the technology vetting and selection process, including negotiating with vendors, setting service-level agreements, and finalizing contracts.
      • Implementing selected technologies and training users.
      • Maintaining and managing the technology, including usage metering.
      • Making sure the bills get paid.

      A collaborative approach tends to result in a higher level of commitment than a selling approach.

      Put yourself in their shoes using their language. Asking “How will this affect you?” focuses on what’s in it for them.

      Example:

      CIO: “We’re thinking of investing in technology that marketing can use to automate posting content to social media. Is that something you could use?”

      CMO: “Yes, we currently pay two employees to post on Facebook and Twitter, so if it could make that more efficient, then there would be cost savings there.”

      Pre-selling with approvers

      The key here is to avoid surprises and ensure the big questions are answered well in advance of decision day.

      An approver is the CFO, CEO, board, council, or committee that formally commits funding support to a program or initiative. Approvers can:

      • Point out factors that could derail realization of intended benefits.
      • Know that a formal request is coming and factor it into their planning.
      • Connect your idea with others to create synergies and efficiencies.
      • Become active advocates.

      When approvers cool to an idea, it’s hard to warm them up again. Gradually socializing an idea well in advance of the formal pitch gives you the chance to isolate and address those cooling factors while they’re still minor. Things you can address if you get an early start with future approvers include:

      • Identify and prepare for administrative, regulatory, or bureaucratic hurdles.
      • Incorporate approvers’ insights about organizational realities and context.
      • Further reduce the technical jargon in your language.
      • Fine tune the relevance and specificity of your business benefits statements.
      • Get a better sense of the most compelling elements to focus on.

      Blindsiding approvers with a major request at a budget presentation could trigger an emotional response, not the rational and objective one you want.

      Make approvers part of the solution by soliciting their advice and setting their expectations well in advance.

      Example:

      CIO: “The underwriting team and I think there’s a way to cut new policyholder approval turnaround from 8 to 10 days down to 3 or 4 using an online intake form. Do you see any obstacles?”

      CFO: “How do the agents feel about it? They submit to underwriting differently and might not want to change. They’d all need to agree on it. Exactly how does this impact sales?”

      1.3 Set your budget pre-selling strategy

      1 hour

      1. Use the “Stakeholder pre-selling strategy” template slide following this instruction slide to document the outcomes of this activity.
      2. Carry forward your previously-generated stakeholder alignment assessment from Step 1.2. As a management team, discuss the following for each stakeholder:
        1. Forums and methods of contact and interaction.
        2. Frequency of interaction.
        3. Content or topics typically addressed during interactions.
      3. Discuss what the outcomes of an ideal interaction would look like with each stakeholder.
      4. List opportunities to change or improve the nature of interactions and specific actions you plan to take.
      InputOutput
      • Stakeholder Alignment Assessment (in-deck template)
      • Stakeholder Pre-selling Strategy
      MaterialsParticipants
      • Stakeholder Pre-selling Strategy (in-deck template)
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Stakeholder pre-selling strategy

      Document the outcomes of your discussion. Examples are provided below.

      Stakeholder

      Current interactions

      Opportunities and actions

      Forum

      Frequency

      Content

      CFO

      One-on-one meeting

      Monthly

      IT expenditure updates and tracking toward budgeted amount.

      Increase one-on-one meeting to weekly. Alternate focus – retrospective update one week, future-looking case development the next. Invite one business unit head to future-looking sessions to discuss their IT needs.

      VP of Sales

      Executive meeting

      Quarterly

      General business update - dominates.

      Set up bi-weekly one-on-one meeting – initially focus on what sales does/needs, not tech. Later, when the relationship has stabilized, bring data that shows Sales’ consumption of IT resources.

      Director of Marketing

      Executive meeting

      Quarterly

      General business update - quiet.

      Set up monthly one-on-one meeting. Temporarily embed BA to better discover/understand staff processes and needs.

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      Phase recap: Lay your foundation

      Build in the elements from the start that you need to facilitate budgetary approval.

      You should now have a deeper understanding of the what, why, and who of your IT budget. These elements are foundational to streamlining the budget process, getting aligned with peers and the executive, and increasing your chances of winning budgetary approval in the end.

      In this phase, you have:

      • Reviewed what your budget is and does. Your budget is an important governance and communication tool that reflects organizational priorities and objectives and IT’s understanding of them.
      • Taken a closer look at your stakeholders. The CFO, CEO, and CXOs in your organization have accountabilities of their own to meet and need IT and its budget to help them succeed.
      • Developed a strategy for continuously pre-selling your budget. Identifying opportunities and approaches for building relationships, collaborating, and talking meaningfully about IT and IT expenditure throughout the year is one of the leading things you can do to get on the same page and pave the way for budget approval.

      “Many departments have mostly labor for their costs. They’re not buying a million and a half or two million dollars’ worth of software every year or fixing things that break. They don’t share IT’s operations mindset and I think they get frustrated.”

      – Matt Johnson, IT Director Governance and Business Solutions, Milwaukee County

      Phase 2

      Get Into Budget-Starting Position

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Putting together your budget team and gather your data.
      • Selecting which views of the ITFM Cost Model you’ll use.
      • Mapping and analyzing IT’s historical expenditure.
      • Setting goals and metrics for the next budgetary cycle.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Get into budget-starting position

      Now’s the time to pull together your budgeting resources and decision-making reference points.

      This phase is about clarifying your context and defining your boundaries.

      • Assemble your resources. This includes the people, data, and other information you’ll need to maximize insight into future spend requirements.
      • Understand the four views of the IT Cost Model. Firm up your understanding of the CFO expense view, CIO service view, CXO business view, and CEO innovation view and decide which ones you’ll use in your analysis and forecasting.
      • Review last year’s budget versus actuals. You need last year’s context to inform next year’s numbers as well as demonstrate any cost efficiencies you successfully executed.
      • Review five-year historical trends. This long-term context gives stakeholders and approvers important information about where IT fits into the business big picture and reminds them how you got to where you are today.
      • Set your high-level goals. You need to decide if you’re increasing, decreasing, or holding steady on your budget and whether you can realistically meet any mandates you’ve been handed on this front. Set a target as a reference point to guide your decisions and flag areas where you might need to have some tough conversations.

      “A lot of the preparation is education for our IT managers so that they understand what’s in their budgets and all the moving parts. They can actually help you keep it within bounds.”

      – Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association

      Gather your budget-building team

      In addition to your CFO, CXOs, and CEO, there are other people who will provide important information, insight, and skill in identifying IT budget priorities and costs.

      Role

      Skill set

      Responsibilities

      IT Finance Lead

      • Financial acumen, specifically with cost forecasting and budgeting.
      • Understanding of actual IT costs and service-based costing methods.

      IT finance personnel will guide the building of cost forecasting methodologies for operating and capital costs, help manage IT cash flows, help identify cost reduction options, and work directly with the finance department to ensure they get what they need.

      IT Domain Managers

      • Knowledge of services and their outputs.
      • Understanding of cost drivers for the services they manage.

      They will be active participants in budgeting for their specific domains, act as a second set of eyes, assist with and manage their domain budgets, and engage with stakeholders.

      Project Managers

      • Knowledge of project requirements.
      • Project budgeting.
      • Understanding of project IT-specific costs.

      Project managers will assist in capital and operational forecasting and will review project budgets to ensure accuracy. They will also assist in forecasting the operational impacts of capital projects.

      As the head of IT, your role is as the budgeting team lead. You understand both the business and IT strategies, and have relationships with key business partners. Your primary responsibilities are to guide and approve all budget components and act as a liaison between finance, business units, and IT.

      Set expectations with your budgeting team

      Be clear on your goals and ensure everyone has what they need to succeed.

      Your responsibilities and accountabilities.

      • Budget team lead.
      • Strategic direction.
      • Primary liaison with business stakeholders.
      • Pre-presentation approver and final decision maker.

      Goals and requirements.

      • Idea generation for investment and cost optimization.
      • Cost prioritization and rationale.
      • Skills requirements and sourcing options.
      • Risk assessment and operational impact.
      • Data format and level of granularity.

      Budgeting fundamentals.

      • Review of key finance concepts – CapEx, OpEx, cashflow, income, depreciation, etc.
      • What a budget is, and its component parts.
      • How the budget will be used by IT and the organization.
      • How to calculate cost forecasts.

      Their responsibilities and accountabilities.

      • Data/information collection.
      • Operational knowledge of their services, projects, and staff.
      • Cost forecast development for their respective domains/projects.
      • Review and sanity checking of their peers’ cost forecasts.

      Timeframes and deadlines.

      • Budgeting stages/phases and their deliverables.
      • Internal IT deadlines.
      • External business deadlines.
      • Goals and cadence of future working sessions and meetings.

      Available resources.

      • Internal and external sources of data and information.
      • Tools and templates for tracking information and performing calculations.
      • Individuals who can provide finance concept guidance and support.
      • Repositories for in-progress and final work.

      2.1 Brief and mobilize your IT budgeting team

      2 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook
      2. Organize a meeting with your IT department management team, team leaders, and project managers.
      3. Review their general financial management accountabilities and responsibilities.
      4. Discuss the purpose and context of the budgeting exercise, different budget components, and the organization’s milestones/deadlines.
      5. Identify specific tasks and activities that each member of the team must complete in support of the budgeting exercise.
      6. Set up additional checkpoints, working sessions, or meetings that will take you through to final budget submission.
      7. Document your budget team members, responsibilities, deliverables, and due dates on the “Planning Variables” tab in the IT Cost Forecasting & Budgeting Workbook.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • The organization’s budgeting process and procedures
      • Assignment of IT budgeting team responsibilities
      • A budgeting schedule
      MaterialsParticipants
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Leverage the ITFM Cost Model

      Each of the four views breaks down IT costs into a different array of categories so you and your stakeholders can see expenditure in a way that’s meaningful for them.

      You may decide not to use all four views based on your goals, audience, and available time. However, let’s start with how you can use the first two views, the CFO expense view and the CIO service view.

      The image contains a screenshot of the CFO expense view.

      The CFO expense view is fairly traditional – workforce and vendor. However, Info-Tech’s approach breaks down the vendor software and hardware buckets into on-premises and cloud. Making this distinction is increasingly critical given key differences in CapEx vs. OpEx treatment.

      Forecasting this view is mandatory

      These two views provide information that will help you optimize IT costs. They’re designed to allow the CFO and CIO to find a common language that will allow them to collaboratively make decisions about managing IT expenditure effectively.

      The image contains a screenshot of the CIO service view.

      The CIO service view is your view, i.e. it’s how IT tends to organize and manage itself and is often the logical starting point for expenditure planning and analysis. Sub-categories in this view, such as security and data & BI, can also resonate strongly with business stakeholders and their priorities.

      Forecasting this view is recommended

      Extend your dialogue to the business

      Applying the business optimization views of the ITFM Cost Model can bring a level of sophistication to your IT cost analysis and forecasting efforts.

      Some views take a bit more work to map out, but they can be powerful tools for communicating the value of IT to the business. Let’s look at the last two views, the CXO business view and the CEO innovation view.

      The CXO business view looks at IT expenditure business unit by business unit so that each can understand their true consumption of IT resources. This view relies on having a fair and reliable cost allocation formula, such as one based on relative headcount, so it runs the risk of inaccuracy.

      Forecasting this view is recommended

      The image contains a screenshot of the CXO business view.

      These two views provide information that will help you optimize IT support to the business. These views also have a collaborative goal in mind, enabling IT to talk about IT spend in terms that will promote transparency and engage business stakeholders.

      The CEO innovation view is one of the hardest to analyze and forecast since a single spend item may apply to innovation, growth, and keeping the lights on. However, if you have an audience with the CEO and they want IT to play a more strategic or innovative role, then this view is worth mapping.

      Forecasting this view is optional

      The image contains a screenshot of the CEO innovation view.

      2.2 Select the ITFM Cost Model views you plan to complete based on your goals

      30 minutes

      The IT Cost Forecasting and Budgeting Workbook contains standalone sections for each view, as well as rows for each lowest-tier sub-category in a view, so each view can be analyzed and forecasted independently.

      1. Review Info-Tech’s ITFM Cost Model and the expenditure categories and sub-categories each view contains.
      2. Revisit your stakeholder analysis for the budgeting exercise. Plan to:
        1. Complete the CFO expense view regardless.
        2. Complete the CIO service view – consider doing this one first for forecasting purposes as it may be most familiar to you and serve as an easier entry point into the forecasting process.
        3. Complete the CXO business view – consider doing this only for select business units if you have the objective of enhancing awareness of their true consumption of IT resources or if you have (or plan to have) a show-back/chargeback mechanism.
        4. Complete the CEO innovation view only if your data allows it and there’s a compelling reason to discuss the strategic or innovative role of IT in the organization.
      Input Output
      • Stakeholder analysis
      • Info-Tech’s ITFM Cost Model
      • Decision on which views in the ITFM Cost Model you’ll use for historical expenditure analysis and forecasting purposes
      Materials Participants
      • Info-Tech’s ITFM Cost Model
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Gather your budget-building data

      Your data not only forms the content of your budget but also serves as the supporting evidence for the decisions you’ve made.

      Ensure you have the following data and information available to you and your budgeting team before diving in:

      Past data

      • Last fiscal year’s budget.
      • Actuals for the past five fiscal years.
      • Pre-set capital depreciation/amortization amounts to be applied to next fiscal year’s budget.

      Current data

      • Current-year IT positions and salaries.
      • Active vendor contracts with payment schedules and amounts (including active multi-year agreements).
      • Cost projections for remainder of any projects that are committed or in-progress, including projected OpEx for ongoing maintenance and support.

      Future data

      • Estimated market value for any IT positions to be filled next year (both backfill of current vacancies and proposed net-new positions).
      • Pricing data on proposed vendor purchases or contracts.
      • Cost estimates for any capital/strategic projects that are being proposed but not yet committed, including resulting maintenance/support OpEx.
      • Any known pending credits to be received or applied in the next fiscal year.

      If you’re just getting started building a repeatable budgeting process, treat it like any other project, complete with a formal plan/ charter and a central repository for all related data, information, and in-progress and final documents.

      Once you’ve identified a repeatable approach that works for you, transition the budgeting project to a regular operational process complete with policies, procedures, and tools.

      Review last year’s budget vs. actuals

      This is the starting point for building your high-level rationale around what you’re proposing for next fiscal year.

      But first, some quick definitions:

      • Budgeted: What you planned to spend when you started the fiscal year.
      • Actual: What you ended up spending in real life by the end of the fiscal year.
      • Variance: The difference between budgeted expenditure and actual expenditure.

      For last fiscal year, pinpoint the following metrics and information:

      Budgeted and actual IT expenditure overall and by major cost category.

      Categories will include workforce (employees/contractors) and vendors (hardware, software, contracted services) at a minimum.

      Actual IT expenditure as a percentage of organizational revenue.

      This is a widely-used benchmark that your CFO will expect to see.

      The known and likely drivers behind budgeted vs. actual variances.

      Your rationales will affect your perceived credibility. Be straightforward, avoid defending or making excuses, and just show the facts.

      Ask your CFO what they consider acceptable variance thresholds for different cost categories to guide your variance analysis, such as 1% for overall IT expenditure.

      Actual IT CapEx and OpEx.

      CapEx is often more variable than OpEx over time. Separate them so you can see the real trends for each. Consider:

      • Sub-dividing CapEx by strategic projects and non-strategic “business as usual” spend (e.g. laptops, network maintenance gear).
      • Showing overall CapEx and OpEx as percentages of their organization-wide counterparts if that information is available.

      Next, review your five-year historical expenditure trends

      The longer-term pattern of IT expenditure can help you craft a narrative about the overarching story of IT.

      For the previous five fiscal years, focus on the following:

      Actual IT expenditure as a percentage of organizational revenue.

      Again, for historical years 2-5, you can break this down into granular cost categories like workforce, software, and infrastructure like you did for last fiscal year. Avoid getting bogged down and focusing on the past – you ultimately want to redirect stakeholders to the future.

      Percentage expenditure increase/decrease year to year.

      You may choose to show overall IT expenditure amounts, breakdowns by CapEx and OpEx, as well as high-level cost categories.

      As you go back in time, some data may not be available to you, may be unreliable or incomplete, or employ the same cost categories you’re using today. Use your judgement on the level of granularity you want to and can apply when going back two to five years in the past.

      So, what’s the trend? Consider these questions:

      • Is the year-over-year trend on a steady trajectory or are there notable dips and spikes?
      • Are there any one-time capital projects that significantly inflated CapEx and overall spend in a given year or that forced maintenance-and support-oriented OpEx commitments in subsequent years?
      • Does there seem to be an overall change in the CapEx-to-OpEx ratio due to factors like increased use of cloud services, outsourcing, or contract-based staff?

      Take a close look at financial data showcasing the cost-control measures you’ve taken

      Your CFO will look for evidence that you’re gaining efficiencies by controlling costs, which is often a prerequisite for them approving any new funding requests.

      Your objective here is threefold:

      1. Demonstrate IT’s track record of fiscal responsibility and responsiveness to business priorities.
      2. Acknowledge and celebrate your IT-as-cost-center efficiency gains to clear the way for more strategic discussions.
      3. Identify areas where you can potentially source and reallocate recouped funds to bolster other initiatives or business cases for net-new spend.

      This step is about establishing credibility, demonstrating IT value, building trust, and showing the CFO you’re on their team.

      Do the following:

      • List any specific cost-control initiatives and their initial objectives and targets.
      • Identify any changes made to those targets and your approaches due to changing conditions, with rationales for the decisions made. For example:
        • Mid-year, the business decided to allow approximately half the workforce to work from home on a permanent basis.
        • As a result, remote-worker demand on the service desk remained high and actually increased in some areas. You were unable to reduce service desk staff headcount as originally planned.
        • You’re now exploring ways to streamline ticket intake and assignment to increase throughput and speed resolution.
      • Report on completed cost-control initiatives first, including targets, actuals, and related impacts. Include select feedback from business stakeholders and users about the impact of your cost-control measure on them.
      • For in-progress initiatives, report progress made to-date, benefits realized to date, and plans for continuation next fiscal year.

      “Eliminate the things you don’t need. People will give you what you need when you need it if you’re being responsible with what you already have.”

      – Angela Hintz, VP of PMO & Integrated Services,
      Blue Cross and Blue Shield of Louisiana

      2.3 Review your historical IT expenditure

      8 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook.
      2. On Tab 1, “Historical Events & Projects,” note the cost-driving and cost-saving events that occurred last fiscal year that drove any variance between budgeted and actual expenditure. Describe the nature of their impact and current status (ongoing, resolved – temporary impact, or resolved – permanent impact).
      3. Also on Tab 1, “Historical Events & Projects”, summarize the work done on capital or strategic projects, expenditures, and status (in progress, deferred, canceled, or complete).
      4. On Tab 2, “Historical Expenditure”:
        1. Enter the budgeted and actuals data for last fiscal year in columns D-H for the views of the ITFM Cost Model you’re opted to do, i.e. CFO expense view, CIO service view, CXO business view, and CEO innovation view.
        2. Enter a brief rationale for any notable budgeted-versus-actuals variances or other interesting items in column K.
        3. Enter actuals data for the remaining past five fiscal years in columns L-O. Year-over-year comparative metrics will be calculated for you.
        4. Enter FTEs by business function in columns R-AA, rows 34-43.
          Expenditure per FTE and year-over year comparative metrics will be
          calculated for you.
      5. Using Tabs 2, “Historical Expenditure” and 3, “Historical Analysis”, review and analyze the resulting data sets and graphs to identify overall patterns, specifically notable increases or decreases in a particular category of expenditure or where rationales are repeated across categories or views (these are significant).
      6. Finally, flag any data points that help demonstrate achievement of, or progress toward, any cost-control measures you implemented.

      2.3 Review your historical IT expenditure

      InputOutputMaterialsParticipants
      • Budgeted data for the previous fiscal year and actuals data for the previous five fiscal years
      • Mapped budgeted for last fiscal year, mapped actuals for the past five fiscal years, and variance metrics and rationales
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Pull historical trends into a present-day context when setting your high-level goals

      What’s happening to your organization and the ecosystem within which it’s operating right now? Review current business concerns, priorities, and strategies.

      Knowing what happened in the past can provide good insights and give you a chance to show stakeholders your money-management track record. However, what stakeholders really care about is “now” and “next”. For them, it’s all about current business context.

      Ask these questions about your current context to assess the relevance of your historical trend data:

      What’s the state of
      the economy and how is
      it affecting your organization?

      What are the
      organization’s stated
      strategic goals and objectives?

      What has the business
      explicitly communicated
      about finance-related targets?

      What’s the business
      executive’s attitude on
      budget increase requests?

      Some industries are very sensitive to economic cycles, causing wild budget fluctuations year to year. This uncertainty can reduce the volume of spend you automatically carry over one year to the next, making past spend patterns less relevant to your current budgeting effort.

      These can change year to year as well, and often manifest on the CapEx side in the form of strategic projects selected. Since this is so variable, using previous years’ CapEx to determine next fiscal’s CapEx isn’t always useful except in regard to multi-year, ongoing capital projects.

      Do your best to honor mandates. However, if cuts are suggested that could jeopardize core service delivery, tread cautiously, and pick your battles. You may be able to halt new capital spend to generate cuts, but these projects may get approved anyway, with IT expected to make cuts to OpEx.

      If the CFO and others rail against even the most necessary inflation-driven increases, you’ll need to take a conservative approach, focus on cost-saving initiatives, and plan to redirect last year’s expenditures instead of pursuing net-new spend.

      Set metrics and targets for some broader budget effectiveness improvement efforts

      Budget goalsetting isn’t limited to CapEx and OpEx targets. There are several effectiveness metrics to track overall improvement in your budgeting process.

      Step back and think about other budget and expenditure goals you have.
      Do you want to:

      • Better align the budget with organizational objectives?
      • Increase cost forecasting accuracy?
      • Increase budget transparency and completeness?
      • Improve the effectiveness of your budget presentation?
      • Reduce the amount of budget rework?
      • Increase the percentage of the budget that’s approved?
      • Reduce variance between what was budgeted and actuals?

      Establish appropriate metrics and targets that will allow you to define success, track progress, and communicate achievement on these higher-level goals.

      Check out some example metrics in the table below.

      Budgeting metric

      Improvement driver

      Current value

      Future target

      Percentage of spend directly tied to an organizational goal.

      Better alignment via increased communication and partnership with the business.

      72%

      90%

      Number of changes to budget prior to final acceptance.

      Better accuracy and transparency via use of zero-based budgeting and enhanced stakeholder views.

      8

      2

      Percentage variance between budgeted vs. actuals.

      Improved forecasting through better understanding of business plans and in-cycle show-back.

      +4%

      +/-2%

      Percentage of budget approved after first presentation.

      Improved business rationales and direct mapping of expenditure to org priorities.

      76%

      95%

      Percentage of IT-driven project budget approved.

      More rigor around benefits, ROI calculation, and quantifying value delivered.

      80%

      100%

      Set your high-level OpEx budget targets

      The high-level targets you set now don’t need to be perfect. Think of them as reference points or guardrails to sanity-check the cost forecasting exercise to come.

      First things first: Zero-based or incremental for OpEx?

      Set your OpEx targets

      Incremental budgeting is the addition of a few percentage onto next year’s budget, assuming the previous year’s OpEx is all re-occurring. The percentage often aligns with rates of inflation.

      • Most organizations take this approach because it’s faster and easier.
      • However, incremental budgeting is less accurate. Non-recurring items are often overlooked and get included in the forecast, resulting in budget bloat. Also, redundant or wasteful items can be entirely missed, undermining any cost optimization efforts.

      Zero-based budgeting involves rebuilding your budget from scratch, i.e. zero. It doesn’t assume that any of last year’s costs are recurring or consistent year to year.

      • This approach is harder because all relevant historical spend data needs to be collected and reviewed, which not only takes time but the data you need may be unlocatable.
      • Every item needs to be re-examined, re-justified, and tied to an asset, service, or project, which means it’s a far more comprehensive and accurate approach.

      Pick a range of percentage change based on your business context and past spend.

      • If economic prospects are negative, start with a 0-3% increase to balance inflation with potential cuts. Don’t set concrete reduction targets at this point, to avoid tunnel vision in the forecasting exercise.
      • If economic prospects are positive, target 3-5% increases for stable scenarios and 6-10% increases for growth scenarios.
      • If CapEx from previous-year projects is switching to steady-state OpEx, then account for these bumps in OpEx.
      • If the benefits from any previous-year efficiency measures will be realized next fiscal year, then account for these as OpEx reductions.

      If cost-cutting or optimization is a priority, then a zero-based approach is the right decision. If doing this every year is too onerous, plan to do it for your OpEx at least every few years to examine what’s actually in there, clean house, and re-set.

      Set your high-level CapEx budget targets

      A lot of IT CapEx is conceived in business projects, so your proposed expenditure here may not be up to you. Exercise as much influence as you can.

      First things first: Is it project CapEx, or “business as usual” CapEx?

      Project CapEx is tied to one-time strategic projects requiring investment in new assets.

      • This CapEx will probably be variable year to year, going up or down depending on the organization’s circumstances or goals.
      • This area of spend is driven largely by the business and not IT. Plan to set project CapEx targets in close partnership with the business and function as a steward of these funds instead of as an owner.

      User-driven “business as usual” CapEx manifests via changes (often increases) in organizational headcount due to growth.

      • Costs here focus on end-user hardware like desktops, laptops, and peripherals.
      • Any new capital software acquisitions you have planned will also be affected in terms of number of licenses required.
      • Get reliable estimates of department-by-department hiring plans for next fiscal year to better account for these in your budget.

      Network/data center-driven “business-as-usual” CapEx is about core infrastructure maintenance.

      • Costs here focus on the purchase of network and data center hardware and other equipment to maintain existing infrastructure services and performance.
      • Increased outsourcing often drives down this area of “business as usual” CapEx by reducing the purchase of new on-premises solutions and eliminating network and data center maintenance requirements.

      Unanticipated hiring and the need to buy end-user hardware is cited as a top cause of budget grief by IT leaders – get ahead of this. Project CapEx, however, is usually determined via business-based capital project approval mechanisms well in advance. And don’t forget to factor in pre-established capital asset depreciation amounts generated by all the above!

      2.4 Set your high-level IT budget targets and metrics

      8 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook to document the outcomes of this activity.
      2. Review the context in which your organization is currently operating and expects to operate in the next fiscal year. Specifically, look at:
        1. The state of the economy.
        2. Stated goals, objectives, and targets.
        3. The executive’s point of view on budget increase requests.
        Document your factors, assessment, rationale, and considerations in the “Business Context Assessment” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook.
      3. Based on the business context, anticipated flips of former CapEx to OpEx, and realization of previous years’ efficiency measures, set a general non-project OpEx target as a percentage increase or decrease for next fiscal year to serve as a guideline in the cost forecasting guideline. Document this in the “Budget Targets & Metrics” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook. sed on known capital projects, changes in headcount, typical “business as usual” equipment expenditure, and pre-established capital asset depreciation amounts, set general project CapEx and non-project CapEx targets. Document these in the “Budget Targets & Metrics” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook.
      4. Finally, set your overarching IT budget process success metrics. Also document these in the “Budget Targets & Metrics” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook.

      Download the IT Cost Forecasting and Budgeting Workbook

      2.4 Set your high-level IT budget targets and metrics

      InputOutputMaterialsParticipants
      • Knowledge of current business context and probable context next fiscal year
      • Analysis of historical IT expenditure patterns
      • High-level project CapEx and non-project CapEx and OpEx targets for the next fiscal year
      • IT budget process success metrics
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Phase recap: Get into budget-starting position

      Now you’re ready to do the deep dive into forecasting your IT budget for next year.

      In this phase, you clarified your business context and defined your budgetary goals, including:

      • Assembling your resources. You’ve built and organized your IT budgeting team, as well as gathered the data and information you’ll need to do your historical expenditure analysis and future forecasting
      • Understanding the four views of the IT Cost Model. You’ve become familiar with the four views of the model and have selected which ones you’ll map for historical analysis and forecasting purposes.
      • Reviewing last year’s budget versus actuals and five-year historical trends. You now have the critical rationale-building context to inform next year’s numbers and demonstrate any cost efficiencies you’ve successfully executed.
      • Setting your high-level goals. You’ve established high-level targets for project and non-project CapEx and OpEx, as well as set some IT budget process improvement goals.

      “We only have one dollar but five things. Help us understand how to spend that dollar.”

      – Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association

      Phase 3

      Develop Your Forecasts

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Documenting the assumptions behind your proposed budget and develop alternative scenarios.
      • Forecasting your project CapEx.
      • Forecasting your non-project CapEx and OpEx.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Develop your forecasts

      Start making some decisions.

      This phase focuses on putting real numbers on paper based on the research and data you’ve collected. Here, you will:

      • Develop assumptions and alternative scenarios. The assumptions you make are the logical foundation for your decisions, and your primary and alternative scenarios focus your thinking and demonstrate that you’ve thoroughly examined your organization’s current and future context.
      • Forecast your project CapEx costs. These costs are comprised of all the project-related capital expenditures for strategic or capital projects, including in-house labor.
      • Forecast your non-project CapEx and OpEx costs. These costs are the ongoing “business as usual” expenditures incurred via the day-to-day operations of IT and delivery of IT services.

      “Our April forecast is what really sets the bar for what our increase is going to be next fiscal year. We realized that we couldn’t change it later, so we needed to do more upfront to get that forecast right.

      If we know that IT projects have been delayed, if we know we pulled some things forward, if we know that a project isn’t starting until next year, let’s be really clear on those things so that we’re starting from a better forecast because that’s the basis of deciding two percent, three percent, whatever it’s going to be.”

      – Kristen Thurber, IT Director, Office of the CIO, Donaldson Company

      When pinning down assumptions, start with negotiable and non-negotiable constraints

      Assumptions are things you hold to be true. They may not actually be true, but they are your logical foundation and must be shared with stakeholders so they can follow your thinking.

      Start with understanding your constraints. These are either negotiable (adjustable) or non-negotiable (non-adjustable). However, what is non-negotiable for IT may be negotiable for the organization as a whole, such as its strategic objectives. Consider each of the constraints below, determine how it relates to IT expenditure options, and decide if it’s ultimately negotiable or non-negotiable.

      Organizational

      Legal and Regulatory

      IT/Other

      Example:
      • Strategic goals and priorities
      • Financial and market performance
      • Governance style and methods
      • Organizational policies
      • Organizational culture
      • Regulatory compliance and reporting
      • Data residency and privacy laws
      • Vendor contract terms and conditions
      • Health and safety
      • Compensation and collective bargaining
      • IT funding and fund allocation flexibility
      • Staff/skills availability and capacity
      • Business continuity and IT performance requirements
      • Time and timeframes
      You’re in year one of a three-year vendor contract. All contracts are negotiable, but this one isn’t for two years. This contact should be considered a non-negotiable for current budget-planning purposes.

      Identifying your negotiable and non-negotiable constraints is about knowing what levers you can pull. Government entities have more non-negotiable constraints than private companies, which means IT and the organization as a whole have fewer budgetary levers to pull and a lot less flexibility.

      An un-pullable lever and a pullable lever (and how much you can pull it) have one important thing in common – they are all fundamental assumptions that influence your decisions.

      Brainstorm your assumptions even further

      The tricky thing about assumptions is that they’re taken for granted – you don’t always realize you’ve made them. Consider these common assumptions and test them for validity.

      My current employees will still be here 18 months from now.

      My current vendors aren’t going to discontinue the products we have.

      My organization’s executive team will be the same 18 months from now. My current key vendors will be around for years to come.

      My organization’s departments, divisions, and general structure will be the same 18 months from now.

      IT has to be an innovation leader.

      We won’t be involved in any merger/acquisition activity next fiscal year.

      IT has always played the same role here and that won’t change.

      There won’t be a major natural disaster that takes us offline for days or even weeks.

      We must move everything we can to the cloud.

      We won’t be launching any new products or services next fiscal year.

      Most of our IT expenditure has to be CapEx, as usual.

      You won’t put some of these assumptions into your final budget presentation. It’s simply worthwhile knowing what they are so you can challenge them when forecasting.

      Based on your assumptions, define the primary scenario that will frame your budget

      Your primary scenario is the one you believe is most likely to happen and upon which you’ll build your IT cost forecasts.

      Now it’s time to outline your primary scenario.

      • A scenario is created by identifying the variable factors embedded in your assumptions and manipulating them across the range of possibilities. This manipulation of variables will result in different scenarios, some more likely or feasible than others.
      • Your primary scenario is the one you believe is the most feasible and/or likely to happen (i.e. most probable). This is based on:
        • Your understanding of past events and patterns.
        • Your understanding of your organization’s current context.
        • Your understanding of IT’s current context.
        • Your understanding of the organization’s objectives.
        • Your assessment of negotiable and non-negotiable constraints and other assumptions for both IT and the organization.

      A note on probability…

      • A non-negotiable constraint doesn’t have any variables to manipulate. It’s a 100% probability that must be rigidly accommodated and protected in your scenario. An example is a long-standing industry regulation that shows no signs of being updated or altered and must be complied with in its current state.
      • A negotiable constraint has many more variables in play. Your goal is to identify the different potential values of the variables and determine the degree of probability that one value is more likely to be true or feasible than another. An example is that you’re directed to cut costs, but the amount could be as little as 3% or as much as 20%.
      • And then there are the unknowns. These are circumstances, events, or initiatives that inevitably happen, but you can’t predict when, what, or how much. This is what contingency planning and insurance are for. Examples include a natural disaster, a pandemic, a supply chain crisis, or the CEO simply changing their mind. Its safe to assume something is going to happen, so if you’re able to establish a contingency fund or mechanisms that let you respond, then do it.

      What could or will be your organization’s new current state at the end of next fiscal year?

      Next, explore alternative scenarios, even those that may seem a bit outrageous

      Offering alternatives demonstrates that you weighed all the pertinent factors and that you’ve thought broadly about the organization’s future and how best to support it.

      Primary scenario approval can be helped by putting that scenario alongside alternatives that are less attractive due to their cost, priority, or feasibility. Alternative scenarios are created by manipulating or eliminating your negotiable constraints or treating specific unknowns as knowns. Here are some common alternative scenarios.

      The high-cost scenario: Assumes very positive economic prospects. Characterized by more of everything – people and skills, new or more sophisticated technologies, projects, growth, and innovation. Remember to consider the long-term impact on OpEx that higher capital spend may bring in subsequent years.

      Target 10-20% more expenditure than your primary scenario

      The low-cost scenario: Assumes negative economic prospects or cost-control objectives. Characterized by less of everything, specifically capital project investment, other CapEx, and OpEx. Must assume that business service-level expectations will be down-graded and other sacrifices will be made.

      Target 5-15% less expenditure than your primary scenario

      The dark horse scenario: This is a more radical proposition that challenges the status quo. For example, what would the budget look like if all data specialists in the organization were centralized under IT? What if IT ran the corporate PMO? What if the entire IT function was 100% outsourced?

      No specific target

      Case Study

      INDUSTRY: Manufacturing

      SOURCE: Anonymous

      A manufacturing IT Director gets budgetary approval by showing what the business would have to sacrifice to get the cheap option.

      Challenge

      Solution

      Results

      A manufacturing business had been cutting costs endlessly across the organization, but specifically in IT.

      IT was down to the bone. The IT Director had already been doing zero-based budgeting to rationalize all expenditure, stretching asset lifecycles as long as possible, and letting maintenance work slide.

      There were no obvious options left to reduce costs based on what the business wanted to do.

      The IT Director got creative. He put together three complete budgets:

      1. The budget he wanted.
      2. A budget where everything was entirely outsourced and there would be zero in-house IT staff.
      3. A budget that was not as extreme as the second one, but still tilted toward outsourcing.

      In the budget presentation, he led with the “super cheap” budget where IT was 100% outsourced.

      He proceeded to review the things they wouldn’t have under the extreme outsourced scenario, including the losses in service levels that would be necessary to make it happen.

      The executive was shocked by what the IT Director showed them.

      The executive immediately approved the IT Director’s preferred budget. He was able to defend the best budget for the business by showing them what they stood to lose.

      3.1 Document your assumptions and alternative scenarios

      2 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook and document the outcomes of this activity on Tab 9, “Alternative Scenarios.”
      2. As a management team, identify and discuss your non-negotiable and negotiable constraints. Document these in rows 4 and 5 respectively in the Workbook.
      3. Brainstorm, list, and challenge any other assumptions being made by IT or the organization’s executive in terms of what can and cannot be done.
      4. Identify the most likely or feasible scenario (primary) and associated assumptions. You will base your initial forecasting on this scenario.
      5. Identify alternative scenarios. Document each scenario’s name, description, and key assumptions, and major opportunities in columns B-D on Tab 9, “Alternative Scenarios.” You will do any calculations for these scenarios after you have completed the forecast for your primary scenario.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Knowledge of organization’s context, culture, and operations
      • A list of assumptions that will form the logical foundation of your forecasting decisions
      • Identification of the primary budget scenario and alternatives
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Before diving into actual forecasting, get clear on project and non-project CapEx and OpEx

      Traditional, binary “CapEx vs. OpEx” distinctions don’t seem adequate for showing where expenditure is really going. We’ve added a new facet to help further differentiate one-time project costs from recurring “business as usual” expenses.

      Project CapEx
      Includes all workforce and vendor costs associated with planning and execution of projects largely focused on the acquisition or creation of new capital assets.

      Non-project CapEx
      Includes “business as usual” capital asset acquisition in the interest of managing, maintaining, or supporting ongoing performance of existing infrastructure or services, such as replacement network equipment, end-user hardware (e.g. laptops), or disaster recovery/business continuity redundancies. Also includes ongoing asset depreciation amounts.

      Non-project OpEx
      Includes all recurring, non-CapEx “business as usual” costs such as labor compensation and training, cloud-based software fees, outsourcing costs, managed services fees, subscriptions, and other discretionary spend.

      Depreciation is technically CapEx. However, for practical purposes, most organizations list it under OpEx, which can cause it to get lost in the noise. Here, depreciation is under non-project CapEx to keep its true CapEx nature visible and in the company of other “business as usual” capital purchases that will ultimately join the depreciation ranks.

      Forecast your project CapEx costs

      This process can be simple as far as overall budget forecasting is concerned. If it isn’t simple now, plan to make it simpler next time around.

      What to expect…

      • Ideally, the costs for all projects should have been thoroughly estimated, reviewed, and accepted by a steering committee, your CFO, or other approving entity at the start of the budgeting season, and funding already committed to. In a nutshell, forecasting your project costs should already have been done and will only require plugging in those numbers.
      • If projects have yet to be pitched and rubber stamped, know that your work is cut out for you. Doing things in a rush or without proper due diligence will result in certain costs being missed. This means that you risk going far over budget in terms of actuals next year, or having to borrow from other areas in your budget to cover unplanned or underestimated project costs.

      Key forecasting principles…

      Develop rigorous business cases
      Secure funding approval well in advance
      Tie back costs benefitting business units
      Consider the longer-term OpEx impact

      For more information about putting together sound business cases for different projects and circumstances, see the following Info-Tech blueprints:

      Build a Comprehensive Business Case

      Fund Innovation with a Minimum Viable Business Case

      Reduce Time to Consensus with an Accelerated Business Case

      Apply these project CapEx forecasting tips

      A good project CapEx forecast requires steady legwork, not last-minute fast thinking.

      Tip #1: Don’t surprise your approvers. Springing a capital project on approvers at your formal presentation isn’t a good idea and stands a good chance of rejection, so do whatever you can to lock these costs down well in advance.

      Tip #2: Project costs should be entirely comprised of CapEx if possible. Keep in mind that some of these costs will convert to depreciated non-project CapEx and non-project OpEx as they transition from project costs to ongoing “business as usual” costs, usually in the fiscal year following the year of expenditure. Creating projections for the longer-term impacts of these project CapEx costs on future types of expenditure is a good idea. Remember that a one-time project is not the same thing as a one-time cost.

      Tip #3: Capitalize any employee labor costs on capital projects. This ensures the true costs of projects are not underestimated and that operational staff aren’t being used for free at the expense of their regular duties.

      Tip #4: Capitalizing cloud costs in year one of a formal implementation project is usually acceptable. It’s possible to continue treating cloud costs as CapEx with some vendors via something called reserved instances, but organizations report that this is a lot of work to set up. In the end, most capitalized cloud will convert into non-project OpEx in years two and beyond.

      Tip #5: Build in some leeway. By the time a project is initiated, circumstances may have changed dramatically from when it was first pitched and approved, including business priorities and needs, vendor pricing, and skillset availability. Your costing may become completely out of date. It’s a good practice to work within more general cost ranges than with specific numbers, to give you the flexibility to respond and adapt during actual execution.

      3.2 Forecast your project CapEx

      Time: Depends on size of project portfolio

      1. Download the IT Cost Forecasting and Budgeting Workbook and navigate to Tab 5, “Project CapEx Forecast”. Add more columns as required. Enter the following for all projects:
        • Row 5 – Its name and/or unique identifier.
        • Row 6 – Its known or estimated project start/end dates.
        • Row 7 – Its status (in proposal, committed, or in progress).
      2. Distribute each project’s costs across the categories listed for each view you’ve selected to map. Do not include any OpEx here – it will be mapped separately under non-project OpEx.
      3. Rationalize your values. A running per-project total for each view, as well as totals for all projects combined, are in rows 16, 28, 39, and 43. Ensure these totals match or are very close across all the views you are mapping. If they don’t match, review the views that are lower-end outliers as there’s a good chance something has been overlooked.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Project proposals and plans, including cost estimations
      • A project CapEx forecast for next fiscal year
      MaterialsParticipants
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Forecast your non-project OpEx

      Most of your budget will be non-project OpEx, so plan to spend most of your forecasting effort here.

      What to expect…

      Central to the definition of OpEx is the fact that it’s ongoing. It rarely stops, and tends to steadily increase over time due to factors like inflation, rising vendor prices, growing organizational growth, increases in the salary expectations of employees, and other factors.

      The only certain ways to reduce OpEx are to convert it to capitalizable expenditure, decrease staffing costs, not pursue cloud technologies, or for the organization to simply not grow. For most organizations, none of these approaches are feasible. Smaller scale efficiencies and optimizations can keep OpEx from running amok, but they won’t change its overall upward trajectory over time. Expect it to increase.

      Key forecasting principles…

      Focus on optimization and efficiency.
      Aim for full spend transparency.
      Think about appropriate chargeback options.
      Give it the time it deserves.

      For more information about how to make the most out of your IT OpEx, see the following Info-Tech blueprints:

      Develop Your Cost Optimization Roadmap

      Achieve IT Spend & Staffing Transparency

      Discover the Hidden Costs of Outsourcing

      Apply these non-project OpEx forecasting tips

      A good forecast is in the details, so take a very close look to see what’s really there.

      Tip #1: Consider zero-based budgeting. You don’t have to do this every year, but re-rationalizing your OpEx every few years, or a just a segment of it on a rotational basis, will not only help you readily justify the expenditure but also find waste and inefficiencies you didn’t know existed.

      Tip #2: Capitalize your employee capital project work. While some organizations aren’t allowed to do this, others who can simply don’t bother. Unfortunately, this act can bloat the OpEx side of the equation substantially. Many regular employees spend a significant amount of their time working on capital projects, but this fact is invisible to the business. This is why the business keeps asking why it takes so many people to run IT.

      Tip #3: Break out your cloud vs. on-premises costs. Burying cloud apps costs in a generic software bucket works against any transparency ambitions you may have. If you have anything resembling a cloud strategy, you need to track, report, and plan for these costs separately in order to measure benefits realization. This goes for cloud infrastructure costs, too.

      Tip #4: Spend time on your CIO service view forecast. Completing this view counts as a first step toward service-based costing and is a good starting point for setting up an accurate service catalog. If looking for cost reductions, you’ll want to examine your forecasts in this view as there will likely be service-level reductions you’ll need to propose to hit your cost-cutting goals.

      Tip #5: Budget with consideration for chargeback. chargeback mechanisms for OpEx can be challenging to manage and have political repercussions, but they do shift accountability back to the business, guarantee that the IT bills get paid, and reduce IT’s OpEx burden. Selectively charging business units for applications that only they use may be a good entry point into chargeback. It may also be as far as you want to go with it. Doing the CXO business view forecast will provide insight into your opportunities here.

      Forecast your non-project CapEx

      These costs are often the smallest percentage of overall expenditure but one of the biggest sources of financial grief for IT.

      What to expect…

      • These costs can be hard to predict. Anticipating expenditure on end-user hardware such as laptops depends on knowing how many new staff will be hired by the organization next year. Predicting the need to buy networking hardware depends on knowing if, and when, a critical piece of equipment is going to spontaneously fail. You can never be completely sure.
      • IT often must reallocate funds from other areas of its budget to cover non-project CapEx costs. Unfortunately, keeping the network running and ensuring employees have access to that network is seen exclusively as an IT problem, not a business problem. Plan to change this mindset.

      Key forecasting principles…

      Discuss hiring plans with the business.
      Pay close attention to your asset lifecycles.
      Prepare to advise about depreciation schedules.
      Build in contingency for the unexpected.

      For more information about ensuring IT isn’t left in the lurch when it comes to non-project CapEx, see the following Info-Tech blueprints:

      Manage End-User Devices

      Develop an Availability and Capacity Management Plan

      Modernize the Network

      Apply these non-project CapEx forecasting tips

      A good forecast relies on your ability to accurately predict the future.

      Tip #1: Top up new hire estimations: Talk to every business unit leader about their concrete hiring plans, not their aspirations. Get a number, increase that number by 25% or 20 FTEs (whichever is less), and use this new number to calculate your end-user non-project CapEx.

      Tip #2: Make an arrangement for who’s paying for operational technology (OT) devices and equipment. OT involves specialized devices such as in-the-field sensors, scanners, meters, and other networkable equipment. Historically, operational units have handled this themselves, but this has created security problems and they still rely on IT for support. Sort the financials out now, including whose budget device and equipment purchases appear on, as well as what accommodations IT will need to make in its own budget to support them.

      Tip #3: Evaluate cloud infrastructure and managed services. These can dramatically reduce your non-project CapEx, particularly on the network and data center fronts. However, these solutions aren’t necessarily less expensive and will drive up OpEx, so tread cautiously.

      Tip #4: Definitely do an inventory. If you haven’t invested in IT asset management, put it on your project and budgetary agenda. You can’t manage what you don’t know you have, so asset discovery should be your first order of business. From there, start gathering asset lifecycle information and build in alerting to aid your spend planning.

      Tip #5: Think about retirement: What assets are nearing end of life or the end of their depreciation schedule? What impact is this having on non-project OpEx in terms of maintenance and support? Deciding to retire, replace, or extend an IT operational asset will change your non-project CapEx outlook and will affect costs in other areas.

      Tip #6: Create a contingency fund: You need one to deal with surprises and emergencies, so why wait?

      Document the organization’s projected FTEs by business function

      This data point is usually missing from IT’s budget forecasting data set. Try to get it.

      A powerful metric to share with business stakeholders is expenditure per employee or FTE. It’s powerful because:

      • It’s one of the few metrics that’s intuitively understood by most people
      • It can show changes in IT expenditure over time at both granular and general levels.

      This metric is one of the simplest to calculate. The challenge is in getting your hands on the data in the first place.

      • Most business unit leaders struggle to pin down this number in terms of actuals as they have difficulty determining what an FTE actually is. Does it include contract staff? Part-time staff? Seasonal workers? Volunteers and interns? And if the business unit has high turnover, this number can fluctuate significantly.
      • Encourage your business peers to produce a rational estimate. Unlike the headcount number you’re seeking to forecast for non-project capital expenditure for end-user hardware, this FTE number should strive to be more in the ballpark, as you’re not using it to ensure sufficient funds but comparatively track expenditure year to year.
      • Depending on your industry, employees or FTEs may not be the best measurement. Use what works best for you. Number of unique users is a common one. Other industry-specific examples include per student, per bed, per patient, per account, and per resident.

      Start to build in long-term and short-term forecasting into your budgeting process

      These are growing practices in mature IT organizations that afford significant flexibility.

      Short-term forecasting:

      Long-term forecasting:

      • At Donaldson Company, budgeting is a once-a-year event, but they’ve started formalizing a forecast review three times a year.
      • These mini-forecasts are not as full blown as the annual forecasting process. Rather, they look at specific parts of the budget and update it based on changing realities.

      “It’s a great step in the right direction. We look at
      the current, and then the future. What we’re really pushing is how to keep that outyear spend more in discussion. The biggest thing we’re trying to do when we approve projects is look at what does that approval do to outyear spend? Is it going to increase? Is it going to decrease? Will we be spending more on licensing? On people?”

      – Kristen Thurber, IT Director, Office of the CIO,
      Donaldson Company

      • In 2017, the Hawaii Medical Service Association accepted the fact that they were very challenged with legacy systems. They needed to modernize.
      • They created a multi-year strategic budget -- a five-year investment plan. This plan was a success. They were able to gain approval for a five-year horizon with variable allocations per year, as required.

      “This approach was much better. We now
      have a “guarantee” of funding for five years now – they’ve conceptually agreed. Now we don’t have
      to make that request for new money every time
      if we need more. We can vary the amount every
      year – it doesn’t have to be the same.”

      – Trisha Goya, Director, IT Governance & Administration,
      Hawaii Medical Service Association

      3.4 Forecast your non-project OpEx and CapEx

      Time: Depends on size of vendor portfolio and workforce

      1. Download the IT Cost Forecasting and Budgeting Workbook and navigate to Tab 4, “Business as Usual Forecast”. This tab assumes an incremental budgeting approach. Last year’s actuals have been carried forward for you to build upon.
      2. Enter expected percentage-based cost increases/decreases for next fiscal year for each of the following variables (columns E-I): inflation, vendor pricing, labor costs, service levels, and depreciation. Do this for all sub-categories for the ITFM cost model views you’ve opted to map. Provide rationales for your percentage values in column K.
      3. In columns M and N, enter the anticipated percentage allocation of cost to non-project CapEx versus non-project OpEx.
      4. In column O, rows 29-38, enter the projected FTEs for each business function (if available).
      5. If you choose, make longer-term, high-level forecasts for 2-3 years in the future in columns P-U. Performing longer-term forecasts for at least the CFO expense view categories is recommended.

      Download the IT Cost Forecasting and Budgeting Workbook

      Input Output
      • Last fiscal year’s actuals
      • Knowledge of likely inflation, vendor cost, and salary expectations for next fiscal year
      • Depreciation amounts
      • A non-project OpEx and CapEx forecast for next fiscal year
      Materials Participants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Case Study

      INDUSTRY: Insurance

      SOURCE: Anonymous

      Challenge

      Solution

      Results

      In his first run at the annual budgeting process, a new CIO received delivery dates from Finance and spent the next three months building the budget for the next fiscal year.

      He discovered that the organization had been underinvesting in IT for a long time. There were platforms without support, no accounting for currency exchange rates on purchases, components that had not be upgraded in 16 years, big cybersecurity risks, and 20 critical incidences a month.

      In his budget, the CIO requested a 22-24% increase in IT expenditure to deal with the critical gaps, and provided a detailed defense of his proposal

      But the new CIO’s team and Finance were frustrated with him. He asked his IT finance leader why. She said she didn’t understand what his direction was and why the budgeting process was taking so long – his predecessor did the budget in only two days. He would add up the contracts, add 10% for inflation, and that’s it.

      Simply put, the organization hadn’t taken budgeting seriously. By doing it right, the new CIO had inadvertently challenged the status quo.

      The CIO ended up under-executing his first budget by 12% but is tracking closer to plan this year. Significantly, he’s been able cut critical incidences from 20 down to only 2-3 per month.

      Some friction persists with the CFO, who sees him as a “big spender,” but he believes that this friction has forced him to be even better.

      Phase recap: Develop your forecasts

      The hard math is done. Now it’s time to step back and craft your final proposed budget and its key messages.

      This phase focused on developing your forecasts and proposed budget for next fiscal year. It included:

      • Developing assumptions and alternative scenarios. These will showcase your understanding of business context as well as what’s most likely to happen (or should happen) next year.
      • Forecasting your project CapEx costs. If these costs weren’t laid out already in formal, approved project proposals or plans, now you know why it’s the better approach for developing a budget.
      • Forecasting your non-project CapEx and OpEx costs. Now you should have more clarity and transparency concerning where these costs are going and exactly why they need to go there.

      “Ninety percent of your projects will get started but a good 10% will never get off the ground because of capacity or the business changes their mind or other priorities are thrown in. There are always these sorts of challenges that come up.”

      – Theresa Hughes, Executive Counselor,
      Info-Tech Research Group
      and Former IT Executive

      Phase 4

      Build Your Proposed Budget

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Pulling your forecasts together into a comprehensive IT budget for next fiscal year.
      • Double checking your forecasts to ensure they’re accurate.
      • Fine tuning the rationales behind your proposals.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Build your proposed budget

      Triple check your numbers and put the finishing touches on your approval-winning rationales.

      This phase is where your analysis and decision making finally come together into a coherent budget proposal. Key steps include:

      • Aggregating your numbers. This step involves pulling together your project CapEx, non-project CapEx, and non-project OpEx forecasts into a comprehensive whole and sanity-checking your expenditure-type ratios.
      • Stress-testing your forecasts. Do some detailed checks to ensure everything’s accounted for and you haven’t overlooked any significant information or factors that could affect your forecasted costs.
      • Challenging and perfecting your rationales. Your ability to present hard evidence and rational explanations in support of your proposed budget is often the difference between a yes or a no. Look at your proposals from different stakeholder perspectives and ask yourself, “Would I say yes to this if I were them?”

      “We don’t buy servers and licenses because we want to. We buy them because we have to. IT doesn’t need those servers out at our data center provider, network connections, et cetera. Only a fraction of these costs are to support us in the IT department. IT doesn’t have control over these costs because we’re not the consumers.”

      – Matt Johnson, IT Director Governance and Business Solutions, Milwaukee County

      Great rationales do more than set you up for streamlined budgetary approval

      Rationales build credibility and trust in your business capabilities. They can also help stop the same conversations happening year after year.

      Any item in your proposed budget can send you down a rabbit hole if not thoroughly defensible.

      You probably won’t need to defend every item, but it’s best to be prepared to do so. Ask yourself:

      • What areas of spend does the CFO come back to year after year? Is it some aspect of OpEx, such as workforce costs or cloud software fees? Is it the relationship between proposed project spend and business benefits? Provide detailed and transparent rationales for these items to start re-directing long-term conversations to more strategic issues.
      • What areas of spend seem to be recurring points of conflict with business unit leaders? Is it surprise spend that comes from business decisions that didn’t include IT? Is it business-unit leaders railing against chargeback? Have frank, information-sharing conversations focused on business applications, service-level requirements, and true IT costs to support them.
      • What’s on the CEO’s mind? Are they focused on entering a new overseas market, which will require capital investment? Are they interested in the potential of a new technology because competitors are adopting it? It may not be the same focus as last year, so ensure you have fresh rationales that show how IT will help deliver on these business goals.

      “Budgets get out of control when one department fails to care for the implications of change within another department's budget. This wastes time, reduces accuracy and causes conflict.”

      – Tara Kinney, Atomic Revenue, LLC.

      Rationalizing costs depends on the intention of the spend

      Not all spending serves the same purpose. Some types require deeper or different justifications than others.

      For the business, there are two main purposes for spend:

      1. Spending that drives revenues or the customer experience. Think in terms of return on investment (ROI), i.e. when will the expenditure pay for itself via the revenue gains it helps create?
      2. Spending that mitigates and manages risk. Think in terms of cost-benefit, i.e. what are the costs of doing something versus doing nothing at all?
      Source: Kris Blackmon, NetSuite Brainyard.

      “Approval came down to ROI and the ability to show benefits realization for years one, two, and three through five.”

      – Duane Cooney, Executive Counselor, Info-Tech Research Group, and Former Healthcare CIO

      Regardless of its ultimate purpose, all expenditure needs statements of assumptions, obstacles, and likelihood of goals being realized behind it.

      • What are the assumptions that went into the calculation?
      • Is the spend new or a reallocation (and from where)?
      • What’s the likelihood of realizing returns or benefits?
      • What are potential obstacles to realizing returns or benefits?

      Rationales aren’t only for capital projects – they can and should be applied to all proposed OpEx and CapEx. Business project rationales tend to drive revenue and the customer experience, demanding ROI calculations. Internal IT-projects and non-project expenditure are often focused on mitigating and managing risk, requiring cost-benefit analysis.

      First, make sure your numbers add up

      There are a lot of numbers flying around during a budgeting process. Now’s the time to get out of the weeds, look at the big picture, and ensure everything lines up.

      Overall

      Non-Project OpEx

      Non-Project CapEx

      Project CapEx

      • Is your proposed budget consistent with previous IT expenditure patterns?
      • Did you account for major known anomalies or events?
      • Is your final total in line with your CFO’s communicated targets and expectations?
      • Are your alternative scenarios realistic and reflective of viable economic contexts that your organization could find itself in in the near term?
      • Are the OpEx-to-CapEx ratios sensible?
      • Does it pass your gut check?
      • Did you research and verify market rates for employees and skill sets?
      • Did you research and verify likely vendor pricing and potential increases?
      • Are cost categories with variances greater than +5% backed up by defensible IT hiring plans or documented operational growth or improvement initiatives?
      • Have you accounted for the absorption of previous capital project costs into day-to-day management, maintenance, and support operations?
      • Do you have accurate depreciation amounts and timeframes for their discontinuation?
      • Are any variances driven by confirmed business plans to increase headcount, necessitating purchase of end-user hardware and on-premises software licenses?
      • Are any variances due to net-new planned/contingency purchases or the retirement of depreciable on-premises equipment?
      • Is funding for all capital projects represented reliable, i.e. has it been approved?
      • Are all in-progress, proposed, or committed project CapEx costs backed up with reliable estimates and full project documentation?
      • Do capital project costs include the capitalizable costs of employees working on those projects, and were these amounts deducted from non-project OpEx?
      • Have you estimated the longer-term OpEx impact of your current capital projects?

      4.1 Aggregate your proposed budget numbers and stress test your forecasts

      2 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook for this activity. If you have been using it thus far, the Workbook will have calculated your numbers for you across the four views of the ITFM Cost Model on Tab 7, “Proposed Budget”, including:
        1. Forecasted non-project OpEx, non-project CapEx (including depreciation values), project CapEx, and total values.
        2. Numerical and percentage variances from the previous year.
      2. Test and finalize your forecasts by applying the questions on the previous slide.
      3. Flag cost categories where large variances from the previous year or large numbers in general appear – you will need to ensure your rationales for these variances are rigorous in the next step.
      4. Make amendments if needed to Tabs 4, “Business as Usual Forecast” and 5, “Project CapEx Forecast” in the IT Cost Forecasting and Budgeting Workbook.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutputMaterialsParticipants
      • Final drafts of all IT cost forecasts
      • A final proposed IT budget
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Case Study

      INDUSTRY: Healthcare

      SOURCE: Anonymous

      Challenge

      Solution

      Results

      A senior nursing systems director needed the CIO’s help. She wanted to get a project off the ground, but it wasn’t getting priority or funding.

      Nurses were burning out. Many were staying one to two hours late per shift to catch up on patient notes. Their EHR platform had two problematic workflows, each taking up to about 15 minutes per nurse per patient to complete. These workflows were complex, of no value, and just not getting done. She needed a few million dollars to make the fix.

      The CIO worked with the director to do the math. In only a few hours, they realized that the savings from rewriting the workflows would allow them to hire over 500 full-time nurses.

      The benefits realized would not only help reduce nurse workload and generate savings, but also increase the amount of time spent with patients and number of patients seen overall. They redid the math several times to ensure they were right.

      The senior nursing systems director presented to her peers and leadership, and eventually to the Board of Directors. The Board immediately saw the benefits and promoted the project to first on the list ahead of all other projects.

      This collaborative approach to generating project benefits statements helped the CIO gain trust and pave the way for future budgets.

      The strength of your rationales will determine how readily your budget is approved

      When proposing expenditure, you need to thoroughly consider the organization’s goals, its governance culture, and the overall feasibility of what’s being asked.

      First, recall what budgets are really about.

      The completeness, accuracy, and granularity of your numbers and thorough ROI calculations for projects are essential. They will serve you well in getting the CFO’s attention. However, the numbers will only get you halfway there. Despite what some people think, the work in setting a budget is more about the what, how, and why – that is, the rationale – than about the how much.

      Next, revisit Phase 1 of this blueprint and review:

      • Your organization’s budgeting culture and processes.
      • The typical accountabilities, priorities, challenges, opportunities, and expectations associated with your CFO, CEO, and CXO IT budget stakeholders.
      • Your budgetary mandate as the head of IT.

      Then, look at each component of your proposed budget through each of these three rationale-building lenses.

      Business goals
      What are the organization’s strategic priorities?

      Governance culture
      How constrained is the decision-making process?

      Feasibility
      Can we make it happen?

      Linking proposed spend to strategic goals isn’t just for strategic project CapEx

      Tie in your “business as usual” non-project OpEx and CapEx, as well.

      Business goals

      What are the organization’s strategic priorities?

      Context

      This is all about external factors, namely the broader economic, political, and industry contexts in which the organization operates.

      Lifecycle position

      The stage the organization is at in terms of growth, stability, or decline will drive decisions, priorities, and the ability to spend or invest.

      Opportunities

      Context and lifecycle position determine opportunities, which are often defined in terms of potential cost savings
      or ROI.

      Tie every element in your proposed budget to an organizational goal.

      Non-project OpEx

      • Remember that OpEx is what comes from the realization of past strategic goals. If that past goal is still valid, then the OpEx that keeps that goal alive is, too.
      • Business viability and continuity are often unexpressed goals. OpEx directly supports these goals.
      • Periodically apply zero-based budgeting to OpEx to re-rationalize and identify waste.

      Non-project CapEx

      • Know the impact of any business growth goals on future headcount – this is essential to rationalize laptop/desktop and other end-user hardware spend.
      • Position infrastructure equipment spend in terms of having sufficient capacity to support growth goals as well as ensuring network/system reliability and continuity.
      • Leverage depreciation schedules as backup.

      Project CapEx

      • Challenge business-driven CapEx projects if they don’t directly support stated goals.
      • Ideally, the goal-supporting rationales for software, hardware, and workforce CapEx have been laid out in an already-approved project proposal. Refer to these plans.
      • If pitching a capital project at the last minute, especially an IT-driven one, expect a “no” regardless of how well it ties to goals.

      Your governance culture will determine what you need to show and when you show it

      The rigor of your rationales is entirely driven by “how things are done around here.”

      Governance Culture

      How rigorous/ constrained
      is decision-making?

      Risk tolerance

      This is the organization’s willingness to be flexible, take chances, make change, and innovate. It is often driven by legal and regulatory mandates.

      Control

      Control manifests in the number and nature of rules and how authority and accountability are centralized or distributed in the organization.

      Speed to action

      How quickly decisions are made and executed upon is determined by the amount of consultation and number of approval steps.

      Ensure all parts of your proposed budget align with what’s tolerated and allowed.

      Non-project OpEx

      • Don’t hide OpEx. If it’s a dirty word, put it front and center to start normalizing it.
      • As with business goals, position OpEx as necessary for business continuity and risk mitigation, as well as the thing that keeps long-term strategic goals alive.
      • Focus on efficiency and cost control, both in terms of past and future initiatives, regardless of the governance culture.

      Non-project CapEx

      • Treat non-project CapEx in the same way as you would non-project OpEx.
      • IT must make purchases quickly in this area of spend, but drawn-out procurement processes can make this impossible. Consider including a separate proposal to establish a policy that gives IT the control to make end-user and network/data center equipment purchases faster and easier.

      Project CapEx

      • If your organization is risk-averse, highly centralized, or slow to act, don’t expect IT to win approval for innovative capital projects. Let the business make any pitches and have IT serve in a supporting role.
      • Capital projects are often committed to 6-12 months in advance and can’t be completed within a fiscal year. Nudge the organization toward longer-term, flexible funding.

      No matter which way your goals and culture lean, ground all your rationales in reality

      Objective, unapologetic facts are your strongest rationale-building tool.

      Feasibility

      Can we do it, and what sacrifices will we have to make?

      Funding

      The ultimate determinant of feasibility is the availability, quantity, and reliability of funding next fiscal year and over the long term to support investment.

      Capabilities

      Success hinges on both the availability and accessibility of required skills and knowledge to execute on a spend plan in the required timeframe.

      Risk

      Risk is not just about obstacles to success and what could happen if you do something – it’s also about what could happen if you do nothing at all.

      Vet every part of your proposed budget to ensure what you’re asking for is both realistic and possible.

      Non-project OpEx

      • Point out your operational waste-reduction and efficiency-gaining efforts in hard, numerical terms.
      • Clearly demonstrate that OpEx cannot be reduced without sacrifices on the business side, specifically in terms of service levels.
      • Define OpEx impacts for all CapEx proposals to ensure funding commitments include long-term maintenance and support.

      Non-project CapEx

      • This is a common source of surprise budget overage, and IT often sacrifices parts of its OpEx budget to cover it. Shed light on this problem and define IT’s boundaries.
      • A core infrastructure equipment contingency fund and a policy mandating business units pay for unbudgeted end-user tech due to unplanned or uncommunicated headcount increases are worth pursuing.

      Project CapEx

      • Be sure IT is involved with every capital project proposal that has a technological implication (which is usually all of them).
      • Specifically, IT should take on responsibility for tech vendor evaluation and negotiation. Never leave this up to the business.
      • Ensure IT gains funding for supporting any technologies acquired via a capital planning process, including hiring if necessary.

      Double-check to ensure your bases are covered

      Detailed data and information checklist:

      • I have the following data and information for each item of proposed expenditure:
      • Sponsors, owners, and/or managers from IT and the business.
      • CapEx and OpEx costs broken down by workforce (employees/contract) and vendor (software, hardware, services) at a minimum for both last fiscal year (if continuing spend) and next fiscal year to demonstrate any changes.
      • Projected annual costs for the above, extending two to five years into the future, with dates when new spending will start, known depreciations will end, and CapEx will transition to OpEx.
      • Descriptions of any tradeoffs or potential obstacles.
      • Lifespan information for new, proposed assets informing depreciation scheduling.
      • Sources of funding (especially if new, transferred, or changed).
      • Copies of any research used to inform any of the above.

      High-level rationale checklist:

      • I have done the following thinking and analysis for each item of proposed expenditure:
      • Considered it in the context of my organization’s broader operating environment and the constraints and opportunities this creates.
      • Tied it – directly or indirectly – to the achievement or sustainment of current or past (but still relevant) organizational goals.
      • Understood my organization’s tolerances, how things get done, and whether I can win any battles that I need to fight given these realities.
      • Worked with business unit leaders to fully understand their plans and how IT can support them.
      • Obtained current, verifiable data and information and have a good idea if, when, and how this information may change next year.
      • Assessed benefits, risks, dependencies, and overall feasibility, as well as created ROI statements where needed.
      • Stuck to the facts and am confident they can speak for themselves.

      For more on creating detailed business cases for projects and investments, see Info-Tech’s comprehensive blueprint, Build a Comprehensive Business Case.

      4.2 Challenge and perfect your rationales

      2 hours

      1. Based on your analysis in Phase 1, review your organization’s current and near-term business goals (context, lifecycle position, opportunities), governance culture (risk tolerance, control, speed to action), and feasibility (funding, capabilities, risk) to understand what’s possible, what’s not, and your general boundaries.
      2. Review your proposed budget in its current form and flag items that may be difficult or impossible to sell, given the above.
      3. Systematically go through each item in you proposed budget and apply the detailed data and information and high-level rationale checklists on the previous slide to ensure you have considered it from every angle and have all the information you need to defend it.
      4. Track down any additional information needed to fill gaps and fine-tune your budget based on any discoveries, including eliminating or adding elements if needed.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Final drafts of all IT cost forecasts, including rationales
      • Fully rationalized proposed IT budget for next fiscal year
      MaterialsParticipants
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Phase recap: Build your proposed budget

      You can officially say your proposed IT budget is done. Now for the communications part.

      This phase is where everything came together into a coherent budget proposal. You were able to:

      • Aggregate your numbers. This involved pulling for project and non-project CapEx and OpEx forecasts into a single proposed IT budget total.
      • Stress-test your forecasts. Here, you ensured that all your numbers were accurate and made sense.
      • Challenge and perfect your rationales. Finally, you made sure you have all your evidence in place and can defend every component in your proposed IT budget regardless of who’s looking at it.

      “Current OpEx is about supporting and aligning with past business strategies. That’s alignment. If the business wants to give up on those past business strategies, that’s up to them.”

      – Darin Stahl, Distinguished Analyst and Research Fellow, Info-Tech Research Group

      Phase 5

      Create and Deliver Your Presentation

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Planning the content you’ll include in your budget presentation.
      • Pulling together your formal presentation.
      • Presenting, finalizing, and submitting your budget.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Create and deliver your presentation

      Pull it all together into something you can show your approvers and stakeholders and win IT budgetary approval.

      This phase focuses on developing your final proposed budget presentation for delivery to your various stakeholders. Here you will:

      • Plan your final content. Decide the narrative you want to tell and select the visualizations and words you want to include in your presentation (or presentations) depending on the makeup of your target audience.
      • Build your presentation. Pull together all the key elements in a PowerPoint template in a way that best tells the IT budget story.
      • Present to stakeholders. Deliver your IT budgetary message.
      • Make final adjustments and submit your budget. Address any questions, make final changes, and deconstruct your budget into the account categories mandated by your Finance Department to plug into the budget template they’ve provided.

      “I could have put the numbers together in a week. The process of talking through what the divisions need and spending time with them is more time consuming than the budget itself.”

      – Jay Gnuse, IT Director, Chief Industries

      The content you select to present depends on your objectives and constraints

      Info-Tech classifies potential content according to three basic types: mandatory, recommended, and optional. What’s the difference?

      Mandatory: Just about every CFO or approving body will expect to see this information. Often high level in nature, it includes:

      • A review of last year’s performance.
      • A comparison of proposed budget totals to last year’s actuals.
      • A breakdown of CapEx vs. OpEx.
      • A breakdown of proposed expenditure according to traditional workforce and vendor costs.

      Recommended: This information builds on the mandatory elements, providing more depth and detail. Inclusion of recommended content depends on:

      • Availability of the information.
      • Relevance to a current strategic focus or overarching initiative in the organization.
      • Known business interest in the topic, or the topic’s ability to generate interest in IT budgetary concerns in general.

      Optional: This is very detailed information that provides alternative views and serves as reinforcement of your key messages. Consider including it if:

      • You need to bring fuller transparency to a murky IT spending situation.
      • Your audience is open to it, i.e. it wouldn’t be seen as irrelevant, wasting their time, or a cause of discord.
      • You have ample time during your presentation to dive into it.

      Deciding what to include or exclude depends 100% on your target audience. What will fulfill their basic information needs as well as increase their engagement in IT financial issues?

      Revisit your assumptions and alternative scenarios first

      These represent the contextual framework for your proposal and explain why you made the decisions you did.

      Stating your assumptions and presenting at least two alternative scenarios helps in the following ways:

      1. Identifies the factors you considered when setting budget targets and proposing specific expenditures, and shows that you know what the important factors are.
      2. Lays the logical foundation for all the rationales you will be presenting.
      3. Demonstrates that you’ve thought broadly about the future of the organization and how IT is best able to support that future organization regardless of its state and circumstances.

      Your assumptions and alternative scenarios may not appear back-to-back in your presentation, yet they’re intimately connected in that every unique scenario is based on adjustments to your core assumptions. These tweaks – and the resulting scenarios – reflect the different degrees of probability that a variable is likely to land on a certain value (i.e. an alternative assumption).

      Your primary scenario is the one you believe is most likely to happen and is represented by the complete budget you’re recommending and presenting.

      Target timeframe for presentation: 2 minutes

      Key objectives: Setting context, demonstrating breadth of thought.

      Potential content for section:

      • List of assumptions for the budget being presented (primary target scenario).
      • Two or more alternative scenarios.

      “Things get cut when the business
      doesn’t know what something is,
      doesn’t recognize it, doesn’t understand it. There needs to be an education.”

      – Angie Reynolds, Principal Research Director, ITFM Practice,
      Info-Tech Research Group,

      Select your assumptions and scenarios

      See Tabs “Planning Variables” and 9, “Alternative Scenarios” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Core assumptions

      Primary target scenario

      Alternative scenarios

      Full alternative scenario budgets

      List

      Slide

      Slide

      Budget

      Mandatory: This is a listing of both internal and external factors that are most likely to affect the challenges and opportunities your organization will have and how it can and will operate. This includes negotiable and non-negotiable internal and external constraints, stated priorities, and the expression of known risk factors.

      Mandatory: Emanating from your core assumptions, this scenario is a high-level statement of goals, initial budget targets, and proposed budget based on your core assumptions.

      Recommended: Two alternatives are typical, with one higher spend and one lower spend than your target. The state of the economy and funding availability are the assumptions usually tweaked. More radical scenarios, like the cost and implications of completely outsourcing IT, can also be explored.

      Optional: This is a lot of work, but some IT leaders do it if an alternative scenario is a strong contender or is necessary to show that a proposed direction from the business is costly or not feasible.

      The image contains screenshots of tab Planning Variables and Alternative Scenarios.

      The first major section of your presentation will be a retrospective

      Plan to kick things off with a review of last year’s results, factors that affected what transpired, and longer-term historical IT expenditure trends.

      This retrospective on IT expenditure is important for three reasons:

      1. Clarifying definitions and the different categories of IT expenditure.
      2. Showing your stakeholders how, and how well you aligned IT expenditure with business objectives.
      3. Setting stakeholder expectations about what next year’s budget will look like based on past patterns.

      You probably won’t have a lot of time for this section, so everything you select to share should pack a punch and perform double duty by introducing concepts you’ll need your stakeholders to have internalized when you present next year’s budget details.

      Target timeframe for presentation: 7 minutes

      Key objectives: Definitions, alignment, expectations-setting.

      Potential content for section:

      • Last fiscal year budgeted vs. actuals
      • Expenditure by type
      • Major capital projects completed
      • Top vendor spend
      • Drivers of last year’s expenditures and efficiencies
      • Last fiscal year in in detail (expense view, service view, business view, innovation view)
      • Expenditure trends for the past five years

      “If they don’t know the consequences of their actions, how are they ever going to change their actions?”

      – Angela Hintz, VP of PMO & Integrated Services,
      Blue Cross and Blue Shield of Louisiana

      Start at the highest level

      See Tabs 1 “Historical Events & Projects,” 3 “Historical Analysis,” and 6 “Vendor Worksheet” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Total budgeted vs. total actuals

      Graph

      Mandatory: Demonstrates the variance between what you budgeted for last year and what was actually spent. Explaining causes of variance is key.

      l actuals by expenditure type

      Graph

      Mandatory: Provides a comparative breakdown of last year’s expenditure by non-project OpEx, non-project CapEx, and project CapEx. This offers an opportunity to explain different types of IT expenditure and why they’re the relative size they are.

      Major capital projects completed

      List

      Mandatory: Illustrates progress made toward strategically important objectives.

      Top vendors

      List

      Recommended: A list of vendors that incurred the highest costs, including their relative portion of overall expenditure. These are usually business software vendors, i.e. tools your stakeholders use every day. The number of vendors shown is up to you.

      The image contains screenshots from Tabs 1, 3, and 6 of the IT Cost Forecasting and Budgeting Workbook.

      Describe drivers of costs and savings

      See Tab 1, “Historical Events & Projects” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Cost drivers

      List

      Mandatory: A list of major events, circumstances, business decisions, or non-negotiable factors that necessitated expenditure. Be sure to focus on the unplanned or unexpected situations that caused upward variance.

      Savings drivers

      List

      Mandatory: A list of key initiatives pursued, or circumstances that resulted in efficiencies or savings. Include any deferred or canceled projects.

      The image contains screenshots from Tab 1 of the IT Cost Forecasting and Budgeting Workbook.

      Also calculate and list the magnitude of costs incurred or savings realized in hard financial terms so that the full impact of these events is truly understood by your stakeholders.

      “What is that ongoing cost?
      If we brought in a new platform, what
      does that do to our operating costs?”

      – Kristen Thurber, IT Director, Office of the CIO, Donaldson Company

      End with longer-term five-year trends

      See Tab 3 “Historical Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      IT actual expenditure
      year over year

      Graph

      Mandatory: This is crucial for showing overall IT expenditure patterns, particularly percentage changes up or down year to year, and what the drivers of those changes were.

      IT actuals as a % of organizational revenue

      Graph

      Mandatory: You need to set the stage for the proposed percentage of organizational revenue to come. The CFO will be looking for consistency and an overall decreasing pattern over time.

      IT expenditure per FTE year over year

      Graph

      Optional: This can be a powerful metric as it’s simple and easily to understand.

      The image contains screenshots from Tab 3 of the IT Cost Forecasting and Budgeting Workbook.

      The historical analysis you can do is endless. You can generate many more cuts of the data or go back even further – it’s up to you.

      Keep in mind that you won’t have a lot of time during your presentation, so stick to the high-level, high-impact graphs that demonstrate overarching trends or themes.

      Show different views of the details

      See Tab 3 “Historical Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Budgeted vs. actuals CFO expense view

      Graph

      Mandatory: Showing different types of workforce expenditure compared to different types of vendor expenditure will be important to the CFO.

      Budgeted vs. actuals CIO services view

      Graph

      Optional: Showing the expenditure of some IT services will clarify the true total costs of delivering and supporting these services if misunderstandings exist.

      Budgeted vs. actuals CXO business view

      Graph

      Optional: A good way to show true consumption levels and the relative IT haves and have-nots. Potentially political, so consider sharing one-on-one with relevant business unit leaders instead of doing a big public reveal.

      Budgeted vs. actual CEO innovation view

      Graph

      Optional: Clarifies how much the organization is investing in innovation or growth versus keeping the lights on. Of most interest to the CEO and possibly the CFO, and good for starting conversations about how well funding is aligned with strategic directions.

      The image contains screenshots from Tab 3 of the IT Cost Forecasting and Budgeting Workbook.

      5.1a Select your retrospective content

      30 minutes

      1. Open your copy of the IT Cost Forecasting and Budgeting Workbook.
      2. From Tabs 1, “Historical Events & Projects, 3 “Historical Analysis”, and 6, “Vendor Worksheet,” select the visual outputs (graphs and lists) you plan to include in the retrospective section of your presentation. Consider the following when determining what to include or exclude:
        1. Fundamentals: Elements such as budgeted vs. actual, distribution across expenditure types, and drivers of variance are mandatory.
        2. Key clarifications: What expectations need to be set or common misunderstandings cleared up? Strategically insert visuals that introduce and explain important concepts early.
        3. Your time allowance. Plan for a maximum of seven minutes for every half hour of total presentation time.
      3. Note what you plan to include in your presentation and set aside.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Data and graphs from the completed IT Cost Forecasting and Budgeting Workbook
      • Selected content and visuals for the historical/ retrospective section of the IT Budget Executive Presentation
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Next, transition from past expenditure to your proposal for the future

      Build a logical bridge between what happened in the past to what’s coming up next year using a comparative approach and feature major highlights.

      This transitional phase between the past and the future is important for the following reasons:

      1. It illustrates any consistent patterns of IT expenditure that may exist and be relevant in the near term.
      2. It sets the stage for explaining any deviations from historical patterns that you’re about to propose.
      3. It grounds proposed IT expenditure within the context of commitments made in previous years.

      Consider this the essential core of your presentation – this is the key message and what your audience came to hear.

      Target timeframe for presentation: 10 minutes

      Key objectives: Transition, reveal proposed budget.

      Potential content for section:

      • Last year’s actuals vs. next year’s proposed.
      • Next year’s proposed budget in context of the past five years’ year-over-year actuals.
      • Last year’s actual expenditure type distribution vs. next year’s proposed budget distribution.
      • Major projects to be started next year.

      “The companies...that invest the most in IT aren’t necessarily the best performers.
      On average, the most successful small and medium companies are more frugal when it comes to
      company spend on IT (as long as they do it judiciously).”

      – Source: Techvera, 2023

      Compare next year to last year

      See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Last year’s total actuals vs. next year’s total forecast

      Proposed budget in context: Year-over-year expenditure

      Last year’s actuals vs. next year’s proposed by expenditure type

      Last year’s expenditure per FTE vs. next year’s proposed

      Graph

      Graph

      Graph

      Graph

      Mandatory: This is the most important graph for connecting the past with the future and is also the first meaningful view your audience will have of your proposed budget for next year.

      Mandatory: Here, you will continue the long-term view introduced in your historical data by adding on next year’s projections to your existing five-year historical trend. The percentage change from last year to next year will be the focus.

      Recommended: A double-comparative breakdown of last year vs. next year by non-project OpEx, non-project CapEx, and project CapEx illustrates where major events, decisions, and changes are having their impact.

      Optional: This graph is particularly useful in demonstrating the success of cost-control if the actual proposed budget is higher that the previous year but the IT cost per employee has gone down.

      The image contains screenshots from Tab 8 of the IT Cost Forecasting and Budgeting Workbook.

      Select business projects to profile

      See Tab 5, “Project CapEx Forecast” in your IT Cost Forecasting and Budgeting Workbook for the data and information to create these outputs.

      Major project profile

      Slide

      Mandatory: Focus on projects for which funding is already committed and lean toward those that are strategic or clearly support business goal attainment. How many you profile is up to you, but three to five is suggested.

      Minor project overview

      List

      Optional: List other projects on IT’s agenda to communicate the scope of IT’s project-related responsibilities and required expenditure to be successful. Include in-progress projects that will be completed next year and net-new projects on the roster.

      The image contains screenshots from Tab 5 of the IT Cost Forecasting and Budgeting Workbook.

      You can’t profile every project on the list, but it’s important that your stakeholders see their priorities clearly reflected in your budget; projects are the best way to do this.

      If you’ve successfully pre-sold your budget and partnered with business-unit leaders to define IT initiatives, your stakeholders should already be very familiar with the project summaries you put in front of them in your presentation.

      5.1b Select your transitional past-to-future content

      30 minutes

      1. Open your copy of the IT Cost Forecasting and Budgeting Workbook.
      2. From Tabs 5, “Project CapEx Forecast” and 7, “Proposed Budget Analysis”, select the visual outputs (graphs and lists) you plan to include in the transitional section of your presentation. Consider the following when determining what to include or exclude:
        1. Shift from CapEx to OpEx: If this has been a point of contention or confusion with your CFO in the past, or if your organization has actively committed to greater cloud or outsourcing intensity, you’ll want to show this year-to-year shift in expenditure type.
        2. Strategic priorities: Profile major capital projects that reflect stakeholder priorities. If your audience is already very familiar with these projects, you may be able to skip detailed profiles and simply list them.
        3. Your time allowance. Plan for a maximum of 10 minutes for every half hour of total presentation time.
      3. Note what you plan to include in your presentation and set aside.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Data and graphs from the completed IT Cost Forecasting and Budgeting Workbook
      • Selected content and visuals for the past-to-future transitional section of the IT Budget Executive Presentation
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Finally, carefully select detailed drill-downs that add clarity and depth to your proposed budget

      The graphs you select here will be specific to your audience and any particular message you need to send.

      This detailed phase of your presentation is important because it allows you to:

      1. Highlight specific areas of IT expenditure that often get buried under generalities.
      2. View your proposed budget from different perspectives that are most meaningful to your audience, such as traditional workforce vs. vendor allocations, expenditure by IT service, business-unit consumption, and the allocation of funds to innovation and growth versus daily IT operations.
      3. Get stakeholder attention. For example, laying out exactly how much money will be spent next year in support of the Sales Department compared to other units will get the VP of Sales’ attention…and everyone else’s, for that matter. This kind of transparency is invaluable for enabling meaningful conversations and thoughtful decision-making about IT spend.

      Target timeframe for presentation: 7 minutes, but this phase of the presentation may naturally segue into the final Q&A.

      Key objectives: Transparency, dialogue, buy-in.

      Potential content for section:

      • Allocation across workforce vs. vendors
      • Top vendors by expenditure
      • Allocation across on-premises vs. cloud
      • Allocation across core IT services
      • Allocation across core business units
      • Allocation across business focus area

      “A budget is a quantified version of
      your service-level agreements.”

      – Darin Stahl, Distinguished Analysis & Research Fellow,
      Info-Tech Research Group,

      Start with the expense view details

      See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Proposed budget: Workforce and vendors by expenditure type

      Graph

      Mandatory: This is the traditional CFO’s view, so definitely show it. The compelling twist here is showing it by expenditure type, i.e. non-project OpEx, non-project CapEx, and project CapEx.

      Proposed budget: Cloud vs. on-premises vendor expenditure

      Graph

      Optional: If this is a point of contention or if an active transition to cloud solutions is underway, then show it.

      Top vendors

      Graph

      Recommended: As with last year’s actuals, showing who the top vendors are slated to be next year speaks volumes to stakeholders about exactly where much of their money is going.

      If you have a diverse audience with diverse interests, be very selective – you don’t want to bore them with things they don’t care about.

      The image contains screenshots from Tab 8 of the IT Cost Forecasting and Budgeting Workbook.

      Offer choice details on the other views

      See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Proposed budget: IT services by expenditure type

      Graph

      Optional: Business unit leaders will be most interested in the application services. Proposed expenditure on security and data and BI services may be of particular interest given business priorities. Don’t linger on infrastructure spend unless chargeback is in play.

      Proposed budget: Business units by expenditure type

      Graph

      Optional: The purpose of this data is to show varying business units where they stand in terms of consumption. It may be more appropriate to show this graph in a one-on-one meeting or other context.

      Proposed budget: Business focus by expenditure type

      Graph

      Optional: The CEO will care most about this data. If they’re not in the room, then consider bypassing it and discuss it separately with the CFO.

      Inclusion of these graphs really depends on the makeup of your audience. It’s a good decision to show all of them to your CFO at some point before the formal presentation. Consider getting their advice on what to include and exclude.

      The image contains screenshots from Tab 8 of the IT Cost Forecasting and Budgeting Workbook.

      5.1c Select next year’s expenditure sub-category details

      30 minutes

      1. Open your copy of the IT Cost Forecasting and Budgeting Workbook.
      2. From Tab 8, “Proposed Budget Analysis,” select the visual outputs (graphs) you plan to include in the targeted expenditure sub-category details section of your presentation. Consider the following when determining what to include or exclude:
        1. The presence of important fence-sitters. If there are key individuals who require more convincing, this is where you show them the reality of what it costs to deliver their most business-critical IT services to them.
        2. The degree to which you’ve already gone over the numbers previously with your audience. Again, if you’ve done your pre-selling, this data may be old news and not worth going over again.
        3. Your time allowance. Plan for a maximum of seven minutes for every half hour of total presentation time.
      3. Note what you plan to include in your presentation and set aside.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Data and graphs from the completed IT Cost Forecasting and Budgeting Workbook
      • Selected content and visuals for the expenditure category details section of the IT Budget Executive Presentation
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Finalize your line-up and put your selected content into a presentation template

      This step is about nailing down the horizontal logic of the story you want to tell. Start by ordering and loading the visualizations of your budget data.

      Download Info-Tech’s IT Budget Executive Presentation Template

      The image contains a screenshot of the IT Budget Executive Presentation Template.

      If you prefer, use your own internal presentation standard template instead and Info-Tech’s template as a structural guide.

      Regardless of the template you use, Info-Tech recommends the following structure:

      1. Summary: An overview of your decision-making assumptions, initial targets given the business context, and the total proposed IT budget amount.
      2. Retrospective: An overview of previous years’ performance, with a specific focus on last fiscal year.
      3. Proposed budget overview: A high-level view of the proposed budget for next fiscal year in the context of last year’s performance (i.e. the bridge from past to future), including alternative scenarios considered and capital projects on the roster.
      4. Proposed budget details by category: Detailed views of the proposed budget by expense type, IT service, business unit, and business focus category.
      5. Next steps: Include question-and-answer and itemization of your next actions through to submitting your final budget to the CFO.

      Draft the commentary that describes and highlights your data’s key messages

      This is where the rationales that you perfected earlier come into play.

      Leave the details for the speaker’s notes.
      Remember that this is an executive presentation. Use tags, pointers, and very brief sentences in the body of the presentation itself. Avoid walls of text. You want your audience to be listening to your words, not reading a slide.

      Speak to everything that represents an increase or decrease of more than 5% or that simply looks odd.
      Being transparent is essential. Don’t hide anything. Acknowledge the elephant in the room before your audience does to quickly stop suspicious or doubtful thoughts

      Identify causes and rationales.
      This is why your numbers are as they are. However, if you’re not 100% sure what all driving factors are, don’t make them up. Also, if the line between cause and effect isn’t straight, craft in advance a very simple way of explaining it that you can offer whenever needed.

      Be neutral and objective in your language.
      You need to park strong feelings at the door. You’re presenting rational facts and thoroughly vetted recommendations. The best defense is not to be defensive, or even offensive for that matter. You don’t need to argue, plead, or apologize – let your information speak for itself and allow the audience to arrive at their own logical conclusions.

      Re-emphasize your core themes to create connections.
      If a single strategic project is driving cost increases across multiple cost categories, point it out multiple times if needed to reinforce its importance. If an increase in one area is made possible by a significant offset in another, say so to demonstrate your ongoing commitment to efficiencies. If a single event from last year will continue having cost impacts on several IT services next year, spell this out.

      5.2 Develop an executive presentation

      Duration: 2 hours

      1. Download the IT Budget Executive Presentation PowerPoint template.
      2. Open your working version of the IT Cost Forecasting and Budgeting Workbook and copy and paste your selected graphs and tables into the template. Note: Pasting as an image will preserve graph formatting.
      3. Incorporate observations and insights about your proposed budget and other analysis into the template where indicated.
      4. Conduct an internal review of the final presentation to ensure it includes all the elements you need and is error-free.

      Note: Refer to your organization’s standards and norms for executive-level presentations and either adapt the Info-Tech template accordingly or use your own.

      Download the IT Budget Executive Presentation template

      Input Output
      • Tabular and graphical data outputs in the IT Cost Forecasting and Budgeting Workbook
      • Interpretive commentary based on your analysis
      • Executive presentation summarizing your proposed IT budget
      Materials Participants
      • IT Cost Forecasting and Budgeting Workbook
      • IT Budget Executive Presentation template
      • CIO/IT Directors
      • IT Financial Lead
      • Other IT Management

      Now it’s time to present your proposed IT budget for next fiscal year

      If you’ve done your homework and pre-sold your budget, the presentation itself should be a mere formality with no surprises for anyone, including you.

      Some final advice on presenting your proposed budget…

      Partner up

      If something big in your budget is an initiative that’s for a specific business unit, let that business unit’s leader be the face of it and have IT play the role of supporting partner.

      Use your champions

      Let your advocates know in advance that you’d appreciate hearing their voice during the presentation if you encounter any pushback, or just to reinforce your main messages.

      Focus on the CFO

      The CFO is the most important stakeholder in the room at the end of the day, even more than the CEO in some cases. Their interests should take priority if you’re pressed for time.

      Avoid judgment

      Let the numbers speak for themselves. Do point out highlights and areas of interest but hold off on offering emotion-driven opinions. Let your audience draw their own conclusions.

      Solicit questions

      You do want dialogue. However, keep your answers short and to the point. What does come up in discussion is a good indication of where you’ll need to spend more time in the future.

      The only other thing that can boost your chances is if you’re lucky enough to be scheduled to present between 10:00 and 11:00 on a Thursday morning when people are most agreeable. Beyond that, apply the standard rules of good presentations to optimize your success.

      Your presentation is done – now re-focus on budget finalization and submission

      This final stage tends to be very administrative. Follow the rules and get it done.

      • Incorporate feedback: Follow up on comments from your first presentation and reflect them in your budget if appropriate. This may include:
        • Having follow-up conversations with stakeholders.
        • Further clarifying the ROI projections or business benefits.
        • Adjusting proposed expenditure amounts based on new information or a shift in priorities.
        • Adding details or increasing granularity around specific issues of interest.
      • Trim: Almost every business unit leader will need to make cuts to their initial budget proposal. After all, the CFO has a finite pool of money to allocate. If all’s gone well, it may only be a few percent. Resurrect your less-costly alternative scenario and selectively apply the options you laid out there. Focus on downsizing or deferring capital projects if possible. If you must trim OpEx, remind the CFO about any service-level adjustments that will need to happen to make the less expensive alternatives work.
      • Re-present: It’s not unusual to have to present your budget one more time after you’ve made your adjustments. In some organizations, the first presentation is to an internal executive group while the second one is to a governing board. The same rules apply to this second presentation as to your first one.
      • Submit: Slot your final budget into the list of accounts prescribed in the budget template provided by Finance. These templates often don’t align with IT’s budget categories, but you’ll have to make do.

      Phase recap: Create and deliver your presentation

      You’ve reached the end of the budget creation and approval process. Now you can refocus on using your budget as a living governance tool.

      This phase focused on developing your final proposed budget presentation for delivery to your various stakeholders. Here, you:

      • Planned your final content. You selected the data and visuals to include and highlight.
      • Built your presentation. You pulled everything together into a PowerPoint template and crafted commentary to tell a cohesive IT budget story.
      • Presented to stakeholders. You delivered your proposed IT budget and solicited their comments and feedback.
      • Made final adjustments and submitted your budget. You applied final tweaks, deconstructed your budget to fit Finance’s template, and submitted it for entry into Finance’s system.

      “Everyone understands that there’s never enough money. The challenge is prioritizing the right work and funding it.”

      – Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association

      Next Steps

      “Keep that conversation going throughout the year so that at budgeting time no one is surprised…Make sure that you’re telling your story all year long and keep track of that story.”

      – Angela Hintz, VP of PMO & Integrated Services,
      Blue Cross and Blue Shield of Louisiana

      This final section will provide you with:

      • An overall summary of accomplishment.
      • Recommended next steps.
      • A list of contributors to this research.
      • Some related Info-Tech resources.

      Summary of Accomplishment

      You’ve successfully created a transparent IT budget and gotten it approved.

      By following the phases and steps in this blueprint, you have:

      1. Learned more about what an IT budget does and what it means to your key stakeholders.
      2. Assembled your budgeting team and critical data needed for forecasting and budgeting, as well as set expenditure goals for next fiscal year, and metrics for improving the budgeting process overall.
      3. Forecasted your project and non-project CapEx and OpEx for next fiscal year and beyond.
      4. Fine-tuned your proposed expenditure rationales.
      5. Crafted and delivered an executive presentation and got your budget approved.

      What’s next?

      Use your approved budget as an ongoing IT financial management governance tool and track your budget process improvement metrics.

      If you would like additional support, have our analysts guide you through an Info-Tech full-service engagement or Guided Implementation.

      Contact your account representative for more information.

      1-888-670-8889

      Research Contributors and Experts

      Monica Braun

      Research Director, ITFM Practice

      Info-Tech Research Group

      Carol Carr

      Technical Counselor (Finance)

      Info-Tech Research Group

      Larry Clark

      Executive Counselor

      Info-Tech Research Group

      Duane Cooney

      Executive Counselor

      Info-Tech Research Group

      Lynn Fyhrlund

      Former Chief Information Officer

      Milwaukee County

      Jay Gnuse

      Information Technology Director

      Chief Industries

      Trisha Goya

      Director, IS Client Services

      Hawaii Medical Service Association

      Angela Hintz

      VP of PMO & Integrated Services

      Blue Cross and Blue Shield of Louisiana

      Rick Hopfer

      Chief Information Officer

      Hawaii Medical Service Association

      Theresa Hughes

      Executive Counselor

      Info-Tech Research Group

      Research Contributors and Experts

      Dave Kish

      Practice Lead, IT Financial Management Practice

      Info-Tech Research Group

      Matt Johnson

      IT Director Governance and Business Solutions

      Milwaukee County

      Titus Moore

      Executive Counselor

      Info-Tech Research Group

      Angie Reynolds

      Principal Research Director, IT Financial Management Practice

      Info-Tech Research Group

      Mark Roman

      Managing Partner, Executive Services

      Info-Tech Research Group

      Darin Stahl

      Distinguished Analyst & Research Fellow

      Info-Tech Research Group

      Miguel Suarez

      Head of Technology

      Seguros Monterrey New York Life

      Kristen Thurber

      IT Director, Office of the CIO

      Donaldson Company

      Related Info-Tech Research & Services

      Achieve IT Spend & Staffing Transparency

      • IT spend has increased in volume and complexity, but how IT spend decisions are made has not kept pace.
      • Lay a foundation for meaningful conversations and informed decision making around IT spend by transparently mapping exactly where IT funds are really going.

      IT Spend & Staffing Benchmarking Service

      • Is a do-it-yourself approach to achieving spend transparency too onerous? Let Info-Tech do the heavy lifting for you.
      • Using Info-Tech’s ITFM Cost Model, our analysts will map your IT expenditure to four different stakeholder views – CFO Expense View, CIO Service View, CXO Business View, and CEO Innovation View – so that you clearly show where expenditure is going in terms that stakeholders can relate to and better demonstrate IT’s value to the business.
      • Get a full report that shows how your spend is allocated plus benchmarks that compare your results to those of your industry peers.

      Build Your IT Cost Optimization Roadmap

      • Cost optimization is usually thought about in terms of cuts, when it’s really about optimizing IT’s cost-to-value ratio.
      • Develop a cost-optimization strategy based on your organization’s circumstances and timeline focused on four key areas of IT expenditure: assets, vendors, projects, and workforce.

      Bibliography

      “How Much Should a Company Spend on IT?” Techvera, no date. Accessed 3 Mar. 2023.
      “State of the CIO Study 2023.” Foundry, 25 Jan. 2023. Accessed 3 Mar. 2023.
      Aberdeen Strategy & Research. “The State of IT 2023.” Spiceworks. Ziff Davis, 2022. Accessed 28 Feb. 2023.
      Ainsworth, Paul. “Responsibilities of the Modern CFO - A Function in Transition.” TopTal, LLC., no date. Accessed 15 Feb. 2023.
      Balasaygun, Kaitlin. “For the first time in a long time, CFOs can say no to tech spending.” CNBC CFO Council, 19 Jan. 2023. Accessed 17 Feb. 2023.
      Bashir, Ahmad. “Objectives of Capital Budgeting and factors affecting Capital Budget Decisions.” LinkedIn, 27 May 2017. Accessed 14 Apr. 2023.
      Blackmon, Kris. “Building a Data-Driven Budget Pitch the C-Suite Can't Refuse.” NetSuite Brainyard, 21 Sep. 2021. Accessed 17 Feb. 2023
      Butcher, Daniel. “CFO to CFO: Budgeting to Fund Strategic Plans.” Strategic Finance Magazine/Institute of Management Accountants, 1 Dec. 2021. Accessed 17 Feb. 2023
      Gray, Patrick. “IT Budgeting: A Cheat Sheet.” TechRepublic, 29 Jul. 2020. Accessed 28 Feb. 2023.
      Greenbaum, David. “Budget vs. Actuals: Budget Variance Analysis & Guide.” OnPlan, 15 Mar. 2022. Accessed 22 Mar. 2023.
      Huber, Michael and Joan Rundle. “How to Budget for IT Like a CFO.” Huber & Associates, no date. Accessed 15 Feb. 2023.
      Kinney, Tara. “Executing Your Department Budget Like a CFO.” Atomic Revenue, LLC., no date. Accessed 15 Feb. 2023.
      Lafley, A.G. “What Only the CFO Can Do.” Harvard Business Review, May 2009. Accessed 15 Mar. 2009.
      Moore, Peter D. “IN THE DIGITAL WORLD, IT should be run as a profit center, not a cost center.” Wild Oak Enterprise, 26 Feb. 2020. Accessed 3 Mar. 2023.
      Nordmeyer, Bille. “What Factors Are Going to Influence Your Budgeting Decisions?” bizfluent, 8 May 2019. Accessed 14 Apr. 2023
      Ryan, Vincent. “IT Spending and 2023 Budgets Under Close Scrutiny.” CFO, 5 Dec. 2022. Accessed 3 Mar. 2023.
      Stackpole, Beth. “State of the CIO, 2022: Focus turns to IT fundamentals.” CIO Magazine, 21 Mar. 2022. Accessed 3 Mar. 2023.

      Considerations to Optimize Container Management

      • Buy Link or Shortcode: {j2store}499|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Center & Facilities Strategy
      • Parent Category Link: /data-center-and-facilities-strategy

      Do you experience challenges with the following:

      • Equipping IT operations processes to manage containers.
      • Choosing the right container technology.
      • Optimizing your infrastructure strategy for containers.

      Our Advice

      Critical Insight

      • Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.
      • When selecting tools from multiple sources, it is important to understand what each tool should and should not meet. This holistic approach is necessary to avoid gaps and duplication of effort.

      Impact and Result

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain, uses your current infrastructure, and reduces costs for compute and image scan time.

      Considerations to Optimize Container Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations to Optimize Container Management Deck – A document to guide you design your container strategy.

      A document that walks you through the components of a container management solution and helps align your business objectives with your current infrastructure services and plan for your future assets.

      • Considerations to Optimize Container Management Storyboard

      2. Container Reference Architecture – A best-of-breed template to help you build a clear, concise, and compelling strategy document for container management.

      Complete the reference architecture tool to strategize your container management.

      • Container Reference Architecture
      [infographic]

      Further reading

      Considerations to Optimize Container Management

      Design a custom reference architecture that meets your requirements.

      Analyst Perspective

      Containers have become popular as enterprises use DevOps to develop and deploy applications faster. Containers require managed services because the sheer number of containers can become too complex for IT teams to handle. Orchestration platforms like Kubernetes can be complex, requiring management to automatically deploy container-based applications to operating systems and public clouds. IT operations staff need container management skills and training.

      Installing and setting up container orchestration tools can be laborious and error-prone. IT organizations must first implement the right infrastructure setup for containers by having a solid understanding of the scope and scale of containerization projects and developer requirements. IT administrators also need to know how parts of the existing infrastructure connect and communicate to maintain these relationships in a containerized environment. Containers can run on bare metal servers, virtual machines in the cloud, or hybrid configurations, depending on your IT needs

      Nitin Mukesh, Senior Research Analyst, Infrastructure and Operations

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      The container software market is constantly evolving. Organizations must consider many factors to choose the right container management software for their specific needs and fit their future plans.

      It's important to consider your organization's current and future infrastructure strategy and how it fits with your container management strategy. The container management platform you choose should be compatible with the existing network infrastructure and storage capabilities available to your organization.

      IT operations staff have not been thinking the same way as developers who have now been using an agile approach for some time. Container image builds are highly automated and have several dependencies including scheduling, testing, and deployment that the IT staff is not trained for or lack the ability to create anything more than a simple image.

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain and reduces costs for compute and image scan time.

      Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.

      Your challenge

      Choosing the right container technology: IT is a rapidly changing and evolving market, with startups and seasoned technology vendors maintaining momentum in everything from container platforms to repositories to orchestration tools. The rapid evolution of container platform components such as orchestration, storage, networking, and system services such as load balancing has made the entire stack a moving target.

      However, waiting for the industry to be standardized can be a recipe for paralysis, and waiting too long to decide on solutions and approaches can put a company's IT operations in catch-up mode.

      Keeping containers secure: Security breaches in containers are almost identical to operating system level breaches in virtual machines in terms of potential application and system vulnerabilities. It is important for any DevOps team working on container and orchestration architecture and management to fully understand the potential vulnerabilities of the platforms they are using.

      Optimize your infrastructure strategy for containers: One of the challenges enterprise IT operations management teams face when it comes to containers is the need to rethink the underlying infrastructure to accommodate the technology. While you may not want to embrace the public cloud for your critical applications just yet, IT operations managers will need an on-premises infrastructure so that applications can scale up and down the same way as they are containerized.

      Common ways organizations use containers

      A Separation of responsibilities
      Containerization provides a clear separation of responsibilities as developers can focus on application logic and dependencies, while IT operations teams can focus on deployment and management instead of application details such as specific software versions and configurations.

      B Workload portability
      Containers can run almost anywhere: physical servers or on-premise data centers on virtual machines or developer machines, as well as public clouds on Linux, Windows, or Mac operating systems, greatly easing development and deployment.

      “Lift and shift” existing applications into a modern cloud architecture. Some organizations even use containers to migrate existing applications to more modern environments. While this approach provides some of the basic benefits of operating system virtualization, it does not provide all the benefits of a modular, container-based application architecture.

      C Application isolation
      Containers virtualize CPU, memory, storage, and network resources at the operating system level, providing developers with a logically isolated view of the operating system from other applications.

      Source: TechTarget, 2021

      What are containers and why should I containerize?

      A container is a partially isolated environment in which an application or parts of an application can run. You can use a single container to run anything from small microservices or software processes to larger applications. Inside the container are all the necessary executable, library, and configuration files. Containers do not contain operating system images. This makes them lighter and more portable with much less overhead. Large application deployments can deploy multiple containers into one or more container clusters (CapitalOne, 2020).

      Containers have the following advantages:

      • Reduce overhead costs: Because containers do not contain operating system images, they require fewer system resources than traditional or hardware virtual machine environments.
      • Enhanced portability: Applications running in containers can be easily deployed on a variety of operating systems and hardware platforms.
      • More consistent operations: DevOps teams know that applications in containers run the same no matter where they are deployed.
      • Efficiency improvement: Containers allow you to deploy, patch, or scale applications faster.
      • Develop better applications: Containers support Agile and DevOps efforts to accelerate development and production cycles.

      Source: CapitalOne, 2020

      Container on the cloud or on-premise?

      On-premises containers Public cloud-based containers

      Advantages:

      • Full control over your container environment.
      • Increased flexibility in networking and storage configurations.
      • Use any version of your chosen tool or container platform.
      • No need to worry about potential compliance issues with data stored in containers.
      • Full control over the host operating system and environment.

      Disadvantages:

      • Lack of easy scalability. This can be especially problematic if you're using containers because you want to be more agile from a DevOps perspective.
      • No turnkey container deployment solution. You must set up and maintain every component of the container stack yourself.

      Advantages:

      • Easy setup and management through platforms such as Amazon Elastic Container Service or Azure Container Service. These products require significant Docker expertise to use but require less installation and configuration than on-premise installations.
      • Integrates with other cloud-based tools for tasks such as monitoring.
      • Running containers in the cloud improves scalability by allowing you to add compute and storage resources as needed.

      Disadvantages:

      • You should almost certainly run containers on virtual machines. That can be a good thing for many people; however, you miss out on some of the potential benefits of running containers on bare metal servers, which can be easily done.
      • You lose control. To build a container stack, you must use the orchestrator provided by your cloud host or underlying operating system.

      Info-Tech Insight
      Start-ups and small businesses that don't typically need to be closely connected to hardware can easily move (or start) to the cloud. Large (e.g. enterprise-class) companies and companies that need to manage and control local hardware resources are more likely to prefer an on-premises infrastructure. For enterprises, on-premises container deployments can serve as a bridge to full public cloud deployments or hybrid private/public deployments. The answer to the question of public cloud versus on premises depends on the specific needs of your business.

      Container management

      From container labeling that identifies workloads and ownership to effective reporting that meets the needs of different stakeholders across the organization, it is important that organizations establish an effective framework for container management.

      Four key considerations for your container management strategy:

      01 Container Image Supply Chain
      How containers are built

      02 Container Infrastructure and Orchestration
      Where and how containers run together

      03 Container Runtime Security and Policy Enforcement
      How to make sure your containers only do what you want them to do

      04 Container Observability
      Runtime metrics and debugging

      To effectively understand container management solutions, it is useful to define the various components that make up a container management strategy.

      1: Container image supply chain

      To run a workload as a container, it must first be packaged into a container image. The image supply chain includes all libraries or components that make up a containerized application. This includes CI/CD tools to test and package code into container images, application security testing tools to check for vulnerabilities and logic errors, registries and mirroring tools for hosting container images, and attribution mechanisms such as image signatures for validating images in registries.

      Important functions of the supply chain include the ability to:

      • Scan container images in registries for security issues and policy compliance.
      • Verify in-use image hashes have been scanned and authorized.
      • Mirror images from public registries to isolate yourself from outages in these services.
      • Attributing images to the team that created them.

      Source: Rancher, 2022

      Info-Tech Insight
      It is important to consider disaster recovery for your image registry. As mentioned above, it is wise to isolate yourself from registry disruptions. However, external registry mirroring is only one part of the equation. You also want to make sure you have a high availability plan for your internal registry as well as proper backup and recovery processes. A highly available, fault-tolerant container management platform is not just a runtime environment.

      2: Container infrastructure and orchestration

      Orchestration tools

      Once you have a container image to run, you need a location to run it. That means both the computer the container runs on and the software that schedules it to run. If you're working with a few containers, you can make manual decisions about where to run container images, what to run with container images, and how best to manage storage and network connectivity. However, at scale, these kinds of decisions should be left to orchestration tools like Kubernetes, Swarm, or Mesos. These platforms can receive workload execution requests, determine where to run based on resource requirements and constraints, and then actually launch that workload on its target. And if a workload fails or resources are low, it can be restarted or moved as needed.

      Source: DevOpsCube, 2022

      Storage

      Storage is another important consideration. This includes both the storage used by the operating system and the storage used by the container itself. First, you need to consider the type of storage you actually need. Can I outsource my storage concerns to a cloud provider using something like Amazon Relational Database Service instead? If not, do you really need block storage (e.g. disk) or can an external object store like AWS S3 meet your needs? If your external object storage service can meet your performance and durability requirements as well as your governance and compliance needs, you're in luck. You may not have to worry about managing the container's persistent storage. Many external storage services can be provisioned on demand, support discrete snapshots, and some even allow dynamic scaling on demand.

      Networking

      Network connectivity inside and outside the containerized environment is also very important. For example, Kubernetes supports a variety of container networking interfaces (CNIs), each providing different functionality. Questions to consider here are whether you can set traffic control policies (and the OSI layer), how to handle encryption between workloads and between workloads and external entities, and how to manage traffic import for containerized workloads. The impact of these decisions also plays a role on performance.

      Backups

      Backups are still an important task in containerized environments, but the backup target is changing slightly. An immutable, read-only container file system can be recreated very easily from the original container image and does not need to be backed up. Backups or snapshots on permanent storage should still be considered. If you are using a cloud provider, you should also consider fault domain and geo-recovery scenarios depending on the provider's capabilities. For example, if you're using AWS, you can use S3 replication to ensure that EBS snapshots can be restored in another region in case of a full region outage.

      3: Container runtime security and policy enforcement

      Ensuring that containers run in a place that meets the resource requirements and constraints set for them is necessary, but not sufficient. It is equally important that your container management solution performs continuous validation and ensures that your workloads comply with all security and other policy requirements of your organization. Runtime security and policy enforcement tools include a function for detecting vulnerabilities in running containers, handling detected vulnerabilities, ensuring that workloads are not running with unnecessary or unintended privileges, and ensuring that only other workloads that need to be allowed can connect.

      One of the great benefits of (well implemented) containerized software is reducing the attackable surface of the application. But it doesn't completely remove it. This means you need to think about how to observe running applications to minimize security risks. Scanning as part of the build pipeline is not enough. This is because an image without vulnerabilities at build time can become a vulnerable container because new flaws are discovered in its code or support libraries. Instead, some modern tools focus on detecting unusual behavior at the system call level. As these types of tools mature, they can make a real difference to your workload’s security because they rely on actual observed behavior rather than up-to-date signature files.

      4: Container observability

      What’s going on in there?

      Finally, if your container images are being run somewhere by orchestration tools and well managed by security and policy enforcement tools, you need to know what your containers are doing and how well they are doing it. Orchestration tools will likely have their own logs and metrics, as will networking layers, and security and compliance checking tools; there is a lot to understand in a containerized environment. Container observability covers logging and metrics collection for both your workloads and the tools that run them.

      One very important element of observability is the importance of externalizing logs and metrics in a containerized environment. Containers come and go, and in many cases the nodes running on them also come and go, so relying on local storage is not recommended.

      The importance of a container management strategy

      A container management platform typically consists of a variety of tools from multiple sources. Some container management software vendors or container management services attempt to address all four key components of effective container management. However, many organizations already have tools that provide at least some of the features they need and don't want to waste existing licenses or make significant changes to their entire infrastructure just to run containers.

      When choosing tools from multiple sources, it's important to understand what needs each tool meets and what it doesn't. This holistic approach is necessary to avoid gaps and duplication of effort.

      For example, scanning an image as part of the build pipeline and then rescanning the image while the container is running is a waste of CPU cycles in the runtime environment. Similarly, using orchestration tools and separate host-based agents to aggregate logs or metrics can waste CPU cycles as well as storage and network resources.

      Planning a container management strategy

      1 DIY, Managed Services, or Packaged Products
      Developer satisfaction is important, but it's also wise to consider the team running the container management software. Migrating from bare metal or virtual machine-based deployment methodologies to containers can involve a significant learning curve, so it's a good idea to choose a tool that will help smooth this curve.
      2 Kubernetes
      In the world of container management, Kubernetes is fast becoming the de facto standard for container orchestration and scheduling. Most of the products that address the other aspects of container management discussed in this post (image supply chain, runtime security and policy enforcement, observability) integrate easily with Kubernetes. Kubernetes is open-source software and using it is possible if your team has the technical skills and the desire to implement it themselves. However, that doesn't mean you should automatically opt to build yourself.
      3 Managed Kubernetes
      Kubernetes is difficult to implement well. As a result, many solution providers offer packaged products or managed services to facilitate Kubernetes adoption. All major cloud providers now offer Kubernetes services that reduce the operational burden on your teams. Organizations that have invested heavily in the ecosystem of a particular cloud provider may find this route suitable. Other organizations may be able to find a fully managed service that provides container images and lets the service provider worry about running the images which, depending on the cost and capacity of the organization, may be the best option.
      4 Third-Party Orchestration Products
      A third approach is packaged products from providers that can be installed on the infrastructure (cloud or otherwise). These products can offer several potential advantages over DIY or cloud provider offerings, such as access to additional configuration options or cluster components, enhanced functionality, implementation assistance and training, post-installation product support, and reduced risk of cloud provider lock-in.

      Source: Kubernetes, 2022; Rancher, 2022

      Infrastructure considerations

      It's important to describe your organization’s current and future infrastructure strategy and how it fits into your container management strategy. It’s all basic for now, but if you plan to move to a virtual machine or cloud provider next year, your container management solution should be able to adapt to your environment now and in the future. Similarly, if you’ve already chosen a public cloud, you may want to make sure that the tool you choose supports some of the cloud options, but full compatibility may not be an important feature.

      Infrastructure considerations extend beyond computing. Choosing a container management platform should be compatible with the existing network infrastructure and storage capacity available to your organization. If you have existing policy enforcement, monitoring, and alerting tools, the ideal solution should be able to take advantage of them. Moving to containers can be a game changer for developers and operations teams, so continuing to use existing tools to reduce complexity where possible can save time and money.

      Leverage the reference architecture to guide your container management strategy

      Questions for support transition

      Using the examples as a guide, complete the tool to strategize your container management

      Download the Reference Architecture

      Bibliography

      Mell, Emily. “What is container management and why is it important?” TechTarget, April 2021.
      https://www.techtarget.com/searchitoperations/definition/container-management-software#:~:text=A%20container%20management%20ecosystem%20automates,operator%20to%20keep%20up%20with

      Conrad, John. “What is Container Orchestration?” CapitalOne, 24 August 2020.
      https://www.capitalone.com/tech/cloud/what-is-container-orchestration/?v=1673357442624

      Kubernetes. “Cluster Networking.” Kubernetes, 2022.
      https://kubernetes.io/docs/concepts/cluster-administration/networking/

      Rancher. “Comparing Kubernetes CNI Providers: Flannel, Calico, Canal, and Weave.” Rancher, 2022.
      https://www.suse.com/c/rancher_blog/comparing-kubernetes-cni-providers-flannel-calico-canal-and-weave/

      Wilson, Bob. “16 Best Container Orchestration Tools and Services.” DevopsCube, 5 January 2022.
      https://devopscube.com/docker-container-clustering-tools/

      Gain Control of Cloud Integration Strategies Before they Float Away

      • Buy Link or Shortcode: {j2store}362|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Enterprise Integration
      • Parent Category Link: /enterprise-integration
      • IT is typically backlogged with tasks while the business waits to implement key solutions to remain competitive. In this competitive space, Cloud solutions offer attractive benefits to business stakeholders especially around agility and cost.
      • Moving to the Cloud involves more than outsourcing a component of the technology stack. Roles, processes, and authentication technologies need to be redefined to fit a distributed stack where parts of the IT solution space reside on-premise while the rest are in the Cloud.
      • Cloud integration means accepting loss of control in product development. A Cloud vendor will address the needs of most constituents and any high degree of customization which counteracts their business model. This makes integration a complex initiative involving two separate parties trying to align.

      Our Advice

      Critical Insight

      • Cloud integration is a fundamental commitment to change within the organization as it deeply impacts roles, processes, and technologies.
      • Be prepared to lose some degree of control of SLA management. IT will have to manage multiple Cloud SLAs and deliver a lowest common approach to the business. This may mean lowering the SLA standards previously set with on-premise solutions.
      • Cloud integration isn’t just about the technology. It is a dedication to establish solid relationships with the Cloud vendor. Understanding where the cloud solution is moving and what issues are being addressed are critical to creating an organizational road map for the future.

      Impact and Result

      • Develop a Cloud integration strategy by proactively understanding the impact of Cloud integration efforts to the organization.
      • Realize that Cloud integration will be an ongoing process of collaboration with the business, and that the initial implementation does not constitute an end.
      • Implement an integrated support structure that includes on-premise and cloud stacks.

      Gain Control of Cloud Integration Strategies Before they Float Away Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand the impacts of Cloud computing on Data, Application, Access, and Service Level Agreement integration

      Assess your current level of Cloud adoption and integration, focusing on solutions that are emerging in the market and the applicability to your IT environment.

      • Storyboard: Gain Control of Cloud Integration Strategies Before they Float Away
      • Cloud Integration Checklist
      • None
      [infographic]

      Present Security to Executive Stakeholders

      • Buy Link or Shortcode: {j2store}262|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $2,000 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • There is a disconnect between security leaders and executive stakeholders on what information is important to present.
      • Security leaders find it challenging to convey the necessary information to obtain support for security objectives.
      • Changes to the threat landscape and shifts in organizational goals exacerbate the issue, as they impact security leaders' ability to prioritize topics to be communicated.
      • Security leaders struggle to communicate the importance of security to a non-technical audience.

      Our Advice

      Critical Insight

      Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and ensuring that you have met your goal.

      Impact and Result

      • Developing a thorough understanding of the security communication goals.
      • Understanding the importance of leveraging highly relevant and understandable data.
      • Developing and delivering presentations that will keep your audience engaged and build trust with your executive stakeholders.

      Present Security to Executive Stakeholders Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Present Security to Executive Stakeholders – A step-by-step guide to communicating security effectively to obtain support from decision makers.

      Use this as a guideline to assist you in presenting security to executive stakeholders.

      • Present Security to Executive Stakeholders Storyboard

      2. Security Presentation Templates – A set of security presentation templates to assist you in communicating security to executive stakeholders.

      The security presentation templates are a set of customizable templates for various types of security presentation including:

      • Present Security to Executive Stakeholders Templates

      Infographic

      Further reading

      Present Security to Executive Stakeholders

      Learn how to communicate security effectively to obtain support from decision makers.

      Analyst Perspective

      Build and deliver an effective security communication to your executive stakeholders.

      Ahmad Jowhar

      As a security leader, you’re tasked with various responsibilities to ensure your organization can achieve its goals while its most important assets are being protected.

      However, when communicating security to executive stakeholders, challenges can arise in determining what topics are pertinent to present. Changes in the security threat landscape coupled with different business goals make identifying how to present security more challenging.

      Having a communication framework for presenting security to executive stakeholders will enable you to effectively identify, develop, and deliver your communication goals while obtaining the support you need to achieve your objectives.

      Ahmad Jowhar
      Research Specialist, Security & Privacy

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • Many security leaders struggle to decide what to present and how to present security to executive stakeholders.
      • Constant changes in the security threat landscape impacts a security leader’s ability to prioritize topics to be communicated.
      • There is a disconnect between security leaders and executive stakeholders on what information is important to present.
      • Security leaders struggle to communicate the importance of security to a non-technical audience.
      • Developing a thorough understanding of security communication goals.
      • Understanding the importance of leveraging highly relevant and understandable data.
      • Developing and delivering presentations that will keep your audience engaged and build trust with your executive stakeholders.

      Info-Tech Insight

      Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.

      Your challenge

      As a security leader, you need to communicate security effectively to executive stakeholders in order to obtain support for your security objectives.

      • When it comes to presenting security to executive stakeholders, many security leaders find it challenging to convey the necessary information in order to obtain support for security objectives.
      • This is attributed to various factors, such as an increase in the threat landscape, changes to industry regulations and standards, and new organizational goals that security has to align with.
      • Furthermore, with the limited time to communicate with executive stakeholders, both in frequency and duration, identifying the most important information to address can be challenging.

      76% of security leaders struggle in conveying the effectiveness of a cybersecurity program.

      62% find it difficult to balance the risk of too much detail and need-to-know information.

      41% find it challenging to communicate effectively with a mixed technical and non-technical audience.

      Source: Deloitte, 2022

      Common obstacles

      There is a disconnect between security leaders and executive stakeholders when it comes to the security posture of the organization:

      • Executive stakeholders are not confident that their security leaders are doing enough to mitigate security risks.
      • The issue has been amplified, with security threats constantly increasing across all industries.
      • However, security leaders don’t feel that they are in a position to make themselves heard.
      • The lack of organizational security awareness and support from cross-functional departments has made it difficult to achieve security objectives (e.g. education, investments).
      • Defining an approach to remove that disconnect with executive stakeholders is of utmost importance for security leaders, in order to improve their organization’s security posture.

      9% of boards are extremely confident in their organization’s cybersecurity risk mitigation measures.

      77% of organizations have seen an increase in the number of attacks in 2021.

      56% of security leaders claimed their team is not involved when leadership makes urgent security decisions.

      Source: EY, 2021
      The image contains a screenshot of an Info-Tech Thoughtmodel titled: Presenting Security to Executive Stakeholders.

      Info-Tech’s methodology for presenting security to executive stakeholders

      1. Identify communication goals

      2. Collect information to support goals

      3. Develop communication

      4. Deliver communication

      Phase steps

      1. Identify drivers for communicating to executives
      2. Define your goals for communicating to executives
      1. Identify data to collect
      2. Plan how to retrieve data
      1. Plan communication
      2. Build a compelling communication document
      1. Deliver a captivating presentation
      2. Obtain/verify goals

      Phase outcomes

      A defined list of drivers and goals to help you develop your security presentations

      A list of data sources to include in your communication

      A completed communication template

      A solidified understanding of how to effectively communicate security to your stakeholders

      Develop a structured process for communicating security to your stakeholders

      Security presentations are not a one-way street
      The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.

      Identifying your goals is the foundation of an effective presentation
      Defining your drivers and goals for communicating security will enable you to better prepare and deliver your presentation, which will help you obtain your desired outcome.

      Harness the power of data
      Leveraging data and analytics will help you provide quantitative-based communication, which will result in a more meaningful and effective presentation.

      Take your audience on a journey
      Developing a storytelling approach will help engage with your audience.

      Win your audience by building a rapport
      Establishing credibility and trust with executive stakeholders will enable you to obtain their support for security objectives.

      Tactical insight
      Conduct background research on audience members (i.e. professional background) to help understand how best to communicate with them and overcome potential objections.

      Tactical insight
      Verifying your objectives at the end of the communication is important, as it ensures you have successfully communicated to executive stakeholders.

      Project deliverables

      This blueprint is accompanied by a supporting deliverable which includes five security presentation templates.

      Report on Security Initiatives
      Template showing how to inform executive stakeholders of security initiatives.

      Report on Security Initiatives.

      Security Metrics
      Template showing how to inform executive stakeholders of current security metrics that would help drive future initiatives.

      Security Metrics.

      Security Incident Response & Recovery
      Template showing how to inform executive stakeholders of security incidents, their impact, and the response plan.

      Security Incident Response & Recovery

      Security Funding Request
      Template showing how to inform executive stakeholders of security incidents, their impact, and the response plan.

      Security Funding Request

      Key template:

      Security and Risk Update

      Template showing how to inform executive stakeholders of proactive security and risk initiatives.

      Blueprint benefits

      IT/InfoSec benefits

      Business benefits

      • Reduce effort and time spent preparing cybersecurity presentations for executive stakeholders by having templates to use.
      • Enable security leaders to better prepare what to present and how to present it to their executive stakeholders, as well as driving the required outcomes from those presentations.
      • Establish a best practice for communicating security and IT to executive stakeholders.
      • Gain increased awareness of cybersecurity and the impact executive stakeholders can have on improving an organization’s security posture.
      • Understand how security’s alignment with the business will enable the strategic growth of the organization.
      • Gain a better understanding of how security and IT objectives are developed and justified.

      Measure the value of this blueprint

      Phase

      Measured Value (Yearly)

      Phase 1: Identify communication goals

      Cost to define drivers and goals for communicating security to executives:

      16 FTE hours @ $233K* =$1,940

      Phase 2: Collect information to support goals

      Cost to collect and synthesize necessary data to support communication goals:

      16 FTE hours @ $233K = $1,940

      Phase 3: Develop communication

      Cost to develop communication material that will contextualize information being shown:

      16 FTE hours @ $233K = $1,940

      Phase 4: Deliver communication

      Potential Savings:

      Total estimated effort = $5,820

      Our blueprint will help you save $5,820 and over 40 FTE hours

      * The financial figure depicts the annual salary of a CISO in 2022

      Source: Chief Information Security Officer Salary.” Salary.com, 2022

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Phase 1

      Identify communication goals

      Phase 1 Phase 2 Phase 3 Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Understanding the different drivers for communicating security to executive stakeholders
      • Identifying different communication goals

      This phase involves the following participants:

      • Security leader

      1.1. Identify drivers for communicating to executive stakeholders

      As a security leader, you meet with executives and stakeholders with diverse backgrounds, and you aim to showcase your organization’s security posture along with its alignment with the business’ goals.

      However, with the constant changes in the security threat landscape, demands and drivers for security could change. Thus, understanding potential drivers that will influence your communication will assist you in developing and delivering an effective security presentation.

      39% of organizations had cybersecurity on the agenda of their board’s quarterly meeting.

      Source: EY, 2021.

      Info-Tech Insight

      Not all security presentations are the same. Keep your communication strategy and processes agile.

      Know your drivers for security presentations

      By understanding the influences for your security presentations, you will be able to better plan what to present to executive stakeholders.

      • These meetings, which are usually held once per quarter, provide you with less than one hour of presentation time.
      • Hence, it is crucial to know why you need to present security and whether these drivers are similar across the other presentations.

      Understanding drivers will also help you understand how to present security to executive stakeholders.

      • These drivers will shape the structure of your presentation and help determine your approach to communicating your goals.
      • For example, financial-based presentations that are driven by budget requests might create a sense of urgency or assurance about investment in a security initiative.

      Identify your communication drivers, which can stem from various initiatives and programs, including:

      • Results from internal or external audit reports.
      • Upcoming budget meetings.
      • Briefing newly elected executive stakeholders on security.

      When it comes to identifying your communication drivers, you can collaborate with subject matter experts, like your corporate secretary or steering committees, to ensure the material being communicated will align with some of the organizational goals.

      Examples of drivers for security presentations

      Audit
      Upcoming internal or external audits might require updates on the organization’s compliance

      Organizational restructuring
      Restructuring within an organization could require security updates

      Merger & Acquisition
      An M&A would trigger presentations on organization’s current and future security posture

      Cyber incident
      A cyberattack would require an immediate presentation on its impact and the incident response plan

      Ad hoc
      Provide security information requested by stakeholders

      1.2. Define your goals for communicating to executives

      After identifying drivers for your communication, it’s important to determine what your goals are for the presentation.

      • Communication drivers are mainly triggers for why you want to present security.
      • Communication goals are the potential outcomes you are hoping to obtain from the presentation.
      • Your communication goals would help identify what data and metrics to include in your presentation, the structure of your communication deck, and how you deliver your communication to executive stakeholders.

      Identifying your communication goals could require the participation of the security team, IT leadership, and other business stakeholders.

      • As a group, brainstorm the security goals that align with your business goals for the coming year.
        • Aim to have at least two business goals that align with each security goal.
      • Identify what benefits and value the executive stakeholders will gain from the security goal being presented.
        • E.g. Increased security awareness, updates on organization's security posture.
      • Identify what the ask is for this presentation.
        • E.g. Approval for increasing budget to support security initiatives, executive support to implement internal security programs.

      Info-Tech Insight

      There can be different reasons to communicate security to executive stakeholders. You need to understand what you want to get out of your presentation.

      Examples of security presentation goals

      Educate
      Educate the board on security trends and/or latest risks in the industry

      Update
      Provide updates on security initiatives, relevant security metrics, and compliance posture

      Inform
      Provide an incident response plan due to a security incident or deliver updates on current threats and risks

      Investment
      Request funding for security investments or financial updates on past security initiatives

      Ad hoc
      Provide security information requested by stakeholders

      Phase 2

      Collect information to support goals

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Understanding what types of data to include in your security presentations
      • Defining where and how to retrieve data

      This phase involves the following participants:

      • Security leader
      • Network/security analyst

      2.1 Identify data to collect

      After identifying drivers and goals for your communication, it’s important to include the necessary data to justify the information being communicated.

      • Leveraging data and analytics will assist in providing quantitative-based communication, which will result in a more meaningful and effective presentation.
      • The data presented will showcase the visibility of an organization’s security posture along with potential risks and figures on how to mitigate those risks.
      • Providing analysis of the quantitative data presented will also showcase further insights on the figures, allow the audience to better understand the data, and show its relevance to the communication goals.

      Identifying data to collect doesn’t need to be a rigorous task; you can follow these steps to help you get started:

      • Work with your security team to identify the main type of data applicable to the communication goals.
        • E.g. Financial data would be meaningful to use when communicating a budget presentation.
      • Identify supporting data linked to the main data defined.
        • E.g. If a financial investment is made to implement a security initiative, then metrics on improvements to the security posture will be relevant.
      • Show how both the main and supporting data align with the communication goals.
        • E.g. Improvement in security posture would increase alignment with regulation standards, which would result in additional contracts being awarded and increased revenue.

      Info-Tech Insight

      Understand how to present your information in a way that will be meaningful to your audience, for instance by quantifying security risks in financial terms.

      Examples of data to present

      Educate
      Number of organizations in industry impacted by data breaches during past year; top threats and risks affecting the industries

      Update
      Degree of compliance with standards (e.g. ISO-27001); metrics on improvement of security posture due to security initiatives

      Inform
      Percentage of impacted clients and disrupted business functions; downtime; security risk likelihood and financial impact

      Investment
      Capital and operating expenditure for investment; ROI on past and future security initiatives

      Ad hoc
      Number of security initiatives that went over budget; phishing test campaign results

      2.2 Plan how to retrieve the data

      Once the data that is going to be used for the presentation has been identified, it is important to plan how the data can be retrieved, processed, and shared.

      • Most of the data leveraged for security presentations are structured data, which are highly organized data that are often stored in a relational and easily searchable database.
        • This includes security log reports or expenditures for ongoing and future security investments.
      • Retrieving the data, however, would require collaboration and cooperation from different team members.
      • You would need to work with the security team and other appropriate stakeholders to identify where the data is stored and who the data owner is.

      Once the data source and owner has been identified, you need to plan how the data would be processed and leveraged for your presentation

      • This could include using queries to retrieve the relevant information needed (e.g. SQL, Microsoft Excel).
      • Verify the accuracy and relevance of the data with other stakeholders to ensure it is the most appropriate data to be presented to the executive stakeholders.

      Info-Tech Insight

      Using a data-driven approach to help support your objectives is key to engaging with your audience.

      Plan where to retrieve the data

      Identifying the relevant data sources to retrieve your data and the appropriate data owner enables efficient collaboration between departments collecting, processing, and communicating the data and graphics to the audience.

      Examples of where to retrieve your data

      Data Source

      Data

      Data Owner

      Communication Goal

      Audit & Compliance Reports

      Percentage of controls completed to be certified with ISO 27001; Number of security threats & risks identified.

      Audit Manager;

      Compliance Manager;

      Security Leader

      Ad hoc, Educate, Inform

      Identity & Access Management (IAM) Applications

      Number of privileged accounts/department; Percentage of user accounts with MFA applied

      Network/Security Analyst

      Ad hoc, Inform, Update

      Security Information & Event Management (SIEM)

      Number of attacks detected and blocked before & after implementing endpoint security; Percentage of firewall rules that triggered a false positive

      Network/Security Analyst

      Ad hoc, Inform, Update

      Vulnerability Management Applications

      Percentage of critical vulnerabilities patched; Number of endpoints encrypted

      Network/Security Analyst

      Ad hoc, Inform, Update

      Financial & Accounting Software

      Capital & operating expenditure for future security investments; Return on investment (ROI) on past and current security investments

      Financial and/or Accounting Manager

      Ad hoc, Educate, Investments

      Phase 3

      Develop communication

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Identifying a communication strategy for presenting security
      • Identifying security templates that are applicable to your presentation

      This phase involves the following participants:

      • Security leader

      3.1 Plan communication: Know who your audience is

      • When preparing your communication, it's important to understand who your target audience is and to conduct background research on them.
      • This will help develop your communication style and ensure your presentation caters to the expected audience in the room.

      Examples of two profiles in a boardroom

      Formal board of directors

      The executive team

      • In the private sector, this will include an appointed board of shareholders and subcommittees external to the organization.
      • In the public sector, this can include councils, commissions, or the executive team itself.
      • In government, this can include mayors, ministers, and governors.
      • The board’s overall responsibility is governance.
      • This audience will include your boss and your peers internal to the organization.
      • This category is primarily involved in the day-to-day operations of the organization and is responsible for carrying out the strategic direction set by the board.
      • The executive team’s overall responsibility is operations.

      3.1.1 Know what your audience cares about

      • Understanding what your executive stakeholders value will equip you with the right information to include in your presentations.
      • Ensure you conduct background research on your audience to assist you in knowing what their potential interests are.
      • Your background research could include:
        • Researching the audience’s professional background through LinkedIn.
        • Reviewing their comments from past executive meetings.
        • Researching current security trends that align with organizational goals.
      • Once the values and risks have been identified, you can document them in notes and share the notes with subject matter experts to verify if these values and risks should be shared in the coming meetings.

      A board’s purpose can include the following:

      • Sustaining and expanding the organization’s purpose and ability to execute in a competitive market.
      • Determining and funding the organization’s future and direction.
      • Protecting and increasing shareholder value.
      • Protecting the company’s exposure to risks.

      Examples of potential values and risks

      • Business impact
      • Financial impact
      • Security and incidents

      Info-Tech Insight
      Conduct background research on audience members (e.g. professional background on LinkedIn) to help understand how best to communicate to them and overcome potential objections.

      Understand your audience’s concerns

      • Along with knowing what your audience values and cares about, understanding their main concerns will allow you to address those items or align them with your communication.
      • By treating your executive stakeholders as your project sponsors, you would build a level of trust and confidence with your peers as the first step to tackling their concerns.
      • These concerns can be derived from past stakeholder meetings, recent trends in the industry, or strategic business alignments.
      • After capturing their concerns, you’ll be equipped with the necessary understanding on what material to include and prioritize during your presentations.

      Examples of potential concerns for each profile of executive stakeholders

      Formal board of directors

      The executive team

      • Business impact (What is the impact of IT in solving business challenges?)
      • Investments (How will it impact organization’s finances and efficiency?)
      • Cybersecurity and risk (What are the top cybersecurity risks, and how is IT mitigating those risks to the business?)
      • Business alignment (How do IT priorities align to the business strategy and goals?)
      • IT operational efficiency (How is IT set up for success with foundational elements of IT’s operational strategy?)
      • Innovation & transformation priorities (How is IT enabling the organization’s competitive advantage and supporting transformation efforts as a strategic business partner?)

      Build your presentation to tackle their main concerns

      Your presentation should be well-rounded and compelling when it addresses the board’s main concerns about security.

      Checklist:

      • Research your target audience (their backgrounds, board composition, dynamics, executive team vs. external group).
      • Include value and risk language in your presentation to appeal to your audience.
      • Ensure your content focuses on one or more of the board’s main concerns with security (e.g. business impact, investments, or risk).
      • Include information about what is in it for them and the organization.
      • Research your board’s composition and skillsets to determine their level of technical knowledge and expertise. This helps craft your presentation with the right amount of technology vs. business-facing information.

      Info-Tech Insight
      The executive stakeholder’s main concerns will always boil down to one important outcome: providing a level of confidence to do business through IT products, services, and systems – including security.

      3.1.2 Take your audience through a security journey

      • Once you have defined your intended target and their potential concerns, developing the communication through a storytelling approach will be the next step to help build a compelling presentation.
      • You need to help your executive stakeholders make sense of the information being conveyed and allow them to understand the importance of cybersecurity.
      • Taking your audience through a story will allow them to see the value of the information being presented and better resonate with its message.
      • You can derive insights for your storytelling presentation by doing the following:
        • Provide a business case scenario on the topic you are presenting.
        • Identify and communicate the business problem up front and answer the three questions (why, what, how).
        • Quantify the problems in terms of business impact (money, risk, value).

      Info-Tech Insight
      Developing a storytelling approach will help keep your audience engaged and allow the information to resonate with them, which will add further value to the communication.

      Identify the purpose of your presentation

      You should be clear about your bottom line and the intent behind your presentation. However, regardless of your bottom line, your presentation must focus on what business problems you are solving and why security can assist in solving the problem.

      Examples of communication goals

      To inform or educate

      To reach a decision

      • In this presentation type, it is easy for IT leaders to overwhelm a board with excessive or irrelevant information.
      • Focus your content on the business problem and the solution proposed.
      • Refrain from too much detail about the technology – focus on business impact and risk mitigated. Ask for feedback if applicable.
      • In this presentation type, there is a clear ask and an action required from the board of directors.
      • Be clear about what this decision is. Once again, don’t lead with the technology solution: Start with the business problem you are solving, and only talk about technology as the solution if time permits.
      • Ensure you know who votes and how to garner their support.

      Info-Tech Insight
      Nobody likes surprises. Communicate early and often. The board should be pre-briefed, especially if it is a difficult subject. This also ensures you have support when you deliver a difficult message.

      Gather the right information to include in your boardroom presentation

      Once you understand your target audience, it’s important to tailor your presentation material to what they will care about.

      Typical IT boardroom presentations include:

      • Communicating the value of ongoing business technology initiatives.
      • Requesting funds or approval for a business initiative that IT is spearheading.
      • Security incident response/Risk/DRP.
      • Developing a business program or an investment update for an ongoing program.
      • Business technology strategy highlights and impacts.
      • Digital transformation initiatives (value, ROI, risk).

      Info-Tech Insight
      You must always have a clear goal or objective for delivering a presentation in front of your board of directors. What is the purpose of your board presentation? Identify your objective and outcome up front and tailor your presentation’s story and contents to fit this purpose.

      Info-Tech Insight
      Telling a good story is not about the message you want to deliver but the one the executive stakeholders want to hear. Articulate what you want them to think and what you want them to take away, and be explicit about it in your presentation. Make your story logically flow by identifying the business problem, complication, the solution, and how to close the gap. Most importantly, communicate the business impacts the board will care about.

      Structure your presentation to tell a logical story

      To build a strong story for your presentation, ensure you answer these three questions:

      WHY

      Why is this a business issue, or why should the executive stakeholders care?

      WHAT

      What is the impact of solving the problem and driving value for the company?

      HOW

      How will we leverage our resources (technology, finances) to solve the problem?

      Examples:

      Scenario 1: The company has experienced a security incident.

      Intent: To inform/educate the board about the security incident.

      WHY

      The data breach has resulted in a loss of customer confidence, negative brand impact, and a reduction in revenue of 30%.

      WHAT

      Financial, legal, and reputational risks identified, and mitigation strategies implemented. IT is working with the PR team on communications. Incident management playbook executed.

      HOW

      An analysis of vulnerabilities was conducted and steps to address are in effect. Recovery steps are 90% completed. Incident management program reviewed for future incidents.

      Scenario 2: Security is recommending investments based on strategic priorities.

      Intent: To reach a decision with the board – approve investment proposal.

      WHY

      The new security strategy outlines two key initiatives to improve an organization’s security culture and overall risk posture.

      WHAT

      Security proposed an investment to implement a security training & phishing test campaign, which will assist in reducing data breach risks.

      HOW

      Use 5% of security’s budget to implement security training and phishing test campaigns.

      Time plays a key role in delivering an effective presentation

      What you include in your story will often depend on how much time you have available to deliver the message.

      Consider the following:

      • Presenting to executive stakeholders often means you have a short window of time to deliver your message. The average executive stakeholder presentation is 15 minutes, and this could be cut short due to other unexpected factors.
      • If your presentation is too long, you risk overwhelming or losing your audience. You must factor in the time constraints when building your board presentation.
      • Your executive stakeholders have a wealth of experience and knowledge, which means they could jump to conclusions quickly based on their own experiences. Ensure you give them plenty of background information in advance. Provide your presentation material, a brief, or any other supporting documentation before the meeting to show you are well prepared.
      • Be prepared to have deep conversations about the topic, but respect that the executive stakeholders might not be interested in hearing the tactical information. Build an elevator pitch, a one-pager, back-up slides that support your ask and the story, and be prepared to answer questions within your allotted presentation time to dive deeper.

      Navigating through Q&A

      Use the Q&A portion to build credibility with the board.

      • It is always better to say, “I’m not certain about the answer but will follow up,” than to provide false or inaccurate information on the spot.
      • When asked challenging or irrelevant questions, ensure you have an approach to deflect them. Questions can often be out of scope or difficult to answer in a group. Find what works for you to successfully navigate through these questions:
        • “Let’s work with the sub-committee to find you an answer.”
        • “Let’s take that offline to address in more detail.”
        • “I have some follow-up material I can provide you to discuss that further after our meeting.”
      • And ensure you follow up! Make sure to follow through on your promise to provide information or answers after the meeting. This helps build trust and credibility with the board.

      Info-Tech Insight
      The average board presentation is 15 minutes long. Build no more than three or four slides of content to identify the business problem, the business impacts, and the solution. Leave five minutes for questions at the end, and be prepared with back-up slides to support your answers.

      Storytelling checklist

      Checklist:

      • Tailor your presentation based on how much time you have.
      • Find out ahead of time how much time you have.
      • Identify if your presentation is to inform/educate or reach a decision.
      • Identify and communicate the business problem up front and answer the three questions (why, what, how).
      • Express the problem in terms of business impact (risk, value, money).
      • Prepare and send pre-meeting collateral to the members of the board and executive team.
      • Include no more than 5-6 slides for your presentation.
      • Factor in Q&A time at the end of your presentation window.
      • Articulate what you want them to think and what you want them to take away – put it right up front and remind them at the end.
      • Have an elevator speech handy – one or two sentences and a one-pager version of your story.
      • Consider how you will build your relationship with the members outside the boardroom.

      3.1.3 Build a compelling communication document

      Once you’ve identified your communication goals, data, and plan to present to your stakeholders, it’s important to build the compelling communication document that will attract all audiences.

      A good slide design increases the likelihood that the audience will read the content carefully.

      • Bad slide structure (flow) = Audience loses focus
        • You can have great content on a slide, but if a busy audience gets confused, they’ll just close the file or lose focus. Structure encompasses horizontal and vertical logic.
      • Good visual design = Audience might read more
        • Readers will probably skim the slides first. If the slides look ugly, they will already have a negative impression. If the slides are visually appealing, they will be more inclined to read carefully. They may even use some slides to show others.
      • Good content + Good structure + Visual appeal = Good presentation
        • A presentation is like a house. Good content is the foundation of the house. Good structure keeps the house strong. Visual appeal differentiates houses.

      Slide design best practices

      Leverage these slide design best practices to assist you in developing eye-catching presentations.

      • Easy to read: Assume reader is tight on time. If a slide looks overwhelming, the reader will close the document.
      • Concise and clear: Fewer words = more skim-able.
      • Memorable: Use graphics and visuals or pithy quotes whenever you can do so appropriately.
      • Horizontal logic: Good horizontal logic will have slide titles that cascade into a story with no holes or gaps.
      • Vertical logic: People usually read from left to right, top to bottom, or in a Z pattern. Make sure your slide has an intuitive flow of content.
      • Aesthetics: People like looking at visually appealing slides, but make sure your attempts to create visual appeal do not detract from the content.

      Your presentation must have a logical flow

      Horizontal logic

      Vertical logic

      • Horizontal logic should tell a story.
      • When slide titles are read in a cascading manner, they will tell a logical and smooth story.
      • Title & tagline = thesis (best insight).
      • Vertical logic should be intuitive.
      • Each step must support the title.
      • The content you intend to include within each slide is directly applicable to the slide title.
      • One main point per slide.

      Vertical logic should be intuitive

      The image contains a screenshot example of a bad design layout for a slide. The image contains a screenshot example of a good design layout for a slide.

      The audience is unsure where to look and in what order.

      The audience knows to read the heading first. Then look within the pie chart. Then look within the white boxes to the right.

      Horizontal and vertical logic checklists

      Horizontal logic

      Vertical logic

      • List your slide titles in order and read through them.
      • Good horizontal logic should feel like a story. Incomplete horizontal logic will make you pause or frown.
      • After a self-test, get someone else to do the same exercise with you observing them.
      • Note at which points they pause or frown. Discuss how those points can be improved.
      • Now consider each slide title proposed and the content within it.
      • Identify if there is a disconnect in title vs. content.
      • If there is a disconnect, consider changing the title of the slide to appropriately reflect the content within it, or consider changing the content if the slide title is an intended path in the story.

      Make it easy to read

      The image contains a screenshot that demonstrates an uneasy to read slide. The image contains a screenshot that demonstrates an easy to read slide.
      • Unnecessary coloring makes it hard on the eyes
      • Margins for title at top is too small
      • Content is not skim-able (best to break up the slide)

      Increase skim-ability:

      • Emphasize the subheadings
      • Bold important words

      Make it easier on the eyes:

      • Declutter and add sections
      • Have more white space

      Be concise and clear

      1. Write your thoughts down
        • This gets your content documented.
        • Don’t worry about clarity or concision yet.
      2. Edit for clarity
        • Make sure the key message is very clear.
        • Find your thesis statement.
      3. Edit for concision
        • Remove unnecessary words.
        • Use the active voice, not passive voice (see below for examples).

      Passive voice

      Active voice

      “There are three things to look out for” (8 words)

      “Network security was compromised by hackers” (6 words)

      “Look for these three things” (5 words)

      “Hackers compromised network security” (4 words)

      Be memorable

      The image contains a screenshot of an example that demonstrates a bad example of how to be memorable. The image contains a screenshot of an example that demonstrates a good example of how to be memorable.

      Easy to read, but hard to remember the stats.

      The visuals make it easier to see the size of the problem and make it much more memorable.

      Remember to:

      • Have some kind of visual (e.g. graphs, icons, tables).
      • Divide the content into sections.
      • Have a bit of color on the page.

      Aesthetics

      The image contains a screenshot of an example of bad aesthetics. The image contains a screenshot of an example of good aesthetics.

      This draft slide is just content from the outline document on a slide with no design applied yet.

      • Have some kind of visual (e.g. graphs, icons, tables) as long as it’s appropriate.
      • Divide the content into sections.
      • Have a bit of color on the page.
      • Bold or italicize important text.

      Why use visuals?

      How graphics affect us

      Cognitively

      • Engage our imagination
      • Stimulate the brain
      • Heighten creative thinking
      • Enhance or affect emotions

      Emotionally

      • Enhance comprehension
      • Increase recollection
      • Elevate communication
      • Improve retention

      Visual clues

      • Help decode text
      • Attract attention
      • Increase memory

      Persuasion

      • 43% more effective than text alone
      Source: Management Information Systems Research Center

      Presentation format

      Often stakeholders prefer to receive content in a specific format. Make sure you know what you require so that you are not scrambling at the last minute.

      • Is there a standard presentation template?
      • Is a hard-copy handout required?
      • Is there a deadline for draft submission?
      • Is there a deadline for final submission?
      • Will the presentation be circulated ahead of time?
      • Do you know what technology you will be using?
      • Have you done a dry run in the meeting room?
      • Do you know the meeting organizer?

      Checklist to build compelling visuals in your presentation

      Leverage this checklist to ensure you are creating the perfect visuals and graphs for your presentation.

      Checklist:

      • Do the visuals grab the audience’s attention?
      • Will the visuals mislead the audience/confuse them?
      • Do the visuals facilitate data comparison or highlight trends and differences in a more effective manner than words?
      • Do the visuals present information simply, cleanly, and accurately?
      • Do the visuals display the information/data in a concentrated way?
      • Do the visuals illustrate messages and themes from the accompanying text?

      3.2 Security communication templates

      Once you have identified your communication goals and plans for building your communication document, you can start building your presentation deck.

      These presentation templates highlight different security topics depending on your communication drivers, goals, and available data.

      Info-Tech has created five security templates to assist you in building a compelling presentation.

      These templates provide support for presentations on the following five topics:

      • Security Initiatives
      • Security & Risk Update
      • Security Metrics
      • Security Incident Response & Recovery
      • Security Funding Request

      Each template provides instructions on how to use it and tips on ensuring the right information is being presented.

      All the templates are customizable, which enables you to leverage the sections you need while also editing any sections to your liking.

      The image contains screenshots of the Security Presentation Templates.

      Download the Security Presentation Templates

      Security template example

      It’s important to know that not all security presentations for an organization are alike. However, these templates would provide a guideline on what the best practices are when communicating security to executive stakeholders.

      Below is an example of instructions to complete the “Security Risk & Update” template. Please note that the security template will have instructions to complete each of its sections.

      The image contains a screenshot of the Executive Summary slide. The image contains a screenshot of the Security Goals & Objectives slide.

      The first slide following the title slide includes a brief executive summary on what would be discussed in the presentation. This includes the main security threats that would be addressed and the associated risk mitigation strategies.

      This slide depicts a holistic overview of the organization’s security posture in different areas along with the main business goals that security is aligning with. Ensure visualizations you include align with the goals highlighted.

      Security template example (continued)

      The image contains a screenshot example of the Top Threats & Risks. The image contains a screenshot example of the Top Threats & Risks.

      This slide displays any top threats and risks an organization is facing. Each threat consists of 2-3 risks and is prioritized based on the negative impact it could have on the organization (i.e. red bar = high priority; green bar = low priority). Include risks that have been addressed in the past quarter, and showcase any prioritization changes to those risks.

      This slide follows the “Top Threats & Risks” slide and focuses on the risks that had medium or high priority. You will need to work with subject matter experts to identify risk figures (likelihood, financial impact) that will enable you to quantify the risks (Likelihood x Financial Impact). Develop a threshold for each of the three columns to identify which risks require further prioritization, and apply color coding to group the risks.

      Security template example (continued)

      The image contains a screenshot example of the slide, Risk Analysis. The image contains a screenshot example of the slide, Risk Mitigation Strategies & Roadmap.

      This slide showcases further details on the top risks along with their business impact. Be sure to include recommendations for the risks and indicate whether further action is required from the executive stakeholders.

      The last slide of the “Security Risk & Update” template presents a timeline of when the different initiatives to mitigate security risks would begin. It depicts what initiatives will be completed within each fiscal year and the total number of months required. As there could be many factors to a project’s timeline, ensure you communicate to your executive stakeholders any changes to the project.

      Phase 4

      Deliver communication

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Identifying a strategy to deliver compelling presentations
      • Ensuring you follow best practices for communicating and obtaining your security goals

      This phase involves the following participants:

      • Security leader

      4.1 Deliver a captivating presentation

      You’ve gathered all your data, you understand what your audience is expecting, and you are clear on the outcomes you require. Now, it’s time to deliver a presentation that both engages and builds confidence.

      Follow these tips to assist you in developing an engaging presentation:

      • Start strong: Give your audience confidence that this will be a good investment of their time. Establish a clear direction for what’s going to be covered and what the desired outcome is.
      • Use your time wisely: Odds are, your audience is busy, and they have many other things on their minds. Be prepared to cover your content in the time allotted and leave sufficient time for discussion and questions.
      • Be flexible while presenting: Do not expect that your presentation will follow the path you have laid out. Anticipate jumping around and spending more or less time than you had planned on a given slide.

      Keep your audience engaged with these steps

      • Be ready with supporting data. Don’t make the mistake of not knowing your content intimately. Be prepared to answer questions on any part of it. Senior executives are experts at finding holes in your data.
      • Know your audience. Who are you presenting to? What are their specific expectations? Are there sensitive topics to be avoided? You can’t be too prepared when it comes to understanding your audience.
      • Keep it simple. Don’t assume that your audience wants to learn the details of your content. Most just want to understand the bottom line, the impact on them, and how they can help. More is not always better.
      • Focus on solving issues. Your audience members have many of their own problems and issues to worry about. If you show them how you can help make their lives easier, you’ll win them over.

      Info-Tech Insight
      Establishing credibility and trust with executive stakeholders is important to obtaining their support for security objectives.

      Be honest and straightforward with your communication

      • Be prepared. Being properly prepared means not only that your update will deliver the value that you expect, but also that you will have confidence and the flexibility you require when you’re taken off track.
      • Don’t sugarcoat it. These are smart, driven people that you are presenting to. It is neither beneficial nor wise to try to fool them. Be open and transparent about problems and issues. Ask for help.
      • No surprises. An executive stakeholder presentation is not the time or the place for a surprise. Issues seen as unexpected or contentious should always be dealt with prior to the meeting with those most impacted.

      Hone presentation skills before meeting with the executive stakeholders

      Know your environment

      Be professional but not boring

      Connect with your audience

      • Your organization has standards for how people are expected to dress at work. Make sure that your attire meets this standard – don’t be underdressed.
      • Think about your audience – would they appreciate you starting with a joke, or do they want you to get to the point as quickly as possible?
      • State the main points of your presentation confidently. While this should be obvious, it is essential. Your audience should be able to clearly see that you believe the points you are stating.
      • Present with lots of energy, smile, and use hand gestures to support your speech.
      • Look each member of the audience in the eye at least once during your presentation. Avoid looking at the ceiling, the back wall, or the floor. Your audience should feel engaged – this is essential to keeping their attention on you.
      • Never read from your slides. If there is text on a slide, paraphrase it while maintaining eye contact.

      Checklist for presentation logistics

      Optimize the timing of your presentation:

      • Less is more: Long presentations are detrimental to your cause – they lead to your main points being diluted. Keep your presentation short and concise.
      • Keep information relevant: Only present information that is important to your audience. This includes the information that they are expecting to see and information that connects to the business.
      • Expect delays: Your audience will likely have questions. While it is important to answer each question fully, it will take away from the precious time given to you for your presentation. Expect that you will not get through all the information you have to present.

      Script your presentation:

      • Use a script to stay on track: Script your presentation before the meeting. A script will help you present your information in a concise and structured manner.
      • Develop a second script: Create a script that is about half the length of the first script but still contains the most important points. This will help you prepare for any delays that may arise during the presentation.
      • Prepare for questions: Consider questions that may be asked and script clear and concise answers to each.
      • Practice, practice, practice: Practice your presentation until you no longer need the script in front of you.

      Checklist for presentation logistics (continued)

      Other considerations:

      • After the introduction of your presentation, clearly state the objective – don’t keep people guessing and consequently lose focus on your message.
      • After the presentation is over, document important information that came up. Write it down or you may forget it soon after.
      • Rather than create a long presentation deck full of detailed slides that you plan to skip over during the presentation, create a second, compact deck that contains only the slides you plan to present. Send out the longer deck after the presentation.

      Checklist for delivering a captivating presentation

      Leverage this checklist to ensure you are prepared to develop and deliver an engaging presentation.

      Checklist:

      • Start with a story or something memorable to break the ice.
      • Go in with the end state in mind (focus on the outcome/end goal and work back from there) – What’s your call to action?
      • Content must compliment your end goal, filter out any content that doesn’t compliment the end goal.
      • Be prepared to have less time to speak. Be prepared with shorter versions of your presentation.
      • Include an appendix with supporting data, but don’t be data heavy in your presentation. Integrate the data into a story. The story should be your focus.

      Checklist for delivering a captivating presentation (continued)

      • Be deliberate in what you want to show your audience.
      • Ensure you have clean slides so the audience can focus on what you’re saying.
      • Practice delivering your content multiple times alone and in front of team members or your Info-Tech counselor, who can provide feedback.
      • How will you handle being derailed? Be prepared with a way to get back on track if you are derailed.
      • Ask for feedback.
      • Record yourself presenting.

      4.2 Obtain and verify support on security goals

      Once you’ve delivered your captivating presentation, it’s imperative to communicate with your executive stakeholders.

      • This is your opportunity to open the floor for questions and clarify any information that was conveyed to your audience.
      • Leverage your appendix and other supporting documents to justify your goals.
      • Different approaches to obtaining and verifying your goals could include:
        • Acknowledgment from the audience that information communicated aligns with the business’s goals.
        • Approval of funding requests for security initiatives.
        • Written and verbal support for implementation of security initiatives.
        • Identifying next steps for information to communicate at the next executive stakeholder meeting.

      Info-Tech Insight
      Verifying your objectives at the end of the presentation is important, as it ensures you have successfully communicated to executive stakeholders.

      Checklist for obtaining and verify support on security goals

      Follow this checklist to assist you in obtaining and verifying your communication goals.

      Checklist:

      • Be clear about follow-up and next steps if applicable.
      • Present before you present: Meet with your executive stakeholders before the meeting to review and discuss your presentation and other supporting material and ensure you have executive/CEO buy-in.
      • “Be humble, but don’t crumble” – demonstrate to the executive stakeholders that you are an expert while admitting you don’t know everything. However, don’t be afraid to provide your POV and defend it if need be. Strike the right balance to ensure the board has confidence in you while building a strong relationship.
      • Prioritize a discussion over a formal presentation. Create an environment where they feel like they are part of the solution.

      Summary of Accomplishment

      Problem Solved

      A better understanding of security communication drivers and goals

      • Understanding the difference between communication drivers and goals
      • Identifying your drivers and goals for security presentation

      A developed a plan for how and where to retrieve data for communication

      • Insights on what type of data can be leveraged to support your communication goals
      • Understanding who you can collaborate with and potential data sources to retrieve data from

      A solidified communication plan with security templates to assist in better presenting to your audience

      • A guideline on how to prepare security presentations to executive stakeholders
      • A list of security templates that can be customized and used for various security presentations

      A defined guideline on how to deliver a captivating presentation to achieve your desired objectives

      • Clear message on best practices for delivering security presentations to executive stakeholders
      • Understanding how to verify your communication goals have been obtained

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Build an Information Security Strategy
      This blueprint will walk you through the steps of tailoring best practices to effectively manage information security.

      Build a Security Metrics Program to Drive Maturity
      This blueprint will assist you in identifying security metrics that can tie to your organizational goals and build those metrics to achieve your desired maturity level.

      Bibliography

      Bhadauriya, Amit S. “Communicating Cybersecurity Effectively to the Board.” Metricstream. Web.
      Booth, Steven, et al. “The Biggest Mistakes Made When Presenting Cyber Security to Senior Leadership or the Board, and How to Fix Them.” Mandiant, May 2019. Web.
      Bradford, Nate. “6 Slides Every CISO Should Use in Their Board Presentation.” Security Boulevard, 9 July 2020. Web.
      Buckalew, Lauren, et al. “Get the Board on Board: Leading Cybersecurity from the Top Down.” Newsroom, 2 Dec. 2019. Web.
      Burg, Dave, et al. “Cybersecurity: How Do You Rise above the Waves of a Perfect Storm?” EY US - Home, EY, 22 July 2021. Web.
      Carnegie Endowment for International Peace. Web.
      “Chief Information Security Officer Salary.” Salary.com, 2022. Web.
      “CISO's Guide to Reporting to the Board - Apex Assembly.” CISO's Guide To Reporting to the Board. Web.
      “Cyber Security Oversight in the Boardroom” KPMG, Jan. 2016. Web.
      “Cybersecurity CEO: My 3 Tips for Presenting in the Boardroom.” Cybercrime Magazine, 31 Mar. 2020. Web.
      Dacri , Bryana. Do's & Don'ts for Security Professionals Presenting to Executives. Feb. 2018. Web.
      Froehlich, Andrew. “7 Cybersecurity Metrics for the Board and How to Present Them: TechTarget.” Security, TechTarget, 19 Aug. 2022. Web.
      “Global Board Risk Survey.” EY. Web.
      “Guidance for CISOs Presenting to the C-Suite.” IANS, June 2021. Web.
      “How to Communicate Cybersecurity to the Board of Directors.” Cybersecurity Conferences & News, Seguro Group, 12 Mar. 2020. Web.
      Ide, R. William, and Amanda Leech. “A Cybersecurity Guide for Directors” Dentons. Web.
      Lindberg, Randy. “3 Tips for Communicating Cybersecurity to the Board.” Cybersecurity Software, Rivial Data Security, 8 Mar. 2022. Web.
      McLeod, Scott, et al. “How to Present Cybersecurity to Your Board of Directors.” Cybersecurity & Compliance Simplified, Apptega Inc, 9 Aug. 2021. Web.
      Mickle, Jirah. “A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations.” Tenable®, 28 Nov. 2022. Web.
      Middlesworth, Jeff. “Top-down: Mitigating Cybersecurity Risks Starts with the Board.” Spiceworks, 13 Sept. 2022. Web.
      Mishra, Ruchika. “4 Things Every CISO Must Include in Their Board Presentation.” Security Boulevard, 17 Nov. 2020. Web.
      O’Donnell-Welch, Lindsey. “CISOs, Board Members and the Search for Cybersecurity Common Ground.” Decipher, 20 Oct. 2022. Web.

      Bibliography

      “Overseeing Cyber Risk: The Board's Role.” PwC, Jan. 2022. Web.
      Pearlson, Keri, and Nelson Novaes Neto. “7 Pressing Cybersecurity Questions Boards Need to Ask.” Harvard Business Review, 7 Mar. 2022. Web.
      “Reporting Cybersecurity Risk to the Board of Directors.” Web.
      “Reporting Cybersecurity to Your Board - Steps to Prepare.” Pondurance ,12 July 2022. Web.
      Staynings, Richard. “Presenting Cybersecurity to the Board.” Resource Library. Web.
      “The Future of Cyber Survey.” Deloitte, 29 Aug. 2022. Web.
      “Top Cybersecurity Metrics to Share with Your Board.” Packetlabs, 10 May 2022. Web.
      Unni, Ajay. “Reporting Cyber Security to the Board? How to Get It Right.” Cybersecurity Services Company in Australia & NZ, 10 Nov. 2022. Web.
      Vogel, Douglas, et al. “Persuasion and the Role of Visual Presentation Support.” Management Information Systems Research Center, 1986.
      “Welcome to the Cyber Security Toolkit for Boards.” NCSC. Web.

      Research Contributors

      • Fred Donatucci, New-Indy Containerboard, VP, Information Technology
      • Christian Rasmussen, St John Ambulance, Chief Information Officer
      • Stephen Rondeau, ZimVie, SVP, Chief Information Officer

      Operations management

      • Buy Link or Shortcode: {j2store}12|cart{/j2store}
      • Related Products: {j2store}12|crosssells{/j2store}
      • Up-Sell: {j2store}12|upsells{/j2store}
      • member rating overall impact: 10.0/10
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      IT Operations is all about effectiveness. We make sure that you deliver reliable services to the clients and users within the company.

      Mentoring for Agile Teams

      • Buy Link or Shortcode: {j2store}154|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $187,599 Average $ Saved
      • member rating average days saved: 27 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Today’s realities are driving organizations to digitize faster and become more Agile.
      • Most hierarchical, command and control–style organizations are not yet well adapted to using Agile.
      • So-called textbook Agile practices often clash with traditional processes and practices.
      • Members must adapt their Agile practices to accommodate their organizational realities.

      Our Advice

      Critical Insight

      • There is no one-size-fits-all approach to Agile. Agile practices need to be adjusted to work in your organization based on a thoughtful diagnosis of the challenges and solutions tailored to the nature of your organization.

      Impact and Result

      • Identify your Agile challenges and success factors (both organization-wide and team-specific).
      • Leverage the power of research and experience to solve key Agile challenges and gain immediate benefits for your project.
      • Your Agile playbook will capture your findings so future projects can benefit from them.

      Mentoring for Agile Teams Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand how a Agile Mentoring can help your organization to successfully establish Agile practices within your context.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take the Info-Tech Agile Challenges and Success Factors Survey

      This tool will help you identify where your Agile teams are experiencing the most pain so you can create your Agile challenges hit list.

      • Agile Challenges and Success Factors Survey

      2. Review typical challenges and findings

      While each organization/team will struggle with its own individual challenges, many members find they face similar organizational/systemic challenges when adopting Agile. Review these typical challenges and learn from what other members have discovered.

      • Mentoring for Agile Teams – Typical Findings

      Infographic

      Workshop: Mentoring for Agile Teams

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Take the Agile Challenges and Success Factors Survey

      The Purpose

      Determine whether an Agile playbook is right for you.

      Broadly survey your teams to identify Agile challenges and success factors in your organization.

      Key Benefits Achieved

      Better understanding of common Agile challenges and success factors

      Identification of common Agile challenges and success factors are prevalent in your organization

      Activities

      1.1 Distribute survey and gather results.

      1.2 Consolidate survey results.

      Outputs

      Completed survey responses from across teams/organization

      Consolidated heat map of your Agile challenges and success factors

      2 Identify Your Agile Challenges Hit List

      The Purpose

      Examine consolidated survey results.

      Identify your most pressing challenges.

      Create a hit list of challenges to be resolved.

      Key Benefits Achieved

      Identification of the most serious challenges to your Agile transformation

      Attention focused on those challenge areas that are most impacting your Agile teams

      Activities

      2.1 Analyze and discuss your consolidated heat map.

      2.2 Prioritize identified challenges.

      2.3 Select your hit list of challenges to address.

      Outputs

      Your Agile challenges hit list

      3 Problem Solve

      The Purpose

      Address each challenge in your hit list to eliminate or improve it.

      Key Benefits Achieved

      Better Agile team performance and effectiveness

      Activities

      3.1 Work with Agile mentor to problem solve each challenge in your hit list.

      3.2 Apply these to your project in real time.

      Outputs

      4 Create Your Agile Playbook

      The Purpose

      Capture the findings and lessons learned while problem solving your hit list.

      Key Benefits Achieved

      Strategies and tactics for being successful with Agile in your organization which can be applied to future projects

      Activities

      4.1 For each hit list item, capture the findings and lessons learned in Module 3.

      4.2 Document these in your Agile Playbook.

      Outputs

      Your Agile Playbook deliverable

      Cyber Resilience Report 2018

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      "The cyber threat landscape today is highly complex and rapidly changing. Cyber security incidents can have several impacts on organizations and society, both on a physical and non-physical level. Through the use of a computer, criminals can indeed cause IT outages, supply chain disruptions and other physical security incidents"

      -- excerpt from the foreword of the BCI Cyber resilience report 2018 by David Thorp, Executive Director, BCI

      There are a number of things you can do to protect yourself. And they range, as usual, from the fairly simple to the more elaborate and esoteric. Most companies can, with some common sense, if not close the door on most of these issues, at least prepare themselves to limit the consequences.

      Register to read more …

      Adapt Your Customer Experience Strategy to Successfully Weather COVID-19

      • Buy Link or Shortcode: {j2store}536|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • COVID-19 is an unprecedented global pandemic. It’s creating significant challenges across every sector.
      • Collapse of financial markets and a steep decline in consumer confidence has most firms nervous about revenue shortfalls and cash burn rates.
      • The economic impact of COVID-19 is freezing IT budgets and sharply changing IT priorities.
      • The human impact of COVID-19 is likely to lead to staffing shortfalls and knowledge gaps.
      • COVID-19 may be in play for up to two years.

      Our Advice

      Critical Insight

      The challenges posed by the virus are compounded by the fact that consumer expectations for strong service delivery remain high:

      • Customers still expect timely, on-demand service from the businesses they engage with.
      • There is uncertainty about how to maintain strong, revenue-driving experiences when faced with the operational challenges posed by the virus.
      • COVID-19 is changing how organizations prioritize spending priorities within their CXM strategies.

      Impact and Result

      • Info-Tech recommends rapidly updating your strategy for customer experience management to ensure it can rise to the occasion.
      • Start by assessing the risk COVID-19 poses to your CXM approach and how it’ll impact marketing, sales, and customer service functions.
      • Implement actionable measures to blunt the threat of COVID-19 while protecting revenue, maintaining consistent product and service delivery, and improving the integrity of your brand. We’ll dive into five proven techniques in this brief!

      Adapt Your Customer Experience Strategy to Successfully Weather COVID-19 Research & Tools

      Start here

      Read our concise Executive Brief to find out why you should examine the impact of COVID-19 on customer experience strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Adapt Your Customer Experience Strategy to Successfully Weather COVID-19 Storyboard

      1. Assess the impact of COVID-19 on your CXM strategy

      Create a consolidated, updated view of your current customer experience management strategy and identify which elements can be capitalized on to dampen the impact of COVID-19 and which elements are vulnerabilities that the pandemic may threaten to exacerbate.

      2. Blunt the damage of COVID-19 with new CXM tactics

      Create a roadmap of business and technology initiatives through the lens of customer experience management that can be used to help your organization protect its revenue, maintain customer engagement, and enhance its brand integrity.

      [infographic]

      Establish an Effective IT Steering Committee

      • Buy Link or Shortcode: {j2store}191|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $44,821 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Unfortunately, when CIOs implement IT steering committees, they often lack the appropriate structure and processes to be effective.
      • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

      Our Advice

      Critical Insight

      • 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
      • Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
      • Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

      Impact and Result

      Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee:

      • IT Steering Committee Charter: Use this template in combination with this blueprint to form a highly tailored committee.
      • IT Steering Committee Stakeholder Presentation: Build understanding around the goals and purpose of the IT steering committee, and generate support from your leadership team.
      • IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining project prioritization criteria. Track project prioritization and assess your portfolio.

      Establish an Effective IT Steering Committee Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should establish an IT steering committee, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build the steering committee charter

      Build your IT steering committee charter using results from the stakeholder survey.

      • Establish an Effective IT Steering Committee – Phase 1: Build the Steering Committee Charter
      • IT Steering Committee Stakeholder Survey
      • IT Steering Committee Charter

      2. Define IT steering commitee processes

      Define your high level steering committee processes using SIPOC, and select your steering committee metrics.

      • Establish an Effective IT Steering Committee – Phase 2: Define ITSC Processes

      3. Build the stakeholder presentation

      Customize Info-Tech’s stakeholder presentation template to gain buy-in from your key IT steering committee stakeholders.

      • Establish an Effective IT Steering Committee – Phase 3: Build the Stakeholder Presentation
      • IT Steering Committee Stakeholder Presentation

      4. Define the prioritization criteria

      Build the new project intake and prioritization process for your new IT steering committee.

      • Establish an Effective IT Steering Committee – Phase 4: Define the Prioritization Criteria
      • IT Steering Committee Project Prioritization Tool
      • IT Project Intake Form
      [infographic]

      Workshop: Establish an Effective IT Steering Committee

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build the IT Steering Committee

      The Purpose

      Lay the foundation for your IT steering committee (ITSC) by surveying your stakeholders and identifying the opportunities and threats to implementing your ITSC.

      Key Benefits Achieved

       An understanding of the business environment affecting your future ITSC and identification of strategies for engaging with stakeholders

      Activities

      1.1 Launch stakeholder survey for business leaders.

      1.2 Analyze results with an Info-Tech advisor.

      1.3 Identify opportunities and threats to successful IT steering committee implementation.

      1.4 Develop the fit-for-purpose approach.

      Outputs

      Report on business leader governance priorities and awareness

      Refined workshop agenda

      2 Define the ITSC Goals

      The Purpose

      Define the goals and roles of your IT steering committee.

      Plan the responsibilities of your future committee members.

      Key Benefits Achieved

       Groundwork for completing the steering committee charter

      Activities

      2.1 Review the role of the IT steering committee.

      2.2 Identify IT steering committee goals and objectives.

      2.3 Conduct a SWOT analysis on the five governance areas

      2.4 Define the key responsibilities of the ITSC.

      2.5 Define ITSC participation.

      Outputs

      IT steering committee key responsibilities and participants identified

      IT steering committee priorities identified

      3 Define the ITSC Charter

      The Purpose

      Document the information required to create an effective ITSC Charter.

      Create the procedures required for your IT steering committee.

      Key Benefits Achieved

      Clearly defined roles and responsibilities for your steering committee

      Completed IT Steering Committee Charter document

      Activities

      3.1 Build IT steering committee participant RACI.

      3.2 Define your responsibility cadence and agendas.

      3.3 Develop IT steering committee procedures.

      3.4 Define your IT steering committee purpose statement and goals.

      Outputs

      IT steering committee charter: procedures, agenda, and RACI

      Defined purpose statement and goals

      4 Define the ITSC Process

      The Purpose

      Define and test your IT steering committee processes.

      Get buy-in from your key stakeholders through your stakeholder presentation.

      Key Benefits Achieved

      Stakeholder understanding of the purpose and procedures of IT steering committee membership

      Activities

      4.1 Define your high-level IT steering committee processes.

      4.2 Conduct scenario testing on key processes, establish ITSC metrics.

      4.3 Build your ITSC stakeholder presentation.

      4.4 Manage potential objections.

      Outputs

      IT steering committee SIPOC maps

      Refined stakeholder presentation

      5 Define Project Prioritization Criteria

      The Purpose

      Key Benefits Achieved

      Activities

      5.1 Create prioritization criteria

      5.2 Customize the project prioritization tool

      5.3 Pilot test the tool

      5.4 Define action plan and next steps

      Outputs

      IT Steering Committee Project Prioritization Tool

      Action plan

      Further reading

      Establish an Effective IT Steering Committee

      Have the right people making the right decisions to drive IT success.

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs
      • IT Leaders

      This Research Will Also Assist:

      • Business Partners

      This Research Will Help You:

      • Structure an IT steering committee with the appropriate membership and responsibilities
      • Define appropriate cadence around business involvement in IT decision making
      • Define your IT steering committee processes, metrics, and timelines
      • Obtain buy-in for IT steering committee participations
      • Define the project prioritization criteria

      This Research Will Help Them:

      • Understand the importance of IT governance and their role
      • Identify and build the investment prioritization criteria

      Executive Summary

      Situation

      • An effective IT steering committee (ITSC) is one of the top predictors of value generated by IT, yet only 11% of CIOs believe their committees are effective.
      • An effective steering committee ensures that the right people are involved in critical decision making to drive organizational value.

      Complication

      • Unfortunately, when CIOs do implement IT steering committees, they often lack the appropriate structure and processes to be effective.
      • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

      Resolution

      Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee. These include:

      1. IT Steering Committee Charter: Customizable charter complete with example purpose, goals, responsibilities, procedures, RACI, and processes. Use this template in combination with this blueprint to get a highly tailored committee.
      2. IT Stakeholder Presentation: Use our customizable presentation guide to build understanding around the goals and purpose of the IT steering committee and generate support from your leadership team.
      3. IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining the project prioritization criteria. Use our template to track project prioritization and assess your portfolio.

      Info-Tech Insight

      1. 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
      2. Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
      3. Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

      IT Steering Committee

      Effective IT governance critical in driving business satisfaction with IT. Yet 88% of CIOs believe that their governance structure and processes are not effective. The IT steering committee (ITSC) is the heart of the governance body and brings together critical organizational stakeholders to enable effective decision making (Info-Tech Research Group Webinar Survey).

      IT STEERING COMMITTEES HAVE 3 PRIMARY OBJECTIVES – TO IMPROVE:

      1. Alignment: IT steering committees drive IT and business strategy alignment by having business partners jointly accountable for the prioritization and selection of projects and investments within the context of IT capacity.
      2. Accountability: The ITSC facilitates the involvement and commitment of executive management through clearly defined roles and accountabilities for IT decisions in five critical areas: investments, projects, risk, services, and data.
      3. Value Generation: The ITSC is responsible for the ongoing evaluation of IT value and performance of IT services. The committee should define these standards and approve remediation plans when there is non-achievement.

      "Everyone needs good IT, but no one wants to talk about it. Most CFOs would rather spend time with their in-laws than in an IT steering-committee meeting. But companies with good governance consistently outperform companies with bad. Which group do you want to be in?"

      – Martha Heller, President, Heller Search Associates

      An effective IT steering committee improves IT and business alignment and increases support for IT across the organization

      CEOs’ PERCEPTION OF IT AND BUSINESS ALIGNMENT

      67% of CIOs/CEOs are misaligned on the target role for IT.

      47% of CEOs believe that business goals are going unsupported by IT.

      64% of CEOs believe that improvement is required around IT’s understanding of business goals.

      28% of business leaders are supporters of their IT departments.

      A well devised IT steering committee ensures that core business partners are involved in critical decision making and that decisions are based on business goals – not who shouts the loudest. Leading to faster decision-making time, and better-quality decisions and outcomes.

      Source: Info-Tech CIO/CEO Alignment data

      Despite the benefits, 9 out of 10 steering committees are unsuccessful

      WHY DO IT STEERING COMMITTEES FAIL?

      1. A lack of appetite for an IT steering committee from business partners
      2. An effective ITSC requires participation from core members of the organization’s leadership team. The challenge is that most business partners don’t understand the benefits of an ITSC and the responsibilities aren’t tailored to participants’ needs or interests. It’s the CIOs responsibility to make this case to stakeholders and right-size the committee responsibilities and membership.
      3. IT steering committees are given inappropriate responsibilities
      4. The IT steering committee is fundamentally about decision making; it’s not a working committee. CIOs struggle with clarifying these responsibilities on two fronts: either the responsibilities are too vague and there is no clear way to execute on them within a meeting, or responsibilities are too tactical and require knowledge that participants do not have. Responsibilities should determine who is on the ITSC, not the other way around.
      5. Lack of process around execution
      6. An ITSC is only valuable if members are able to successfully execute on the responsibilities. Without well defined processes it becomes nearly impossible for the ITSC to be actionable. As a result, participants lack the information they need to make critical decisions, agendas are unmet, and meetings are seen as a waste of time.

      GOVERNANCE and ITSC and IT Management

      Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

      The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

      Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

      These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

      IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

      RELATIONSHIP BETWEEN STRATEGIC, TACTICAL, AND OPERATIONAL GROUPS

      Strategic IT Steering Committee
      Tactical

      Project Governance Service Governance

      Risk Governance Information Governance

      IT Management
      Operational Risk Task Force

      This blueprint focuses exclusively on building the IT steering committee. For more information on IT governance see Info-Tech’s blueprint Tailor an IT Governance Plan to Fit Organizational Needs.

      1. Governance of the IT Portfolio & Investments: ensures that funding and resources are systematically allocated to the priority projects that deliver value
      2. Governance of Projects: ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.
      3. Governance of Risks: ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.
      4. Governance of Services: ensures that IT delivers the required services at the acceptable performance levels.
      5. Governance of Information and Data: ensures the appropriate classification and retention of data based on business need.

      If these symptoms resonate with you, it might be time to invest in building an IT steering committee

      SIGNS YOU MAY NEED TO BUILD AN IT STEERING COMMITTEE

      As CIO I find that there is a lack of alignment between business and IT strategies.
      I’ve noticed that projects are thrown over the fence by stakeholders and IT is expected to comply.
      I’ve noticed that IT projects are not meeting target project metrics.
      I’ve struggled with a lack of accountability for decision making, especially by the business.
      I’ve noticed that the business does not understand the full cost of initiatives and projects.
      I don’t have the authority to say “no” when business requests come our way.
      We lack a standardized approach for prioritizing projects.
      IT has a bad reputation within the organization, and I need a way to improve relationships.
      Business partners are unaware of how decisions are made around IT risks.
      Business partners don’t understand the full scope of IT responsibilities.
      There are no SLAs in place and no way to measure stakeholder satisfaction with IT.

      Info-Tech’s approach to implementing an IT steering committee

      Info-Tech’s IT steering committee development blueprint will provide you with the required tools, templates, and deliverables to implement a right-sized committee that’s effective the first time.

      • Measure your business partner level of awareness and interest in the five IT governance areas, and target specific responsibilities for your steering committee based on need.
      • Customize Info-Tech’s IT Steering Committee Charter Template to define and document the steering committee purpose, responsibilities, participation, and cadence.
      • Build critical steering committee processes to enable information to flow into and out of the committee to ensure that the committee is able to execute on responsibilities.
      • Customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to make your first meeting a breeze, providing stakeholders with the information they need, with less than two hours of preparation time.
      • Leverage our workshop guide and prioritization tools to facilitate a meeting with IT steering committee members to define the prioritization criteria for projects and investments and roll out a streamlined process.

      Info-Tech’s Four-Phase Process

      Key Deliverables:
      1 2 3 4
      Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
      • IT Steering Committee Stakeholder Survey
      • IT Steering Committee Charter
        • Purpose
        • Responsibilities
        • RACI
        • Procedures
      • IT Steering Committee SIPOC (Suppliers, Inputs, Process, Outputs, Customers)
      • Defined process frequency
      • Defined governance metrics
      • IT Steering Committee Stakeholder Presentation template
        • Introduction
        • Survey outcomes
        • Responsibilities
        • Next steps
        • ITSC goals
      • IT project prioritization facilitation guide
      • IT Steering Committee Project Prioritization Tool
      • Project Intake Form

      Leverage both COBIT and Info-Tech-defined metrics to evaluate the success of your program or project

      COBIT METRICS Alignment
      • Percent of enterprise strategic goals and requirements supported by strategic goals.
      • Level of stakeholder satisfaction with scope of the planned portfolio of programs and services.
      Accountability
      • Percent of executive management roles with clearly defined accountabilities for IT decisions.
      • Rate of execution of executive IT-related decisions.
      Value Generation
      • Level of stakeholder satisfaction and perceived value.
      • Number of business disruptions due to IT service incidents.
      INFO-TECH METRICS Survey Metrics:
      • Percent of business leaders who believe they understand how decisions are made in the five governance areas.
      • Percentage of business leaders who believe decision making involved the right people.
      Value of Customizable Deliverables:
      • Estimated time to build IT steering committee charter independently X cost of employee
      • Estimated time to build and generate customer stakeholder survey and generate reports X cost of employee
      • # of project interruptions due to new or unplanned projects

      CASE STUDY

      Industry: Consumer Goods

      Source: Interview

      Situation

      A newly hired CIO at a large consumer goods company inherited an IT department with low maturity from her predecessor. Satisfaction with IT was very low across all business units, and IT faced a lot of capacity constraints. The business saw IT as a bottleneck or red tape in terms of getting their projects approved and completed.

      The previous CIO had established a steering committee for a short time, but it had a poorly established charter that did not involve all of the business units. Also the role and responsibilities of the steering committee were not clearly defined. This led the committee to be bogged down in politics.

      Due to the previous issues, the business was wary of being involved in a new steering committee. In order to establish a new steering committee, the new CIO needed to navigate the bad reputation of the previous CIO.

      Solution

      The CIO established a new steering committee engaging senior members of each business unit. The roles of the committee members were clearly established in the new steering committee charter and business stakeholders were informed of the changes through presentations.

      The importance of the committee was demonstrated through the new intake and prioritization process for projects. Business stakeholders were impressed with the new process and its transparency and IT was no longer seen as a bottleneck.

      Results

      • Satisfaction with IT increased by 12% after establishing the committee and IT was no longer seen as red tape for completing projects
      • IT received approval to hire two more staff members to increase capacity
      • IT was able to augment service levels, allowing them to reinvest in innovative projects
      • Project prioritization process was streamlined

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Establish an Effective IT Steering Committee

      Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
      Best-Practice Toolkit

      1.1 Survey Your Steering Committee Stakeholders

      1.2 Build Your ITSC Charter

      2.1 Build a SIPOC

      2.2 Define Your ITSC Process

      3.1 Customize the Stakeholder Presentation

      4.1 Establish your Prioritization Criteria

      4.2 Customize the Project Prioritization Tool

      4.3 Pilot Test Your New Prioritization Criteria

      Guided Implementations
      • Launch your stakeholder survey
      • Analyze the results of the survey
      • Build your new ITSC charter
      • Review your completed charter
      • Build and review your SIPOC
      • Review your high-level steering committee processes
      • Customize the presentation
      • Build a script for the presentation
      • Practice the presentation
      • Review and select prioritization criteria
      • Review the Project Prioritization Tool
      • Review the results of the tool pilot test
      Onsite Workshop

      Module 1:

      Build a New ITSC Charter

      Module 2:

      Design Steering Committee Processes

      Module 3:

      Present the New Steering Committee to Stakeholders

      Module 4:

      Establish Project Prioritization Criteria

      Phase 1 Results:
      • Customized ITSC charter

      Phase 2 Results:

      • Completed SIPOC and steering committee processes
      Phase 3 Results:
      • Customized presentation deck and script
      Phase 4 Results:
      • Customized project prioritization tool

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Build the IT Steering Committee

      1.1 Launch stakeholder survey for business leaders

      1.2 Analyze results with an Info-Tech Advisor

      1.3 Identify opportunities and threats to successful IT steering committee implementation.

      1.4 Develop the fit-for-purpose approach

      Define the ITSC Goals

      2.1 Review the role of the IT steering committee

      2.2 Identify IT steering committee goals and objectives

      2.3 Conduct a SWOT analysis on the five governance areas

      2.4 Define the key responsibilities of the ITSC 2.5 Define ITSC participation

      Define the ITSC Charter

      3.1 Build IT steering committee participant RACI

      3.2 Define your responsibility cadence and agendas

      3.3 Develop IT steering committee procedures

      3.4 Define your IT steering committee purpose statement and goals

      Define the ITSC Process

      4.1 Define your high-level IT steering committee processes

      4.2 Conduct scenario testing on key processes, establish ITSC metrics

      4.3 Build your ITSC stakeholder presentation

      4.4 Manage potential objections

      Define Project Prioritization Criteria

      5.1 Create prioritization criteria

      5.2 Customize the Project Prioritization Tool

      5.3 Pilot test the tool

      5.4 Define action plan and next steps

      Deliverables
      1. Report on business leader governance priorities and awareness
      2. Refined workshop agenda
      1. IT steering committee priorities identified
      2. IT steering committee key responsibilities and participants identified
      1. IT steering committee charter: procedures, agenda, and RACI
      2. Defined purpose statement and goals
      1. IT steering committee SIPOC maps
      2. Refined stakeholder presentation
      1. Project Prioritization Tool
      2. Action plan

      Phase 1

      Build the IT Steering Committee Charter

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Formalize the Security Policy Program

      Proposed Time to Completion: 1-2 weeks

      Select Your ITSC Members

      Start with an analyst kick-off call:

      • Launch your stakeholder survey

      Then complete these activities…

      • Tailor the survey questions
      • Identify participants and tailor email templates

      With these tools & templates:

      • ITSC Stakeholder Survey
      • ITSC Charter Template

      Review Stakeholder Survey Results

      Review findings with analyst:

      • Review the results of the Stakeholder Survey

      Then complete these activities…

      • Customize the ITSC Charter Template

      With these tools & templates:

      • ITSC Charter Template

      Finalize the ITSC Charter

      Finalize phase deliverable:

      • Review the finalized ITSC charter with an Info-Tech analyst

      Then complete these activities…

      • Finalize any changes to the ITSC Charter
      • Present it to ITSC Members

      With these tools & templates:

      • ITSC Charter Template

      Build the IT Steering Committee Charter

      This step will walk you through the following activities:

      • Launch and analyze the stakeholder survey
      • Define your ITSC goals and purpose statement
      • Determine ITSC responsibilities and participants
      • Determine ITSC procedures

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      Be exclusive with your IT steering committee membership. Determine committee participation based on committee responsibilities. Select only those who are key decision makers for the activities the committee is responsible for and, wherever possible, keep membership to 5-8 people.

      Tailor Info-Tech’s IT Steering Committee Charter Template to define terms of reference for the ITSC

      1.1

      A charter is the organizational mandate that outlines the purpose, scope, and authority of the ITSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.

      Start by reviewing Info-Tech’s template. Throughout this section we will help you to tailor its contents.

      Committee Purpose: The rationale, benefits of, and overall function of the committee.

      Responsibilities: What tasks/decisions the accountable committee is making.

      Participation: Who is on the committee

      RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.

      Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with business units.

      A screenshot of Info-Tech's <em data-verified=IT Steering Committee Charter Template.">

      IT Steering Committee Charter

      Take a data-driven approach to build your IT steering committee based on business priorities

      1.2

      Leverage Info-Tech’s IT Steering Committee Stakeholder Surveyand reports to quickly identify business priorities and level of understanding of how decisions are made around the five governance areas.

      Use these insights to drive the IT steering committee responsibilities, participation, and communication strategy.

      The Stakeholder Survey consists of 17 questions on:

      • Priority governance areas
      • Desired level of involvement in decision making in the five governance areas
      • Knowledge of how decisions are made
      • Five open-ended questions on improvement opportunities

      To simplify your data collection and reporting, Info-Tech can launch a web-based survey, compile the report data and assist in the data interpretation through one of our guided implementations.

      Also included is a Word document with recommended questions, if you prefer to manage the survey logistics internally.

      A screenshot of Info-Tech's first page of the <em data-verified=IT Steering Committee Stakeholder Survey "> A screenshot of Info-Tech's survey.

      Leverage governance reports to define responsibilities and participants, and in your presentation to stakeholders

      1.3

      A screenshot is displayed. It advises that 72% of stakeholders do <strong data-verified= understand how decisions around IT services are made (quality, availability, etc.). Two graphs are included in the screenshot. One of the bar graphs shows the satisfaction with the quality of decisions and transparency around IT services. The other bar graph displays IT decisions around service delivery and quality that involve the right people.">

      OVERALL PRIORITIES

      You get:

      • A clear breakdown of stakeholders’ level of understanding on how IT decisions are made in the five governance areas
      • Stakeholder perceptions on the level of IT and business involvement in decision making
      • Identification of priority areas

      So you can:

      • Get an overall pulse check for understanding
      • Make the case for changes in decision-making accountability
      • Identify which areas the IT steering committee should focus on
      A screenshot is displayed. It advises that 80% of stakeholders do <strong data-verified=not understand how decisions around IT investments or project and service resourcing are made. Two bar graphs are displayed. One of the bar graphs shows the satisfaction with the quality of decisions made around IT investments. The other graph display IT decisions around spending priorities involving the right people.">

      GOVERNANCE AREA REPORTS

      You get:

      • Satisfaction score for decision quality in each governance area
      • Breakdown of decision-making accountability effectiveness
      • Identified level of understanding around decision making
      • Open-ended comments

      So you can:

      • Identify the highest priority areas to change.
      • To validate changes in decision-making accountability
      • To understand business perspectives on decision making.

      Conduct a SWOT analysis of the five governance areas

      1.4

      1. Hold a meeting with your IT leadership team to conduct a SWOT analysis on each of the five governance areas. Start by printing off the following five slides to provide participants with examples of the role of governance and the symptoms of poor governance in each area.
      2. In groups of 1-2 people, have each group complete a SWOT analysis for one of the governance areas. For each consider:
      • Strengths: What is currently working well in this area?
      • Weaknesses: What could you improve? What are some of the challenges you’re experiencing?
      • Opportunities: What are some organizational trends that you can leverage? Consider whether your strengths or weaknesses that could create opportunities?
      • Threats: What are some key obstacles across people, process, and technology?
    • Have each team or individual rotate until each person has contributed to each SWOT. Add comments from the stakeholder survey to the SWOT.
    • As a group rank each of the five areas in terms of importance for a phase one IT steering committee implementation, and highlight the top 10 challenges, and the top 10 opportunities you see for improvement.
    • Document the top 10 lists for use in the stakeholder presentation.
    • INPUT

      • Survey outcomes
      • Governance overview handouts

      OUTPUT

      • SWOT analysis
      • Ranked 5 areas
      • Top 10 challenges and opportunities identified.

      Materials

      • Governance handouts
      • Flip chart paper, pens

      Participants

      • IT leadership team

      Governance of RISK

      Governance of risk establishes the risk framework, establishes policies and standards, and monitors risks.

      Governance of risk ensures that IT is mitigating all relevant risks associated with IT investments, projects, and services.

      GOVERNANCE ROLES:

      1. Defines responsibility and accountability for IT risk identification and mitigation.
      2. Ensures the consideration of all elements of IT risk, including value, change, availability, security, project, and recovery
      3. Enables senior management to make better IT decisions based on the evaluation of the risks involved
      4. Facilitates the identification and analysis of IT risk and ensures the organization’s informed response to that risk.

      Symptoms of poor governance of risk

      • Opportunities for value creation are missed by not considering or assessing IT risk, or by completely avoiding all risk.
      • No formal risk management process or accountabilities exist.
      • There is no business continuity strategy.
      • Frequent security breaches occur.
      • System downtime occurs due to failed IT changes.

      Governance of PPM

      Governance of the IT portfolio achieves optimum ROI through prioritization, funding, and resourcing.

      PPM practices create value if they maximize the throughput of high-value IT projects at the lowest possible cost. They destroy value when they foster needlessly sophisticated and costly processes.

      GOVERNANCE ROLES:

      1. Ensures that the projects that deliver greater business value get a higher priority.
      2. Provides adequate funding for the priority projects and ensures adequate resourcing and funding balanced across the entire portfolio of projects.
      3. Makes the business and IT jointly accountable for setting project priorities.
      4. Evaluate, direct, and monitor IT value metrics and endorse the IT strategy and monitor progress.

      Symptoms of poor governance of PPM/investments

      • The IT investment mix is determined solely by Finance and IT.
      • It is difficult to get important projects approved.
      • Projects are started then halted, and resources are moved to other projects.
      • Senior management has no idea what projects are in the backlog.
      • Projects are approved without a valid business case.

      Governance of PROJECTS

      Governance of projects improves the quality and speed of decision making for project issues.

      Don’t confuse project governance and management. Governance makes the decisions regarding allocation of funding and resources and reviews the overall project portfolio metrics and process methodology.

      Management ensures the project deliverables are completed within the constraints of time, budget, scope, and quality.

      GOVERNANCE ROLES:

      1. Monitors and evaluates the project management process and critical project methodology metrics.
      2. Ensures review and mitigation of project issue and that management is aware of projects in crisis.
      3. Ensures that projects beginning to show characteristics of failure cannot proceed until issues are resolved.
      4. Endorses the project risk criteria, and monitors major risks to project completion.
      5. Approves the launch and execution of projects.

      Symptoms of poor governance of projects

      • Projects frequently fail or get cancelled.
      • Project risks and issues are not identified or addressed.
      • There is no formal project management process.
      • There is no senior stakeholder responsible for making project decisions.
      • There is no formal project reporting.

      Governance of SERVICES

      Governance of services ensures delivery of a highly reliable set of IT services.

      Effective governance of services enables the business to achieve the organization’s goals and strategies through the provision of reliable and cost-effective services.

      GOVERNANCE ROLES:

      1. Ensures the satisfactory performance of those services critical to achieving business objectives.
      2. Monitors and directs changes in service levels.
      3. Ensures operational and performance objectives for IT services are met.
      4. Approves policy and standards on the service portfolio.

      Symptoms of poor governance of service

      • There is a misalignment of business needs and expectations with IT capability.
      • No metrics are reported for IT services.
      • The business is unaware of the IT services available to them.
      • There is no accountability for service level performance.
      • There is no continuous improvement plan for IT services.
      • IT services or systems are frequently unavailable.
      • Business satisfaction with IT scores are low.

      Governance of INFORMATION

      Governance of information ensures the proper handling of data and information.

      Effective governance of information ensures the appropriate classification, retention, confidentiality, integrity, and availability of data in line with the needs of the business.

      GOVERNANCE ROLES:

      1. Ensures the information lifecycle owner and process are defined and endorse by business leadership.
      2. Ensures the controlled access to a comprehensive information management system.
      3. Ensures knowledge, information, and data are gathered, analyzed, stored, shared, used, and maintained.
      4. Ensures that external regulations are identified and met.

      Symptoms of poor governance of information

      • There is a lack of clarity around data ownership, and data quality standards.
      • There is insufficient understanding of what knowledge, information, and data are needed by the organization.
      • There is too much effort spent on knowledge capture as opposed to knowledge transfer and re-use.
      • There is too much focus on storing and sharing knowledge and information that is not up to date or relevant.
      • Personnel see information management as interfering with their work.

      Identify the responsibilities of the IT steering committee

      1.5

      1. With your IT leadership team, review the typical responsibilities of the IT steering committee on the following slide.
      2. Print off the following slide, and in your teams of 1-2 have each group identify which responsibilities they believe the IT steering committee should have, brainstorm any additional responsibilities, and document their reasoning.
      3. Note: The bolded responsibilities are the ones that are most common to IT steering committees, and greyed out responsibilities are typical of a larger governance structure. Depending on their level of importance to your organization, you may choose to include the responsibility.

      4. Have each team present to the larger group, track the similarities and differences between each of the groups, and come to consensus on the list of responsibilities.
      5. Complete a sanity check – review your swot analysis and survey results. Do the responsibilities you’ve identified resolve the critical challenges or weaknesses?
      6. As a group, consider the responsibilities and consider whether you can reasonably implement those in one year, or if there are any that will need to wait until year two of the IT steering committee.
      7. Modify the list of responsibilities in Info-Tech’s IT Steering Committee Charter by deleting the responsibilities you do not need and adding any that you identified in the process.

      INPUT

      • SWOT analysis
      • Survey reports

      OUTPUT

      • Defined ITSC responsibilities documented in the ITSC Charter

      Materials

      • Responsibilities handout
      • Voting dots

      Participants

      • IT leadership team

      Typical IT steering committee and governance responsibilities

      The bolded responsibilities are those that are most common to IT steering committees, and responsibilities listed in grey are typical of a larger governance structure.

      INVESTMENTS / PPM

      • Establish the target investment mix
      • Evaluate and select programs/projects to fund
      • Monitor IT value metrics
      • Endorse the IT budget
      • Monitor and report on program/project outcomes
      • Direct the governance optimization
      • Endorse the IT strategy

      PROJECTS

      • Monitor project management metrics
      • Approve launch of projects
      • Review major obstacles to project completion
      • Monitor a standard approach to project management
      • Monitor and direct project risk
      • Monitor requirements gathering process effectiveness
      • Review feasibility studies and formulate alternative solutions for high risk/high investment projects

      SERVICE

      • Monitor stakeholder satisfaction with services
      • Monitor service metrics
      • Approve plans for new or changed service requirements
      • Monitor and direct changes in service levels
      • Endorse the enterprise architecture
      • Approve policy and standards on the service portfolio
      • Monitor performance and capacity

      RISK

      • Monitor risk management metrics
      • Review the prioritized list of risks
      • Monitor changes in external regulations
      • Maintain risk profiles
      • Approve the risk management emergency action process
      • Maintain a mitigation plan to minimize risk impact and likelihood
      • Evaluate risk management
      • Direct risk management

      INFORMATION / DATA

      • Define information lifecycle process ownership
      • Monitor information lifecycle metrics
      • Define and monitor information risk
      • Approve classification categories of information
      • Approve information lifecycle process
      • Set policies on retirement of information

      Determine committee membership based on the committee’s responsibilities

      • One of the biggest benefits to an IT steering committee is it involves key leadership from the various lines of business across the organization.
      • However, in most cases, more people get involved than is required, and all the committee ends up accomplishing is a lot of theorizing. Participants should be selected based on the identified responsibilities of the IT steering committee.
      • If the responsibilities don’t match the participants, this will negatively impact committee effectiveness as leaders become disengaged in the process and don’t feel like it applies to them or accomplishes the desired goals. Once participants begin dissenting, it’s significantly more difficult to get results.
      • Be careful! When you have more than one individual in a specific role, select only the people whose attendance is absolutely critical. Don’t let your governance collapse under committee overload!

      LIKELY PARTICIPANT EXAMPLES:

      MUNICIPALITY

      • City Manager
      • CIO/IT Leader
      • CCO
      • CFO
      • Division Heads

      EDUCATION

      • Provost
      • Vice Provost
      • VP Academic
      • VP Research
      • VP Public Affairs
      • VP Operations
      • VP Development
      • Etc.

      HEALTHCARE

      • President/CEO
      • CAO
      • EVP/ EDOs
      • VPs
      • CIO
      • CMO

      PRIVATE ORGANIZATIONS

      • CEO
      • CFO
      • COO
      • VP Marketing
      • VP Sales
      • VP HR
      • VP Product Development
      • VP Engineering
      • Etc.

      Identify committee participants and responsibility cadence

      1.6

      1. In a meeting with your IT leadership team, review the list of committee responsibilities and document them on a whiteboard.
      2. For each responsibility, identify the individuals whom you would want to be either responsible or accountable for that decision.
      3. Repeat this until you’ve completed the exercise for each responsibility.
      4. Group the responsibilities with the same participants and highlight groupings with less than four participants. Consider the responsibility and determine whether you need to change the wording to make it more applicable or if you should remove the responsibility.
      5. Review the grouping, the responsibilities within them, and their participants, and assess how frequently you would like to meet about them – annually, quarterly, or monthly. (Note: suggested frequency can be found in the IT Steering Committee Charter.)
      6. Subdivide the responsibilities for the groupings to determine your annual, quarterly, and monthly meeting schedule.
      7. Validate that one steering committee is all that is needed, or divide the responsibilities into multiple committees.
      8. Document the committee participants in the IT Steering Committee Charter and remove any unneeded responsibilities identified in the previous exercise.

      INPUT

      • List of responsibilities

      OUTPUT

      • ITSC participants list
      • Meeting schedule

      Materials

      • Whiteboard
      • Markers

      Participants

      • IT leadership team

      Committees can only be effective if they have clear and documented authority

      It is not enough to participate in committee meetings; there needs to be a clear understanding of who is accountable, responsible, consulted, and informed about matters brought to the attention of the committee.

      Each committee responsibility should have one person who is accountable, and at least one person who is responsible. This is the best way to ensure that committee work gets done.

      An authority matrix is often used within organizations to indicate roles and responsibilities in relation to processes and activities. Using the RACI model as an example, there is only one person accountable for an activity, although several people may be responsible for executing parts of the activity. In this model, accountable means end-to-end accountability for the process.

      RESPONSIBLE: The one responsible for getting the job done.

      ACCOUNTABLE: Only one person can be accountable for each task.

      CONSULTED: Involvement through input of knowledge and information.

      INFORMED: Receiving information about process execution and quality.

      A chart is depicted to show an example of the authority matrix using the RACI model.

      Define IT steering committee participant RACI for each of the responsibilities

      1.7

      1. Use the table provided in the IT Steering Committee Charter and edit he list of responsibilities to reflect the chosen responsibilities of your ITSC.
      2. Along the top of the chart list the participant names, and in the right hand column of the table document the agreed upon timing from the previous exercise.
      3. For each of the responsibilities identify whether participants are Responsible, Accountable, Consulted, or Informed by denoting an R, A, C, I, or N/A in the table. Use N/A if this is a responsibility that the participant has no involvement in.
      4. Review your finalized RACI chart. If there are participants who are only consulted or informed about the majority of responsibilities, consider removing them from the IT steering committee. You only want the decision makers on the committee.

      INPUT

      • Responsibilities
      • Participants

      OUTPUT

      • RACI documented in the ITSC Charter

      Materials

      • ITSC RACI template
      • Projector

      Participants

      • IT leadership

      Building the agenda may seem trivial, but it is key for running effective meetings

      49% of people consider unfocused meetings as the biggest workplace time waster.*

      63% of the time meetings do not have prepared agendas.*

      80% Reduction of time spent in meetings by following a detailed agenda and starting on time.*

      *(Source: http://visual.ly/fail-plan-plan-fail).

      EFFECTIVE MEETING AGENDAS:

      1. Have clearly defined meeting objectives.
      2. Effectively time-boxed based on priority items.
      3. Defined at least two weeks prior to the meetings.
      4. Evaluated regularly – are not static.
      5. Leave time at the end for new business, thus minimizing interruptions.

      BUILDING A CONSENT AGENDA

      A consent agenda is a tool to free up time at meetings by combining previously discussed or simple items into a single item. Items that can be added to the consent agenda are those that are routine, noncontroversial, or provided for information’s sake only. It is expected that participants read this information and, if it is not pulled out, that they are in agreement with the details.

      Members have the option to pull items out of the consent agenda for discussion if they have questions. Otherwise these are given no time on the agenda.

      Define the IT steering committee meeting agendas and procedures

      1.8

      Agendas

      1. Review the listed responsibilities, participants, and timing as identified in a previous exercise.
      2. Annual meeting: Identify if all of the responsibilities will be included in the annual meeting agenda (likely all governance responsibilities).
      3. Quarterly Meeting Agenda: Remove the meeting responsibilities from the annual meeting agenda that are not required and create a list of responsibilities for the quarterly meetings.
      4. Monthly Meeting Agenda: Remove all responsibilities from the list that are only annual or quarterly and compile a list of monthly meeting responsibilities.
      5. Review each responsibility, and estimate the amount of time each task will take within the meeting. We recommend giving yourself at least an extra 10-20% more time for each agenda item for your first meeting. It’s better to have more time than to run out.
      6. Complete the Agenda Template in the IT Steering Committee Charter.

      Procedures:

      1. Review the list of IT steering committee procedures, and replace the grey text with the information appropriate for your organization.

      INPUT

      • Responsibility cadence

      OUTPUT

      • ITSC annual, quarterly, monthly meeting agendas & procedures

      Materials

      • ITSC Charter

      Participants

      • IT leadership team

      Draft your IT steering committee purpose statement and goals

      1.9

      1. In a meeting with your IT leadership team – and considering the defined responsibilities, participants, and opportunities and threats identified – review the example goal statement in the IT Steering Committee Charter, and first identify whether any of these statements apply to your organization. Select the statements that apply and collaboratively make any changes needed.
      2. Define unique goal statements by considering the following questions:
        1. What three things would you realistically list for the ITSC to achieve.
        2. If you were to accomplish three things in the next year, what would those be?
      3. Document those goals in the IT Steering Committee Charter.
      4. With those goal statements in mind, consider the overall purpose of the committee. The purpose statement should be a reflection of what the committee does, why it does it, and the goals.
      5. Have each individual review the example purpose statement, and draft what they think a good purpose statement would be.
      6. Present each statement, and work together to determine a best of breed statement.
      7. Document this in the IT Steering Committee Charter.

      INPUT

      • Responsibilities, participants, top 10 lists of challenges and opportunities.

      OUTPUT

      • ITSC goals and purpose statement

      Materials

      • ITSC Charter

      Participants

      • IT leadership team

      CASE STUDY

      "Clearly defined Committee Charter allows CIO to escape the bad reputation of previous committee."

      Industry: Consumer Goods

      Source: Interview

      CHALLENGE

      The new CIO at a large consumer goods company had difficulty generating interest in creating a new IT steering committee. The previous CIO had created a steering committee that was poorly organized and did not involve all of the pertinent members. This led to a committee focused on politics that would often devolve into gossip. Also, many members were dissatisfied with the irregular meetings that would often go over their allotted time.

      In order to create a new committee, the new CIO needed to dispel the misgivings of the business leadership.

      SOLUTION

      The new CIO decided to build the new steering committee from the ground up in a systematic way.

      She collected information from relevant stakeholders about what they know/how they feel about IT and used this information to build a detailed charter.

      Using this info she outlined the new steering committee charter and included in it the:

      1. Purpose
      2. Responsibilities
      3. RACI Chart
      4. Procedures

      OUTCOME

      The new steering committee included all the key members of business units, and each member was clear on their roles in the meetings. Meetings were streamlined and effective. The adjustments in the charter and the improvement in meeting quality played a role in improving the satisfaction scores of business leaders with IT by 21%.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1

      A screenshot of activity 1.1 is displayed. 1.1 is about surveying your ITSC stakeholders.

      Survey your ITSC stakeholders

      Prior to the workshop, Info-Tech’s advisors will work with you to launch the IT Steering Committee Stakeholder Survey to understand business priorities and level of understanding of how decisions are made. Using this data, we will create the IT steering committee responsibilities, participation, and communication strategy.

      1.7

      A screenshot of activity 1.7 is displayed. 1.7 is about defining a participant RACI for each of the responsibilities.

      Define a participant RACI for each of the responsibilities

      The analyst will facilitate several exercises to help you and your stakeholders create an authority matrix. The output will be defined responsibilities and authorities for members.

      Phase 2

      Build the IT Steering Committee Process

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Define your ITSC Processes
      Proposed Time to Completion: 2 weeks

      Review SIPOCs and Process Creation

      Start with an analyst kick-off call:

      • Review the purpose of the SIPOC and how to build one

      Then complete these activities…

      • Build a draft SIPOC for your organization

      With these tools & templates:

      Phase 2 of the Establish an Effective IT Steering Committee blueprint

      Finalize the SIPOC

      Review Draft SIPOC:

      • Review and make changes to the SIPOC
      • Discuss potential metrics

      Then complete these activities…

      • Test survey link
      • Info-Tech launches survey

      With these tools & templates:

      Phase 2 of the Establish an Effective IT Steering Committee blueprint

      Finalize Metrics

      Finalize phase deliverable:

      • Finalize metrics

      Then complete these activities…

      • Establish ITSC metric triggers

      With these tools & templates:

      Phase 2 of the Establish an Effective IT Steering Committee blueprint

      Build the IT Steering Committee Process

      This step will walk you through the following activities:

      • Define high-level steering committee processes using SIPOC
      • Select steering committee metrics

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      Building high-level IT steering committee processes brings your committee to life. Having a clear process will ensure that you have the right information from the right sources so that committees can operate and deliver the appropriate output to the customers who need it.

      Build your high-level IT steering committee processes to enable committee functionality

      The IT steering committee is only valuable if members are able to successfully execute on responsibilities.

      One of the most common mistakes organizations make is that they build their committee charters and launch into their first meeting. Without defined inputs and outputs, a committee does not have the needed information to be able to effectively execute on responsibilities and is unable to meet its stated goals.

      The arrows in this picture represent the flow of information between the IT steering committee, other committees, and IT management.

      Building high-level processes will define how that information flows within and between committees and will enable more rapid decision making. Participants will have the information they need to be confident in their decisions.

      Strategic IT Steering Committee
      Tactical

      Project Governance Service Governance

      Risk Governance Information Governance

      IT Management
      Operational Risk Task Force

      Define the high-level process for each of the IT steering committee responsibilities

      Info-Tech recommends using SIPOC as a way of defining how the IT steering committee will operate.

      Derived from the core methodologies of Six Sigma process management, SIPOC – a model of Suppliers, Inputs, Processes, Outputs, Customers – is one of several tools that organizations can use to build high level processes. SIPOC is especially effective when determining process scope and boundaries and to gain consensus on a process.

      By doing so you’ll ensure that:

      1. Information and documentation required to complete each responsibility is identified.
      2. That the results of committee meetings are distributed to those customers who need the information.
      3. Inputs and outputs are identified and that there is defined accountability for providing these.

      Remember: Your IT steering committee is not a working committee. Enable effective decision making by ensuring participants have the necessary information and appropriate recommendations from key stakeholders to make decisions.

      Supplier Input
      Who provides the inputs to the governance responsibility. The documented information, data, or policy required to effectively respond to the responsibility.
      Process
      In this case this represents the IT steering committee responsibility defined in terms of the activity the ITSC is performing.
      Output Customer
      The outcome of the meeting: can be approval, rejection, recommendation, request for additional information, endorsement, etc. Receiver of the outputs from the committee responsibility.

      Define your SIPOC model for each of the IT steering committee responsibilities

      2.1

      1. In a meeting with your IT leadership, draw the SIPOC model on a whiteboard or flip-chart paper. Either review the examples on the following slides or start from scratch.
      2. If you are adjusting the following slides, consider the templates you already have which would be appropriate inputs and make adjustments as needed.

      For atypical responsibilities:

      1. Start with the governance responsibility and identify what specifically it is that the IT steering committee is doing with regards to that responsibility. Write that in the center of the model.
      2. As a group, consider what information or documentation would be required by the participants to effectively execute on the responsibility.
      3. Identify which individual will supply each piece of documentation. This person will be accountable for this moving forward.
      4. Outputs: Once the committee has met about the responsibility, what information or documentation will be produced. List all of those documents.
      5. Identify the individuals who need to receive the outputs of the information.
      6. Repeat this for all of the responsibilities.
      7. Once complete, document the SIPOC models in the IT Steering Committee Charter.

      INPUT

      • List of responsibilities
      • Example SIPOCs

      OUTPUT

      • SIPOC model for all responsibilities.

      Materials

      • Whiteboard
      • Markers
      • ITSC Charter

      Participants

      • IT leadership team

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Establish the target investment mix
      Supplier Input
      CIO
      • Target investment mix and rationale
      Process
      Responsibility: The IT steering committee shall review and approve the target investment mix.
      Output Customer
      • Approval of target investment mix
      • Rejection of target investment mix
      • Request for additional information
      • CFO
      • CIO
      • IT leadership
      SIPOC: Endorse the IT budget
      Supplier Input
      CIO
      • Recommendations

      See Info-Tech’s blueprint IT Budget Presentation

      Process

      Responsibility: Review the proposed IT budget as defined by the CIO and CFO.

      Output Customer
      • Signed endorsement of the IT budget
      • Request for additional information
      • Recommendation for changes to the IT budget.
      • CFO
      • CIO
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Monitor IT value metrics
      Supplier Input
      CIO
      • IT value dashboard
      • Key metric takeaways
      • Recommendations
      CIO Business Vision
      Process

      Responsibility: Review recommendations and either accept or reject recommendations. Refine go-forward metrics.

      Output Customer
      • Launch corrective task force
      • Accept recommendations
      • Define target metrics
      • CEO
      • CFO
      • Business executives
      • CIO
      • IT leadership
      SIPOC: Evaluate and select programs/projects to fund
      Supplier Input
      PMO
      • Recommended project list
      • Project intake documents
      • Prioritization criteria
      • Capacity metrics
      • IT budget

      See Info-Tech’s blueprint

      Grow Your Own PPM Solution
      Process

      Responsibility: The ITSC will approve the list of projects to fund based on defined prioritization criteria – in line with capacity and IT budget.

      It is also responsible for identifying the prioritization criteria in line with organizational priorities.

      Output Customer
      • Approved project list
      • Request for additional information
      • Recommendation for increased resources
      • PMO
      • CIO
      • Project sponsors

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Endorse the IT strategy
      Supplier Input
      CIO
      • IT strategy presentation

      See Info-Tech’s blueprint

      IT Strategy and Roadmap
      Process

      Responsibility: Review, understand, and endorse the IT strategy.

      Output Customer
      • Signed endorsement of the IT strategy
      • Recommendations for adjustments
      • CEO
      • CFO
      • Business executives
      • IT leadership
      SIPOC: Monitor project management metrics
      Supplier Input
      PMO
      • Project metrics report with recommendations
      Process

      Responsibility: Review recommendations around PM metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept project metrics performance
      • Accept recommendations
      • Launch corrective task force
      • Define target metrics
      • PMO
      • Business executives
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Approve launch of planned and unplanned project
      Supplier Input
      CIO
      • Project list and recommendations
      • Resourcing report
      • Project intake document

      See Info-Tech’s Blueprint:

      Grow Your Own PPM Solution
      Process

      Responsibility: Review the list of projects and approve the launch or reprioritization of projects.

      Output Customer
      • Approved launch of projects
      • Recommendations for changes to project list
      • CFO
      • CIO
      • IT leadership
      SIPOC: Monitor stakeholder satisfaction with services and other service metrics
      Supplier Input
      Service Manager
      • Service metrics report with recommendations
      Info-Tech End User Satisfaction Report
      Process

      Responsibility: Review recommendations around service metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept service level performance
      • Accept recommendations
      • Launch corrective task force
      • Define target metrics
      • Service manager
      • Business executives
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Approve plans for new or changed service requirements
      Supplier Input
      Service Manager
      • Service change request
      • Project request and change plan
      Process

      Responsibility: Review IT recommendations, approve changes, and communicate those to staff.

      Output Customer
      • Approved service changes
      • Rejected service changes
      • Service manager
      • Organizational staff
      SIPOC: Monitor risk management metrics
      Supplier Input
      CIO
      • Risk metrics report with recommendations
      Process

      Responsibility: Review recommendations around risk metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept risk register and mitigation strategy
      • Launch corrective task force to address risks
      • Risk manager
      • Business executives
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Review the prioritized list of risks
      Supplier Input
      Risk Manager
      • Risk register
      • Mitigation strategies
      See Info-Tech’s risk management research to build a holistic risk strategy.
      Process

      Responsibility: Accept the risk registrar and define any additional action required.

      Output Customer
      • Accept risk register and mitigation strategy
      • Launch corrective task force to address risks
      • Risk manager
      • IT leadership
      • CRO
      SIPOC: Define information lifecycle process ownership
      Supplier Input
      CIO
      • List of risk owner options with recommendations
      See Info-Tech’s related blueprint: Information Lifecycle Management
      Process

      Responsibility: Define responsibility and accountability for information lifecycle ownership.

      Output Customer
      • Defined information lifecycle owner
      • Organization wide.

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Monitor information lifecycle metrics
      Supplier Input
      Information lifecycle owner
      • Information metrics report with recommendations
      Process

      Responsibility: Review recommendations around information management metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept information management performance
      • Accept recommendations
      • Launch corrective task force to address challenges
      • Define target metrics
      • IT leadership

      Define which metrics you will report to the IT steering committee

      2.2

      1. Consider your IT steering committee goals and the five IT governance areas.
      2. For each governance area, identify which metrics you are currently tracking and determine whether these metrics are valuable to IT, to the business, or both. For metrics that are valuable to business stakeholders determine whether you have an identified target metric.

      New Metrics:

      1. For each of the five IT governance areas review your SWOT analysis and document your key opportunities and weaknesses.
      2. For each, brainstorm hypotheses around why the opportunity was weak or was a success. For each hypothesis identify if there are any clear ways to measure and test the hypothesis.
      3. Review the list of metrics and select 5-7 metrics to track for each prioritized governance area.

      INPUT

      • List of responsibilities
      • Example SIPOCs

      OUTPUT

      • SIPOC model for all responsibilities

      Materials

      • Whiteboard
      • Markers

      Participants

      • IT leadership team

      IT steering committee metric triggers to consider

      RISK

      • Risk profile % increase
      • # of actionable risks outstanding
      • # of issues arising not identified prior
      • # of security breaches

      SERVICE

      • Number of business disruptions due to IT service incidents
      • Number of service requests by department
      • Number of service requests that are actually projects
      • Causes of tickets overall and by department
      • Percentage of duration attributed to waiting for client response

      PROJECTS

      • Projects completed within budget
      • Percentage of projects delivered on time
      • Project completion rate
      • IT completed assigned portion to scope
      • Project status and trend dashboard

      INFORMATION / DATA

      • % of data properly classified
      • # of incidents locating data
      • # of report requests by complexity
      • # of open data sets

      PPM /INVESTMENTS

      • CIO Business Vision (an Info-Tech diagnostic survey that helps align IT strategy with business goals)
      • Level of stakeholder satisfaction and perceived value
      • Percentage of ON vs. OFF cycle projects by area/silo
      • Realized benefit to business units based on investment mix
      • Percent of enterprise strategic goals and requirements supported by strategic goals
      • Target vs. actual budget
      • Reasons for off-cycle projects causing delays to planned projects

      CASE STUDY

      Industry: Consumer Goods

      Source: Interview

      "IT steering committee’s reputation greatly improved by clearly defining its process."

      CHALLENGE

      One of the major failings of the previous steering committee was its poorly drafted procedures. Members of the committee were unclear on the overall process and the meeting schedule was not well established.

      This led to low attendance at the meetings and ineffective meetings overall. Since the meeting procedures weren’t well understood, some members of the leadership team took advantage of this to get their projects pushed through.

      SOLUTION

      The first step the new CIO took was to clearly outline the meeting procedures in her new steering committee charter. The meeting agenda, meeting goals, length of time, and outcomes were outlined, and the stakeholders signed off on their participation.

      She also gave the participants a SIPOC, which helped members who were unfamiliar with the process a high-level overview. It also reacquainted previous members with the process and outlined changes to the previous, out-of-date processes.

      OUTCOME

      The participation rate in the committee meetings improved from the previous rate of approximately 40% to 90%. The committee members were much more satisfied with the new process and felt like their contributions were appreciated more than before.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      An image of an Info-Tech analyst is depicted.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1

      A screenshot of activity 2.1 is depicted. Activity 2.1 is about defining a SIPOC for each of the ITSC responsibilities.

      Define a SIPOC for each of the ITSC responsibilities

      Create SIPOCs for each of the governance responsibilities with the help of an Info-Tech advisor.

      2.2

      A screenshot of activity 2.2 is depicted. Activity 2.2 is about establishing the reporting metrics for the ITSC.

      Establish the reporting metrics for the ITSC

      The analyst will facilitate several exercises to help you and your stakeholders define the reporting metrics for the ITSC.

      Phase 3

      Build the Stakeholder Presentation

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Build the Stakeholder Presentation
      Proposed Time to Completion: 1 week

      Customize the Presentation

      Start with an analyst kick-off call:

      • Review the IT Steering Committee Stakeholder Presentation with an analyst

      Then complete these activities…

      • Schedule the first meeting and invite the ITSC members
      • Customize the presentation template

      With these tools & templates:

      IT Steering Committee Stakeholder Presentation


      Review and Practice the Presentation

      Review findings with analyst:

      • Review the changes made to the template
      • Practice the presentation and create a script

      Then complete these activities…

      • Hold the ITSC meeting

      With these tools & templates:

      • IT Steering Committee Stakeholder Presentation
      Review the First ITSC Meeting

      Finalize phase deliverable:

      • Review the outcomes of the first ITSC meeting and plan out the next steps

      Then complete these activities…

      • Review the discussion and plan next steps

      With these tools & templates:

      Establish an Effective IT Steering Committee blueprint

      Build the Stakeholder Presentation

      This step will walk you through the following activities:

      • Organizing the first ITSC meeting
      • Customizing an ITSC stakeholder presentation
      • Determine ITSC responsibilities and participants
      • Determine ITSC procedures

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      Stakeholder engagement will be critical to your ITSC success, don't just focus on what is changing. Ensure stakeholders know why you are engaging them and how it will help them in their role.

      Hold a kick-off meeting with your IT steering committee members to explain the process, responsibilities, and goals

      3.1

      Don’t take on too much in your first IT steering committee meeting. Many participants may not have participated in an IT steering committee before, or some may have had poor experiences in the past.

      Use this meeting to explain the role of the IT steering committee and why you are implementing one, and help participants to understand their role in the process.

      Quickly customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to explain the goals and benefits of the IT steering committee, and use your own data to make the case for governance.

      At the end of the meeting, ask committee members to sign the committee charter to signify their agreement to participate in the IT steering committee.

      A screenshot of IT Steering Committee: Meeting 1 is depicted. A screenshot of the IT Steering Committee Challenges and Opportunities for the organization.

      Tailor the IT Steering Committee Stakeholder Presentation template: slides 1-5

      3.2 Estimated Time: 10 minutes

      Review the IT Steering Committee Stakeholder Presentation template. This document should be presented at the first IT steering committee meeting by the assigned Committee Chair.

      Customization Options

      Overall: Decide if you would like to change the presentation template. You can change the color scheme easily by copying the slides in the presentation deck and pasting them into your company’s standard template. Once you’ve pasted them in, scan through the slides and make any additional changes needed to formatting.

      Slide 2-3: Review the text on each of the slides and see if any wording should be changed to better suite your organization.

      Slide 4: Review your list of the top 10 challenges and opportunities as defined in section 2 of this blueprint. Document those in the appropriate sections. (Note: be careful that the language is business-facing; challenges and opportunities should be professionally worded.)

      Slide 5: Review the language on slide 5 to make any necessary changes to suite your organization. Changes here should be minimal.

      INPUT

      • Top 10 list
      • Survey report
      • ITSC Charter

      OUTPUT

      • Ready-to-present presentation for defined stakeholders

      Materials

      • IT Steering Committee Stakeholder Presentation

      Participants

      • IT Steering Committee Chair/CIO

      Tailor the IT Steering Committee Stakeholder Presentation template: slides 6-10

      3.2 Estimated Time: 10 minutes

      Customization Options

      Slide 6: The goal of this slide is to document and share the names of the participants on the IT steering committee. Document the names in the right-hand side based on your IT Steering Committee Charter.

      Slides 7-9:

      • Review the agenda items as listed in your IT Steering Committee Charter. Document the annual, quarterly, and monthly meeting responsibilities on the left-hand side of slides 7-9.
      • Meeting Participants: For each slide, list the members who are required for that meeting.
      • Document the key required reading materials as identified in the SIPOC charts under “inputs.”
      • Document the key meeting outcomes as identified in the SIPOC chart under “outputs.”

      Slide 10: Review and understand the rollout timeline. Make any changes needed to the timeline.

      INPUT

      • Top 10 list
      • Survey report
      • ITSC Charter

      OUTPUT

      • Ready-to-present presentation for defined stakeholders

      Materials

      • IT Steering Committee Stakeholder Presentation

      Participants

      • IT Steering Committee Chair/CIO

      Present the information to the IT leadership team to increase your comfort with the material

      3.3 Estimated Time: 1-2 hours

      1. Once you have finished customizing the IT Steering Committee Stakeholder Presentation, practice presenting the material by meeting with your IT leadership team. This will help you become more comfortable with the dialog and anticipate any questions that might arise.
      2. The ITSC chair will present the meeting deck, and all parties should discuss what they think went well and opportunities for improvement.
      3. Each business relationship manager should document the needed changes in preparation for their first meeting.

      INPUT

      • IT Steering Committee Stakeholder Presentation - Meeting 1

      Participants

      • IT leadership team

      Schedule your first meeting of the IT steering committee

      3.4

      By this point, you should have customized the meeting presentation deck and be ready to meet with your IT steering committee participants.

      The meeting should be one hour in duration and completed in person.

      Before holding the meeting, identify who you think is going to be most supportive and who will be least. Consider meeting with those individuals independently prior to the group meeting to elicit support or minimize negative impacts on the meeting.

      Customize this calendar invite script to invite business partners to participate in the meeting.

      Hello [Name],

      As you may have heard, we recently went through an exercise to develop an IT steering committee. I’d like to take some time to discuss the results of this work with you, and discuss ways in which we can work together in the future to better enable corporate goals.

      The goals of the meeting are:

      1. Discuss the benefits of an IT steering committee
      2. Review the results of the organizational survey
      3. Introduce you to our new IT steering committee

      I look forward to starting this discussion with you and working with you more closely in the future.

      Warm regards,

      CASE STUDY

      Industry:Consumer Goods

      Source: Interview

      "CIO gains buy-in from the company by presenting the new committee to its stakeholders."

      CHALLENGE

      Communication was one of the biggest steering committee challenges that the new CIO inherited.

      Members were resistant to joining/rejoining the committee because of its previous failures. When the new CIO was building the steering committee, she surveyed the members on their knowledge of IT as well as what they felt their role in the committee entailed.

      She found that member understanding was lacking and that their knowledge surrounding their roles was very inconsistent.

      SOLUTION

      The CIO dedicated their first steering committee meeting to presenting the results of that survey to align member knowledge.

      She outlined the new charter and discussed the roles of each member, the goals of the committee, and the overarching process.

      OUTCOME

      Members of the new committee were now aligned in terms of the steering committee’s goals. Taking time to thoroughly outline the procedures during the first meeting led to much higher member engagement. It also built accountability within the committee since all members were present and all members had the same level of knowledge surrounding the roles of the ITSC.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1

      A screenshot of Activity 3.1 is depicted. Activity 3.1 is about creating a presentation for ITSC stakeholders to be presented at the first ITSC meeting.

      Create a presentation for ITSC stakeholders to be presented at the first ITSC meeting

      Work with an Info-Tech advisor to customize our IT Steering Committee Stakeholder Presentation template. Use this presentation to gain stakeholder buy-in by making the case for an ITSC.

      Phase 4

      Define the Prioritization Criteria

      Phase 4 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation : Define the Prioritization Criteria
      Proposed Time to Completion: 4 weeks

      Discuss Prioritization Criteria

      Start with an analyst kick-off call:

      • Review sample project prioritization criteria and discuss criteria unique to your organization

      Then complete these activities...

      • Select the criteria that would be most effective for your organization
      • Input these into the tool

      With these tools & templates:

      IT Steering Committee Project Prioritization Tool

      Customize the IT Steering Committee Project Prioritization Tool

      Review findings with analyst:

      • Review changes made to the tool
      • Finalize criteria weighting

      Then complete these activities…

      • Pilot test the tool using projects from the previous year

      With these tools & templates:

      IT Steering Committee Project Prioritization Tool

      Review Results of the Pilot Test

      Finalize phase deliverable:

      • Review the results of the pilot test
      • Make changes to the tool

      Then complete these activities…

      • Input your current project portfolio into the prioritization tool

      With these tools & templates:

      IT Steering Committee Project Prioritization Tool

      Define the Project Prioritization Criteria

      This step will walk you through the following activities:

      • Selecting the appropriate project prioritization criteria for your organization
      • Developing weightings for the prioritization criteria
      • Filling in Info-Tech’s IT Steering Committee Project Prioritization Tool

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      The steering committee sets and agrees to principles that guide prioritization decisions. The agreed upon principles will affect business unit expectations and justify the deferral of requests that are low priority. In some cases, we have seen the number of requests drop substantially because business units are reluctant to propose initiatives that do not fit high prioritization criteria.

      Understand the role of the IT steering committee in project prioritization

      One of the key roles of the IT steering committee is to review and prioritize the portfolio of IT projects.

      What is the prioritization based on? Info-Tech recommends selecting four broad criteria with two dimensions under each to evaluate the value of the projects. The criteria are aligned with how the project generates value for the organization and the execution of the project.

      What is the role of the steering committee in prioritizing projects? The steering committee is responsible for reviewing project criteria scores and making decisions about where projects rank on the priority list. Planning, resourcing, and project management are the responsibility of the PMO or the project owner.

      Info-Tech’s Sample Criteria

      Value

      Strategic Alignment: How much a project supports the strategic goals of the organization.

      Customer Satisfaction: The impact of the project on customers and how visible a project will be with customers.

      Operational Alignment: Whether the project will address operational issues or compliance.

      Execution

      Financial: Predicted ROI and cost containment strategies.

      Risk: Involved with not completing projects and strategies to mitigate it.

      Feasibility: How easy the project is to complete and whether staffing resources exist.

      Use Info-Tech’s IT Steering Committee Project Prioritization Tool to catalog and prioritize your project portfolio

      4.1

      • Use Info-Tech’s IT Steering Committee Project Prioritization Tool in conjunction with the following activities to catalog and prioritize all of the current IT projects in your portfolio.
      • Assign weightings to your selected criteria to prioritize projects based on objective scores assigned during the intake process and adjust these weightings on an annual basis to align with changing organizational priorities and goals.
      • Use this tool at steering committee meetings to streamline the prioritization process and create alignment with the PMO and project managers.
      • Monitor ongoing project status and build a communication channel between the PMO and project managers and the IT steering committee.
      • Adjusting the titles in the Settings tab will automatically adjust the titles in the Project Data tab.
      • Note: To customize titles in the document you must unprotect the content under the View tab. Be sure to change the content back to protected after making the changes.
      A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The first page of the tool is shown. A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The page depicted is on the Intake and Prioritization Tool Settings.

      Establish project prioritization criteria and build the matrix

      4.2 Estimated Time: 1 hour

      1. During the second steering committee meeting, discuss the criteria you will be basing your project prioritization scoring on.
      2. Review Info-Tech’s prioritization criteria matrix, located in the Prioritization Criteria List tab of the IT Steering Committee Project Prioritization Tool, to gain ideas for what criteria would best suit your organization.
      3. Write these main criteria on the whiteboard and brainstorm criteria that are more specific for your organization; include these on the list as well.
      4. Discuss the criteria. Eliminate criteria that won’t contribute strongly to the prioritization process and vote on the remaining. Select four main criteria from the list.
      5. After selecting the four main criteria, write these on the whiteboard and brainstorm the dimensions that fall under the criteria. These should be more specific/measurable aspects of the criteria. These will be the statements that values are assigned to for prioritizing projects so they should be clear. Use the Prioritization Criteria List in the tool to help generate ideas.
      6. After creating the dimensions, determine what the scoring statements will be. These are the statements that will be used to determine the score out of 10 that the different dimensions will receive.
      7. Adjust the Settings and Project Data tabs in the IT Steering Committee Project Prioritization Tool to reflect your selections.
      8. Edit Info-Tech’s IT Project Intake Form or the intake form that you currently use to contain these criteria and scoring parameters.

      INPUT

      • Group input
      • IT Steering Committee Project Prioritization Tool

      OUTPUT

      • Project prioritization criteria to be used for current and future projects

      Materials

      • Whiteboard and markers

      Participants

      • IT steering committee
      • CIO
      • IT leadership

      Adjust prioritization criteria weightings to reflect organizational needs

      4.3 Estimated Time: 1 hour

      1. In the second steering committee meeting, after deciding what the project prioritization criteria will be, you need to determine how much weight (the importance) each criteria will receive.
      2. Use the four agreed upon criteria with two dimensions each, determined in the previous activity.
      3. Perform a $100 test to assign proportions to each of the criteria dimensions.
        1. Divide the committee into pairs.
        2. Tell each pair that they have $100 divide among the 4 major criteria based on how important they feel the criteria is.
        3. After dividing the initial $100, ask them to divide the amount they allocated to each criteria into the two sub-dimensions.
        4. Next, ask them to present their reasoning for the allocations to the rest of the committee.
        5. Discuss the weighting allotments and vote on the best one (or combination).
        6. Input the weightings in the Settings tab of the IT Steering Committee Project Prioritization Tool and document the discussion.
      4. After customizing the chart establish the owner of the document. This person should be a member of the PMO or the most suitable IT leader if a PMO doesn’t exist.
      5. Only perform this adjustment annually or if a major strategic change happens within the organization.

      INPUT

      • Group discussion

      OUTPUT

      • Agreed upon criteria weighting
      • Complete prioritization tool

      Materials

      • IT Steering Committee Project Prioritization Tool
      • Whiteboard and sticky notes

      Participants

      • IT steering committee
      • IT leadership

      Document the prioritization criteria weightings in Info-Tech’s IT Steering Committee Project Prioritization Tool.

      Configure the prioritization tool to align your portfolio with business strategy

      4.4 Estimated Time: 60 minutes

      Download Info-Tech’s Project Intake and Prioritization Tool.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool.

      Rank: Project ranking will dynamically update relative to your portfolio capacity (established in Settings tab) and the Size, Scoring Progress, Remove from Ranking, and Overall Score columns. The projects in green represent top priorities based on these inputs, while yellow projects warrant additional consideration should capacity permit.

      Scoring Progress: You will be able to determine some items on the scorecard earlier in the scoring progress (such as strategic and operational alignment). As you fill in scoring columns on the Project Data tab, the Scoring Progress column will dynamically update to track progress.

      The Overall Score will update automatically as you complete the scoring columns (refer to Activity 4.2).

      Days in Backlog: This column will help with backlog management, automatically tracking the number of days since an item was added to the list based on day added and current date.

      Validate your new prioritization criteria using previous projects

      4.5 Estimated Time: 2 hours

      1. After deciding on the prioritization criteria, you need to test their validity.
      2. Look at the portfolio of projects that were completed in the previous year.
      3. Go through each project and score it according to the criteria that were determined in the previous exercise.
      4. Enter the scores and appropriate weighting (according to goals/strategy of the previous year) into the IT Steering Committee Project Prioritization Tool.
      5. Look at the prioritization given to the projects in reference to how they were previously prioritized.
      6. Adjust the criteria and weighting to either align the new prioritization criteria with previous criteria or to align with desired outcomes.
      7. After scoring the old projects, pilot test the tool with upcoming projects.

      INPUT

      • Information on previous year’s projects
      • Group discussion

      OUTPUT

      • Pilot tested project prioritization criteria

      Materials

      • IT Steering Committee Project Prioritization Tool

      Participants

      • IT steering committee
      • IT leadership
      • PMO

      Pilot the scorecard to validate criteria and weightings

      4.6 Estimated Time: 60 minutes

      1. Pilot your criteria and weightings in the IT Steering Committee Project Prioritization Tool using project data from one or two projects currently going through approval process.
      2. For most projects, you will be able to determine strategic and operational alignment early in the scoring process, while the feasibility and financial requirements will come later during business case development. Score each column as you can. The tool will automatically track your progress in the Scoring Progress column on the Project Data tab.

      Projects that are scored but not prioritized will populate the portfolio backlog. Items in the backlog will need to be rescored periodically, as circumstances can change, impacting scores. Factors necessitating rescoring can include:

      • Assumptions in business case have changed.
      • Organizational change – e.g. a new CEO or a change in strategic objectives.
      • Major emergencies or disruptions – e.g. a security breach.

      Score projects using the Project Data tab in Info-Tech’s IT Steering Committee Project Prioritization Tool

      A screenshot of Info-Tech's <em data-verified=IT Steering Committee Project Prioritization Tool is depicted. The Data Tab is shown.">

      Use Info-Tech’s IT Project Intake Form to streamline the project prioritization and approval process

      4.7

      • Use Info-Tech’s IT Project Intake Form template to streamline the project intake and prioritization process.
      • Customize the chart on page 2 to include the prioritization criteria that were selected during this phase of the blueprint.
      • Including the prioritization criteria at the project intake phase will free up a lot of time for the steering committee. It will be their job to verify that the criteria scores are accurate.
      A screenshot of Info-Tech's IT Project Intake Form is depicted.

      After prioritizing and selecting your projects, determine how they will be resourced

      Consult these Info-Tech blueprints on project portfolio management to create effective portfolio project management resourcing processes.

      A Screenshot of Info-Tech's Create Project Management Success Blueprint is depicted. Create Project Management Success A Screenshot of Info-Tech's Develop a Project Portfolio Management Strategy Blueprint is depicted. Develop a Project Portfolio Management Strategy

      CASE STUDY

      Industry: Consumer Goods

      Source: Interview

      "Clear project intake and prioritization criteria allow for the new committee to make objective priority decisions."

      CHALLENGE

      One of the biggest problems that the previous steering committee at the company had was that their project intake and prioritization process was not consistent. Projects were being prioritized based on politics and managers taking advantage of the system.

      The procedure was not formalized so there were no objective criteria on which to weigh the value of proposed projects. In addition to poor meeting attendance, this led to the overall process being very inconsistent.

      SOLUTION

      The new CIO, with consultation from the newly formed committee, drafted a set of criteria that focused on the value and execution of their project portfolio. These criteria were included on their intake forms to streamline the rating process.

      All of the project scores are now reviewed by the steering committee, and they are able to facilitate the prioritization process more easily.

      The objective criteria process also helped to prevent managers from taking advantage of the prioritization process to push self-serving projects through.

      OUTCOME

      This was seen as a contributor to the increase in satisfaction scores for IT, which improved by 12% overall.

      The new streamlined process helped to reduce capacity constraints on IT, and it alerted the company to the need for more IT employees to help reduce these constraints further. The IT department was given permission to hire two new additional staff members.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1

      A screenshot of activity 4.1 is depicted. Activity 4.1 was about defining your prioritization criteria and customize our <em data-verified=IT Steering Committee Project Prioritization Tool.">

      Define your prioritization criteria and customize our IT Steering Committee Project Prioritization Tool

      With the help of Info-Tech advisors, create criteria for determining a project’s priority. Customize the tool to reflect the criteria and their weighting. Run pilot tests of the tool to verify the criteria and enter your current project portfolio.

      Research contributors and experts

      • Andy Lomasky, Manager, Technology & Management Consulting, McGladrey LLP
      • Angie Embree, CIO, Best Friends Animal Society
      • Corinne Bell, CTO and Director of IT Services, Landmark College
      • John Hanskenecht, Director of Technology, University of Detroit Jesuit High School and Academy
      • Lori Baker, CIO, Village of Northbrook
      • Lynne Allard, IT Supervisor, Nipissing Parry Sound Catholic School Board
      • Norman Allen, Senior IT Manager, Baker Tilly
      • Paul Martinello, VP, IT Services, Cambridge and North Dumfries Hydro Inc.
      • Renee Martinez, IT Director/CIO, City of Santa Fe
      • Sam Wong, Director, IT, Seneca College
      • Suzanne Barnes, Director, Information Systems, Pathfinder International
      • Walt Joyce, CTO, Peoples Bank

      Appendices

      GOVERNANCE & ITSC & IT Management

      Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

      The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

      Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

      These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

      IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

      Strategic IT Steering Committee
      Tactical

      Project Governance Service Governance

      Risk Governance Information Governance

      IT Management
      Operational Risk Task Force

      This blueprint focuses exclusively on building the IT Steering committee. For more information on IT governance see Info-Tech’s related blueprint: Tailor an IT Governance Plan to Fit Organizational Needs.

      IT steering committees play an important role in IT governance

      By bucketing responsibilities into these areas, you’ll be able to account for most key IT decisions and help the business to understand their role in governance, fostering ownership and joint accountability.

      The five governance areas are:

      Governance of the IT Portfolio and Investments: Ensures that funding and resources are systematically allocated to the priority projects that deliver value.

      Governance of Projects: Ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.

      Governance of Risks: Ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.

      Governance of Services: Ensures that IT delivers the required services at the acceptable performance levels.

      Governance of Information and Data: Ensures the appropriate classification and retention of data based on business need.

      A survey of stakeholders identified a need for increased stakeholder involvement and transparency in decision making

      A bar graph is depicted. The title is: I understand how decisions are made in the following areas. The areas include risk, services, projects, portfolio, and information. A circle graph is depicted. The title is: Do IT decisions involve the right people?

      Overall, survey respondents indicated a lack of understanding about how decisions are made around risk, services, projects, and investments, and that business involvement in decision making was too minimal.

      Satisfaction with decision quality around investments and PPM are uneven and largely not well understood

      72% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

      Overall, services were ranked #1 in importance of the 5 areas

      62% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

      Projects ranked as one of the areas with which participants are most satisfied with the quality of decisions

      70% of stakeholders do not understand how decisions around projects selection, success, and changes are made.

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. The title is: IT decisions around project changes, delays, and metrics involve the right people?

      Stakeholders are largely unaware of how decisions around risk are made and believe business participation needs to increase

      78% of stakeholders do not understand how decisions around risk are made

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions made around risk? A bar graph is depicted. The title is: IT decisions around acceptable risk involve the right people?

      The majority of stakeholders believe that they are aware of how decisions around information are made

      67% of stakeholders believe they do understand how decisions around information (data) retention and classification are made.

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions around information governance? A bar graph is depicted. The title is: IT decisions around information retention and classification involve the right people?

      Integrate IT Risk Into Enterprise Risk

      • Buy Link or Shortcode: {j2store}195|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
      • IT is expected to own risks over which they have no authority or oversight.
      • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

      Our Advice

      Critical Insight

      • Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize the organization’s ability to respond to risk.

      Impact and Result

      • Understand gaps in the organization’s current approach to risk management practices.
      • Establish a standardized approach for how IT risks impact the enterprise as a whole.
      • Drive a risk-aware organization toward innovation and consider alternative options for how to move forward.
      • Integrate IT risks into the foundational risk practice.

      Integrate IT Risk Into Enterprise Risk Research & Tools

      Integrated Risk Management Capstone – A framework for how IT risks can be integrated into your organization’s enterprise risk management program to enable strategic risk-informed decisions.

      This is a capstone blueprint highlighting the benefits of an integrated risk management program that uses risk information and data to inform strategic decision making. Throughout this research you will gain insight into the five core elements of integrating risk through assessing, governing, defining the program, defining the process, and implementing.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Integrate IT Risk Into Enterprise Risk Capstone
      • Integrated Risk Maturity Assessment
      • Risk Register Tool

      Infographic

      Further reading

      Integrate IT Risk Into Enterprise Risk

      Don’t fear IT risks, integrate them.

      EXECUTIVE BRIEF

      Analyst Perspective

      Having siloed risks is risky business for any enterprise.

      Photo of Valence Howden, Principal Research Director, CIO Practice.
      Valence Howden
      Principal Research Director, CIO Practice
      Photo of Petar Hristov Research Director, Security, Privacy, Risk & Compliance.
      Petar Hristov
      Research Director, Security, Privacy, Risk & Compliance
      Photo of Ian Mulholland Research Director, Security, Risk & Compliance.
      Ian Mulholland
      Research Director, Security, Risk & Compliance
      Photo of Brittany Lutes, Senior Research Analyst, CIO Practice.
      Brittany Lutes
      Senior Research Analyst, CIO Practice
      Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice
      Ibrahim Abdel-Kader
      Research Analyst, CIO Practice

      Every organization has a threshold for risk that should not be exceeded, whether that threshold is defined or not.

      In the age of digital, information and technology will undoubtedly continue to expand beyond the confines of the IT department. As such, different areas of the organization cannot address these risks in silos. A siloed approach will produce different ways of identifying, assessing, responding to, and reporting on risk events. Integrated risk management is about embedding IT uncertainty to inform good decision making across the organization.

      When risk is integrated into the organization's enterprise risk management program, it enables a single view of all risks and the potential impact of each risk event. More importantly, it provides a consistent view of the risk event in relation to uncertainty that might have once been seemingly unrelated to IT.

      And all this can be achieved while remaining within the enterprise’s clearly defined risk appetite.

      Executive Summary

      Your Challenge

      Most organizations fail to integrate IT risks into enterprise risks:

      • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
      • IT is expected to own risks over which they have no authority or oversight.
      • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

      Common Obstacles

      IT leaders have to overcome these obstacles when it comes to integrating risk:

      • Making business leaders aware of, involved in, and able to respond to all enterprise risks.
      • A lack of data or information being used to support a holistic risk management process.
      • A low level of enterprise risk maturity.
      • A lack of risk management capabilities.

      Info-Tech’s Approach

      By leveraging the Info-Tech Integrated Risk approach, your business can better address and embed risk by:

      • Understanding gaps in the organization’s current approach to risk management practices.
      • Establishing a standardized approach for how IT risks impact the enterprise as a whole.
      • Driving a risk-aware organization toward innovation and considering alternative options for how to move forward.
      • Helping integrate IT risks into the foundational risk practice.

      Info-Tech Insight

      Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize its ability to respond to risk.

      What is integrated risk management?

      • Integrated risk management is the process of ensuring all forms of risk information, including information and technology, are considered and included in the enterprise’s risk management strategy.
      • It removes the siloed approach to classifying risks related to specific departments or areas of the organization, recognizing that each of those risks is a threat to the overarching enterprise.
      • Aggregating the different threats or uncertainty that might exist within an organization allows for informed decisions to be made that align to strategic goals and continue to drive value back to the business.
      • By holistically considering the different risks, the organization can make informed decisions on the best course of action that will reduce any negative impacts associated with the uncertainty and increase the overall value.

      Enterprise Risk Management (ERM)

      • IT
      • Security
      • Digital
      • Vendor/Third Party
      • Other

      Enterprise risk management is the practice of identifying and addressing risks to your organization and using risk information to drive better decisions and better opportunities.

      IT risk is enterprise risk

      Multiple types of risk, 'Finance', 'IT', 'People', and 'Digital', funneling into 'ENTERPRISE RISKS'. IT risks have a direct and often aggregated impact on enterprise risks and opportunities in the same way other business risks can. This relationship must be understood and addressed through integrated risk management to ensure a consistent approach to risk.

      Your challenge

      Embedding IT risks into the enterprise risk management program is challenging because:

      • Most organizations classify risks based on the departments or areas of the business where the uncertainty is likely to happen.
      • Unnecessary expectations are placed on the IT department to own risks over which they have no authority or oversight.
      • Risks are often only identified when conducting due diligence for a project or ensuring compliance with regulations and standards.

      Risk-mature organizations have a unique benefit in that they often have established an overarching governance framework and embedded risk awareness into the culture.

      35% — Only 35% of organizations had embraced ERM in 2020. (Source: AICPA and NC State Poole College of Management)

      12% — Only 12% of organizations are leveraging risk as a tool to their strategic advantage. (Source: AICPA and NC State Poole College of Management)

      Common obstacles

      These barriers make integrating IT risks difficult to address for many organizations:

      • IT risks are not seen as enterprise risks.
      • The organization’s culture toward risk is not defined.
      • The organization’s appetite and threshold for risk are not defined.
      • Each area of the organization has a different method of identifying, assessing, and responding to risk events.
      • Access to reliable and informative data to support risk management is difficult to obtain.
      • Leadership does not see the business value of integrating risk into a single management program.
      • The organization’s attitudes and behaviors toward risk contradict the desired and defined risk culture.
      • Skills, training, and resources to support risk management are lacking, let alone those to support integrated risk management.

      Integrating risks has its challenges

      62% — Accessing and disseminating information is the main challenge for 62% of organizations maturing their organizational risk management. (Source: OECD)

      20-28% — Organizations with access to machine learning and analytics to address future risk events have 20 to 28% more satisfaction. (Source: Accenture)

      Integrate Risk and Use It to Your Advantage

      Accelerate and optimize your organization by leveraging meaningful risk data to make intelligent enterprise risk decisions.

      Risk management is more than checking an audit box or demonstrating project due diligence.

      Risk Drivers
      • Audit & compliance
      • Preserve value & avoid loss
      • Previous risk impact driver
      • Major transformation
      • Strategic opportunities
      Arrow pointing right. Only 7% of organizations are in a “leading” or “aspirational” level of risk maturity. (OECD, 2021) 63% of organizations struggle when it comes to defining their appetite toward strategy related risks. (“Global Risk Management Survey,” Deloitte, 2021) Late adopters of risk management were 70% more likely to use instinct over data or facts to inform an efficient process. (Clear Risk, 2020) 55% of organizations have little to no training on ERM to properly implement such practices. (AICPA, NC State Poole College of Management, 2021)
      1. Assess Enterprise Risk Maturity 3. Build a Risk Management Program Plan 4. Establish Risk Management Processes 5. Implement a Risk Management Program
      2. Determine Authority with Governance
      Unfortunately, less than 50% of those in risk focused roles are also in a governance role where they have the authority to provide risk oversight. (Governance Institute of Australia, 2020)
      IT can improve the maturity of the organization’s risk governance and help identify risk owners who have authority and accountability.

      Governance and related decision making is optimized with integrated and aligned risk data.

      List of 'Integrated Risk Maturity Categories': '1. Context & Strategic Direction', '2. Risk Culture and Authority', '3. Risk Management Process', and '4. Risk Program Optimization'. The five types of a risk in Enterprise Risk Management.

      ERM incorporates the different types of risk, including IT, security, digital, vendor, and other risk types.

      The program plan is meant to consider all the major risk types in a unified approach.

      The 'Risk Process' cycle starting with '1. Identify', '2. Assess', '3. Respond', '4. Monitor', '5. Report', and back to the beginning. Implementation of an integrated risk management program requires ongoing access to risk data by those with decision making authority who can take action.

      Integrated Risk Mapping — Downside Risk Focus

      A diagram titled 'Risk and Controls' beginning with 'Possible Sources' and a list of sources, 'Control Activities' to prevent, the 'RISK EVENT', 'Recovery Activities' to recover, and 'Possible Repercussions' with a list of ramifications.

      Integrated Risk Mapping — Downside and Upside Risk

      Third-Party Risk Example

      Example of a third-party risk mapped onto the diagram on the previous slide, but with potential upsides mapped out as well. The central risk event is 'Vendor exposes private customer data'. Possible Sources of the downside are 'External Attack' with likelihood prevention method 'Define security standard requirements for vendor assessment' and 'Exfiltration of data through fourth-party staff' with likelihood prevention method 'Ensure data is properly classified'. Possible Sources of the upside are 'Application rationalization' with likelihood optimization method 'Reduce number of applications in environment' and 'Review vendor assessment practices' with likelihood optimization method 'Improve vendor onboarding'. Possible Repercussions on the downside are 'Organization unable to operate in jurisdiction' with impact minimization method 'Engage in-house risk mitigation responses' and 'Fines levied against organization' with impact minimization method 'Report incident to any regulators'. Possible Repercussions on the upside are 'Easier vendor integration and management' with impact utilization method 'Improved vendor onboarding practices' and 'Able to bid on contracts with these requirements' with impact utilization method 'Vendors must provide attestations (e.g. SOC or CMMC)'.

      Insight Summary

      Overarching insight

      Stop fearing risk – integrate it. Integration leads to opportunities for organizations to embrace innovation and new digital technologies as well as reducing operational costs and simplifying reporting.

      Govern risk strategically

      Governance of risk management for information- and technology-related events is often misplaced. Just because it's classified as an IT risk does not mean it shouldn’t be owned by the board or business executive.

      Assess risk maturity

      Integrating risk requires a baseline of risk maturity at the enterprise level. IT can push integrating risks, but only if the enterprise is willing to adopt the attitudes and behaviors that will drive the integrated risk approach.

      Manage risk

      It is not a strategic decision to have different areas of the organization manage the risks perceived to be in their department. It’s the easy choice, but not the strategic one.

      Implement risk management

      Different areas of an enterprise apply risk management processes differently. Determining a single method for identification, assessment, response, and monitoring can ensure successful implementation of enterprise risk management.

      Tactical insight

      Good risk management will consider both the positives and negatives associated with a risk management program by recognizing both the upside and downside of risk event impact and likelihood.

      Integrated risk benefits

      IT Benefits

      • IT executives have a responsibility but not accountability when it comes to risk. Ensure the right business stakeholders have awareness and ability to make informed risk decisions.
      • Controls and responses to risks that are within the “IT” realm will be funded and provided with sufficient support from the business.
      • The business respects and values the role of IT in supporting the enterprise risk program, elevating its role into business partner.

      Business Benefits

      • Business executives and boards can make informed responses to the various forms of risk, including those often categorized as “IT risks.”
      • The compounding severity of risks can be formally assessed and ideally quantified to provide insight into how risks’ ramifications can change based on scenarios.
      • Risk-informed decisions can be used to optimize the business and drive it toward adopting innovation as a response to risk events.
      • Get your organization insured against cybersecurity threats at the lowest premiums possible.

      Measure the value of integrating risk

      • Reduce Operating Costs

        • Organizations can reduce their risk operating costs by 20 to 30% by adopting enterprise-wide digital risk initiatives (McKinsey & Company).
      • Increase Cybersecurity Threat Preparedness

        • Increase the organization’s preparedness for cybersecurity threats. 79% of organizations that were impacted by email threats in 2020 were not prepared for the hit (Diligent)
      • Increase Risk Management’s Impact to Drive Strategic Value

        • Currently, only 3% of organizations are extensively using risk management to drive their unique competitive advantage, compared to 35% of companies who do not use it at all (AICPA & NC State Poole College of Management).
      • Reduce Lost Productivity for the Enterprise

        • Among small businesses, 76% are still not considering purchasing cyberinsurance in 2021, despite the fact that ransomware attacks alone cost Canadian businesses $5.1 billion in productivity in 2020 (Insurance Bureau of Canada, 2021).

      “31% of CIO’s expected their role to expand and include risk management responsibilities.” (IDG “2021 State of the CIO,” 2021)

      Make integrated risk management sustainable

      58%

      Focus not just on the preventive risk management but also the value-creating opportunities. With 58% of organizations concerned about disruptive technology, it’s an opportunity to take the concern and transform it into innovation. (Accenture)

      70%

      Invest in tools that have data and analytics features. Currently, “gut feelings” or “experience” inform the risk management decisions for 70% of late adopters. (Clear Risk)

      54%

      Align to the strategic vision of the board and CEO, given that these two roles account for 54% of the accountability associated with extended enterprise risk management. (Extended Enterprise Risk Management Survey, 2020,” Deloitte)

      63%

      Include IT leaders in the risk committee to help informed decision making. Currently 63% of chief technology officers are included in the C‑suite risk committee. (AICPA & NC State Poole College of Management)

      Successful adoption of integrated risk management is often associated with these key elements.

      Assessment

      Assess your organization’s method of addressing risk management to determine if integrated risk is possible

      Assessing the organization’s risk maturity

      Mature or not, integrated risk management should be a consideration for all organizations

      The first step to integrating risk management within the enterprise is to understand the organization’s readiness to adopt practices that will enable it to successfully integrate information.

      In 2021, we saw enterprise risk management assessments become one of the most common trends, particularly as a method by which the organization can consolidate the potential impacts of uncertainties or threats (Lawton, 2021). A major driver for this initiative was the recognition that information and technology not only have enterprise-wide impacts on the organization’s risk management but that IT has a critical role in supporting processes that enable effective access to data/information.

      A maturity assessment has several benefits for an organization: It ensures there is alignment throughout the organization on why integrated risk is the right approach to take, it recognizes the organization’s current risk maturity, and it supports the organization in defining where it would like to go.

      Pie chart titled 'Organizational Risk Management Maturity Assessment Results' showing just under half 'Progressing', a third 'Established', a seventh 'Emerging', and a very small portion 'Leading or Aspirational'.

      Integrated Risk Maturity Categories

      Semi-circle with colored points indicating four categories.

      1

      Context & Strategic Direction Understand the organization’s main objectives and how risk can support or enhance those objectives.

      2

      Risk Culture and Authority Examine if risk-based decisions are being made by those with the right level of authority and if the organization’s risk appetite is embedded in the culture.

      3

      Risk Management Process Determine if the current process to identify, assess, respond to, monitor, and report on risks is benefitting the organization.

      4

      Risk Program Optimization Consider opportunities where risk-related data is being gathered, reported, and used to make informed decisions across the enterprise.

      Maturity should inform your approach to risk management

      The outcome of the risk maturity assessment should inform how risk management is approached within the organization.

      A row of waves starting light and small and becoming taller and darker in steps. The levels are 'Non-existent', 'Basic', 'Partially Integrated', 'Mostly Integrated', 'Fully Integrated', and 'Optimized'.

      For organizations with a low maturity, remaining superficial with risk will offer more benefits and align to the enterprise’s risk tolerance and appetite. This might mean no integrated risk is taking place.

      However, organizations that have higher risk maturity should begin to integrate risk information. These organizations can identify the nuances that would affect the severity and impact of risk events.

      Integrated Risk Maturity Assessment

      The purpose of the Integrated Risk Maturity Assessment is to assess the organization's current maturity and readiness for integrated risk management (IRM).

      Frequently and continually assessing your organization’s maturity toward integrated risk ensures the right risk management program can be adopted by your organization.

      Integrated Risk Maturity Assessment

      A simple tool to understand if your organization is ready to embrace integrated risk management by measuring maturity across four key categories: Context & Strategic Direction, Risk Culture & Authority, Risk Management Process, and Risk Program Optimization

      Sample of the Integrated Risk Maturity Assessment deliverable.

      Use the results from this integrated risk maturity assessment to determine the type of risk management program that can and should be adopted by your organization.

      Some organizations will need to remain siloed and focused on IT risk management only, while others will be able to integrate risk-related information to start enabling automatic controls that respond to this data.

      Perform an Agile Skills Assessment

      • Buy Link or Shortcode: {j2store}153|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $32,166 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your organization is trying to address the key delivery challenges you are facing. Early experiments with Agile are starting to bear fruit.
      • As part of maturing your Agile practice, you want to evaluate if you have the right skills and capabilities in place.

      Our Advice

      Critical Insight

      • Focusing on the non-technical skills can yield significant returns for your products, your team, and your organization. These skills are what should be considered as the real Agile skills.

      Impact and Result

      • Define the skills and values that are important to your organization to be successful at being Agile.
      • Put together a standard criterion for measurement of the attainment of given skills.
      • Define the roadmap and communication plan around your agile assessment.

      Perform an Agile Skills Assessment Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should perform an agile skills assessment. review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take stock of the Agile skills and values important to you

      Confirm the list of Agile skills that you wish to measure.

      • Perform an Agile Skills Assessment – Phase 1: Take Stock of the Agile Skills and Values Important to You
      • Agile Skills Assessment Tool
      • Agile Skills Assessment Tool Example

      2. Define an assessment method that works for you

      Define what it means to attain specific agile skills through a defined ascension path of proficiency levels, and standardized skill expectations.

      • Perform an Agile Skills Assessment – Phase 2: Define an Assessment Method That Works for You

      3. Plan to assess your team

      Determine the roll-out and communication plan that suits your organization.

      • Perform an Agile Skills Assessment – Phase 3: Plan to Assess Your Team
      • Agile Skills Assessment Communication and Roadmap Plan
      • Agile Skills Assessment Communication and Roadmap Plan Example
      [infographic]

      Workshop: Perform an Agile Skills Assessment

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Agile Skills and Maturity Levels

      The Purpose

      Learn about and define the Agile skills that are important to your organization.

      Define the different levels of attainment when it comes to your Agile skills.

      Define the standards on a per-role basis.

      Key Benefits Achieved

      Get a clear view of the Agile skills important into meet your Agile transformation goals in alignment with organizational objectives.

      Set a clear standard for what it means to meet your organizational standards for Agile skills.

      Activities

      1.1 Review and update the Agile skills relevant to your organization.

      1.2 Define your Agile proficiency levels to evaluate attainment of each skill.

      1.3 Define your Agile team roles.

      1.4 Define common experience levels for your Agile roles.

      1.5 Define the skill expectations for each Agile role.

      Outputs

      A list of Agile skills that are consistent with your Agile transformation

      A list of proficiency levels to be used during your Agile skills assessment

      A confirmed list of roles that you wish to measure on your Agile teams

      A list of experience levels common to Agile team roles (example: Junior, Intermediate, Senior)

      Define the skill expectations for each Agile role

      Security Priorities 2022

      • Buy Link or Shortcode: {j2store}244|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Ransomware activities and the cost of breaches are on the rise.
      • Cybersecurity talent is hard to find, and an increasing number of cybersecurity professionals are considering leaving their jobs.
      • Moving to the digital world increases the risk of a breach.

      Our Advice

      Critical Insight

      • The pandemic has fundamentally changed the technology landscape. Security programs must understand how their threat surface is now different and adapt their controls to meet the challenge.
      • The upside to the upheaval in 2021 is new opportunities to modernize your security program.

      Impact and Result

      • Use the report to ensure your plan in 2022 addresses what’s important in cybersecurity.
      • Understand the current situation in the cybersecurity space.

      Security Priorities 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Security Priorities 2022 – A report that describes priorities and recommendations for CISOs in 2022.

      Use this report to understand the current situation in the cybersecurity space and inform your plan for 2022. This report includes sections on protecting against and responding to ransomware, acquiring and retaining talent, securing a remote workforce, securing digital transformation, and adopting zero trust.

      • Security Priorities for 2022 Report

      Infographic

      Further reading

      Security Priorities 2022

      The pandemic has changed how we work

      disruptions to the way we work caused by the pandemic are here to stay.

      The pandemic has introduced a lot of changes to our lives over the past two years, and this is also true for various aspects of how we work. In particular, a large workforce moved online overnight, which shifted the work environment rapidly.

      People changed how they communicate, how they access company information, and how they connect to the company network. These changes make cybersecurity a more important focus than ever.

      Although changes like the shift to remote work occurred in response to the pandemic, they are largely expected to remain, regardless of the progression of the pandemic itself. This report will look into important security trends and the priorities that stemmed from these trends.

      30% more professionals expect transformative permanent change compared to one year ago.

      47% of professionals expect a lot of permanent change; this remains the same as last year. (Source: Info-Tech Tech Trends 2022 Survey; N=475)

      The cost of a security breach is rising steeply

      The shift to remote work exposes organizations to more costly cyber incidents than ever before.

      $4.24 million

      Average cost of a data breach in 2021
      The cost of a data breach rose by nearly 10% in the past year, the highest rate in over seven years.

      $1.07 million

      More costly when remote work involved in the breach

      The average cost of breaches where remote work is involved is $1.07 million higher than breaches where remote work is not involved.

      The ubiquitous remote work that we saw in 2021 and continue to see in 2022 can lead to more costly security events. (Source: IBM, 2021)

      Remote work is here to stay, and the cost of a breach is higher when remote work is involved.

      The cost comes not only directly from payments but also indirectly from reputational loss. (Source: IBM, 2021)

      Security teams can participate in the solution

      The numbers are clear: in 2022, when we face a threat environment like WE’VE never EXPERIENCED before, good security is worth the investment

      $1.76 million

      Saved when zero trust is deployed facing a breach

      Zero trust controls are realistic and effective controls.

      Organizations that implement zero trust dramatically reduce the cost of an adverse security event.

      35%

      More costly if it takes more than 200 days to identify and contain a breach

      With increased BYOD and remote work, detection and response is more challenging than ever before – but it is also highly effective.

      Organizations that detect and respond to incidents quickly will significantly reduce the impact. (Source: IBM, 2021)

      Breaches are 34% less costly when mature zero trust is implemented.

      A fully staffed and well-prepared security team could save the cost through quick responses. (Source: IBM, 2021)

      Top security priorities and constraints in 2022

      Survey results

      As part of its research process for the 2022 Security Priorities Report, Info-Tech Research Group surveyed security and IT leaders (N=97) to ask their top security priorities as well as their main obstacles to security success in 2022:

      Top Priorities
      A list of the top three priorities identified in the survey with their respective percentages, 'Acquiring and retaining talent, 30%', 'Protecting against and responding to ransomware, 23%', and 'Securing a remote workforce, 23%'.

      Survey respondents were asked to force-rank their security priorities.

      Among the priorities chosen most frequently as #1 were talent management, addressing ransomware threats, and securing hybrid/remote work.

      Top Obstacles
      A list of the top three obstacles identified in the survey with their respective percentages, 'Staffing constraints, 31%', 'Demand of ever-changing business environment, 23%', and 'Budget constraints, 15%'.

      Talent management is both the #1 priority and the top obstacle facing security leaders in 2022.

      Unsurprisingly, the ever-changing environment in a world emerging from a pandemic and budget constraints are also top obstacles.

      We know the priorities…

      But what are security leaders actually working on?

      This report details what we see the world demanding of security leaders in the coming year.

      Setting aside the demands – what are security leaders actually working on?

      A list of 'Top security topics among Info-Tech members' with accompanying bars, 'Security Strategy', 'Security Policies', 'Security Operations', 'Security Governance', and 'Security Incident Response'.

      Many organizations are still mastering the foundations of a mature cybersecurity program.

      This is a good idea!

      Most breaches are still due to gaps in foundational security, not lack of advanced controls.

      We know the priorities…

      But what are security leaders actually working on?

      A list of industries with accompanying bars representing their demand for security. The only industry with a significant positive percentage is 'Government'. Security projects included in annual plan relative to industry.

      One industry plainly stands out from the rest. Government organizations are proportionally much more active in security than other industries, and for good reason: they are common targets.

      Manufacturing and professional services are proportionally less interested in security. This is concerning, given the recent targeting of supply chain and personal data holders by ransomware gangs.

      5 Security Priorities for 2022 Logo for Info-Tech. Logo for ITRG.

      People

      1. Acquiring and Retaining Talent
        Create a good working environment for existing and potential employees. Invest time and effort into talent issues to avoid being understaffed.
      2. Securing a Remote Workforce
        Create a secure environment for users and help your people build safe habits while working remotely.

      Process

      1. Securing Digital Transformation
        Build in security from the start and check in frequently to create agile and secure user experiences.

      Technology

      1. Adopting Zero Trust
        Manage access of sensitive information based on the principle of least privilege.
      2. Protecting Against and Responding to Ransomware
        Put in your best effort to build defenses but also prepare for a breach and know how to recover.

      Main Influencing Factors

      COVID-19 Pandemic
      The pandemic has changed the way we interact with technology. Organizations are universally adapting their business and technology processes to fit the post-pandemic paradigm.
      Rampant Cybercrime Activity
      By nearly every conceivable metric, cybercrime is way up in the past two years. Cybercriminals smell blood and pose a more salient threat than before. Higher standards of cybersecurity capability are required to respond to this higher level of threat.
      Remote Work and Workforce Reallocation
      Talented IT staff across the globe enabled an extraordinarily fast shift to remote and distance work. We must now reckon with the security and human resourcing implications of this huge shift.

      Acquire and Retain Talent

      Priority 01

      Security talent was in short supply before the pandemic, and it's even worse now.

      Executive summary

      Background

      Cybersecurity talent has been in short supply for years, but this shortage has inflected upward since the pandemic.

      The Great Resignation contributed to the existing talent gap. The pandemic has changed how people work as well as how and where they choose work. More and more senior workers are retiring early or opting for remote working opportunities.

      The cost to acquire cybersecurity talent is huge, and the challenge doesn’t end there. Retaining top talent can be equally difficult.

      Current situation

      • A 2021 survey by ESG shows that 76% of security professional agree it’s difficult to recruit talent, and 57% said their organization is affected by this talent shortage.
      • (ISC)2 reports there are 2.72 million unfilled job openings and an increasing workforce gap (2021).

      2.72 million unfilled cybersecurity openings (Source: (ISC)2, 2021)

      IT leaders must do more to attract and retain talent in 2022

      • Over 70% of IT professionals are considering quitting their jobs (TalentLMS, 2021). Meanwhile, 51% of surveyed cybersecurity professionals report extreme burnout during the last 12 months and many of them have considered quitting because of it (VMWare, 2021).
      • Working remotely makes it easier for people to look elsewhere, lowering the barrier to leaving.
      • This is a big problem for security leaders, as cybersecurity talent is in very short supply. The cost of acquiring and retaining quality cybersecurity staff in 2022 is significant, and many organizations are unwilling or unable to pay the premium.
      • Top talent will demand flexible working conditions – even though remote work comes with security risk.
      • Most smart, talented new hires in 2022 are demanding to work remotely most of the time.
      Top reasons for resignations in 2021
      Burnout 30%
      Other remote opportunities 20%
      Lack of growth opportunities 20%
      Poor culture 20%
      Acquisition concerns 10%
      (Source: Survey of West Coast US cybersecurity professionals; TechBeacon, 2021)

      Talent will be 2022’s #1 strength and #1 weakness

      Staffing obstacles in 2022:

      “Attracting and retaining talent is always challenging. We don’t pay as well and my org wants staff in the office at least half of the time. Most young, smart, talented new hires want to work remotely 100 percent of the time.“

      “Trying to grow internal resources into security roles.”

      “Remote work expectations by employees and refusal by business to accommodate.”

      “Biggest obstacle: payscales that are out of touch with cybersecurity market.”

      “Request additional staff. Obtaining funding for additional position is most significant obstacle.”

      (Info-Tech Tech Security Priorities Survey 2022)
      Top obstacles in 2022:

      As you can see, respondents to our security priorities survey have strong feelings on the challenges of staffing a cybersecurity team.

      The growth of remote work means local talent can now be hired by anybody, vastly increasing your competition as an employer.

      Hiring local will get tougher – but so will hiring abroad. People who don’t want to relocate for a new job now have plenty of alternatives. Without a compelling remote work option, you will find non-local prospects unwilling to move for a new job.

      Lastly, many organizations are still reeling at the cost of experienced cybersecurity talent. Focused internal training and development will be the answer for many organizations.

      Recommended Actions

      Provide career development opportunities

      Many security professionals are dissatisfied with their unclear career development paths. To improve retention, organizations should provide their staff with opportunities and clear paths for career and skills advancement.

      Be open-minded when hiring

      To broaden the candidate pool, organizations should be open-minded when considering who to hire.

      • Enable remote work.
      • Do not fixate on certificates and years of experience; rather, be open to developing those who have the right interest and ability.
      • Consider using freelance workers.
      Facilitate work-life balance

      Many security professionals say they experience burnout. Promoting work-life balance in your organization can help retain critical skills.

      Create inclusive environment

      Hire a diverse team and create an inclusive environment where they can thrive.

      Talent acquisition and retention plan

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Address a top priority and a top obstacle with a plan to attract and retain top organizational and cybersecurity talent.

      Initiative Description:

      • Provide secure remote work capabilities for staff.
      • Work with HR to refine a hiring plan that addresses geographical and compensation gaps with cybersecurity and general staff.
      • Survey staff engagement to identify points of friction and remediate where needed.
      • Define a career path and growth plan for staff.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing down.
      Reduction in costs due to turnover and talent loss

      Other Expected Business Benefits:

      Arrow pointing up.
      Productivity due to good morale/ engagement
      Arrow pointing up.
      Improved corporate culture
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Big organizational and cultural changes
      • Increased attack surface of remote/hybrid workforce

      Related Info-Tech Research:

      Secure a Remote Workforce

      Priority 02

      Trends suggest remote work is here to stay. Addressing the risk of insecure endpoints can no longer be deferred.

      Executive summary

      Remote work poses unique challenges to cybersecurity teams. The personal home environment may introduce unauthorized people and unknown network vulnerabilities, and the organization loses nearly all power and influence over the daily cyber hygiene of its users.

      In addition, the software used for enabling remote work itself can be a target of cybersecurity criminals.

      Current situation

      • 70% of workers in technical services work from home.
      • Employees of larger firms and highly paid individuals are more likely to be working outside the office.
      • 80% of security and business leaders find that remote work has increased the risk of a breach.
      • (Source: StatCan, 2021)

      70% of tech workers work from home (Source: Statcan, 2021)

      Remote work demands new security solutions

      The security perimeter is finally gone

      The data is outside the datacenter.
      The users are outside the office.
      The endpoints are … anywhere and everywhere.

      Organizations that did not implement digital transformation changes following COVID-19 experience higher costs following a breach, likely because it is taking nearly two months longer, on average, to detect and contain a breach when more than 50% of staff are working remotely (IBM, 2021).

      In 2022 the cumulative risk of so many remote connections means we need to rethink how we secure the remote/hybrid workforce.

      Security
      • Distributed denial of service
      • DNS hijacking
      • Weak VPN protocols
      Identity
      • One-time verification allowing lateral movement
      Colorful tiles representing the surrounding security solutions. Network
      • Risk perimeter stops at corporate network edge
      • Split tunneling
      Authentication
      • Weak authentication
      • Weak password
      Access
      • Man-in-the-middle attack
      • Cross-site scripting
      • Session hijacking

      Recommended Actions

      Mature your identity management

      Compromised identity is the main vector to breaches in recent years. Stale accounts, contractor accounts, misalignment between HR and IT – the lack of foundational practices leads to headline-making breaches every week.
      Tighten up identity control to keep your organization out of the newspaper.

      Get a handle on your endpoints

      Work-from-home (WFH) often means unknown endpoints on unknown networks full of other unknown devices…and others in the home potentially using the workstation for non-work purposes. Gaining visibility into your endpoints can help to keep detection and resolution times short.

      Educate users

      Educate everyone on security best practices when working remotely:

      • Apply secure settings (not just defaults) to the home network.
      • Use strong passwords.
      • Identify suspicious email.
      Ease of use

      Many workers complain that the corporate technology solution makes it difficult to get their work done.

      Employees will take productivity over security if we force them to choose, so IT needs to listen to end users’ needs and provide a solution that is nimble and secure.

      Roadmap to securing remote/hybrid workforce

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      The corporate network now extends to the internet – ensure your security plan has you covered.

      Initiative Description:

      • Reassess enterprise security strategy to include the WFH attack surface (especially endpoint visibility).
      • Ensure authentication requirements for remote workers are sufficient (e.g. MFA, strong passwords, hardware tokens for high-risk users/connections).
      • Assess the value of zero trust networking to minimize the blast radius in the case of a breach.
      • Perform penetration testing annually.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing down.


      Reduced cost of security incidents/reputational damage

      Other Expected Business Benefits:

      Arrow pointing up.
      Improved ability to attract and retain talent
      Arrow pointing up.
      Increased business adaptability
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Potential disruption to traditional working patterns
      • Cost of investing in WFH versus risk of BYOD

      Related Info-Tech Research:

      Secure Digital Transformation

      Priority 03

      Digital transformation could be a competitive advantage…or the cause of your next data breach.

      Executive summary

      Background

      Digital transformation is occurring at an ever-increasing rate these days. As Microsoft CEO Satya Nadella said early in the pandemic, “We’ve seen two years’ worth of digital transformation in two months.”

      We have heard similar stories from Info-Tech members who deployed rollouts that were scheduled to take months over a weekend instead.

      Microsoft’s own shift to rapidly expand its Teams product is a prime example of how quickly the digital landscape has changed. The global adaption to a digital world has largely been a success story, but rapid change comes with risk, and there is a parallel story of rampant cyberattacks like we have never seen before.

      Insight

      There is an adage that “slow is smooth, and smooth is fast” – the implication being that fast is sloppy. In 2022 we’ll see a pattern of organizations working to catch up their cybersecurity with the transformations we all made in 2020.

      $1.78 trillion expected in digital transformation investments (Source: World Economic Forum, 2021)

      An ounce of security prevention versus a pound of cure

      The journey of digital transformation is a risky one.

      Digital transformations often rely heavily on third-party cloud service providers, which increases exposure of corporate data.

      Further, adoption of new technology creates a new threat surface that must be assessed, mitigations implemented, and visibility established to measure performance.

      However, digital transformations are often run on slim budgets and without expert guidance.

      Survey respondents report as much: rushed deployments, increased cloud migration, and shadow IT are the top vulnerabilities reported by security leaders and executives.

      In a 2020 Ponemon survey, 82% of IT security and C-level executives reported experiencing at least one data breach directly resulting from a digital transformation they had undergone.

      Scope creep is inevitable on any large project like a digital transformation. A small security shortcut early in the project can have dire consequences when it grows to affect personal data and critical systems down the road.

      Recommended Actions

      Engage the business early and often

      Despite the risks, organizations engage in digital transformations because they also have huge business value.

      Security leaders should not be seeking to slow or stop digital transformations; rather, we should be engaging with the business early to get ahead of risks and enable successful transformation.

      Establish a vendor security program

      Data is moving out of datacenters and onto third-party environments. Without security requirements built into agreements, and clear visibility into vendor security capabilities, that data is a major source of risk.

      A robust vendor security program will create assurance early in the process and help to reinforce the responsibility of securing data with other parts of the organization.

      Build/revisit your security strategy

      The threat surface has changed since before your transformation. This is the right time to revisit or rebuild your security strategy to ensure that your control set is present throughout the new environment – and also a great opportunity to show how your current security investments are helping secure your new digital lines of business!

      Educate your key players

      Only 16% of security leaders and executives report alignment between security and business processes during digital transformation.

      If security is too low a priority, then key players in your transformation efforts are likely unaware of how security risks impact their own success. It will be incumbent upon the CISO to start that conversation.

      Securing digital transformation

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Ensure your investment in digital transformation is appropriately secured.

      Initiative Description:

      • Engage security with digital transformation and relevant governance structures (steering committees) to ensure security considerations are built into digital transformation planning.
      • Incorporate security stage gates in project management procedures.
      • Establish a vendor security assessment program.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing up.


      Increased likelihood of digital transformation success

      Other Expected Business Benefits:

      Arrow pointing up.
      Ability to make informed decisions for the field rep strategy
      Arrow pointing down.
      Reduced long-term cost of digital transformation
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Potential increased up front cost (reduced long-term cost)
      • Potential slowed implementation with security stage gates in project management

      Related Info-Tech Research:

      Adopt Zero Trust

      Priority 04

      Governments are recognizing the importance of zero trust strategies. So should your organization.

      Why now for zero trust?

      John Kindervag modernized the concept of zero trust back in 2010, and in the intervening years there has been enormous interest in cybersecurity circles, yet in 2022 only 30% of organizations report even beginning to roll out zero trust capabilities (Statista, 2022).

      Why such little action on a revolutionary and compelling model?

      Zero trust is not a technology; it is a principle. Zero trust adoption takes concerted planning, effort, and expense, for which the business value has been unclear throughout most of the last 10 years. However, several recent developments are changing that:

      • Securing technology has become very hard! The size, complexity, and attack surface of IT environments has grown significantly – especially since the pandemic.
      • Cyberattacks have become rampant as the cost to deploy harmful ransomware has become lower and the impact has become higher.
      • The shift away from on-premises datacenters and offices created an opening for zero trust investment, and zero trust technology is more mature than ever before.

      The time has come for zero trust adoption to begin in earnest.

      97% will maintain or increase zero trust budget (Source: Statista, 2022)

      Traditional perimeter security is not working

      Zero trust directly addresses the most prevalent attack vectors today

      A hybrid workforce using traditional VPN creates an environment where we are exposed to all the risks in the wild (unknown devices at any location on any network), but at a stripped-down security level that still provides the trust afforded to on-premises workers using known devices.

      What’s more, threats such as ransomware are known to exploit identity and remote access vulnerabilities before moving laterally within a network – vectors that are addressed directly by zero trust identity and networking. Ninety-three percent of surveyed zero trust adopters state that the benefits have matched or exceeded their expectations (iSMG, 2022).

      Top reasons for building a zero trust program in 2022

      (Source: iSMG, 2022)

      44%

      Enforce least privilege access to critical resources

      44%

      Reduce attacker ability to move laterally

      41%

      Reduce enterprise attack surface

      The business case for zero trust is clearer than ever

      Prior obstacles to Zero Trust are disappearing

      A major obstacle to zero trust adoption has been the sheer cost, along with the lack of business case for that investment. Two factors are changing that paradigm in 2022:

      The May 2021 US White House Executive Order for federal agencies to adopt zero trust architecture finally placed zero trust on the radar of many CEOs and board members, creating the business interest and willingness to consider investing in zero trust.

      In addition, the cost of adopting zero trust is quickly being surpassed by the cost of not adopting zero trust, as cyberattacks become rampant and successful zero trust deployments create a case study to support investment.

      Bar chart titled 'Cost to remediate a Ransomware attack' with bars representing the years '2021' and '2020'. 2021's cost sits around $1.8M while 2020's was only $750K The cost to remediate a ransomware attack more than doubled from 2020 to 2021. Widespread adoption of zero trust capabilities could keep that number from doubling again in 2022. (Source: Sophos, 2021)

      The cost of a data breach is on average $1.76 million less for organizations with mature zero trust deployments.

      That is, the cost of a data breach is 35% reduced compared to organizations without zero trust controls. (Source: IBM, 2021)

      Recommended Actions

      Start small

      Don’t put all your eggs in one basket by deploying zero trust in a wide swath. Rather, start as small as possible to allow for growing pains without creating business friction (or sinking your project altogether).

      Build a sensible roadmap

      Zero trust principles can be applied in a myriad of ways, so where should you start? Between identities, devices, networking, and data, decide on a use case to do pilot testing and then refine your approach.

      Beware too-good-to-be-true products

      Zero trust is a powerful buzzword, and vendors know it.

      Be skeptical and do your due diligence to ensure your new security partners in zero trust are delivering what you need.

      Zero trust roadmap

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Develop a practical roadmap that shows the business value of security investment.

      Initiative Description:

      • Define desired business and security outcomes from zero trust adoption.
      • Assess zero trust readiness.
      • Build roadmaps for zero trust:
        1. Identity
        2. Networking
        3. Devices
        4. Data
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing up.


      Increased security posture and business agility

      Other Expected Business Benefits:

      Arrow pointing down.
      Reduced impact of security events
      Arrow pointing down.
      Reduced cost of managing complex control set
      Arrow pointing up.
      More secure business transformation (i.e. cloud/digital)
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Learning curve of implementation (start small and slow)
      • Transition from current control set to zero trust model

      Related Info-Tech Research:

      Protect Against and Respond to Ransomware

      Priority 05

      Ransomware is still the #1 threat to the safety of your data.

      Executive summary

      Background

      • Ransomware attacks have transformed in 2021 and show no sign of slowing in 2022. There is a new major security breach every week, despite organizations spending over $150 billion in a year on cybersecurity (Nasdaq, 2021).
      • Ransomware as a service (RaaS) is commonplace, and attackers are doubling down by holding encrypted data ransom and also demanding payment under threat to disclose exfiltrated data – and they are making good on their threats.
      • The global cost of ransomware is expected to rise to $265 billion by 2031 (Cybersecurity Ventures, 2021).
      • We expect to see an increase in ransomware incidents in 2022, both in severity and volume – multiple attacks and double extortion are now the norm.
      • High staff turnover increases risk because new employees are unfamiliar with security protocols.

      150% increase ransomware attacks in 2020 (Source: ENISA)

      This is a new golden age of ransomware

      What is the same in 2022

      Unbridled ransomware attacks make it seem like attackers must be using complex new techniques, but prevalent ransomware attack vectors are actually well understood.

      Nearly all modern variants are breaching victim systems in one of three ways:

      • Email phishing
      • Software vulnerabilities
      • RDP/Remote access compromise
      What is new in 2022
      The sophistication of victim targeting

      Victims often find themselves asking, “How did the attackers know to phish the most security-oblivious person in my staff?” Bad actors have refined their social engineering and phishing to exploit high-risk individuals, meaning your chain is only as strong as the weakest link.

      Ability of malware to evade detection

      Modern ransomware is getting better at bypassing anti-malware technology, for example, through creative techniques such as those seen in the MedusaLocker variant and in Ghost Control attacks.

      Effective anti-malware is still a must-have control, but a single layer of defense is no longer enough. Any organization that hopes to avoid paying a ransom must prepare to detect, respond, and recover from an attack.

      Many leaders still don’t know what a ransomware recovery would look like

      Do you know what it would take to recover from a ransomware incident?

      …and does your executive leadership know what it would take to recover?

      The organizations that are most likely to pay a ransom are unprepared for the reality of recovering their systems.

      If you have not done a tabletop or live exercise to simulate a true recovery effort, you may be exposed to more risk than you realize.

      Are your defenses sufficiently hardened against ransomware?

      Organizations with effective security prevention are often breached by ransomware – but they are prepared to contain, detect, and eradicate the infection.

      Ask yourself whether you have identified potential points of entry for ransomware. Assume that your security controls will fail.

      How well are your security controls layered, and how difficult would it be for an attacker to move east/west within your systems?

      Recommended Actions

      Be prepared for a breach

      There is no guarantee that an organization will not fall victim to ransomware, so instead of putting all their effort into prevention, organizations should also put effort into planning to respond to a breach.

      Security awareness training/phishing detection

      Phishing continues to be the main point of entry for ransomware. Investing in phishing awareness and detection among your end users may be the most impactful countermeasure you can implement.

      Zero trust adoption

      Always verify at every step of interaction, even when access is requested by internal users. Manage access of sensitive information based on the principle of least privilege access.

      Encrypt and back up your data

      Encrypt your data so that even if there is a breach, the attackers don’t have a copy of your data. Also, keep regular backups of data at a separate location so that you still have data to work with after a breach occurs.

      You never want to pay a ransom. Being prepared to deal with an incident is your best chance to avoid paying!

      Prevent and respond to ransomware

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Determine your current readiness, response plan, and projects to close gaps.

      Initiative Description:

      • Execute a systematic assessment of your current security and ransomware recovery capabilities.
      • Perform tabletop activities and live recoveries to test data recovery capabilities.
      • Train staff to detect suspicious communications and protect their identities.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing up.


      Improved productivity and brand protection

      Other Expected Business Benefits:

      Arrow pointing down.
      Reduced downtime and disruption
      Arrow pointing down.
      Reduced cost due to incidents (ransom payments, remediation)
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Friction with existing staff

      Related Info-Tech Research:

      Deepfakes: Dark-horse threat for 2022

      Deepfake video

      How long has it been since you’ve gone a full workday without having a videoconference with someone?

      We have become inherently trustful that the face we see on the screen is real, but the technology required to falsify that video is widely available and runs on commercially available hardware, ushering in a genuinely post-truth online era.

      Criminals can use deepfakes to enhance social engineering, to spread misinformation, and to commit fraud and blackmail.

      Deepfake audio

      Many financial institutions have recently deployed voiceprint authentication. TD describes its VoicePrint as “voice recognition technology that allows us to use your voiceprint – as unique to you as your fingerprint – to validate your identity” over the phone.

      However, hackers have been defeating voice recognition for years already. There is ripe potential for voice fakes to fool both modern voice recognition technology and the accounts payable staff.

      Bibliography

      “2021 Ransomware Statistics, Data, & Trends.” PurpleSec, 2021. Web.

      Bayern, Macy. “Why 60% of IT security pros want to quit their jobs right now.” TechRepublic, 10 Oct. 2018. Web.

      Bresnahan, Ethan. “How Digital Transformation Impacts IT And Cyber Risk Programs.” CyberSaint Security, 25 Feb. 2021. Web.

      Clancy, Molly. “The True Cost of Ransomware.” Backblaze, 9 Sept. 2021.Web.

      “Cost of a Data Breach Report 2021.” IBM, 2021. Web.

      Cybersecurity Ventures. “Global Ransomware Damage Costs To Exceed $265 Billion By 2031.” Newswires, 4 June 2021. Web.

      “Digital Transformation & Cyber Risk: What You Need to Know to Stay Safe.” Ponemon Institute, June 2020. Web.

      “Global Incident Response Threat Report: Manipulating Reality.” VMware, 2021.

      Granger, Diana. “Karmen Ransomware Variant Introduced by Russian Hacker.” Recorded Future, 18 April 2017. Web.

      “Is adopting a zero trust model a priority for your organization?” Statista, 2022. Web.

      “(ISC)2 Cybersecurity Workforce Study, 2021: A Resilient Cybersecurity Profession Charts the Path Forward.” (ISC)2, 2021. Web.

      Kobialka, Dan. “What Are the Top Zero Trust Strategies for 2022?” MSSP Alert, 10 Feb. 2022. Web.

      Kost, Edward. “What is Ransomware as a Service (RaaS)? The Dangerous Threat to World Security.” UpGuard, 1 Nov. 2021. Web.

      Lella, Ifigeneia, et al., editors. “ENISA Threat Landscape 2021.” ENISA, Oct. 2021. Web.

      Mello, John P., Jr. “700K more cybersecurity workers, but still a talent shortage.” TechBeacon, 7 Dec. 2021. Web.

      Naraine, Ryan. “Is the ‘Great Resignation’ Impacting Cybersecurity?” SecurityWeek, 11 Jan. 2022. Web.

      Oltsik, Jon. “ESG Research Report: The Life and Times of Cybersecurity Professionals 2021 Volume V.” Enterprise Security Group, 28 July 2021. Web.

      Osborne, Charlie. “Ransomware as a service: Negotiators are now in high demand.” ZDNet, 8 July 2021. Web.

      Osborne, Charlie. “Ransomware in 2022: We’re all screwed.” ZDNet, 22 Dec. 2021. Web.

      “Retaining Tech Employees in the Era of The Great Resignation.” TalentLMS, 19 Oct. 2021. Web.

      Rubin, Andrew. “Ransomware Is the Greatest Business Threat in 2022.” Nasdaq, 7 Dec. 2021. Web.

      Samartsev, Dmitry, and Daniel Dobrygowski. “5 ways Digital Transformation Officers can make cybersecurity a top priority.“ World Economic Forum, 15 Sept. 2021. Web.

      Seymour, John, and Azeem Aqil. “Your Voice is My Passport.” Presented at black hat USA 2018.

      Solomon, Howard. “Ransomware attacks will be more targeted in 2022: Trend Micro.” IT World Canada, 6 Jan. 2022. Web.

      “The State of Ransomware 2021.” Sophos, April 2021. Web.

      Tarun, Renee. “How The Great Resignation Could Benefit Cybersecurity.” Forbes Technology Council, Forbes, 21 Dec. 2021. Web.

      “TD VoicePrint.” TD Bank, n.d. Web.

      “Working from home during the COVID-19 pandemic, April 202 to June 2021.” Statistics Canada, 4 Aug. 2021. Web.

      “Zero Trust Strategies for 2022.” iSMG, Palo Alto Networks, and Optiv, 28 Jan. 2022. Web.

      Apply Design Thinking to Build Empathy With the Business

      • Buy Link or Shortcode: {j2store}89|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $20,772 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Business satisfaction with IT is low.
      • IT and the business have independently evolving strategy, initiatives, and objectives.
      • IT often exceeds their predicted project costs and has difficulty meeting the business’ expectations of project quality and time-to-market.

      Our Advice

      Critical Insight

      • Business needs are unclear or ambiguous.
      • IT and the business do not know how to leverage each other’s talent and resources to meet their common goals.
      • Not enough steps are taken to fully understand and validate problems.
      • IT can’t pivot fast enough when the business’s needs change.

      Impact and Result

      Product, service, and process design should always start with an intimate understanding of what the business is trying to accomplish and why it is important.

      Apply Design Thinking to Build Empathy With the Business Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should apply experience design to partner with the business, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Research

      Identify goals and objectives for experience design, establish targeted stakeholders, and conduct discovery interviews.

      • Apply Design Thinking to Build Empathy With the Business – Phase 1: Research
      • Stakeholder Discovery Interview Template

      2. Map and iterate

      Create the journey map, design a research study to validate your hypotheses, and iterate and ideate around a refined, data-driven understanding of stakeholder problems.

      • Apply Design Thinking to Build Empathy With the Business – Phase 2: Map and Iterate
      • Journey Map Template
      • Research Study Log Tool
      [infographic]

      Workshop: Apply Design Thinking to Build Empathy With the Business

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Introduction to Journey Mapping

      The Purpose

      Understand the method and purpose of journey mapping.

      Key Benefits Achieved

      Initial understanding of the journey mapping process and the concept of end-user empathy.

      Activities

      1.1 Introduce team and discuss workshop motivations and goals.

      1.2 Discuss overview of journey mapping process.

      1.3 Perform journey mapping case study activity.

      Outputs

      Case Study Deliverables – Journey Map and Empathy Maps

      2 Persona Creation

      The Purpose

      Begin to understand the goals and motivations of your stakeholders using customer segmentation and an empathy mapping exercise.

      Key Benefits Achieved

      Understand the demographic and psychographic factors driving stakeholder behavior.

      Activities

      2.1 Discuss psychographic stakeholder segmentation.

      2.2 Create empathy maps for four segments.

      2.3 Generate problem statements.

      2.4 Identify target market.

      Outputs

      Stakeholder personas

      Target market of IT

      3 Interview Stakeholders and Start a Journey Map

      The Purpose

      Get first-hand knowledge of stakeholder needs and start to capture their perspective with a first-iteration journey map.

      Key Benefits Achieved

      Capture the process stakeholders use to solve problems and empathize with their perspectives, pains, and gains.

      Activities

      3.1 Review discovery interviewing techniques.

      3.2 Review and modify the discovery questionnaire

      3.3 Demonstrate stakeholder interview.

      3.4 Synthesize learnings and begin creating a journey map.

      Outputs

      Customized discovery interview template

      Results of discovery interviewing

      4 Complete the Journey Map and Create a Research Study

      The Purpose

      Hypothesize the stakeholder journey, identify assumptions, plan a research study to validate your understanding, and ideate around critical junctures in the journey.

      Key Benefits Achieved

      Understand the stakeholder journey and ideate solutions with the intention of improving their experience with IT.

      Activities

      4.1 Finish the journey map.

      4.2 Identify assumptions and create hypotheses.

      4.3 Discuss field research and hypothesis testing.

      4.4 Design the research study.

      4.5 Discuss concluding remarks and next steps.

      Outputs

      Completed journey map for one IT process, product, or service

      Research study design and action plan

      Engineer Your Event Management Process

      • Buy Link or Shortcode: {j2store}461|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management

      Build an event management practice that is situated in the larger service management environment. Purposefully choose valuable events to track and predefine their associated actions to cut down on data clutter.

      Our Advice

      Critical Insight

      Event management is useless in isolation. The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.

      Impact and Result

      Create a repeatable framework to define monitored events, their root cause, and their associated action. Record your monitored events in a catalog to stay organized.

      Engineer Your Event Management Process Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Engineer Your Event Management Deck – A step-by-step document that walks you through how to choose meaningful, monitored events to track and action.

      Engineer your event management practice with tracked events informed by the business impact of the related systems, applications, and services. This storyboard will help you properly define and catalog events so you can properly respond when alerted.

      • Engineer Your Event Management Process – Phases 1-3

      2. Event Management Cookbook – A guide to help you walk through every step of scoping event management and defining every event you track in your IT environment.

      Use this tool to define your workflow for adding new events to track. This cookbook includes the considerations you need to include for every tracked event as well as the roles and responsibilities of those involved with event management.

      • Event Management Cookbook

      3. Event Management Catalog – Using the Event Management Cookbook as a guide, record all your tracked events in the Event Management Catalog.

      Use this tool to record your tracked events and alerts in one place. This catalog allows you to record the rationale, root-cause, action, and data governance for all your monitored events.

      • Event Management Catalog

      4. Event Management Workflow – Define your event management handoffs to other service management practices.

      Use this template to help define your event management handoffs to other service management practices including change management, incident management, and problem management.

      • Event Management Workflow (Visio)
      • Event Management Workflow (PDF)

      5. Event Management Roadmap – Implement and continually improve upon your event management practice.

      Use this tool to implement and continually improve upon your event management process. Record, prioritize, and assign your action items from the event management blueprint.

      • Event Management Roadmap
      [infographic]

      Workshop: Engineer Your Event Management Process

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Situate Event Management in Your Service Management Environment

      The Purpose

      Determine goals and challenges for event management and set the scope to business-critical systems.

      Key Benefits Achieved

      Defined system scope of Event Management

      Roles and responsibilities defined

      Activities

      1.1 List your goals and challenges

      1.2 Monitoring and event management RACI

      1.3 Abbreviated business impact analysis

      Outputs

      Event Management RACI (as part of the Event Management Cookbook)

      Abbreviated BIA (as part of the Event Management Cookbook)

      2 Define Your Event Management Scope

      The Purpose

      Define your in-scope configuration items and their operational conditions

      Key Benefits Achieved

      Operational conditions, related CIs and dependencies, and CI thresholds defined

      Activities

      2.1 Define operational conditions for systems

      2.2 Define related CIs and dependencies

      2.3 Define conditions for CIs

      2.4 Perform root-cause analysis for complex condition relationships

      2.5 Set thresholds for CIs

      Outputs

      Event Management Catalog

      3 Define Thresholds and Actions

      The Purpose

      Pre-define actions for every monitored event

      Key Benefits Achieved

      Thresholds and actions tied to each monitored event

      Activities

      3.1 Set thresholds to monitor

      3.2 Add actions and handoffs to event management

      Outputs

      Event Catalog

      Event Management Workflows

      4 Start Monitoring and Implement Event Management

      The Purpose

      Effectively implement event management

      Key Benefits Achieved

      Establish an event management roadmap for implementation and continual improvement

      Activities

      4.1 Define your data policy for event management

      4.2 Identify areas for improvement and establish an implementation plan

      Outputs

      Event Catalog

      Event Management Roadmap

      Further reading

      Engineer Your Event Management Process

      Track monitored events purposefully and respond effectively.

      EXECUTIVE BRIEF

      Analyst Perspective

      Event management is useless in isolation.

      Event management creates no value when implemented in isolation. However, that does not mean event management is not valuable overall. It must simply be integrated properly in the service management environment to inform and drive the appropriate actions.

      Every step of engineering event management, from choosing which events to monitor to actioning the events when they are detected, is a purposeful and explicit activity. Ensuring that event management has open lines of communication and actions tied to related practices (e.g. problem, incident, and change) allows efficient action when needed.

      Catalog your monitored events using a standardized framework to allow you to know:

      1. The value of tracking the event.
      2. The impact when the event is detected.
      3. The appropriate, right-sized reaction when the event is detected.
      4. The tool(s) involved in tracking the event.

      Properly engineering event management allows you to effectively monitor and understand your IT environment and bolster the proactivity of the related service management practices.

      Benedict Chang

      Benedict Chang
      Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Strive for proactivity. Implement event management to reduce response times of technical teams to solve (potential) incidents when system performance degrades.

      Build an integrated event management practice where developers, service desk, and operations can all rely on event logs and metrics.

      Define the scope of event management including the systems to track, their operational conditions, related configuration items (CIs), and associated actions of the tracked events.

      Common Obstacles

      Managed services, subscription services, and cloud services have reduced the traditional visibility of on- premises tools.

      System(s) complexity and integration with the above services has increased, making true cause and effect difficult to ascertain.

      Info-Tech’s Approach

      Clearly define a limited number of operational objectives that may benefit from event management.

      Focus only on the key systems whose value is worth the effort and expense of implementing event management.

      Understand what event information is available from the CIs of those systems and map those against your operational objectives.

      Write a data retention policy that balances operational, audit, and debugging needs against cost and data security needs.

      Info-Tech Insight

      More is NOT better. Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.

      Your challenge

      This research is designed to help organizations who are facing these challenges or looking to:

      • Build an event management practice that is situated in the larger service management environment.
      • Purposefully choose events and to track as well as their related actions based on business-critical systems, their conditions, and their related CIs.
      • Cut down on the clutter of current events tracked.
      • Create a framework to add new events when new systems are onboarded.

      33%

      In 2020, 33% of organizations listed network monitoring as their number one priority for network spending. 27% of organizations listed network monitoring infrastructure as their number two priority.
      Source: EMA, 2020; n=350

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • Many organizations have multiple tools across multiple teams and departments that track the current state of infrastructure, making it difficult to consolidate event management into a single practice.
      • Managed services, subscription services, and cloud services have reduced the traditional visibility of on-premises tools
      • System(s) complexity and integration with the above services has increased, making true cause and effect difficult to ascertain.

      Build event management to bring value to the business

      33%

      33% of all IT organizations reported that end users detected and reported incidents before the network operations team was aware of them.
      Source: EMA, 2020; n=350

      64%

      64% of enterprises use 4-10 monitoring tools to troubleshoot their network.
      Source: EMA, 2020; n=350

      Info-Tech’s approach

      Choose your events purposefully to avoid drowning in data.

      A funnel is depicted. along the funnel are the following points: Event Candidates: 1. System Selection by Business Impact; 2. System Decomposition; 3. Event Selection and Thresholding; 4. Event Action; 5. Data Management; Valuable, Monitored, and Actioned Events

      The Info-Tech difference:

      1. Start with a list of your most business-critical systems instead of data points to measure.
      2. Decompose your business-critical systems into their configuration items. This gives you a starting point for choosing what to measure.
      3. Choose your events and label them as notifications, warnings, or exceptions. Choose the relevant thresholds for each CI.
      4. Have a pre-defined action tied to each event. That action could be to log the datapoint for a report or to open an incident or problem ticket.
      5. With your event catalog defined, choose how you will measure the events and where to store the data.

      Event management is useless in isolation

      Define how event management informs other management practices.

      Logging, Archiving, and Metrics

      Monitoring and event management can be used to establish and analyze your baseline. The more you know about your system baselines, the easier it will be to detect exceptions.

      Change Management

      Events can inform needed changes to stay compliant or to resolve incidents and problems. However, it doesn’t mean that changes can be implemented without the proper authorization.

      Automatic Resolution

      The best use case for event management is to detect and resolve incidents and problems before end users or IT are even aware.

      Incident Management

      Events sitting in isolation are useless if there isn’t an effective way to pass potential tickets off to incident management to mitigate and resolve.

      Problem Management

      Events can identify problems before they become incidents. However, you must establish proper data logging to inform problem prioritization and actioning.

      Info-Tech’s methodology for Engineering Your Event Management Process

      1. Situate Event Management in Your Service Management Environment 2. Define Your Monitoring Thresholds and Accompanying Actions 3. Start Monitoring and Implement Event Management

      Phase Steps

      1.1 Set Operational and Informational Goals

      1.2 Scope Monitoring and States of Interest

      2.1 Define Conditions and Related CIs

      2.2 Set Monitoring Thresholds and Alerts

      2.3 Action Your Events

      3.1 Define Your Data Policy

      3.2 Define Future State

      Event Cookbook

      Event Catalog

      Phase Outcomes

      Monitoring and Event Management RACI

      Abbreviated BIA

      Event Workflow

      Event Management Roadmap

      Insight summary

      Event management is useless in isolation.

      The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.

      Start with business intent.

      Trying to organize a catalog of events is difficult when working from the bottom up. Start with the business drivers of event management to keep the scope manageable.

      Keep your signal-to-noise ratio as high as possible.

      Defining tracked events with their known conditions, root cause, and associated actions allows you to be proactive when events occur.

      Improve slowly over time.

      Start small if need be. It is better and easier to track a few items with proper actions than to try to analyze events as they occur.

      More is NOT better. Avoid drowning in data.

      Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.

      Add correlations in event management to avoid false positives.

      Supplement the predictive value of a single event by aggregating it with other events.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverable:

      This is a screenshot of the Event Management Cookbook

      Event Management Cookbook
      Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.

      This is a screenshot of the Event Management RACI

      Event Management RACI
      Define the roles and responsibilities needed in event management.

      This is a screenshot of the event management workflow

      Event Management Workflow
      Define the lifecycle and handoffs for event management.

      This is a screenshot of the Event Catalog

      Event Catalog
      Consolidate and organize your tracked events.

      This is a screenshot of the Event Roadmap

      Event Roadmap
      Roadmap your initiatives for future improvement.

      Blueprint benefits

      IT Benefits

      • Provide a mechanism to compare operating performance against design standards and SLAs.
      • Allow for early detection of incidents and escalations.
      • Promote timely actions and ensure proper communications.
      • Provide an entry point for the execution of service management activities.
      • Enable automation activity to be monitored by exception
      • Provide a basis for service assurance, reporting and service improvements.

      Business Benefits

      • Less overall downtime via earlier detection and resolution of incidents.
      • Better visibility into SLA performance for supplied services.
      • Better visibility and reporting between IT and the business.
      • Better real-time and overall understanding of the IT environment.

      Case Study

      An event management script helped one company get in front of support calls.

      INDUSTRY - Research and Advisory

      SOURCE - Anonymous Interview

      Challenge

      One staff member’s workstation had been infected with a virus that was probing the network with a wide variety of usernames and passwords, trying to find an entry point. Along with the obvious security threat, there existed the more mundane concern that workers occasionally found themselves locked out of their machine and needed to contact the service desk to regain access.

      Solution

      The system administrator wrote a script that runs hourly to see if there is a problem with an individual’s workstation. The script records the computer's name, the user involved, the reason for the password lockout, and the number of bad login attempts. If the IT technician on duty notices a greater than normal volume of bad password attempts coming from a single account, they will reach out to the account holder and inquire about potential issues.

      Results

      The IT department has successfully proactively managed two distinct but related problems: first, they have prevented several instances of unplanned work by reaching out to potential lockouts before they receive an incident report. They have also successfully leveraged event management to probe for indicators of a security threat before there is a breach.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Introduce the Cookbook and explore the business impact analysis.

      Call #4: Define operational conditions.

      Call #6: Define actions and related practices.

      Call #8: Identify and prioritize improvements.

      Call #3: Define system scope and related CIs/ dependencies.

      Call #5: Define thresholds and alerts.

      Call #7: Define data policy.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Situate Event Management in Your Service Management Environment Define Your Event Management Scope Define Thresholds and Actions Start Monitoring and Implement Event Management Next Steps and Wrap-Up (offsite)

      Activities

      1.1 3.1 Set Thresholds to Monitor

      3.2 Add Actions and Handoffs to Event Management

      Introductions

      1.2 Operational and Informational Goals and Challenges

      1.3 Event Management Scope

      1.4 Roles and Responsibilities

      2.1 Define Operational Conditions for Systems

      2.2 Define Related CIs and Dependencies

      2.3 Define Conditions for CIs

      2.4 Perform Root-Cause Analysis for Complex Condition Relationships

      2.4 Set Thresholds for CIs

      3.1 Set Thresholds to Monitor

      3.2 Add Actions and Handoffs to Event Management

      4.1 Define Your Data Policy for Event Management

      4.2 Identify Areas for Improvement and Future Steps

      4.3 Summarize Workshop

      5.1 Complete In-Progress Deliverables From Previous Four Days

      5.2 Set Up Review Time for Workshop Deliverables and to Discuss Next Steps

      Deliverables
      1. Monitoring and Event Management RACI (as part of the Event Management Cookbook)
      2. Abbreviated BIA (as part of the Event Management Cookbook)
      3. Event Management Cookbook
      1. Event Management Catalog
      1. Event Management Catalog
      2. Event Management Workflows
      1. Event Management Catalog
      2. Event Management Roadmap
      1. Workshop Summary

      Phase 1

      Situate Event Management in Your Service Management Environment

      Phase 1 Phase 2 Phase 3

      1.1 Set Operational and Informational Goals
      1.2 Scope Monitoring and Event Management Using Business Impact

      2.1 Define Conditions and Related CIs
      2.2 Set Monitoring Thresholds and Alerts
      2.3 Action Your Events

      3.1 Define Your Data Policy
      3.2 Set Your Future of Event Monitoring

      Engineer Your Event Management Process

      This phase will walk you through the following activities:

      1.1.1 List your goals and challenges

      1.1.2 Build a RACI chart for event management

      1.2.1 Set your scope using business impact

      This phase involves the following participants:

      Infrastructure management team

      IT managers

      Step 1.1

      Set Operational and Informational Goals

      Activities

      1.1.1 List your goals and challenges

      1.1.2 Build a RACI chart for event management

      Situate Event Management in Your Service Management Environment

      This step will walk you through the following activities:

      Set the overall scope of event management by defining the governing goals. You will also define who is involved in event management as well as their responsibilities.

      This step involves the following participants:

      Infrastructure management team

      IT managers

      Outcomes of this step

      Define the goals and challenges of event management as well as their data proxies.

      Have a RACI matrix to define roles and responsibilities in event management.

      Situate event management among related service management practices

      This image depicts the relationship between Event Management and related service management practices.

      Event management needs to interact with the following service management practices:

      • Incident Management – Event management can provide early detection and/or prevention of incidents.
      • Availability and Capacity Management – Event management helps detect issues with availability and capacity before they become an incident.
      • Problem Management – The data captured in event management can aid in easier detection of root causes of problems.
      • Change Management – Event management can function as the rationale behind needed changes to fix problems and incidents.

      Consider both operational and informational goals for event management

      Event management may log real-time data for operational goals and non-real time data for informational goals

      Event Management

      Operational Goals (real-time)

      Informational Goals (non-real time)

      Incident Response & Prevention

      Availability Scaling

      Availability Scaling

      Modeling and Testing

      Investigation/ Compliance

      • Knowing what the outcomes are expected to achieve helps with the design of that process.
      • A process targeted to fewer outcomes will generally be less complex, easier to adhere to, and ultimately, more successful than one targeted to many goals.
      • Iterate for improvement.

      1.1.1 List your goals and challenges

      Gather a diverse group of IT staff in a room with a whiteboard.

      Have each participant write down their top five specific outcomes they want from improved event management.

      Consolidate similar ideas.

      Prioritize the goals.

      Record these goals in your Event Management Cookbook.

      Priority Example Goals
      1 Reduce response time for incidents
      2 Improve audit compliance
      3 Improve risk analysis
      4 Improve forecasting for resource acquisition
      5 More accurate RCAs

      Input

      • Pain points

      Output

      • Prioritized list of goals and outcomes

      Materials

      • Whiteboard/flip charts
      • Sticky notes

      Participants

      • Infrastructure management team
      • IT managers

      Download the Event Management Cookbook

      Event management is a group effort

      • Event management needs to involve multiple other service management practices and service management roles to be effective.
      • Consider the roles to the right to see how event management can fit into your environment.

      Infrastructure Team

      The infrastructure team is accountable for deciding which events to track, how to track, and how to action the events when detected.

      Service Desk

      The service desk may respond to events that are indicative of incidents. Setting a root cause for events allows for quicker troubleshooting, diagnosis, and resolution of the incident.

      Problem and Change Management

      Problem and change management may be involved with certain event alerts as the resultant action could be to investigate the root cause of the alert (problem management) or build and approve a change to resolve the problem (change management).

      1.1.2 Build a RACI chart for event management

      1. As a group, complete the RACI chart using the template to the right. RACI stands for the following:
        • Responsible. The person doing the work.
        • Accountable. The person who ensures the work is done.
        • Consulted. Two-way communication.
        • Informed. One-way communication
        • There must be one and only one accountable person for each task. There must also be at least one responsible person. Depending on the use case, RACI letters may be combined (e.g. AR means the person who ensures the work is complete but also the person doing the work).
      2. Start with defining the roles in the first row in your own environment.
      3. Look at the tasks on the first column and modify/add/subtract tasks as necessary.
      4. Populate the RACI chart as necessary.

      Download the Event Management Cookbook

      Event Management Task IT Manager SME IT Infrastructure Manager Service Desk Configuration Manager (Event Monitoring System) Change Manager Problem Manager
      Defining systems and configuration items to monitor R C AR R
      Defining states of operation R C AR C
      Defining event and event thresholds to monitor R C AR I I
      Actioning event thresholds: Log A R
      Actioning event thresholds: Monitor I R A R
      Actioning event thresholds: Submit incident/change/problem ticket R R A R R I I
      Close alert for resolved issues AR RC RC

      Step 1.2

      Scope Monitoring and Event Management Using Business Impact

      Activities

      1.2.1 Set your scope using business impact

      Situate Event Management in Your Service Management Environment

      This step will walk you through the following activities:

      • Set your scope of event management using an abbreviated business impact analysis.

      This step involves the following participants:

      • Infrastructure manager
      • IT managers

      Outcomes of this step

      • List of systems, services, and applications to monitor.

      Use the business impact of your systems to set the scope of monitoring

      Picking events to track and action is difficult. Start with your most important systems according to business impact.

      • Business impact can be determined by how costly system downtime is. This could be a financial impact ($/hour of downtime) or goodwill impact (internal/external stakeholders affected).
      • Use business impact to determine the rating of a system by Tier (Gold, Silver, or Bronze):
        • GOLD: Mission-critical services. An outage is catastrophic in terms of cost or public image/goodwill. Example: trading software at a financial institution.
        • SILVER: Important to daily operations but not mission critical. Example: email services at any large organization.
        • BRONZE: Loss of these services is an inconvenience more than anything, though they do serve a purpose and will be missed if they are never brought back online. Example: ancient fax machines.
      • Align a list of systems to track with your previously selected goals for event management to determine WHY you need to track that system. Tracking the system could inform critical SLAs (performance/uptime), vulnerability, compliance obligations, or simply system condition.

      More is not better

      Tracking too many events across too many tools could decrease your responsiveness to incidents. Start tracking only what is actionable to keep the signal-to-noise ratio of events as high as possible.

      % of Incidents Reported by End Users Before Being Recognized by IT Operations

      A bar graph is depicted. It displays the following Data: All Organizations: 40%; 1-3 Tools: 29; 4-10 Tools: 36%; data-verified=11 Tools: 52">

      Source: Riverbed, 2016

      1.2.1 Set your scope using business impact

      Collating an exhaustive list of applications and services is onerous. Start small, with a subset of systems.

      1. Gather a diverse group of IT staff and end users in a room with a whiteboard.
      2. List 10-15 systems and services. Solicit feedback from the group. Questions to ask:
        • What services do you regularly use? What do you see others using?
          (End users)
        • Which service comprises the greatest number of service calls? (IT)
        • What services are the most critical for business operations? (Everybody)
        • What is the cost of downtime (financial and goodwill) for these systems? (Business)
        • How does monitoring these systems align with your goals set in Step 1.1?
      3. Assign an importance to each of these systems from Gold (most important) to Bronze (least important).
      4. Record these systems in your Event Management Cookbook.
      Systems/Services/Applications Tier
      1 Core Infrastructure Gold
      2 Internet Access Gold
      3 Public-Facing Website Gold
      4 ERP Silver
      15 PaperSave Bronze

      Include a variety of services in your analysis

      It might be tempting to jump ahead and preselect important applications. However, even if an application is not on the top 10 list, it may have cross-dependencies that make it more valuable than originally thought.

      For a more comprehensive BIA, see Create a Right-Sized Disaster Recovery Plan
      Download the Event Management Cookbook

      Phase 2

      Define Your Monitoring Thresholds and Accompanying Actions

      Phase 1Phase 2Phase 3

      1.1 Set Operational and Informational Goals
      1.2 Scope Monitoring and Event Management Using Business Impact

      2.1 Define Conditions and Related CIs
      2.2 Set Monitoring Thresholds and Alerts
      2.3 Action Your Events

      3.1 Define Your Data Policy
      3.2 Set Your Future of Event Monitoring

      Engineer Your Event Management Process

      This phase will walk you through the following activities:

      • 2.1.1 Define performance conditions
      • 2.1.2 Decompose services into Related CIs
      • 2.2.1 Verify your CI conditions with a root-cause analysis
      • 2.2.2 Set thresholds for your events
      • 2.3.1 Set actions for your thresholds
      • 2.3.2 Build your event management workflow

      This phase involves the following participants:

      • Business system owners
      • Infrastructure manager
      • IT managers

      Step 2.1

      Define Conditions and Related CIs

      Activities

      2.1.1 Define performance conditions

      2.1.2 Decompose services into related CIs

      Define Your Monitoring Thresholds and Accompanying Actions

      This step will walk you through the following activities:

      For each monitored system, define the conditions of interest and related CIs.

      This step involves the following participants:

      Business system owners

      Infrastructure manager

      IT managers

      Outcomes of this step

      List of conditions of interest and related CIs for each monitored system.

      Consider the state of the system that is of concern to you

      Events present a snapshot of the state of a system. To determine which events you want to monitor, you need to consider what system state(s) of importance.

      • Systems can be in one of three states:
        • Up
        • Down
        • Degraded
      • What do these states mean for each of your systems chosen in your BIA?
      • Up and Down are self-explanatory and a good place to start.
      • However, degraded systems are indicative that one or more component systems of an overarching system has failed. You must uncover the nature of such a failure, which requires more sophisticated monitoring.

      2.1.1 Define system states of greatest importance for each of your systems

      1. With the system business owners and compliance officers in the room, list the performance states of your systems chosen in your BIA.
      2. If you have too many systems listed, start only with the Gold Systems.
      3. Use the following proof approaches if needed:
        • Positive Proof Approach – every system when it has certain technical and business performance expectations. You can use these as a baseline.
        • Negative Proof Approach – users know when systems are not performing. Leverage incident data and end-user feedback to determine failed or degraded system states and work backwards.
      4. Focus on the end-user facing states.
      5. Record your critical system states in the Event Management Cookbook.
      6. Use these states in the next several activities and translate them into measurable infrastructure metrics.

      Input

      • Results of business impact analysis

      Output

      • Critical system states

      Materials

      • Whiteboard/flip charts
      • Sticky notes
      • Markers

      Participants

      • Infrastructure manager
      • Business system owners

      Download the Event Management Cookbook

      2.1.2 Decompose services into relevant CIs

      Define your system dependencies to help find root causes of degraded systems.

      1. For each of your systems identified in your BIA, list the relevant CIs.
      2. Identify dependencies and relationship of those CIs with other CIs (linkages and dependencies).
      3. Starting with the Up/Down conditions for your Gold systems, list the conditions of the CIs that would lead to the condition of the system. This may be a 1:1 relationship (e.g. Core Switches down = Core Infrastructure down) or a many:1 relationship (some virtualization hosts + load balancers down = Core Infrastructure down). You do not need to define specific thresholds yet. Focus on conditions for the CIs.
      4. Repeat step 3 with Degraded conditions.
      5. Repeat step 3 and 4 with Silver and Bronze systems.
      6. Record the results in the Event Management Cookbook.

      Core Infrastructure Example

      An iceberg is depicted. below the surface, are the following terms in order from shallowest to deepest: MPLS Connection, Core Switches, DNS; DHCP, AD ADFS, SAN-01; Load Balancers, Virtualization Hosts (x 12); Power and Cooling

      Download the Event Management Cookbook

      Step 2.2

      Set Monitoring Thresholds and Alerts

      Activities

      2.2.1 Verify your CI conditions with a root-cause analysis

      2.2.2 Set thresholds for your events

      Define Your Monitoring Thresholds and Accompanying Actions

      This step will walk you through the following activities:

      Set monitoring thresholds for each CI related to each condition of interest.

      This step involves the following participants:

      Business system managers

      Infrastructure manager

      IT managers

      Service desk manager

      Outcomes of this step

      List of events to track along with their root cause.

      Event management will involve a significant number of alerts

      Separate the serious from trivial to keep the signal-to-noise ratio high.

      Event Categories: Exceptions: Alarms Indicate Failure; Alerts indicate exceeded thresholds; Normal Operation. Event Alerts: Informational; Exceptional; Warning

      Set your own thresholds

      You must set your own monitoring criteria based on operational needs. Events triggering an action should be reviewed via an assessment of the potential project and associated risks.

      Consider the four general signal types to help define your tracked events

      Latency – time to respond

      Examples:

      • Web server – time to complete request
      • Network – roundtrip ping time
      • Storage – read/write queue times

      Traffic – amount of activity per unit time

      Web sever – how many pages per minute

      Network – Mbps

      Storage – I/O read/writes per sec

      Errors – internally tracked erratic behaviors

      Web Server – page load failures

      Network – packets dropped

      Storage – disk errors

      Saturation – consumption compared to theoretical maximum

      Web Server – % load

      Network – % utilization

      Storage – % full

      2.2.1 Verify your CI conditions with a root-cause analysis

      RCAs postulate why systems go down; use the RCA to inform yourself of the events leading up to the system going down.

      1. Gather a diverse group of IT staff in a room with a whiteboard.
      2. Pick a complex example of a system condition (many:1 correlation) that has considerable data associated with it (e.g. recorded events, problem tickets).
      3. Speculate on the most likely precursor conditions. For example, if a related CI fails or is degraded, which metrics would you likely see before the failure?
      4. If something failed, imagine what you’d most likely see before the failure.
      5. Extend that timeline backward as far as you can be reasonably confident.
      6. Pick a value for that event.
      7. Write out your logic flow from event recognition to occurrence.
      8. Once satisfied, program the alert and ideally test in a non-prod environment.

      Public Website Example

      Dependency CIs Tool Metrics
      ISP WAN SNMP Traps Latency
      Telemetry Packet Loss
      SNMP Pooling Jitter
      Network Performance Web Server Response Time
      Connection Stage Errors
      Web Server Web Page DOM Load Time
      Performance
      Page Load Time

      Let your CIs help you

      At the end of the day, most of us can only monitor what our systems let us. Some (like Exchange Servers) offer a crippling number of parameters to choose from. Other (like MPLS) connections are opaque black boxes giving up only the barest of information. The metrics you choose are largely governed by the art of the possible.

      Case Study

      Exhaustive RCAs proved that 54% of issues were not caused by storage.

      This is the Nimble Storage Logo

      INDUSTRY - Enterprise IT
      SOURCE - ESG, 2017

      Challenge

      Despite a laser focus on building nothing but all-flash storage arrays, Nimble continued to field a dizzying number of support calls.

      Variability and complexity across infrastructure, applications, and configurations – each customer install being ever so slightly different – meant that the problem of customer downtime seemed inescapable.

      Solution

      Nimble embedded thousands of sensors into its arrays, both at a hardware level and in the code. Thousands of sensors per array multiplied by 7,500 customers meant millions of data points per second.

      This data was then analyzed against 12,000 anonymized app-data gap-related incidents.

      Patterns began to emerge, ones that persisted across complex customer/array/configuration combinations.

      These patterns were turned into signatures, then acted on.

      Results

      54% of app-data gap related incidents were in fact related to non-storage factors! Sub-optimal configuration, bad practices, poor integration with other systems, and even VM or hosts were at the root cause of over half of reported incidents.

      Establishing that your system is working fine is more than IT best practice – by quickly eliminating potential options the right team can get working on the right system faster thus restoring the service more quickly.

      Gain an even higher SNR with event correlation

      Filtering:

      Event data determined to be of minimal predictive value is shunted aside.

      Aggregation:

      De-duplication and combination of similar events to trigger a response based on the number or value of events, rather than for individual events.

      Masking:

      Ignoring events that occur downstream of a known failed system. Relies on accurate models of system relationships.

      Triggering:

      Initiating the appropriate response. This could be simple logging, any of the exception event responses, an alert requiring human intervention, or a pre-programmed script.

      2.2.2 Set thresholds for your events

      If the event management team toggles the threshold for an alert too low (e.g. one is generated every time a CPU load reaches 60% capacity), they will generate too many false positives and create far too much work for themselves, generating alert fatigue. If they go the other direction and set their thresholds too high, there will be too many false negatives – problems will slip through and cause future disruptions.

      1. Take your list of RCAs from the previous activity and conduct an activity with the group. The goal of the exercise is to produce the predictive event values that confidently predict an imminent event.
      2. Questions to ask:
        • What are some benign signs of this incident?
        • Is there something we could have monitored that would have alerted us to this issue before an incident occurred?
        • Should anyone have noticed this problem? Who? Why? How?
        • Go through this for each of the problems identified and discuss thresholds. When complete, include the information in the Event Management Catalog.

      Public Website Example

      Dependency Metrics Threshold
      Network Performance Latency 150ms
      Packet Loss 10%
      Jitter >1ms
      Web Server Response Time 750ms
      Performance
      Connection Stage Errors 2
      Web Page Performance DOM Load time 1100ms
      Page Load time 1200ms

      Download the Event Management Cookbook

      Step 2.3

      Action Your Events

      Activities

      2.3.1 Set actions for your thresholds

      2.3.2 Build your event management workflow

      Define Your Monitoring Thresholds and Associated Actions

      This step will walk you through the following activities:

      With your list of tracked events from the previous step, build associated actions and define the handoff from event management to related practices.

      This step involves the following participants:

      Event management team

      Infrastructure team

      Change manager

      Problem manager

      Incident manager

      Outcomes of this step

      Event management workflow

      Set actions for your thresholds

      For each of your thresholds, you will need an action tied to the event.

      • Review the event alert types:
        • Informational
        • Warning
        • Exception
      • Your detected events will require one of the following actions if detected.
      • Unactioned events will lead to a poor signal-to-noise ratio of data, which ultimately leads to confusion in the detection of the event and decreased response effectiveness.

      Event Logged

      For informational alerts, log the event for future analysis.

      Automated Resolution

      For a warning or exception event or a set of events with a well-known root cause, you may have an automated resolution tied to detection.

      Human Intervention

      For warnings and exceptions, human intervention may be needed. This could include manual monitoring or a handoff to incident, change, or problem management.

      2.3.1 Set actions for your thresholds

      Alerts generated by event management are useful for many different ITSM practitioners.

      1. With the chosen thresholds at hand, analyze the alerts and determine if they require immediate action or if they can be logged for later analysis.
      2. Questions to ask:
        1. What kind of response does this event warrant?
        2. How could we improve our event management process?
        3. What event alerts would have helped us with root-cause analysis in the past?
      3. Record the results in the Event Management Catalog.

      Public Website Example

      Outcome Metrics Threshold Response (s)
      Network Performance Latency 150ms Problem Management Tag to Problem Ticket 1701
      Web Page Performance DOM Load time 1100ms Change Management

      Download the Event Management Catalog

      Input

      • List of events generated by event management

      Output

      • Action plan for various events as they occur

      Materials

      • Whiteboard/flip charts
      • Pens
      • Paper

      Participants

      • Event Management Team
      • Infrastructure Team
      • Change Manager
      • Problem Manager
      • Incident Manager

      2.3.2 Build your event management workflow

      1. As a group, discuss your high-level monitoring, alerting, and actioning processes.
      2. Define handoff processes to incident, problem, and change management. If necessary, open your incident, problem, and change workflows and discuss how the event can further pass onto those practices. Discuss the examples below:
        • Incident Management: Who is responsible for opening the incident ticket? Can the incident ticket be automated and templated?
        • Change Management: Who is responsible for opening an RFC? Who will approve the RFC? Can it be a pre-approved change?
        • Problem Management : Who is responsible for opening the problem ticket? How can the event data be useful in the problem management process?
      3. Use and modify the example workflow as needed by downloading the Event Management Workflow.

      Example Workflow:

      This is an image of an example Event Management Workflow

      Download the Event Management Workflow

      Common datapoints to capture for each event

      Data captured will help related service management practices in different ways. Consider what you will need to record for each event.

      • Think of the practice you will be handing the event to. For example, if you’re handing the event off to incident or problem management, data captured will have to help in root-cause analysis to find and execute the right solution. If you’re passing the event off to change management, you may need information to capture the rationale of the change.
      • Knowing the driver for the data can help you define the right data captured for every event.
      • Consider the data points below for your events:

      Data Fields

      Device

      Date/time

      Component

      Parameters in exception

      Type of failure

      Value

      Download the Event Management Catalog

      Start Monitoring and Implement Event Management

      Phase 1Phase 2Phase 3

      1.1 Set Operational and Informational Goals
      1.2 Scope Monitoring and Event Management Using Business Impact

      2.1 Define Conditions and Related CIs
      2.2 Set Monitoring Thresholds and Alerts
      2.3 Action Your Events

      3.1 Define Your Data Policy
      3.2 Set Your Future of Event Monitoring

      Engineer Your Event Management Process

      This phase will walk you through the following activities:

      3.1.1 Define data policy needs

      3.2.1 Build your roadmap

      This phase involves the following participants:

      Business system owners

      Infrastructure manager

      IT managers

      Step 3.1

      Define Your Data Policy

      Activities

      3.1.1 Define data policy needs

      Start Monitoring and Implement Event Management

      This step will walk you through the following activities:

      Your overall goals from Phase 1 will help define your data retention needs. Document these policy statements in a data policy.

      This step involves the following participants:

      CIO

      Infrastructure manager

      IT managers

      Service desk manager

      Outcomes of this step

      Data retention policy statements for event management

      Know the difference between logs and metrics

      Logs

      Metrics

      A log is a complete record of events from a period:

      • Structured
      • Binary
      • Plaintext
      Missing entries in logs can be just as telling as the values existing in other entries. A metric is a numeric value that gives information about a system, generally over a time series. Adjusting the time series allows different views of the data.

      Logs are generally internal constructs to a system:

      • Applications
      • DB replications
      • Firewalls
      • SaaS services

      Completeness and context make logs excellent for:

      • Auditing
      • Analytics
      • Real-time and outlier analysis
      As a time series, metrics operate predictably and consistently regardless of system activity.

      This independence makes them ideal for:

      • Alerts
      • Dashboards
      • Profiling

      Large amounts of log data can make it difficult to:

      • Store
      • Transmit
      • Sift
      • Sort

      Context insensitivity means we can apply the same metric to dissimilar systems:

      • This is especially important for blackbox systems not fully under local control.

      Understand your data requirements

      Amount of event data logged by a 1000 user enterprise averages 113GB/day

      Source: SolarWinds

      Security Logs may contain sensitive information. Best practice is to ensure logs are secure at rest and in transit. Tailor your security protocol to your compliance regulations (PCI, etc.).
      Architecture and Availability When production infrastructure goes down, logging tends to go down as well. Holes in your data stream make it much more difficult to determine root causes of incidents. An independent secondary architecture helps solve problems when your primary is offline. At the very least, system agents should be able to buffer data until the pipeline is back online.
      Performance Log data grows: organically with the rest of the enterprise and geometrically in the event of a major incident. Your infrastructure design needs to support peak loads to prevent it from being overwhelmed when you need it the most.
      Access Control Events have value for multiple process owners in your enterprise. You need to enable access but also ensure data consistency as each group performs their own analysis on the data.
      Retention Near-real time data is valuable operationally; historic data is valuable strategically. Find a balance between the two, keeping in mind your obligations under compliance frameworks (GDPR, etc.).

      3.1.1 Set your data policy for every event

      1. Given your event list in the Event Management Catalog, include the following information for each event:
        • Retention Period
        • Data Sensitivity
        • Data Rate
      2. Record the results in the Event Management Catalog.

      Public Website Example

      Metrics/Log Retention Period Data Sensitivity Data Rate
      Latency 150ms No
      Packet Loss 10% No
      Jitter >1ms No
      Response Time 750ms No
      HAProxy Log 7 days Yes 3GB/day
      DOM Load time 1100ms
      Page Load time 1200ms
      User Access 3 years Yes

      Download the Event Management Catalog

      Input

      • List of events generated by event management
      • List of compliance standards your organization adheres to

      Output

      • Data policy for every event monitored and actioned

      Materials

      • Whiteboard/flip charts
      • Pens
      • Paper

      Participants

      • Event management team
      • Infrastructure team

      Step 3.2

      Set Your Future of Event Monitoring

      Activities

      3.2.1 Build your roadmap

      Start Monitoring and Implement Event Management

      This step will walk you through the following activities:

      Event management maturity is slowly built over time. Define your future actions in a roadmap to stay on track.

      This step involves the following participants:

      CIO

      Infrastructure manager

      IT managers

      Outcomes of this step

      Event management roadmap and action items

      Practice makes perfect

      For every event that generates an alert, you want to judge the predictive power of said event.

      Engineer your event management practice to be predictive. For example:

      • Up/Down Alert – Expected Consequence: Service desk will start working on the incident ticket before a user reports that said system has gone down.
      • SysVol Capacity Alert – Expected Consequence: Change will be made to free up space on the volume prior to the system crashing.

      If the expected consequence is not observed there are three places to look:

      1. Was the alert received by the right person?
      2. Was the alert received in enough time to do something?
      3. Did the event triggering the alert have a causative relationship with the consequence?

      While impractical to look at every action resulting from an alert, a regular review process will help improve your process. Effective alerts are crafted with specific and measurable outcomes.

      Info-Tech Insight

      False positives are worse than missed positives as they undermine confidence in the entire process from stakeholders and operators. If you need a starting point, action your false positives first.

      Mind Your Event Management Errors

      Two Donut charts are depicted. The first has a slice which is labeled 7% False Positive. The Second has a slice which is labeled 33% False Negative.

      Source: IEEE Communications Magazine March 2012

      Follow the Cookbook for every event you start tracking

      Consider building event management into new, onboarded systems as well.

      You now have several core systems, their CIs, conditions, and their related events listed in the Event Catalog. Keep the Catalog as your single reference point to help manage your tracked events across multiple tools.

      The Event Management Cookbook is designed to be used over and over. Keep your tracked events standard by running through the steps in the Cookbook.

      An additional step you could take is to pull the Cookbook out for event tracking for each new system added to your IT environment. Adding events in the Catalog during application onboarding is a good way to manage and measure configuration.

      Event Management Cookbook

      This is a screenshot of the Event Management Cookbook

      Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.

      3.2.1 Build an event management roadmap

      Increase your event management maturity over time by documenting your goals.

      Add the following in-scope goals for future improvement. Include owner, timeline, progress, and priority.

      • Add additional systems/applications/services to event management
      • Expand condition lists for given systems
      • Consolidate tracking tools for easier data analysis and actioning
      • Integrate event management with additional service management practices

      This image contains a screenshot of a sample Event Management Roadmap

      Summary of Accomplishment

      Problem Solved

      You now have a structured event management process with a start on a properly tracked and actioned event catalog. This will help you detect incidents before they become incidents, changes needed to the IT environment, and problems before they spread.

      Continue to use the Event Management Cookbook to add new monitored events to your Event Catalog. This ensures future events will be held to the same or better standard, which allows you to avoid drowning in too much data.

      Lastly, stay on track and continually mature your event management practice using your Event Management Roadmap.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      This is an example of a RACI Chart for Event Management

      Build a RACI Chart for Event Management

      Define and document the roles and responsibilities in event management.

      This is an example of a business impact chart

      Set Your Scope Using Business Impact

      Define and prioritize in-scope systems and services for event management.

      Related Info-Tech Research

      Standardize the Service Desk

      Improve customer service by driving consistency in your support approach and meeting SLAs.

      Improve Incident and Problem Management

      Don’t let persistent problems govern your department

      Harness Configuration Management Superpowers

      Build a service configuration management practice around the IT services that are most important to the organization.

      Select Bibliography

      DeMattia, Adam. “Assessing the Financial Impact of HPE InfoSight Predictive Analytics.” ESG, Softchoice, Sept. 2017. Web.

      Hale, Brad. “Estimating Log Generation for Security Information Event and Log Management.” SolarWinds, n.d. Web.

      Ho, Cheng-Yuan, et al. “Statistical Analysis of False Positives and False Negatives from Real Traffic with Intrusion Detection/Prevention Systems.” IEEE Communications Magazine, vol. 50, no. 3, 2012, pp. 146-154.

      ITIL Foundation ITIL 4 Edition = ITIL 4. The Stationery Office, 2019.

      McGillicuddy, Shamus. “EMA: Network Management Megatrends 2016.” Riverbed, April 2016. Web.

      McGillicuddy, Shamus. “Network Management Megatrends 2020.” Enterprise Management Associates, APCON, 2020. Web.

      Rivas, Genesis. “Event Management: Everything You Need to Know about This ITIL Process.” GB Advisors, 22 Feb. 2021. Web.

      “Service Operations Processes.” ITIL Version 3 Chapters, 21 May 2010. Web.

      Cybersecurity in Healthcare 2024

      Healthcare cybersecurity is a major concern for healthcare organizations and patients alike. In 2024, the healthcare industry faces several cybersecurity challenges, including the growing threat of ransomware, the increasing use of mobile devices in healthcare, and the need to comply with new regulations.

      Continue reading

      The Accessibility Business Case for IT

      • Buy Link or Shortcode: {j2store}519|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Lead
      • Parent Category Link: /lead
      • Laws requiring digital accessibility are changing and differ by location.
      • You need to make sure your digital assets, products, and services (internal and external) are accessible to everyone, but getting buy-in is difficult.
      • You may not know where your gaps in understanding are because conventional thinking is driven by compliance and risk mitigation.

      Our Advice

      Critical Insight

      • The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation.
      • Implementing accessibility feels counterintuitive to IT departments. IT always wants to optimize and move forward, but with accessibility you may stay at one level for what feels like an uncomfortably long period. Don’t worry; building consistency and shifting culture takes time.
      • Accessibility goes beyond compliance, which should be an outcome, not the objective. With 1 billion people worldwide with some form of disability, nearly everyone likely has a connection to disability, whether it be in themselves, family, or colleagues. The market of people with disabilities has a spending power of more than $6 trillion (WAI, 2018).

      Impact and Result

      • Take away the overwhelm that many feel when they hear “accessibility” and make the steps for your organization approachable.
      • Clearly communicate why accessibility is critical and how it supports the organization’s key objectives and initiatives.
      • Understand your current state related to accessibility and identify areas for key initiatives to become part of the IT strategic roadmap.

      The Accessibility Business Case for IT Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. The Accessibility Business Case for IT – Clearly communicate why accessibility is critical and how it supports the organization’s key objectives and initiatives.

      A step-by-step approach to walk you through understanding your current state related to accessibility maturity, identifying your desired future state, and building your business case to seek buy-in. This storyboard will help you figure out what’s right for your organization and build the accessibility business case for IT.

      • The Accessibility Business Case for IT – Phases 1-3

      2. Accessibility Business Case Template – A clear, concise, and compelling business case template to communicate the criticality of accessibility.

      The business case for accessibility is strong. Use this template to communicate to senior leaders the benefits, challenges, and risks of inaction.

      • Accessibility Business Case Template

      3. Accessibility Maturity Assessment – A structured tool to help you identify your current accessibility maturity level and identify opportunities to ensure progress.

      This tool uses a capability maturity model framework to evaluate your current state of accessibility. Maturity level is assessed on three interconnected aspects (people, process, and technology) across six dimensions proven to impact accessibility. Complete the assessment to get recommendations based on where you’re at.

      • Accessibility Maturity Assessment

      Infographic

      Further reading

      The Accessibility Business Case for IT

      Accessibility goes beyond compliance

      Analyst Perspective

      Avoid tech debt related to accessibility barriers

      Accessibility is important for individuals, businesses, and society. Diverse populations need diverse access, and it’s essential to provide access and opportunity to everyone, including people with diverse abilities. In fact, access to information and communications technologies (ICT) is a basic human right according to the United Nations.

      The benefits of ICT accessibility go beyond compliance. Many innovations that we use in everyday life, such as voice activation, began as accessibility initiatives and ended up creating a better lived experience for everyone. Accessibility can improve user experience and satisfaction, and it can enhance your brand, drive innovation, and extend your market reach (WAI, 2022).

      Although your organization might be required by law to ensure accessibility, understanding your users’ needs and incorporating them into your processes early will determine success beyond just compliance.

      Heather Leier-Murray, Senior Research Analyst, People and Leadership

      Heather Leier-Murray
      Senior Research Analyst, People and Leadership
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      Global IT and business leaders are challenged to make digital products and services accessible because inaccessibility comes with increasing risk to brand reputation, legal ramifications, and constrained market reach.

      • Laws requiring digital accessibility are changing and differ by location.
      • You need to make sure your digital assets, products, and services (internal and external) are accessible to everyone.
      • The cost of inaction is rising.

      Understanding where to start, where accessibility lives, and if or when you’re done can be overwhelmingly difficult.

      • Executive leadership buy-in is difficult to get.
      • Conventional thinking is driven by compliance and risk mitigation.
      • You don’t know where your gaps in understanding are.

      Conventional approaches to accessibility often fail because users are expected to do the hard work. You have to be doing 80% of the hard work.1

      Use Info-Tech’s research and resources to do what’s right for your organization. This framework takes away the overwhelm that many feel when they hear “accessibility” and makes the steps for your organization approachable.

      • Clearly communicate why accessibility is critical and how it supports the organization’s key objectives and initiatives.
      • Understand your current state related to accessibility and identify areas for key initiatives to become part of the IT strategic roadmap.

      1. Harvard Business Review, 2021

      Info-Tech Insight
      The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation.

      Your challenge

      This research is designed to help organizations who are looking to:

      • Build a business case for accessibility.
      • Ensure that digital assets, products, and services are accessible to everyone, internally and externally.
      • Support staff and build skills to support the organization with accessibility and accommodation.
      • Get assistance figuring out where to start on the road to accessibility compliance and beyond.

      The cost of inaction related to accessibility is rising. Preparing for accessibility earlier helps prevent tech debt; the longer you wait to address your accessibility obligations, the more costly it gets.

      More than 3,500 digital accessibility lawsuits were filed in the US in 2020, up more than 50% from 2018.

      Source: UsableNet. Inc.

      Common obstacles

      These barriers make accessibility difficult to address for many organizations:

      • You don’t know where your gaps in understanding are. Recognizing the importance of accessibility and how it fits into the bigger picture is key to developing buy-in.
      • Too often organizations focus on mitigating risk by being compliance driven. Shifting focus to the user experience, internally and externally, will realize better results.
      • Conventional approaches to accessibility often fail because the expectation is for users to do the hard work. One in five people have a permanent disability, but it’s likely everyone will be faced with some sort of disability at some point in their lives.1 Your organization has to be doing at least 80% of the hard work.2
      • Other types of compliance reside clearly with one area of the organization. Accessibility, however, has many homes: IT, user experience (UX), customer experience (CX), and even HR.

      1. Smashing Magazine

      2. Harvard Business Review, 2021

      90% of companies claim to prioritize diversity.

      Source: Harvard Business Review, 2020

      Only 4% of those that claim to prioritize diversity consider disability in those initiatives.

      Source: Harvard Business Review, 2020

      The four principles of accessibility

      WCAG (Web Content Accessibility Guidelines) identifies four principles of accessibility. WCAG is the most referenced standard in website accessibility lawsuits.

      The four principles of accessibility

      Source: eSSENTIAL Accessibility, 2022

      Why organizations address accessibility

      Top three reasons:

      61% 62% 78%
      To comply with laws To provide the best UX To include people with disabilities

      Source: Level Access

      Still, most businesses aren’t meeting compliance standards. Even though legislation has been in place for over 30 years, a 2022 study by WebAIM of 1,000,000 homepages returned a 96.8% WCAG 2.0 failure rate.

      Source: Institute for Disability Research, Policy, and Practice

      How organizations prioritize digital accessibility

      43% rated it as a top priority.

      36% rated it as important.

      Fewer than 5% rated as either low priority or not even on the radar.

      More than 65% agreed or strongly agreed it’s a higher priority than last year.

      Source: Angel Business Communications

      Organizations expect consumers to do more online

      The pandemic led to many businesses going digital and more people doing things online.

      Chart of activities performed more often compared to before COVID-19

      Chart of activities performed for the first time during COVID-19

      Source: Statistics Canada

      Disability is part of being human

      Merriam-Webster defines disability as a “physical, mental, cognitive, or developmental condition that impairs, interferes with, or limits a person’s ability to engage in certain tasks or actions or participate in typical daily activities and interactions.”1

      The World Health Organization (WHO) points out that a crucial part of the definition of disability is that it’s not just a health problem, but the environment impacts the experience and extent of disability. Inaccessibility creates barriers for full participation in society.2

      The likelihood of you experiencing a disability at some point in your life is very high, whether a physical or mental disability, seen or unseen, temporary or permanent, severe or mild.2

      Many people acquire disabilities as they age yet may not identify as “a person with a disability.”3 Where life expectancies are over 70 years of age, 11.5% of life is spent living with a disability. 4

      “Extreme personalization is becoming the primary difference in business success, and everyone wants to be a stakeholder in a company that provides processes, products, and services to employees and customers with equitable, person-centered experiences and allows for full participation where no one is left out.”
      – Paudie Healy, CEO, Universal Access

      1. Merriam-Webster
      2. World Health Organization
      3. Digital Leaders, as cited in WAI, 2018
      4. Disabled World, as cited in WAI, 2018

      Untapped talent resource

      Common myths about people with disabilities:

      • They can’t work.
      • They need more time off or are absent more often.
      • Only basic, unskilled work is appropriate for them.
      • Their productivity is lower than that of coworkers.
      • They cost more to recruit, train, and employ.
      • They decrease others’ productivity.
      • They’re not eligible for governmental financial incentives (e.g. apprentices).
      • They don’t fit in.

      These assumptions prevent organizations from hiring valuable people into the workforce and retaining them.

      Source: Forbes

      50% to 70% of people with disabilities are unemployed in industrialized countries. In the US alone, 61 million adults have a disability.

      Source: United Nations, as cited in Forbes

      Thought Model

      Info-Tech’s methodology for the accessibility business case for IT

      1. Understand Current State 2. Plan for Buy-in 3. Prepare Your Business Case
      Phase Steps
      1. Understand standards and legislation
      2. Build awareness
      3. Understand current accessibility maturity level Define desired future state
      1. Define desired future state
      2. Define goals and objectives
      3. Document roles and responsibilities
      1. Customize and populate the Accessibility Business Case Template and gain approval
      2. Validate post-approval steps and establish timelines
      Phase Outcomes
      • Accessibility maturity assessment
      • Accessibility drivers determined
      • Goals defined
      • Objectives identified
      • Roles and responsibilities documented
      • Business case drafted
      • Approval to move forward with implementing your accessibility program
      • Next steps and timelines

      Insight Summary

      Insight 1 The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation.
      Insight 2 Implementing accessibility feels counterintuitive to IT departments. IT always wants to optimize and move forward, but with accessibility you may stay at one level for what feels like an uncomfortably long period. Don’t worry; building consistency and shifting culture takes time.
      Insight 3 Accessibility goes beyond compliance, which should be an outcome, not the objective. With 1 billion people worldwide with some form of disability, nearly everyone likely has a connection to disability, whether it be in themselves, family, or colleagues. The market of people with disabilities has a spending power of more than $6 trillion.1

      1. WAI, 2018

      Blueprint deliverables

      This blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Accessibility Business Case Template

      The business case for accessibility is strong. Use this template to communicate to senior leaders the benefits and challenges of accessibility and the risks of inaction.

      Accessibility Maturity Assessment

      Use this assessment to understand your current accessibility maturity.

      Blueprint benefits

      Business Benefits IT Benefits
      • Don’t lose out on a 6-trillion-dollar market.
      • Don’t miss opportunities to work with organizations because you’re not accessible.
      • Enable and empower current employees with disabilities.
      • Minimize potential for negative brand reputation due to a lack of consideration for people with disabilities.
      • Decrease the risk of legal action being brought upon the organization.
      • Understand accessibility and know your role in it for your organization and your team members.
      • Be prepared and able to provide the user experience you want.
      • Decrease tech debt – start early to ensure accessibility for everyone.
      • Access an untapped labor market.
      • Mitigate IT retention challenges.

      Measure the value of this blueprint

      Improve stakeholder satisfaction and engagement

      • Tracking measures to understand the value of this blueprint is a critical part of the process.
      • Monitor employee engagement, overall stakeholder satisfaction with IT, and the overall end-customer satisfaction.
      • Remember, accessibility is not a one-and-done project – just because measures are positive does not mean your work is done.

      In phase 2 of this blueprint, we will help you establish current-state and target-state metrics for your organization.

      Suggested Metrics
      Overall end-customer satisfaction
      Monies saved through cost optimization efforts
      Employee engagement
      Monies save through application rationalization and standardization

      For more metrics ideas, see the Info-Tech IT Metrics Library.

      Executive Brief Case Study

      INDUSTRY
      Technology

      SOURCE
      W3C Web Accessibility Initiative (WAI), 2018

      Google

      Investing in accessibility
      With an innovative edge, Google invests in accessibility with the objective of making life easier for everyone. Google has created a broad array of accessibility innovations in its products and services so that people with disabilities get as much out of them as anyone else.

      Part of Google’s core mission, accessibility means more to Google than implementing fixes. It is viewed positively by the organization and drives it to be more innovative to make information available to everyone. Google approaches accessibility problems not as barriers but as ways to innovate and discover breakthroughs that will become mainstream in the future.

      Results
      Among Google’s innovations are contrast minimums, auto-complete, voice-control, AI advances, and machine learning auto-captioning. All of these were created for accessibility purposes but have positively impacted the user experience in general for Google.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 4 to 6 calls over the course of 2 to 4 months.

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Discuss motivation for the initiative and foundational knowledge requirements.

      Call #2: Discuss next steps to assess current accessibility maturity.

      Call #3: Discuss stakeholder engagement and future-state analysis.

      Call #4: Discuss defining goals and objectives, along with roles and responsibilities.

      Call #5: Review draft business case presentation.

      Call #6: Discuss post-approval steps and timelines.

      Phase 1

      Understand Your Current State

      Phase 1
      1.1 Understand standards and legislation
      1.2 Build awareness
      1.3 Understand maturity level

      Phase 2
      2.1 Define desired future state
      2.2 Define goals and objectives
      2.3 Document roles and responsibilities

      Phase 3
      3.1 Prepare business case template for presentation and approval
      3.2 Validate post-approval steps and establish timelines

      The Accessibility Business Case for IT

      This phase will walk you through the following activities:

      • Identifying and understanding accessibility and compliance requirements and the ramifications of noncompliance.
      • Defining accessibility, disability, and disability inclusion and building awareness of these with senior leaders.
      • Completing the Accessibility Maturity Assessment to help you understand your current state.

      Step 1.1

      Understand standards and legislation

      Activities

      1.1.1 Make a list of the legislation you need to comply with

      1.1.2 Seek legal and/or professional services’ input on compliance

      1.1.3 Detail the risks of inaction for your organization

      Understand Your Current State

      Outcomes of this step
      You will gain foundational understanding of the breadth of the regulation requirements for your organization. You will have reviewed and understand what is applicable to your organization.

      The regulatory landscape is evolving

      Canada

      • Canadian Human Rights Act
      • Policy on Communications and Federal Identity
      • Canadian Charter of Rights and Freedoms
      • Accessibility for Ontarians with Disabilities Act
      • Accessible Canada Act of 2019 (ACA)

      Europe

      • UK Equality Act 2010
      • EU Web and Mobile Accessibility Directive (2016)
      • EN 301 549 European Standard – Accessibility requirements for public procurement of ICT products and services

      United States

      • Section 508 of the US Rehabilitation Act of 1973
      • Americans with Disabilities Act of 1990 (ADA)
      • Section 255 of the Telecommunications Act of 1996
      • Air Carrier Access Act of 1986
      • 21st Century Communications and Video Accessibility Act of 2010 (CVAA)

      New Zealand

      • Human Rights Act 1993
      • Online Practice Guidelines for Government

      Australia

      • Disability Discrimination Act 1992 (DDA)

      Regulatory systems are moving toward an international standard.

      1.1.1 Make a list of the legislation you need to comply with

      1. Download the Accessibility Business Case Template.
      2. Conduct research and investigate what legislation and standards are applicable to your organization.
      3. a) Start by looking at your local legislation.
        b) Then consider any other regions you conduct business in.
        c) Also account for the various industries you are in.
      4. While researching, build a list of legislation requirements. Document these in your Accessibility Business Case Template as part of the Project Context section.
      Input Output
      • Research
      • Websites
      • Articles
      • List of legislation that applies to the organization related to accessibility
      Materials Participants
      • Accessibility Business Case Template
      • Project leader/initiator

      Download the Accessibility Business Case Template

      1.1.2 Seek professional advice on compliance

      1. Have general counsel review your list of regulations and standards related to accessibility or seek legal and/or professional support to review your list.
      2. Review or research further the implications of any suggestions from legal counsel.
      3. Make any updates to the Legal Landscape slide in the Accessibility Business Case Template.
      Input Output
      • Compiled list of applicable legislation and standards
      • Confirmed list of regulations that are applicable to your organization related to accessibility
      Materials Participants
      • Accessibility Business Case Template
      • Project leader/initiator
      • General counsel/professional services

      Download the Accessibility Business Case Template

      Ramifications of noncompliance

      Go beyond financial consequences

      Beyond the costs resulting from a claim, noncompliance can damage your organization in several ways.

      Financial Impact

      ADA Warning Shot: A complaint often indicates pending legal action to come. Addressing issues on a reactive, ad hoc basis can be quite expensive. It can cost almost $10,000 to address a single complaint, and chances are if you have one complaint, you have many.

      Lawsuit Costs: In the US, 265,000 demand letters were sent in 2020 under the ADA for inaccessible websites. On average, a demand letter could cost the company $25,000 (conservatively). These are low-end numbers; another estimate is that a small, quickly settled digital accessibility lawsuit could cost upwards of $350,000 for the defendant.

      Non-Financial Impact

      Reputational Impact: Claims brought upon a company can bring negative publicity with them. In contrast, having a clear commitment to accessibility demonstrates inclusion and can enhance brand image and reputation. Stakeholder expectations are changing, and consumers, investors, and employees alike want to support businesses with a purpose.

      Technology Resource Strains: Costly workarounds and ad hoc accommodation processes take away from efficiency and effectiveness. Updates and redesigns for accessibility and best practices will reduce costs associated with maintenance and service, including overall stakeholder satisfaction improvements.

      Access to Talent: 2022 saw a record high number of job openings, over 11.4 million in the US alone. Ongoing labor shortages require eliminating bias and keeping an open mind about who is qualified.

      Source: May Hopewell

      In the last four years, 83% of the retail 500 have been sued. Since 2018, 417 of the top 500 have received ADA-based digital lawsuits.

      Source: UsableNet

      1.1.3 Detail the risks of inaction for your organization

      1. Using the information that you’ve gathered through your research and legal/professional advice, detail the risks of inaction for your organization.
      2. a) Consider legal risks, consumer risks, brand risks, and employee risks. (Remember, risks aren’t just monetary.)
      3. Document the risks in your Accessibility Business Case Template.
      InputOutput
      • List of applicable legislation and standards
      • Information about risks
      • Identified accessibility maturity level
      MaterialsParticipants
      • Accessibility Business Case Template
      • Project leader/initiator

      Download the Accessibility Business Case Template

      Step 1.2

      Build awareness of accessibility and disability inclusion

      Activities

      1.2.1 Identify gaps in understanding

      1.2.2 Brainstorm how to reframe accessibility positively

      Understand Your Current State

      Outcomes of this step
      You’ll have a better understanding of accessibility so that you can effectively implement and promote it.

      Where to look for understanding

      First-hand experience of how people with disabilities interact with your organization is often eye-opening. It will help you understand the benefits and value of accessibility.

      Where to look for understanding

      • Talk with people you know with disabilities that are willing to share.*
      • Find role-specific training that’s appropriate.
      • Research. Articles and videos are easy to find.
      • Set up assistive technology trials.
      • Seek out first-hand experience from people with disabilities and how they work and use digital assets.

      Source: WAI, 2016

      * Remember, people with disabilities aren't obligated to discuss or explain their disabilities and may not be comfortable sharing. If you're asking for their time, be respectful, only ask if appropriate, and accept a "no" answer if the person doesn't wish to assist.

      1.2.1 Identify gaps in understanding

      Find out what accessibility is and why it is important. Learn the basics.

      1. Using the information that you’ve gathered through your research and legal counsel, conduct further research to understand the importance of accessibility.
      2. Answer these questions:
      3. a) What is accessibility? Why is it important?
        b) From the legislation and standards identified in step 1.1, what gaps exist?
        c) What is the definition of disability?
        d) How does your organization currently address accessibility?
        e) What are your risks?
        f) Do you have any current employees who have disabilities?
      4. Review the previous slide for suggestions on where to find more information to answer the above questions.
      5. Document any changes to the risks in your Accessibility Business Case Template.
      InputOutput
      • Articles
      • Interviews
      • Websites
      • Greater understanding of the lived experience of people with disabilities
      MaterialsParticipants
      • Articles
      • Websites
      • Accessibility Business Case Template
      • Project leader/initiator

      Download the Accessibility Business Case Template

      Reframe accessibility as a benefit, not a burden

      A clear understanding of accessibility and the related standards and regulations can turn accessibility from something big and scary to an achievable part of the business.

      The benefits of accessibility are:

      Market Reach Minimized Legal Risks Innovation Retention
      Over 1 billion people with a spending power of $6 trillion make up the global market of people with disabilities.1 Accessibility improves the experience for all users. In addition, many organizations require you to provide proof you meet accessibility standards during the RFP process. Accessibility regulations are changing, and claims are rising. Costs associated with legal proceedings can be more than just financial. Many countries have laws you need to follow. People with disabilities bring diversity of thought, have different lived experiences, and benefit inclusivity, which helps drive engagement. Plus accessibility features often solve unanticipated problems. Employing and supporting people with disabilities can reduce turnover and improve retention, reliability, company image, employee loyalty, ability awareness, and more.

      Source 1: WAI, 2018

      1.2.2 Brainstorm ways to reframe accessibility positively

      1. Using the information that you’ve gathered through your research, brainstorm additional positives of accessibility for your organization.
      2. Clearly identify the problem you want to solve (e.g., reframing accessibility positively in your organization).
      3. Collect any tools you want to use to during brainstorming (e.g., whiteboard, markers, sticky notes)
      4. Write down all the ideas that come to mind.
      5. Review all the points and group them into themes.
      6. Update the Accessibility Business Case Template with your findings.
      InputOutput
      • Research you have gathered
      • List of ways to positively reframe accessibility for your organization
      MaterialsParticipants
      • Sticky notes, whiteboard, pens, paper, markers.
      • Accessibility Business Case Template
      • Project leader/initiator

      Download the Accessibility Business Case Template

      Make it part of the conversation

      A first step to disability and accessibility awareness is to talk about it. When it is talked about as freely as other things are in the workplace, this can create a more welcoming workplace.

      Accessibility goes beyond physical access and includes technological access and support as well as our attitudes.

      Accessibility is making sure everyone (disabled or abled) can access the workplace equally.

      Adjustments in the workplace are necessary to create an accessible and welcoming environment. Understanding the three dimensions of accessibility in the workplace is a good place to start.

      Source: May Hopewell

      Three dimensions of accessibility in the workplace

      Three dimensions of accessibility in the workplace

      Case Study

      INDUSTRY
      Professional Services

      SOURCE
      Accenture

      Accenture takes an inclusive approach to increase accessibility.

      Accessibility is more than tools

      Employee experience was the focus of embarking on the accessibility journey, ensuring inclusivity was built in and every employee was able to use the tools they needed and could achieve their goals.

      "We are removing barriers in technology to make all of our employees, regardless of their ability, more productive.”
      — Melissa Summers, Managing Director – Global IT, Corporate Technology, Accenture

      Accessibility is inclusive

      The journey began with formalizing a Global IT Accessibility practice and defining an accessibility program charter. This provided direction and underpinned the strategy used to create a virtual Accessibility Center of Excellence and map out a multiyear plan of initiatives.

      The team then identified all the technologies they wanted to enhance by prioritizing ones that were high use and high impact. Involving disability champions gave insight into focus areas.

      Accessibility is innovation

      Working with partners like Microsoft and over 100 employees, Accenture continues toward the goal of 75% accessibility for all its global high-traffic internal platforms.

      Achievements thus far include:

      • 100% of new Accenture video and broadcast content is automatically captioned.
      • Accenture received a perfect Disability Equality Index (US) score of 100 out of 100 for 2017, 2018, and 2019.

      Step 1.3

      Understand your current accessibility maturity level

      Activities

      1.3.1 Complete the Accessibility Maturity Assessment

      Understand Your Current State

      Outcomes of this step
      Completed Accessibility Maturity Assessment to inform planning for and building your business case in Phases 2 and 3.

      Know where you are to know where to go

      Consider accessibility improvements from three interconnected aspects to determine current maturity level

      Accessibility Maturity

      People

      • Consider employee, customer, and user experience.

      Process

      • Review processes to ensure accessibility is considered early.

      Technology

      • Whether it’s new or existing, technology is an important tool to increase accessibility.

      Accessibility maturity levels

      INITIAL DEVELOPING DEFINED MANAGED OPTIMIZE
      At this level, accessibility processes are mostly undocumented, if they exist. Accessibility is most likely happening on a reactive, ad hoc basis. No one understands who is responsible for accessibility or what their role is. At this stage the organization is driven by the need for compliance. At the developing level, the organization is taking steps to increase accessibility but still has a lot of opportunity for improvements. The organization is defining and refining processes and is working toward building a library of assistive tools. At this level, processes related to accessibility are repeatable. However, there’s a tendency to resort to old habits under stress. The organization has tools in place to facilitate accommodation requests and technology is compatible with assistive technologies. Accessibility initiatives are driven by the desire to make the user experience better. The managed level is defined by its effective accessibility controls, processes, and metrics. The organization can mostly anticipate preferences of customers, employees, and users. The roles and responsibilities are defined, and disability is included as part of the organization’s diversity, equity, and inclusion (DEI) initiatives. This level is not the goal for all organizations. At this level there is a shift in the organization’s culture to a feeling of belonging. The organization also demonstrates ongoing process improvements. Everyone can experience a seamless interaction with the organization. The focus is on continuous improvement and using feedback to inform future initiatives.

      Determine your level of maturity

      Use Info-Tech’s Accessibility Maturity Assessment

      • On the accessibility questionnaire, tab 2, choose how much the statements apply to your organization. Answer the questions based on your knowledge of your current state organizationally.
      • Once you’ve answered all the questions, see the results on the tab 3, Accessibility Results. You can see your overall maturity level and the maturity level for each of six dimensions that are necessary to increase the success of an accessibility program.
      • Click through to tab 4, Recommendations, to see specific recommendations based on your results and proven research to progress through the maturity levels. Keep in mind that not all organizations will or should aspire to the “Optimize” maturity level.

      1.3.1 Complete the Accessibility Maturity Assessment

      1. Download the Accessibility Maturity Assessment and save it with the date so that as you work on your accessibility program, you can reassess later and track your progress.
      2. Once you have saved the assessment, select the appropriate answer for each statement on tab 2, Accessibility Questions, based on your knowledge of the organization’s approach.
      3. After reviewing all the accessibility statements, see your maturity level results on tab 3, Accessibility Results. Then see tab 4, Recommendations, for suggestions based on your answers.
      4. Document your accessibility maturity results in your Accessibility Business Case Template.
      Input Output
      • Assess your current state of accessibility by choosing all the statements that apply to your organization
      • Identified accessibility maturity level
      Materials Participants
      • Accessibility Maturity Assessment
      • Accessibility Business Case Template
      • Project leader/sponsor
      • IT leadership team

      Download the Accessibility Business Case Template

      Phase 2

      Plan for Senior Leader Buy-In

      Phase 1
      1.1 Understand standards and legislation
      1.2 Build awareness
      1.3 Understand maturity level

      Phase 2
      2.1 Define desired future state
      2.2 Define goals and objectives
      2.3 Document roles and responsibilities

      Phase 3
      3.1 Prepare business case template for presentation and approval
      3.2 Validate post-approval steps and establish timelines

      The Accessibility Business Case for IT

      This phase will walk you through the following activities:

      • Defining your desired future state.
      • Determining your accessibility program goals and objectives.
      • Clarifying and documenting roles and responsibilities related to accessibility in IT.

      This phase involves the following participants:

      • Project lead/sponsor
      • IT leadership team
      • Senior leaders/decision makers

      Step 2.1

      Define the desired future state of accessibility

      Activities

      2.1.1 Identify key stakeholders

      2.1.2 Hold a key stakeholder focus group

      2.1.3 Conduct a future-state analysis

      Outcomes of this step
      Following this step, you will have identified your aspirational maturity level and what your accessibility future state looks like for your organization.

      Plan for Senior Leader Buy-In

      Cheat sheet: Identify stakeholders

      Ask stakeholders, “Who else should I be talking to?” to discover additional stakeholders and ensure you don’t miss anyone.

      Identify stakeholders through the following questions:
      • Who in areas of influence will be adversely affected by potential environmental and social impacts of what you are doing?
      • At which stage will stakeholders be most affected (e.g. procurement, implementation, operations, decommissioning)?
      • Will other stakeholders emerge as the phases are started and completed?
      • Who is sponsoring the initiative?
      • Who benefits from the initiative?
      • Who is negatively impacted by the initiative?
      • Who can make approvals?
      • Who controls resources?
      • Who has specialist skills?
      • Who implements the changes?
      • Who are the owners, governors, customers, and suppliers of impacted capabilities or functions?
      Take a 360-degree view of potential internal and external stakeholders who might be impacted by the initiative.
      • Executives
      • Peers
      • Direct reports
      • Partners
      • Customers
      • Subcontractors
      • Subcontractors
      • Contractors
      • Lobby groups
      • Regulatory agencies

      Categorize your stakeholders with a stakeholder prioritization map

      A stakeholder prioritization map helps teams categorize their stakeholders by their level of influence and ownership.

      There are four areas in the map, and the stakeholders within each area should be treated differently.

      Players – Players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

      Mediators – Mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

      Noisemakers – Noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

      Spectators – Generally, spectators are apathetic and have little influence over or interest in the initiative.

      Stakeholder prioritization map

      Define strategies for engaging stakeholders by type

      Each group of stakeholders draws attention and resources away from critical tasks.

      By properly identifying your stakeholder groups, you can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of the Mediators and Players are met.

      Type Quadrant Actions
      Players High influence, high interest Actively Engage
      Keep them engaged through continuous involvement. Maintain their interest by demonstrating their value to its success.
      Mediators High influence, low interest Keep Satisfied
      They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust, and include them in important decision-making steps. In turn, they can help you influence other stakeholders.
      Noisemakers Low influence, high interest Keep Informed
      Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
      Spectators Low influence, low interest Monitor
      They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      2.1.1 Identify key stakeholders

      Collect this information by:

      1. List direct stakeholders for your area. Include stakeholders across the organization (both IT and business units) and externally.
      2. Create a stakeholder map to capture your stakeholders’ interest in and influence on digital accessibility.
      3. Shortlist stakeholders to invite as focus group participants in activity 2.1.2.
        • Aim for a combination of Players, Mediators, and Noisemakers.
      Input Output
      • List of stakeholders
      • Stakeholder requirements
      • A stakeholder map
      • List of stakeholders to include in the focus group in step 2.1.2
      Materials Participants
      • Sticky notes, pens, whiteboard, markers (optional)
      • Project leader/sponsor

      Hold a focus group to initiate planning

      Involve key stakeholders to determine the organizational drivers of accessibility, identify target maturity and key performance indicators (KPIs), and ultimately build the project charter.

      Building the project charter as a group will help you to clarify your key messages and secure buy-in from critical stakeholders up-front, which is key.

      Executing the business case for accessibility requires significant involvement from your IT leadership team. The challenge is that accessibility can be overwhelming because of inherent bias. Members of your IT leadership team will also need to participate in knowledge transfer, so get them involved up-front. The focus group will help stakeholders feel more engaged in the project, which is pivotal for success.

      You may feel like a full project charter isn’t necessary, and depending on your organizational size, it might not be. However, the exercise of building the charter is important regardless. No matter your current climate, some level of socializing the value of and plans for accessibility will be necessary.

      Meeting Agenda

      1. Short introduction
        Led by: Project Sponsor
        • Why the initiative is being considered.
      2. Make the case for the project
        Led by: Project Manager
        • Current state: What does the initiative address?
        • Future state: What is our target state of maturity?
      3. Success criteria
        Led by: Project Manager
        • How will success be measured?
      4. Define the project team
        Led by: Project Manager
        • Description of planned approach.
        • Stakeholder assessment.
        • What is required of the sponsor and stakeholders?
      5. Determine next steps
        Led by: Project Manager

      2.1.2 Hold a stakeholder focus group

      Identify the pain points you want to resolve and some of the benefits that you’d like to see from a program. By doing so, you’ll get a holistic view of what you need to achieve and what your drivers are.

      1. Ask the working group participants (as a whole or in smaller groups) to discuss pain points created by inaccessibility.
        • Challenges related to stakeholders.
        • Challenges created by process issues.
        • Difficulties improving accessibility practices.
      2. Discuss opportunities to be gained from improving these practices.
      3. Have participants write these down on sticky notes and place them on a whiteboard or flip chart.
      4. Review all the points as a group. Group challenges and benefits into themes.
      5. Have the group prioritize the risks and benefits in terms of what the solution must have, should have, could have, and won’t have.
      Input Output
      • Reasons for the project
      • Stakeholder requirements
      • Pain points and risks
      • A prioritized list of risks and benefits of the solution
      Materials Participants
      • Agenda (see previous slide)
      • Sticky notes, pens, whiteboard, markers (optional)
      • IT leadership
      • Other key stakeholders

      While defining future state, consider your drivers

      The Info-Tech Accessibility Maturity Framework identifies three key strategic drivers: compliance, experience, and incorporation.

      • Over 30% of organizations are focused on compliance, according to a 2022 survey by Harvard Business Review and Slack’s Future Forum. The survey asked more than 10,000 workers in six countries about their organizations’ approach to DEI.2

      Even though 90% of companies claim to prioritize diversity,1 over 30% are focused on compliance.2

      1. Harvard Business Review, 2020
      2. Harvard Business Review, 2022

      31.6% of companies remain in the Compliant stage, where they are focused on DEI compliance and not on integrating DEI throughout the organization or on creating continual improvement.

      Source: Harvard Business Review, 2022

      Align the benefits of program drivers to organizational goals or outcomes

      Although there will be various motivating factors, aligning the drivers of your accessibility program provides direction to the program. Connecting the advantages of program drivers to organizational goals builds the confidence of senior leaders and decision makers, increasing the continued commitment to invest in accessibility programming.

      Drivers Compliance Experience Incorporation
      Maturity level Initial Developing Defined Managed Optimized
      Description Any accessibility initiative is to comply with the minimum legislated requirement. Desire to avoid/decrease legal risk. Accessibility initiatives are focused on improving the experience of everyone from the start. Most organizations will be experience driven. Desire to increase accessibility and engagement. Accessibility is a seamless part of the whole organization and initiatives are focused on impacting social issues.
      Advantages Compliance is a good starting place for accessibility. It will reduce legal risk. Being people focused from the start of processes enables the organization to reduce tech debt, provide the best user experience, and realize other benefits of accessibility. There is a sense of belonging in the organization. The entire organization experiences the benefits of accessibility.
      Disadvantages Accessibility is about more than just compliance. Being compliance driven won’t give you the full benefits of accessibility. This can mean a culture change for the organization, which can take a long time. IT is used to moving quickly – it might feel counterintuitive to slow down and take time. It takes much longer to reach the associated level of maturity. Not possible for all organizations.

      Info-Tech Accessibility Maturity Framework

      Info-Tech Accessibility Maturity Framework

      After initially ensuring your organization is compliant with regulations and standards, you will progress to building disciplined process and consistent standardized processes. Eventually you will build the ability for predictable process, and lastly, you’ll optimize by continuously improving.

      Depending on the level of maturity you are trying to achieve, it could take months or even years to implement. The important thing to understand, however, is that accessibility work is never done.

      At all levels of the maturity framework, you must consider the interconnected aspects of people, process, and technology. However, as the organization progresses, the impact will shift from largely being focused on process and technology improvement to being focused on people.

      Info-Tech Insight
      IT typically works through maturity frameworks from the bottom to the top, progressing at each level until they reach the end. When it comes to digital accessibility initiatives, being especially thorough, thoughtful, and collaborative is critical to success. This will mean spending more time in the Developing, Defined, and Managed levels of maturity rather than trying to reach Optimized as quickly as you can. This may feel contrary to what IT historically considers as a successful implementation.

      Accessibility maturity levels

      Driver Description Benefits
      Initial Compliance
      • Accessibility processes are mostly undocumented.
      • Accessibility happens mostly on a reactive or ad hoc basis.
      • No one is aware of who is responsible for accessibility or what role they play.
      • Heavily focused on complying with regulations and standards to decrease legal risk.
      • The organization is aware of the need for accessibility.
      • Legal risk is decreased.
      Developing Experience
      • The organization is starting to take steps to increase accessibility beyond compliance.
      • Lots of opportunity for improvement.
      • Defining and refining processes.
      • Working toward building a library of assistive tools.
      • Awareness of the need for accessibility is growing.
      • Process review for accessibility increases process efficiency through avoiding rework.
      Defined Experience
      • Accessibility processes are repeatable.
      • There is a tendency to resort to old habits under stress.
      • Tools are in place to facilitate accommodation.
      • Employees know accommodations are available to them.
      • Accessibility is becoming part of daily work.
      Managed Experience
      • Defined by effective accessibility controls, processes, and metrics.
      • Mostly anticipating preferences.
      • Roles and responsibilities are defined.
      • Disability is included as part of DEI.
      • Employees understand their role in accessibility.
      • Engagement is positively impacted.
      • Attraction and retention are positively impacted.
      Optimized Incorporation
      • Not the goal for every organization.
      • Characterized by a dramatic shift in organizational culture and a feeling of belonging.
      • Ongoing continuous improvement.
      • Seamless interactions with the organization for everyone.
      • Using feedback to inform future initiatives.
      • More likely to be innovative and inclusive, reach more people positively, and meet emerging global legal requirements.
      • Better equipped for success.

      2.1.3 Conduct future-state analysis

      Identify your target state of maturity

      1. Provide the group with your maturity assessment results to review as well as the slides on the maturity levels, framework, and drivers.
      2. Compare the benefits listed on the Accessibility maturity levels slide to those that you named in the previous exercise and determine which maturity level best describes your target state.
      3. Discuss as a group and agree on one desired maturity level to reach.
      4. Review the other levels of maturity and determine what is in and out of scope for the project (higher-level benefits would be considered out of scope).
      5. Document your target state of maturity in your Accessibility Business Case Template.
      Input Output
      • Accessibility maturity levels chart on previous slide
      • Maturity level assessment results
      • Target maturity level documented
      Materials Participants
      • Paper and pens
      • Handouts of maturity levels
      • Accessibility Business Case Template
      • IT leadership team

      Download the Accessibility Business Case Template

      Case Study

      Accessibility as a differentiator

      INDUSTRY
      Financial

      SOURCE
      WAI-Engage

      Accessibility inside and out

      As a financial provider, Barclays embarked on the accessibility journey to engage customers and employees with the goal of equal access for all. One key statement that provided focus was “Essential for some, easier for all. ”

      “It's about helping everyone to work, bank and live their lives regardless of their age, situation, abilities or circumstances.”

      Embedding into experiences

      “The Barclays Accessibility team [supports] digital teams to embed accessibility into our services and culture through effective governance, partnering, training and tools. Establishing an enterprise-wide accessibility strategy, standards and programmes coupled with senior sponsorship helps support our publicly stated ambition of becoming the most accessible and inclusive FTSE company.”

      – Paul Smyth, Head of Digital Accessibility, Barclays

      It’s a circle, not a roadmap

      • Barclays continues the journey through partnerships with disability charities and accessibility experts and through regularly engaging with customers and colleagues with disabilities directly.
      • More accessible, inclusive products and services engage and attract more people with disabilities. This translates to a more diverse workforce that identifies opportunities for innovation. This leads to being attractive to diverse talent, and the circle continues.
      • Barclays’ mobile banking app was first to be accredited by accessibility consultants AbilityNet.

      Step 2.2

      Define your accessibility program goals and objectives

      Activities

      2.2.1 Create a list of goals and objectives

      2.2.2 Finalize key metrics

      Plan for Senior Leader Buy-In

      Outcomes of this step
      You will have clear measurable goals and objectives to respond to identified accessibility issues and organizational goals.

      What does a good goal look like?

      Use the SMART framework to build effective goals.

      S Specific: Is the goal clear, concrete, and well defined?
      M Measurable: How will you know when the goal is met?
      A Achievable: Is the goal possible to achieve in a reasonable time?
      R Relevant: Does this goal align with your responsibilities and with departmental and organizational goals?
      T Time-based: Have you specified a time frame in which you aim to achieve the goal?

      SMART is a common framework for setting effective goals. Make sure your goals satisfy these criteria to ensure you can achieve real results.

      2.2.1 Create a list of goals and objectives

      Use the outcomes from activity 2.1.2.

      1. Using the prioritized list of what your solution must have, should have, could have, and won’t have from activity 2.1.2, develop goals.
      2. Remember to use the SMART goal framework to build out each goal (see the previous slide for more information on SMART goals).
      3. Ensure each goal supports departmental and organizational goals to ensure it is meaningful.
      4. Document your goals and objectives in your Accessibility Business Case Template.
      InputOutput
      • Outcomes of activity 2.1.2
      • Organizational and departmental goals
      • Goals and objectives added to your Accessibility Business Case Template
      MaterialsParticipants
      • Accessibility Business Case Template
      • IT leadership team

      Download the Accessibility Business Case Template

      2.2.1 Create a list of goals and objectives

      Use the outcomes from activity 2.1.2.

      1. Using the prioritized list of what your solution must have, should have, could have, and won’t have from activity 2.1.2, develop goals.
      2. Remember to use the SMART goal framework to build out each goal (see the previous slide for more information on SMART goals).
      3. Ensure each goal supports departmental and organizational goals to ensure it is meaningful.
      4. Document your goals and objectives in your Accessibility Business Case Template.

      Establish Baseline Metrics

      Baseline metrics will be improved through:

      1. Progressing through the accessibility maturity model.
      2. Addressing accessibility earlier in processes to avoid tech debt and rework late in projects or releases.
      3. Making accessibility part of the procurement process as a scoring consideration and vendor choice.
      4. Ensuring compliance with regulations and standards.
      Metric Current Goal
      Overall end-customer satisfaction 90 120
      Monies saved through cost optimization efforts
      Employee engagement
      Monies save through application rationalization and standardization

      For more metrics ideas, see the Info-Tech IT Metrics Library.

      2.2.2 Finalize key metrics

      Finalize key metrics the organization will use to measure accessibility success

      1. Brainstorm how you would measure the success of each goal based on the benefits, challenges, and risks you previously identified.
      2. Write each of the metric ideas down and finalize three to five key metrics which you will track. The metrics you choose should relate to the key challenges or risks you have identified and match your desired maturity level and driver.
      3. Document your key metrics in the Accessibility Business Case Template.
      InputOutput
      • Accessibility challenges and benefits
      • Goals from activity 2.2.1
      • Three to five key metrics to track
      MaterialsParticipants
      • Accessibility Business Case Template
      • IT leadership team
      • Project lead/sponsor

      Download the Accessibility Business Case Template

      Step 2.3

      Document accessibility program roles and responsibilities

      Activities

      2.3.1 Populate a RACI chart

      Plan for Senior Leader Buy-In

      Outcomes of this step
      At the end of this step, you will have a completed RACI chart documenting the roles and responsibilities related to accessibility for your accessibility business case.

      2.3.1 Populate a RACI

      Populate a RACI chart to identify who should be responsible, accountable, consulted, and informed for each key activity.

      Define who is responsible, accountable, consulted, and informed for the project team:

      1. Write out the list of all stakeholders along the top of a whiteboard. Write out the key project steps along the left-hand side.
      2. For each initiative, identify each team member’s role. Are they:
        Responsible: The one responsible for getting the job done.
        Accountable: Only one person can be accountable for each task.
        Consulted: Are involved by providing knowledge.
        Informed: Receive information about execution and quality.
      3. As you proceed, continue to add tasks and assign responsibility to the RACI chart in the appendix of the Accessibility Business Case Template.
      InputOutput
      • Stakeholder list
      • Key project steps
      • Project RACI chart
      MaterialsParticipants
      • Whiteboard
      • Accessibility Business Case Template
      • IT leadership team

      Download the Accessibility Business Case Template

      Phase 3

      Prepare your business case and get approval

      Phase 1
      1.1 Understand standards and legislation
      1.2 Build awareness
      1.3 Understand maturity level

      Phase 2
      2.1 Define desired future state
      2.2 Define goals and objectives
      2.3 Document roles and responsibilities

      Phase 3
      3.1 Prepare business case template for presentation and approval
      3.2 Validate post-approval steps and establish timelines

      The Accessibility Business Case for IT

      This phase will walk you through the following activities:

      • Compiling the work and learning you’ve done so far into a business case presentation.

      This phase involves the following participants:

      • Project lead/sponsor
      • Senior leaders/approval authority

      There is a business case for accessibility

      • When planning for initiatives, a business case is a necessary tool. Although it can feel like an administrative exercise, it helps create a compelling argument to senior leaders about the benefits and necessity of building an accessibility program.
      • No matter the industry, you need to justify how the budget and effort you require for the initiative support organizational goals. However, senior leaders of different industries might be motivated by different reasons. For example, government is strongly motivated by legal and equity aspects, commercial companies may be attracted to the increase in innovation or market reach, and educational and nonprofit companies are likely motivated by brand enhancement.
      • The organizational focus and goals will guide your business case for accessibility. Highlight the most relevant benefits to your operational landscape and the risk of inaction.

      Source: WAI, 2018

      “Many organizations are waking up to the fact that embracing accessibility leads to multiple benefits – reducing legal risks, strengthening brand presence, improving customer experience and colleague productivity.”
      – Paul Smyth, Head of Digital Accessibility, Barclays
      Source: WAI, 2018

      Step 3.1

      Customize and populate the Accessibility Business Case Template

      Activities

      3.1.1 Prepare your business case template for presentation and approval

      Build Your Business Case

      Outcomes of this step
      Following this step, you will have a customized business case presentation that you can present to senior leaders.

      Use Info-Tech’s template to communicate with stakeholders

      Obtain approval for your accessibility program by customizing Info-Tech’s Accessibility Business Case Template, which is designed to effectively convey your key messages. Tailor the template to suit your needs.

      It includes:

      • Project context
      • Project scope and objectives
      • Knowledge transfer roadmap
      • Next steps

      Info-Tech Insight
      The support of senior leaders is critical to the success of your accessibility program development. Remind them of the benefits and impact and the risks associated with inaction.

      Download the Accessibility Business Case Template

      3.1.1 Prepare a presentation for senior leaders to gain approval

      Now that you understand your current and desired accessibility maturity, the next step is to get sign-off to begin planning your initiatives.

      Know your audience:

      1. Consider who will be included in your presentation audience.
      2. You want your presentation to be succinct and hard-hitting. Management’s time is tight, and they will lose interest if you drag out the delivery. Impact them hard and fast with the challenges, benefits, and risks of inaction.
      3. Contain the presentation to no more than an hour. Depending on your audience, the actual presentation delivery could be quite short. You want to ensure adequate time for questions and answers.
      4. Schedule a meeting with the key decision makers who will need to approve the initiatives (IT leadership team, executive team, the board, etc.) and present your business case.
      InputOutput
      • Activity results
      • Accessibility Maturity Assessment results
      • A completed presentation to communicate your accessibility business case
      MaterialsParticipants
      • Accessibility Business Case Template
      • IT leadership team
      • Project sponsor
      • Project stakeholders
      • Senior leaders

      Download the Accessibility Business Case Template

      Step 3.2

      Validate post-approval steps and establish timelines

      Activities

      3.2.1 Prepare for implementation: Complete the implementation prep to-do list and assign proposed timelines

      Build Your Business Case

      Outcomes of this step
      This step will help you gain leadership’s approval to move forward with building and implementing the accessibility program.

      Prepare to implement your program

      Complete the to-do list to ensure you are ready to move your accessibility program forward.

      To Do Proposed Timeline
      Reach out to your change management team for assistance.
      Discuss your plan with HR.
      Build a project team.
      Incorporate any necessary changes from senior leaders into your business case.
      [insert your own addition here]
      [insert your own addition here]
      [insert your own addition here]
      [insert your own addition here]

      3.2.1 Prep for implementation (action planning)

      Use the implementation prep to-do list to make sure you have gathered relevant information and completed critical steps to be ready for success.

      Use the list on the previous slide to make sure you are set up for implementation success and that you’re ready to move your accessibility program forward.

      1. Assign proposed timelines to each of the items.
      2. Work through the list, collecting or completing each item.
      3. As you proceed, keep your identified drivers, current state, desired future state, goals, and objectives in mind.
      Input Output
      • Accessibility Maturity Assessment
      • Business case presentation and any feedback from senior leaders
      • Goals, objectives, identified drivers, and desired future state
      • High-level action plan
      Materials Participants
      • Previous slide containing the checklist
      • Project lead

      Related Info-Tech Research

      Implement and Mature Your User Experience Design Practice

      • Create a practice that is focused on human outcomes; it starts and ends with the people you are designing for. This includes:
        • Establishing a practice with a common vision.
        • Enhancing the practice through four design factors.
        • Communicating a roadmap to improve your business through design.

      Modernize Your Corporate Website to Drive Business Value

      • Users are demanding more valuable web functionalities and improved access to your website services.
      • The criteria of user acceptance and satisfaction involves more than an aesthetically pleasing user interface (UI). It also includes how emotionally attached the user is to the website and how it accommodates user behaviors.

      IT Diversity & Inclusion Tactics

      • Although inclusion is key to the success of a diversity and inclusion (D&I) strategy, the complexity of the concept makes it a daunting pursuit.
      • This is further complicated by the fact that creating inclusion is not a one-and-done exercise. Rather, it requires the ongoing commitment of employees and managers to reassess their own behaviors and to drive a cultural shift.

      Fix Your IT Culture

      • Go beyond value statements to create a culture that enables the departmental strategy.
      • There is confusion about how to translate culture from an abstract concept to something that is measurable, actionable, and process driven.
      • Organizations lack clarity about who is accountable and responsible for culture, with groups often pointing fingers at each other.

      Works cited

      “2021 State of Digital Accessibility.” Level Access, n.d. Accessed 10 Aug. 2022

      ”2022 Midyear Report: ADA Digital Accessibility Lawsuits.” UsableNet, 2022. Accessed 9 Nov. 2022

      “Barclay’s Bank Case Study.” WAI-Engage, 12 Sept. 2018. Accessed 7 Nov. 2022.

      Bilodeau, Howard, et al. “StatCan COVID-19 Data to Insights for a Better Canada.” Statistics Canada, 24 June 2021. Accessed 10 Aug. 2022.

      Casey, Caroline. “Do Your D&I Efforts Include People With Disabilities?” Harvard Business Review, 19 March 2020. Accessed 28 July 2022.

      Digitalisation World. “Organisations failing to meet digital accessibility standards.” Angel Business Communications, 19 May 2022. Accessed Oct. 2022.

      “disability.” Merriam-Webster.com Dictionary, Merriam-Webster, https://www.merriam-webster.com/dictionary/disability. Accessed 10 Aug. 2022.

      “Disability.” World Health Organization, 2022. Accessed 10 Aug 2022.

      “Driving the Accessibility Advantage at Accenture.” Accenture, 2022. Accessed 7 Oct. 2022.

      eSSENTIAL Accessibility. The Must-Have WCAG 2.1 Checklist. 2022

      Hopewell, May. Accessibility in the Workplace. 2022.

      “Initiate.” W3C Web Accessibility Initiative (WAI), 31 March 2016. Accessed 18 Aug. 2022.

      Kalcevich, Kate, and Mike Gifford. “How to Bake Layers of Accessibility Testing Into Your Process.” Smashing Magazine, 26 April 2021. Accessed 31 Aug. 2022.

      Noone, Cat. “4 Common Ways Companies Alienate People with Disabilities.” Harvard Business Review, 29 Nov. 2021. Accessed Jul. 2022.

      Taylor, Jason. “A Record-Breaking Year for ADA Digital Accessibility Lawsuits.” UsableNet, 21 December 2020. Accessed Jul. 2022.

      “The Business Case for Digital Accessibility.” W3C Web Accessibility Initiative (WAI), 9 Nov. 2018. Accessed 4 Aug. 2022.

      “The WebAIM Million.” Web AIM, 31 March 2022. Accessed 28 Jul. 2022.

      Washington, Ella F. “The Five Stages of DEI Maturity.” Harvard Business Review, November - December 2022. Accessed 7 Nov. 2022.

      Wyman, Nicholas. “An Untapped Talent Resource: People With Disabilities.” Forbes, 25 Feb. 2021. Accessed 14 Sep. 2022.

      Microsoft Dynamics 365: Understand the Transition to the Cloud

      • Buy Link or Shortcode: {j2store}350|cart{/j2store}
      • member rating overall impact: 8.7/10 Overall Impact
      • member rating average dollars saved: $94,858 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Your on-premises Dynamics CRM or AX needs updating or replacing, and you’re not sure whether to upgrade or transition to the cloud with the new Microsoft Dynamics 365 platform. You’re also uncertain about what the cost might be or if there are savings to be had with a transition to the cloud for your enterprise resource planning system.
      • The new license model, Apps vs. Plans and Dual Use Rights in the cloud, includes confusing terminology and licensing rules that don’t seem to make sense. This makes it difficult to purchase proper licensing that aligns with your current on-premises setup and to maximize your choices in transition licenses.
      • There are different licensing programs for Dynamics 365 in the cloud. You need to decide on the most cost effective program for your company, for now and for the future.
      • Microsoft is constantly pressuring you to move to the cloud, but you don’t understand the why. You're uncertain if there's real value in such a strategic move right now, or if should you wait awhile.

      Our Advice

      Critical Insight

      • Focus on what’s best for you. Do a thorough current state assessment of your hardware and software needs and consider what will be required in the near future (one to four years).
      • Educate yourself. You should have a good understanding of your options from staying on-premises vs. an interim hybrid model vs. a lift and shift to the cloud.
      • Consider the overall picture. There might not be hard cost savings to be realized in the near term, given the potential increase in licensing costs over a CapEx to OpEx savings.

      Impact and Result

      • Understanding the best time to transition, from a licensing perspective, could save you significant dollars over the next one to four years.
      • Planning and effectively mapping your current licenses to the new cloud user model will maximize your current investment into the cloud and fully leverage all available Microsoft incentives in the process.
      • Gaining the knowledge required to make the most informed transition decision, based on best timing, most appropriate licensing program, and maximized cost savings in the near term.
      • Engaging effectively with Microsoft and a competent Dynamics partner for deployment or licensing needs.

      Microsoft Dynamics 365: Understand the Transition to the Cloud Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should learn about Microsoft Dynamics 365 user-based cloud licensing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Timing

      Review to confirm if you are eligible for Microsoft cloud transition discounts and what is your best time to move to the cloud.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 1: Timing
      • Microsoft License Agreement Summary Tool
      • Existing CRM-AX License Summary Worksheet

      2. Licensing

      Begin with a review to understand user-based cloud licensing, then move to mapping your existing licenses to the cloud users and plans.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 2: Licensing
      • Microsoft Dynamics 365 On-Premises License Transition Mapping Tool
      • Microsoft Dynamics 365 User License Assignment Tool
      • Microsoft Licensing Programs Brief Overview

      3. Cost review

      Use your cloud mapping activity as well your eligible discounts to estimate your cloud transition licensing costs.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 3: Cost Review
      • Microsoft Dynamics 365 Cost Estimator

      4. Analyze and decide

      Start by summarizing your choice license program, decide on the ideal time, then move on to total cost review.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 4: Analyze and Decide
      [infographic]

      Workshop: Microsoft Dynamics 365: Understand the Transition to the Cloud

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand What You Own and What You Can Transition to the Cloud

      The Purpose

      Understand what you own and what you can transition to the cloud.

      Learn which new cloud user licenses to transition.

      Key Benefits Achieved

      All your licenses in one summary.

      Eligible transition discounts.

      Mapping of on-premises to cloud users.

      Activities

      1.1 Validate your discount availability.

      1.2 Summarize agreements.

      1.3 Itemize your current license ownership.

      1.4 Review your timing options.

      1.5 Map your on-premises licenses to the cloud-based, user-based model.

      Outputs

      Current agreement summary

      On-premises to cloud user mapping summary

      Understanding of cloud app and plan features

      2 Transition License Cost Estimate and Additional Costs

      The Purpose

      Estimate cloud license costs and other associated expenses.

      Summarize and decide on the best timing, users, and program.

      Key Benefits Achieved

      Good cost estimate of equivalent cloud user-based licenses.

      Understanding of when and how to move your on-premises licensing to the new Dynamics 365 cloud model.

      Activities

      2.1 Estimate cloud user license costs.

      2.2 Calculate additional costs related to license transitions.

      2.3 Review all activities.

      2.4 Summarize and analyze your decision.

      Outputs

      Cloud user licensing cost modeling

      Summary of total costs

      Validation of costs and transition choices

      An informed decision on your Dyn365 timing, licensing, and costs

      Structure the Role of the DBA

      • Buy Link or Shortcode: {j2store}273|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy
      • The traditional role of Database Administrators (DBAs) is shifting due to a variety of changes such as cloud databases, increased automation, close relations with development, and the need for more integration with the business at large. All this means that organizations will have to adapt to integrate a new type of DBA into IT.
      • Organizations often have difficulty establishing a refined and effective DBA structure based on repeatable and well-grounded processes.
      • The relationship between DBAs and the rest of IT (especially development) can often be problematic due to a lack of mutual co-operation and clear communication.
      • There is often confusion in organizations as how to approach staffing DBAs.

      Our Advice

      Critical Insight

      • An organization’s relative focus on operations or development is essential in determining many DBA related decisions. This focus can determine what kinds of DBAs to hire, what staffing ratios to use, the viability of outsourcing, and the appropriate reporting structure for DBAs.
      • Utilizing technological strategies such as database automation, effective auditing, and database consolidation to bolster the DBA team helps make efficient use of DBA staff and can turn a reactive environment into a proactive one.
      • Ensuring refined and regularly assessed processes are in place for change and incident management is essential for maintaining effective and structured database administration.

      Impact and Result

      • Right-size, support, and structure your DBA team for increased cost effectiveness and optimal productivity.
      • Develop a superior level of co-operation between DBAs and the rest of IT as well as the business at large.
      • Build an environment in which DBAs will be motivated and flourish.

      Structure the Role of the DBA Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand how Database Administrators are evolving

      Develop an effective structure for managing and supporting Database Administrators.

      • Storyboard: Structure the Role of the DBA

      2. Create the right Database Administrator roles to meet organizational needs

      Build a team that is relevant to the focus of the organization.

      • System Database Administrator
      • Application Database Administrator
      [infographic]

      Position IT to Support and Be a Leader in Open Data Initiatives

      • Buy Link or Shortcode: {j2store}326|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Open data programs are often seen as unimportant or not worth taking up space in the budget in local government.
      • Open data programs are typically owned by a single open data evangelist who works on it as a side-of-desk project.
      • Having a single resource spend a portion of their time on open data doesn’t allow the open data program to mature to the point that local governments are realizing benefits from it.
      • It is difficult to gain buy-in for open data as it is hard to track the benefits of an open data program.

      Our Advice

      Critical Insight

      • Local government can help push the world towards being more open, unlocking economic benefits for the wider economy.
      • Cities don’t know the solutions to all of their problems often they don’t know all of the problems they have. Release data as a platform to crowdsource solutions and engage your community.
      • Build your open data policies in collaboration with the community. It’s their data, let them shape the way it’s used!

      Impact and Result

      • Level-set expectations for your open data program. Every local government is different in terms of the benefits they can achieve with open data; ensure the business understands what is realistic to achieve.
      • Create a team of open data champions from departments outside of IT. Identify potential champions for the team and use this group to help gain greater business buy-in and gather feedback on the program’s direction.
      • Follow the open data maturity model in order to assess your current state, identify a target state, and assess capability gaps that need to be improved upon.
      • Use industry best practices to develop an open data policy and processes to help improve maturity of the open data program and reach your desired target state.
      • Identify metrics that you can use to track, and communicate the success of, the open data program.

      Position IT to Support and Be a Leader in Open Data Initiatives Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop your open data program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Set the foundation for the success of your open data program

      Identify your open data program's current state maturity, and gain buy-in from the business for the program.

      • Position IT to Support and Be a Leader in Open Data Initiatives – Phase 1: Set the Foundation for the Success of Your Open Data Program
      • Open Data Maturity Assessment
      • Open Data Program – IT Stakeholder Powermap Template
      • Open Data in Our City Stakeholder Presentation Template

      2. Grow the maturity of your open data program

      Identify a target state maturity and reach it through building a policy and processes and the use of metrics.

      • Position IT to Support and Be a Leader in Open Data Initiatives – Phase 2: Grow the Maturity of Your Open Data Program
      • Open Data Policy Template
      • Open Data Process Template
      • Open Data Process Descriptions Template
      • Open Data Process Visio Templates (Visio)
      • Open Data Process Visio Templates (PDF)
      • Open Data Metrics Template
      [infographic]

      Workshop: Position IT to Support and Be a Leader in Open Data Initiatives

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Business Drivers for Open Data Program

      The Purpose

      Ensure that the open data program is being driven out from the business in order to gain business support.

      Key Benefits Achieved

      Identify drivers for the open data program that are coming directly from the business.

      Activities

      1.1 Understand constraints for the open data program.

      1.2 Conduct interviews with the business to gain input on business drivers and level-set expectations.

      1.3 Develop list of business drivers for open data.

      Outputs

      Defined list of business drivers for the open data program

      2 Assess Current State and Define Target State of the Open Data Program

      The Purpose

      Understand the gaps between where your program currently is and where you want it to be.

      Key Benefits Achieved

      Identify top processes for improvement in order to bring the open data program to the desired target state maturity.

      Activities

      2.1 Perform current state maturity assessment.

      2.2 Define desired target state with business input.

      2.3 Highlight gaps between current and target state.

      Outputs

      Defined current state maturity

      Identified target state maturity

      List of top processes to improve in order to reach target state maturity

      3 Develop an Open Data Policy

      The Purpose

      Develop a draft open data policy that will give you a starting point when building your policy with the community.

      Key Benefits Achieved

      A draft open data policy will be developed that is based on best-practice standards.

      Activities

      3.1 Define the purpose of the open data policy.

      3.2 Establish principles for the open data program.

      3.3 Develop a rough governance outline.

      3.4 Create a draft open data policy document based on industry best-practice examples.

      Outputs

      Initial draft of open data policy

      4 Develop Open Processes and Identify Metrics

      The Purpose

      Build open data processes and identify metrics for the program in order to track benefits realization.

      Key Benefits Achieved

      Formalize processes to set in place to improve the maturity of the open data program.

      Identify metrics that can track the success of the open data program.

      Activities

      4.1 Develop the roles that will make up the open data program.

      4.2 Create processes for new dataset requests, updates of existing datasets, and the retiring of datasets.

      4.3 Identify metrics that will be used for measuring the success of the open data program.

      Outputs

      Initial draft of open data processes

      Established metrics for the open data program

      Establish Data Governance

      • Buy Link or Shortcode: {j2store}123|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $48,494 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Organizations are faced with challenges associated with changing data landscapes, evolving business models, industry disruptions, regulatory and compliance obligations, as well as changing and maturing user landscapes and demands for data.
      • Although the need for a data governance program is often evident, organizations often miss the mark.
      • Your data governance efforts should be directly aligned to delivering measurable business value by supporting key strategic initiatives, value streams, and underlying business capabilities.

      Our Advice

      Critical Insight

      • Your organization’s value streams and their associated business capabilities require effectively governed data. Without this, you may experience elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
      • Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture.
      • Data governance must continuously align with the organization’s enterprise governance function. It should not be perceived as a pet project of IT, but rather as an enterprise-wide, business-driven initiative.

      Impact and Result

      Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Info-Tech's approach will help you:

      • Align your data governance with enterprise governance, business strategy, and the organizational value streams to ensure the program delivers measurable business value.
      • Understand your current data governance capabilities and build out a future state that is right-sized and relevant.
      • Define data governance leadership, accountability, and responsibility.
      • Ensure data governance is supported by an operating model that effectively manages change and communication and fosters a culture of data excellence.

      Establish Data Governance Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Data Governance Research – A step-by-step document to ensure that the people handling the data are involved in the decisions surrounding data usage, data quality, business processes, and change implementation.

      Data governance is a strategic program that will help your organization control data by managing the people, processes, and information technology needed to ensure that accurate and consistent data policies exist across varying lines of the business, enabling data-driven insight. This research will provide an overview of data governance and its importance to your organization, assist in making the case and securing buy-in for data governance, identify data governance best practices and the challenges associated with them, and provide guidance on how to implement data governance best practices for a successful launch.

      • Establish Data Governance – Phases 1-3

      2. Data Governance Planning and Roadmapping Workbook – A structured tool to assist with establishing effective data governance practices.

      This workbook will help your organization understand the business and user context by leveraging your business capability map and value streams, develop data use cases using Info-Tech's framework for building data use cases, and gauge the current state of your organization's data culture.

      • Data Governance Planning and Roadmapping Workbook

      3. Data Use Case Framework Template – An exemplar template to highlight and create relevant use cases around the organization’s data-related problems and opportunities.

      This business needs gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization. This template provides a framework for data requirements and a mapping methodology for creating use cases.

      • Data Use Case Framework Template

      4. Data Governance Initiative Planning and Roadmap Tool – A visual roadmapping tool to assist with establishing effective data governance practices.

      This tool will help your organization plan the sequence of activities, capture start dates and expected completion dates, and create a roadmap that can be effectively communicated to the organization.

      • Data Governance Initiative Planning and Roadmap Tool

      5. Business Data Catalog – A comprehensive template to help you to document the key data assets that are to be governed based on in-depth business unit interviews, data risk/value assessments, and a data flow diagram for the organization.

      Use this template to document information about key data assets such as data definition, source system, possible values, data sensitivity, data steward, and usage of the data.

      • Business Data Catalog

      6. Data Governance Program Charter Template – A program charter template to sell the importance of data governance to senior executives.

      This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.

      • Data Governance Program Charter Template

      7. Data Governance Policy

      This policy establishes uniform data governance standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of your organization.

      • Data Governance Policy

      8. Data Governance Exemplar – An exemplar showing how you can plan and document your data governance outputs.

      Use this exemplar to understand how to establish data governance in your organization. Follow along with the sections of the blueprint Establish Data Governance and complete the document as you progress.

      • Data Governance Exemplar
      [infographic]

      Workshop: Establish Data Governance

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Business Context and Value

      The Purpose

      Identify key business data assets that need to be governed.

      Create a unifying vision for the data governance program.

      Key Benefits Achieved

      Understand the value of data governance and how it can help the organization better leverage its data.

      Gain knowledge of how data governance can benefit both IT and the business.

      Activities

      1.1 Establish business context, value, and scope of data governance at the organization

      1.2 Introduction to Info-Tech’s data governance framework

      1.3 Discuss vision and mission for data governance

      1.4 Understand your business architecture, including your business capability map and value streams

      1.5 Build use cases aligned to core business capabilities

      Outputs

      Sample use cases (tied to the business capability map) and a repeatable use case framework

      Vision and mission for data governance

      2 Understand Current Data Governance Capabilities and Plot Target-State Levels

      The Purpose

      Assess which data contains value and/or risk and determine metrics that will determine how valuable the data is to the organization.

      Assess where the organization currently stands in data governance initiatives.

      Determine gaps between the current and future states of the data governance program.

      Key Benefits Achieved

      Gain a holistic understanding of organizational data and how it flows through business units and systems.

      Identify which data should fall under the governance umbrella.

      Determine a practical starting point for the program.

      Activities

      2.1 Understand your current data governance capabilities and maturity

      2.2 Set target-state data governance capabilities

      Outputs

      Current state of data governance maturity

      Definition of target state

      3 Build Data Domain to Data Governance Role Mapping

      The Purpose

      Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.

      Determine timing of the initiatives.

      Key Benefits Achieved

      Establish clear direction for the data governance program.

      Step-by-step outline of how to create effective data governance, with true business-IT collaboration.

      Activities

      3.1 Evaluate and prioritize performance gaps

      3.2 Develop and consolidate data governance target-state initiatives

      3.3 Define the role of data governance: data domain to data governance role mapping

      Outputs

      Target-state data governance initiatives

      Data domain to data governance role mapping

      4 Formulate a Plan to Get to Your Target State

      The Purpose

      Consolidate the roadmap and other strategies to determine the plan of action from Day One.

      Create the required policies, procedures, and positions for data governance to be sustainable and effective.

      Key Benefits Achieved

      Prioritized initiatives with dependencies mapped out.

      A clearly communicated plan for data governance that will have full business backing.

      Activities

      4.1 Identify and prioritize next steps

      4.2 Define roles and responsibilities and complete a high-level RACI

      4.3 Wrap-up and discuss next steps and post-workshop support

      Outputs

      Initialized roadmap

      Initialized RACI

      Further reading

      Establish Data Governance

      Deliver measurable business value.

      Executive Brief

      Analyst Perspective

      Establish a data governance program that brings value to your organization.

      Picture of analyst

      Data governance does not sit as an island on its own in the organization – it must align with and be driven by your enterprise governance. As you build out data governance in your organization, it’s important to keep in mind that this program is meant to be an enabling framework of oversight and accountabilities for managing, handling, and protecting your company’s data assets. It should never be perceived as bureaucratic or inhibiting to your data users. It should deliver agreed-upon models that are conducive to your organization’s operating culture, offering clarity on who can do what with the data and via what means. Data governance is the key enabler for bringing high-quality, trusted, secure, and discoverable data to the right users across your organization. Promote and drive the responsible and ethical use of data while helping to build and foster an organizational culture of data excellence.

      Crystal Singh

      Director, Research & Advisory, Data & Analytics Practice

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The amount of data within organizations is growing at an exponential rate, creating a need to adopt a formal approach to governing data. However, many organizations remain uninformed on how to effectively govern their data. Comprehensive data governance should define leadership, accountability, and responsibility related to data use and handling and be supported by a well-oiled operating model and relevant policies and procedures. This will help ensure the right data gets to the right people at the right time, using the right mechanisms.

      Common Obstacles

      Organizations are faced with challenges associated with changing data landscapes, evolving business models, industry disruptions, regulatory and compliance obligations, and changing and maturing user landscape and demand for data. Although the need for a data governance program is often evident, organizations miss the mark when their data governance efforts are not directly aligned to delivering measurable business value. Initiatives should support key strategic initiatives, as well as value streams and their underlying business capabilities.

      Info-Tech’s Approach

      Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Organizations should:

      • Align their data governance with enterprise governance, business strategy and value streams to ensure the program delivers measurable business value.
      • Understand their current data governance capabilities so as to build out a future state that is right-sized and relevant.
      • Define data leadership, accountability, and responsibility. Support these with an operating model that effectively manages change and communication and fosters a culture of data excellence.

      Info-Tech Insight

      Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operating costs, missed opportunities, eroded stakeholder satisfaction, and increased business risk.

      Your challenge

      This research is designed to help organizations build and sustain an effective data governance program.

      • Your organization has recognized the need to treat data as a corporate asset for generating business value and/or managing and mitigating risk.
      • This has brought data governance to the forefront and highlighted the need to build a performance-driven enterprise program for delivering quality, trusted, and readily consumable data to users.
      • An effective data governance program is one that defines leadership, accountability, and responsibility related to data use and handling. It’s supported by a well-oiled operating model and relevant policies and procedures, all of which help build and foster a culture of data excellence where the right users get access to the right data at the right time via the right mechanisms.

      As you embark on establishing data governance in your organization, it’s vital to ensure from the get-go that you define the drivers and business context for the program. Data governance should never be attempted without direction on how the program will yield measurable business value.

      “Data processing and cleanup can consume more than half of an analytics team’s time, including that of highly paid data scientists, which limits scalability and frustrates employees.” – Petzold, et al., 2020

      Image is a circle graph and 30% of it is coloured with the number 30% in the middle of the graph

      “The productivity of employees across the organization can suffer.” – Petzold, et al., 2020

      Respondents to McKinsey’s 2019 Global Data Transformation Survey reported that an average of 30% of their total enterprise time was spent on non-value-added tasks because of poor data quality and availability. – Petzold, et al., 2020

      Common obstacles

      Some of the barriers that make data governance difficult to address for many organizations include:

      • Gaps in communicating the strategic value of data and data governance to the organization. This is vital for securing senior leadership buy-in and support, which, in turn, is crucial for sustained success of the data governance program.
      • Misinterpretation or a lack of understanding about data governance, including what it means for the organization and the individual data user.
      • A perception that data governance is inhibiting or an added layer of bureaucracy or complication rather than an enabling and empowering framework for stakeholders in their use and handling of data.
      • Embarking on data governance without firmly substantiating and understanding the organizational drivers for doing so. How is data governance going to support the organization’s value streams and their various business capabilities?
      • Neglecting to define and measure success and performance. Just as in any other enterprise initiative, you have to be able to demonstrate an ROI for time, resources and funding. These metrics must demonstrate the measurable business value that data governance brings to the organization.
      • Failure to align data governance with enterprise governance.
      Image is a circle graph and 78% of it is coloured with the number 78% in the middle of the graph

      78% of companies (and 92% of top-tier companies) have a corporate initiative to become more data-driven. – Alation, 2020

      Image is a circle graph and 58% of it is coloured with the number 58% in the middle of the graph

      But despite these ambitions, there appears to be a “data culture disconnect” – 58% of leaders overestimate the current data culture of their enterprises, giving a grade higher than the one produced by the study. – Fregoni, 2020

      The strategic value of data

      Power intelligent and transformative organizational performance through leveraging data.

      Respond to industry disruptors

      Optimize the way you serve your stakeholders and customers

      Develop products and services to meet ever-evolving needs

      Manage operations and mitigate risk

      Harness the value of your data

      The journey to being data-driven

      The journey to declaring that you are a data-driven organization requires a pit stop at data enablement.

      The Data Economy

      Data Disengaged

      You have a low appetite for data and rarely use data for decision making.

      Data Enabled

      Technology, data architecture, and people and processes are optimized and supported by data governance.

      Data Driven

      You are differentiating and competing on data and analytics; described as a “data first” organization. You’re collaborating through data. Data is an asset.

      Data governance is essential for any organization that makes decisions about how it uses its data.

      Data governance is an enabling framework of decision rights, responsibilities, and accountabilities for data assets across the enterprise.

      Data governance is:

      • Executed according to agreed-upon models that describe who can take what actions with what information, when, and using what methods (Olavsrud, 2021).
      • True business-IT collaboration that will lead to increased consistency and confidence in data to support decision making. This, in turn, helps fuel innovation and growth.

      If done correctly, data governance is not:

      • An annoying, finger-waving roadblock in the way of getting things done.
      • Meant to solve all data-related business or IT problems in an organization.
      • An inhibitor or impediment to using and sharing data.

      Info-Tech’s Data Governance Framework

      An image of Info-Tech's Data Governance Framework

      Create impactful data governance by embedding it within enterprise governance

      A model is depicted to show the relationship between enterprise governance and data governance.

      Organizational drivers for data governance

      Data governance personas:

      Conformance: Establishing data governance to meet regulations and compliance requirements.

      Performance: Establishing data governance to fuel data-driven decision making for driving business value and managing and mitigating business risk.

      Two images are depicted that show the difference between conformance and performance.

      Data Governance is not a one-person show

      • Data governance needs a leader and a home. Define who is going to be leading, driving, and steering data governance in your organization.
      • Senior executive leaders play a crucial role in championing and bringing visibility to the value of data and data governance. This is vital for building and fostering a culture of data excellence.
      • Effective data governance comes with business and IT alignment, collaboration, and formally defined roles around data leadership, ownership, and stewardship.
      Four circles are depicted. There is one person in the circle on the left and is labelled: Data Governance Leadership. The circle beside it has two people in it and labelled: Organizational Champions. The circle beside it has three people in it and labelled: Data Owners, Stewards & Custodians. The last circle has four people in it and labelled: The Organization & Data Storytellers.

      Traditional data governance organizational structure

      A traditional structure includes committees and roles that span across strategic, tactical, and operational duties. There is no one-size-fits-all data governance structure. However, most organizations follow a similar pattern when establishing committees, councils, and cross-functional groups. Most organizations strive to identify roles and responsibilities at a strategic and operational level. Several factors will influence the structure of the program, such as the focus of the data governance project and the maturity and size of the organization.

      A triangular model is depicted and is split into three tiers to show the traditional data governance organizational structure.

      A healthy data culture is key to amplifying the power of your data.

      “Albert Einstein is said to have remarked, ‘The world cannot be changed without changing our thinking.’ What is clear is that the greatest barrier to data success today is business culture, not lagging technology. “– Randy Bean, 2020

      What does it look like?

      • Everybody knows the data.
      • Everybody trusts the data.
      • Everybody talks about the data.

      “It is not enough for companies to embrace modern data architectures, agile methodologies, and integrated business-data teams, or to establish centers of excellence to accelerate data initiatives, when only about 1 in 4 executives reported that their organization has successfully forged a data culture.”– Randy Bean, 2020

      Data literacy is an essential part of a data-driven culture

      • In a data-driven culture, decisions are made based on data evidence, not on gut instinct.
      • Data often has untapped potential. A data-driven culture builds tools and skills, builds users’ trust in the condition and sources of data, and raises the data skills and understanding among their people on the front lines.
      • Building a data culture takes an ongoing investment of time, effort, and money. This investment will not achieve the transformation you want without data literacy at the grassroots level.

      Data-driven culture = “data matters to our company”

      Despite investments in data initiative, organizations are carrying high levels of data debt

      Data debt is “the accumulated cost that is associated with the sub-optimal governance of data assets in an enterprise, like technical debt.”

      Data debt is a problem for 78% of organizations.

      40% of organizations say individuals within the business do not trust data insights.

      66% of organizations say a backlog of data debt is impacting new data management initiatives.

      33% of organizations are not able to get value from a new system or technology investment.

      30% of organizations are unable to become data-driven.

      Source: Experian, 2020

      Absent or sub-optimal data governance leads to data debt

      Only 3% of companies’ data meets basic quality standards. (Source: Nagle, et al., 2017)

      Organizations suspect 28% of their customer and prospect data is inaccurate in some way. (Source: Experian, 2020)

      Only 51% of organizations consider the current state of their CRM or ERP data to be clean, allowing them to fully leverage it. (Source: Experian, 2020)

      35% of organizations say they’re not able to see a ROI for data management initiatives. (Source: Experian, 2020)

      Embrace the technology

      Make the available data governance tools and technology work for you:

      • Data catalog
      • Business data glossary
      • Data lineage
      • Metadata management

      While data governance tools and technologies are no panacea, leverage their automated and AI-enabled capabilities to augment your data governance program.

      Logos of data governance tools and technology.

      Measure success to demonstrate tangible business value

      Put data governance into the context of the business:

      • Tie the value of data governance and its initiatives back to the business capabilities that are enabled.
      • Leverage the KPIs of those business capabilities to demonstrate tangible and measurable value. Use terms and language that will resonate with senior leadership.

      Don’t let measurement be an afterthought:

      Start substantiating early on how you are going to measure success as your data governance program evolves.

      Build a right-sized roadmap

      Formulate an actionable roadmap that is right-sized to deliver value in your organization.

      Key considerations:

      • When building your data governance roadmap, ensure you do so through an enterprise lens. Be cognizant of other initiatives that might be coming down the pipeline that may require you to align your data governance milestones accordingly.
      • Apart from doing your planning with consideration for other big projects or launches that might be in-flight and require the time and attention of your data governance partners, also be mindful of the more routine yet still demanding initiatives.
      • When doing your roadmapping, consider factors like the organization’s fiscal cycle, typical or potential year-end demands, and monthly/quarterly reporting periods and audits. Initiatives such as these are likely to monopolize the time and focus of personnel key to delivering on your data governance milestones.

      Sample milestones:

      Data Governance Leadership & Org Structure Definition

      Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.

      Data Governance Charter and Policies

      Create a charter for your program and build/refresh associated policies.

      Data Culture Diagnostic

      Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.

      Use Case Build and Prioritization

      Build a use case that is tied to business capabilities. Prioritize accordingly.

      Business Data Glossary

      Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.

      Tools & Technology

      Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).

      Key takeaways for effective business-driven data governance

      Data governance leadership and sponsorship is key.

      Ensure strategic business alignment.

      Build and foster a culture of data excellence.

      Evolve along the data journey.

      Make data governance an enabler, not a hindrance.

      Insight summary

      Overarching insight

      Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the impact of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.

      Insight 1

      Data governance should not sit as an island in your organization. It must continuously align with the organization’s enterprise governance function. It shouldn’t be perceived as a pet project of IT, but rather as an enterprise-wide, business-driven initiative.

      Insight 2

      Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture. Leverage the measures of success or KPIs of the underlying business capabilities to demonstrate the value data governance has yielded for the organization.

      Insight 3

      Data governance remains the foundation of all forms of reporting and analytics. Advanced capabilities such as AI and machine learning require effectively governed data to fuel their success.

      Tactical insight

      Tailor your data literacy program to meet your organization’s needs, filling your range of knowledge gaps and catering to your different levels of stakeholders. When it comes to rolling out a data literacy program, there is no one-size-fits-all solution. Your data literacy program is intended to fill the knowledge gaps about data, as they exist in your organization. It should be targeted across the board – from your executive leadership and management through to the subject matter experts across different lines of the business in your organization.

      Info-Tech’s methodology for establishing data governance

      1. Build Business and User Context 2. Understand Your Current Data Governance Capabilities 3. Build a Target State Roadmap and Plan
      Phase Steps
      1. Substantiate Business Drivers
      2. Build High-Value Use Cases for Data Governance
      1. Understand the Key Components of Data Governance
      2. Gauge Your Organization’s Current Data Culture
      1. Formulate an Actionable Roadmap and Right-Sized Plan
      Phase Outcomes
      • Your organization’s business capabilities and value streams
      • A business capability map for your organization
      • Categorization of your organization’s key capabilities
      • A strategy map tied to data governance
      • High-value use cases for data governance
      • An understanding of the core components of an effective data governance program
      • An understanding your organization’s current data culture
      • A data governance roadmap and target-state plan comprising of prioritized initiatives

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Screenshot of Info-Tech's Data Governance Planning and Roadmapping Workbook data-verified=

      Data Governance Planning and Roadmapping Workbook

      Use the Data Governance Planning and Roadmapping Workbook as you plan, build, roll-out, and scale data governance in your organization.

      Screenshot of Info-Tech's Data Use Case Framework Template

      Data Use Case Framework Template

      This template takes you through a business needs gathering activity to highlight and create relevant use cases around the organization’s data-related problems and opportunities.

      Screenshot of Info-Tech's Business Data Glossary data-verified=

      Business Data Glossary

      Use this template to document the key data assets that are to be governed and create a data flow diagram for your organization.

      Screenshot of Info-Tech's Data Culture Diagnostic and Scorecard data-verified=

      Data Culture Diagnostic and Scorecard

      Leverage Info-Tech’s Data Culture Diagnostic to understand how your organization scores across 10 areas relating to data culture.

      Key deliverable:

      Data Governance Planning and Roadmapping Workbook

      Measure the value of this blueprint

      Leverage this blueprint’s approach to ensure your data governance initiatives align and support your key value streams and their business capabilities.

      • Aligning your data governance program and its initiatives to your organization’s business capabilities is vital for tracing and demonstrating measurable business value for the program.
      • This alignment of data governance with value streams and business capabilities enables you to use business-defined KPIs and demonstrate tangible value.
      Screenshot from this blueprint on the Measurable Business Value

      In phases 1 and 2 of this blueprint, we will help you establish the business context, define your business drivers and KPIs, and understand your current data governance capabilities and strengths.

      In phase 3, we will help you develop a plan and a roadmap for addressing any gaps and improving the relevant data governance capabilities so that data is well positioned to deliver on those defined business metrics.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team, has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Establish Data Governance project overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      1. Build Business and User context2. Understand Your Current Data Governance Capabilities3. Build a Target State Roadmap and Plan
      Best-Practice Toolkit
      1. Substantiate Business Drivers
      2. Build High-Value Use Cases for Data Governance
      1. Understand the Key Components of Data Governance
      2. Gauge Your Organization’s Current Data Culture
      1. Formulate an Actionable Roadmap and Right-Sized Plan
      Guided Implementation
      • Call 1
      • Call 2
      • Call 3
      • Call 4
      • Call 5
      • Call 6
      • Call 7
      • Call 8
      • Call 9
      Phase Outcomes
      • Your organization’s business capabilities and value streams
      • A business capability map for your organization
      • Categorization of your organization’s key capabilities
      • A strategy map tied to data governance
      • High-value use cases for data governance
      • An understanding of the core components of an effective data governance program
      • An understanding your organization’s current data culture
      • A data governance roadmap and target-state plan comprising of prioritized initiatives

      Guided Implementation

      What does a typical GI on this topic look like?

      An outline of what guided implementation looks like.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Workshop overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4
      Establish Business Context and Value Understand Current Data Governance Capabilities and Plot Target-State Levels Build Data Domain to Data Governance Role Mapping Formulate a Plan to Get to Your Target State
      Activities
      • Establish business context, value, and scope of data governance at the organization
      • Introduction to Info-Tech’s data governance framework
      • Discuss vision and mission for data governance
      • Understand your business architecture, including your business capability map and value streams
      • Build use cases aligned to core business capabilities
      • Understand your current data governance capabilities and maturity
      • Set target state data governance capabilities
      • Evaluate and prioritize performance gaps
      • Develop and consolidate data governance target-state initiatives
      • Define the role of data governance: data domain to data governance role mapping
      • Identify and prioritize next steps
      • Define roles and responsibilities and complete a high-level RACI
      • Wrap-up and discuss next steps and post-workshop support
      Deliverables
      1. Sample use cases (tied to the business capability map) and a repeatable use case framework
      2. Vision and mission for data governance
      1. Current state of data governance maturity
      2. Definition of target state
      1. Target-state data governance initiatives
      2. Data domain to data governance role mapping
      1. Initialized roadmap
      2. Initialized RACI

      Phase 1

      Build Business and User Context

      Three circles are in the image that list the three phases and the main steps. Phase 1 is highlighted.

      “When business users are invited to participate in the conversation around data with data users and IT, it adds a fundamental dimension — business context. Without a real understanding of how data ties back to the business, the value of analysis and insights can get lost.” – Jason Lim, Alation

      This phase will guide you through the following activities:

      • Identify Your Business Capabilities
      • Define your Organization’s Key Business Capabilities
      • Develop a Strategy Map that Aligns Business Capabilities to Your Strategic Focus

      This phase involves the following participants:

      • Data Governance Leader/Data Leader (CDO)
      • Senior Business Leaders
      • Business SMEs
      • Data Leadership, Data Owners, Data Stewards and Custodians

      Step 1.1

      Substantiate Business Drivers

      Activities

      1.1.1 Identify Your Business Capabilities

      1.1.2 Categorize Your Organization’s Key Business Capabilities

      1.1.3 Develop a Strategy Map Tied to Data Governance

      This step will guide you through the following activities:

      • Leverage your organization’s existing business capability map or initiate the formulation of a business capability map, guided by info-Tech’s approach
      • Determine which business capabilities are considered high priority by your organization
      • Map your organization’s strategic objectives to value streams and capabilities to communicate how objectives are realized with the support of data

      Outcomes of this step

      • A foundation for data governance initiative planning that’s aligned with the organization’s business architecture: value streams, business capability map, and strategy map

      Info-Tech Insight

      Gaining a sound understanding of your business architecture (value streams and business capabilities) is a critical foundation for establishing and sustaining a data governance program that delivers measurable business value.

      1.1.1 Identify Your Business Capabilities

      Confirm your organization's existing business capability map or initiate the formulation of a business capability map:

      • If you have an existing business capability map, meet with the relevant business owners/stakeholders to confirm that the content is accurate and up to date. Confirm the value streams (how your organization creates and captures value) and their business capabilities are reflective of the organization’s current business environment.
      • If you do not have an existing business capability map, follow this activity to initiate the formulation of a map (value streams and related business capabilities):
        1. Define the organization’s value streams. Meet with senior leadership and other key business stakeholders to define how your organization creates and captures value.
        2. Define the relevant business capabilities. Meet with senior leadership and other key business stakeholders to define the business capabilities.

      Note: A business capability defines what a business does to enable value creation. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome.

      Input

      • List of confirmed value streams and their related business capabilities

      Output

      • Business capability map with value streams for your organization

      Materials

      • Your existing business capability map or the template provided in the Data Governance Planning and Roadmapping Workbook accompanying this blueprint

      Participants

      • Key business stakeholders
      • Data stewards
      • Data custodians
      • Data Governance Working Group

      For more information, refer to Info-Tech’s Document Your Business Architecture.

      Define or validate the organization’s value streams

      Value streams connect business goals to the organization’s value realization activities. These value realization activities, in turn, depend on data.

      If the organization does not have a business architecture function to conduct and guide Activity 1.1.1, you can leverage the following approach:

      • Meet with key stakeholders regarding this topic, then discuss and document your findings.
      • When trying to identify the right stakeholders, consider: Who are the decision makers and key influencers? Who will impact this piece of business architecture related work? Who has the relevant skills, competencies, experience, and knowledge about the organization?
      • Engage with these stakeholders to define and validate how the organization creates value.
      • Consider:
        • Who are your main stakeholders? This will depend on the industry in which you operate. For example, customers, residents, citizens, constituents, students, patients.
        • What are your stakeholders looking to accomplish?
        • How does your organization’s products and/or services help them accomplish that?
        • What are the benefits your organization delivers to them and how does your organization deliver those benefits?
        • How do your stakeholders receive those benefits?

      Align data governance to the organization's value realization activities.

      Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Info-Tech Insight

      Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the possibilities of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, negative impact to reputation and brand, and/or increased exposure to business risk.

      Example of value streams – Retail Banking

      Value streams connect business goals to the organization’s value realization activities.

      Example value stream descriptions for: Retail Banking

      Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for retail banking.

      For this value stream, download Info-Tech’s Info-Tech’s Industry Reference Architecture for Retail Banking.

      Example of value streams – Higher Education

      Value streams connect business goals to the organization’s value realization activities.

      Example value stream descriptions for: Higher Education

      Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for higher education

      For this value stream, download Info-Tech’s Industry Reference Architecture for Higher Education.

      Example of value streams – Local Government

      Value streams connect business goals to the organization’s value realization activities.

      Example value stream descriptions for: Local Government

      Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for local government

      For this value stream, download Info-Tech’s Industry Reference Architecture for Local Government.

      Example of value streams – Manufacturing

      Value streams connect business goals to the organization’s value realization activities.

      Example value stream descriptions for: Manufacturing

      Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for manufacturing

      For this value stream, download Info-Tech’s Industry Reference Architecture for Manufacturing.

      Example of value streams – Retail

      Value streams connect business goals to the organization’s value realization activities.

      Example value stream descriptions for: Retail

      Model example of value streams for retail

      Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      For this value stream, download Info-Tech’s Industry Reference Architecture for Retail.

      Define the organization’s business capabilities in a business capability map

      A business capability defines what a business does to enable value creation. Business capabilities represent stable business functions and typically will have a defined business outcome.

      Business capabilities can be thought of as business terms defined using descriptive nouns such as “Marketing” or “Research and Development.”

      If your organization doesn’t already have a business capability map, you can leverage the following approach to build one. This initiative requires a good understanding of the business. By working with the right stakeholders, you can develop a business capability map that speaks a common language and accurately depicts your business.

      Working with the stakeholders as described above:

      • Analyze the value streams to identify and describe the organization’s capabilities that support them.
      • Consider: What is the objective of your value stream? (This can highlight which capabilities support which value stream.)
      • As you initiate your engagement with your stakeholders, don’t start a blank page. Leverage the examples on the next slides as a starting point for your business capability map.
      • When using these examples, consider: What are the activities that make up your particular business? Keep the ones that apply to your organization, remove the ones that don’t, and add any needed.

      Align data governance to the organization's value realization activities.

      Info-Tech Insight

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.

      For more information, refer to Info-Tech’s Document Your Business Architecture.

      Example business capability map – Retail Banking

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Retail Banking

      Model example business capability map for retail banking

      For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail Banking.

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Higher Education

      Model example business capability map for higher education

      For this business capability map, download Info-Tech’s Industry Reference Architecture for Higher Education.

      Example business capability map – Local Government

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Local Government

      Model example business capability map for local government

      For this business capability map, download Info-Tech’s Industry Reference Architecture for Local Government.

      Example business capability map – Manufacturing

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Manufacturing

      Model example business capability map for manufacturing

      For this business capability map, download Info-Tech’s Industry Reference Architecture for Manufacturing.

      Example business capability map - Retail

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Retail

      Model example business capability map for retail

      For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.

      1.1.2 Categorize Your Organization’s Key Capabilities

      Determine which capabilities are considered high priority in your organization.

      1. Categorize or heatmap the organization’s key capabilities. Consult with senior and other key business stakeholders to categorize and prioritize the business’ capabilities. This will aid in ensuring your data governance future state planning is aligned with the mandate of the business. One approach to prioritizing capabilities with business stakeholders is to examine them through the lens of cost advantage creators, competitive advantage differentiators, and/or by high value/high risk.
      2. Identify cost advantage creators. Focus on capabilities that drive a cost advantage for your organization. Highlight these capabilities and prioritize programs that support them.
      3. Identify competitive advantage differentiators. Focus on capabilities that give your organization an edge over rivals or other players in your industry.

      This categorization/prioritization exercise helps highlight prime areas of opportunity for building use cases, determining prioritization, and the overall optimization of data and data governance.

      Input

      • Strategic insight from senior business stakeholders on the business capabilities that drive value for the organization

      Output

      • Business capabilities categorized and prioritized (e.g. cost advantage creators, competitive advantage differentiators, high value/high risk)

      Materials

      • Your existing business capability map or the business capability map derived in the previous activity

      Participants

      • Key business stakeholders
      • Data stewards
      • Data custodians
      • Data Governance Working Group

      For more information, refer to Info-Tech’s Document Your Business Architecture.

      Example of business capabilities categorization or heatmapping – Retail

      This exercise is useful in ensuring the data governance program is focused and aligned to support the priorities and direction of the business.

      • Depending on the mandate from the business, priority may be on developing cost advantage. Hence the capabilities that deliver efficiency gains are the ones considered to be cost advantage creators.
      • The business’ priority may be on maintaining or gaining a competitive advantage over its industry counterparts. Differentiation might be achieved in delivering unique or enhanced products, services, and/or experiences, and the focus will tend to be on the capabilities that are more end-stakeholder-facing (e.g. customer-, student-, patient,- and/or constituent-facing). These are the organization’s competitive advantage creators.

      Example: Retail

      Example of business capabilities categorization or heatmapping – Retail

      For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.

      1.1.3 Develop a Strategy Map Tied to Data Governance

      Identify the strategic objectives for the business. Knowing the key strategic objectives will drive business-data governance alignment. It’s important to make sure the right strategic objectives of the organization have been identified and are well understood.

      1. Meet with senior business leaders and other relevant stakeholders to help identify and document the key strategic objectives for the business.
      2. Leverage their knowledge of the organization’s business strategy and strategic priorities to visually represent how these map to value streams, business capabilities, and, ultimately, to data and data governance needs and initiatives. Tip: Your map is one way to visually communicate and link the business strategy to other levels of the organization.
      3. Confirm the strategy mapping with other relevant stakeholders.

      Guide to creating your map: Starting with strategic objectives, map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance to initiatives that support those capabilities. This is one approach to help you prioritize the data initiatives that deliver the most value to the organization.

      Input

      • Strategic objectives as outlined by the organization’s business strategy and confirmed by senior leaders

      Output

      • A strategy map that maps your organizational strategic objectives to value streams, business capabilities, and, ultimately, to data program

      Materials

      Participants

      • Key business stakeholders
      • Data stewards
      • Data custodians
      • Data Governance Working Group

      Download Info-Tech’s Data Governance Planning and Roadmapping Workbook

      Example of a strategy map tied to data governance

      • Strategic objectives are the outcomes that the organization is looking to achieve.
      • Value streams enable an organization to create and capture value in the market through interconnected activities that support strategic objectives.
      • Business capabilities define what a business does to enable value creation in value streams.
      • Data capabilities and initiatives are descriptions of action items on the data and data governance roadmap and which will enable one or multiple business capabilities in its desired target state.

      Info-Tech Tip:

      Start with the strategic objectives, then map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance initiatives that support those capabilities. This process will help you prioritize the data initiatives that deliver the most value to the organization.

      Example: Retail

      Example of a strategy map tied to data governance for retail

      For this strategy map, download Info-Tech’s Industry Reference Architecture for Retail.

      Step 1.2

      Build High-Value Use Cases for Data Governance

      Activities

      1.2.1 Build High-Value Use Cases

      This step will guide you through the following activities:

      • Leveraging your categorized business capability map to conduct deep-dive sessions with key business stakeholders for creating high-value uses cases
      • Discussing current challenges, risks, and opportunities associated with the use of data across the lines of business
      • Exploring which other business capabilities, stakeholder groups, and business units will be impacted

      Outcomes of this step

      • Relevant use cases that articulate the data-related challenges, needs, or opportunities that are clear and contained and, if addressed ,will deliver value to the organization

      Info-Tech Tip

      One of the most important aspects when building use cases is to ensure you include KPIs or measures of success. You have to be able to demonstrate how the use case ties back to the organizational priorities or delivers measurable business value. Leverage the KPIs and success factors of the business capabilities tied to each particular use case.

      1.2.1 Build High-Value Use Cases

      This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization.

      1. Bring together key business stakeholders (data owner, stewards, SMEs) from a particular line of business as well as the relevant data custodian(s) to build cases for their units. Leverage the business capability map you created for facilitating this act.
      2. Leverage Info-Tech’s framework for data requirements and methodology for creating use cases, as outlined in the Data Use Case Framework Template and seen on the next slide.
      3. Have the stakeholders move through each breakout session outlined in the Use Case Worksheet. Use flip charts or a whiteboard to brainstorm and document their thoughts.
      4. Debrief and document results in the Data Use Case Framework Template
      5. Repeat this exercise with as many lines of the business as possible, leveraging your business capability map to guide your progress and align with business value.

      Tip: Don’t conclude these use case discussions without substantiating what measures of success will be used to demonstrate the business value of the effort to produce the desired future state, as relevant to each particular use case.

      Input

      • Value streams and business capabilities as defined by business leaders
      • Business stakeholders’ subject area expertise
      • Data custodian systems, integration, and data knowledge

      Output

      • Use cases that articulate data-related challenges, needs or opportunities that are tied to defined business capabilities and hence if addressed will deliver measurable value to the organization.

      Materials

      • Your business capability map from activity 1.1.1
      • Info-Tech’s Data Use Case Framework Template
      • Whiteboard or flip charts (or shared screen if working remotely)
      • Markers/pens

      Participants

      • Key business stakeholders
      • Data stewards and business SMEs
      • Data custodians
      • Data Governance Working Group

      Download Info-Tech’s Data Use Case Framework Template

      Info-Tech’s Framework for Building Use Cases

      Objective: This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization.

      Leveraging your business capability map, build use cases that align with the organization’s key business capabilities.

      Consider:

      • Is the business capability a cost advantage creator or an industry differentiator?
      • Is the business capability currently underserved by data?
      • Does this need to be addressed? If so, is this risk- or value-driven?

      Info-Tech’s Data Requirements and Mapping Methodology for Creating Use Cases

      1. What business capability (or capabilities) is this use case tied to for your business area(s)?
      2. What are your data-related challenges in performing this today?
      3. What are the steps in this process/activity today?
      4. What are the applications/systems used at each step today?
      5. What data domains are involved, created, used, and/or transformed at each step today?
      6. What does an ideal or improved state look like?
      7. What other business units, business capabilities, activities, and/or processes will be impacted or improved if this issue was solved?
      8. Who are the stakeholders impacted by these changes? Who needs to be consulted?
      9. What are the risks to the organization (business capability, revenue, reputation, customer loyalty, etc.) if this is not addressed?
      10. What compliance, regulatory, and/or policy concerns do we need to consider in any solution?
      11. What measures of success or change should we use to prove the value of the effort (such as KPIs, ROI)? What is the measurable business value of doing this?

      The resulting use cases are to be prioritized and leveraged for informing the business case and the data governance capabilities optimization plan.

      Taken from Info-Tech’s Data Use Case Framework Template

      Phase 2

      Understand Your Current Data Governance Capabilities

      Three circles are in the image that list the three phases and the main steps. Phase 2 is highlighted.

      This phase will guide you through the following activities:

      • Understand the Key Components of Data Governance
      • Gauge Your Organization’s Current Data Culture

      This phase involves the following participants:

      • Data Leadership
      • Data Ownership & Stewardship
      • Policies & Procedures
      • Data Literacy & Culture
      • Operating Model
      • Data Management
      • Data Privacy & Security
      • Enterprise Projects & Services

      Step 2.1

      Understand the Key Components of Data Governance

      This step will guide you through the following activities:

      • Understanding the core components of an effective data governance program and determining your organization’s current capabilities in these areas:
        • Data Leadership
        • Data Ownership & Stewardship
        • Policies & Procedures
        • Data Literacy & Culture
        • Operating Model
        • Data Management
        • Data Privacy & Security
        • Enterprise Projects & Services

      Outcomes of this step

      • An understanding the core components of an effective data governance program
      • An understanding your organization’s current data governance capabilities

      Review: Info-Tech’s Data Governance Framework

      An image of Info-Tech's Data Governance Framework

      Key components of data governance

      A well-defined data governance program will deliver:

      • Defined accountability and responsibility for data.
      • Improved knowledge and common understanding of the organization’s data assets.
      • Elevated trust and confidence in traceable data.
      • Improved data ROI and reduced data debt.
      • An enabling framework for supporting the ethical use and handling of data.
      • A foundation for building and fostering a data-driven and data-literate organizational culture.

      The key components of establishing sustainable enterprise data governance, taken from Info-Tech’s Data Governance Framework:

      • Data Leadership
      • Data Ownership & Stewardship
      • Operating Model
      • Policies & Procedures
      • Data Literacy & Culture
      • Data Management
      • Data Privacy & Security
      • Enterprise Projects & Services

      Data Leadership

      • Data governance needs a dedicated head or leader to steer the organization’s data governance program.
      • For organizations that do have a chief data officer (CDO), their office is the ideal and effective home for data governance.
      • Heads of data governance also have titles such as director of data governance, director of data quality, and director of analytics.
      • The head of your data governance program works with all stakeholders and partners to ensure there is continuous enterprise governance alignment and oversight and to drive the program’s direction.
      • While key stakeholders from the business and IT will play vital data governance roles, the head of data governance steers the various components, stakeholders, and initiatives, and provides oversight of the overall program.
      • Vital data governance roles include: data owners, data stewards, data custodians, data governance steering committee (or your organization’s equivalent), and any data governance working group(s).

      The role of the CDO: the voice of data

      The office of the chief data officer (CDO):

      • Has a cross-organizational vision and strategy for data.
      • Owns and drives the data strategy; ensures it supports the overall organizational strategic direction and business goals.
      • Leads the organizational data initiatives, including data governance
      • Is accountable for the policy, strategy, data standards, and data literacy necessary for the organization to operate effectively.
      • Educates users and leaders about what it means to be “data-driven.”
      • Builds and fosters a culture of data excellence.

      “Compared to most of their C-suite colleagues, the CDO is faced with a unique set of problems. The role is still being defined. The chief data officer is bringing a new dimension and focus to the organization: ‘data.’ ”

      – Carruthers and Jackson, 2020

      Who does the CDO report to?

      Example reporting structure.
      • The CDO should be a true C- level executive.
      • Where the organization places the CDO role in the structure sends an important signal to the business about how much it values data.

      “The title matters. In my opinion, you can’t have a CDO without executive authority. Otherwise no one will listen.”

      – Anonymous European CDO

      “The reporting structure depends on who’s the ‘glue’ that ties together all these uniquely skilled individuals.”

      – John Kemp, Senior Director, Executive Services, Info-Tech Research Group

      Data Ownership & Stewardship

      Who are best suited to be data owners?

      • Wherever they may sit in your organization, data owners will typically have the highest stake in that data.
      • Data owners need to be suitably senior and have the necessary decision-making power.
      • They have the highest interest in the related business data domain, whether they are the head of a business unit or the head of a line of business that produces data or consumes data (or both).
      • If they are neither of these, it’s unlikely they will have the interest in the data (in terms of its quality, protection, ethical use, and handling, for instance) necessary to undertake and adopt the role effectively.

      Data owners are typically senior business leaders with the following characteristics:

      • Positioned to accept accountability for their data domain.
      • Hold authority and influence to affect change, including across business processes and systems, needed to improve data quality, use, handling, integration, etc.
      • Have access to a budget and resources for data initiatives such as resolving data quality issues, data cleansing initiatives, business data catalog build, related tools and technology, policy management, etc.
      • Hold the influence needed to drive change in behavior and culture.
      • Act as ambassadors of data and its value as an organizational strategic asset.

      Right-size your data governance organizational structure

      • Most organizations strive to identify roles and responsibilities at a strategic and operational level. Several factors will influence the structure of the program such as the focus of the data governance project as well as the maturity and size of the organization.
      • Your data governance structure has to work for your organization, and it has to evolve as the organization evolves.
      • Formulate your blend of data governance roles, committees, councils, and cross-functional groups, that make sense for your organization.
      • Your data governance organizational structure should not add complexity or bureaucracy to your organization’s data landscape; it should support and enable your principle of treating data as an asset.

      There is no one-size-fits-all data governance organizational structure.

      Example of a Data Governance Organizational Structure

      Critical roles and responsibilities for data governance

      Data Governance Working Groups

      Data governance working groups:

      • Are cross-functional teams
      • Deliver on data governance projects, initiatives, and ad hoc review committees.

      Data Stewards

      Traditionally, data stewards:

      • Serve on an operational level addressing issues related to adherence to standards/procedures, monitoring data quality, raising issues identified, etc.
      • Are responsible for managing access, quality, escalating issues, etc.

      Data Custodians

      • Traditionally, data custodians:
      • Serve on an operational level addressing issues related to data and database administration.
      • Support the management of access, data quality, escalating issues, etc.
      • Are SMEs from IT and database administration.

      Example: Business capabilities to data owner and data stewards mapping for a selected data domain

      Info-Tech Insight

      Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.

      Enabling business capabilities with data governance role definitions

      Example: Business capabilities to data owner and data stewards mapping for a selected data domain

      Operating Model

      Your operating model is the key to designing and operationalizing a form of data governance that delivers measurable business value to your organization.

      “Generate excitement for data: When people are excited and committed to the vision of data enablement, they’re more likely to help ensure that data is high quality and safe.” – Petzold, et al., 2020

      Operating Model

      Defining your data governance operating model will help create a well-oiled program that sustainably delivers value to the organization and manages risks while building and fostering a culture of data excellence along the way. Some organizations are able to establish a formal data governance office, whether independent or attached to the office of the chief data officer. Regardless of how you are organized, data governance requires a home, a leader, and an operating model to ensure its sustainability and evolution.

      Examples of focus areas for your operating model:

      • Delivery: While there are core tenets to every data governance program, there is a level of variability in the implementation of data governance programs across organizations, sectors, and industries. Every organization has its own particular drivers and mandates, so the level and rigor applied will also vary.
      • The key is to determine what style will work best in your organization, taking into consideration your organizational culture, executive leadership support (present and ongoing), catalysts such as other enterprise-wide transformative and modernization initiatives, and/or regulatory and compliances drivers.

      • Communication: Communication is vital across all levels and stakeholder groups. For instance, there needs to be communication from the data governance office up to senior leadership, as well as communication within the data governance organization, which is typically made up of the data governance steering committee, data governance council, executive sponsor/champion, data stewards, and data custodians and working groups.
      • Furthermore, communication with the wider organization of data producers, users, and consumers is one of the core elements of the overall data governance communications plan.

      Communication is vital for ensuring acceptance of new processes, rules, guidelines, and technologies by all data producers and users as well as for sharing success stories of the program.

      Operating Model

      Tie the value of data governance and its initiatives back to the business capabilities that are enabled.

      “Leading organizations invest in change management to build data supporters and convert the skeptics. This can be the most difficult part of the program, as it requires motivating employees to use data and encouraging producers to share it (and ideally improve its quality at the source)[.]” – Petzold, et al., 2020

      Operating Model

      Examples of focus areas for your operating model (continued):

      • Change management and issue resolution: Data governance initiatives will very likely bring about a level of organizational disruption, with governance recommendations and future state requiring potentially significant business change. This may include a redesign of a substantial number of data processes affecting various business units, which will require tweaking the organization’s culture, thought processes, and procedures surrounding its data.
      • Preparing people for change well in advance will allow them to take the steps necessary to adapt and reduce potential confrontation. By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.

        Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.

      • Performance measuring, monitoring and reporting: Measuring and reporting on performance, successes, and realization of tangible business value are a must for sustaining, growing, and scaling your data governance program.
      • Aligning your data governance to the organization's value realization activities enables you to leverage the KPIs of those business capabilities to demonstrate tangible and measurable value. Use terms and language that will resonate with your senior business leadership.

      Info-Tech Tip:

      Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.

      Policies, Procedures & Standards

      “Data standards are the rules by which data are described and recorded. In order to share, exchange, and understand data, we must standardize the format as well as the meaning.” – U.S. Geological Survey

      Policies, Procedures & Standards

      • When defining, updating, or refreshing your data policies, procedures, and standards, ensure they are relevant, serve a purpose, and/or support the use of data in the organization.
      • Avoid the common pitfall of building out a host of policies, procedures, and standards that are never used or followed by users and therefore don’t bring value or serve to mitigate risk for the organization.
      • Data policies can be thought of as formal statements and are typically created, approved, and updated by the organization’s data decision-making body (such as a data governance steering committee).
      • Data standards and procedures function as actions, or rules, that support the policies and their statements.
      • Standards and procedures are designed to standardize the processes during the overall data lifecycle. Procedures are instructions to achieve the objectives of the policies. The procedures are iterative and will be updated with approval from your data governance committee as needed.
      • Your organization’s data policies, standards, and procedures should not bog down or inhibit users; rather, they should enable confident data use and handling across the overall data lifecycle. They should support more effective and seamless data capture, integration, aggregation, sharing, and retention of data in the organization.

      Examples of data policies:

      • Data Classification Policy
      • Data Retention Policy
      • Data Entry Policy
      • Data Backup Policy
      • Data Provenance Policy
      • Data Management Policy

      Data Domain Documentation

      Select the correct granularity for your business need

      Diagram of data domain documentation
      Sources: Dataversity; Atlan; Analytics8

      Data Domain Documentation Examples

      Data Domain Documentation Examples

      Data Culture

      “Organizational culture can accelerate the application of analytics, amplify its power, and steer companies away from risky outcomes.” – Petzold, et al., 2020

      A healthy data culture is key to amplifying the power of your data and to building and sustaining an effective data governance program.

      What does a healthy data culture look like?

      • Everybody knows the data.
      • Everybody trusts the data.
      • Everybody talks about the data.

      Building a culture of data excellence.

      Leverage Info-Tech’s Data Culture Diagnostic to understand your organization’s culture around data.

      Screenshot of Data Culture Scorecard

      Contact your Info-Tech Account Representative for more information on the Data Culture Diagnostic

      Cultivating a data-driven culture is not easy

      “People are at the heart of every culture, and one of the biggest challenges to creating a data culture is bringing everyone into the fold.” – Lim, Alation

      It cannot be purchased or manufactured,

      It must be nurtured and developed,

      And it must evolve as the business, user, and data landscapes evolve.

      “Companies that have succeeded in their data-driven efforts understand that forging a data culture is a relentless pursuit, and magic bullets and bromides do not deliver results.” – Randy Bean, 2020

      Hallmarks of a data-driven culture

      There is a trusted, single source of data the whole company can draw from.

      There’s a business glossary and data catalog and users know what the data fields mean.

      Users have access to data and analytics tools. Employees can leverage data immediately to resolve a situation, perform an activity, or make a decision – including frontline workers.

      Data literacy, the ability to collect, manage, evaluate, and apply data in a critical manner, is high.

      Data is used for decision making. The company encourages decisions based on objective data and the intelligent application of it.

      A data-driven culture requires a number of elements:

      • High-quality data
      • Broad access and data literacy
      • Data-driven decision-making processes
      • Effective communication

      Data Literacy

      Data literacy is an essential part of a data-driven culture.

      • Building a data-driven culture takes an ongoing investment of time, effort, and money.
      • This investment will not realize its full return without building up the organization’s data literacy.
      • Data literacy is about filling data knowledge gaps across all levels of the organization.
      • It’s about ensuring all users – senior leadership right through to core users – are equipped with appropriate levels of training, skills, understanding, and awareness around the organization’s data and the use of associated tools and technologies. Data literacy ensures users have the data they need and they know how to interpret and leverage it.
      • Data literacy drives the appetite, demand, and consumption for data.
      • A data-literate culture is one where the users feel confident and skilled in their use of data, leveraging it for making informed or evidence-based decisions and generating insights for the organization.

      Data Management

      • Data governance serves as an enabler to all of the core components that make up data management:
        • Data quality management
        • Data architecture management
        • Data platform
        • Data integration
        • Data operations management
        • Data risk management
        • Reference and master data management (MDM)
        • Document and content management
        • Metadata management
        • Business intelligence (BI), reporting, analytics and advanced analytics, artificial intelligence (AI), machine learning (ML)
      • Key tools such as the business data glossary and data catalog are vital for operationalizing data governance and in supporting data management disciplines such as data quality management, metadata management, and MDM as well as BI, reporting, and analytics.

      Enterprise Projects & Services

      • Data governance serves as an enabler to enterprise projects and services that require, use, share, sell, and/or rely on data for their viability and, ultimately, their success.
      • Folding or embedding data governance into the organization’s project management function or project management office (PMO) serves to ensure that, for any initiative, suitable consideration is given to how data is treated.
      • This may include defining parameters, following standards and procedures around bringing in new sources of data, integrating that data into the organization’s data ecosystem, using and sharing that data, and retaining that data post-project completion.
      • The data governance function helps to identify and manage any ethical issues, whether at the start of the project and/or throughout.
      • It provides a foundation for asking relevant questions as it relates to the use or incorporation of data in delivering the specific project or service. Do we know where the data obtained from? Do we have rights to use that data? Are there legislations, policies, or regulations that guide or dictate how that data can be used? What are the positive effects, negative impacts, and/or risks associated with our intended use of that data? Are we positioned to mitigate those risks?
      • Mature data governance creates organizations where the above considerations around data management and the ethical use and handling of data is routinely implemented across the business and in the rollout and delivery of projects and services.

      Data Privacy & Security

      • Data governance supports the organization’s data privacy and security functions.
      • Key tools include the data classification policy and standards and defined roles around data ownership and data stewardship. These are vital for operationalizing data governance and supporting data privacy, security, and the ethical use and handling of data.
      • While some organizations may have a dedicated data security and privacy group, data governance provides an added level of oversight in this regard.
      • Some of the typical checks and balances include ensuring:
        • There are policies and procedures in place to restrict and monitor staff’s access to data (one common way this is done is according to job descriptions and responsibilities) and that these comply with relevant laws and regulations.
        • There’s a data classification scheme in place where data has been classified on a hierarchy of sensitivity (e.g. top secret, confidential, internal, limited, public).
        • The organization has a comprehensive data security framework, including administrative, physical, and technical procedures for addressing data security issues (e.g. password management and regular training).
        • Risk assessments are conducted, including an evaluation of risks and vulnerabilities related to intentional and unintentional misuse of data.
        • Policies and procedures are in place to mitigate the risks associated with incidents such as data breaches.
        • The organization regularly audits and monitors its data security.

      Ethical Use & Handling of Data

      Data governance will support your organization’s ethical use and handling of data by facilitating definition around important factors, such as:

      • What are the various data assets in the organization and what purpose(s) can they be used for? Are there any limitations?
      • Who is the related data owner? Who holds accountability for that data? Who will be answerable?
      • Where was the data obtained from? What is the intended use of that data? Do you have rights to use that data? Are there legislations, policies, or regulations that guide or dictate how that data can be used?
      • What are the positive effects, negative impacts, and/or risks associated with the use of that data?

      Ethical Use & Handling of Data

      • Data governance serves as an enabler to the ethical use and handling of an organization’s data.
      • The Open Data Institute (ODI) defines data ethics as: “A branch of ethics that evaluates data practices with the potential to adversely impact on people and society – in data collection, sharing and use.”
      • Data ethics relates to good practice around how data is collected, used and shared. It’s especially relevant when data activities have the potential to impact people and society, whether directly or indirectly (Open Data Institute, 2019).
      • A failure to handle and use data ethically can negatively impact an organization’s direct stakeholders and/or the public at large, lead to a loss of trust and confidence in the organization's products and services, lead to financial loss, and impact the organization’s brand, reputation, and legal standing.
      • Data governance plays a vital role in building and managing your data assets, knowing what data you have, and knowing the limitations of that data. Data ownership, data stewardship, and your data governance decision-making body are key tenets and foundational components of your data governance. They enable an organization to define, categorize, and confidently make decisions about its data.

      Step 2.2

      Gauge Your Organization’s Current Data Culture

      Activities

      2.2.1 Gauge Your Organization’s Current Data Culture

      This step will guide you through the following activities:

      • Conduct a data culture survey or leverage Info-Tech’s Data Culture Diagnostic to increase your understanding of your organization’s data culture

      Outcomes of this step

      • An understanding of your organizational data culture

      2.2.1 Gauge Your Organization’s Current Data Culture

      Conduct a Data Culture Survey or Diagnostic

      The objectives of conducting a data culture survey are to increase the understanding of the organization's data culture, your users’ appetite for data, and their appreciation for data in terms of governance, quality, accessibility, ownership, and stewardship. To perform a data culture survey:

      1. Identify members of the data user base, data consumers, and other key stakeholders for surveying.
      2. Conduct an information session to introduce Info-Tech’s Data Culture Diagnostic survey. Explain the objective and importance of the survey and its role in helping to understand the organization’s current data culture and inform the improvement of that culture.
      3. Roll out the Info-Tech Data Culture Diagnostic survey to the identified users and stakeholders.
      4. Debrief and document the results and scorecard in the Data Strategy Stakeholder Interview Guide and Findings document.

      Input

      • Email addresses of participants in your organization who should receive the survey

      Output

      • Your organization’s Data Culture Scorecard for understanding current data culture as it relates to the use and consumption of data
      • An understanding of whether data is currently perceived to be an asset to the organization

      Materials

      Screenshot of Data Culture Scorecard

      Participants

      • Participants include those at the senior leadership level through to middle management, as well as other business stakeholders at varying levels across the organization
      • Data owners, stewards, and custodians
      • Core data users and consumers

      Contact your Info-Tech Account Representative for details on launching a Data Culture Diagnostic.

      Phase 3

      Build a Target State Roadmap and Plan

      Three circles are in the image that list the three phases and the main steps. Phase 3 is highlighted.

      “Achieving data success is a journey, not a sprint.” Companies that set a clear course, with reasonable expectations and phased results over a period of time, get to the destination faster.” – Randy Bean, 2020

      This phase will guide you through the following activities:

      • Build your Data Governance Roadmap
      • Develop a target state plan comprising of prioritized initiatives

      This phase involves the following participants:

      • Data Governance Leadership
      • Data Owners/Data Stewards
      • Data Custodians
      • Data Governance Working Group(s)

      Step 3.1

      Formulate an Actionable Roadmap and Right-Sized Plan

      This step will guide you through the following activities:

      • Build your data governance roadmap
      • Develop a target state plan comprising of prioritized initiatives

      Outcomes of this step

      • A foundation for data governance initiative planning that’s aligned with the organization’s business architecture: value streams, business capability map, and strategy map

      Build a right-sized roadmap

      Formulate an actionable roadmap that is right sized to deliver value in your organization.

      Key considerations:

      • When building your data governance roadmap, ensure you do so through an enterprise lens. Be cognizant of other initiatives that might be coming down the pipeline that may require you to align your data governance milestones accordingly.
      • Apart from doing your planning with consideration for other big projects or launches that might be in-flight and require the time and attention of your data governance partners, also be mindful of the more routine yet still demanding initiatives.
      • When doing your roadmapping, consider factors like the organization’s fiscal cycle, typical or potential year-end demands, and monthly/quarterly reporting periods and audits. Initiatives such as these are likely to monopolize the time and focus of personnel key to delivering on your data governance milestones.

      Sample milestones:

      Data Governance Leadership & Org Structure Definition

      Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.

      Data Governance Charter and Policies

      Create a charter for your program and build/refresh associated policies.

      Data Culture Diagnostic

      Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.

      Use Case Build and Prioritization

      Build a use case that is tied to business capabilities. Prioritize accordingly.

      Business Data Glossary/Catalog

      Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.

      Tools & Technology

      Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).

      Recall: Info-Tech’s Data Governance Framework

      An image of Info-Tech's Data Governance Framework

      Build an actionable roadmap

      Data Governance Leadership & Org Structure Division

      Define key roles for getting started.

      Use Case Build & Prioritization

      Start small and then scale – deliver early wins.

      Literacy Program

      Start understanding data knowledge gaps, building the program, and delivering.

      Tools & Technology

      Make the available data governance tools and technology work for you.

      Key components of your data governance roadmap

      By now, you have assessed current data governance environment and capabilities. Use this assessment, coupled with the driving needs of your business, to plot your data Governance roadmap accordingly.

      Sample data governance roadmap milestones:

      • Define data governance leadership.
      • Define and formalize data ownership and stewardship (as well as the role IT/data management will play as data custodians).
      • Build/confirm your business capability map and data domains.
      • Build business data use cases specific to business capabilities.
      • Define business measures/KPIs for the data governance program (i.e. metrics by use case that are relevant to business capabilities).
      • Data management:
        • Build your data glossary or catalog starting with identified and prioritized terms.
        • Define data domains.
      • Design and define the data governance operating model (oversight model definition, communication plan, internal marketing such as townhalls, formulate change management plan, RFP of data governance tool and technology options for supporting data governance and its administration).
      • Data policies and procedures:
        • Formulate, update, refresh, consolidate, rationalize, and/or retire data policies and procedures.
        • Define policy management and administration framework (i.e. roll-out, maintenance, updates, adherence, system to be used).
      • Conduct Info-Tech’s Data Culture Diagnostic or survey (across all levels of the organization).
      • Define and formalize the data literacy program (build modules, incorporate into LMS, plan lunch and learn sessions).
      • Data privacy and security: build data classification policy, define classification standards.
      • Enterprise projects and services: embed data governance in the organization’s PMO, conduct “Data Governance 101” for the PMO.

      Defining data governance roles and organizational structure at Organization

      The approach employed for defining the data governance roles and supporting organizational structure for .

      Key Considerations:

      • The data owner and data steward roles are formally defined and documented within the organization. Their involvement is clear, well-defined, and repeatable.
      • There are data owners and data stewards for each data domain within the organization. The data steward role is given to someone with a high degree of subject matter expertise.
      • Data owners and data stewards are effective in their roles by ensuring that their data domain is clean and free of errors and that they protect the organization against data loss.
      • Data owners and data stewards have the authority to make final decisions on data definitions, formats, and standard processes that apply to their respective data sets. Data owners and data stewards have authority regarding who has access to certain data.
      • Data owners and data stewards are not from the IT side of the organization. They understand the lifecycle of the data (how it is created, curated, retrieved, used, archived, and destroyed) and they are well-versed in any compliance requirements as it relates to their data.
      • The data custodian role is formally defined and is given to the relevant IT expert. This is an individual with technical administrative and/or operational responsibility over data (e.g. a DBA).
      • A data governance steering committee exists and is comprised of well-defined roles, responsibilities, executive sponsors, business representatives, and IT experts.
      • The data governance steering committee works to provide oversight and enforce policies, procedures, and standards for governing data.
      • The data governance working group has cross-functional representation. This comprises business and IT representation, as well as project management and change management where applicable: data stewards, data custodians, business subject matter experts, PM, etc.).
      • Data governance meetings are coordinated and communicated about. The meeting agenda is always clear and concise, and meetings review pressing data-related issues. Meeting minutes are consistently documented and communicated.

      Sample: Business capabilities to data owner and data stewards mapping for a selected data domain

      Info-Tech Insight

      Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.

      Enable business capabilities with data governance role definitions.

      Sample: Business capabilities to data owner and data stewards mapping for a selected data domain

      Consider your technology options:

      Make the available data governance tools and technology work for you:

      • Data catalog
      • Business data glossary
      • Data lineage
      • Metadata management

      Logos of data governance tools and technology.

      These are some of the data governance tools and technology players. Check out SoftwareReviews for help making better software decisions.

      Make the data steward the catalyst for organizational change and driving data culture

      The data steward must be empowered and backed politically with decision-making authority, or the role becomes stale and powerless.

      Ensuring compliance can be difficult. Data stewards may experience pushback from stakeholders who must deliver on the policies, procedures, and processes that the data steward enforces.

      Because the data steward must enforce data processes and liaise with so many different people and departments within the organization, the data steward role should be their primary full-time job function – where possible.

      However, in circumstances where budget doesn’t allow a full-time data steward role, develop these skills within the organization by adding data steward responsibilities to individuals who are already managing data sets for their department or line of business.

      Info-Tech Tip

      A stewardship role is generally more about managing the cultural change that data governance brings. This requires the steward to have exceptional interpersonal skills that will assist in building relationships across departmental boundaries and ensuring that all stakeholders within the organization believe in the initiative, understand the anticipated outcomes, and take some level of responsibility for its success.

      Changes to organizational data processes are inevitable; have a communication plan in place to manage change

      Create awareness of your data governance program. Use knowledge transfer to get as many people on board as possible.

      Data governance initiatives must contain a strong organizational disruption component. A clear and concise communication strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.

      By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.

      Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.

      Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.

      Attempting to implement change without an effective communication plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.

      Info-Tech Insight

      Launching a data governance initiative is guaranteed to disrupt the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.

      Create a common data governance vision that is consistently communicated to the organization

      A data governance program should be an enterprise-wide initiative.

      To create a strong vision for data governance, there must be participation from the business and IT. A common vision will articulate the state the organization wishes to achieve and how it will reach that state. Visioning helps to develop long-term goals and direction.

      Once the vision is established, it must be effectively communicated to everyone, especially those who are involved in creating, managing, disposing, or archiving data.

      The data governance program should be periodically refined. This will ensure the organization continues to incorporate best methods and practices as the organization grows and data needs evolve.

      Info-Tech Tips

      • Use information from the stakeholder interviews to derive business goals and objectives.
      • Work to integrate different opinions and perspectives into the overall vision for data governance.
      • Brainstorm guiding principles for data and understand the overall value to the organization.

      Develop a compelling data governance communications plan to get all departmental lines of business on board

      A data governance program will impact all data-driven business units within the organization.

      A successful data governance communications plan involves making the initiative visible and promoting staff awareness. Educate the team on how data is collected, distributed, and used, what internal processes use data, and how that data is used across departmental boundaries.

      By demonstrating how data governance will affect staff directly, you create a deeper level of understanding across lines of business, and ultimately, a higher level of acceptance for new processes, rules, and guidelines.

      A clear and concise communications strategy will raise the profile of data governance within the organization, and staff will understand how the program will benefit them and how they can share in the success of the initiative. This will end up providing support for the initiative across the board.

      A proactive communications plan will:

      • Assist in overcoming issues with data control, stalemates between stakeholder units, and staff resistance.
      • Provide a formalized process for implementing new policies, rules, guidelines, and technologies, and managing organizational data.
      • Detail data ownership and accountability for decision making, and identify and resolve data issues throughout the organization.
      • Encourage acceptance and support of the initiative.

      Info-Tech Tip

      Focus on literacy and communication: include training in the communication plan. Providing training for data users on the correct procedures for updating and verifying the accuracy of data, data quality, and standardized data policies will help validate how data governance will benefit them and the organization.

      Leverage the data governance program to communicate and promote the value of data within the organization

      The data governance program is responsible for continuously promoting the value of data to the organization. The data governance program should seek a variety of ways to educate the organization and data stakeholders on the benefit of data management.

      Even if data policies and procedures are created, they will be highly ineffective if they are not properly communicated to the data producers and users alike.

      There needs to be a communication plan that highlights how the data producer and user will be affected, what their new responsibilities are, and the value of that change.

      To learn how to manage organizational change, refer to Info-Tech’s Master Organizational Change Management Practices.

      Understand what makes for an effective policy for data governance

      It can be difficult to understand what a policy is, and what it is not. Start by identifying the differences between a policy and standards, guidelines, and procedures.

      Diagram of an effective policy for data governance

      The following are key elements of a good policy:

      Heading Descriptions
      Purpose Describes the factors or circumstances that mandate the existence of the policy. Also states the policy’s basic objectives and what the policy is meant to achieve.
      Scope Defines to whom and to what systems this policy applies. Lists the employees required to comply or simply indicates “all” if all must comply. Also indicates any exclusions or exceptions, i.e. those people, elements, or situations that are not covered by this policy or where special consideration may be made.
      Definitions Define any key terms, acronyms, or concepts that will be used in the policy. A standard glossary approach is sufficient.
      Policy Statements Describe the rules that comprise the policy. This typically takes the form of a series of short prescriptive and proscriptive statements. Sub-dividing this section into sub-sections may be required depending on the length or complexity of the policy.
      Non-Compliance Clearly describe consequences (legal and/or disciplinary) for employee non-compliance with the policy. It may be pertinent to describe the escalation process for repeated non-compliance.
      Agreement Confirms understanding of the policy and provides a designated space to attest to the document.

      Leverage myPolicies, Info-Tech’s web-based application for managing your policies and procedures

      Most organizations have problems with policy management. These include:

      1. Policies are absent or out of date
      2. Employees largely unaware of policies in effect
      3. Policies are unmonitored and unenforced
      4. Policies are in multiple locations
      5. Multiple versions of the same policy exist
      6. Policies managed inconsistently across different silos
      7. Policies are written poorly by untrained authors
      8. Inadequate policy training program
      9. Draft policies stall and lose momentum
      10. Weak policy support from senior management

      Technology should be used as a means to solve these problems and effectively monitor, enforce, and communicate policies.

      Product Overview

      myPolicies is a web-based solution to create, distribute, and manage corporate policies, procedures, and forms. Our solution provides policy managers with the tools they need to mitigate the risk of sanctions and reduce the administrative burden of policy management. It also enables employees to find the documents relevant to them and build a culture of compliance.

      Some key success factors for policy management include:

      • Store policies in a central location that is well known and easy to find and access. A key way that technology can help communicate policies is by having them published on a centralized website.
      • Link this repository to other policies’ taxonomies of your organization. E.g. HR policies to provide a single interface for employees to access guidance across the organization.
      • Reassess policies annually at a minimum. myPolicies can remind you to update the organization’s policies at the appropriate time.
      • Make the repository searchable and easily navigable.
      • myPolicies helps you do all this and more.
      myPolicies logo myPolicies

      Enforce data policies to promote consistency of business processes

      Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organizations, depending on your specific data needs.

      • Policies describe what to do, while standards and procedures describe how to do something.
      • There should be few data policies, and they should be brief and direct. Policies are living documents and should be continuously updated to respond to the organization’s data needs.
      • The data policies should highlight who is responsible for the data under various scenarios and rules around how to manage it effectively.

      Examples of Data Policies

      Trust

      • Data Cleansing and Quality Policy
      • Data Entry Policy

      Availability

      • Acceptable Use Policy
      • Data Backup Policy

      Security

      • Data Security Policy
      • Password Policy Template
      • User Authorization, Identification, and Authentication Policy Template
      • Data Protection Policy

      Compliance

      • Archiving Policy
      • Data Classification Policy
      • Data Retention Policy

      Leverage data management-related policies to standardize your data management practices

      Info-Tech’s Data Management Policy:

      This policy establishes uniform data management standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of the organization. This policy applies to all critical data and to all staff who may be creators and/or users of such data.

      Info-Tech’s Data Entry Policy:

      The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of an organization. It is essential that required data be sourced appropriately and entered into databases and applications in an accurate and complete manner to ensure the reliability and validity of the data and decisions made based on the data.

      Info-Tech’s Data Provenance Policy:

      Create policies to keep your data's value, such as:

      • Only allow entry of data from reliable sources.
      • Employees entering and accessing data must observe requirements for capturing/maintaining provenance metadata.
      • Provenance metadata will be used to track the lifecycle of data from creation through to disposal.

      Info-Tech’s Data Integration and Virtualization Policy:

      This policy aims to assure the organization, staff, and other interested parties that data integration, replication, and virtualization risks are taken seriously. Staff must use the policy (and supporting guidelines) when deciding whether to integrate, replicate, or virtualize data sets.

      Select the right mix of metrics to successfully supervise data policies and processes

      Policies are only as good as your level of compliance. Ensure supervision controls exist to oversee adherence to policies and procedures.

      Although they can be highly subjective, metrics are extremely important to data governance success.

      • Establishing metrics that measure the performance of a specific process or data set will:
        • Create a greater degree of ownership from data stewards and data owners.
        • Help identify underperforming individuals.
        • Allow the steering committee to easily communicate tailored objectives to individual data stewards and owners.
      • Be cautious when establishing metrics. The wrong metrics can have negative repercussions.
        • They will likely draw attention to an aspect of the process that doesn’t align with the initial strategy.
        • Employees will work hard and grow frustrated as their successes aren’t accurately captured.

      Policies are great to have from a legal perspective, but unless they are followed, they will not benefit the organization.

      • One of the most useful metrics for policies is currency. This tracks how up to date the policy is and how often employees are informed about the policy. Often, a policy will be introduced and then ignored. Policies must be continuously reviewed by management and employees.
      • Some other metrics include adherence (including performance in tests for adherence) and impacts from non-adherence.

      Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.

      Establish data standards and procedures for use across all organizational lines of business

      A data governance program will impact all data-driven business units within the organization.

      • Data management procedures are the methods, techniques, and steps to accomplish a specific data objective. Creating standard data definitions should be one of the first tasks for a data governance steering committee.
      • Data moves across all departmental boundaries and lines of business within the organization. These definitions must be developed as a common set of standards that can be accepted and used enterprise wide.
      • Consistent data standards and definitions will improve data flow across departmental boundaries and between lines of business.
      • Ensure these standards and definitions are used uniformly throughout the organization to maintain reliable and useful data.

      Data standards and procedural guidelines will vary from company to company.

      Examples include:

      • Data modeling and architecture standards.
      • Metadata integration and usage procedures.
      • Data security standards and procedures.
      • Business intelligence standards and procedures.

      Info-Tech Tip

      Have a fundamental data definition model for the entire business to adhere to. Those in the positions that generate and produce data must follow the common set of standards developed by the steering committee and be accountable for the creation of valid, clean data.

      Changes to organizational data processes are inevitable; have a communications plan in place to manage change

      Create awareness of your data governance program, using knowledge transfer to get as many people on board as possible.

      By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.

      Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.

      Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.

      Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.

      Data governance initiatives will very likely bring about a level of organizational disruption. A clear and concise communications strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.

      Info-Tech Tip

      Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      Picture of analyst

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Screenshot of example data governance strategy map.

      Build Your Business and User Context

      Work with your core team of stakeholders to build out your data governance strategy map, aligning data governance initiatives with business capabilities, value streams, and, ultimately, your strategic priorities.

      Screenshot of Data governance roadmap

      Formulate a Plan to Get to Your Target State

      Develop a data governance future state roadmap and plan based on an understanding of your current data governance capabilities, your operating environment, and the driving needs of your business.

      Related Info-Tech Research

      Build a Robust and Comprehensive Data Strategy

      Key to building and fostering a data-driven culture.

      Create a Data Management Roadmap

      Streamline your data management program with our simplified framework.

      The First 100 Days as CDO

      Be the voice of data in a time of transformation.

      Research Contributors

      Name Position Company
      David N. Weber Executive Director - Planning, Research and Effectiveness Palm Beach State College
      Izabela Edmunds Information Architect Mott MacDonald
      Andy Neill Practice Lead, Data & Analytics Info-Tech Research Group
      Dirk Coetsee Research Director, Data & Analytics Info-Tech Research Group
      Graham Price Executive Advisor, Advisory Executive Services Info-Tech Research Group
      Igor Ikonnikov Research Director, Data & Analytics Info-Tech Research Group
      Jean Bujold Senior Workshop Delivery Director Info-Tech Research Group
      Rajesh Parab Research Director, Data & Analytics Info-Tech Research Group
      Reddy Doddipalli Senior Workshop Director Info-Tech Research Group
      Valence Howden Principal Research Director, CIO Info-Tech Research Group

      Bibliography

      Alation. “The Alation State of Data Culture Report – Q3 2020.” Alation, 2020. Accessed 25 June 2021.

      Allott, Joseph, et al. “Data: The next wave in forestry productivity.” McKinsey & Company, 27 Oct. 2020. Accessed 25 June 2021.

      Bean, Randy. “Why Culture Is the Greatest Barrier to Data Success.” MIT Sloan Management Review, 30 Sept. 2020. Accessed 25 June 2021.

      Brence, Thomas. “Overcoming the Operationalization Challenge with Data Governance at New York Life.” Informatica, 18 March 2020. Accessed 25 June 2021.

      Bullmore, Simon, and Stuart Coleman. “ODI Inside Business – a checklist for leaders.” Open Data Institute, 19 Oct. 2020. Accessed 25 June 2021.

      Canadian Institute for Health Information. “Developing and implementing accurate national standards for Canadian health care information.” Canadian Institute for Health Information. Accessed 25 June 2021.

      Carruthers, Caroline, and Peter Jackson. “The Secret Ingredients of the Successful CDO.” IRM UK Connects, 23 Feb. 2017.

      Dashboards. “Useful KPIs for Healthy Hospital Quality Management.” Dashboards. Accessed 25 June 2021.

      Dashboards. “Why (and How) You Should Improve Data Literacy in Your Organization Today.” Dashboards. Accessed 25 June 2021.

      Datapine. “Healthcare Key Performance Indicators and Metrics.” Datapine. Accessed 25 June 2021.

      Datapine. “KPI Examples & Templates: Measure what matters the most and really impacts your success.” Datapine. Accessed 25 June 2021.

      Diaz, Alejandro, et al. “Why data culture matters.” McKinsey Quarterly, Sept. 2018. Accessed 25 June 2021.

      Everett, Dan. “Chief Data Officer (CDO): One Job, Four Roles.” Informatica, 9 Sept. 2020. Accessed 25 June 2021.

      Experian. “10 signs you are sitting on a pile of data debt.” Experian. Accessed 25 June 2021.

      Fregoni, Silvia. “New Research Reveals Why Some Business Leaders Still Ignore the Data.” Silicon Angle, 1 Oct. 2020.

      Informatica. Holistic Data Governance: A Framework for Competitive Advantage. Informatica, 2017. Accessed 25 June 2021.

      Knight, Michelle. “What Is a Data Catalog?” Dataversity, 28 Dec. 2017. Web.

      Lim, Jason. “Alation 2020.3: Getting Business Users in the Game.” Alation, 2020. Accessed 25 June 2021.

      McDonagh, Mariann. “Automating Data Governance.” Erwin, 29 Oct. 2020. Accessed 25 June 2021.

      NewVantage Partners. Data-Driven Business Transformation: Connecting Data/AI Investment to Business Outcomes. NewVantage Partners, 2020. Accessed 25 June 2021.

      Olavsrud, Thor. “What is data governance? A best practices framework for managing data assets.” CIO.com, 18 March 2021. Accessed 25 June 2021.

      Open Data Institute. “Introduction to data ethics and the data ethics canvas.” Open Data Institute, 2020. Accessed 25 June 2021.

      Open Data Institute. “The UK National Data Strategy 2020: doing data ethically.” Open Data Institute, 17 Nov. 2020. Accessed 25 June 2021.

      Open Data Institute. “What is the Data Ethics Canvas?” Open Data Institute, 3 July 2019. Accessed 25 June 2021.

      Pathak, Rahul. “Becoming a Data-Driven Enterprise: Meeting the Challenges, Changing the Culture.” MIT Sloan Management Review, 28 Sept. 2020. Accessed 25 June 2021.

      Redman, Thomas, et al. “Only 3% of Companies’ Data Meets Basic Quality Standards.” Harvard Business Review. 11 Sept 2017.

      Petzold, Bryan, et al. “Designing data governance that delivers value.” McKinsey & Company, 26 June 2020. Accessed 25 June 2021.

      Smaje, Kate. “How six companies are using technology and data to transform themselves.” McKinsey & Company, 12 Aug. 2020. Accessed 25 June 2021.

      Talend. “The Definitive Guide to Data Governance.” Talend. Accessed 25 June 2021.

      “The Powerfully Simple Modern Data Catalog.” Atlan, 2021. Web.

      U.S. Geological Survey. “Data Management: Data Standards.” U.S. Geological Survey. Accessed 25 June 2021.

      Waller, David. “10 Steps to Creating a Data-Driven Culture.” Harvard Business Review, 6 Feb. 2020. Accessed 25 June 2021.

      “What is the Difference Between A Business Glossary, A Data Dictionary, and A Data Catalog, and How Do They Play A Role In Modern Data Management?” Analytics8, 23 June 2021. Web.

      Wikipedia. “RFM (market research).” Wikipedia. Accessed 25 June 2021.

      Windheuser, Christoph, and Nina Wainwright. “Data in a Modern Digital Business.” Thoughtworks, 12 May 2020. Accessed 25 June 2021.

      Wright, Tom. “Digital Marketing KPIs - The 12 Key Metrics You Should Be Tracking.” Cascade, 3 March 2021. Accessed 25 June 2021.

      Fast Track Your GDPR Compliance Efforts

      • Buy Link or Shortcode: {j2store}372|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $25,779 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Organizations often tackle compliance efforts in an ad hoc manner, resulting in an ineffective use of resources.
      • The alignment of business objectives, information security, and data privacy is new for many organizations, and it can seem overwhelming.
      • GDPR is an EU regulation that has global implications; it likely applies to your organization more than you think.

      Our Advice

      Critical Insight

      • Financial impact isn’t simply fines. A data controller fined for GDPR non-compliance may sue its data processor for damage.
      • Even day-to-day activities may be considered processing. Screen-sharing from a remote location is considered processing if the data shown onscreen contains personal data!
      • This is not simply an IT problem. Organizations that address GDPR in a siloed approach will not be as successful as organizations that take a cross-functional approach.

      Impact and Result

      • Follow a robust methodology that applies to any organization and aligns operational and situational GDPR scope. Info-Tech's framework allows organizations to tackle GDPR compliance in a right-sized, methodical approach.
      • Adhere to a core, complex GDPR requirement through the use of our documentation templates.
      • Understand how the risk of non-compliance is aligned to both your organization’s functions and data scope.
      • This blueprint will guide you through projects and steps that will result in quick wins for near-term compliance.

      Fast Track Your GDPR Compliance Efforts Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should fast track your GDPR compliance efforts, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand your compliance requirements

      Understand the breadth of the regulation’s requirements and document roles and responsibilities.

      • Fast Track Your GDPR Compliance Efforts – Phase 1: Understand Your Compliance Requirements
      • GDPR RACI Chart

      2. Define your GDPR scope

      Define your GDPR scope and prioritize initiatives based on risk.

      • Fast Track Your GDPR Compliance Efforts – Phase 2: Define Your GDPR Scope
      • GDPR Initiative Prioritization Tool

      3. Satisfy documentation requirements

      Understand the requirements for a record of processing and determine who will own it.

      • Fast Track Your GDPR Compliance Efforts – Phase 3: Satisfy Documentation Requirements
      • Record of Processing Template
      • Legitimate Interest Assessment Template
      • Data Protection Impact Assessment Tool
      • A Guide to Data Subject Access Requests

      4. Align your data breach requirements and security program

      Document your DPO decision and align security strategy to data privacy.

      • Fast Track Your GDPR Compliance Efforts – Phase 4: Align Your Data Breach Requirements & Security Program

      5. Prioritize your GDPR initiatives

      Prioritize any initiatives driven out of Phases 1-4 and begin developing policies that help in the documentation effort.

      • Fast Track Your GDPR Compliance Efforts – Phase 5: Prioritize Your GDPR Initiatives
      • Data Protection Policy
      [infographic]

      Workshop: Fast Track Your GDPR Compliance Efforts

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Your Compliance Requirements

      The Purpose

      Kick-off the workshop; understand and define GDPR as it exists in your organizational context.

      Key Benefits Achieved

      Prioritize your business units based on GDPR risk.

      Assign roles and responsibilities.

      Activities

      1.1 Kick-off and introductions.

      1.2 High-level overview of weekly activities and outcomes.

      1.3 Identify and define GDPR initiative within your organization’s context.

      1.4 Determine what actions have been done to prepare; how have regulations been handled in the past?

      1.5 Identify key business units for GDPR committee.

      1.6 Document business units and functions that are within scope.

      1.7 Prioritize business units based on GDPR.

      1.8 Formalize stakeholder support.

      Outputs

      Prioritized business units based on GDPR risk

      GDPR Compliance RACI Chart

      2 Define Your GDPR Scope

      The Purpose

      Know the rationale behind a record of processing.

      Key Benefits Achieved

      Determine who will own the record of processing.

      Activities

      2.1 Understand the necessity for a record of processing.

      2.2 Determine for each prioritized business unit: are you a controller or processor?

      2.3 Develop a record of processing for most-critical business units.

      2.4 Perform legitimate interest assessments.

      2.5 Document an iterative process for creating a record of processing.

      Outputs

      Initial record of processing: 1-2 activities

      Initial legitimate interest assessment: 1-2 activities

      Determination of who will own the record of processing

      3 Satisfy Documentation Requirements and Align With Your Data Breach Requirements and Security Program

      The Purpose

      Review existing security controls and highlight potential requirements.

      Key Benefits Achieved

      Ensure the initiatives you’ll be working on align with existing controls and future goals.

      Activities

      3.1 Determine the appetite to align the GDPR project to data classification and data discovery.

      3.2 Discuss the benefits of data discovery and classification.

      3.3 Review existing incident response plans and highlight gaps.

      3.4 Review existing security controls and highlight potential requirements.

      3.5 Review all initiatives highlighted during days 1-3.

      Outputs

      Highlighted gaps in current incident response and security program controls

      Documented all future initiatives

      4 Prioritize GDPR Initiatives

      The Purpose

      Review project plan and initiatives and prioritize.

      Key Benefits Achieved

      Finalize outputs of the workshop, with a strong understanding of next steps.

      Activities

      4.1 Analyze the necessity for a data protection officer and document decision.

      4.2 Review project plan and initiatives.

      4.3 Prioritize all current initiatives based on regulatory compliance, cost, and ease to implement.

      4.4 Develop a data protection policy.

      4.5 Finalize key deliverables created during the workshop.

      4.6 Present the GDPR project to key stakeholders.

      4.7 Workshop executive presentation and debrief.

      Outputs

      GDPR framework and prioritized initiatives

      Data Protection Policy

      List of key tools

      Communication plans

      Workshop summary documentation

      Tech Trend Update: If Digital Ethics Then Data Equity

      • Buy Link or Shortcode: {j2store}100|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.

      Our Advice

      Critical Insight

      Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.

      Impact and Result

      There are some key considerations for businesses grappling with digital ethics:

      1. If partnering, set expectations.
      2. If building, invite criticism.
      3. If imbuing authority, consider the most vulnerable.

      Tech Trend Update: If Digital Ethics Then Data Equity Research & Tools

      Tech Trend Update: If Digital Ethics Then Data Equity

      Understand how to use data equity as an ethical guidepost to create technology that will benefit everyone.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Tech Trend Update: If Digital Ethics Then Data Equity Storyboard
      [infographic]

      Next-Generation InfraOps

      • Buy Link or Shortcode: {j2store}457|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.
      • Different stakeholders across previously separate teams rely on one another more than ever, but rules of engagement do not yet exist.

      Our Advice

      Critical Insight

      • By defining your end goals and framing solutions based on the type of visibility and features you need, you can enable speed and reliability without losing control of the work.

      Impact and Result

      • Understand the xOps spectrum and what approaches benefit your organization.
      • Make sense of the architectural approaches and enablement tools available to you.
      • Evolve from just improving your current operations to a continuous virtuous cycle of development and deployment.

      Next-Generation InfraOps Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Next-Generation InfraOps Storyboard – A deck that will help you use Ops methodologies to build a virtuous cycle.

      This storyboard will help you understand the spectrum of different Agile xOps working modes and how best to leverage them and build an architecture and toolset that support rapid continuous IT operations

      • Next-Generation InfraOps Storyboard
      [infographic]

      Further reading

      Next-Generation InfraOps

      Embrace the spectrum of Ops methodologies to build a virtuous cycle.

      Executive summary

      Your Challenge

      IT Operations continue to be challenged by increasing needs for scale and speed, often in the face of constrained resources and time. For most, Agile methodologies have become a foundational part of tackling this problem. Since then, we've seen Agile evolve into DevOps, which started a trend into different categories of "xOps" that are too many to count. How does one make sense of the xOps spectrum? What is InfraOps and where does it fit in?

      Common Obstacles

      Ultimately, all these methodologies and approaches are there to serve the same purpose: increase effectiveness through automation and improve governance through visibility. The key is to understand what tools and methodologies will deliver actual benefits to your IT operation and to the organization as a whole.

      Info-Tech's Approach

      By defining your end goals and framing solutions based on the type of visibility and features you need, you can enable speed and reliability without losing control of the work.

      1. Understand the xOps spectrum and what approaches will benefit your organization.
      2. Make sense of the architectural approaches and enablement tools available to you.
      3. Evolve from just improving your current operations to a continuous virtuous cycle of development and deployment.

      Info-Tech Insight

      InfraOps, when applied well, should be the embodiment of the governance policies as expressed by standards in architecture and automation.

      Project overview

      Understand the xOps spectrum

      There are as many different types of "xOps" as there are business models and IT teams. To pick the approaches that deliver the best value to your organization and that align to your way of operating, it's important to understand the different major categories in the spectrum and how they do or don't apply to your IT approach.

      How to optimize the Ops in DevOps

      InfraOps is one of the major methodologies to address a key problem in IT at cloud scale: eliminating friction and error from your deliveries and outputs. The good news is there are architectures, tools, and frameworks you can easily leverage to make adopting this approach easier.

      Evolve to integration and build a virtuous cycle

      Ultimately your DevOps and InfraOps approaches should embody your governance needs via architecture and process. As time goes on, however, both your IT footprint and your business environment will shift. Build your tools, telemetry, and governance to anticipate and adapt to change and build a virtuous cycle between development needs and IT Operations tools and governance.

      The xOps spectrum

      This is an image of the xOps spectrum. The three main parts are: Code Acceleration (left), Governance(middle), and Infrastructure Acceleration (right)

      xOps categories

      There is no definitive list of x's in the xOps spectrum. Different organizations and teams will divide and define these in different ways. In many cases, the definitions and domains of various xOps will overlap.

      Some of the commonly adopted and defined xOps models are listed here.

      Shift left? Shift right?

      Cutting through the jargon

      • Shifting left is about focusing on the code and development aspects of a delivery cycle.
      • Shifting right is about remembering that infrastructure and tools still do matter.

      Info-Tech Insight

      Shifting left or right isn't an either/or choice. They're more like opposite sides of the same coin. Like the different xOps approaches, usually more than one shift approach will apply to your IT Operations.

      IT Operations in the left-right spectrum

      Shifting from executing and deploying to defining the guardrails and standards

      This is an image of the left-right spectrum for your XOps position

      Take a middle-out approach

      InfraOps and DevOps aren't enemies; they're opposite sides of the same coin.

      • InfraOps is about the automation and standardization of execution. It's an essential element in any fully automated CI/CD pipeline.
      • Like DevOps, InfraOps is built on similar values (the pillars of DevOps).
      • It builds on the principle of Lean to focus on removing friction, or turn-and-type activities, from the pipeline/process.
      • In InfraOps, one of the key methods for removing friction is through automation of the interstitia between different phases of a DevOps or CI/CD cycle.

      Optimize the Ops in DevOps

      Focus on eliminating friction

      This is an image of an approach to optimizing the ops in DevOps.

      With the shift from execution to governing and validating, the role of deployment falls downstream of IT Operations.

      IT Operations needs to move to a mindset that focuses on creating the guardrails, enforced standards, and compliance rules that need to be used downstream, then apply those standards using automation and tooling to remove friction and error from the interstitia (the white spaces between chevrons) of the various phases.

      InfraOps tools

      Four quadrants in the shape of a human head, in the boxes are the following: Hyperconverged Infrastructure; Composable Infrastructure; Infrastructure as code and; Automation and Orchestration

      Info-Tech Insight

      Your tools can be broken into two categories:

      • Infrastructure Architecture
        • HCI vs. CI
      • Automation Tooling
        • IaC and A&O

      Keep in mind that while your infrastructure architecture is usually an either/or choice, your automation approach should use any and all tooling that helps.

      Infrastructure approach

      • Hyperconverged

      • Composable

      Hyperconverged Infrastructure (HCI)

      Hyperconvergence is the next phase of convergence, virtualizing servers, networks, and storage on a single server/storage appliance. Capacity scales as more appliances are added to a cluster or stack.
      The disruptive departure:

      • Even though servers, networks, and storage were each on their own convergence paths, the three remained separate management domains (or silos). Even single-SKU converged infrastructures like VCE Vblocks are still composed of distinct server, network, and storage devices.
      • In hyperconvergence, the silos collapse into single-software managed devices. This has been disruptive for both the vendors of technology solutions (especially storage) and for infrastructure management.
      • Large storage array vendors are challenged by hyperconvergence alternatives. IT departments need to adapt IT skills and roles away from individual management silos and to more holistic service management.

      A comparison between converged and hyperconverged systems.

      Info-Tech Insight

      HCI follows convergence trends of the past ten years but is also a departure from how IT infrastructure has traditionally been provisioned and managed.

      HCI is at the same time a logical progression of infrastructure convergence and a disruptive departure.

      Hyperconverged (HCI) – SWOT

      HCI can be the foundation block for a fully software defined data center, a prerequisite for private cloud.

      Strengths

      • Potentially lower TCO through further infrastructure consolidation, reducing CapEx and OpEx expenditures through facilities optimization and cost consolidation.
      • Operations in particular can be streamlined, since storage, network connections, and processors/memory are all managed as abstractions via a single control pane.
      • HCI comes with built-in automation and analytics that lead to quicker issue resolution.

      Opportunities

      • Increased business agility by paving the way for a fully software defined infrastructure stack and cloud automation.
      • Shift IT human assets from hardware asset maintainers and controllers to service delivery managers.
      • Better able to compete with external IT service alternatives.
      • Move toward a hybrid cloud service offering where the service catalog contains both internal and external offerings.

      Key attributes of a cloud are automation, resource elasticity, and self-service. This kind of agility is impossible if physical infrastructure needs intervention.

      Info-Tech Insight

      Virtualization alone does not a private cloud make, but complete stack virtualization (software defined) running on a hands-off preconfigured HCI appliance (or group of appliances) provides a solid foundation for building cloud services.

      Hyperconverged (HCI) – SWOT

      Silo-busting and private cloud sound great, but are your people and processes able to manage the change?

      Weaknesses

      • HCI typically scales out linearly (CPU & storage). This does not suit traditional scale-up applications such as high-performance databases and large-capacity data warehouses.
      • Infrastructure stacks are perceived as more flexible for variable growth across segments. For example, if storage is growing but processing is not, storage can scale separately from processing.

      Threats

      • HCI will be disruptive to roles within IT. Internal pushback is a real threat if necessary changes in skills and roles are not addressed.
      • HCI is not a simple component replacement but an adoption of a different kind of infrastructure. Different places in the lifecycles for each of storage, network, and processing devices could make HCI a solution where there is no immediate problem.

      In traditional infrastructure, performance and capacity are managed as distinct though complementary jobs. An all-in-one approach may not work.

      Composable Infrastructure (CI)

      • Composable infrastructure in many ways represents the opposite of an HCI approach. Its focus is on further disaggregating resources and components used to build systems.
        • Unlike traditional cloud virtual systems, composable infrastructure provides virtual bare metal resources, allowing tightly coupled resources like CPU, RAM, and GPU – or any device/card/module – to be released back and forth into the resource pool as required by a given workload.
        • This is enabled by the use of high-speed, low-latency PCI Express (PCI-e) and Compute Express Link (CXL) fabrics that allow these resources to be decoupled.
        • It also supports the ability to present other fabric types critical for building out enterprise systems (e.g. Ethernet, InfiniBand).
      • Accordingly, CI systems are also based on next-generation network architecture that supports moving critical functions to the network layer, which enables more efficient use of the application-layer resources.

      Composable Infrastructure (CI)

      • CI may also leverage network-resident data/infrastructure processing units (DPUs/IPUs), which offload many network, security, and storage functions.
        • As new devices and functions become available, they can be added into the catalog of resources/functions available in a CI pool.

      Use Case Example: Composable AI flow

      Data Ingestion > Data Cleaning/Tagging > Training > Conclusion

      • At each phase of the process, resources, including specialized hardware like memory and GPU cores, can be dynamically allocated and reallocated to the workload on demand

      Composable Infrastructure (CI)

      Use cases and considerations

      Where it's useful

      • Enable even more efficient allocation/utilization of resources for workloads.
      • Very large memory or shared memory requirements can benefit greatly.
      • Decouple purchasing decisions for underlying resources.
      • Leverage the fabric to make it easier to incrementally upgrade underlying resources as required.
      • Build "the Impossible Server."

      Considerations

      • Requires significant footprint/scale to justify in many cases
      • Not necessarily good value for environments that aren't very volatile and heterogeneous in terms of deployment requirements
      • May not be best value for environments where resource-stranding is not a significant issue

      Info-Tech Insight

      Many organizations using a traditional approach report resource stranding as having an impact of 20% or more on efficiency. When focusing specifically on the stranding of memory in workloads, the number can often approach 40%.

      The CI ecosystem

      This is an image of the CI ecosystem.

      • The CI ecosystem has many players, large and small!
      • Note that the CI ecosystem is dependent on a large ecosystem of underlying enablers and component builders to support the required technologies.

      Understanding the differences

      This image shows the similarities and differences between traditional, cloud, hyperconverged, and composable.

      Automation approach

      • Infrastructure as Code
      • Automation & Orchestration
      • Metaorchestration

      Infrastructure as Code (IaC)

      Infrastructure as code (IaC) is the process of managing and provisioning computer data centers through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.

      Before IaC, IT personnel would have to manually change configurations to manage their infrastructure. Maybe they would use throwaway scripts to automate some tasks, but that was the extent of it.

      With IaC, your infrastructure's configuration takes the form of a code file, making it easy to edit, copy, and distribute.

      Info-Tech Insight
      IaC is a critical tool in enabling key benefits!

      • Reduced costs
      • Increased scalability, flexibility, and speed
      • Better consistency and version control
      • Reduced deployment errors

      Infrastructure as Code (IaC)

      1. IaC uses a high-level descriptive coding language to automate the provisioning of IT infrastructure. This eliminates the need to manually provision and manage servers, OS, database connections, storage, and other elements every time we want to develop, test, or deploy an application.
      2. IaC allows us to define the computer systems on which code needs to run. Most commonly, we use a framework like Chef, Ansible, Puppet, etc., to define their infrastructure. These automation and orchestration tools focus on the provisioning and configuring of base compute infrastructure.
      3. IaC is also an essential DevOps practice. It enables teams to rapidly create and version infrastructure in the same way they version source code and to track these versions so as to avoid inconsistency among IT environments that can lead to serious issues during deployment.
      • Idempotence is a principle of IaC. This means a deployment command always sets the target environment into the same configuration, regardless of the environment's starting state.
        • Idempotency is achieved by either automatically configuring an existing target or discarding the existing target and recreating a fresh environment.

      Automation/Orchestration

      Orchestration describes the automated arrangement, coordination, and management of complex computer systems, middleware, and services.

      This usage of orchestration is often discussed in the context of service-oriented architecture, virtualization, provisioning, converged infrastructure, and dynamic data center topics. Orchestration in this sense is about aligning the business request with the applications, data, and infrastructure.

      It defines the policies and service levels through automated workflows,
      provisioning, and change management. This creates an application-aligned infrastructure that can be scaled up or down based on the needs of each application.

      As the requirement for more resources or a new application is triggered, automated tools now can perform tasks that previously could only be done by multiple administrators operating on their individual pieces of the physical stack.

      Orchestration also provides centralized management of the resource pool, including billing, metering, and chargeback for consumption. For example, orchestration reduces the time and effort for deploying multiple instances of a single application.

      Info-Tech Insight

      Automation and orchestration tools can be key components of an effective governance toolkit too! Remember to understand what data can be pulled from your various tools and leveraged for other purposes such as cost management and portfolio roadmapping.

      Automation/Orchestration

      There are a wide variety of orchestration and automation tools and technologies.

      Configuration Management

      Configuration Management

      The logos for companies which fall in each of the categories in the column to the left of the image.

      CI/CD
      Orchestration

      Container
      Orchestration

      Cloud-Specific
      Orchestration

      PaaS
      Orchestration

      Info-Tech Insight

      Automation and orchestration tools and software offerings are plentiful, and many of them have a different focus on where in the application delivery ecosystem they provide automation functionality.

      Often there are different tools for different deployment and service models as well as for different functional phases for each service model.

      Automation/Orchestration

      Every tool focuses on different aspects or functions of the deployment of resources and applications.

      • Resources
        • Compute
        • Storage
        • Network
      • Extended Services
        • Platforms
        • Infrastructure Services
        • Web Services
      • Application Assets
        • Images
        • Templates
        • Containers
        • Code

      Info-Tech Insight

      Let the large ecosystem of tools be your ally. Leverage the right tools where needed and then address the complexity of tools using a master orchestration scheme.

      Metaorchestration

      A Flow chart for the approach to metaorchestration.

      Additionally, most tools do not cover all aspects required for most automation implementations, especially in hybrid cloud scenarios.

      As such, often multiple tools must be deployed, which can lead to fragmentation and loss of unified controls.

      Many enterprises address this fragmentation using a cloud management platform approach.

      One method of achieving this is to establish a higher layer of orchestration – an "orchestrator of orchestrators," or metaorchestration.

      In complex scenarios, this can be a challenge that requires customization and development.

      InfraOps tools ecosystem

      Toolkit Pros Cons Tips
      HCI Easy scale out Shift in skills required Good for enabling automation and hybridization with current-gen public cloud services
      CI Maximal workload resource efficiency Investment in new fabrics and technologies Useful for very dynamic or highly scalable workloads like AI
      IaC Error reduction and standardization Managing drift in standards and requirements Leverage a standards and exception process to keep track of drift
      A&O Key enabler of DevOps automation within phases Usually requires multiple toolsets/frameworks Use the right tools and stitch together at the metaorchestration layer
      Metaorchestration Reduces the complexity of a diverse A&O and IaC toolkit Requires understanding of the entire ecosystems of tools used Key layer of visibility and control for governance

      Build a virtuous cycle

      Remember, the goal is to increase speed AND reliability. That's why we focus on removing friction from our delivery pipelines.

      • The first step is to identify the points of friction in your cycle and understand the intensity and frequency of these friction points.
      • Depending on your delivery and project management methodology, you'll have a different posture of the different tools that make sense for your pipeline.
      • For example, if you are focused on delivering raw resources for sysadmins and/or you're in a Waterfall methodology where the friction points are large but infrequent, hyperconverged is likely to delivery good value, whereas tools like IaC and orchestration may not be as necessary.

      Info-Tech Insight

      Remember that, especially in modern and rapid methodologies, your IT footprint can drift unexpectedly. This means you need a real feedback mechanism on where the friction moves to next.

      This is particularly important in more Agile methodologies.

      Activity: Map your IT operations delivery

      Identify your high-friction interstitial points

      • Using the table below, or a table modified to your delivery phases, map out the activities and tasks that are not standardized and automated.
      • For the incoming and outgoing sections, think about what resources and activities need to be (or could be) created, destroyed, or repurposed to efficiently manage each cycle and the spaces between cycles.
      Plan Code Test Deploy Monitor
      Incoming Friction
      In-Cycle Friction
      Outgoing Friction

      Info-Tech Insight

      Map your ops groups to the delivery cycles in your pipeline. How many delivery cycles do you have or need?

      Good InfraOps is a reflection of governance policies, expressed by standards in architecture and automation.

      Related Info-Tech Research

      Evaluate Hyperconverged Infrastructure for Your Infrastructure Roadmap

      • This Info-Tech note covers evaluation of HCI platforms.

      Design Your Cloud Operations

      • This Info-Tech blueprint covers organization of operations teams for various deployment and Agile modes.

      Bibliography

      Banks, Ethan, host. "Choosing Your Next Infrastructure." Datanauts, episode 094, Packet Pushers, 26 July 2017. Podcast.
      "Composable Infrastructure Solutions." Hewlett Packard Canada, n.d. Web.
      "Composable Infrastructure Technology." Liqid Inc., n.d. Web.
      "DataOps architecture design." Azure Architecture Center, Microsoft Learn, n.d. Web.
      Tan, Pei Send. "Differences: DevOps, ITOps, MLOps, DataOps, ModelOps, AIOps, SecOps, DevSecOps." Medium, 5 July 2021. Web.

      Recruit and Retain People of Color in IT

      • Buy Link or Shortcode: {j2store}546|cart{/j2store}
      • member rating overall impact: 9.7/10 Overall Impact
      • member rating average dollars saved: $19,184 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • Organizations have been trying to promote equality for many years. Diversity and inclusion strategies and a myriad of programs have been implemented in companies across the world. Despite the attempts, many organizations still struggle to ensure that their workforce is representative of the populations they support or want to support.
      • IT brings another twist. Many IT companies and departments are based on the culture of white males, and underrepresented ethnic communities find it more of a challenge to fit in.
      • This sometimes means that talented minorities are less incentivized to join or stay in technology.

      Our Advice

      Critical Insight

      • Diversity and inclusion cannot be a one-time campaign or a one-off initiative.
      • For real change to happen, every leader needs to internalize the value of creating and retaining diverse teams.

      Impact and Result

      • To stay competitive, IT leaders need to be more involved and commit to a plan to recruit and retain people of color in their departments and organizations. A diverse team is an answer to innovation that can differentiate your company.
      • Treat recruiting and retaining a diverse team as a business challenge that requires full engagement. Info-Tech offers a targeted solution that will help IT leaders build a plan to attract, recruit, engage, and retain people of color.

      Recruit and Retain People of Color in IT Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should recruit and retain people of color in your IT department or organization, review Info-Tech’s methodology, and understand the ways we can support you in this endeavor.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Recruit people of color in IT

      Diverse teams are necessary to foster creativity and guide business strategies. Overcome limitations by recruiting people of color and creating a diverse workforce.

      • Recruit and Retain People of Color in IT – Phase 1: Recruit People of Color in IT
      • Support Plan
      • IT Behavioral Interview Question Library

      2. Retain people of color in IT

      Underrepresented employees benefit from an expansive culture. Create an inclusive environment and retain people of color and promote value within your organization.

      • Recruit and Retain People of Color in IT – Phase 2: Retain People of Color in IT

      Infographic

      Workshop: Recruit and Retain People of Color in IT

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Setting the Stage

      The Purpose

      Introduce challenges and concerns around recruiting and retaining people of color.

      Key Benefits Achieved

      Gain a sense of direction.

      Activities

      1.1 Introduction to diversity conversations.

      1.2 Assess areas to focus on and determine what is right, wrong, missing, and confusing.

      1.3 Obtain feedback from your team about the benefits of working at your organization.

      1.4 Establish your employee value proposition (EVP).

      1.5 Discuss and establish your recruitment goals.

      Outputs

      Current State Analysis

      Right, Wrong, Missing, Confusing Quadrant

      Draft EVP

      Recruitment Goals

      2 Refine Your Recruitment Process

      The Purpose

      Identify areas in your current recruitment process that are preventing you from hiring people of color.

      Establish a plan to make improvements.

      Key Benefits Achieved

      Optimized recruitment process

      Activities

      2.1 Brainstorm and research community partners.

      2.2 Review current job descriptions and equity statement.

      2.3 Update job description template and equity statement.

      2.4 Set team structure for interview and assessment.

      2.5 Identify decision-making structure.

      Outputs

      List of community partners

      Updated job description template

      Updated equity statement

      Interview and assessment structure

      Behavioral Question Library

      3 Culture and Management

      The Purpose

      Create a plan for an inclusive culture where your managers are supported.

      Key Benefits Achieved

      Awareness of how to better support employees of color.

      Activities

      3.1 Discuss engagement and belonging.

      3.2 Augment your onboarding materials.

      3.3 Create an inclusive culture plan.

      3.4 Determine how to support your management team.

      Outputs

      List of onboarding content

      Inclusive culture plan

      Management support plan

      4 Close the Loop

      The Purpose

      Establish mechanisms to gain feedback from your employees and act on them.

      Key Benefits Achieved

      Finalize the plan to create your diverse and inclusive workforce.

      Activities

      4.1 Ask and listen: determine what to ask your employees.

      4.2 Create your roadmap.

      4.3 Wrap-up and next steps.

      Outputs

      List of survey questions

      Roadmap

      Completed support plan

      Microsoft Teams Cookbook

      • Buy Link or Shortcode: {j2store}408|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $6,299 Average $ Saved
      • member rating average days saved: 27 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity

      Remote work calls for leveraging your Office 365 license to use Microsoft Teams – but IT is unsure about best practices for governance and permissions. Moreover, IT has few resources to help train end users with Teams best practices.

      Our Advice

      Critical Insight

      Microsoft Teams is not a standalone app. Successful utilization of Teams occurs when conceived in the broader context of how it integrates with Office 365. Understanding how information flows between Teams, SharePoint Online, and OneDrive for Business, for instance, will aid governance with permissions, information storage, and file sharing.

      Impact and Result

      Use Info-Tech’s Microsoft Teams Cookbook to successfully implement and use Teams. This cookbook includes recipes for:

      • IT best practices concerning governance of the creation process and Teams rollout.
      • End-user best practices for Teams functionality and common use cases.

      Microsoft Teams Cookbook Research & Tools

      Start here – read the Executive Brief

      Learn critical insights for an effective Teams rollout.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Microsoft Teams Cookbook – Sections 1-2

      1. Teams for IT

      Understand best practices for governance of the Teams creation process and Teams rollout.

      • Microsoft Teams Cookbook – Section 1: Teams for IT

      2. Teams for end users

      Get end users on board with this series of how-tos and common use cases for Teams.

      • Microsoft Teams Cookbook – Section 2: Teams for End Users

      [infographic]

       

      Further reading

      Microsoft Teams Cookbook

      Recipes for best practices and use cases for Microsoft Teams.

      Table of contents

      Executive Brief

      Section 1: Teams for IT

      Section 2: Teams for End Users

      Executive Summary

      Situation

      Remote work calls for leveraging your Office 365 license to utilize Teams – but IT is unsure about best practices for governance and permissions.

      Without a framework or plan for governing the rollout of Teams, IT risks overlooking secure use of Teams, the phenomenon of “teams sprawl,” and not realizing how Teams integrates with Office 365 more broadly.

      Complication

      Teams needs to be rolled out quickly, but IT has few resources to help train end users with Teams best practices.

      With teams, channels, chats, meetings, and live events to choose from, end users may get frustrated with lack of guidance on how to use Teams’ many capabilities.

      Resolution

      Use Info-Tech’s Microsoft Teams Cookbook to successfully implement and utilize Teams. This cookbook includes recipes for:

      • IT best practices concerning governance of the creation process and Teams rollout.
      • End-user best practices for Teams functionality and common use cases.

      Key Insights

      Teams is not a standalone app

      Successful utilization of Teams occurs when conceived in the broader context of how it integrates with Office 365. Understanding how information flows between Teams, SharePoint Online, and OneDrive for Business, for instance, will aid governance with permissions, information storage, and file sharing.

      IT should paint the first picture for team creation

      No initial governance for team creation can lead to “teams sprawl.” While Teams was built to allow end users’ creativity to flow in creating teams and channels, this can create problems with a cluttered interface and keeping track of information. To prevent end-user dissatisfaction here, IT’s initial Teams rollout should offer a basic structure for end users to work with first, limiting early teams sprawl.

      The Teams admin center can only take you so far with permissions

      Knowing how Teams integrates with other Office 365 apps will help with rolling out sensitivity labels to protect important information being accidentally shared in Teams. Of course, technology only does so much – proper processes to train and hold people accountable for their actions with data sharing must be implemented, too.

      Related Info-Tech Research

      Establish a Communication and Collaboration System Strategy

      Don’t waste your time deploying yet another collaboration tool that won’t get used.

      Modernize Communication and Collaboration Infrastructure

      Your legacy telephony infrastructure is dragging you down – modern communications and collaboration technology will dramatically improve productivity.

      Migrate to Office 365 Now

      One small step to cloud, one big leap to Office 365. The key is to look before you leap.

      Section 1: Teams for IT

      Governance best practices and use cases for IT

      Section 1

      Teams for IT

      Section 2

      Teams for end users

      From determining prerequisites to engaging end users.

      IT fundamentals
      • Creation process
      • Teams rollout
      Use cases
      • Retain and search for legal/regulatory compliance
      • Add an external user to a team
      • Delete/archive a team

      Overview: Creation process

      IT needs to be prepared to manage other dependent services when rolling out Teams. See the figure below for how Teams integrates with these other Office 365 applications.

      A flow chart outlining how Teams integrates with other Office 365 applications. Along the side are different applications, from the top: 'Teams client', 'OneDrive for Business', 'Sharepoint Online', 'Planner (Tasks for Teams)', 'Exchange Online', and 'Stream'. Along the top are services of 'Teams client', 'Files', 'Teams', 'Chat', 'Meeting', and 'Calls'.

      Which Microsoft 365 license do I need to access Teams?

      • Microsoft 365 Business Essentials
      • Microsoft 365 Business Premium
      • Office 365 Enterprise, E1, E3, or E5
      • Office 365 Enterprise E4 (if purchased prior to its retirement)

      Please note: To appeal to the majority of Info-Tech’s members, this blueprint refers to Teams in the context of Office 365 Enterprise licenses.

      Assign admin roles

      You will already have at least one global administrator from setting up Office 365.

      Global administrators have almost unlimited access to settings and most of the data within the software, so Microsoft recommends having only two to four IT and business owners responsible for data and security.

      Info-Tech Best Practice

      Configure multifactor authentication for your dedicated Office 365 global administrator accounts and set up two-step verification.

      Once you have organized your global administrators, you can designate your other administrators with “just-enough” access for managing Teams. There are four administrator roles:

      Teams Service Administrator Manage the Teams service; manage and create Microsoft 365 groups.
      Teams Communications Administrator Manage calling and meetings features with Teams.
      Teams Communications Support Engineer Troubleshoot communications issues within Teams using the advanced troubleshooting toolset.
      Teams Communications Support Specialist Troubleshoot communications issues using Call Analytics.

      Prepare the network

      There are three prerequisites before Teams can be rolled out:

      • UDP ports 3478 through 3481 are opened.
      • You have a verified domain for Office 365.
      • Office 365 has been rolled out, including Exchange Online and SharePoint Online.

      Microsoft then recommends the following checklist to optimize your Teams utilization:

      • Optimize calls and performance using the Call Quality Dashboard.
      • Assess network requirements in the Network Planner in the Teams admin center.
      • Ensure all computers running Teams client can resolve external DNS queries.
      • Check adequate public IP addresses are assigned to the NAT pools to prevent port exhaustion.
      • Route to local or regional Microsoft data centers.
      • Whitelist all Office 365 URLs to move through security layers, especially IDS/IPS.
      • Split tunnel Teams traffic so it bypasses your organization’s VPN.

      Info-Tech Best Practice

      For online support and walkthroughs, utilize Advisor for Teams. This assistant can be found in the Teams admin center.

      Team Creation

      You can create and manage Teams through the Teams PowerShell module and the Teams admin center. Only the global administrator and Teams service administrator have full administrative capabilities in this center.

      Governance over team creation intends to prevent “teams sprawl” – the phenomenon whereby end users create team upon team without guidance. This creates a disorganized interface, with issues over finding the correct team and sharing the right information.

      Prevent teams sprawl by painting the first picture for end users:

      1. Decide what kind of team grouping would best fit your organization: by department or by project.
      2. Start with a small number of teams before letting end users’ creativity take over. This will prevent initial death by notifications and support adoption.
      3. Add people or groups to these teams. Assign multiple owners for each team in case people move around at the start of rollout or someone leaves the organization.
      4. Each team has a general channel that cannot be removed. Use it for sharing an overview of the team’s goals, onboarding, and announcements.

      Info-Tech Best Practice

      For smaller organizations that are project-driven, organize teams by projects. For larger organizations with established, siloed departments, organize by department; projects within departments can become channels.

      Integrations with SharePoint Online

      Teams does not integrate with SharePoint Server.

      Governance of Teams is important because of how tightly it integrates with other Office 365 apps, including SharePoint Online.

      A poor rollout of Teams will have ramifications in SharePoint. A good rollout will optimize these apps for the organization.

      Teams and SharePoint integrate in the following ways:

      • Each team created in Teams automatically generates a SharePoint team site behind it. All documents and chat shared through a team are stored in that team’s SharePoint document library.
      • As such, all files shared through Teams are subject to SharePoint permissions.
      • Existing SharePoint folders can be tied to a team without needing to create a new one.
      • If governance over resource sharing in Teams is poor, information can get lost, duplicated, or cluttered throughout both Teams and SharePoint.

      Info-Tech Best Practice

      End users should be encouraged to integrate their teams and channels with existing SharePoint folders and, where no folder exists, to create one in SharePoint first before then attaching a team to it.

      Permissions

      Within the Teams admin center, the global or Teams service administrator can manage Teams policies.

      Typical Teams policies requiring governance include:

      • The extent end users can discover or create private teams or channels
      • Messaging policies
      • Third-party app use

      Chosen policies can be either applied globally or assigned to specific users.

      Info-Tech Best Practice

      If organizations need to share sensitive information within the bounds of a certain group, private channels help protect this data. However, inviting users into that channel will enable them to see all shared history.

      External and guest access

      Within the security and compliance center, the global or Teams service administrator can set external and guest access.

      External access (federation) – turned on by default.

      • Lets you find, call, and chat with users in other domains. External users will have no access to the organization’s teams or team resources.

      Guest access – turned off by default.

      • Lets you add individual users with their own email address. You do this when you want external users to access teams and team resources. Approved guests will be added to the organization’s active directory.

      If guest access is enabled, it is subject to Azure AD and Office 365 licensing and service limits. Guests will have no access to the following, which cannot be changed:

      • OneDrive for Business
      • An organization’s calendar/meetings
      • PSTN
      • Organization’s hierarchical chart
      • The ability to create, revise, or browse a team
      • Upload files to one-on-one chat

      Info-Tech Best Practice

      Within the security and compliance center, you can allow users to add sensitivity labels to their teams that can prevent external and guest access.

      Expiration and archiving

      To reduce the number of unused teams and channels, or delete information permanently, the global or Teams service administrator can implement an Office 365 group expiration and archiving policy through the Teams admin center.

      If a team has an expiration policy applied to it, the team owner will receive a notification for team renewal 30 days, 15 days, and 1 day before the expiry date. They can renew their team at any point within this time.

      • To prevent accidental deletion, auto-renewal is enabled for a team. If the team owner is unable to manually respond, any team that has one channel visit from a team member before expiry is automatically renewed.
      • A deleted Office 365 group is retained for 30 days and can be restored at any point within this time.

      Alternatively, teams and their channels (including private) can be archived. This will mean that all activity for the team ceases. However, you can still add, remove, and update roles of the members.

      Retention and data loss prevention

      Retention policies can be created and managed in the Microsoft 365 Compliance Center or the security and compliance center PowerShell cmdlets. This can be applied globally or to specific users.

      By default, information shared through Teams is retained forever.

      However, setting up retention policies ensures data is retained for a specified time regardless of what happens to that data within Teams (e.g. user deletes).

      Info-Tech Best Practice

      To prevent external or guest users accessing and deleting sensitive data, Teams is able to block this content when shared by internal users. Ensure this is configured appropriately in your organization:

      • For guest access in teams and channels
      • For external access in meetings and chat

      Please note the following limitations of Teams’ retention and data loss prevention:

      • Organization-wide retention policies will need to be manually inputted into Teams. This is because Teams requires a retention policy that is independent of other workloads.
      • As of May 2020, retention policies apply to all information in Teams except private channel messages. Files shared in private channels, though, are subject to retention policies.
      • Teams does not support advanced retention settings, such as a policy that pertains to specific keywords or sensitive information.
      • It will take three to seven days to permanently delete expired messages.

      Teams telephony

      Teams has built-in functionality to call any team member within the organization through VoIP.

      However, Teams does not automatically connect to the PSTN, meaning that calling or receiving calls from external users is not immediately possible.

      Bridging VoIP calls with the PSTN through Teams is available as an add-on that can be attached to an E3 license or as part of an E5 license.

      There are two options to enable this capability:

      • Enable Phone System. This allows for call control and PBX capabilities in Office 365.
      • Use direct routing. You can use an existing PSTN connection via a Session Border Controller that links with Teams (Amaxra).

      Steps to implement Teams telephony:

      1. Ensure Phone System and required (non-Microsoft-related) services are available in your country or region.
      2. Purchase and assign Phone System and Calling Plan licenses. If Calling Plans are not available in your country or region, Microsoft recommends using Direct Routing.
      3. Get phone numbers and/or service numbers. There are three ways to do this:
        • Get new numbers through the Teams admin center.
        • If you cannot get new numbers through the Teams admin center, you can request new numbers from Microsoft directly.
        • Port or transfer existing numbers. To do this, you need to send Microsoft a letter of authorization, giving them permission to request and transfer existing numbers on your behalf.
      4. To enable service numbers, including toll-free numbers, Microsoft recommends setting up Communications Credits for your Calling Plans and Audio Conferencing.

      Overview: Teams rollout

      1. From Skype (and Slack) to Teams
      2. Gain stakeholder purchase
      3. Employ a phased deployment
      4. Engage end users

      Skype for Business is being retired; Microsoft offers a range of transitions to Teams.

      Combine the best transition mode with Info-Tech’s adoption best practices to successfully onboard and socialize Teams.

      From Skype to Teams

      Skype for Business Online will be retired on July 31, 2021. Choose from the options below to see which transition mode is right for your organization.

      Skype for Business On-Premises will be retired in 2024. To upgrade to Teams, first configure hybrid connectivity to Skype for Business Online.

      Islands mode (default)

      • Skype for Business and Teams coexist while Teams is rolled out.
      • Recommended for phased rollouts or when Teams is ready to use for chat, calling, and meetings.
      • Interoperability is limited. Teams and Skype for Business only transfer information if an internal Teams user sends communications to an external Skype for Business user.

      Teams only mode (final)

      • All capabilities are enabled in Teams and Skype for Business is disabled.
      • Recommended when end users are ready to switch fully to Teams.
      • End users may retain Skype for Business to join meetings with non-upgraded or external parties. However, this communication is only initiated from the Skype for Business external user.

      Collaboration first mode

      • Skype for Business and Teams coexist, but only Teams’ collaboration capabilities are enabled. Teams communications capabilities are turned off.
      • Recommended to leverage Skype for Business communications yet utilize Teams for collaboration.

      Meetings first mode

      • Skype for Business and Teams coexist, but only Teams’ meetings capabilities are enabled.
      • Recommended for organizations that want to leverage their Skype for Business On-Premises’ Enterprise Voice capability but want to benefit from Teams’ meetings through VoIP.

      From Slack to Teams

      The more that’s left behind in Slack, the easier the transition. As a prerequisite, pull together the following information:

      • Usage statistics of Slack workspaces and channels
      • What apps end users utilize in Slack
      • What message history you want to export
      • A list of users whose Slack accounts can map on to required Microsoft accounts
      Test content migration

      Your Slack service plan will determine what you can and can’t migrate. By default, public channels content can be exported. However, private channels may not be exportable, and a third-party app is needed to migrate Direct Messages.

      Files migration

      Once you have set up your teams and channels in Teams, you can programmatically copy files from Slack into the target Teams channel.

      Apps migration

      Once you have a list of apps and their configurations used in Slack’s workspaces, you can search in Teams’ app store to see if they’re available for Teams.

      User identity migration

      Slack user identities may not map onto a Microsoft account. This will cause migration issues, such as problems with exporting text content posted by that user.

      Follow the migration steps to the right.

      Importantly, determine which Slack workspaces and channels should become teams and channels within Teams.

      Usage statistics from Slack can help pinpoint which workspaces and channels are redundant.

      This will help IT paint an ordered first picture for new Teams end users.

      1. Create teams and channels in Teams
      2. Copy files into Teams
      3. Install apps, configure Office 365 Connecters
      4. Import Slack history
      5. Disable Slack user accounts

      Info-Tech Best Practice

      Avoid data-handling violations. Determine what privacy and compliance regulations (if any) apply to the handling, storage, and processing of data during this migration.

      Gain stakeholder purchase

      Change management is a challenging aspect of implementing a new collaboration tool. Creating a communication and adoption plan is crucial to achieving universal buy-in for Teams.

      To start, define SMART objectives and create a goals cascade.

      Specific Measurable Actionable Realistic Time Bound
      Make sure the objective is clear and detailed. Objectives are `measurable` if there are specific metrics assigned to measure success. Metrics should be objective. Objectives become actionable when specific initiatives designed to achieve the objective are identified. Objectives must be achievable given your current resources or known available resources. An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.
      Who, what, where, why? How will you measure the extent to which the goal is met? What is the action-oriented verb? Is this within my capabilities? By when: deadline, frequency?

      Sample list of stakeholder-specific benefits from improving collaboration

      Stakeholder Driver Benefits
      Senior Leadership Resource optimization Increased transparency into IT operational costs.
      Better ability to forecast hardware, resourcing costs.
      All employees Increasing productivity Apps deployed faster.
      Issues fixed faster.
      Easier access to files.
      Able to work more easily offsite.
      LBU-HR, legal, finance Mitigating risk Better able to verify compliance with external regulations.
      Better understanding of IT risks.
      Service desk Resource optimization Able to resolve issues faster.
      Fewer issues stemming from updates.
      Tier 2 Increasing productivity Less time spent on routine maintenance.

      Use these activities to define what pain points stakeholders face and how Teams can directly mitigate those pain points.

      (Source: Rationalize Your Collaboration Tools (coming soon), Activities: 3.1C – 3.1D)

      Employ a phased deployment

      Info-Tech Best Practice

      Deploy Teams over a series of phases. As such, if you are already using Skype for Business, choose one of the coexistence phases to start.

        1. Identify and pilot Teams with early adopters that will become your champions. These champions should be formally trained, be encouraged to help and train their colleagues, and be positively reinforced for their efforts.
        2. Iron out bugs identified with the pilot group and train middle management. Enterprise collaboration tool adoption is strongly correlated with leadership adoption.
          1. Top-level management
            Control and direct overall organization.
          2. Middle management
            Execute top-level management’s plans in accordance with organization’s norms.
          3. First-level management
            Execute day-to-day activities.
        3. Use Info-Tech’s one-pager marketing template to advertise the new tool to stakeholders. Highlight how the new tool addresses specific pain points. Address questions stemming from fear and uncertainty to avoid employees’ embarrassment or their rejection of the tool.
      A screenshot of Info-Tech's one-pager marketing template.
      1. Extend the pilot to other departments and continue this process for the whole organization.

      (Source: Rationalize Your Collaboration Tools (coming soon), Tools:GANTT Chart and Marketing Materials, Activities: 3.2A – 3.2B)

      Info-Tech Insight

      Be in control of setting and maintaining expectations. Aligning expectations with reality and the needs of employees will lower onboarding resistance.

      Engage end users

      Short-term best practices

      Launch day:
      • Hold a “lunch and learn” targeted training session to walk end users through common use cases.
      • Open a booth or virtual session (through Teams!) and have tool representatives available to answer questions.
      • Create a game to get users exploring the new tool – from scavenger hunts to bingo.
      Launch week:
      • Offer incentives for using the tool and helping others, including small gift cards.
      • Publicize achievements if departments hit adoption milestones.

      Long-term best practices

      • Make available additional training past launch week. End users should keep learning new features to improve familiarity.
      • Distribute frequent training clips, slowly exposing end users to more complex ways of utilizing Teams.
      • Continue to positively reinforce and recognize those who use Teams well. This could be celebrating those that help others use the tool, how active certain users are, and attendance at learning events.

      Info-Tech Best Practice

      Microsoft has a range of training support that can be utilized. From instructor-led training to “Coffee in the Cloud” sessions, leverage all the support you can.

      Use case #1: Retain and search data for legal/regulatory compliance

      Scenario:

      Your organization requires you to retain data and documents for a certain period of time; however, after this period, your organization wishes to delete or archive the data instead of maintaining it indefinitely. Within the timeframe of the retention policy, the admin may be asked to retrieve information that has been requested through a legal channel.

      Purpose:
      • Maintain compliance with the legal and regulatory standards to which the organization is subject.
      Jobs:
      • Ensure the data is retained for the approved time period.
      • Ensure the policy applies to all relevant data and users.
      Solution: Retention Policies
      • Ensure that your organization has an Office 365 E3 or higher license.
      • Set the desired retention policy through the Security & Compliance Center or PowerShell by deciding which teams, channels, chats, and users the policies will apply to and what will happen once the retention period ends.
      • Ensure that matching retention policies are applied to SharePoint and OneDrive, since this is where files shared in Teams are stored.
      • Be aware that Teams retention policies cannot be applied to messages in private channels.
      Solution: e-Discovery
      • If legally necessary, place users or Teams on legal hold in order to retain data that would be otherwise deleted by your organization’s retention policies.
      • Perform e-discovery on Teams messages, files, and summaries of meetings and calls through the Security & Compliance Center.
      • See Microsoft’s chart on the next slide for what is e-discoverable.

      Content subject to e-discovery

      Content type eDiscoverable Notes
      Teams chat messages Yes Chat messages from chats where guest users are the only participants in a 1:1 or 1:N chat are not e-discoverable.
      Audio recordings No  
      Private channel messages Yes  
      Emojis, GIFs, stickers Yes  
      Code snippets No  
      Chat links Yes  
      Reactions (likes, hearts, etc) No  
      Edited messages Yes If the user is on hold, previous versions of edited messages are preserved.
      Inline images Yes  
      Tables Yes  
      Subject Yes  
      Quotes Yes Quoted content is searchable. However, search results don’t indicate that the content was quoted.
      Name of channel No  

      E-discovery does not capture audio messages and read receipts in MS Teams.

      Since files shared in private channels are stored separately from the rest of a team, follow Microsoft’s directions for how to include private channels in e-discovery. (Source: “Conduct an eDiscovery investigation of content in Microsoft Teams,” Microsoft, 2020.)

      Use case #2: Add external person to a team

      Scenario:

      A team in your organization needs to work in an ongoing way with someone external to the company. This user needs access to the relevant team’s work environment, but they should not be privy to the goings-on in the other parts of the organization.

      Jobs:

      This external person needs to be able to:

      • Attend meetings
      • Join calls
      • Chat with individual team members
      • View and collaborate on the team’s files
      Solution:
      • If necessary, set a data loss prevention policy to prevent your users from sharing certain types of information or files with external users present in your organization’s Teams chats and public channels.
      • Ensure that your Microsoft license includes DLP protection. However:
        • DLP cannot be applied to private channel messages.
        • DLP cannot block messages from external Skype for Business users nor external users who are not in “Teams only” mode.
      • Ensure that you have a team set up for the project that you wish the external user to join. The external user will be able to see all the channels in this team, unless you create a private channel they are restricted from.
      • Complete Microsoft’s “Guest Access Checklist” to enable guest access in Teams, if it isn’t already enabled.
      • As admin, give the external user guest access through the Teams admin center or Azure AD B2B collaboration. (If given permission, team owners can also add guests through the Teams client).
      • Decide whether to set a policy to monitor and audit external user activity.

      Use case #3: Delete/archive a team

      Scenario:

      In order to avoid teams sprawl, organizations may want IT to periodically delete or archive unused teams within the Teams client in order to improve the user interface.

      Alternately, if you are using a project-based approach to organizing Teams, you may wish to formalize a process to archive a team once the project is complete.

      Delete:
      • Determine if the team owner anticipates the team will need to be restored one day.
      • Ensure that deletion does not contradict the organization’s retention policy.
      • If not, proceed with deletion. Find the team in the Teams admin center and delete.
      • Restore a deleted team within 30 days of its initial deletion through PowerShell.
      Archive:
      • Determine if the team owner anticipates the team will need to be restored one day.
      • Find the relevant team in the Teams admin center and change its status to “Archived.”
      • Restore the archived team if the workspace becomes relevant once again.

      Info-Tech Best Practice

      Remind end users that they can hide teams or channels they do not wish to see in their Teams interface. Knowing a team can be hidden may impact a team owner’s decision to delete it.

      Section 2: Teams for End Users

      Best practices for utilizing teams, channels, chat, meetings, and live events

      Section 1

      Teams for IT

      Section 2

      Teams for end users

      From Teams how-tos to common use cases for end users.

      End user basics
      • Teams, channels, and chat
      • Meetings and live events
      Common use cases: Workspaces
      • WS#1: Departments
      • WS#2: A cross-functional committee
      • WS#3: An innovation day event
      • WS#4: A non-work-related social event
      • WS#5: A project team with a defined end time
      Common use cases: Meetings
      • M#1: Job interview with an external candidate
      • M#2: Quarterly board meeting
      • M#3: Weekly recurring team meeting
      • M#4: Morning stand-up/scrum
      • M#5: Phone call between two people

      Overview: Teams, channels, and chat

      Teams

      • Team: A workspace for a group of collaborative individuals.
        • Public channel: A focused area where all members of a team can meet, communicate, and share ideas and content.
        • Private channel: Like a public channel but restricted to a subset of team members, defined by channel owner.

      Chat

      • Chat: Two or more users collected into a common conversation thread.
      (Source: “Overview of teams and channels in Microsoft Teams,” Microsoft, 2020.)

      For any Microsoft Teams newcomer, the differences between teams, channels, and chat can be confusing.

      Use Microsoft’s figure (left) to see how these three mediums differ in their role and function.

      Best practices: Workspaces 1/2

        Team
      A workspace for a group of collaborative individuals.
      Public Channel
      A focused area where all members of a team can meet, communicate, and share ideas and content.
      Private Channel
      Like a public channel but restricted to a subset of team members, defined by channel owner.
      Group Chat
      Two or more users collected into a common conversation thread.
      Limits and Administrative Control
      Who can create? Default setting: All users in an organization can create a team

      Maximum 500,000 teams per tenant

      Any member of a team can create a public channel within the team

      Maximum 200 public channels per team

      Any member of a team can create a private channel and define its members

      Maximum 30 private channels per team

      Anyone
      Who can add members? Team owner(s); max 5,000 members per team N/A Channel owner(s) can add up to 250 members Anyone can bring new members into the chat (and decide if they can see the previous history) up to 100 members
      Who can delete? Team owner/admin can delete Any team member Channel owner(s) Anyone can leave a chat but cannot delete chat, but they are never effectively deleted
      Social Context
      Who can see it? Public teams are indexed and searchable

      Private teams are not indexed and are visible only to joined members

      All members of the team can see all public channels. Channels may be hidden from view for the purposes of cleaning up the UI. Individuals will only see private channels for which they have membership Only participants in the group chat can see the group chat
      Who can see the content? Team members can see any content that is not otherwise part of a private channel All team members All members of the private channel Only members of the group chat

      When does a Group Chat become a Channel?

      • When it’s appropriate for the conversation to have a gallery – an audience of members who may not be actively participating in the discussion.
      • When control over who joins the conversation needs to be centrally governed and not left up to anyone in the discussion.
      • When the discussion will persist over a longer time period.
      • When the number of participants approaches 100.

      When does a Channel become a Team?

      • When a team approaches 30 private channels, many of those private channels are likely candidates to become their own team.
      • When the channel membership needs to extend beyond the boundary of the team membership.

      Best practices: Workspaces 2/2

        Team
      A workspace for a group of collaborative individuals.
      Public Channel
      A focused area where all members of a team can meet, communicate, and share ideas and content.
      Private Channel
      Like a public channel but restricted to a subset of team members, defined by channel owner.
      Group Chat
      Two or more users collected into a common conversation thread.
      Data and Applications
      Where does the content live? SharePoint: Every team resides in its own SharePoint site SharePoint: Each team (public and private) has its own folder off the root of the SharePoint site’s repository SharePoint: Each team (public and private) has its own folder off the root of the SharePoint site’s repository OneDrive: Files that are shared in a chat are stored in the OneDrive folder of the original poster and shared to the other members
      How does the data persist or be retained? If a team expires/is deleted, its corresponding SharePoint site and those artifacts are also deleted Available for 21 days after deletion. Any member of the team can delete a public channel. The team owner and private channel owner can delete/restore a private channel Chats are never effectively deleted. They can be hidden to clean up the user interface.
      Video N/A Yes, select “Meet now” in channel below text entry box Yes, select “Meet now” in channel below text entry box Yes
      Phone calls N/A Yes, select “Meet now” in channel below text entry box Yes, select “Meet now” in channel below text entry box Yes
      Shared computer audio/screen N/A Yes, select “Meet now” in channel below text entry box Yes, select “Meet now” in channel below text entry box Yes
      File-sharing Within channels Yes. Frequently used/collaborated files can be turned into discrete tab. Yes. Frequently used/collaborated files can be turned into discrete tab. Yes
      Wikis Within channels Yes Yes No
      Whiteboarding No No No No

      When does a Team become a Channel?

      • When a team’s purpose for existing can logically be subsumed by another team that has a larger scope.

      When does a Channel become a Group Chat?

      • When a conversation within a channel between select users does not pertain to that channel’s scope (or any other existing channel), they should move the conversation to a group chat.
      • However, this is until that group chat desires to form a channel of its own.

      Create a new team

      Team owner: The person who creates the team. It is possible for the team owner to then invite other members of the team to become co-owners to distribute administrative responsibilities.

      Team members: People who have accepted their invitation to be a part of the team.

      NB: Your organization can control who has permission to set up a team. If you can’t set a up a team, contact your IT department.

      Screenshots detailing how to create a new team in Microsoft Teams, steps 1 to 3. Step 1: 'Click the <Teams data-verified= tab on the left-hand side of the app'. Step 2: 'At the bottom of the app, click '. Step 3: 'Under the banner , click '.">

      Create a new team

      Screenshot detailing how to create a new team in Microsoft Teams, the step 4 starting point with an arrow pointing to the 'Build a team from scratch' button.

      Decide from these two options:

      • Building a team from scratch, which will create a new group with no prior history imported (steps 4.1–4.3).
      • Creating a team from an existing group in Office 365, including an already existing team (steps 4.4–4.6).

      NB: You cannot create a team from an existing group if:

      • That group has 5,000 members or more.
      • That group is in Yammer.

      Screenshot detailing how to create a new team in Microsoft Teams, step 4.1. There are buttons for 'Private' and 'Public'.

      Decide if you want you new team from scratch to be private or public. If you set up a private team, any internal or external user you invite into the team will have access to all team history and files shared.

      Screenshot detailing how to create a new team in Microsoft Teams, step 4.2 and 4.3. 4.2 has a space to give your team a name and another for a description. 4.3 says 'Then click <Create data-verified='.">

      Create a new team

      Screenshot detailing how to create a new team in Microsoft Teams, the step 4 starting point with an arrow pointing to the 'Create from...' button.

      Decide from these two options:

      • Building a team from scratch, which will create a new group with no prior history imported (steps 4.1–4.3).
      • Creating a team from an existing group in Office 365, including an already existing team (steps 4.4–4.6).

      NB: You cannot create a team from an existing group if:

      • That group has 5,000 members or more.
      • That group is in Yammer.

      Screenshot detailing how to create a new team in Microsoft Teams, step 4.4. It reads 'Create a new team from something you already own' with a button for 'Team'.

      Configure your new team settings, including privacy, apps, tabs, and members.

      Screenshot detailing how to create a new team in Microsoft Teams, step 4.5 and 4.6. 4.5 has a space to give your team a name, a description, choose privacy settings, and what you'd like to include from the original team. 4.6 says 'Then click <Create data-verified='.">

      Add team members

      Remove team members

      Screenshot detailing how to add team members in Microsoft Teams, step 1.

      To add a team member, on the right-hand side of the team name, click “More options.”

      Then, from the drop-down menu, click “Add member.”

      Screenshot detailing how to remove team members in Microsoft Teams, step 1.

      Only team owners can remove a team member. To do so, on the right-hand side of the team name, click “More options.”

      Then, from the drop-down menu, click “Manage team.”

      Screenshot detailing how to add team members in Microsoft Teams, step 2.

      If you’re a team owner, you can then type a name or an email address to add another member to the team.

      If you’re a team member, typing a name or an email address will send a request to the team owner to consider adding the member.

      Screenshot detailing how to remove team members in Microsoft Teams, step 2.

      Under the “Members” tab, you’ll see a list of the members in the team. Click the “X” at the far right of the member’s name to remove them.

      Team owners can only be removed if they change their role to team member first.

      Create a new channel

      Screenshot detailing how to create a new channel in Microsoft Teams, step 1.

      On the right-hand side of the team name, click “More options.”

      Then, from the drop-down menu, click “Add channel.”

      Screenshot detailing how to create a new channel in Microsoft Teams, step 2.

      Name your channel, give a description, and set your channel’s privacy.

      Screenshot detailing how to create a new channel in Microsoft Teams, step 3.

      To manage subsequent permissions, on the right-hand side of the channel name, click “More options.”

      Then, from the drop-down menu, click “Manage channel.”

      Adding and removing members from channels:

      Only members in a team can see that team’s channels. Setting channel privacy as “standard” means that the channel can be accessed by anyone in a team. Unless privacy settings for a channel are set as “private” (from which the channel creator can choose who can be in that channel), there is no current way to remove members from channels.

      It will be up to the end user to decide which channels they want to hide.

      Link team/channel to SharePoint folder

      Screenshot detailing how to link a team or channel to a SharePoint folder in Microsoft Teams, steps 1, 2, and 3. Step 1: 'Along the top of the team/channel tab bar, click the “+” symbol'. Step 2: 'Select “Document Library” to link the team/channel to a SharePoint folder'. Step 3: 'Copy and paste the SharePoint URL for the desired folder, or search in “Relevant sites” if the folder can be found there'.

      Need to find the SharePoint URL?

      Screenshot detailing how to find the SharePoint URL in Microsoft Teams. 'Locate the folder in SharePoint and click <Show actions data-verified=', 'Click to access the folder's SharePoint URL.'">

      Hide/unhide teams

      Hide/unhide channels

      Screenshot detailing how to hide and unhide teams in Microsoft Teams, step 1.

      To hide a team, on the right-hand side of the team name, click “More options.”

      Then, from the drop-down menu, click “Hide.” Hidden teams are moved to the “hidden teams” menu at the bottom of your team list.

      Screenshot detailing how to hide and unhide channels in Microsoft Teams, step 1.

      To hide a channel, on the right-hand side of the channel name, click “More options.”

      Then, from the drop-down menu, click “Hide.” Hidden channels are moved to the “hidden channels” menu at the bottom of your channel list in that team.

      Screenshot detailing how to hide and unhide teams in Microsoft Teams, step 2. Screenshot of a button that says 'Hidden teams'.

      To unhide a team, click on the “hidden teams” menu. On the right-hand side of the team name, click “More options.”

      Then, from the drop-down menu, click “Show.”

      Screenshot detailing how to hide and unhide channels in Microsoft Teams, step 2.

      To unhide a channel, click on the “hidden channels” menu at the bottom of the team. This will produce a drop-down menu of all hidden channels in that team.

      Hover over the channel you want to unhide and click “Show.”

      Find/join teams

      Leave teams

      Screenshot detailing how to find and join teams in Microsoft Teams, step 1. Click the “Teams” tab on the left-hand side of the app. Screenshot detailing how to find and join teams in Microsoft Teams, step 2.

      At the bottom of the app, click “Join or create a team.” Teams will then suggest a range of teams that you might be looking for. You can join public teams immediately. You will have to request approval to join a private team.

      Screenshot detailing how to leave teams in Microsoft Teams.

      To leave a team, on the right-hand side of the team name, click “More options.”

      Then, from the drop-down menu, click “Leave the team.”

      NB: If the owner of a private team has switched off discoverability, you will have to contact that owner to join that team. Screenshot detailing how to find and join teams in Microsoft Teams, step 3. If you can’t immediately see the team, you have two options: either search for the team or enter that team’s code under the banner “Join a team with a code.” Can I find a channel?

      No. To join a channel, you need to first join the team that channel belongs to.

      Can I leave a channel?

      No. The most you can do is hide the channel. By default, if you join a team you will have access to all the channels within that team (unless a channel is private, in which case you’ll have to request access to that channel).

      Create a chat

      Screenshots detailing how to create a chat in Microsoft Teams, steps 1 to 5. Step 1:'Click the “Chat” tab on the left hand side of the app (or keyboard shortcut Ctrl+N)'. Step 2: 'Search the name of the person you want to chat with'. Step 3: 'You’re now ready to start the chat! You can also send a chat message while working in a separate channel by typing/chat into the search bar and entering the recipient’s name'. Step 4: 'For group chat, click the “Add people” button in the top right hand corner of the app to add other persons into the existing chat'. Step 5: 'You can then rename the group chat (if there are 3+ people) by clicking the “Name group chat” option to the right of the group chat members’ names'.

      Hide a chat

      Unhide a chat

      Screenshots detailing how to hide a chat in Microsoft Teams, steps 1 to 3. Step 1:'Click the “Chat” tab on the left-hand side of the app'. Step 2: 'Search the name of the chat or group chat that you want to hide'. Step 3: In either 'Single person chat options' or 'Group chat options' Click “More options.” Then click “Hide.”' To unhide a chat, search for the hidden person or name of the group chat in the search bar. Click “More options.” Then click “Unhide.” Screenshot detailing how to unhide a chat in Microsoft Teams.

      Leave a chat

      You can only leave group chats. To do so, click “More options.” Then click “Leave.” Screenshot detailing how to leave a chat in Microsoft Teams.

      Overview: Meetings and live events

      Teams Meetings: Real-time communication and collaboration between a group, limited to 250 people.

      Teams Live Events: designed for presentations and webinars to a large audience of up to 10,000 people, in which attendees watch rather than interact.

       

      Office 365 and Microsoft 365 Licenses

      I want to: F1 F3 E1 E3 E5 Audio conferencing add-on
      Join a Teams meeting No license required. Any email address can participate in a Teams meeting.
      Attend a Teams meeting with a dial-in phone number No license required. Any phone number can dial into a Teams meeting. (Meeting organizers need to have an Audio Conferencing add-on license to send an invite that includes dial-in conferencing.)
      Attend a Teams live event No license required. Any phone number can dial into a Teams live event.
      Create a Teams meeting for up to 250 attendees   One of these licensing plans
      Create a Teams meeting for up to 250 attendees with a dial-in phone number   One of these licensing plans + Audio Conferencing (Meeting organizers need to have an Audio Conferencing add-on license to send an invite that includes dial-in conferencing.)
      Create a Teams live event for up to 10,000 attendees     One of these licensing plans
      Dial out from a Teams meeting to add someone at their Call me at number   One of these licensing plans + Audio Conferencing (Meeting dial out to a Call me at number requires organizers to have an E5 or Audio Conference add-in license. A dial plan may also be needed.)

      Depending on the use case, end users will have to determine whether they need to hold a meeting or a live event.

      Use Microsoft’s table (left) to see what license your organization needs to perform meetings and live events.

      (Source: “Admin quick start – Meetings and live events in Microsoft Teams,” Microsoft, 2020.)

      Best practices: Meetings

        Ad Hoc Call
      Direct audio/video call
      Scheduled Meeting Live Event
      Limits and Administrative Control
      Who can create? Anyone Anyone Anyone, unless altered by admin (permission to create MS Stream events also required if external production tools are used).
      Who can add members? Anyone in the session. The meeting organizer can add new attendees to the meeting. The event creator (the “organizer”) sets attendee permissions and assigns event group roles (“producer” and “presenter”).
      Can external stakeholders attend? Yes, through email invite. However, collaboration tools are restricted. Yes, through email invite. However, collaboration tools are restricted. Public events: yes, through shared invite link.
      Org-wide event: yes, if guest/external access granted.
      Who can delete? Anyone can leave the session. There is no artifact to delete. The meeting organizer Any attendee can leave the session.
      The organizer can cancel the event.
      Maximum attendees 100 250 10,000 attendees and 10 active presenters/producers (250 presenters and producers can be present at the event).
      Social Context
      How does the request come in? Unscheduled.
      Notification of an incoming audio or video call.
      Scheduled.
      Meeting invite, populated in the calendar, at a scheduled time.
      Meeting only auto-populated in event group’s calendars. Organizer must circulate event invite link to attendees – for instance, by pasting link into an Outlook meeting invite.
      Available Functionality
      Screen-sharing Yes Yes Producers and Presenters (through Teams, no third-party app).
      Whiteboard No Yes Yes
      OneNote (for minutes) Yes (from a member’s OneDrive) Yes, part of the meeting construct. No. A Meeting Notes tab is available instead.
      Dedicated chat space Yes. Derived from a group chat. Meeting has its own chat room. The organizer can set up a moderated Q&A (not chat) when creating the event. Only Presenters and Producers can chat.
      Recording Yes Yes Yes. Event can last up to 4 hours.

      When should an Ad Hoc Call become a Scheduled Meeting?

      • When the participants need time to prepare content for the call.
      • When an answer is not required immediately.
      • When bringing a group of people together requires logistical organizing.

      When should a Scheduled Meeting become an Ad Hoc Call?

      • When the participants can meet on short notice.
      • When a topic under discussion requires creating alignment quickly.

      When should a Live Event be created?

      • When the expected attendance exceeds 250 people.
      • If the event does not require collaboration and is mostly a presenter conveying information.

      Create a scheduled meeting

      Screenshots detailing how to create a scheduled meeting in Microsoft Teams, steps 1 to 4. Step 1:'Click the “Calendar” tab on the left-hand side of the app'. Step 2: 'On the top-right of the app, click the drop-down menu for “+ New meeting” and then “Schedule meeting.”' Step 3: 'Fill in the meeting details. When inputting internal attendees, their names will drop down without needing their email. You will need to input email addresses for external attendees'. Step 4: 'To determine internal attendees’ availability, click “Scheduling assistant” on the top left. Then click “Save” to create the meeting'.

      Create an ad hoc meeting

      Screenshots detailing how to create an ad hoc meeting in Microsoft Teams, steps 1 to 4. Step 1:'Click the “Calendar” tab on the left-hand side of the app'. Step 2: 'Along the top-right, click “Meet now.”' Step 3: 'Name your meeting, choose your audio and video settings, and click “Join now.”'. Step 4: 'To determine internal attendees’ availability, click “Scheduling assistant” on the top left. Then click “Save” to create the meeting. You’ll then be prompted to fill in the meeting details. When inputting internal attendees, their names will drop down without needing their email. You will need to input email addresses for external attendees'.

      Tip: Use existing channels to host the chatrooms for your online meetings

      When you host a meeting online with Microsoft Teams, there will always be a chatroom associated with the meeting. While this is a great place for meeting participants to interact, there is one particular downside.

      Problem: The never-ending chat. Often the activity in these chatrooms can persist long after the meeting. The chatroom itself becomes, unofficially, a channel. When end users can’t keep up with the deluge of communication, the tools have failed them.

      Solution: Adding an existing channel to the meeting. This ensures that discussion activity is already hosted in the appropriate venue for the group, during and after the meeting. Furthermore, it provides non-attendees with a means to catch up on the discussion they have missed.

      In section two of this cookbook, we will often refer to this tactic.

      A screenshot detailing how to add an existing channel to a meeting in Microsoft Teams. 'Break the habit of online booking meetings in Outlook – use the Teams Calendar View instead! In order to make use of this function, the meeting must be setup in Microsoft Teams, not Microsoft Outlook. The option to assign a channel to the meeting will then be available to the meeting organizer.'

      Don’t have a channel for the chat session of your online meeting? Perhaps you should!

      If your meeting is with a group of individuals that will be collaborating frequently, they may need a workspace that persists beyond the meeting.

      Guests can still attend the meeting, but they can’t chat!

      If there are attendees in your meeting that do not have access to the channel you select to host the chat, they will not see the chat discussion nor have any ability to use this function.

      This may be appropriate in some cases – for example, a vendor providing a briefing as part of a regular team meeting.

      However, if there are attendees outside the channel membership that need to see the meeting chat, consider another channel or simply default to not assigning one.

      Meeting settings explained

      Show device settings. For settings concerning audio, video, and whether viewing is private.

      Show meeting notes. Use to take notes throughout the meeting. The notes will stay attached to this event.

      Show meeting details. Find meeting information for: a dial-in number, conference ID, and link to join.

      Enter full screen.

      Show background effects. Choose from a range of video backgrounds to hide/blur your location.

      Turn on the captions (preview). Turn on live speech-to-text captions.

      Keypad. For dialing a number within the meeting (when enabled as an add-on with E3 or as part of E5).

      Start recording. Recorded and saved using Microsoft Stream.

      End meeting.

      Turn off incoming video. To save network bandwidth, you can decline receiving attendee’s video.

      Click “More options” to access the meetings settings.

      Screen share. In the tool tray, select “Share” to share your screen. Select particular applications if you only want to share certain information; otherwise, you can share your whole desktop.

      System audio share. To share your device’s audio while screen sharing, checkbox the “Include system audio” option upon clicking “Share.”

      If you didn’t click that option at the start but now want to share audio during screen share, click the “Include systems audio” option in the tool tray along the top of the screen.

      Give/take control of screen share. To give control, click “Give control” in the tool tray along the top of the screen when sharing content. Choose from the drop-down who you would like to give control to. In the same spot, click “Take back control” when required.

      To request control, click “Request control” in the same space when viewing someone sharing their content. Click “Release control” once finished.

      Start whiteboarding

      1. You’ll first need to enable Microsoft Whiteboard in the Microsoft 365 admin center. Ask your relevant admin to do so if Whiteboard is not already enabled.
      2. Once enabled, click “Share” in a meeting. This feature only appears if you have 3+ participants in the meeting.
      3. Under the “Whiteboard” section in the bottom right, click “Microsoft Whiteboard.”
      4. Click the pen icons to the right of the screen to begin sketching.

      NB: Anonymous, federated, or guest users are currently not supported to start, view, or ink a whiteboard in a Teams meeting.

      Will the whiteboard session be recorded if the meeting is being recorded?

      No. However, the final whiteboard will be available to all meeting attendees after the meeting, under “Board Gallery” in the Microsoft Whiteboard app. Attendees can then continue to work on the whiteboard after the meeting has ended.

      Create a live event

      Screenshots detailing how to create a live event in Microsoft Teams, steps 1 to 3. Step 1: 'Click the “Calendar” tab on the left-hand side of the app'. Step 2: 'On the top right of the app, click the drop-down menu for “+ New meeting” and then “Live event.”' Step 3: 'You will be labeled the “Event organizer.” First, fill in the live event details on the left'. Screenshot detailing how to create a live event in Microsoft Teams, step 4.

      As the organizer, you can invite other people to the event who will be the “producers” or “presenters.”

      Producers: Control the live event stream, including being able to start and stop the event, share their own and others’ video, share desktop or window, and select layout.

      Presenters: Present audio, video, or a screen.

      Screenshot detailing how to create a live event in Microsoft Teams, step 5.

      Select who your audience will be for your live event from three options: specified people and groups, the organization, or the public with no sign-in required.

      Edit the setting for whether you want recording to be available for attendees.

      Then click “Schedule” to finish.

      Live event settings explained

      When you join the live event as a producer/presenter, nothing will be immediately broadcast. You’ll be in a pre-live state. Decide what content to share and in what order. Along the bottom of the screen, you can share your video and audio, share your screen, and mute incoming attendees.

      Once your content is ready to share along the bottom of the screen, add it to the screen on the left, in order of viewing. This is your queue – your “Pre-live” state. Then, click “Send now.”

      This content will now move to the right-hand screen, ready for broadcasting. Once you’re ready to broadcast, click “Start.” Your state will change from “Pre-live” to “Live.”

      Along the top right of the app will be a tools bar.

      Screenshot listing live events settings icons in Microsoft Teams. Beside the heart monitor icon is 'Monitor health and performance of network, devices, and media sharing'. Beside the notepad icon is 'Take meeting notes'. Beside the chatbox icon is 'Chat function'. Beside the two little people with a plus sign icon is 'Invite and show participants'. Beside the gear icon is 'Device settings'. Beside the small 'i' in a circle is 'Meeting details, including schedule, meeting link, and dial-in number'.

      Workspace #1: Departments

      Scenario: Most of your organization’s communication and collaboration occurs within its pre-existing departmental divisions.

      Conventional communication channels:

      • Oral communication: Employees work in proximity to each other and communicate in person, by phone, in department meetings
      • Email: Department-wide announcements
      • Memos: Typically posted/circulated in mailboxes

      Solution: Determine the best way to organize your organization’s departments in Teams based on its size and your requirements to keep information private between departments.

      Option A:

      • Create a team for the organization/division.
      • Create channels for each department. Remember that all members of a team can view all public channels created in that team and the default General channel.
      • Create private channels if you wish to have a channel that only select members of that team can see. Remember that private channels have some limitations in functionality.

      Option B:

      • Create a new team for each department.
      • Create channels within this team for projects or topics that are recurring workflows for the department members. Only department members can view the content of these channels.

      Option C:

      • Post departmental memos and announcements in the General channel.
      • Use “Meet now” in channels for ad hoc meetings. For regular department meetings, create a recurring Teams calendar event for the specific department channel (Option A) or the General channel (Option B). Remember that all members of a team can join a public channel meeting.

      Workspace #2: A cross-functional committee

      Scenario: Your organization has struck a committee composed of members from different departments. The rest of the organization should not have access to the work done in the committee.

      Purpose: To analyze a particular organizational challenge and produce a plan or report; to confidentially develop or carry out a series of processes that affect the whole organization.

      Jobs: Committee members must be able to:

      • Attend private meetings.
      • Share files confidentially.

      Solution:

      Ingredients:

      • Private team

      Construction:

      • Create a new private team for the cross-functional committee.
      • Add only committee members to the team.
      • Create channels based on the topics likely to be the focal point of the committee work.
      • Decide how you will use the mandatory General channel. If the committee is small and the work limited in scope, this channel may be the main communication space. If the committee is larger or the work more complex, use the General channel for announcements and move discussions to new topic-related channels.
      • Schedule recurring committee meetings in the Teams calendar. Add the relevant channel to the meeting invite to keep the meeting chat attached to this team and channel (as meeting organizer, put your name in the meeting invite notes, as the channel will show as the organizer in the Outlook invite).
      • Remember that all members of this team will have access to these meetings and be able to view that they are occurring.

      Workspace #3: An innovation day event

      Scenario: The organization holds a yearly innovation day event in which employees form small groups and work on a defined, short-term problem or project.

      Purpose: To develop innovative solutions and ideas.

      Jobs:

      • Convene small groups.
      • Work toward time-sensitive goals.
      • Communicate synchronously.
      • Share files.

      Solution:

      Ingredients:

      • Public team
      • Channel tabs
      • Whiteboard
      • Planner

      Construction:

      • Create a team for the innovation day event.
      • Add channels for each project working group.
      • Communicate to participants the schedule for the day and their assigned channel.
      • Use the General channel for announcements and instructions throughout the day. Ensure someone moderates the General channel for participants’ questions.
      • Pre-populate the channel tabs with files the participants need to work with. To add a scrum board, refer to M#4 (Morning stand-up/Scrum) in this slide deck.
      • For breakouts, instruct participants to use the “meet now” feature in their channel and how to use the Whiteboard during these meetings.
      • Arrange to have your IT admin archive the team after a certain point so the material is still viewable but not editable.

      Workspace #4: A non-work-related social event

      Scenario: Employees within the organization wish to organize social events around shared interests: board game clubs, book clubs, TV show discussion groups, trivia nights, etc.

      Purpose: To encourage cohesion among coworkers and boost morale.

      Jobs:

      • Schedule the event.
      • Invite participants.
      • Prepare the activity.
      • Host and moderate the discussion.

      Solution:

      Ingredients:

      • Public team
      • Private channels
      • Screen-sharing

      Construction:

      • Create a public team for the social event so that interested people can find and join it.
      • Example: Trivia Night
        • Schedule the event in the Teams calendar.
        • Publish the link to the Trivia Night team where other employees will see it.
        • Create private channels for each trivia team so they cannot see the other competitors’ discussions. Add yourself to each private channel so you can see their answers.
        • As the host, begin a meeting in the General channel. Pose the trivia questions live or present the questions on PowerPoint via screen-sharing.
        • Ask each team to post its answers to its private channel.
      • To avoid teams sprawl, ask your IT admin to set a deletion policy for the team, as long as this request does not contradict your organization’s policies on data retention. If the team becomes moribund, it can be set to auto-delete after a certain period of time.

      Workspace #5: A project team with a defined end time

      Scenario: Within a department/workplace team, employees are assigned to projects with defined end times, after which they will be assigned to a new project.

      Purpose: To complete project-based work that fulfills business needs.

      Jobs:

      • Oral communication with team members.
      • Synchronous and asynchronous work on project files.
      • The ability to attend scheduled meetings and ad hoc meetings.
      • The ability to access shared resources related to the project.

      Solution:

      If your working group already has its own team within Teams:

      • Create a new public or private channel for the project. Remember that some functionality is not available in private channels (such as Microsoft Planner).
      • Use the channel for the project team’s meetings (scheduled in Teams calendar or through Meet Now).
      • Add a tab that links to the team’s project folder in SharePoint.

      If your workplace team does not already have its own team in Teams:

      • Determine if there is a natural fit for this project as a new channel in an existing team. Remember that all team members will be able to see the channel if it is public and that all relevant project members need to belong to the Team to participate in the channel.
      • If necessary, create a new team for the project. Add the project members.
      • Create channels based on the type of work that comprises the project.
      • Use the channel for the project team’s meetings (scheduled in Teams calendar or through Meet Now)
      • Add a tab to link to the team’s project folder in SharePoint.

      Info-tech Best Practice

      Hide the channel after the project concludes to de-clutter your Teams user interface.

      Meeting #1: Job interview with external candidate

      Scenario: The organization must interview a slate of candidates to fill an open position.

      Purpose:

      • Select the most qualified candidate for the job.

      Jobs:

      • Create a meeting, ensuring the candidate and other attendees know when and where the meeting will happen.
      • Ensure the meeting is secure to protect confidential information.
      • Ensure the meeting is accessible, allowing the candidate to present themselves through audio and/or visual means.
      • Create a professional environment for the meeting to take place.
      • Engender a space for the candidate to share their CV, research, or other relevant file.
      • The interview must be transcribed and recorded.

      Solution:

      Ingredients:

      • Private Teams meeting
      • Screen-sharing
      • Microsoft Stream

      Construction:

      • Create a Teams meeting, inviting the candidate with their email, alongside other internal attendees. The Teams meeting invite will auto-generate a link to the meeting itself.
      • The host can control who joins the meeting through settings for the “lobby.”
      • Through the Teams meeting, the attendees will be able to use the voice and video chat functionality.
      • All attendees can opt to blur their backgrounds to maintain a professional online presence.
      • The candidate can share their screen, either specific applications or their whole desktop, during the Teams meeting.
      • A Teams meeting can be recorded and transcribed through Stream. After the meeting, the transcript can be searched, edited, and shared

      NB: The external candidate does not need the Teams application. Through the meeting invite, the external candidate will join via a web browser.

      Meeting #2: Quarterly board meeting

      Scenario: Every quarter, the organization holds its regular board meeting.

      Purpose: To discuss agenda items and determine the company’s future direction.

      Jobs:

      During meeting:
        • Attendance and minutes must be taken.
        • Votes must be recorded.
        • In-camera sessions must occur.
        • External experts must be included.
      After meeting:
      • Follow-up items must be assigned.
      • Reports must be submitted.

      Solution:

      Ingredients:

      • Teams calendar invite
      • Planner; Forms
      • Private channel
      • Microsoft Stream

      Construction:

      • Guest Invite: Invites can be sent to any non-domain-joined email address to join a private, invitation-only channel within the team controlled by the board chair.
      • SharePoint & Flow: Documents are emailed to the Team addresses, which kicks off an MS Flow routine to collect review notes.
      • Planner: Any board member can assign tasks to any employee.
      • Forms/Add-On: Chair puts down the form of the question and individual votes are tracked.
      • Teams cloud meeting recording: Recording available through Stream. Manual edits can be made to VTT caption file. Greater than acceptable transcription error rate.
      • Meeting Log: Real-time attendance is viewable but a point-in-time record needs admin access.

      NB: The external guests do not need the Teams application. Through the meeting invite, the guests will join via a web browser.

      Meeting #3: Weekly team meeting

      Scenario: A team meets for a weekly recurring meeting. The meeting is facilitated by the team lead (or manager) who addresses through agenda items and invites participation from the attendees.

      Purpose: The purpose of the meeting is to:

      • Share information verbally
      • Present content visually
      • Achieve consensus
      • Build team morale

      Jobs: The facilitator must:

      • Determine participants
      • Book room
      • Book meeting in calendar

      Solution:

      Ingredients:

      • Meeting Place: A channel in Microsoft Teams (must be public) where all members of the meeting make up the entirety of the audience.
      • Calendar Recurrence: A meeting is booked through Teams and appears in all participants’ Outlook calendar.
      • Collaboration Space: Participants join the meeting through video or audio and can share screens and contribute text, images, and links to the meeting chat.

      Construction:

      • Ensure your team already has a channel created for it. If not, create one in the appropriate team.
      • Create the meeting using the calendar view within Microsoft Teams:
        • Set the meeting’s name, attendees, time, and recurrence.
        • Add the team channel that serves as the most appropriate workplace for the meeting. (Any discussion in the meeting chat will be posted to this channel.)

      NB: Create the meeting in the Teams calendar, not Outlook, or you will not be able to add the Teams channel. As meeting organizer, put your name in the meeting invite notes, as the channel will show as the organizer in the Outlook invite.

      Meeting #4: Morning stand-up/scrum

      Scenario: Each morning, at 9am, members of the team meet online.

      Purpose: After some pleasantries, the team discusses what tasks they each plan to complete in the day.

      Jobs: The team leader (or scrum master) must:

      • Place all tasks on a scrum board, each represented by a sticky note denoting the task name and owner.
      • Move the sticky notes through the columns, adjusting assignments as needed.
      • Sort tasks into the following columns: “Not Started,” “In Progress,” and “Done.”

      Solution:

      Ingredients:

      • Meeting Place: A channel in Microsoft Teams (must be public) where all members of the meeting make up the entirety of the audience.
      • Scrum Board: A tab within that channel where a persistent scrum board has been created and is visible to all team members.

      Meeting Place Construction:

      • Create the meeting using the calendar view in Teams.
      • Set the meeting’s name, attendees, time, and work-week daily recurrence (see left).
      • Add the channel that is the most appropriate workplace for the meeting. Any meeting chat will be posted to this channel rather than a separate chat.

      Scrum Board Construction:

      • Add a tab to the channel using Microsoft Planner as the app. (You can use other task management apps such as Trello, but the identity integration of first-party Office 365 tools may be less hassle.)
      • Create a new (or import an existing) Plan to the channel. This will be used as the focal point.

      Meeting #5: Weekly team meeting

      Scenario: An audio-only conversation that could be a regularly scheduled event but is more often conducted on an ad-hoc basis.

      Purpose: To quickly share information, achieve consensus, or clarify misunderstandings.

      Jobs:

      • Dial recipient
      • See missed calls
      • Leave/check voicemail
      • Create speed-dial list
      • Conference call

      Solution:

      Ingredients:

      • Audio call begun through Teams chat.

      Construction:

      • Voice over IP calls between users in the same MS Teams tenant can begin in multiple ways:
        • A call can be initiated through any appearance of a user’s profile picture: hover over user’s profile photo in the Chat list and select the phone icon.
        • Enter your last chat with a user and click phone icon in upper-right corner.
        • Go to the Calls section and type the name in the “Make a call” text entry form.
      • Voicemail: Voicemail, missed calls, and call history are available in the Calls section.
      • Speed dial: Speed dial lists can be created in the Calls section.
      • Conference call: Other users can be added to an ongoing call.

      NB: Microsoft Teams can be configured to provide an organization’s telephony for external calls, but this requires an E5 license. Additional audio-conferencing licenses are required to call in to a Teams meeting over a phone.

      Bibliography 1/4

      Section 1: Teams for IT › Creation Process

      Overview: Creation process
      Assign admin roles
      Prepare the network
      Team creation
      Integrations with SharePoint Online
      Permissions

      Bibliography 2/4

      Section 1: Teams for IT › Creation Process (cont'd.)

      External and guest access
      Expiration and archiving
      Retention and data loss prevention
      Teams telephony

      Bibliography 3/4

      Section 1: Teams for IT › Teams Rollout

      From Skype to Teams
      From Slack to Teams
      Teams adoption

      Section 1: Teams for IT › Use Cases

      Bibliography 4/4

      Section 2: Teams for End Users › Teams, Channels, Chat

      Section 2: Teams for End Users › Meetings and Live Events

      Section 2: Teams for End Users › Use Cases

      Develop an IT Asset Management Strategy

      • Buy Link or Shortcode: {j2store}295|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $52,211 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management

      You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:

      • The data you have is often incomplete or wrong.
      • Processes are broken or non-existent.
      • Your tools aren’t up to the task of tracking ever more hardware, software, and relevant metadata.
      • The role of stakeholders outside the core ITAM team isn’t well defined or understood.

      Our Advice

      Critical Insight

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.

      Impact and Result

      • Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.
      • Clarify the structure for the ITAM program, including scope, responsibility and accountability, centralization vs. decentralization, outsourcing vs. insourcing, and more.
      • Create a practical roadmap to guide improvement.
      • Summarize your strategy and approach using Info-Tech’s templates for review with stakeholders.

      Develop an IT Asset Management Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop an IT Asset Management Strategy – A methodology to create a business-aligned, coherent, and durable approach to ITAM.

      This two-phase, step-by-step methodology will guide you through the activities to build a business-aligned, coherent, and durable approach to ITAM. Review the executive brief at the start of the slide deck for an overview of the methodology and the value it can provide to your organization.

      • Develop an IT Asset Management Strategy – Phases 1-2

      2. ITAM Strategy Template – A presentation-ready repository for the work done as you define your ITAM approach.

      Use this template to document your IT asset management strategy and approach.

      • ITAM Strategy Template

      3. IT Asset Estimations Tracker – A rough-and-ready inventory exercise to help you evaluate the work ahead of you.

      Use this tool to estimate key data points related to your IT asset estate, as well as your confidence in your estimates.

      • IT Asset Estimations Tracker

      Infographic

      Workshop: Develop an IT Asset Management Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify ITAM Priorities & Goals, Maturity, Metrics and KPIs

      The Purpose

      Align key stakeholders to the potential strategic value of the IT asset management practice.

      Ensure the ITAM practice is focused on business-aligned goals.

      Key Benefits Achieved

      Define a business-aligned direction and expected outcomes for your ITAM program.

      Activities

      1.1 Brainstorm ITAM opportunities and challenges.

      1.2 Conduct an executive alignment working session.

      1.3 Set ITAM priorities, goals and tactics.

      1.4 Identify target and current state ITAM maturity.

      Outputs

      ITAM opportunities and challenges

      Align executive priorities with ITAM opportunities.

      ITAM metrics and KPIs

      ITAM maturity

      2 Identify Your Approach to Support ITAM Priorities and Goals

      The Purpose

      Translate goals into specific and coherent actions to enable your ITAM practice to deliver business value.

      Key Benefits Achieved

      A business-aligned approach to ITAM, encompassing scope, structure, tools, audits, budgets, documentation and more.

      A high-level roadmap to achieve your vision for the ITAM practice.

      Activities

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Outputs

      Your ITAM approach

      ITAM roadmap and communication plan

      Further reading

      Develop an IT Asset Management Strategy

      Define your business-aligned approach to ITAM.

      Table of Contents

      4 Analyst Perspective

      5 Executive Summary

      17 Phase 1: Establish Business-Aligned ITAM Goals and Priorities

      59 Phase 2: Support ITAM Goals and Priorities

      116 Bibliography

      Develop an IT Asset Management Strategy

      Define your business-aligned approach to ITAM.

      EXECUTIVE BRIEF

      Analyst Perspective

      Track hardware and software. Seems easy, right?

      It’s often taken for granted that IT can easily and accurately provide definitive answers to questions like “how many laptops do we have at Site 1?” or “do we have the right number of SQL licenses?” or “how much do we need to budget for device replacements next year?” After all, don’t we know what we have?

      IT can’t easily provide these answers because to do so you must track hardware and software throughout its lifecycle – which is not easy. And unfortunately, you often need to respond to these questions on very short notice because of an audit or to support a budgeting exercise.

      IT Asset Management (ITAM) is the solution. It’s not a new solution – the discipline has been around for decades. But the key to success is to deploy the practice in a way that is sustainable, right-sized, and maximizes value.

      Use our practical methodology to develop and document your approach to ITAM that is aligned with the goals of your organization.

      Photo of Andrew Sharp, Research Director, Infrastructure & Operations Practice, Info-Tech Research Group.

      Andrew Sharp
      Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      Realize the value of asset management

      Cost optimization, application rationalization and reduction of technical debt are all considered valuable to right-size spending and improve service outcomes. Without access to accurate data, these activities require significant investments of time and effort, starting with creation of point-in-time inventories, which lengthens the timeline to reaching project value and may still not be accurate.

      Cost optimization and reduction of technical debt should be part of your culture and technical roadmap rather than one-off projects. Why? Access to accurate information enables the organization to quickly make decisions and pivot plans as needed. Through asset management, ongoing harvest and redeployment of assets improves utilization-to-spend ratios. We would never see any organization saying, “We’ve closed our year end books, let’s fire the accountants,” but often see this valuable service relegated to the back burner. Similar to the philosophy that “the best time to plant a tree is 20 years ago and the next best time is now,” the sooner you can start to collect, validate, and analyze data, the sooner you will find value in it.

      Photo of Sandi Conrad, Principal Research Director, Infrastructure & Operations Practice, Info-Tech Research Group.

      Sandi Conrad
      Principal Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:

      • The data you have is often incomplete or wrong.
      • Processes are broken or non-existent.
      • Your tools aren’t up to the task of tracking ever more hardware, software, and relevant metadata.
      • The role of stakeholders outside the core ITAM team isn’t well defined or understood.
      Common Obstacles

      It is challenging to make needed changes because:

      • There’s cultural resistance to asset tracking, it’s seen as busywork that doesn’t clearly create value.
      • Decentralized IT teams aren’t generating the data required to track hardware and licenses.
      • ITAM can’t direct needed tool improvements because the admins don’t report to ITAM.
      • It’s hard to find time to improve processes given the day-to-day demands on your time.
      Info-Tech’s Approach
      • Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.
      • Clarify the structure for the ITAM program, including scope, responsibility and accountability, centralization vs. decentralization, outsourcing vs. insourcing, and more.
      • Create a practical roadmap to guide improvement.
      • Summarize your strategy and approach using Info-Tech’s templates for review with stakeholders.

      Info-Tech Insight

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.

      Unlock business value with IT asset management

      • IT asset management (ITAM) is the practice of maintaining accurate, accessible, and actionable data on the assets within the organization’s IT estate. Each IT asset will have a record that tracks it across its lifecycle from purchase to disposal.
      • ITAM’s value is realized through other processes and practice areas that can leverage ITAM data to manage risk, improve IT services, and control costs.
      • Develop an approach to ITAM that maximizes the value delivered to the business and IT. ITAM succeeds when its partners succeed at delivering business value, and it fails when it doesn’t show value to those partners.

      This blueprint will help you develop your approach for the management of IT hardware and software, including cloud services. Leverage other Info-Tech methodologies to dive directly into developing hardware asset management procedures, software asset management procedures, or to implement configuration management best practices.

      Info-Tech Members report significant savings from implementing our hardware and software asset management frameworks. In order to maximize value from the process-focused methodologies below, develop your ITAM strategy first.

      Implement Hardware Asset Management (Based on Info-Tech Measured Value Surveys results from clients working through these blueprints, as of February 2022.)

      9.6/10

      $23k

      32

      Overall Impact Average $ Saved Average Days Saved
      Implement Software Asset Management (Based on Info-Tech Measured Value Surveys results from clients working through these blueprints, as of February 2022.)

      9.0/10

      $12k

      5

      Overall Impact Average $ Saved Average Days Saved

      ITAM provides both early and ongoing value

      ITAM isn’t one-and-done. Properly supported, your ITAM practice will deliver up-front value that will help demonstrate the value ongoing ITAM can offer through the maintenance of an accurate, accessible, and actionable ITAM database.

      Example: Software Savings from ITAM



      This chart shows the money saved between the first quote and the final price for software and maintenance by a five-person ITAM team. Over a year and a half, they saved their organization a total of $7.5 million from a first quote total of $21 million over that period.

      This is a perfect example of the direct value that ITAM can provide on an ongoing basis to the organization, when properly supported and integrated with IT and the business.

      Examples of up-front value delivered in the first year of the ITAM practice:

      • Save money by reviewing and renegotiating critical, high-spend, and undermanaged software and service contracts.
      • Redeploy or dispose of clearly unused hardware and software.
      • Develop and enforce standards for basic hardware and software.
      • Improve ITAM data quality and build trust in the results.

      Examples of long-term value from ongoing governance, management, and operational ITAM activities:

      • Optimize spend: Reallocate unused hardware and software, end unneeded service agreements, and manage renewals and audits.
      • Reduce risk: Provide comprehensive asset data for security controls development and incident management; manage equipment disposal.
      • Improve IT service: Support incident, problem, request, and change management with ITAM data. Develop new solutions with an understanding of what you have already.

      Common obstacles

      The rulebook is available, but hard to follow
      • ITAM takes a village, but stakeholders aren’t aware of their role. ITAM processes rely on technicians to update asset records, vendors to supply asset data, administrators to manage tools, leadership to provide direction and support, and more.
      • Constant change in the IT and business environment undermines the accuracy of ITAM records (e.g. licensing and contract changes, technology changes that break discovery tools, personnel and organizational changes).
      • Improvement efforts are overwhelmed by day-to-day activities. One study found that 83% of SAM teams’ time is consumed by audit-related activities. (Flexera State of ITAM Report 2022) A lack of improvement becomes a vicious cycle when stakeholders who don’t see the value of ITAM decline to dedicate resources for improvement.
      • Stakeholders expect ITAM tools to be a cure-all, but even at their best, they can’t provide needed answers without some level of configuration, manual input, and supervision.
      • There’s often a struggle to connect ITAM to value. For example, respondents to Info-Tech’s Management & Governance Diagnostic consistently rank ITAM as less important than other processes that ITAM directly supports (e.g. budget management and budget optimization). (Info-Tech MGD Diagnostic (n=972 unique organizations))
      ITAM is a mature discipline with well-established standards, certifications, and tools, but we still struggle with it.
      • Only 28% of SAM teams track IaaS and PaaS spend, and only 35% of SAM teams track SaaS usage.
      • Increasing SAM maturity is a challenge for 76% of organizations.
      • 10% of organizations surveyed have spent more than $5 million in the last three years in audit penalties and true-ups.
      • Half of all of organizations lack a viable SAM tool.
      • Seventy percent of SAM teams have a shortfall of qualified resources.
      • (Flexera State of ITAM Report 2022)

      Info-Tech's IT Asset Management Framework (ITAM)

      Adopt, manage, and mature activities to enable business value thorugh actionable, accessible, and accurate ITAM data

      Logo for Info-Tech Research Group. Enable Business Value Logo for #iTRG.
      Business-Aligned Spend
      Optimization and Transparency
      Facilitate IT Services
      and Products
      Actionable, Accessible,
      and Accurate Data
      Context-Aware Risk Management
      and Security Controls

      Plan & Govern

      Business Goals, Risks, and Structure
      • ITAM Goals & Priorities
      • Roles, Accountability, Responsibilities
      • Scope
      Ongoing Management Commitment
      • Resourcing & Funding
      • Policies & Enforcement
      • Continuous Improvement
      Culture
      • ITAM Education, Awareness & Training
      • Organizational Change Management
      Section title 'Operate' with a cycle surrounding key components of Operate: 'Data Collection & Validation', 'Tool Administration', 'License Management', and 'Lease Management'. The cycle consists of 'Request', 'Procure', 'Receive', 'Deploy', 'Manage', 'Retire & Dispose', and back to 'Request'.

      Build & Manage

      Tools & Data
      • ITAM Tool Selection & Deployment
      • Configuration Management Synchronization
      • IT Service Management Integration
      Process
      • Process Management
      • Data & Process Audits
      • Document Management
      People, Policies, and Providers
      • Stakeholder Management
      • Technology Standardization
      • Vendor & Contract Management

      Info-Tech Insight

      ITAM is a foundational IT service that provides actionable, accessible, and accurate data on IT assets. But there's no value in data for data's sake. Use this methodology to enable collaboration between ITAM, the business, and IT to develop an approach to ITAM that maximizes the value the ITAM team can deliver as service providers.

      Key deliverable

      IT asset management requires ongoing practice – you can’t just implement it and walk away.

      Our methodology will help you build a business-aligned strategy and approach for your ITAM practice with the following outputs:

      • Business-aligned ITAM priorities, opportunities, and goals.
      • Current and target state ITAM maturity.
      • Metrics and KPIs.
      • Roles, responsibilities, and accountability.
      • Insourcing, outsourcing, and (de)centralization.
      • Tools and technology.
      • A documentation framework.
      • Initiatives, a roadmap, and a communication plan.
      Each step of this blueprint is designed to help you create your IT asset management strategy:
      Sample of Info-Tech's key deliverable 'IT Asset Management' blueprint.

      Info-Tech’s methodology to develop an IT asset management strategy

      1. Establish business-aligned ITAM goals and priorities 2. Identify your approach to support ITAM priorities and goals
      Phase Steps
      • 1.1 Define ITAM and brainstorm opportunities and challenges.
      • Executive Alignment Working Session:
      • 1.2 Review organizational priorities, strategy, and key initiatives.
      • 1.3 Align executive priorities with ITAM opportunities and priorities.
      • 1.4 Identify business-aligned ITAM goals and target maturity.
      • 1.5 Write mission and vision statements.
      • 1.6 Define ITAM metrics and KPIs.
      • 2.1 Define ITAM scope.
      • 2.2 Acquire ITAM services (outsourcing and contracting).
      • 2.3 Centralize or decentralize ITAM capabilities.
      • 2.4 Create a RACI for the ITAM practice.
      • 2.5 Align ITAM with other service management practices.
      • 2.6 Evaluate ITAM tools and integrations.
      • 2.7 Create a plan for internal and external audits.
      • 2.8 Improve your budget processes.
      • 2.9 Establish a documentation framework.
      • 2.10 Create a roadmap and communication plan.
      Phase Outcomes Defined, business-aligned goals and priorities for ITAM. Establish an approach to achieving ITAM goals and priorities including scope, structure, tools, service management integrations, documentation, and more.
      Project Outcomes Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.

      Insight Summary

      There’s no value in data for data’s sake

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an approach to ITAM that maximizes the value they can deliver as service providers.

      Service provider to a service provider

      ITAM is often viewed (when it’s viewed at all) as a low-value administrative task that doesn’t directly drive business value. This can make it challenging to build a case for funding and resources.

      Your ITAM strategy is a critical component to help you define how ITAM can best deliver value to your organization, and to stop creating data for the sake of data or just to fight the next fire.

      Collaboration over order-taking

      To align ITAM practices to deliver organizational value, you need a very clear understanding of the organization’s goals – both in the moment and as they change over time.

      Ensure your ITAM team has clear line of sight to business strategy, objectives, and decision-makers, so you can continue to deliver value as priorities change

      Embrace dotted lines

      ITAM teams rely heavily on staff, systems, and data beyond their direct area of control. Identify how you will influence key stakeholders, including technicians, administrators, and business partners.

      Help them understand how ITAM success relies on their support, and highlight how their contributions have created organizational value to encourage ongoing support.

      Project benefits

      Benefits for IT
      • Set a foundation and direction for an ITAM practice that will allow IT to manage risk, optimize spend, and enhance services in line with business requirements.
      • Establish accountability and responsibility for essential ITAM activities. Decide where to centralize or decentralize accountability and authority. Identify where outsourcing could add value.
      • Create a roadmap with concrete, practical next steps to develop an effective, right-sized ITAM practice.
      Stock image of a trophy. Benefits for the business
      • Plan and control technology spend with confidence based on trustworthy ITAM data.
      • Enhance IT’s ability to rapidly and effectively support new priorities and launch new projects. Effective ITAM can support more streamlined procurement, deployment, and management of assets.
      • Implement security controls that reflect your total technology footprint. Reduce the risk that a forgotten device or unmanaged software turns your organization into the next Colonial Pipeline.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI around 12 calls over the course of 6 months.

      What does a typical GI on this topic look like?

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Review business priorities.

      Call #3: Identify ITAM goals & target maturity.

      Call #4: Identify metrics and KPIs. Call #5: Define ITAM scope.

      Call #6: Acquire ITAM services.

      Call #7: ITAM structure and RACI.

      Call #8: ITAM and service management.

      Tools and integrations.

      Call #10: Internal and external audits.

      Call #11: Budgets & documentation

      Call #12: Roadmap, comms plan. Wrap-up.

      Phase 1 Phase 2

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889
      Day 1 Day 2 Day 3 Day 4 Day 5
      Identify ITAM priorities & goals, maturity, metrics and KPIs
      Identify your approach to support ITAM priorities and goals
      Next Steps and wrap-Up (offsite)
      Activities

      1.1 Define ITAM.

      1.2 Brainstorm ITAM opportunities and challenges.

      Conduct an executive alignment working session:

      1.3 Review organizational priorities, strategy, and key initiatives.

      1.4 Align executive priorities with ITAM opportunities.

      1.5 Set ITAM priorities.

      2.1 Translate opportunities into ITAM goals and tactics.

      2.2 Identify target and current state ITAM maturity.

      2.3 Create mission and vision statements.

      2.4 Identify key ITAM metrics and KPIs.

      3.1 Define ITAM scope.

      3.2 Acquire ITAM services (outsourcing and contracting)

      3.3 Centralize or decentralize ITAM capabilities.

      3.4 Create a RACI for the ITAM practice.

      3.5 Align ITAM with other service management practices.

      3.6 Evaluate ITAM tools and integrations.

      4.1 Create a plan for internal and external audits.

      4.2 Improve your budget processes.

      4.3 Establish a documentation framework and identify documentation gaps.

      4.4 Create a roadmap and communication plan.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables
      1. ITAM opportunities and challenges.
      2. Align executive priorities with ITAM opportunities.
      3. Set ITAM priorities.
      1. ITAM goals and tactics.
      2. Current and target ITAM maturity.
      3. Mission and vision statements.
      4. ITAM metrics and KPIs.
      1. Decisions that will shape your ITAM approach, including:
        1. What’s in scope (hardware, software, and cloud services).
        2. Where to centralize, decentralize, or outsource ITAM activities.
        3. Accountability, responsibility, and structure for ITAM activities.
        4. Service management alignment, tooling gaps, audit plans, budget processes, and required documentation.
      2. A roadmap and communication plan.
      1. Your completed ITAM strategy template.
      Develop an IT Asset Management Strategy

      Phase 1:

      Establish business-aligned ITAM goals and priorities

      Phase 1

      1.1 Define ITAM and brainstorm opportunities and challenges.

      Executive Alignment Working Session:

      1.2 Review organizational priorities, strategy, and key initiatives.

      1.3 Align executive priorities with ITAM opportunities & priorities.

      1.4 Identify business-aligned ITAM goals and target maturity.

      1.5 Write mission and vision statements.

      1.6 Define ITAM metrics and KPIs.

      Phase 2

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Phase Outcomes:

      Defined, business-aligned goals, priorities, and KPIs for ITAM. A concise vision and mission statement. The direction you need to establish a practical, right-sized, effective approach to ITAM for your organization.

      Before you get started

      Set yourself up for success with these three steps:
      • This methodology and the related slides are intended to be executed via intensive, collaborative working sessions using the rest of this slide deck.
      • Ensure the working sessions are a success by working through these steps before you start work on your IT asset management strategy.

      1. Identify participants

      Review recommended roles and identify who should participate in the development of your ITAM strategy.

      2. Estimate assets managed today

      Work through an initial assessment to establish ease of access to ITAM data and your level of trust in the data available to you.

      3. Create a working folder

      Create a repository to house your notes and any work in progress, including your copy of the ITAM Strategy Template.

      0.1 Identify participants

      30 minutes

      Output: List of key roles for the strategy exercises outlined in this methodology

      Participants: Project sponsor, Lead facilitator, ITAM manager and SMEs

      This methodology relies on having the right stakeholders in the room to identify ITAM goals, challenges, roles, structure, and more. On each activity slide in this deck, you’ll see an outline of the recommended participants. Use the table below to translate the recommended roles into specific people in your organization. Note that some people may fill multiple roles.

      Role Expectations People
      Project Sponsor Accountable for the overall success of the methodology. Ideally, participates in all exercises in this methodology. May be the asset manager or whoever they report to. Jake Long
      Lead Facilitator Leads, schedules, and manages all working sessions. Guides discussions and ensures activity outputs are completed. Owns and understands the methodology. Has a working knowledge of ITAM. Robert Loblaw
      Asset Manager(s) SME for the ITAM practice. Provides strategic direction to mature ITAM practices in line with organizational goals. Supports the facilitator. Eve Maldonado
      ITAM Team Hands-on ITAM professionals and SMEs. Includes the asset manager. Provide input on tactical ITAM opportunities and challenges. Bruce Wayne, Clark Kent
      IT Leaders & Managers Leaders of key stakeholder groups from across the IT department – the CIO and direct reports. Provide input on what IT needs from ITAM, and the role their teams should play in ITAM activities. May include delegates, particularly those familiar with day-to-day processes relevant to a particular discussion or exercise. Marcelina Hardy, Edmund Broughton
      ITAM Business Partners Non-IT business stakeholders for ITAM. This could include procurement, vendor management, accounting, and others. Zhang Jin, Effie Lamont
      Business Executives Organizational leaders and executives (CFO, COO, CEO, and others) or their delegates. Will participate in a mini-workshop to identify organizational goals and initiatives that can present opportunities for the ITAM practice. Jermaine Mandar, Miranda Kosuth

      0.2 Estimate asset numbers

      1 hour

      Output: Estimates of quantity and spend related to IT assets, Confidence/margin of error on estimates

      Participants: IT asset manager, ITAM team

      What do you know about your current IT environment, and how confident are you in that knowledge?

      This exercise will help you evaluate the size of the challenge ahead in terms of the raw number of assets in your environment, the spend on those assets, and the level of trust your organization has in the ITAM data.

      It is also a baseline snapshot your ability to relay key ITAM metrics quickly and confidently, so you can measure progress (in terms of greater confidence) over time.

      1. Download the estimation tracker below. Add any additional line items that are particularly important to the organization.
      2. Time-box this exercise to an hour. Use your own knowledge and existing data repositories to identify count/spend for each line item, then add a margin of error to your guess. Larger margins of error on larger counts will typically indicate larger risks.
      3. Track any assumptions, data sources used, or SMEs consulted in the comments.

      Download the IT Asset Estimation Tracker

      “Any time there is doubt about the data and it doesn’t get explained or fixed, then a new spreadsheet is born. Data validation and maintenance is critical to avoid the hidden costs of having bad data”

      Allison Kinnaird,
      Operations Practice Lead,
      Info-Tech Research Group

      0.3 Create a working folder

      15 minutes

      Output: A repository for templates and work in progress

      Participants: Lead facilitator

      Create a central repository for collaboration – it seems like an obvious step, but it’s one that gets forgotten about
      1. Download a copy of the ITAM Strategy Template.
        1. This will be the repository for all the work you do in the activities listed in this blueprint; take a moment to read it through and familiarize yourself with the contents.
      2. House the template in a shared repository that can house other related work in progress. Share this folder with participants so they can check in on your progress.
      3. You’ll see this callout box: Add your results to your copy of the ITAM Strategy Template as you work through activities in this blueprint. Copy the output to the appropriate slide in the ITAM Strategy Template.
      Stock image of a computer screen with a tiny person putting likes on things.

      Collect action items as you go

      Don’t wait until the end to write down your good ideas.
      • The last exercise in this methodology is to gather everything you’ve learned and build a roadmap to improve the ITAM practice.
      • The output of the exercises will inform the roadmap, as they will highlight areas with opportunities for improvement.
      • Write them down as you work through the exercises, or you risk forgetting valuable ideas.
      • Keep an “idea space” – a whiteboard with sticky notes or a shared document – to which any of your participants can post an idea for improvement and that you can review and consolidate later.
      • Encourage participants to add their ideas at any time during the exercises.
      Pad of sticky notes, the top of which reads 'Good ideas go here!'

      Step 1.1: Brainstorm ITAM opportunities and challenges

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Rally the working group around a collection of ideas that, when taken together, create a vision for the future ITAM practice.
      • Identify your organization’s current ITAM challenges.

      “ITAM is a cultural shift more than a technology shift.” (Rory Canavan, SAM Charter)

      What is an IT Asset?

      Any piece of technology can be considered an asset, but it doesn’t mean you need to track everything. Image of three people building a computer from the inside.
      Icon of a power button.

      According to the ISO 19770 standard on ITAM, an IT Asset is “[an] item, thing, or entity that can be used to acquire, process, store and distribute digital information and has potential or actual value to an organization.”
      These are all things that IT is expected to support and manage, or that have the potential to directly impact services that IT supports and manages.

      Icon of a half-full battery.

      IT assets are distinct from capital assets. Some IT assets will also be capital assets, but not all will be. And not all capital assets are IT assets, either.

      Icon of a microphone.

      IT assets are typically tracked by IT, not by finance or accounting.
      IT needs more from their IT asset tracking system than the typical finance department can deliver.
      This can include end-user devices, software, IT infrastructure, cloud-based resources, third-party managed IT services, Internet-of-Things devices, embedded electronics, SCADA equipment, “smart” devices, and more.

      Icon of a fingerprint.

      It’s important to track IT assets in a way that enables IT to deliver value to the business – and an important part of this is understanding what not to track. This list should be aligned to the needs of your organization.

      What is IT asset management?

      • IT asset management is the practice of maintaining accurate, accessible, and actionable data on IT hardware, software, and cloud assets from procurement to disposal.
      • Trustworthy data maintained by an IT asset management practice will help your business meet its goals by managing risk, controlling costs, and enabling IT services and products.
      • ITAM tends to focus on the asset itself – its technical, financial, contractual, lifecycle, and ownership attributes – rather than its interactions or connections to other IT assets, which tends to be part of configuration management.

      What IT Asset Management is NOT:

      Configuration Management: Configuration management databases (CMDBs) often draw from the same data pool as ITAM (many configuration items are assets, and vice versa), but they focus on the interaction, interconnection, and interoperation of configuration items within the IT estate.

      In practice, many configuration items will be IT assets (or parts of assets) and vice versa. Configuration and asset teams should work closely together as they develop different but complementary views of the IT environment. Use Info-Tech’s methodology to harness configuration management superpowers.

      Organizational Data Management: Leverage a different Info-Tech methodology to develop a digital and data asset management program within Info-Tech’s DAM framework.

      “Asset management’s job is not to save the organization money, it’s not to push back on software audits.

      It’s to keep the asset database as up-to-date and as trustworthy as possible. That’s it.” (Jeremy Boerger, Consultant & Author)

      “You can’t make any real decisions on CMDB data that’s only 60% accurate.

      You start extrapolating that out, you’re going to get into big problems.” (Mike Austin, Founder & CEO, MetrixData 360)

      What is an ITAM strategy?

      Our strategy document will outline a coherent, sustainable, business-aligned approach to ITAM.

      No single approach to ITAM fits all organizations. Nor will the same approach fit the same organization at different times. A world-leading research university, a state government, and a global manufacturer all have very different goals and priorities that will be best supported by different approaches to ITAM.

      This methodology will walk you through these critical decisions that will define your approach to ITAM:

      • Business-aligned priorities, opportunities, and goals: What pressing opportunities and challenges do we face as an organization? What opportunities does this create that ITAM can seize?
      • Current and future state maturity, challenges: What is the state of the practice today? Where do we need to improve to meet our goals? What challenges stand in the way of improvement?
      • Responsibility, accountability, sourcing and (de)centralization: Who does what? Who is accountable? Where is there value to outsourcing? What authority will be centralized or decentralized?
      • Tools, policies, and procedures: What technology do we need? What’s our documentation framework?
      • Initiatives, KPIs, communication plan, and roadmap: What do we need to do, in what order, to build the ITAM practice to where we need it to be? How long do we expect this to take? How will we measure success?

      “A good strategy has coherence, coordinating actions, policies, and resources so as to accomplish an important end. Most organizations, most of the time, don’t have this.

      Instead, they have multiple goals and initiatives that symbolize progress, but no coherent approach to accomplish that progress other than ‘spend more and try harder.’” (Good Strategy, Bad Strategy, Richard Rumelt)

      Enable business value with IT asset management

      If you’ve never experienced a mature ITAM program before, it is almost certainly more rewarding than you’d expect once it’s functioning as intended.

      Each of the below activities can benefit from accessible, actionable, and accurate ITAM data.

      • Which of the activities, practices, and initiatives below have value to your organization?
      • Which could benefit most from ITAM data?
      Manage Risk: Effective ITAM practices provide data and processes that help mitigate the likelihood and impact of potentially damaging IT risks.

      ITAM supports the following practices that help manage organizational risk:

      • Security Controls Development
      • Security Incident Response
      • Security Audit Reports
      • Regulatory Compliance Reports
      • IT Risk Management
      • Technical Debt Management
      • M&A Due Diligence
      Optimize Spend: Asset data is essential to maintaining oversight of IT spend, ensuring that scarce resources are allocated where they can have the most impact.

      ITAM supports these activities that help optimize spend:

      • Vendor Management & Negotiations
      • IT Budget Management & Variance Analysis
      • Asset Utilization Analysis
      • FinOps & Cloud Spend Optimization
      • Showback & Chargeback
      • Software Audit Defense
      • Application Rationalization
      • Contract Consolidation
      • License and Device Reallocation
      Improve IT Services: Asset data can help inform solutions development and can be used by service teams to enhance and improve IT service practices.

      Use ITAM to facilitate these IT services and initiatives:

      • Solution and Enterprise Architecture
      • Service Level Management
      • Technology Procurement
      • Technology Refresh Projects
      • Incident & Problem Management
      • Request Management
      • Change Management
      • Green IT

      1.1 Brainstorm ideas to create a vision for the ITAM practice

      30 minutes

      Input: Stakeholders with a vision of what ITAM could provide, if resourced and funded adequately

      Output: A collection of ideas that, when taken together, create a vision for the future ITAM practice

      Materials: ITAM strategy template, Whiteboard or virtual whiteboard

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      It can be easy to lose sight of long-term goals when you’re stuck in firefighting mode. Let’s get the working group into a forward-looking mindset with this exercise.

      Think about what ITAM could deliver with unlimited time, money, and technology.

      1. Provide three sticky notes to each participant.
      2. Add the headings to a whiteboard, or use a blank slide as a digital whiteboard
      3. On each sticky note, ask participants to outline a single idea as follows:
        1. We could: [idea]
        2. Which would help: [stakeholder]
        3. Because: [outcome]
      4. Ask participants to present their sticky notes and post them to the whiteboard. Ask later participants to group similar ideas together.

      As you hear your peers describe what they hope and expect to achieve with ITAM, a shared vision of what ITAM could be will start to emerge.

      1.1 Identify structural ITAM challenges

      30 minutes

      Input: The list of common challenges on the next slide, Your estimated visibility into IT assets from the previous exercise, The experience and knowledge of your participants

      Output: Identify current ITAM challenges

      Materials: Your working copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      What’s standing in the way today of delivering the ITAM practices you want to achieve?

      Review the list of common challenges on the next slide as a group.

      1. Delete any challenges that don’t apply to your organization.
      2. Modify any challenges as required to reflect your organization.
      3. Add further challenges that aren’t on the list, as required.
      4. Highlight challenges that are particularly painful.

      Add your results to your copy of the ITAM Strategy Template

      “The problem – the reason why asset management initiatives keep falling on their face – is that people attack asset management as a problem to solve, instead of a practice and epistemological construct.” (Jeremy Boerger, Consultant & Author)

      1.1 Identify structural ITAM challenges

      Review and update the list of common challenges below to reflect your own organization.

      • Leadership and executives don’t understand the value of asset management and don’t fund or resource it.
      • Tools aren’t fit for purpose, don’t scale, or are broken.
      • There’s a cultural tendency to focus on tools over processes.
      • ITAM data is fragmented across multiple repositories.
      • ITAM data is widely viewed as untrustworthy.
      • Stakeholders respond to vendor audits before consulting ITAM, which leads to confusion and risks penalties.
      • No time for improvement; we’re always fighting fires.
      • We don’t audit our own ITAM data for accuracy.
      • End-user equipment is shared, re-assigned, or disposed without notifying or involving IT.
      • No dedicated resources.
      • Lack of clarity on roles and responsibilities.
      • Technicians don’t track assets consistently; ITAM is seen as administrative busywork.
      • Many ITAM tasks are manual and prone to error.
      • Inconsistent organizational policies and procedures.
      • We try to manage too many hardware types/software titles.
      • IT is not involved in the procurement process.
      • Request and procurement is seen as slow and excessively bureaucratic.
      • Hardware/software standards don’t exist or aren’t enforced.
      • Extensive rogue purchases/shadow IT are challenging to manage via ITAM tools and processes.
      What Else?

      Copy results to your copy of the ITAM Strategy Template

      Step 1.2: Review organizational priorities, strategy, initiatives

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • Business executives or their delegates

      Outcomes

      • Review organizational priorities and strategy.
      • Identify key initiatives.

      Enter the executives

      Deliver on leadership priorities

      • Your business’ major transformative projects and executive priorities might seem far removed from hardware and software tracking. Why would we start with business strategy and executive priorities as we’re setting goals for the ITAM program?
      • While business executives have (likely) no interest in how software and hardware is tracked, they are accountable for the outcomes ITAM can enable. They are the most likely to understand why and how ITAM can deliver value to the organization.
      • ITAM succeeds by enabling its stakeholders to achieve business outcomes. The next three activities are designed to help you identify how you can enable your stakeholders, and what outcomes are most important from their point of view. Specifically:
        • What are the business’ planned transformational initiatives?
        • What are your highest priority goals?
        • What should the priorities of the ITAM practice be?
      • The answers to these questions will shape your approach to ITAM. Direct input from your leadership and executives – or their delegates – will help ensure you’re setting a solid foundation for your ITAM practice.

      “What outcomes does the organization want from IT asset management? Often, senior managers have a clear vision for the organization and where IT needs to go, and the struggle is to communicate that down.” (Kylie Fowler, ITAM Intelligence)

      Stock image of many hands with different puzzle pieces.

      Executive Alignment Session Overview

      ITAM Strategy Working Sessions

      • Discover & Brainstorm
      • Executive Alignment Working Session
        • 1.2 Review organizational strategy, priorities, and key initiatives
        • 1.3 Align executive priorities with ITAM opportunities, set ITAM priorities
      • ITAM Practice Maturity, Vision & Mission, Metrics & KPIs
      • Scope, Outsourcing, (De)Centralization, RACI
      • Service Management Integration
      • ITAM Tools
      • Audits, Budgets, Documents
      • Roadmap & Comms Plan

      A note to the lead facilitator and project sponsor:
      Consider working through these exercises by yourself ahead of time. As you do so, you’ll develop your own ideas about where these discussions may go, which will help you guide the discussion and provide examples to participants.

      1.2 Review organizational strategy and priorities

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leadership, Business executives or delegates

      Welcome your group to the working session and outline the next few exercises using the previous slide.

      Ask the most senior leader present to provide a summary of the following:

      1. What is the vision for the organization?
      2. What are our priorities and what must we absolutely get right?
      3. What do we expect the organization to look like in three years?

      The facilitator or a dedicated note-taker should record key points on a whiteboard or flipchart paper.

      1.2 Identify transformational initiatives

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leadership, Business executives or delegates

      Ask the most senior leader present to provide a summary of the following: What transformative business and IT initiatives are planned? When will they begin and end?

      Using one box per initiative, draw the initiatives in a timeline like the one below.

      Sample timeline for ITAM initiatives.

      Add your results to your copy of the ITAM Strategy Template

      Step 1.3: Set business-aligned ITAM priorities

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • Business executives

      Outcomes

      • Connect executive priorities to ITAM opportunities.
      • Set business-aligned priorities for the ITAM practice.

      1.3 Align executive priorities with ITAM opportunities

      45 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leaders and managers, Business executives or delegates

      In this exercise, we’ll use the table on the next slide to identify the top priorities of key business and IT stakeholders and connect them to opportunities for the ITAM practice.

      1. Ask your leadership or executive delegates – what are their goals? What are they trying to accomplish? List roles and related goals in the table.
      2. Brainstorm opportunities for IT asset management to support listed goals:
        1. Can ITAM provide an enhanced level of service, access, or insight?
        2. Can ITAM address an existing issue or mitigate an existing risk?

      Add your results to your copy of the ITAM Strategy Template

      1.3 Align executive priorities with ITAM opportunities (example)

      ITAM is for the… Who wants to… Which presents these ITAM opportunities
      CEO Deliver transformative business initiatives Acquire the right tech at the right time to support transformational initiatives.
      Establish a data-driven culture of stewardship Improve data to increase IT spend transparency.
      COO Improve organizational efficiency Increase asset use.
      Consolidate major software contracts to drive discounts.
      CFO Accurately forecast spending Track and anticipate IT asset spending.
      Control spending Improve data to increase IT spend transparency.
      Consolidate major software contracts to drive discounts.
      CIO Demonstrate IT value Use data to tell a story about value delivered by IT assets.
      Govern IT use Improve data to increase IT spend transparency.
      CISO Manage IT security and compliance risks Identify abandoned or out-of-spec IT assets.
      Provide IT asset data to support controls development.
      Respond to security incidents Support security incident teams with IT asset data.
      Apps Leader Build, integrate, and support applications Identify opportunities to retire applications with redundant functionality.
      Connect applications to relevant licensing and support agreements.
      IT Infra Leader Build and support IT infrastructure. Provide input on opportunities to standardize hardware and software.
      Provide IT asset data to technicians supporting end users.

      1.3 Categorize ITAM opportunities

      10-15 minutes

      Input: The outputs from the previous exercise

      Output: Executive priorities, sorted into the three categories at the right

      Materials: The table in this slide, The outputs from the previous exercise

      Participants: Lead facilitator

      Give your participants a quick break. Quickly sort the identified ITAM opportunities into the three main categories below as best you can.

      We’ll use this table as context for the next exercise.

      Example: Optimize Spend Enhance IT Services Manage Risk
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Consolidate major software contracts to drive discounts.
      • Increase asset utilization.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.

      Add your results to your copy of the ITAM Strategy Template

      1.3 Set ITAM priorities

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: Whiteboard, The template on the next slide, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leaders and managers, Business executives or delegates

      The objective of this exercise is to prioritize the outcomes your organization wants to achieve from its ITAM practice, given the context from the previous exercises.

      Review the image below. The three points of the triangle are the three core goals of ITAM: Enhance IT Service, Manage Risk, and Optimize Spend. This exercise was first developed by Kylie Fowler of ITAM Intelligence. It is an essential exercise to understand ITAM priorities and the tradeoffs associated with those priorities. These priorities aren’t set in stone and should be revisited periodically as technology and business priorities change.

      Draw the diagram on the next slide on a whiteboard. Have the most senior leader in the room place the dot on the triangle – the closer it is to any one of the goals, the more important that goal is to the organization. Note: The center of the triangle is off limits! It’s very rarely possible to deliver on all three at once.
      Track notes on what’s being prioritized – and why – in the template on the next slide.
      Triangle with the points labelled 'Enhance IT Service', 'Manage Risk', and 'Optimize Spend'.

      Add your results to your copy of the ITAM Strategy Template

      1.3 Set ITAM Priorities

      The priorities of the ITAM practice are to:
      • Optimize Spend
      • Manage Risk
      Why?
      • We believe there is significant opportunity right now to rationalize spend by consolidating key software contracts.
      • Major acquisitions are anticipated in the near future. Effective ITAM processes are expected to mitigate acquisition risk by supporting due diligence and streamlined integration of acquired organizations.
      • Ransomware and supply chain security threats have increased demands for a comprehensive accounting of IT assets to support security controls development and security incident response.
      (Update this section with notes from your discussion.)
      Triangle with the points labelled 'Enhance IT Service', 'Manage Risk', and 'Optimize Spend'. There is a dot close to the 'Optimize Spend' corner, a legend labelling the dot as 'Our Target', and a note reading 'Move this dot to reflect your priorities'.

      Step 1.4: Identify ITAM goals, target maturity

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Connect executive priorities to ITAM opportunities.
      • Set business-aligned priorities for the ITAM practice.

      “ITAM is really no different from the other ITIL practices: to succeed, you’ll need some ratio of time, treasure, and talent… and you can make up for less of one with more of the other two.” (Jeremy Boerger, Consultant and Author)

      1.4 Identify near- and medium-term goals

      15-30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Narrow down the list of opportunities to identify specific goals for the ITAM practice.

      1. Use one color to highlight opportunities you will seize in the next year.
      2. Use a second color to highlight opportunities you plan to address in the next three years.
      3. Leave blank anything you don’t intend to address in this timeframe.

      The highlighted opportunities are your near- and medium-term objectives.

      Optimize Spend Enhance IT Services Manage Risk
      Priority Critical Normal High
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Increase asset utilization.
      • Consolidate major software contracts to drive discounts.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.

      1.4 Connect ITAM goals to tactics

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Let’s dig down a little deeper. Connect the list of opportunities from earlier to specific ITAM tactics that allow the team to seize those opportunities.

      Add another row to the earlier table for ITAM tactics. Brainstorm tactics with your participants (e.g. sticky notes on a whiteboard) and align them with the priorities they’ll support.

      Optimize SpendEnhance IT ServicesManage Risk
      PriorityCriticalNormalHigh
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Increase asset utilization.
      • Consolidate major software contracts to drive discounts.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.
      ITAM Tactics to Seize Opportunities
      • Review and improve hardware budgeting exercises.
      • Reallocate unused licenses, hardware.
      • Ensure ELP reports are up to date.
      • Validate software usage.
      • Data to support software renewal negotiations.
      • Use info from ITAM for more efficient adds, moves, changes.
      • Integrate asset records with the ticket intake system, so that when someone calls the service desk, the list of their assigned equipment is immediately available.
      • Find and retire abandoned devices or services with access to the organization’s network.
      • Report on lost/stolen devices.
      • Develop reliable disposal processes.
      • Report on unpatched devices/software.

      Add your results to your copy of the ITAM Strategy Template

      1.4 Identify current and target state

      20 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      We’ll use this exercise to identify the current and one-year target state of ITAM using Info-Tech’s ITAM maturity framework.

      1. Review the maturity framework on the next slide as a group.
      2. In one color, highlight statements that reflect your organization today. Summarize your current state. Are you in firefighter mode? Between “firefighter” and “trusted operator”?
      3. In a second color, highlight statements that reflect where you want to be one year from today, taking into consideration the goals and tactics identified in the last exercise.
      4. During a break, copy the highlighted statements to the table on the slide after next, then add this final slide to your working copy of the ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      Establish current and target ITAM maturity

      IT maturity ladder with five color-coded levels. Innovator – Optimized Asset Management
      • All items from Business & Technology Partner, plus:
      • Business and IT stakeholders collaborate regularly with the ITAM team to identify new opportunities to leverage or deploy ITAM practices and data to mitigate risks, optimize spend, and improve service. The ITAM program scales with the business.
      Business & Technology Partner – Proactive Asset Management
      • All items from Trusted Operator, plus:
      • The ITAM data is integral to decisions related to budget, project planning, IT architecture, contract renewal, and vendor management. Software and cloud assets are reviewed as frequently as required to manage costs. ITAM data consumers have self-serve access to ITAM data.
      • Continuous improvement practices strengthen ITAM efficiency and effectiveness.
      • ITAM processes, standards, and related policies are regularly reviewed and updated. ITAM teams work closely with SMEs for key tools/systems integrated with ITAM (e.g. AD, ITSM, monitoring tools) to maximize the value and reliability of integrations.
      Trusted Operator – Controls Assets
      • ITAM data for deployed hardware and software is regularly audited for accuracy.
      • Sufficient staff and skills to support asset tracking, including a dedicated IT asset management role. Teams responsible for ITAM data collection cooperate effectively. Policies and procedures are documented and enforced. Key licenses and contracts are available to the ITAM team. Discovery, tracking, and analysis tools support most important use cases.
      Firefighter – Reactive Asset Tracking
      • Data is often untrustworthy, may be fragmented across multiple repositories, and typically requires significant effort to translate or validate before use.
      • Insufficient staff, fragmented or incomplete policies or documentation. Data tracking processes are extremely highly manual. Effective cooperation for ITAM data collection is challenging.
      • ITAM tools are in place, but additional configuration or tooling is needed.
      Unreliable - Struggles to Support
      • No data, or data is typically unusable.
      • No allocated staff, no cooperation between parties responsible for ITAM data collection.
      • No related policies or documentation.
      • Tools are non-existent or not fit-for-purpose.

      Current and target ITAM maturity

      Today:
      Firefighter
      • Data is often untrustworthy, is fragmented across multiple repositories, and typically requires significant effort to translate or validate before use.
      • Insufficient staff, fragmented or incomplete policies or documentation.
      • Tools are non-existent.
      In One Year:
      Trusted Operator
      • ITAM data for deployed hardware and software is regularly audited for accuracy.
      • Sufficient staff and skills to support asset tracking, including a dedicated IT asset management role.
      • Teams responsible for ITAM data collection cooperate effectively.
      • Discovery, tracking, and analysis tools support most important use cases.
      IT maturity ladder with five color-coded levels.

      Innovator – Optimized Asset Management

      Business & Technology Partner – Proactive Asset Management

      Trusted Operator – Controls Assets

      Firefighter – Reactive Asset Tracking

      Unreliable - Struggles to Support

      Step 1.5: Write mission and vision statements

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Write a mission statement that encapsulates the purpose and intentions of the ITAM practice today.
      • Write a vision statement that describes what the ITAM practice aspires to become and achieve.

      Write vision and mission statements

      Create two statements to summarize the role of the ITAM practice today – and where you want it to be in the future.

      Create two short, compelling statements that encapsulate:
      • The vision for what we want the ITAM practice to be in the future; and
      • The mission – the purpose and intentions – of the ITAM practice today.

      Why bother creating mission and vision statements? After all, isn’t it just rehashing or re-writing all the work we’ve just done? Isn’t that (at best) a waste of time?

      There are a few very important reasons to create mission and vision statements:

      • Create a compass that can guide work today and your roadmap for the future.
      • Focus on the few things you must do, rather than the many things you could do.
      • Concisely communicate a compelling vision for the ITAM practice to a larger audience who (let’s face it) probably won’t read the entire ITAM Strategy deck.

      “Brevity is the soul of wit.” (Hamlet, Act 2, Scene 2)

      “Writing is easy. All you have to do is cross out the wrong words.” (Mark Twain)

      1.5 Write an ITAM vision statement

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: A whiteboard, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT Leaders and managers

      Your vision statement describes the ITAM practice as it will be in the far future. It is a target to aspire to, beyond your ability to achieve in the near or medium term.

      Examples of ITAM vision statements:

      Develop the single accurate view of IT assets, available to anyone who needs it.

      Indispensable data brokers that support strategic decisions on the IT environment.

      Provide sticky notes to participants. Write out the three questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.

      1. What’s the desired future state of the ITAM practice?
      2. What needs to be done to achieved this desired state?
      3. How do we want ITAM to be perceived in this desired state?

      Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.

      Document your vision statement in your ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      1.5 Write an ITAM mission statement

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Your ITAM mission statement is an expression of what your IT asset management function brings to your organization today. It should be presented in straightforward language that is compelling, easy to understand, and sharply focused.

      Examples of ITAM mission statements:

      Maintain accurate, actionable, accessible on data on all IT assets.

      Support IT and the business with centralized and integrated asset data.

      Provide sticky notes to participants. Write out the questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.

      1. What is our role as the asset management team?
      2. How do we support the IT and business strategies?
      3. What does our asset management function offer that no one else can?

      Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.

      Document your vision statement in your ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      Step 1.6: Define ITAM metrics and KPIs

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Identify metrics, data, or reports that may be of interest to different consumers of ITAM data.
      • Identify the key performance indicators (KPIs) for the ITAM practice, based on the goals and priorities established earlier.

      Navigate a universe of ITAM metrics

      When you have the data, how will you use it?

      • There’s a dizzying array of potential metrics you can develop and track across your ITAM environment.
      • Different stakeholders will need different data feeds, metrics, reports, and dashboards.
      • Different measures will be useful at different times. You will often need to filter or slice the data in different ways (by department, timeframe, equipment type, etc.)
      • We’ll use the next few exercises to identify the types of metrics that may be useful to different stakeholders and the KPIs to measure progress towards ITAM goals and priorities.

      ITAM Metrics

      • Quantity
        e.g. # of devices or licenses
      • Cost
        e.g. average laptop cost
      • Compliance
        e.g. effective license position reports
      • Progress
        e.g. ITAM roadmap items completed
      • Quality
        e.g. ITAM data accuracy rate
      • Time
        e.g. time to procure/ deploy

      Drill down by:

      • Vendor
      • Date
      • Dept.
      • Product
      • Location
      • Cost Center

      Develop different metrics for different teams

      A few examples:

      • CIOs — CIOs need asset data to govern technology use, align to business needs, and demonstrate IT value. What do we need to budget for hardware and software in the next year? Where can we find money to support urgent new initiatives? How many devices and software titles do we manage compared to last year? How has IT helped the business achieve key goals?
      • Asset Managers — Asset managers require data to help them oversee ITAM processes, technology, and staff, and to manage the fleet of IT assets they’re expected to track. What’s the accuracy rate of ITAM data? What’s the state of integrations between ITAM and other systems and processes? How many renewals are coming up in the next 90 days? How many laptops are in stock?
      • IT Leaders — IT managers need data that can support their teams and help them manage the technology within their mandate. What technology needs to be reviewed or retired? What do we actually manage?
      • Technicians — Service desk technicians need real-time access to data on IT assets to support service requests and incident management – for example, easy access to the list of equipment assigned to a particular user or installed in a particular location.
      • Business Managers and Executives — Business managers and executives need concise, readable dashboards to support business decisions about business use of IT assets. What’s our overall asset spend? What’s our forecasted spend? Where could we reallocate spend?

      1.6 Identify useful ITAM metrics and reports

      60 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Use this exercise to identify as many potentially useful ITAM metrics and reports as possible, and narrow them down to a few high-priority metrics. Leverage the list of example metrics on the next slide for your own exercise. If you have more than six participants, consider splitting into two or more groups, and divide the table between groups to minimize overlap.

      1. List potential consumers of ITAM data in the column on the left.
      2. What type of information do we think this role needs? What questions about IT assets do we get on a regular basis from this role or team?
      3. Review and consolidate the list as a group. Discuss and highlight any metrics the group thinks are a particularly high priority for tracking.
      Role Compliance Quality Quantity Cost Time Progress
      IT Asset Manager Owned devices not discovered in last 60 days Discrepancies between discovery data and ITAM DB records # of corporate-owned devices Spend on hardware (recent and future/ planned) Average time, maximum time to deploy end-user devices Number of ITAM roadmap items in progress
      Service Desk

      Add your results to your copy of the ITAM Strategy Template

      Examples of ITAM metrics

      Compliance Quality Quantity Cost Time/Duration/Age Progress
      Owned devices not discovered in last 60 days Discrepancies between discovery data and ITAM DB records # of corporate-owned devices Spend on hardware (recent and future/planned) Average time, maximum time to deploy end-user devices Number of ITAM roadmap items in progress or completed
      Disposed devices without certificate of destruction Breakage rates (in and out of warranty) by vendor # of devices running software title X, # of licenses for software title X Spend on software (recent and future/planned) Average time, maximum time to deploy end user software Number of integrations between ITAM DB and other sources
      Discrepancies between licenses and install count, by software title RMAs by vendor, model, equipment type Number of requests by equipment model or software title Spend on cloud (recent and future/planned) Average & total time spent on software audit responses Number of records in ITAM database
      Compliance reports (e.g. tied to regulatory compliance or grant funding) Tickets by equipment type or software title Licenses issued from license pool in the last 30 days Value of licenses issued from license pool in the last 30 days (cost avoidance) Devices by age Software titles with an up-to-date ELP report
      Reports on lost and stolen devices, including last assigned, date reported stolen, actions taken User device satisfaction scores, CSAT scores Number of devices retired or donated in last year Number of IT-managed capital assets Number of hardware/software request tickets beyond time-to-fulfil targets Number of devices audited (by ITAM team via self-audit)
      Number of OS versions, unpatched systems Number of devices due for refresh in the next year Spend saved by harvesting unused software Number of software titles, software vendors managed by ITAM team
      Audit accuracy rate Equipment in stock Cost savings from negotiations
      # of users assigned more than one device Number of non-standard devices or requests Dollars charged during audit or true-up

      Differentiate between metrics and KPIs

      Key performance indicators (KPIs) are metrics with targets aligned to goals.

      Targets could include one or more of:

      • Target state (e.g. completed)
      • Target magnitude (e.g. number, percent, rate, dollar amount)
      • Target direction (e.g. trending up or down)

      You may track many metrics, but you should have only a few KPIs (typically 2-3 per objective).

      A breached KPI should be a trigger to investigate and remediate the root cause of the problem, to ensure progress towards goals and priorities can continue.

      Which KPIs you track will change over the life of the practice, as ITAM goals and priorities shift. For example, KPIs may initially track progress towards maturing ITAM practices. Once you’ve reached target maturity, KPIs may shift to track whether the key service targets are being met.

      1.6 Identify ITAM KPIs

      20 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Good KPIs are a more objective measure of whether you’re succeeding in meeting the identified priorities for the ITAM practice.

      Identify metrics that can measure progress or success against the priorities and goals set earlier. Aim for around three metrics per goal. Identify targets for the metric you think are SMART (specific, measurable, achievable, relevant, and timebound). Track your work using the example table below.

      Goal Metric Target
      Consolidate major software contracts to drive discounts Amount spent on top 10 software contracts Decrease by 10% by next year
      Customer satisfaction scores with enterprise software Satisfaction is equal to or better than last year
      Value of licenses issued from license pool 30% greater than last year
      Identify abandoned or out-of-spec IT assets # of security incidents involving undiscovered assets Zero
      % devices with “Deployed” status in ITAM DB but not discovered for 30+ days ‹1% of all records in ITAM DB
      Provide IT asset data to technicians for service calls Customer satisfaction scores Satisfaction is equal to or better than last year
      % of end-user devices meeting minimum standards 97%

      Add your results to your copy of the ITAM Strategy Template

      Develop an IT Asset Management Strategy

      Phase 2:

      Identify your approach to support ITAM priorities and goals

      Phase 1

      1.1 Define ITAM and brainstorm opportunities and challenges.

      Executive Alignment Working Session:

      1.2 Review organizational priorities, strategy, and key initiatives.

      1.3 Align executive priorities with ITAM opportunities & priorities.

      1.4 Identify business-aligned ITAM goals and target maturity.

      1.5 Write mission and vision statements.

      1.6 Define ITAM metrics and KPIs.

      Phase 2

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Phase Outcomes:

      Establish an approach to achieving ITAM goals and priorities, including scope, structure, tools, service management integrations, documentation, and more.

      Create a roadmap that enables you to realize your approach.

      Step 2.1: Define ITAM Scope

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Establish what types of equipment and software you’ll track through the ITAM practice.
      • Establish which areas of the business will be in scope of the ITAM practice.

      Determine ITAM Scope

      Focus on what’s most important and then document it so everyone understands where they can provide the most value.

      Not all categories of assets require the same level of tracking, and some equipment and software should be excluded from the ITAM practice entirely.

      In some organizations, portions of the environment won’t be tracked by the asset management team at all. For example, some organizations will choose to delegate tracking multi-function printers (MFPs) or proprietary IoT devices to the department or vendor that manages them.

      Due to resourcing or technical limitations, you may decide that certain equipment or software is out of scope for the moment.

      What do other organizations typically track in detail?
      • Installs and entitlements for major software contracts that represent significant spend and/or are highly critical to business goals.
      • Equipment managed directly by IT that needs to be refreshed on a regular cycle:
        • End-user devices such as laptops, desktops, and tablets.
        • Server, network, and telecoms devices.
      • High value equipment that is not regularly refreshed may also be tracked, but in less detail – for example, you may not refresh large screen TVs, but you may need to track date of purchase, deployed location, vendor, and model for insurance or warranty purposes.

      2.1 Establish scope for ITAM

      45 minutes

      Input: Organizational strategy documents

      Output: ITAM scope, in terms of types of assets tracked and not tracked

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Establish the hardware and software that are within the scope of the ITAM program by updating the tables below to reflect your own environment. The “out of scope” category will include asset types that may be of value to track in the future but for which the capability or need don’t exist today.

      Hardware Software Out of Scope
      • End-user devices housing data or with a dollar value of more than $300, which will be replaced through lifecycle refresh.
      • Infrastructure devices, including network, telecom, video conferencing, servers and more
      • End-user software purchased under contract
      • Best efforts on single license purchases
      • Infrastructure software, including solutions used by IT to manage the infrastructure
      • Enterprise applications
      • Cloud (SaaS, IaaS, PaaS)
      • Departmental applications
      • Open-source applications
      • In-house developed applications
      • Freeware & shareware
      • IoT devices

      The following locations will be included in the ITAM program: All North and South America offices and retail locations.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.2: Acquire ITAM Services

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Define the type of work that may be more effectively or efficiently delivered by an outsourcer or contractor.

      “We would like our clients to come to us with an idea of where they want to get to. Why are you doing this? Is it for savings? Because you want to manage your security attack surface? Are there digital initiatives you want to move forward? What is the end goal?” (Mike Austin, MetrixData 360)

      Effectively acquire ITAM services

      Allow your team to focus on strategic, value-add activities by acquiring services that free them from commodity tasks.
      • When determining which asset capabilities and activities are best kept in-house and which ones are better handled by a supplier, it is imperative to keep the value to the business in mind.
      • Activities/capabilities that are challenging to standardize and are critical to enabling business goals are better kept in-house.
      • Activities/capabilities that are (or should be) standardized and automated are ideal candidates for outsourcing.
      • Outsourcing can be effective and successful with a narrow scope of engagement and an alignment to business outcomes.
      • Organizations that heavily weigh cost reduction as a significant driver for outsourcing are far less likely to realize the value they expected to receive.
      Business Enablement
      • Supports business-aligned ITAM opportunities & priorities
      • Highly specialized
      • Offers competitive advantages
      Map with axes 'Business Enablement' and 'Vendor's Performance Advantage' for determining whether or not to outsource.
      Vendor’s Performance Advantage
      • Talent or access to skills
      • Economies of scale
      • Access to technology
      • Does not require deep knowledge of your business

      Decide what to outsource

      It’s rarely all or nothing.

      Ask yourself:
      • How important is this activity or capability to ITAM, IT, and business priorities and goals?
      • Is it a non-commodity IT service that can improve customer satisfaction?
      • Is it a critical service to the business and the specialized knowledge must remain in-house?
      • Does the function require access to talent or skills not currently available in-house, and is cost-prohibitive to obtain?
      • Are there economies of scale that can help us meet growing demand?
      • Does the vendor provide access to best-of-breed tools and solutions that can handle the integration, management, maintenance and support of the complete system?

      You may ultimately choose to engage a single vendor or a combination of multiple vendors who can best meet your ITAM needs.

      Establishing effective vendor management processes, where you can maximize the amount of service you receive while relying on the vendor’s expertise and ability to scale, can help you make your asset management practice a net cost-saver.

      ITAM activities and capabilities
      • Contract review
      • Software audit management
      • Asset tagging
      • Asset disposal and recycling
      • Initial ITAM record creation
      • End-user device imaging
      • End-user device deployment
      • End-user software provisioning
      • End-user image management
      • ITAM database administration
      • ELP report creation
      • ITAM process management
      • ITAM report generation
      ITAM-adjacent activities and capabilities
      • Tier 1 support/service desk
      • Deskside/field support
      • Tier 3 support
      • IT Procurement
      • Device management/managed IT services
      • Budget development
      • Applications development, maintenance
      • Infrastructure hosting (e.g. cloud or colocation)
      • Infrastructure management and support
      • Discovery/monitoring tools management and support

      2.2 Identify outsourcing opportunities

      1-2 hours

      Input: Understanding of current ITAM processes and challenges

      Output: Understanding of potential outsourcing opportunities

      Materials: The table in this slide, and insight in previous slides, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      At a high level, discuss which functions of ITAM are good candidates for outsourcing.

      Start with the previous slide for examples of outsourcing activities or capabilities directly related to or adjacent to the ITAM practice. Categorize these activities as follows:

      Outsource Potentially Outsource Insource
      • Asset disposal/recycling
      • ELP report creation
      • ITAM process management

      Go through the list of activities to potentially or definitely outsource and confirm:

      1. Will outsourcing solve a resourcing need for an existing process, or can you deliver this adequately in-house?
      2. Will outsourcing improve the effectiveness and efficiency of current processes? Will it deliver more effective service channels or improved levels of reliability and performance consistency?
      3. Will outsourcing provide or enable enhanced service capabilities that your IT customers could use, and which you cannot deliver in-house due to lack of scale or capacity?

      Answering “no” to more than one of these questions suggests a need to further review options to ensure the goals are aligned with the potential value of the service offerings available.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.3: Centralize or decentralize ITAM capabilities

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Outline where the team(s) responsible for ITAM sit across the organization, who they report to, and who they need to work with across IT and the business.

      Align ITAM with IT’s structure

      ITAM’s structure will typically align with the larger business and IT structure. The wrong structure will undermine your ability to meet ITAM goals and lead to frustration, missed work, inefficiency, and loss of value.

      Which of the four archetypes below reflects the structure you need?

      1. Centralized — ITAM is entirely centralized in a single function, which reports into a central IT department.
      2. Decentralized — Local IT groups are responsible and accountable for ITAM. They may coordinate informally but do not report to any central team.
      3. Hybrid-Shared Services — Local IT can opt in to shared services but must follow centrally set ITAM practices to do so, usually with support from a shared ITAM function.
      4. Hybrid-Federated — Local IT departments are free to develop their own approach to ITAM outside of core, centrally set requirements.

      Centralized ITAM

      Total coordination, control, and oversight

      • ITAM accountability, policies, tools, standards, and expertise – in this model, they’re all concentrated in a single, specialized IT asset management practice. Accountability, authority, and oversight are concentrated in the central function as well.
      • A central ITAM team will benefit from knowledge sharing and task specialization opportunities. They are a visible single point of contact for ITAM-related questions
      • The central ITAM team will coordinate ITAM activities across the organization to optimize spend, manage risk, and enhance service. Any local IT teams are supported by and directly answerable to the central ITAM team for ITAM activities.
      • There is a single, centrally managed ITAM database. Wherever possible, this database should be integrated with other tools to support cross-solution automation (e.g. integrate AD to automatically reflect user identity changes in the ITAM database).
      • This model drives cross-organization coordination and oversight, but it may not be responsive to specific and nuanced local requirements.
      Example: Centralized
      Example of a Centralized ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working or reporting relationship

      Decentralized ITAM

      Maximize choice

      • ITAM accountability and oversight are entirely devolved to local or regional IT and/or ITAM organizations, which are free to set their own priorities, goals, policies, and standards. This model maximizes the authority of local groups to build practices that meet local requirements.
      • It may be challenging to resource and mature local practices. ITAM maturity will vary from one local organization to the next.
      • It is more likely that ITAM managers are a part-time role, and sometimes even a non-IT role. Local ITAM teams or coordinators may coordinate and share knowledge informally, but specialization can be challenging to build or leverage effectively across the organization.
      • There is likely no central ITAM tool. Local tools may be acquired, implemented, and integrated by local IT departments to suit their own needs, which can make it very difficult to report on assets organization-wide – for example, to establish compliance on an enterprise software contract.
      Example: Decentralized


      Example of a Decentralized ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working or reporting relationship

      Blue dotted line. Informal working relationships, knowledge sharing

      Hybrid: Federation

      Centralization with a light touch

      • A middle ground between centralized and decentralized ITAM, this model balances centralized decision making, specialization, and governance with local autonomy.
      • A central team will define organization-wide ITAM goals, develop capabilities, policies, and standards, and monitor compliance by local and central teams. All local teams must comply with centrally defined requirements, but they can also develop further capabilities to meet local goals.
      • For example, there will typically be a central ITAM database that must be used for at least a subset of assets, but other teams may build their own databases for day-to-day operations and export data to the central database as required.
      • There are often overlapping responsibilities in this model. A strong collaborative relationship between central and local ITAM teams is especially important here, particularly after major changes to requirements, processes, tools, or staffing when issues and breakdowns are more likely.
      Example: Federation


      Example of a Federation ITAM.

      Solid line. Direct reporting relationship

      Purple solid line. Oversight/governance

      Dotted line. Dotted line working or reporting relationship

      Hybrid: Shared Services

      Optional centralization

      • A special case of federated ITAM that balances central control and local autonomy, but with more power given to local IT to opt out of centralized shared services that come with centralized ITAM requirements.
      • ITAM requirements set by the shared services team will support management, allocation, and may have showback or chargeback implications. Following the ITAM requirements is a condition of service. If a local organization chooses to stop using shared services, they are (naturally) no longer required to adhere to the shared services ITAM requirements.
      • As with the federated model, local teams may develop further capabilities to meet local goals.
      Example: Shared Services


      Example of a Shared Services ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working relationship

      Blue dotted line. Informal working relationships, knowledge sharing

      Structure data collection & analysis

      Consider the implications of structure on data.

      Why centralize?
      • There is a need to build reports that aggregate data on assets organization-wide, rather than just assets within a local environment.
      • Decentralized ITAM tracking isn’t producing accurate or usable data, even for local purposes.
      • Tracking tools have overlapping functionality. There’s an opportunity to rationalize spend, management and support for ITAM tools.
      • Contract centralization can optimize spend and manage risks, but only with the data required to manage those contracts.
      Why decentralize?
      • Tracking and reporting on local assets is sufficient to meet ITAM goals; there is limited or no need to track assets organization-wide.
      • Local teams have the skills to track and maintain asset data; subsidiaries have appropriate budgets and tools to support ITAM tracking.
      • Decentralized ITSM/ITAM tools are in place, populated, and accurate.
      • The effort to consolidate tools and processes may outweigh the benefits to data centralization.
      • Lots of variability in types of assets and the environment is stable.
      Requirements for success:
      • A centralized IT asset management solution is implemented and managed.
      • Local teams must understand the why and how of centralized data tracking and be held accountable for assigned responsibilities.
      • The asset tool should offer both centralized and localized views of the data.
      Requirements for success:
      • Guidelines and expectations for reporting to centralized asset management team will be well defined and supported.
      • Local asset managers will have opportunity to collaborate with others in the role for knowledge transfer and asset trading, where appropriate.

      Structure budget and contract management

      Contract consolidation creates economies of scale for vendor management and license pooling that strengthen your negotiating position with vendors and optimize spend.

      Why centralize?
      • Budgeting, governance, and accountability are already centralized. Centralized ITAM practices can support the existing governance practices.
      • Centralizing contract management and negotiation can optimize spend and/or deliver access to better service.
      • Centralize management for contracts that cover most of the organization, are highly complex, involve large spend and/or higher risk, and will benefit from specialization of asset staff.
      Why decentralize?
      • Budgeting, governance, and accountability rest with local organizations.
      • There may be increased need for high levels of customer responsiveness and support.
      • Decentralize contract management for contracts used only by local groups (e.g. a few divisions, a few specialized functions), and that are smaller, low risk, and come with standard terms and conditions.
      Requirements for success:
      • A centralized IT asset management solution is implemented and managed.
      • Contract terms must be harmonized across the organization.
      • Centralized fulfillment is as streamlined as possible. For example, software contracts should include the right to install at any time and pay through a true-up process.
      Requirements for success:
      • Any expectations for harmonization with the centralized asset management team will be well defined and supported.
      • Local asset managers can collaborate with other local ITAM leads to support knowledge transfer, asset swapping, etc.

      Structure technology management

      Are there opportunities to centralize or decentralize support functions?

      Why centralize?
      • Standard technologies are deployed organization-wide.
      • There are opportunities to improve service and optimize costs by consolidating knowledge, service contracts, and support functions.
      • Centralizing data on product supply allows for easier harvest and redeployment of assets by a central support team.
      • A stable, central support function can better support localized needs during seasonal staffing changes, mergers and acquisitions.
      Why decentralize?
      • Technology is unique to a local subset of users or customers.
      • Minimal opportunity for savings or better support by consolidating knowledge, service contracts, or support functions.
      • Refresh standards are set at a local level; new tech adoption may be impeded by a reliance on older technologies, local budget shortfalls, or other constraints.
      • Hardware may need to be managed locally if shipping costs and times can’t reasonably be met by a distant central support team.
      Requirements for success:
      • Ensure required processes, technologies, skills, and knowledge are in place to enable centralized support.
      • Keep a central calendar of contract renewals, including reminders to start work on the renewal no less than 90 days prior. Prioritize contracts with high dollar value or high risk.
      • The central asset management solution should be configured to provide data that can enable the central support team.
      Requirements for success:
      • Ensure required processes, technologies, skills, and knowledge are in place to enable decentralized support.
      • Decentralized support teams must understand and adhere to ITAM activities that are part of support work (e.g. data entry, data audits).
      • The central asset management solution should be configured to provide data that can enable the central support team, or decentralized asset solutions must be funded, and teams trained on their use.

      2.3 Review ITAM Structure

      1-2 hours

      Input: Understanding of current organizational structure, Understanding of challenges and opportunities related to the current structure

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Outline the current model for your organization and identify opportunities to centralize or decentralize ITAM-related activities.

      1. What model best describes how ITAM should be structured in your organization? Modify the slide outlining structure as a group to outline your own organization, as required.
      2. In the table below, outline opportunities to centralize or decentralize data tracking, budget and contract management, and technology management activities.
      Centralize Decentralize
      Data collection & analysis
      • Make better use of central ITAM database.
      • Support local IT departments building runbooks for data tracking during lifecycle activities (create templates, examples)
      Budget and contract management
      • Centralize Microsoft contracts.
      • Create a runbook to onboard new companies to MSFT contracts.
      • Create tools and data views to support local department budget exercises.
      Technology management
      • Ensure all end-user devices are visible to centrally managed InTune, ConfigMgr.
      • Enable direct shipping from vendor to local sites.
      • Establish disposal/pickup at local sites.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.4: Create a RACI

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Review the role of the IT asset manager.
      • Identify who’s responsible, accountable, consulted, and informed for key ITAM activities.

      Empower your asset manager

      The asset manager is the critical ITAM role. Ensure they’re positioned to succeed.

      There’s too much change in the technology and business environment to expect ITAM to be “a problem to solve.” It is a practice that requires care and feeding through regular iteration to achieve success. At the helm of this practice is your asset manager, whose approach and past experience will have a significant impact on how you approach ITAM.

      The asset manager role requires a variety of skills, knowledge, and abilities including:

      • Operations, process, and practice management.
      • An ability to communicate, influence, negotiate, and facilitate.
      • Organizational knowledge and relationship management.
      • Contract and license agreement analysis, attention to detail.
      • Natural curiosity and a willingness to learn.
      • A strong understanding of technologies in use by the organization, and how they fit into the asset management program.
      Where the asset manager sits in the organization will also have an impact on their focus and priorities. When the asset manager reports into a service team, their focus will often reflect their team’s focus: end-user devices and software, customer satisfaction, request fulfillment. Asset teams that report into a leadership or governance function will be more likely to focus on organization-wide assets, governance, budget management, and compliance.

      “Where your asset manager sits, and what past experience they have, is going to influence how they do asset management.” (Jeremy Boerger, Consultant & Author)

      “It can be annoying at times, but a good IT asset manager will poke their nose into activities that do not obviously concern them, such as programme and project approval boards and technical design committees. Their aim is to identify and mitigate ITAM risks BEFORE the technology is deployed as well as to ensure that projects and solutions ‘bake in’ the necessary processes and tools that ensure IT assets can be managed effectively throughout their lifecycle.” (Kylie Fowler, ITAM by Design, 2017)

      IT asset managers must have a range of skills and knowledge

      • ITAM Operations, Process, and Practice Management
        The asset manager is typically responsible for managing and improving the ITAM practice and related processes and tools. The asset manager may administer the ITAM tool, develop reports and dashboards, evaluate and implement new technologies or services to improve ITAM maturity, and more.
      • Organizational Knowledge
        An effective IT asset manager has a good understanding of your organization and its strategy, products, stakeholders, and culture.
      • Technology & Product Awareness
        An IT asset manager must learn about new and changing technologies and products adopted by the organization (e.g. IoT, cloud) and develop recommendations on how to track and manage them via the ITAM practice.
      A book surrounded by icons corresponding to the bullet points.
      • People Management
        Asset managers often manage a team directly and have dotted-line reports across IT and the business.
      • Communication
        Important in any role, but particularly critical where learning, listening, negotiation, and persuasion are so critical.
      • Finance & Budgeting
        A foundational knowledge of financial planning and budgeting practices is often helpful, where the asset manager is asked to contribute to these activities.
      • Contract Review & Analysis
        Analyze new and existing contracts to evaluate changes, identify compliance requirements, and optimize spend.

      Assign ITAM responsibilities and accountabilities

      Align authority and accountability.
      • A RACI exercise will help you discuss and document accountability and responsibility for critical ITAM activities.
      • When responsibility and accountability are not currently well documented, it’s often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
      • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
      • In the future, you may need to define roles in more detail as you change your hardware and software asset management procedures.

      R

      Responsible: The person who actually gets the job done.

      Different roles may be responsible for different aspects of the activity relevant to their role.

      A

      Accountable: The one role accountable for the activity (in terms completion, quality, cost, etc.)

      Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

      C

      Consulted: Must have the opportunity to provide meaningful input at certain points in the activity.

      Typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you’ll add to a process.

      I

      Informed: Receives information regarding the task, but has no requirement to provide feedback.

      Information might relate to process execution, changes, or quality.

      2.4 Conduct a RACI Exercise

      1-2 hours

      Input: An understanding of key roles and activities in ITAM practices, An understanding of your organization, High-level structure of your ITAM program

      Output: A RACI diagram for IT asset management

      Materials: The table in the next slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Let’s face it – RACI exercises can be dry. We’ve found that the approach below is more collaborative, engaging, and effective compared to filling out the table as a large group.

      1. Create a shared working copy of the RACI charts on the following slides (e.g. write it out on a whiteboard or provide a link to this document and work directly in it).
      2. Review the list of template roles and activities as a group. Add, change, or remove roles and activities from the table as needed.
      3. Divide into small groups. Assign each group a set of roles, and have them define whether that role is accountable, responsible, consulted, or informed for each activity in the chart. Refer to the previous slide for context on RACI. Give everyone 15 minutes to update their section of the chart.
      4. Come back together as a large group to review the chart. First, check for accountability – there should generally be just one role accountable for each activity. Then, have each small group walk through their section, and encourage participants to ask questions. Is there at least one role responsible for each task, and what are they responsible for? Does everyone listed as consulted or informed really need to be? Make any necessary adjustments.

      Add your results to your copy of the ITAM Strategy Template

      Define ITAM governance activities

      RACI Chart for ITAM governance activities. In the first column is a list of governance activities, and the row headers are positions within a company. Fields are marked with an R, A, C, or I.

      Document asset management responsibilities and accountabilities

      RACI Chart for ITAM asset management responsibilities and accountabilities. In the first column is a list of responsibilities and accountabilities, and the row headers are positions within a company. Fields are marked with an R, A, C, or I.

      Step 2.5: Align ITAM with other Service Management Practices

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Establish shared and separate responsibilities for asset and configuration management.
      • Identify how ITAM can support other practices, and how other practices can support ITAM.

      Asset vs. Configuration

      Asset and configuration management look at the same world through different lenses.
      • IT asset management tends to focus on each IT asset in its own right: assignment or ownership, its lifecycle, and related financial obligations and entitlements.
      • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations to other CIs.
      • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they tend use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
      • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.
      Asset and Configuration Management: An Example

      Configuration Management Database (CMDB)

      A database of uniquely identified configuration items (CIs). Each CI record may include information on:
      Service Attributes

      Supported Service(s)
      Service Description, Criticality, SLAs
      Service Owners
      Data Criticality/Sensitivity

      CI Relationships

      Physical Connections
      Logical Connections
      Dependencies

      Arrow connector.

      Discovery, Normalization, Dependency Mapping, Business Rules*

      Manual Data Entry

      Arrow connector.
      This shared information could be attached to asset records, CI records, or both, and it should be synchronized between the two databases where it’s tracked in both.
      Hardware Information

      Serial, Model and Specs
      Network Address
      Physical Location

      Software Installations

      Hypervisor & OS
      Middleware & Software
      Software Configurations

      Arrow connector.

      Asset Management Database (AMDB)

      A database of uniquely identified IT assets. Each asset record may include information on:
      Procurement/Purchasing

      Purchase Request/Purchase Order
      Invoice and Cost
      Cost Center
      Vendor
      Contracts and MSAs
      Support/Maintenance/Warranties

      Asset Attributes

      Model, Title, Product Info, License Key
      Assigned User
      Lifecycle Status
      Last ITAM Audit Date
      Certificate of Disposal

      Arrows connecting multiple fields.

      IT Security Systems

      Vulnerability Management
      Threat Management
      SIEM
      Endpoint Protection

      IT Service Management (ITSM) System

      Change Tickets
      Request Tickets
      Incident Tickets
      Problem Tickets
      Project Tickets
      Knowledgebase

      Financial System/ERP

      General Ledger
      Accounts Payable
      Accounts Receivable
      Enterprise Assets
      Enterprise Contract Database

      (*Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.)

      2.5 Integrate ITAM and configuration practices

      45 minutes

      Input: Knowledge of the organization’s configuration management processes

      Output: Define how ITAM and configuration management will support one another

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Configuration manager

      Work through the table below to identify how you will collaborate and synchronize data across ITAM and configuration management practices and tools.

      What are the goals (if any currently exist) for the configuration management practice? Connect configuration items to services to support service management.
      How will configuration and asset management teams collaborate? Weekly status updates. As-needed working sessions.
      Shared visibility on each others’ Kanban tracker.
      Create tickets to raise and track issues that require collaboration or attention from the other team.
      How can config leverage ITAM? Connect CIs to financial, contractual, and ownership data.
      How can ITAM leverage config? Connect assets to services, changes, incidents.
      What key fields will be primarily tracked/managed by ITAM? Serial number, unique ID, user, location, PO number, …
      What key fields will be primarily tracked/managed by configuration management? Supported service(s), dependencies, service description, service criticality, network address…

      Add your results to your copy of the ITAM Strategy Template

      ITAM supports service management

      Decoupling asset management from other service management practices can result in lost value. Establish how asset management can support other service management practices – and how those practices can support ITAM.

      Incident Management

      What broke?
      Was it under warranty?
      Is there a service contract?
      Was it licensed?
      Who was it assigned to?
      Is it end-of-life?

      ITAM
      Practice

      Request Management

      What can this user request or purchase?
      What are standard hardware and software offerings?
      What does the requester already have?
      Are there items in inventory to fulfil the request?
      Did we save money by reissuing equipment?
      Is this a standard request?
      What assets are being requested regularly?

      What IT assets are related to the known issue?
      What models and vendors are related to the issue?
      Are the assets covered by a service contract?
      Are other tickets related to this asset?
      What end-of-life assets have been tied to incidents recently?

      Problem Management

      What assets are related to the change?
      Is the software properly licensed?
      Has old equipment been properly retired and disposed?
      Have software licenses been returned to the pool?
      Is the vendor support on the change part of a service contract?

      Change Enablement

      2.5. Connect with other IT service practices

      45 minutes

      Input: Knowledge of existing organizational IT service management processes

      Output: Define how ITAM will help other service management processes, and how other service management processes will help ITAM

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Service leads

      Complete the table below to establish what ITAM can provide to other service management practices, and what other practices can provide to ITAM.

      Practice ITAM will help Will help ITAM
      Incident Management Provide context on assets involved in an incident (e.g. ownership, service contracts). Track when assets are involved in incidents (via incident tickets).
      Request Management Oversee request & procurement processes. Help develop asset standards. Enter new assets in ITAM database.
      Problem Management Collect information on assets related to known issues. Report back on models/titles that are generating known issues.
      Change Enablement Provide context on assets for change review. Ensure EOL assets are retired and licenses are returned during changes.
      Capacity Management Identify ownership, location for assets at capacity. Identify upcoming refreshes or purchases.
      Availability Management Connect uptime and reliability to assets. Identify assets that are causing availability issues.
      Monitoring and Event Management Provide context to events with asset data. Notify asset of unrecognized software and hardware.
      Financial Management Establish current and predict future spending. Identify upcoming purchases, renewals.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.6: Evaluate ITAM tools and integrations

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Create a list of the ITAM tools currently in use, how they’re used, and their current limitations.
      • Identify new tools that could provide value to the ITAM practice, and what needs to be done to acquire and implement them.

      “Everything is connected. Nothing is also connected.” (Dirk Gently’s Holistic Detective Agency)

      Establish current strengths and gaps in your ITAM toolset

      ITAM data quality relies on tools and integrations that are managed by individuals or teams who don’t report directly to the ITAM function.

      Without direct line of sight into tools management, the ITAM team must influence rather than direct improvement initiatives that are in some cases critical to the performance of the ITAM function. To more effectively influence improvement efforts, you must explicitly identify what you need, why you need it, from which tools, and from which stakeholders.

      Data Sources
      Procurement Tools
      Discovery Tools
      Active Directory
      Purchase Documents
      Spreadsheets
      Input To Asset System(s) of Record
      ITAM Database
      ITSM Tool
      CMDB
      Output To Asset Data Consumption
      ITFM Tools
      Security Tools
      TEM Tools
      Accounting Tools
      Spreadsheets
      “Active Directory plays a huge role in audit defense and self-assessment, but no-one really goes out there and looks at Active Directory.

      I was talking to one organization that has 1,600,000 AD records for 100,000 employees.” (Mike Austin, Founder, MetrixData 360)

      2.6 Evaluate ITAM existing technologies

      30 minutes

      Input: Knowledge of existing ITAM tools

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Identify the use, limitations, and next steps for existing ITAM tools, including those not directly managed by the ITAM team.

      1. What tools do we have today?
      2. What are they used for? What are their limitations?
      3. Who manages them?
      4. What actions could we take to maximize the value of the tools?
      Existing Tool Use Constraints Owner Proposed Action?
      ITAM Module
      • Track HW/SW
      • Connect assets to incident, request
      • Currently used for end-user devices only
      • Not all divisions have access
      • SAM capabilities are limited
      ITAM Team/Service Management
      • Add license for additional read/write access
      • Start tracking infra in this tool
      Active Directory
      • Store user IDs, organizational data
      Major data quality issues IT Operations
      • Work with AD team to identify issues creating data issues

      Add your results to your copy of the ITAM Strategy Template

      2.6 Identify potential new tools

      30 minutes

      Input: Knowledge of tooling gaps, An understanding of available tools that could remediate gaps

      Output: New tools that can improve ITAM capabilities, including expected value and proposed next steps

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Identify tools that are required to support the identified goals of the ITAM practice.

      1. What types of tools do we need that we don’t have?
      2. What could these tools help us do?
      3. What needs to be done next to investigate or acquire the appropriate tool?
      New Tool Expected Value Proposed Next Steps
      SAM tool
      • Automatically calculate licensing entitlements from contract data.
      • Automatically calculate licensing requirements from discovery data.
      • Support gap analyses.
      • Further develop software requirements.
      • Identify vendors in the space and create a shortlist.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.7: Create a plan for internal and external audits

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Establish your approach to internal data audits.
      • Create a high-level response plan for external audits.

      Validate ITAM data via internal audits

      Data audits provide assurance that the records in the ITAM database are as accurate as possible. Consider these three approaches:

      Compare Tool Records

      Audit your data by comparing records in the ITAM system to other discovery sources.

      • Ideally, use three separate data sources (e.g. ITAM database, discovery tool, security tool). Use a common field, such as the host name, to compare across fields. (To learn more about discovery tool analysis, see Jeremy Boerger’s book, Rethinking IT Asset Management.)
      • Run reports to compare records and identify discrepancies. This could include assets missing from one system or metadata differences such as different users or installed software.
      • Over time, discrepancies between tools should be well understood and accepted; otherwise, they should be addressed and remediated.
      IT-led Audit

      Conduct a hands-on investigation led by ITAM staff and IT technicians.

      • In-person audits require significant effort and resources. Each audit should be scoped and planned ahead of time to focus on known problem areas.
      • Provide the audit team with exact instructions on what needs to be verified and recorded. Depending on the experience and attention to detail of the audit team, you may need to conduct spot checks to ensure you’re catching any issues in the audit process itself.
      • Automation should be used wherever possible (e.g. through barcodes, scanners, and tables for quick access to ITAM records).
      User-led audit

      Have users validate the IT assets assigned to them.

      • Even more than IT-led audits: don’t use this approach too frequently; keep the scope as narrow as possible and the process as simple as possible.
      • Ensure users have all the information and tools they’ll need readily available to complete this task, or the result will be ineffective and will only frustrate your users.
      • Consider a process integrated with your ITSM tool: once a year, when a user logs in to the portal, they will be asked to enter the asset code for their laptop (and provided with instructions on where to find that code). Investigate discrepancies between assignments and ITAM records.

      2.7 Set an approach to internal data audits

      30 minutes

      Input: An understanding of current data audit capabilities and needs

      Output: An outline of how you’ll approach data audits, including frequency, scope, required resources

      Materials: Your copy of the ITAM Strategy Template

      Participants: ITAM team

      Review the three internal data audit approaches outlined on the previous slide, and identify which of the three approaches you’ll use. For each approach, complete the fields in the table below.

      Audit Approach How often? What scope? Who’s involved? Comments
      Compare tool records Monthly Compare ITAM DB, Intune/ConfigMgr, and Vulnerability Scanner Data; focus on end-user devices to start Asset manager will lead at first.
      Work with tool admins to pull data and generate reports.
      IT-led audit Annual End-user devices at a subset of locations Asset manager will work with ITSM admins to generate reports. In-person audit to be conducted by local techs.
      User-led audit Annual Assigned personal devices (start with a pilot group) Asset coordinator to develop procedure with ITSM admin. Run pilot with power users first.

      Add your results to your copy of the ITAM Strategy Template

      Prepare for and respond to external audits and true-ups

      Are you ready when software vendors come knocking?

      • Vendor audits are expensive.
      • If you’re out of compliance, you will at minimum be required to pay the missing license fees. At their discretion, vendors may choose to add punitive fees and require you to cover the hourly cost of their audit teams. If you choose not to pay, the vendor could secure an injunction to cut off your service, which in many cases will be far more costly than the fines. And this is aside from the intangible costs of the disruption to your business and damaged relationships between IT, ITAM, your business, and other partners.
      • Having a plan to respond to an audit is critical to reducing audit risk. Preparation will help you coordinate your audit response, ensure the audit happens on the most favorable possible terms, and even prevent some audits from happening in the first place.
      • The best defense, as they say, is a good offense. Good ITAM and SAM processes will allow you to track acquisition, allocation, and disposal of software licenses; understand your licensing position; and ensure you remain compliant whenever possible. The vendor has no reason to audit you when there’s nothing to find.
      • Know when and where your audit risk is greatest, so you can focus your resources where they can deliver the most value.
      “If software audits are a big part of your asset operations, you have problems. You can reduce the time spent on audits and eliminate some audits by having a proactive ITAM practice.” (Sandi Conrad, Principal Research Director)

      Info-Tech Insight

      Audit defense starts long before you get audited. For an in-depth review of your audit approach, see Info-Tech’s Prepare and Defend Against a Software Audit.

      Identify areas of higher audit risk

      Watch for these warning signs
      • Your organization is visibly fighting fires. Signs of disorder may signal to vendors that there are opportunities to exploit via an audit. Past audit failures make future audits more likely.
      • You are looking for ways to decrease spend. Vendors may counter attempts to true-down licensing by launching an audit to try to find unlicensed software that provides them leverage to negotiate maintained or even increased spending.
      • Your license/contract terms with the vendor are particularly complex or highly customized. Very complex terms may make it harder to validate your own compliance, which may present opportunities to the vendor in an audit.
      • The vendor has earned a reputation for being particularly aggressive with audits. Some vendors include audits as a standard component of their business model to drive revenue. This may include acquiring smaller vendors or software titles that may not have been audit-driven in the past, and running audits on their new customer base.

      “The reality is, software vendors prey on confusion and complication. Where there’s confusion, there’s opportunity.” (Mike Austin, Founder, MetrixData 360)

      Develop an audit response plan

      You will be on the clock once the vendor sends you an audit request. Have a plan ready to go.
      • Don’t panic: Resist knee-jerk reactions. Follow the plan.
      • Form an audit response team and centralize your response: This team should be led by a member of the ITAM group, and it should include IT leadership, software SMEs, representatives from affected business areas, vendor management, contract management, and legal. You may also need to bring on a contractor with deep expertise with the vendor in question to supplement your internal capabilities. Establish clearly who will be the point of contact with the vendor during the audit.
      • Clarify the scope of the audit: Clearly establish what the audit will cover – what products, subsidiaries, contracts, time periods, geographic regions, etc. Manage the auditors to prevent scope creep.
      • Establish who covers audit costs: Vendors may demand the auditee cover the hourly cost of their audit team if you’re significantly out of compliance. Consider asking the vendor to pay for your team’s time if you’re found to be compliant.
      • Know your contract: Vendors’ contracts change over time, and it’s no guarantee that even your vendor’s licensing experts will be aware of the rights you have in your contract. You must know your entitlements to negotiate effectively.
      1. Bring the audit request received to the attention of ITAM and IT leadership. Assemble the response team.
      2. Acknowledge receipt of audit notice.
      3. Negotiate timing and scope of the audit.
      4. Direct staff not to remove or acquire licenses for software under audit without directly involving the ITAM team first.
      5. Gather installation data and documentation to establish current entitlements, including original contract, current contract, addendums, receipts, invoices.
      6. Compare entitlements to installed software.
      7. Investigate any anomalies (e.g. unexpected or non-compliant software).
      8. Review results with the audit response team.

      2.7 Clarify your vendor audit response plan

      1 hour

      Input: Organizational knowledge on your current audit response procedures

      Output: Audit response team membership, High-level audit checklist, A list of things to start, stop, and continue doing as part of the audit response

      Materials: Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      1. Who’s on the audit response team, and what’s their role? Who will lead the team? Who will be the point of contact with the auditor?
      2. What are the high-level steps in our audit response workflow? Use the example checklist below as a starting point.
      3. What do we need to start, stop, and continue doing in response to audit requests?

      Example Audit Checklist

      • Bring the audit request received to the attention of ITAM and IT leadership. Assemble the response team.
      • Acknowledge receipt of audit notice.
      • Negotiate timing and scope of the audit.
      • Direct staff not to remove or acquire licenses for software under audit without directly involving the ITAM team first.
      • Gather installation data and documentation to establish current entitlements, including original contract, current contract, addendums, receipts, invoices.
      • Compare entitlements to installed software.
      • Investigate any anomalies (e.g. unexpected or non-compliant software).
      • Review results with the audit response team.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.8: Improve budget processes

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Identify what you need to start, stop, and continue to do to support budgeting processes.

      Improve budgeting and forecasting

      Insert ITAM into budgeting processes to deliver significant value.

      Some examples of what ITAM can bring to the budgeting table:
      • Trustworthy data on deployed assets and spending obligations tied to those assets.
      • Projections of hardware due for replacement in terms of quantity and spend.
      • Knowledge of IT hardware and software contract terms and pricing.
      • Lists of unused or underused hardware and software that could be redeployed to avoid spend.
      • Comparisons of spend year-over-year.

      Being part of the budgeting process positions ITAM for success in other ways:

      • Helps demonstrate the strategic value of the ITAM practice.
      • Provides insight into business and IT strategic projects and priorities for the year.
      • Strengthens relationships with key stakeholders, and positions the ITAM team as trusted partners.

      “Knowing what you have [IT assets] is foundational to budgeting, managing, and optimizing IT spend.” (Dave Kish, Info-Tech, Practice Lead, IT Financial Management)

      Stock image of a calculator.

      2.8 Build better budgets

      20 minutes

      Input: Context on IT budgeting processes

      Output: A list of things to start, stop, and continue doing as part of budgeting exercises

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      What should we start, stop, and continue doing to support organizational budgeting exercises?

      Start Stop Continue
      • Creating buckets of spend and allocating assets to those buckets.
      • Zero-based review on IaaS instances quarterly.
      • Develop dashboards plugged into asset data for department heads to view allocated assets and spend.
      • Create value reports to demonstrate hard savings as well as cost avoidance.
      • Waiting for business leaders to come to us for help (start reaching out with reports proactively, three months before budget cycle).
      • % increases on IT budgets without further review.
      • Monthly variance budget analysis.
      • What-if analysis for asset spend based on expected headcount increases.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.9: Establish a documentation framework

      Participants

      • Project sponsor and lead facilitator
      • ITAM team

      Outcomes

      • Identify key documentation and gaps in your documentation.
      • Establish where documentation should be stored, who should own it, who should have access, and what should trigger a review.

      Create ITAM documentation

      ITAM documentation will typically support governance or operations.

      Long-term planning and governance
      • ITAM policy and/or related policies (procurement policy, security awareness policy, acceptable use policy, etc.)
      • ITAM strategy document
      • ITAM roadmap or burndown list
      • Job descriptions
      • Functional requirements documents for ITAM tools

      Operational documentation

      • ITAM SOPs (hardware, software) and workflows
      • Detailed work instructions/knowledgebase articles
      • ITAM data/records
      • Contracts, purchase orders, invoices, MSAs, SOWs, etc.
      • Effective Licensing Position (ELP) reports
      • Training and communication materials
      • Tool and integration documentation
      • Asset management governance, operations, and tools typically generate a lot of documentation.
      • Don’t create documentation for the sake of documentation. Prioritize building and maintaining documentation that addresses major risks or presents opportunities to improve the consistency and reliability of key processes.
      • Maximize the value of ITAM documentation by ensuring it is as current, accessible, and usable as it needs to be.
      • Clearly identify where documentation is stored and who should have access to it.
      • Identify who is accountable for the creation and maintenance of key documentation, and establish triggers for reviews, updates, and changes.

      Consider ITAM policies

      Create policies that can and will be monitored and enforced.
      • Certain requirements of the ITAM practice may need to be backed up by corporate policies: formal statements of organizational expectations that must be recognized by staff, and which will lead to sanctions/penalties if breached.
      • Some organizations will choose to create one or more ITAM-specific policies. Others will include ITAM-related statements in other existing policies, such as acceptable use policies, security training and awareness policies, procurement policies, configuration policies, e-waste policies, and more.
      • Ensure that you are prepared to monitor compliance with policies and evenly enforce breaches of policy. Failing to consistently enforce your policies exposes you and your organization to claims of negligence or discriminatory conduct.
      • For a template for ITAM-specific policies, see Info-Tech’s policy templates for Hardware Asset Management and Software Asset Management.

      2.9 Establish documentation gaps

      15-30 minutes

      Input: An understanding of existing documentation gaps and risks

      Output: Documentation gaps, Identified owners, repositories, access rights, and review/update protocols

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, Optional: IT managers, ITAM business partners

      Discuss and record the following:

      • What planning/governance, operational, and tooling documentation do we still need to create? Who is accountable for the creation and maintenance of these documents?
      • Where will the documentation be stored? Who can access these documents?
      • What will trigger reviews or changes to the documents?
      Need to Create Owner Stored in Accessible by Trigger for review
      Hardware asset management SOP ITAM manager ITAM SharePoint site › Operating procedures folder
      • All IT staff
      • Annual review
      • As-needed for major tooling changes that require a documentation update

      Add your results to your copy of the ITAM Strategy Template

      Step 2.10: Create a roadmap and communication plan

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • A timeline of key ITAM initiatives.
      • Improvement ideas aligned to key initiatives.
      • A communication plan tailored to key stakeholders.
      • Your ITAM Strategy document.

      “Understand that this is a journey. This is not a 90-day project. And in some organizations, these journeys could be three or five years long.” (Mike Austin, MetrixData 360)

      2.10 Identify key ITAM initiatives

      30-45 minutes

      Input: Organizational strategy documents

      Output: A roadmap that outlines next steps

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Project sponsor

      1. Identify key initiatives that are critical to improving practice maturity and meeting business goals.
      2. There should only be a handful of really key initiatives. This is the work that will have the greatest impact on your ability to deliver value. Too many initiatives muddy the narrative and can distract from what really matters.
      3. Plot the target start and end dates for each initiative in the business and IT transformation timeline you created in Phase 1.
      4. Review the chart and consider – what new capabilities should the ITAM practice have once the identified initiatives are complete? What transformational initiatives will you be better positioned to support?

      Add your results to your copy of the ITAM Strategy Template

      Transformation Timeline

      Example transformation timeline with row headers 'Business Inititiaves', 'IT Initiatives', and 'ITAM Initiatives'. Each initiative is laid out along the timeline appropriately.

      2.10 Align improvement ideas to initiatives

      45 minutes

      Input: Key initiatives, Ideas for ITAM improvement collected over the course of previous exercises

      Output: Concrete action items to support each initiative

      Materials: The table in the next slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Project sponsor

      As you’ve been working through the previous exercises, you have been tracking ideas for improvement – now we’ll align them to your roadmap.

      1. Review the list of ideas for improvement you’ve produced over the working sessions. Consolidate the list – are there any ideas that overlap or complement each other? Record any new ideas. Frame each idea as an action item – something you can actually do.
      2. Connect the action items to initiatives. It may be that not every action item becomes part of a key initiative. (Don’t lose ideas that aren’t part of key initiatives – track them in a separate burndown list or backlog.)
      3. Identify a target completion date and owner for each action item that’s part of an initiative.

      Add your results to your copy of the ITAM Strategy Template

      Example ITAM initiatives

      Initiative 1: Develop hardware/software standards
      Task Target Completion Owner
      Laptop standards Q1-2023 ITAM manager
      Identify/eliminate contracts for unused software using scan tool Q2-2023 ITAM manager
      Review O365 license levels and standard service Q3-2023 ITAM manager

      Initiative 2: Improve ITAM data quality
      Task Target Completion Owner
      Implement scan agent on all field laptops Q3-2023 Desktop engineer
      Conduct in person audit on identified data discrepancies Q1-2024 ITAM team
      Develop and run user-led audit Q1-2024 Asset manager

      Initiative 3: Acquire & implement a new ITAM tool
      Task Target Completion Owner
      Select an ITAM tool Q3-2023 ITAM manager
      Implement ITAM tool, incl. existing data migration Q1-2024 ITAM manager
      Training on new tool Q1-2024 ITAM manager
      Build KPIs, executive dashboards in new tool Q2-2024 Data analyst
      Develop user-led audit functionality in new tool Q3-2024 ITAM coordinator

      2.10 Create a communication plan

      45 minutes

      Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals

      Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: IT asset manager, Project sponsor

      Develop clear, consistent, and targeted messages to key ITAM stakeholders.

      1. Modify the list of stakeholders in the first column.
      2. What benefits should those stakeholders realize from ITAM? What impact may the proposed improvements have on them? Refer back to exercises from Phase 1, where you identified key stakeholders, their priorities, and how ITAM could help them.
      3. Identify communication channels (in-person, email, all-hands meeting, etc.) and timing – when you’ll distribute the message. You may choose to use more than one channel, and you may need to convey the message more than once.
      Group ITAM Benefits Impact Channel(s) Timing
      CFO
      • More accurate IT spend predictions
      • Better equipment utilization and value for money
      • Sponsor integration project between ITAM DB and financial system
      • Support procurement procedures review
      Face-to-face – based on their availability Within the next month
      CIO
      • Better oversight into IT spend
      • Data to help demonstrate IT value
      • Resources required to support tool and ITAM process improvements
      Standing bi-monthly 1:1 meetings Review strategy at next meeting
      IT Managers
      Field Techs

      Add your results to your copy of the ITAM Strategy Template

      2.10 Put the final touches on your ITAM Strategy

      30 minutes

      Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals

      Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: IT asset manager, Project sponsor

      You’re almost done! Do a final check of your work before you send a copy to your participants.

      1. Summarize in three points the key findings from the activities you’ve worked through. What have you learned? What are your priorities? What key message do you need to get across? Add these to the appropriate slide near the start of the ITAM Strategy Template.
      2. What are your immediate next steps? Summarize no more than five and add them to the appropriate slide near the start of the ITAM Strategy Template.
        1. Are you asking for something? Approval for ITAM initiatives? Funding? Resources? Clearly identify the ask as part of your next steps.
      3. Are the KPIs identified in Phase 1 still valid? Will they help you monitor for success in the initiatives you’ve identified in Phase 2? Make any adjustments you think are required to the KPIs to reflect the additional completed work.

      Add your results to your copy of the ITAM Strategy Template

      Research Contributors and Experts

      Kylie Fowler
      Principal Consultant
      ITAM Intelligence

      Kylie is an experienced ITAM/FinOps consultant with a track record of creating superior IT asset management frameworks that enable large companies to optimize IT costs while maintaining governance and control.

      She has operated as an independent consultant since 2009, enabling organizations including Sainsbury's and DirectLine Insurance to leverage the benefits of IT asset management and FinOps to achieve critical business objectives. Recent key projects include defining an end-to-end SAM strategy, target operating model, policies and processes which when implemented provided a 300% ROI.

      She is passionate about supporting businesses of all sizes to drive continuous improvement, reduce risk, and achieve return on investment through the development of creative asset management and FinOps solutions.

      Rory Canavan
      Owner and Principal Consultant
      SAM Charter

      Rory is the founder, owner, and principal consultant of SAM Charter, an internationally recognized consultancy in enterprise-wide Software & IT Asset Management. As an industry leader, SAM Charter is uniquely poised to ensure your IT & SAM systems are aligned to your business requirements.

      With a technical background in business and systems analysis, Rory has a wide range of first-hand experience advising numerous companies and organizations on the best practices and principles pertaining to software asset management. This experience has been gained in both military and civil organizations, including the Royal Navy, Compaq, HP, the Federation Against Software Theft (FAST), and several software vendors.

      Research Contributors and Experts

      Jeremy Boerger
      Founder, Boerger Consulting
      Author of Rethinking IT Asset Management

      Jeremy started his career in ITAM fighting the Y2K bug at the turn of the 21st century. Since then, he has helped companies in manufacturing, healthcare, banking, and service industries build and rehabilitate hardware and software asset management practices.

      These experiences prompted him to create the Pragmatic ITAM method, which directly addresses and permanently resolves the fundamental flaws in current ITAM and SAM implementations.

      In 2016, he founded Boerger Consulting, LLC to help business leaders and decision makers fully realize the promises a properly functioning ITAM can deliver. In his off time, you will find him in Cincinnati, Ohio, with his wife and family.

      Mike Austin
      Founder and CEO
      MetrixData 360

      Mike Austin leads the delivery team at MetrixData 360. Mike brings more than 15 years of Microsoft licensing experience to his clients’ projects. He assists companies, from Fortune 500 to organizations with as few as 500 employees, with negotiations of Microsoft Enterprise Agreements (EA), Premier Support Contracts, and Select Agreements. In addition to helping negotiate contracts, he helps clients build and implement software asset management processes.

      Previously, Mike was employed by Microsoft for more than 8 years as a member of the global sales team. With Microsoft, Mike successfully negotiated more than a billion dollars in new and renewal EAs. Mike has also negotiated legal terms and conditions for all software agreements, developed Microsoft’s best practices for global account management, and was awarded Microsoft’s Gold Star Award in 2003 and Circle of Excellence in 2008 for his contributions.

      Bibliography

      “Asset Management.” SFIA v8. Accessed 17 March 2022.

      Boerger, Jeremy. Rethinking IT Asset Management. Business Expert Press, 2021.

      Canavan, Rory. “C-Suite Cheat Sheet.” SAM Charter, 2021. Accessed 17 March 2022.

      Fisher, Matt. “Metrics to Measure SAM Success.” Snow Software, 26 May 2015. Accessed 17 March 2022.

      Flexera (2021). “State of ITAM Report.” Flexera, 2021. Accessed 17 March 2022.

      Fowler, Kylie. “ITAM by design.” BCS, The Chartered Institute for IT, 2017. Accessed 17 March 2022.

      Fowler, Kylie. “Ch-ch-ch-changes… Is It Time for an ITAM Transformation?” ITAM Intelligence, 2021. Web. Accessed 17 March 2022.

      Fowler, Kylie. “Do you really need an ITAM policy?” ITAM Accelerate, 15 Oct. 2021. Accessed 17 March 2022.

      Hayes, Chris. “How to establish a successful, long-term ITAM program.” Anglepoint, Sept. 2021. Accessed 17 March 2022.

      ISO/IEC 19770-1-2017. IT Asset Management Systems – Requirements. Third edition. ISO, Dec 2017.

      Joret, Stephane. “IT Asset Management: ITIL® 4 Practice Guide”. Axelos, 2020.

      Jouravlev, Roman. “IT Service Financial Management: ITIL® 4 Practice Guide”. Axelos, 2020.

      Pagnozzi, Maurice, Edwin Davis, Sam Raco. “ITAM Vs. ITSM: Why They Should Be Separate.” KPMG, 2020. Accessed 17 March 2022.

      Rumelt, Richard. Good Strategy, Bad Strategy. Profile Books, 2013.

      Stone, Michael et al. “NIST SP 1800-5 IT Asset Management.” Sept, 2018. Accessed 17 March 2022.

      Adopt Generative AI in Solution Delivery

      • Buy Link or Shortcode: {j2store}146|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Delivery teams are under continuous pressure to deliver high value and quality solutions with limited capacity in complex business and technical environments. Common challenges experienced by these teams include:
        • Attracting and retaining talent
        • Maximizing the return on technology
        • Confidently shifting to digital
        • Addressing competing priorities
        • Fostering a collaborative culture
        • Creating high-throughput teams
      • Gen AI offers a unique opportunity to address many of these challenges.

      Our Advice

      Critical Insight

      • Your stakeholders' understanding of Gen AI, its value, and its application can be driven by hype and misinterpretation. This confusion can lead to unrealistic expectations and set the wrong precedent for the role Gen AI is intended to play.
      • Your SDLC is not well documented and is often executed inconsistently. An immature practice will not yield the benefits stakeholders expect.
      • The Gen AI marketplace is broad and diverse. Selecting the appropriate tools and partners is confusing and overwhelming.
      • There is a skills gap for what is needed to configure, adopt, and operate Gen AI.

      Impact and Result

      • Ground your Gen AI expectations. Set realistic and achievable goals centered on driving business value and efficiency across the entire SDLC by enabling Gen AI in key tasks and activities. Propose the SDLC as the ideal pilot for Gen AI.
      • Select the right Gen AI opportunities. Discuss how proven Gen AI capabilities can be applied to your solution delivery practice to achieve the outcomes and priorities stakeholders expect. Lessons learned sow the foundation for future Gen AI scaling.
      • Assess your Gen AI readiness in your solution delivery teams. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of Gen AI.

      Adopt Generative AI in Solution Delivery Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Adopt Generative AI in Solution Delivery Storyboard – A step-by-step guide that helps you assess whether Gen AI is right for your solution delivery practices.

      Gain an understanding of the potential opportunities that Gen AI can provide your solution delivery practices and answer the question "What should I do next?"

      • Adopt Generative AI in Solution Delivery Storyboard

      2. Gen AI Solution Delivery Readiness Assessment Tool – A tool to help you understand if your solution delivery practice is ready for Gen AI.

      Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether or not the team is ready to adopt Gen AI practices.

      • Gen AI Solution Delivery Readiness Assessment Tool
      [infographic]

      Further reading

      Adopt Generative AI in Solution Delivery

      Drive solution quality and team productivity with the right generative AI capabilities.

      Analyst Perspective

      Build the case for Gen AI with the right opportunities.

      Generative AI (Gen AI) presents unique opportunities to address many solution delivery challenges. Code generation can increase productivity, synthetic data generation can produce usable test data, and scanning tools can identify issues before they occur. To be successful, teams must be prepared to embrace the changes that Gen AI brings. Stakeholders must also give teams the opportunity to optimize their own processes and gauge the fit of Gen AI.

      Start small with the intent to learn. The right pilot initiative helps you learn the new technology and how it benefits your team without the headache of complex setups and lengthy training and onboarding. Look at your existing solution delivery tools to see what Gen AI capabilities are available and prioritize the use cases where Gen AI can be used out of the box.

      This is a picture of Andrew Kum-Seun

      Andrew Kum-Seun
      Research Director,
      Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Delivery teams are under continuous pressure to deliver high-value, high-quality solutions with limited capacity in complex business and technical environments. Common challenges experienced by these teams include:

      • Attracting and retaining talent
      • Maximizing the return on technology
      • Confidently shifting to digital
      • Addressing competing priorities
      • Fostering a collaborative culture
      • Creating high-throughput teams

      Generative AI (Gen AI) offers a unique opportunity to address many of these challenges.

      Common Obstacles

      • Your stakeholders' understanding of what is Gen AI, its value and its application, can be driven by hype and misinterpretation. This confusion can lead to unrealistic expectations and set the wrong precedent for the role Gen AI is intended to play.
      • Your solution delivery process is not well documented and is often executed inconsistently. An immature practice will not yield the benefits stakeholders expect.
      • The Gen AI marketplace is very broad and diverse. Selecting the appropriate tools and partners is confusing and overwhelming.
      • There is a skills gap for what is needed to configure, adopt, and operate Gen AI.

      Info-Tech's Approach

      • Ground your Gen AI expectations. Set realistic and achievable goals centered on driving business value and efficiency across the entire solution delivery process by enabling Gen AI in key tasks and activities. Propose this process as the ideal pilot for Gen AI.
      • Select the right Gen AI opportunities. Discuss how proven Gen AI capabilities can be applied to your solution delivery practice and achieve the outcomes and priorities stakeholders expect. Lessons learned sow the foundation for future Gen AI scaling.
      • Assess your Gen AI readiness in your solution delivery teams. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of Gen AI.

      Info-Tech Insight

      Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

      Insight Summary

      Overarching Info-Tech Insight

      Position Gen AI is a tooling opportunity to enhance the productivity and depth of your solution delivery practice. However, current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

      Understand and optimize first, automate with Gen AI later.
      Gen AI magnifies solution delivery inefficiencies and constraints. Adopt a user-centric perspective to understand your solution delivery teams' interactions with solution delivery tools and technologies to better replicate how they complete their tasks and overcome challenges.

      Enable before buy. Buy before build.
      Your solution delivery vendors see AI as a strategic priority in their product and service offering. Look into your existing toolset and see if you already have the capabilities. Otherwise, prioritize using off-the-shelf solutions with pre-trained Gen AI capabilities and templates.

      Innovate but don't experiment.
      Do not reinvent the wheel and lower your risk of success. Stick to the proven use cases to understand the value and fit of Gen AI tools and how your teams can transform the way they work. Use your lessons learned to discover scaling opportunities.

      Blueprint benefits

      IT benefits

      Business benefits

      • Select the Gen AI tools and capabilities that meet both the solution delivery practice and team goals, such as:
      • Improved team productivity and throughput.
      • Increased solution quality and value.
      • Greater team satisfaction.
      • Motivate stakeholder buy-in for the investment in solution delivery practice improvements.
      • Validate the fit and opportunities with Gen AI for future adoption in other IT departments.
      • Increase IT satisfaction by improving the throughput and speed of solution delivery.
      • Reduce the delivery and operational costs of enterprise products and services.
      • Use a pilot to demonstrate the fit and value of Gen AI capabilities and supporting practices across business and IT units.

      What is Gen AI?

      An image showing where Gen AI sits within the artificial intelligence.  It consists of four concentric circles.  They are labeled from outer-to-inner circle in the following order: Artificial Intelligence; Machine Learning; Deep Learning; Gen AI

      Generative AI (Gen AI)
      A form of ML whereby, in response to prompts, a Gen AI platform can generate new output based on the data it has been trained on. Depending on its foundational model, a Gen AI platform will provide different modalities and use case applications.

      Machine Learning (ML)
      The AI system is instructed to search for patterns in a data set and then make predictions based on that set. In this way, the system learns to provide accurate content over time. This requires a supervised intervention if the data is inaccurate. Deep learning is self-supervised and does not require intervention.

      Artificial Intelligence (AI)
      A field of computer science that focuses on building systems to imitate human behavior. Not all AI systems have learning behavior; many systems (such as customer service chatbots) operate on preset rules.

      Info-Tech Insight

      Many vendors have jumped on Gen AI as the latest marketing buzzword. When vendors claim to offer Gen AI functionality, pin down what exactly is generative about it. The solution must be able to induce new outputs from inputted data via self-supervision – not trained to produce certain outputs based on certain inputs.

      Augment your solution delivery teams with Gen AI

      Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery; assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

      Solution Delivery Team

      Humans

      Gen AI Bots

      Product owner and decision maker
      Is accountable for the promised delivery of value to the organization.

      Business analyst and architect
      Articulates the requirements and aligns the team to the business and technical needs.

      Integrator and builder
      Implements the required solution.

      Collaborator
      Consults and supports the delivery.

      Administrator
      Performs common administrative tasks to ensure smooth running of the delivery toolchain and end-solutions.

      Designer and content creator
      Provides design and content support for common scenarios and approaches.

      Paired developer and tester
      Acts as a foil for existing developer or tester to ensure high quality output.

      System monitor and support
      Monitors and recommends remediation steps for operational issues that occur.

      Research deliverable

      This research is accompanied by a supporting deliverable to help you accomplish your goals.

      Gen AI Solution Delivery Readiness Assessment Tool

      Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether the team is ready to adopt Gen AI practices.

      This is a series of three screenshots from the Gen AI Solution Delivery Readiness Assessment Tool

      Step 1.1

      Set the context

      Activities

      1.1.1 Understand the challenges of your solution delivery teams.

      1.1.2 Outline the value you expect to gain from Gen AI.

      This step involves the following participants:

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Outcomes of this step

      • SWOT Analysis to help articulate the challenges facing your teams.
      • A Gen AI Canvas that will articulate the value you expect to gain.

      IT struggles to deliver solutions effectively

      • Lack of skills and resources
        Forty-six percent of respondents stated that it was very or somewhat difficult to attract, hire, and retain developers (GitLab, 2023; N=5,010).
      • Delayed software delivery
        Code development (37%), monitoring/observability (30%), deploying to non-production environments (30%), and testing (28%) were the top areas where software delivery teams or organizations encountered the most delays (GitLab, 2023, N=5,010).
      • Low solution quality and satisfaction
        Only 64% of applications were identified as effective by end users. Effective applications are identified as at least highly important and have high feature and usability satisfaction (Application Portfolio Assessment, August 2021 to July 2022; N=315).
      • Burnt out teams
        While workplace flexibility comes with many benefits, longer work hours jeopardize wellbeing. Sixty-two percent of organizations reported increased working hours, while 80% reported an increase in flexibility ("2022 HR Trends Report," McLean & Company, 2022; N=394) .

      Creating high-throughput teams is an organizational priority.

      CXOs ranked "optimize IT service delivery" as the second highest priority. "Achieve IT business" was ranked first.

      (CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568)

      1.1.1 Understand the challenges of your solution delivery teams

      1-3 hours

      1. Complete a SWOT analysis of your solution delivery team to discover areas where Gen AI can be applied.
      2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Strengths

      Internal characteristics that are favorable as they relate to solution delivery

      Weaknesses

      Internal characteristics that are unfavorable or need improvement

      Opportunities

      External characteristics that you may use to your advantage

      Threats

      External characteristics that may be potential sources of failure or risk

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      Output

      • SWOT analysis of current state of solution delivery practice

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Gen AI can help solve your solution delivery challenges

      Why is software delivery an ideal pilot candidate for Gen AI?

      • Many software delivery practices are repeatable and standardized.
      • Software delivery roles that are using and implementing Gen AI are technically savvy.
      • Automation is a staple in many commonly used tools.
      • Change will likely not impact business operations.

      Improved productivity

      Gen AI jumpstarts the most laborious and mundane parts of software delivery. Delivery teams saved 22 hours (avg) per software use case when using AI in 2022, compared to last year when AI was not used ("Generative AI Speeds Up Software Development," PRNewswire, 2023).

      Fungible resources

      Teams are transferrable across different frameworks, platforms, and products. Gen AI provides the structure and guidance needed to work across a wider range of projects ("Game changer: The startling power generative AI is bringing to software development," KPMG, 2023).

      Improved solution quality

      Solution delivery artifacts (e.g. code) are automatically scanned to quickly identify bugs and defects based on recent activities and trends and validate against current system performance and capacity.

      Business empowerment

      AI enhances the application functionalities workers can build with low- and no-code platforms. In fact, "AI high performers are 1.6 times more likely than other organizations to engage non-technical employees in creating AI applications" ("The state of AI in 2022 — and a half decade in review." McKinsey, 2022, N=1,492).

      However, various fears, uncertainties, and doubts challenge Gen AI adoption

      Black Box

      Little transparency is provided on the tool's rationale behind content creation, decision making, and the use and storage of training data, creating risks for legal, security, intellectual property, and other areas.

      Role Replacement

      Some workers have job security concerns despite Gen AI being bound to their rule-based logic framework, the quality of their training data, and patterns of consistent behavior.

      Skills Gaps

      Teams need to gain expertise in AI/ML techniques, training data preparation, and continuous tooling improvements to support effective Gen AI adoption across the delivery practice and ensure reliable operations.

      Data Inaccuracy

      Significant good quality data is needed to build trust in the applicability and reliability of Gen AI recommendations and outputs. Teams must be able to combine Gen AI insights with human judgment to generate the right outcome.

      Slow Delivery of AI Solution

      Timelines are sensitive to organizational maturity, experience with Gen AI, and investments in good data management practices. 65% of organizations said it took more than three months to deploy an enterprise-ready AIOps solution (OpsRamp, 2022).

      Define the value you want Gen AI to deliver

      Well-optimized Gen AI instills stakeholder confidence in ongoing business value delivery and ensures stakeholder buy-in, provided proper expectations are set and met. However, business value is not interpreted or prioritized the same across the organization. Come to a common business value definition to drive change in the right direction by balancing the needs of the individual, team, and organization.

      Business value cannot always be represented by revenue or reduced expenses. Dissecting value by the benefit type and the value source's orientation allows you to see the many ways in which Gen AI brings value to the organization.

      Financial benefits vs. intrinsic needs

      • Financial benefits refers to the degree to which the value source can be measured through monetary metrics, such as revenue generation and cost saving.
      • Intrinsic needs refers to how a product, service, or business capability enhanced with Gen AI meets functional, user experience, and existential needs.

      Inward vs. outward orientation

      • Inward refers to value sources that are internally impacted by Gen AI and improve your employees' and teams' effectiveness in performing their responsibilities.
      • Outward refers to value sources that come from your interaction with external stakeholders and customers and were improved from using Gen AI.

      See our Build a Value Measurement Framework blueprint for more information about business value definition.

      An image of the Business Value Matrix for Gen AI

      Measure success with the right metrics

      Establishing and monitoring metrics are powerful ways to drive behavior and strategic changes in your organization. Determine the right measures that demonstrate the value of your Gen AI implementation by aligning them with your Gen AI objectives, business value drivers, and non-functional requirements.

      Select metrics with different views

      1. Solution delivery practice effectiveness
        The ability of your practice to deliver, support, and operate solutions with Gen AI
        Examples: Solution quality and throughput, delivery and operational costs, number of defects and issues, and system quality
      2. Solution quality and value
        The outcome of your solutions delivered with Gen AI tools
        Examples: Time and money saved, utilization of products and services, speed of process execution, number of errors, and compliance with standards
      3. Gen AI journey goals and milestones
        Your organization's position in your Gen AI journey
        Examples: Maturity score, scope of Gen AI adoption, comfort and
        confidence with Gen AI capabilities, and complexity of Gen AI use cases

      Leverage Info-Tech's Diagnostics

      IT Management & Governance

      • Improvement to application development quality and throughput effectiveness
      • Increased importance of application delivery and maintenance capabilities across the IT organization
      • Delegation of delivery accountability across more IT roles

      CIO Business Vision

      • Improvements to IT satisfaction and value from delivered solutions
      • Changes to the value and importance of IT core services enabled with Gen AI
      • The state of business and IT relationships
      • Capability to deliver and support Gen AI effectively

      1.1.2 Outline the value you expect to gain from Gen AI

      1-3 hours

      1. Complete the following fields to build your Gen AI canvas:
        1. Problem that Gen AI is intending to solve
        2. List of stakeholders
        3. Desired business and IT outcomes
        4. In-scope solution delivery teams, systems, and capabilities.
      2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Output

      • Gen AI Canvas

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      1.1.2 Example

      Example of an outline of the value you expect to gain from Gen AI

      Problem statements

      • Manual testing procedures hinder pace and quality of delivery.
      • Inaccurate requirement documentation leads to constant redesigning.

      Business and IT outcomes

      • Improve code quality and performance.
      • Expedite solution delivery cycle.
      • Improve collaboration between teams and reduce friction.

      List of stakeholders

      • Testing team
      • Application director
      • CIO
      • Design team
      • Project manager
      • Business analysts

      In-scope solution delivery teams, system, and capabilities

      • Web
      • Development
      • App development
      • Testing
      • Quality assurance
      • Business analysts
      • UI/UX design

      Align your objectives to the broader AI strategy

      Why is an organizational AI strategy important for Gen AI?

      • All Gen AI tactics and capabilities are designed, delivered, and managed to support a consistent interpretation of the broader AI vision and goals.
      • An organizational strategy gives clear understanding of the sprawl, criticality, and risks of Gen AI solutions and applications to other IT capabilities dependent on AI.
      • Gen AI initiatives are planned, prioritized, and coordinated alongside other software delivery practice optimizations and technology modernization initiatives.
      • Resources, skills, and capacities are strategically allocated to meet the needs of Gen AI considering other commitments in the software delivery optimization backlog and roadmap.
      • Gen AI expectations and practices uphold the persona, values, and principles of the software delivery team.

      What is an AI strategy?

      An AI strategy details the direction, activities, and tactics to deliver on the promise of your AI portfolio. It often includes:

      • AI vision and goals
      • Application, automation, and process portfolio involved or impacted by AI
      • Values and principles
      • Health of your AI portfolio
      • Risks and constraints
      • Strategic roadmap

      Step 1.2

      Evaluate opportunities for Gen AI

      Activities

      1.2.1 Align Gen AI opportunities with teams and capabilities.

      This step involves the following participants:

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Outcomes of this step

      • Understand the Gen AI opportunities for your solution delivery practice.

      Learn how Gen AI is employed in solution delivery

      Gen AI opportunity Common Gen AI tools and vendors Teams than can benefit How can teams leverage this? Case study
      Synthetic data generation
      • Testing
      • Data Analysts
      • Privacy and Security
      • Create test datasets
      • Replace sensitive personal data

      How Unity Leverages Synthetic Data

      Code generation
      • Development
      • Testing
      • Code Templates & Boilerplate
      • Code Refactoring

      How CI&T accelerated development by 11%

      Defect forecasting and debugging
      • Project Manager & Quality Assurance
      • Development
      • Testing
      • Identify root cause
      • Static and dynamic code analysis
      • Debugging assistance

      Altran Uses Microsoft Code Defect AI Solution

      Requirements documentation and elicitation
      • Business Analysts
      • Development
      • Document functional requirements
      • Writing test cases

      Google collaborates with Replit to reduce time to bring new products to market by 30%

      UI design and prototyping
      • UI/UX Design
      • Development
      • Deployment
      • Rapid prototyping
      • Design assistance

      How Spotify is Upleveling Their Entire Design Team

      Other common AI opportunities solutions include test case generation, code translation, use case creation, document generation, and automated testing.

      Opportunity 1: Synthetic data generation

      Create artificial data that mimics the structure of real-life data.

      What are the expected benefits?

      • Availability of test data: Creation of large volumes of data compatible for testing multiple systems within the organization.
      • Improved privacy: Substituting real data with artificial leads to reduced data leaks.
      • Quicker data provisioning: Automated generation of workable datasets aligned to company policies.

      What are the notable risks and challenges?

      • Generalization and misrepresentations: Data models used in synthetic data generation may not be an accurate representation of production data because of potentially conflicting definitions, omission of dependencies, and multiple sources of truth.
      • Lack of accurate representation: It is difficult for synthetic data to fully capture real-world data nuances.
      • Legal complexities: Data to build and train the Gen AI tool does not comply with data residency and management standards and regulations.

      How should teams prepare for synthetic data generation?

      It can be used:

      • To train machine learning models when there is not enough real data, or the existing data does not meet specific needs.
      • To improve quality of test by using data that closely resembles production without the risk of leveraging sensitive and private information.

      "We can simply say that the total addressable market of synthetic data and the total addressable market of data will converge,"
      Ofir Zuk, CEO, Datagen (Forbes, 2022)

      Opportunity 2: Code generation

      Learn patterns and automatically generate code.

      What are the expected benefits?

      • Increased productivity: It allows developers to generate more code quickly.
      • Improved code consistency: Code is generated using a standardized model and lessons learnt from successful projects.
      • Rapid prototyping: Expedite development of a working prototype to be verified and validated.

      What are the notable risks and challenges?

      • Limited contextual understanding: AI may lack domain-specific knowledge or understanding of requirements.
      • Dependency: Overreliance on AI generated codes can affect developers' creativity.
      • Quality concerns: Generated code is untested and its alignment to coding and quality standards is unclear.

      How should teams prepare for code generation?

      It can be used to:

      • Build solutions without the technical expertise of traditional development.
      • Discover different solutions to address coding challenges.
      • Kickstart new development projects with prebuilt code.

      According to a survey conducted by Microsoft's GitHub, a staggering 92% of programmers were reported as using AI tools in their workflow (GitHub, 2023).

      Opportunity 3: Defect forecasting & debugging

      Predict and proactively address defects before they occur.

      What are the expected benefits?

      • Reduced maintenance cost: Find defects earlier in the delivery process, when it's cheaper to fix them.
      • Increased efficiency: Testing efforts can remain focused on critical and complex areas of solution.
      • Reduced risk: Find critical defects before the product is deployed to production.

      What are the notable risks and challenges?

      • False positives and negatives: Incorrect interpretation and scope of defect due to inadequate training of the Gen AI model.
      • Inadequate training: Training data does not reflect the complexity of the solutions code.
      • Not incorporating feedback: Gen AI models are not retrained in concert with solution changes.

      How should teams prepare for defect forecasting and debugging?

      It can be used to:

      • Perform static and dynamic code analysis to find vulnerabilities in the solution source code.
      • Forecast potential issues of a solution based on previous projects and industry trends.
      • Find root cause and suggest solutions to address found defects.

      Using AI technologies, developers can reduce the time taken to debug and test code by up to 70%, allowing them to finish projects faster and with greater accuracy (Aloa, 2023).

      Opportunity 4: Requirements documentation & elicitation

      Capturing, documenting, and analyzing function and nonfunctional requirements.

      What are the expected benefits?

      • Improve quality of requirements: Obtain different perspectives and contexts for the problem at hand and help identify ambiguities and misinterpretation of risks and stakeholder expectation.
      • Increased savings: Fewer resources are consumed in requirements elicitation activities.
      • Increased delivery confidence: Provide sufficient information for the solution delivery team to confidently estimate and commit to the delivery of the requirement.

      What are the notable risks and challenges?

      • Conflicting bias: Gen AI models may interpret the problem differently than how the stakeholders perceive it.
      • Organization-specific interpretation: Inability of the Gen AI models to accommodate unique interpretation of terminologies, standards, trends and scenarios.
      • Validation and review: Interpreting extracted insights requires human validation.

      How should teams prepare for requirements documentation & elicitation?

      It can be used to:

      • Document requirements in a clear and concise manner that is usable to the solution delivery team.
      • Analyze and test requirements against various user, business, and technical scenarios.

      91% of top businesses surveyed report having an ongoing investment in AI (NewVantage Partners, 2021).

      Opportunity 5: UI design and prototyping

      Analyze existing patterns and principles to generate design, layouts, and working solutions.

      What are the expected benefits?

      • Increased experimentation: Explore different approaches and tactics to solve a solution delivery problem.
      • Improved collaboration: Provide quick design layouts that can be reshaped based on stakeholder feedback.
      • Ensure design consistency: Enforce a UI/UX design standard for all solutions.

      What are the notable risks and challenges?

      • Misinterpretation of UX Requirements: Gen AI model incorrectly assumes a specific interpretation of user needs, behaviors, and problem.
      • Incorrect or missing requirements: Lead to extensive redesigns and iterations, adding to costs while hampering user experience.
      • Design creativity: May lack originality and specific brand aesthetics if not augmented well with human customizability and creativity.

      How should teams prepare for UI design and prototyping?

      It can be used to:

      • Visualize the solution through different views and perspectives such as process flows and use-case diagrams.
      • Create working prototypes that can be verified and validated by stakeholders and end users.

      A study by McKinsey & Company found that companies that invest in AI-driven design outperform their peers in revenue growth and customer experience metrics. They were found to achieve up to two times higher revenue growth than industry peers and up to 10% higher net promoter score (McKinsey & Company, 2018).

      Determine the importance of your opportunities by answering these questions

      Realizing the complete potential of Gen AI relies on effectively fostering its adoption and resulting changes throughout the entire solution delivery process.

      What are the challenges faced by your delivery teams that could be addressed by Gen AI?

      • Recognize the precise pain points, bottlenecks, or inefficiencies faced by delivery teams.
      • Include all stakeholders' perspectives during problem discovery and root cause analysis.

      What's holding back Gen AI adoption in the organization?

      • Apart from technical barriers, address cultural and organizational challenges and discuss how organizational change management strategies can mitigate Gen AI adoption risk.

      Are your objectives aligned with Gen AI capabilities?

      • Identify areas where processes can be modernized and streamlined with automation.
      • Evaluate the current capabilities and resources available within the organization to leverage Gen AI technologies effectively.

      How can Gen AI improve the entire solution delivery process?

      • Investigate and evaluate the improvements Gen AI can reasonably deliver, such as increased accuracy, quickened delivery cycles, improved code quality, or enhanced cross-functional collaboration.

      1.2.1 Align Gen AI opportunities to teams and capabilities

      1-3 hours

      1. Associate the Gen AI opportunities that can be linked to your system capabilities. These opportunities refer to the potential applications of generative AI techniques, such as code generation or synthetic data, to address specific challenges.
        1. Start by analyzing your system's requirements, constraints, and areas where Gen AI techniques can bring value. Identify the potential benefits of integrating Gen AI, such as increased productivity, or enhanced creativity.
        2. Next, discern potential risks or challenges, such as dependency or quality concerns, associated with the opportunity implementation.
      2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Output

      • Gen AI opportunity selection

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      Keep an eye out for red flags

      Not all Gen AI opportunities are delivered and adopted the same. Some present a bigger risk than others.

      • Establishing vague targets and success criteria
      • Defining Gen AI as substitution of human capital
      • Open-source software not widely adopted or validated
      • High level of dependency on automation
      • Unadaptable cross-functional training across organization
      • Overlooking privacy, security, legal, and ethical implications
      • Lack of Gen AI expertise and understanding of good practices

      Step 1.3

      Assess your readiness for Gen AI

      Activities

      1.3.1 Assess your readiness for Gen AI.

      This step involves the following participants:

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Outcomes of this step

      • A completed Gen AI Readiness Assessment to confirm how prepared you are to embrace Gen AI in your solution delivery team.

      Prepare your SDLC* to leverage Gen AI

      As organizations evolve and adopt more tools and technology, their solution delivery processes become more complex. Process improvement is needed to simplify complex and undocumented software delivery activities and artifacts and prepare it for Gen AI. Gen AI scales process throughput and output quantity, but it multiplies the negative impact of problems the process already has.

      When is your process ready for Gen AI?

      • Solution value Ensures the accuracy and alignment of the committed feature and change requests to what the stakeholder truly expects and receives.
      • ThroughputDelivers new products, enhancements, and changes at a pace and frequency satisfactory to stakeholder expectations and meets delivery commitments.
      • Process governance Has clear ownership and appropriate standardization. The roles, activities, tasks, and technologies are documented and defined. At each stage of the process someone is responsible and accountable.
      • Process management Follows a set of development frameworks, good practices, and standards to ensure the solution and relevant artifacts are built, tested, and delivered consistently and repeatably.
      • Technical quality assurance – Accommodates committed non-functional requirements within the stage's outputs to ensure products meet technical excellence expectations.

      *software development lifecycle

      To learn more, visit Info-Tech's Modernize Your SDLC blueprint.

      To learn more, visit Info-Tech's Build a Winning Business Process Automation Playbook

      Assess the impacts from Gen AI changes

      Ensure that no stone is left unturned as you evaluate the fit of Gen AI and prepare your adoption and support plans.

      By shining a light on considerations that might have otherwise escaped planners and decision makers, an impact analysis is an essential component to Gen AI success. This analysis should answer the following questions on the impact to your solution delivery teams.

      1. Will the change impact how our clients/customers receive, consume, or engage with our products/services?
      2. Will there be an increase in operational costs, and a change to compensation and/or rewards?
      3. Will this change increase the workload and alter staffing levels?
      4. Will the vision or mission of the team change?
      5. Will a new or different set of skills be needed?
      6. Will the change span multiple locations/time zones?
      7. Are multiple products/services impacted by this change?
      8. Will the workflow and approvals be changed, and will there be a substantial change to scheduling and logistics?
      9. Will the tools of the team be substantially different?
      10. Will there be a change in reporting relationships?

      See our Master Organizational Change Management Practices blueprint for more information.

      Brace for impact

      A thorough analysis of change impacts will help your software delivery teams and change leaders:

      • Bypass avoidable problems.
      • Remove non-fixed barriers to success.
      • Acknowledge and minimize the impact of unavoidable barriers.
      • Identify and leverage potential benefits.
      • Measure the success of the change.

      Many key IT capabilities are required to successfully leverage Gen AI

      Portfolio Management

      An accurate and rationalized inventory of all Gen AI tools verifies they support the goals and abide to the usage policies of the broader delivery practice. This becomes critical when tooling is updated frequently and licenses and open- source community principles drastically change (e.g. after an acquisition).

      Quality Assurance

      Gen AI tools are routinely verified and validated to ensure outcomes are accurate, complete, and aligned to solution delivery quality standards. Models are retrained using lessons learned, new use cases, and updated training data.

      Security & Access Management

      Externally developed and trained Gen AI models may not include the measures, controls, and tactics you need to prevent vulnerabilities and protect against threats that are critical in your security frameworks, policies, and standards.

      Data Management & Governance

      All solution delivery data and artifacts can be transformed and consumed in various ways as they transit through solution delivery and Gen AI tools. Data integrations, structures, and definitions must be well-defined, governed, and monitored.

      OPERATIONAL SUPPORT

      Resources are available to support the ongoing operations of the Gen AI tool, including infrastructure, preparing training data, and managing integration with other tools. They are also prepared to recover backups, roll back, and execute recovery plans at a moment's notice.

      Apply Gen AI good practices in your solution delivery practice

      1. Keep the human in the loop.
        Gen AI models cannot produce high-quality content with 100% confidence. Keeping the human in the loop allows people to directly give feedback to the model to improve output quality.
      2. Strengthen prompt and query engineering.
        The value of the outcome is dependent on what is being asked. Good prompts and queries focus on creating the optimal input by selecting and phrasing the appropriate words, sentence structures, and punctuation to illustrate the focus, scope, problem, and boundaries.
      3. Thoughtfully prepare your training data.
        Externally hosted Gen AI tools may store your training data in their systems or use it to train their other models. Intellectual property and sensitive data can leak into third-party systems and AI models if it is not properly masked and sanitized.
      4. Build guardrails into your Gen AI models.
        Guardrails can limit the variability of any misleading Gen AI responses by defining the scope and bounds of the response, enforcing the policies of its use, and clarifying the context of its response.
      5. Monitor your operational costs.
        The cost breakdown will vary among the types of Gen AI solution and the vendor offerings. Cost per query, consultant fees, infrastructure hosting, and licensing costs are just a few cost factors. Open source can be an attractive cost-saving option, but you must be willing to invest in the roles to assume traditional vendor accountabilities.
      6. Check the licenses of your Gen AI tool.
        Each platform has licenses and agreements on how their solution can or cannot be used. They limit your ability to use the tool for commercial purposes or reproductions or may require you to purchase and maintain a specific license to use their solution and materials.

      See Build Your Generative AI Roadmap for more information.

      Assess your Gen AI readiness

      • Solution delivery team
        The team is educated on Gen AI, its use cases, and the tools that enable it. They have the skills and capacity to implement, create, and manage Gen AI.
      • Solution delivery process and tools
        The solution delivery process is documented, repeatable, and optimized to use Gen AI effectively. Delivery tools are configured to enable, leverage and manage Gen AI assets to improve their performance and efficiency.
      • Solution delivery artifacts
        Delivery artifacts (e.g. code, scripts, documents) that will be used to train and be leveraged by Gen AI tools are discoverable, accurate, complete, standardized, of sufficient quantity, optimized for Gen AI use, and stored in an accessible shared central repository.
      • Governance
        Defined policies, role definitions, guidelines, and processes that guide the implementation, development, operations, and management of Gen AI.
      • Vision and executive support
        Clear alignment of Gen AI direction, ambition, and objectives with broader business and IT priorities. Stakeholders support the Gen AI initiative and allocate human and financial resources for its implementation within the solution delivery team.
      • Operational support
        The capabilities to manage the Gen AI tools and ensure they support the growing needs of the solution delivery practice, such as security management, hosting infrastructure, risk and change management, and data and application integration.

      1.3.1 Assess your readiness for Gen AI

      1-3 hours

      1. Review the current state of your solution delivery teams including their capacity, skills and knowledge, delivery practices, and tools and technologies.
      2. Determine the readiness of your team to adopt Gen AI.
      3. Discuss the gaps that need to be filled to be successful with Gen AI.
      4. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      Output

      • Gen AI Solution Delivery Readiness Assessment

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Recognize that Gen AI does not require a fully optimized solution delivery process

      1. Consideration; 2. Exploration; 3. Incorporation; 4. Proliferation; 5. Optimization.  Steps 3-5 are Recommended maturity levels to properly embrace Gen AI.

      To learn more, visit Info-Tech's Develop Your Value-First Business Process Automation (BPA) Strategy.

      Be prepared to take the next steps

      Deliver Gen AI to your solution delivery teams

      Modernize Your SDLC
      Efficient and effective SDLC practices are vital, as products need to readily adjust to evolving and changing business needs and technologies.

      Adopt Generative AI in Solution Delivery
      Generative AI can drive productivity and solution quality gains to your solution delivery teams. Level set expectations with the right use case to demonstrate its value potential.

      Select Your AI Vendor & Implementation Partner
      The right vendor and partner are critical for success. Build the selection criteria to shortlist the products and services that best meets the current and future needs of your teams.

      Drive Business Value With Off-the-Shelf AI
      Build a framework that will guide your teams through the selection of an off-the-shelf AI tool with a clear definition of the business case and preparations for successful adoption.

      Build Your Enterprise Application Implementation Playbook
      Your Gen AI implementation doesn't start with technology, but with an effective plan that your team supports and is aligned to broader stakeholder and sponsor priorities and goals.

      Build your Gen AI practice

      • Get Started With AI
      • AI Strategy & Generative AI Roadmap
      • AI Governance

      Related Info-Tech Research

      Build a Winning Business Process Automation Playbook
      Optimize and automate your business processes with a user-centric approach.

      Embrace Business Managed Applications
      Empower the business to implement their own applications with a trusted business-IT relationship.

      Application Portfolio Management Foundations
      Ensure your application portfolio delivers the best possible return on investment.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence
      Optimize your organization's enterprise application capabilities with a refined and scalable methodology.

      Create an Architecture for AI
      Build your target state architecture from predefined best-practice building blocks.

      Deliver on Your Digital Product Vision
      Build a product vision your organization can take from strategy through execution.

      Enhance Your Solution Architecture Practices
      Ensure your software systems solution is architected to reflect stakeholders' short- and long-term needs.

      Apply Design Thinking to Build Empathy With the Business
      Use design thinking and journey mapping to make IT the business' go-to problem solver.

      Modernize Your SDLC
      Deliver quality software faster with new tools and practices.

      Drive Business Value With Off-the-Shelf AI
      A practical guide to ensure return on your off-the-shelf AI investment.

      Bibliography

      "Altran Helps Developers Write Better Code Faster with Azure AI." Microsoft, 2020.
      "Apply Design Thinking to Complex Teams, Problems, and Organizations." IBM, 2021.
      Bianca. "Unleashing the Power of AI in Code Generation: 10 Applications You Need to Know — AITechTrend." AITechTrend, 16 May 2023.
      Biggs, John. "Deep Code Cleans Your Code with the Power of AI." TechCrunch, 26 Apr 2018.
      "Chat GPT as a Tool for Business Analysis — the Brazilian BA." The Brazilian BA, 24 Jan 2023.
      Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2019." New Vantage Partners, 2019.
      Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2021." New Vantage Partners, 2021.
      Das, Tamal. "9 Best AI-Powered Code Completion for Productive Development." Geek flare, 5 Apr 2023.
      Gondrezick, Ilya. "Council Post: How AI Can Transform the Software Engineering Process." Forbes, 24 Apr 2020.
      "Generative AI Speeds up Software Development: Compass UOL Study." PR Newswire, 29 Mar 2023.
      "GitLab 2023 Global Develops Report Series." Gitlab, 2023.
      "Game Changer: The Startling Power Generative AI Is Bringing to Software Development." KPMG, 30 Jan 2023.
      "How AI Can Help with Requirements Analysis Tools." TechTarget, 28 July 2020.
      Indra lingam, Ashanta. "How Spotify Is Upleveling Their Entire Design Team." Framer, 2019.
      Ingle, Prathamesh. "Top Artificial Intelligence (AI) Tools That Can Generate Code to Help Programmers." Matchcoat, 1 Jan 2023.
      Kaur, Jagreet . "AI in Requirements Management | Benefits and Its Processes." Xenon Stack, 13 June 2023.
      Lange, Danny. "Game On: How Unity Is Extending the Power of Synthetic Data beyond the Gaming Industry." CIO, 17 Dec 2020.
      Lin, Ying. "10 Artificial Intelligence Statistics You Need to Know in 2020." OBERLO, 17 Mar. 2023.
      Mauran, Cecily. "Whoops, Samsung Workers Accidentally Leaked Trade Secrets via ChatGPT." Mashable, 6 Apr 2023.

      Considerations for a Move to Virtual Desktops

      • Buy Link or Shortcode: {j2store}69|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Strategy
      • Parent Category Link: /end-user-computing-strategy
      • Hybrid work environments, remote from anywhere and any device, and the security concerns that go hand-in-hand with these strategies have accelerated the move to VDI and DaaS.
      • IT departments can encounter many obstacles to VDI and DaaS, many of which will be determined by your business model and other factors, including complicated shared infrastructure, inadequate training or insufficient staff, and security and compliance concerns.
      • If you do not consider how your end user will be impacted, you will run into multiple issues that affect end-user satisfaction, productivity, and adoption.
      • How will you manage and navigate the right solution for your organization?

      Our Advice

      Critical Insight

      • In the world of VDI and DaaS, if you do not get buy-in from the end user, the rate of adoption and the overall success of the implementation will prove difficult to measure. It will be impossible to calculate ROI even as you feel the impact of your TCO.

      Impact and Result

      • The dimensions of end-user experience can be broken down into four distinct categories that will impact not only the end user but also the business: performance, availability, functionality, and security.
      • Picturing your landscape in this framework will help clearly define your considerations when deciding on whether a VDI or DaaS solution is right for your business.

      Considerations for a Move to Virtual Desktops Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations for a Move to Virtual Desktops Storyboard – A guide to the strategic, technical, and support implications that should be considered in support of a move to VDI or DaaS.

      By defining your goals, framing solutions based on end-user workloads, and understanding the pros and cons of various solutions, you can visualize what success looks like for your VDI/DaaS deployment. This includes defining your KPIs by end-user experience, knowing the decision gates for a successful deployment, and defining your hypothesis for value to make your decision more accurate and gain C-suite buy-in.

      • Considerations for a Move to Virtual Desktops Storyboard
      [infographic]

      Further reading

      What strategic, technical, and support implications should be considered in support of a move to VDI or DaaS?

      Executive Summary

      Insight

      End-user experience is your #1 consideration

      Virtual desktop infrastructure (VDI)/desktop as a service (DaaS) users expect their user experience to be at least equal to that provided by a physical PC, and they do not care about the underlying infrastructure. If the experience is less, then IT has failed in the considerations for VDI/ DaaS. In this research we analyze the data that the IT industry tracks but doesn't use or sometimes even look at regarding user experience (UX).

      Identify the gaps in your IT resources that are critical to success

      Understanding the strengths and weaknesses in your in-house technical skills and business requirements will assist you in making the right decision when it comes to VDI or DaaS solutions. In the case of DaaS this will include a managed service provider for small to medium-sized IT teams. Many IT teams lack a seasoned IT project manager who can identify gaps, risks, and weaknesses in the organization's preparedness. Redeploy your IT staff to new roles that impact management and monitoring of UX.

      IT should think about VDI and DaaS solutions

      Ultimately, IT needs to reduce its complexity, increase user satisfaction, reduce management and storage costs, and maintain a secure and effective environment for both the end user and the business. They must also ensure productivity standards throughout the considerations, strategically, tactically, and in support of a move to a VDI or DaaS solution.

      Executive Summary

      Your Challenge

      With the evolution of VDI over the last 15-plus years, there has been a proliferation of solutions, such as Citrix desktop services, VMware Horizon, and in-house hypervisor solutions (e.g. ESX hosts). There has also been a great deal of growth and competition of DaaS and SaaS solutions in the cloud space. Hybrid work environments, remote from anywhere and any device, and the security concerns that go hand-in-hand with these strategies have certainly accelerated the move to VDI and DaaS.

      How will you manage and navigate the right solution for your organization?

      Common Obstacles

      IT departments can encounter many obstacles to VDI and DaaS, many of which will be determined by your business model and other factors, such as:

      • Complicated shared infrastructure such as federated multitenant partners and legacy app servers.
      • Inadequate in-house training or insufficient staff to execute migration or manage post-migration activates such as governance and retention policies.
      • Security, compliance, legal, and data classification concerns. Some security tools cannot be deployed in the cloud, limiting you to an on-premises solution.
      Info-Tech’s Approach

      By defining your end goals, framing solutions based on end-user workloads, and understanding the pros and cons of what solution(s) will meet your needs, you can visualize what success looks like.

      1. Define your KPIs by end-user experience.
      2. Knowing what the decision gates are for a successful VDI/DaaS deployment will prove out your selection process.
      3. Define your hypothesis for value. How you determine value will make your decision more accurate and gain C-suite buy-in.

      Info-Tech Insight

      Every IT organization needs to be asking what success looks like. If you do not consider how your end user will be impacted, whether they are doing something as simple as holding a team meeting with voice and video or working with highly technical workloads on a virtual environment, you will run into multiple issues that affect end-user satisfaction, productivity, and adoption. Understand the tension metrics that may conflict with meeting business objectives and KPIs.

      Voice of the customer

      Client-Driven Insight

      Different industries have different requirements and issues, so they look at solutions differently.

      Info-Tech Insight

      If end-user experience is at the forefront of business requirements, then any solution that fits the business KPIs can be successful.

      Client Pain Point

      Description Indicators

      Flexible work environmentWhat VDI solution can support a work-from-anywhere scenario? Possible solutions: Azure Virtual Desktop, IGEL client, Citrix virtual apps, and desktop services.
      Security concerns Corporate resources need to be secure. Working with untrusted endpoints or unsecured locations. Using VPN-type solution.
      End-user experience What performance metrics should be used to evaluate UX? Are there issues around where the endpoint is located? What kind of link do they have to the virtual desktop? What solutions are there?
      Optimization of routing What routings need to take place to achieve reduced latency and improved experience?
      Multifactor authenticationSecurity features such as a multilayered MFA and corporate data protection.
      Business continuity What are the options when dealing with cloud outages, meeting SLAs, and building resilience?
      Optimizing app performance and response times Define users based on a multiuser environment. Engineers and designers require more CPU resources, which negatively impacts on other users. Optimize CPU to avoid this situation. MS Teams and video streaming apps are not performing in an optimized manner.
      Optimization of cloud costs Scalability and usage schedule. Minimize cloud costs with tools to handle workloads and usage.
      Third-party access outsourcingContractors and third parties accessing business resources need to control data and source code along with developer tools in a centrally managed SaaS.

      The enterprise end-user compute landscape is changing

      Starting on the left are three computer types 'Windows on a PC', 'Mac', and 'VDI on a Thick Client'. In the next part, the first two are combined into 'BYOD', and the tree begins at 'Win11'. Branches from Win11 are: 'DIY' which branches to 'Autopilot & Endpoint Manager (Intune)'; 'Outsource' which branches to 'Device as a Service' which brances to 'Dell', 'Lenovo', and 'HP'; and another branch from 'Outsource', 'Azure Desktop', Which snakes us around to the top of the diagram at 'VDI'. VDI branches to 'VDI on a thin client' and 'VDI on a Browser', then they both branch into 'DIY' which branches to 'Citrix', 'VMware', and 'Azure', and 'Outsource' which branches to 'Desktop as a Service Vendor'.

      Surveys are telling us a story

      Questions you should be asking before you create your RFP
      • What are the use cases and types of workloads?
      • What is the quality of the network connection and bandwidth for the user base?
      • What are the application requirements?
      • What type of end points does the user have and what is the configuration?
      • Where are the data storage containers, how are they accessed, and are there proximity constraints?
      • What is the business security and identity policy requirements?
      • What are the functional and nonfunctional requirements?
      • Will the virtual desktops be persistent or non-persistent?

      How would you rate the user experience on your VDI/DaaS solution?


      (Source: Hysolate, 2020)

      • 18% of CISOs say htue employees are happy with their company's VDI/DaaS solution
      • 82% say their employees are neutral or unhappy with their company's VDI/DaaS solution

      Info-Tech Insight

      Asking critical use-case questions should give you a clear picture of the end-user experience outcome.

      End-user KPI metrics are difficult to gather

      Security is always quoted as a primary justification for VDI/DaaS, while UX is far down the list of KPIs. WHY?

      IT engineers use network and performance metrics to manage end-user complaints of “slowness,” which in reality is not what the user is experiencing.

      IT needs to invest in more meaningful metrics to manage end-user pain:

      • Logon duration
      • App load time
      • App response time
      • Session response time
      • Graphic quality and responsiveness and latency
      • Application availability and performance
      Bar chart of justifications used for business investment in VDI/DaaS. The most used justification is 'IT Efficiency' at 38%, and highlighted in the 2nd last place is 'Employee Experience' at 11%.
      (Source: Enterprise Strategy Group, 2020)

      Dimensions of user experience

      The dimensions of end-user experience can be broken down into four distinct categories that will impact not only the end user but also the business.

      Picturing your landscape in this framework will help clearly define your considerations when deciding on whether a VDI or DaaS solution is right for your business. We will investigate how these scenarios impact the end user, what that means, and how that can guide the questions that you are asking as you move to an RFP.

      Info-Tech Insight

      In the world of VDI and DaaS, if you do not get buy-in from the end user, the rate of adoption and the overall success of the implementation will prove difficult to measure. It will be impossible to calculate ROI even as you feel the impact of your TCO.

      Three arrows pointing right with labels in sequence 'Dimensions', 'Operational Metrics', and 'Technical Capabilities/ Controls'

      Cycle diagram with many tiers, titled 'USER EXPERIENCE'. The first tier from the center has four items cycling clockwise 'Availability', 'Functionality', 'Security', and 'Performance'. The second tier is associated to the first tier: under Availability is 'Maintenance', 'Uptime', and 'Degradation'; under Functionality is 'Graphics Quality', 'User Friction', and 'Usability'; under Security is 'Endpoint Monitoring', 'Plane Control', and 'Identity'; under Performance is 'Response Time', 'Reliability', and 'Latency'. Around the edge on the third tier are many different related terms.

      KPIs and metrics

      • Understand the types of end-user activities that are most likely to be reported as being slow.
      • You need to know what storage, CPU, memory, and network resources are being used when the user performs those activities. In other words, what is the OS doing behind the scenes and what hardware is it using?
      • Once you have determined which resources are being used by the various activities you will have to monitor the UX metrics to see which OS, network, storage, or server configuration issue is causing the performance issue that the user is reporting.

      What IT measures

      Most business KPI objectives concentrate on business goals, whether it be cost containment, security, simplification, ease of management, or centralization of apps and data, but rarely is there a KPI for end-user experience.

      You can’t fix what you can’t see. Putting a cost benefit to end-user satisfaction may come in the form of productivity.

      This may be a central reason why VDI has not been widely adopted as an architecture since it came to the marketplace more than 15 years ago.

      Samples of different KPIs and metrics.

      VDI processes to monitor

      Monitoring end-user metrics will mitigate the tension between business KPIs and end-user satisfaction

      Metric

      Description

      End-User
      Experience

      PERFORMANCELogon durationOnce the user puts in their password, how long does it take to get to their desktop? What is the measurement and how do you measure?
      App load timeWhen an app is launched by the user there should be immediate indication that it is loading.
      App response timeWhen the user performs a task, there should be no wait time, or hourglass icon, waiting for the app to catch up to the user input. (There is no succinct way to measure this.)
      Session response timeHow does the user’s OS respond to I/O? The user should not experience any latency issues when doing a drag and drop, clicking on a menu item, or doing a search.
      AVAILABILITYSLAsWhen something goes wrong in the VDI/DaaS environment, how quickly can the user expect to get back to their tasks?
      Geographic locationWhen all other considerations are configured correctly, the user experience may be impacted by their location. So, for example, a user working out of Mexico and logging into a VDI may experience latency based on location compared to a user in California, for example, where the resources are stored, managed, and monitored.
      Application availabilityMuch like app load time and response time, the only factor affecting the user experience is the back-end load on the app itself, for example a CAD or heavy resource app not properly resourced.
      FUNCTIONALITYConfiguration of user desktopDegradation in functionality is caused by improper allocation of CPU, RAM, and GPU for the tasks at hand, creating a bad UX and end-user satisfaction score.
      Graphics quality and responsivenessThe user should have the same experience as if on their own physical machine. A video experience should not have any lag in it, for example. MS Teams should not have latency or sound quality issues.
      Predictive analysisContinuous performance and availability monitoring.
      END USERBrowser real user monitoring (RUM)A real-time view into how the web application is performing from the point of view of a real end user.
      Customer satisfaction scoreSurvey-based metrics on customer satisfaction.

      “If employees are the competitive edge and key differentiator for a business, I&O has a duty of care to ensure that the employees’ digital experience enables and does not impede the value of that asset.” (John Annand, Principal Director, Info-Tech Research Group)

      The case for VDI today

      Is security and data sovereignty the only reason?

      Technical capability
      AVAILABILITYVDI is a better fit than DaaS in organizations that have limited or unreliable internet connectivity.
      FUNCTIONALITYApplication flexibility: Resource-intensive applications may require specific virtual desktop configurations, for example in-house GIS apps, CAD, and gaming software requiring specific GPU configurations.
      SECURITYData protection is often stated as a need to maintain an on-premises VDI solution, ensuring sensitive and highly privileged data does not travel across the internet.
      AVAILABILITYWhile some cloud providers will allow you to bring your OS licensing along with a cloud migration, many subscriptions already include OS licensing, and you may be paying additional licensing costs.
      SECURITYVDI makes sense if security and control are primary business KPIs, the IT resources are experienced virtual infrastructure engineers and administrators, and funding is not a hindrance.
      PERFORMANCEWhen processing power is a functional requirement, such as CPU, GPU, and storage capacity, VDI offers performance benefits over a standard PC, reducing the need to deploy high-powered PCs to end users.

      “Though the desktops are moving to the cloud, accountability is not.” (Gary Bea, Director of Consulting Services and Technical Operations, Goliath Technologies)

      The case for DaaS

      Any device anywhere: key benefits of DaaS

      Technical capabilityChallenges
      AVAILABILITYDelivers a consistent user experience regardless of location or device.

      Info-Tech Insight

      The total cost of the solution will be higher than you anticipate, and management is complex. Additionally, your ability to set your conditions and controls is limited.

      Info-Tech Insight

      Depending on your technical abilities and experience with cloud services, you will likely benefit from professional third-party services, technical services, and consulting, which can be critical when deciding if DaaS can fit into your current IT architecture, processes, and security posture.

      SECURITYEnhances security posture by eliminating your client VPN and keeping sensitive data off the endpoint device.
      FUNCTIONALITYOnboard and offboard users quickly and securely.
      FUNCTIONALITYProvides centralize workspace management.
      FUNCTIONALITYScale up or down on demand with a consumption- and subscription-based contract.
      FUNCTIONALITYSignificantly reduce operational overhead compared to managing a traditional VDI deployment.

      Technical capability comparison

      Table comparing technical capabilities using a scale of circle quarters: zero quarters being 'Poor' and 4 quarters being 'Good'. There are six columns in the body, three of which are under 'VDI': 'Thin Client', 'Thick Client', and 'Web Client', and the other three are 'Desktop as a service', 'Device as a service', and 'Win11 w/ Autopilot & Intune'. Rows are split into four categories: In 'Performance' are 'Reliability', 'Response Time', and 'Latency'; in 'Availability' are 'Uptime' and 'Degradation'; in 'Functionality' are 'Usability', 'Graphics Quality', and 'User Friction'; in 'Security' are 'Endpoint Mgt.', 'Control Plane', and 'Identity'.

      X as an endpoint client

      From an end-user experience perspective, what makes sense in terms of usage and cost?

      Thin Client
      • ✓ Easy provisioning and simple to use and manage
      • ✓ Easy to secure and update
      • ✓ Less vulnerable to data loss
      • ✓ Easily scaled
      • ✓ Requires less power
      • ✓ Cheaper than PCs
      • x compared to a PC
      • x Not powerful enough to manage loads such as CAD
      • x Infrastructure and network must be robust and up to date to avoid possible network latency
      • Examples: Terminals, Dell Wyse 5070, Lenovo M625, IGEL, HP Thin Client, repurposed PCs, Chromebook
      Desktop as a Service
      • ✓ Flexibility: work from anywhere, on any device, collaboratively
      • ✓ Resource scalability not reliant on on-premises server hardware
      • ✓ Easy to configure, install, and maintain
      • ✓ Reliable and easy to provision
      • ✓ Centralized sensitive data cloud security
      • x Requires high-speed internet, especially for remote users
      • x Learning curve can cause user friction
      • x Workload configuration use cases
      • Examples: Citrix, VM Horizon, AWS WorkSpaces, WVD, BYOD
      Thick Client
      • ✓ Completely flexible, for use with on-premises or cloud infrastructure
      • ✓ Able to work offline
      • ✓ Multimedia or bandwidth-intensive resource processing
      • ✓ Higher server capacity due to less resource load on servers
      • x Higher maintenance and updates attention
      • x Patching, security, and data migration friction
      • x More security vulnerability
      • x Less cost effective
      • Examples: Windows, MacOS desktops, laptops, smartphones, tablets
      Device as a Service
      • ✓ Device supply chain flow fulfillment, services, and recovery
      • ✓ Able to update to new equipment more frequently
      • ✓ Scale up and down as needed
      • ✓ Better device backup, asset tracking , security, and EOL disposal
      • x Challenging risk management, regulatory obligations, and liabilities
      • x Change in helpdesk and business workflows
      • x Vendor may limit selection
      • Examples: PCs, smartphones, mobile computing devices, Lenovo, HP, Microsoft, Dell, Macs, iPads, iPhones
      Web Client
      • ✓ Can be accessed from any computer; only requires username and password
      • ✓ Client works with a URL, so browser-based
      • ✓ Updates are easier than on a Windows client
      • x Security risk and information leakage
      • x Dependent on internet access
      • x Unable to work on high-impact resource apps (e.g. CAD, graphics)
      • x Limited user base, less technical operations
      • Examples: Chrome, Edge, HTML5

      Security: on-premises versus cloud

      Security decisions based on risk tolerance

      • What is your risk tolerance? When deciding between VDI and DaaS, the first consideration is whether the business is better served with an on-premises or a cloud solution.
      • Low risk tolerance: Considerer data sovereignty, complex compliance requirements, and data classification. For example, at the Pentagon, DoD requires heavy compliance with security and data sovereignty. DaaS cloud providers may be in a better position to respond to threats and attacks in a timely manner.
      • Low risk tolerance: If the business mandates security tools that cannot be deployed in cloud solutions, VDI is a better solution.
      • Low risk tolerance: Smaller businesses that don’t have resources with the expertise and skill set to handle security are better served in cloud. Security operations centers (SOCs) are more likely to present in large corporations.
      • Low risk tolerance: When patching requires customization, for example in legacy applications, the ability to test patches is impacted, which may cause possible complications or failures.
      • High risk tolerance: For cloud-based solutions, patching is taken out of the IT team’s hands, and testing is done against the complete cloud solution.

      Info-Tech Insight

      What is the better security posture and control plane? Clarify your stakeholders’ objectives, then see if VDI is an adequate solution.

      Security needs for VDI and DaaS

      • IDENTITY AND ACCESS MANAGEMENT — MFA, authorization, provisioning, SSO, identity federation, data owners, workflows, role-based access control (RBAC), user lifecycle management
      • ENCRYPTION — TLS 1.3, and 256-bit, endpoint encryption, file encryption, AES, PKI, BitLocker
      • DATA LOSS PREVENTION — Centralized policy management, sensitive data detection, HIPAA, GDPR
      • ANTIVIRUS & PATCH MANAGEMENT — Group policy management, AV exclusions, anti-ransomware, keylogger mitigation
      • DDoS protection — HTTP, UDP flood mitigation, content delivery network, always-on services
      • ENDPOINT DETECTION & RESPONSE — Detect and react to advanced active attacks on endpoints

      Activity

      Define the virtual infrastructure solution for your end users

      1. Define and build your value hypothesis/proposition
        1. What is the business case? Who is championing the investment?
        2. Identify the project management team and stakeholders.
        3. Set goals to be achieved based on value.
        4. Identify KPIs and metrics to measure success.
      2. Identify use cases and personas
        1. Identify possible user friction (e.g. emotional, cognitive, interaction).
        2. Understand current infrastructure shortcomings/capabilities (e.g. network, security posture/tolerance, staffing needs, qualified technicians, end-user devices).
      3. Articulate use cases into functional and nonfunctional requirements
        1. Separate must haves and nice to haves.
        2. Categorize requirements into identifiable functionality capabilities.
        3. Review your outputs and identify “gotchas” using the MECE (mutually exclusive, collectively exhaustive) principle.

      Related Info-Tech Research

      Stock image of a dashboard.Modernize and Transform Your End-User Computing Strategy

      Phase 3.2 of this research set covers virtual desktop infrastructure.

      Stock image of a world surrounded by clouds.Implement Desktop Virtualization and Transition to Everything as a Service

      Follow Info-Tech’s process for implementing the right desktop virtualization solution to create a project plan that will help ensure that you not only choose the right solution but also implement it effectively.

      Stock image of a finger pushing a button.Cloud Strategy Workbook

      Use this tool to assess cloud services (desktop-as-a-service).

      Stock image of a world surrounded by clouds.Desktop Virtualization TCO Calculator

      This tool is designed to help you understand what desktop virtualization looks like from a cost perspective.

      Bibliography

      Anderson, Joseph. “Five Ways VDI Will Grow in 2022 Thanks to Hybrid Work.” StratoDesk, 28 Feb. 2022. Web.

      Bowker, Mark. “Are Desktops Doomed? Trends in Digital Workspaces, VDI, and DaaS.” ESG, May 2020. Web.

      “The CISO's Dilemma: How Chief Information Security Officers Are Balancing Enterprise Endpoint Security and Worker Productivity in Response to COVID-19.” Hysolate, Oct. 2020. Web.

      King, Val. “Why the End-User Experience Is Not Good for Your Remote Workforce .” Whitehat Virtual Technologies, 2 Dec. 2021. Web.

      Perry, Yifat. “VDI vs DaaS: 5 Key Differences and 6 Leading Solutions.” NetApp, 26 Aug. 2020. Web.

      Rigg, Christian. “Best virtual desktop services 2022.” TechRadar, 20 Jan. 2022 . Web.

      Seget, Vladan. “Key metrics to consider when assessing the performance of your VDI/DaaS environment.” vladan.fr, 19 April 2021. Web.

      Spruijt, Ruben. “Why Should You Care About VDI and Desktop-as-a-Service?” Nutanix, 28 Jan. 2020. Web.

      Stowers, Joshua. “The Best Desktop as a Service (DaaS) Providers 2022.” business.com, 21 Dec. 2021. Web.

      “Virtual Desktop Infrastructure(VDI) Market 2022.” MarketWatch, 5 Jan. 2022. Web. Press release.

      Zamir, Tal. “VDI Security Best Practices: Busting the Myths.” Hysolate, 29 Nov. 2021. Web.

      Zychowicz, Paul. “Why do virtual desktop deployments fail?” Turbonomic Blog, 16 Dec. 2016. Web.

      Improve Your IT Recruitment Process

      • Buy Link or Shortcode: {j2store}578|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select

      Business and IT leaders aiming to recruit and select the best talent need to:

      • Get involved in the talent acquisition process at key moments.
      • Market their organization to top talent through an authentic employer brand.
      • Create engaging and accurate job ads.
      • Leverage purposeful sourcing for anticipated talent needs.
      • Effectively assess candidates with a strong interview process.
      • Set up new employees for success.

      Our Advice

      Critical Insight

      To create a great candidate experience, IT departments must be involved in the process at key points, recruitment and selection is not a job for HR alone!

      Impact and Result

      • Use this how-to guide to articulate an authentic (employee value proposition) EVP and employer brand.
      • Perform an analysis of current sourcing methods and build an action plan to get IT involved.
      • Create an effective and engaging job ad to insure the right people are applying.
      • Train hiring managers to effectively deliver interviews that correctly assess candidate suitability.
      • Get links to in-depth Info-Tech resources and tools.

      Improve Your IT Recruitment Process Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Improve Your IT Recruitment Process – A guide to help you attract and select the best talent.

      Train your IT department to get involved in the recruitment process to attract and select the best talent.

      • Improve Your IT Recruitment Process Capstone Deck

      2. Improve Your IT Recruitment Process Workbook – A tool to document your action plans.

      Use this tool in conjunction with the Improve you IT Recruitment Process to document your action plans

      • Improve Your IT Recruitment Process Workbook

      3. Interview Guide Template – A template to organize interview questions and their rating scales, take notes during the interview, and ensure all interviews follow a similar structure.

      To get useful information from an interview, the interviewer should be focused on what candidates are saying and how they are saying it, not on what the next question will be, what probes to ask, or how they will score the responses. This Interview Guide Template will help interviewers stay focused and collect good information about candidates.

      • Interview Guide Template

      4. IT Behavioral Interview Question Library – A tool that contains a complete list of sample questions aligned with core, leadership, and IT competencies.

      Hiring managers can choose from a comprehensive collection of core, functional, and leadership competency-based behavioral interview questions.

      • IT Behavioral Interview Question Library

      5. Job Ad Template – A template to allow complete documentation of the characteristics, responsibilities, and requirements for a given job posting in IT.

      Use this template to develop a well-written job posting that will attract the star candidates and, in turn, deflect submission of irrelevant applications by those unqualified.

      • Job Ad Template

      6. Idea Catalog – A tool to evaluate virtual TA solutions.

      The most innovative technology isn’t necessarily the right solution. Review talent acquisition (TA) solutions and evaluate the purpose each option serves in addressing critical challenges and replacing critical in-person activities.

      • Idea Catalog: Adapt the Talent Acquisition Process to a Virtual Environment
      [infographic]

      Workshop: Improve Your IT Recruitment Process

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Employee Value Proposition and Employer Branding

      The Purpose

      Establish the employee value proposition (EVP) and employer brand.

      Key Benefits Achieved

      Have a well-defined EVP that you communicate through your employer brand.

      Activities

      1.1 Gather feedback.

      1.2 Build key messages.

      1.3 Assess employer brand.

      Outputs

      Content and themes surrounding the EVP

      Draft EVP and supporting statements

      A clearer understanding of the current employer brand and how it could be improved

      2 Job Ads and Sourcing

      The Purpose

      Develop job postings and build a strong sourcing program.

      Key Benefits Achieved

      Create the framework for an effective job posting and analyze existing sourcing methods.

      Activities

      2.1 Review and update your job ads.

      2.2 Review the effectiveness of existing sourcing programs.

      2.3 Review job ads and sourcing methods for bias.

      Outputs

      Updated job ad

      Low usage sourcing methods identified for development

      Minimize bias present in ads and sourcing methods

      3 Effective Interviewing

      The Purpose

      Create a high-quality interview process to improve candidate assessment.

      Key Benefits Achieved

      Training on being an effective interviewer.

      Activities

      3.1 Create an ideal candidate scorecard.

      3.2 Map out your interview process.

      3.3 Practice behavioral interviews.

      Outputs

      Ideal candidate persona

      Finalized interview and assessment process

      Practice interviews

      4 Onboarding and Action Plan

      The Purpose

      Drive employee engagement and retention with a robust program that acclimates, guides, and develops new hires.

      Key Benefits Achieved

      Evaluation of current onboarding practice.

      Activities

      4.1 Evaluate and redesign the onboarding program.

      Outputs

      Determine new onboarding activities to fill identified gaps.

      Further reading

      Improve Your IT Recruitment Process

      Train your IT department to get involved in the recruitment process to attract and select the best talent.

      Own the IT recruitment process

      Train your IT department to get involved in the recruitment process to attract and select the best talent.

      Follow this blueprint to:

      • Define and communicate the unique benefits of working for your organization to potential candidates through a strong employer brand.
      • Learn best practices around creating effective job postings.
      • Target your job posting efforts on the areas with the greatest ROI.
      • Create and deliver an effective, seamless, and positive interview and offer process for candidates.
      • Acclimate new hires and set them up for success.

      Get involved at key moments of the candidate experience to have the biggest impact


      Employee Value Proposition (EVP) and Employer Brand



      Job Postings and a Strong Sourcing Program

      Effective Interviewing

      Onboarding: Setting up New Hires For Success

      Awareness Research Application Screening Interview and Assessment Follow Up Onboarding

      RECRUIT QUALITY STAFF

      Hiring talent is critical to organizational success

      Talent is a priority for the entire organization:

      Respondents rated “recruitment” as the top issue facing organizations today (McLean & Company 2022 HR Trends Report).

      37% of IT departments are outsourcing roles to fill internal skill shortages (Info-Tech Talent Trends 2022 Survey).

      Yet bad hires are alarmingly common:

      Hiring is one of the least successful business processes, with three-quarters of managers reporting that they have made a bad hire (Robert Half, 2021).

      48% of survey respondents stated improving the quality of hires was the top recruiting priority for 2021 (Jobvite, 2021).

      Workshop overview

      Prework

      Day 1

      Day 2

      Day 3

      Day 4

      Post work

      Current Process and Job Descriptions Documented

      Establish the Employee Value Proposition (EVP) and Employer Brand

      Develop Job Postings and Build a Strong Sourcing Program

      Effective Interviewing

      Onboarding and Action Planning

      Putting the Action Plan Into Action!

      Activities

      • Recruitment Process Mapped Out and Stakeholders Identified
      • Prepare a JD and JP for Four Priority Jobs
      • Collect Information on Where Your Best Candidates Are Coming From

      1.1 Introduce the Concept of an EVP

      1.2 Brainstorm Unique Benefits of Working at Your Organization

      1.2 Employer Brand Introduction

      2.1 What Makes an Attractive Job Posting

      2.2 Create the Framework for Job Posting

      2.3 Improve the Sourcing Process

      2.4 Review Process for Bias

      3.1 Creating an Interview Process

      3.2 Selecting Interview Questions

      3.3 Avoiding Bias During Interviews

      3.4 Practice Interviews

      4.1 Why Onboarding Matters

      4.2 Acclimatize New Hires and Set Them Up for Success

      4.3 Action Plan

      5.1 Review Outputs and Select Priorities

      5.2 Consult With HR and Senior Management to Get Buy-In

      5.3 Plan to Avoid Relapse Behaviors

      Deliverables

      1. EVP draft completed
      2. Employer brand action plan
      1. Organization-specific job posting framework
      2. Sourcing Plan Template for four priority jobs
      3. Sourcing action plan
      1. Completed Interview Guide Template
      2. Managers practice a panel interview
      1. Onboarding best practices
      2. Action plan

      Enhance Your Recruitment Strategies

      The way you position the organization impacts who is likely to apply to posted positions.

      Develop a strong employee value proposition

      What is an employee value proposition?

      And what are the key components?

      The employee value proposition is your opportunity to showcase the unique benefits and opportunities of working at your organization, allowing you to attract a wider pool of candidates.

      AN EMPLOYEE VALUE PROPOSITION IS:

      AN EMPLOYEE VALUE PROPOSITION IS NOT:

      • An authentic representation of the employee experience
      • Aligned with organizational culture
      • Fundamental to all stages of the employee lifecycle
      • A guide to help investment in programs and policies
      • Short and succinct
      • What the employee can do for you
      • A list of programs and policies
      • An annual project

      THE FOUR KEY COMPONENTS OF AN EMPLOYEE VALUE PROPOSITION

      Rewards

      Organizational Elements

      Working Conditions

      Day-to-Day Job Elements

      • Compensation
      • Health Benefits
      • Retirement Benefits
      • Vacation
      • Culture
      • Customer Focus
      • Organization Potential
      • Department Relationships
      • Senior Management Relationships
      • Work/Life Balance
      • Working Environment
      • Employee Empowerment
      • Development
      • Rewards & Recognition
      • Co-Worker Relationships
      • Manager Relationships

      Creating a compelling EVP that presents a picture of your employee experience, with a focus on diversity, will attract a wide pool of diverse candidates to your team. This can lead to many internal and external benefits for your organization.

      How to collect information on your EVP

      Existing Employee Value Proposition: If your organization or IT department has an existing employee value proposition, rather than starting from scratch, we recommend leveraging that and moving to the testing phase to see if the EVP still resonates with staff and external parties.

      Employee Engagement Results: If your organization does an employee engagement survey, review the results to identify the areas in which the IT organization is performing well. Identify and document any key comment themes in the report around why employees enjoy working for the organization or what makes your IT department a great place to work.

      Social Media Sites. Prepare for the good, the bad, and the ugly. Social media websites like Glassdoor and Indeed make it easier for employees to share their experiences at an organization honestly and candidly. While postings on these sites won’t relate exclusively to the IT department, they do invite participants to identify their department in the organization. You can search these to identify any positive things people are saying about working for the organization and potentially opportunities for improvement (which you can use as a starting point in the retention section of this report).

      1.1 Gather feedback

      1. Download the Improve Your IT Recruitment Workbook.
      2. On tab 1.1, brainstorm the top five things you value most about working at the organization. Ask yourself what would fall in each category and identify any key themes. Be sure to take note of any specific quotes you have.
      3. Brainstorm limitations that the organization currently has in each of those areas.

      Download the Recruitment Workbook

      Input

      Output
      • Employee opinions
      • Employee responses to four EVP components
      • Content for EVP

      Materials

      Participants

      • Recruitment Workbook
      • Diverse employees
      • Different departments
      • Different role levels

      1.2 Build key messages

      1. Go to tab 1.2 in your workbook
      2. Identify themes from activity 1.1 that would be considered current strengths of you organization.
      3. Identify themes from activity 1.2 that are aspirational elements of your organization.
      4. Identify up to four key statements to focus on for the EVP, ensuring that your EVP speaks to at least one of the five categories above.
      5. Integrate these into one overall statement.

      Examples below.

      Input

      Output
      • Feedback from focus groups
      • EVP and supporting statements

      Materials

      Participants

      • Workbook handout
      • Pen and paper for documenting responses
      • IT leadership team

      Sample EVPs

      Shopify

      “We’re Shopify. Our mission is to make commerce better for everyone – but we’re not the workplace for everyone. We thrive on change, operate on trust, and leverage the diverse perspectives of people on our team in everything we do. We solve problems at a rapid pace. In short, we get shit done.”

      Bettercloud

      “At Bettercloud, we have a smart, ambitious team dedicated to delighting our customers. Our culture of ownership and transparency empowers our team to achieve goals they didn’t think possible. For all those on board, it’s going to be a challenging and rewarding journey – and we’re just getting started.”

      Ellevest

      “As a team member at Ellevest, you can expect to make a difference through your work, to have a direct impact on the achievement of a very meaningful mission, to significantly advance your career trajectory, and to have room for fun and fulfillment in your daily life. We know that achieving a mission as critical as ours requires incredible talent and teamwork, and team is the most important thing to us.”

      Sources: Built In, 2021; Workology, 2022

      Ensure your EVP resonates with employees and prospects

      Test your EVP with internal and external audiences.

      INTERNAL TEST REVOLVES AROUND THE 3A’s

      EXTERNAL TEST REVOLVES AROUND THE 3C’s

      ALIGNED: The EVP is in line with the organization’s purpose, vision, values, and processes. Ensure policies and programs are aligned with the organization’s EVP.

      CLEAR: The EVP is straightforward, simple, and easy to understand. Without a clear message in the market, even the best intentioned EVPs can be lost in confusion.

      ACCURATE: The EVP is clear and compelling, supported by proof points. It captures the true employee experience, which matches the organization’s communication and message in the market.

      COMPELLING: The EVP emphasizes the value created for employees and is a strong motivator to join this organization. A strong EVP will be effective in drawing in external candidates. The message will resonate with them and attract them to your organization.

      ASPIRATIONAL: The EVP inspires both individuals and the IT organization as a whole. Identify and invest in the areas that are sure to generate the highest returns for employees.

      COMPREHENSIVE: The EVP provides enough information for the potential employee to understand the true employee experience and to self-assess whether they are a good fit for your organization. If the EVP lacks depth, the potential employee may have a hard time understanding the benefits and rewards of working for your organization.

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      The way you position the organization impacts who is likely to apply to posted positions.

      Market your EVP to potential candidates: Employer Brand

      Employer brand includes how you market the EVP internally and externally – consistency is key

      The employer brand is the perception internal and external stakeholders hold of the organization and exists whether it has been curated or not. Curating the employer brand involves marketing the organization and employee experience. Grounding your employer brand in your EVP enables you to communicate and market an accurate portrayal of your organization and employee experience and make you desirable to both current and potential employees.

      The image contains a picture of several shapes. There is a trapezoid that is labelled EVP, and has a an arrow pointing to the text beside it. There is also an arrowing pointing down from it to another trapezoid that is labelled Employer Brand.

      The unique offering an employer provides to employees in return for their effort, motivating them to join or remain at the organization.

      The perception internal and external stakeholders hold of the organization.

      Alignment between the EVP, employer brand, and corporate brand is the ideal branding package. An in-sync marketing strategy ensures stakeholders perceive and experience the brand the same way, creating brand ambassadors.

      The image contains three circles that are connected. The circles are labelled: EVP, Employer Brand, Corporate Brand.

      Ensure your branding material creates a connection

      How you present your employer brand is just as important as the content. Ideally, you want the viewer to connect with and personalize the material for the message to have staying power. Use Marketing’s expertise to help craft impactful promotional materials to engage and excite the viewer.

      Visuals

      Images are often the first thing viewers notice. Use visuals that connect to your employer brand to engage the viewer’s attention and increase the likelihood that your message will resonate. However, if there are too many visuals this may detract from your content – balance is key!

      Language

      Wordsmithing is often the most difficult aspect of marketing. Your message should be accurate, informative, and engaging. Work with Marketing to ensure your wording is clever and succinct – the more concise, the better.

      Composition

      Integrate visuals and language to complete your marketing package. Ensure that the text and images are balanced to draw in the viewer.

      Case Study: Using culture to drive your talent pool

      This case study is happening in real time. Please check back to learn more as Goddard continues to recruit for the position.

      Recruiting at NASA

      Goddard Space Center is the largest of NASA’s space centers with approximately 11,000 employees. It is currently recruiting for a senior technical role for commercial launches. The position requires consulting and working with external partners and vendors.

      NASA is a highly desirable employer due to its strong culture of inclusivity, belonging, teamwork, learning, and growth. Its culture is anchored by a compelling vision, “For the betterment of Humankind,” and amplified by a strong leadership team that actively lives their mission and vision daily.

      Firsthand lists NASA as #1 on the 50 most prestigious internships for 2022.

      Rural location and no flexible work options add to the complexity of recruiting

      The position is in a rural area of Eastern Shore Virginia with a population of approximately 60,000 people, which translates to a small pool of candidates. Any hire from outside the area will be expected to relocate as the senior technician must be onsite to support launches twice a month. Financial relocation support is not offered and the position is a two-year assignment with the option of extension that could eventually become permanent.

      The image contains a picture of Steve Thornton.

      “Looking for a Talent Unicorn: a qualified, experienced candidate with both leadership skills and deep technical expertise that can grow and learn with emerging technologies.”

      Steve Thornton

      Acting Division Chief, Solutions Division, Goddard Space Flight Center, NASA

      Case Study: Using culture to drive your talent pool

      A good brand overcomes challenges.

      Culture takes the lead in NASA's job postings, which attract a high number of candidates. Postings begin with a link to a short video on working at NASA, its history, and how it lives its vision. The video highlights NASA's diversity of perspectives, career development, and learning opportunities.

      NASA's company brand and employer brand are tightly intertwined, providing a consistent view of the organization.

      The employer vision is presented in the best place to reach NASA's ideal candidate: usajobs.gov, the official website of the United States Government and the “go-to” for government job listings. NASA also extends its postings to other generic job sites as well as LinkedIn and professional associations.

      The image contains a picture of Robert Leahy.

      Interview with Robert Leahy

      Chief Information Officer, Goddard Space Flight Center, NASA

      2.1 Assess your organization’s employer brand

      1. Go to tab 2.1 in the Improve Your IT Recruitment Workbook.
      2. Put yourself in the shoes of someone on the outside looking in. If they were to look up your organization, what impression would they be given about what is like to work there?
      3. Run a Google search on your organization with key words “jobs,” “culture,” and “working environment” to see what a potential candidate would see when they begin researching your organization.
      4. You can use sites like:

      • Glassdoor
      • Indeed company pages
      • LinkedIn company pages
      • Social media
      • Your own website
    • Identify what your organization is doing well and record that under the “Continue” box in your workbook.
    • Record anything your organization should stop doing under the “Stop” box.
    • Brainstorm some ideas that your organization should think about implementing to improve the employer brand under the “Start” Box.
    • Input Output
      • Existing branding material on the internet
      • A clearer understanding of the current employer brand and how it could be improved
      Materials Participants
      • Workbook handout
      • Senior IT Leaders

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      The way you position the organization impacts who is likely to apply to posted positions.

      Create engaging job ads to attract talent to the organization

      We have a job description; can I just post that on Indeed?

      A job description is an internal document that includes sections such as general job information, major responsibilities, key relationships, qualifications, and competencies. It communicates job expectations to incumbents and key job data to HR programs.

      A job ad is an externally facing document that advertises a position with the intent of attracting job applicants. It contains key elements from the job description as well as information on the organization and its EVP.

      Write an Effective Job Ad

      • Ensure that your job ad speaks to the audience you are targeting through the language you use.
        • E.g. If you are hiring for a creative role, use creative language and formatting. If you are writing for students, emphasize growth opportunities.
      • Highlight the organization’s EVP.
      • Paint an accurate picture of key aspects of the role but avoid the nitty gritty as it may overwhelm applicants.
      • Link to your organization’s website and social media platforms so applicants can easily find more information.

      A job description informs a job ad, it doesn’t replace it. Don’t be lulled into using a job description as a posting when there’s a time crunch to fill a position. Refer to job postings as job advertisements to reinforce that their purpose is to attract attention and talent.

      An effective job posting contains the following elements:

      Position Title
      • Clearly defined job titles are important for screening applicants as this is one of the first things the candidate will read.
      • Indicating the earnings range that the position pays cuts out time spent on reviewing candidates who may never accept the position and saves them from applying to a job that doesn’t match what they are looking for.
      Company
      • Provide a brief description of the organization including the products or services it offers, the corporate culture, and any training and career development programs.
      Summary Description
      • Describe briefly why the position exists. In other words, what is the position's primary purpose? The statement should include the overall results the job is intended to produce and some of the key means by which the position achieves these results.
      Responsibilities
      • Use bullet points to list the fundamental accountabilities of the position. Candidates want to know what they will be doing on a day-to-day basis.
      • Begin each responsibility or accountability statement with an action word and follow with a brief phrase to describe what is done to accomplish the function.
      Position Characteristics
      • Give examples of key problems and thinking challenges encountered by the position. Describe the type of analysis or creativity required to resolve these problems.
      • Provide examples of final decision-making authority. The examples should reflect the constraints placed on the position by people, policies, and/or procedures.
      Position Requirements
      • List all formal education and certifications required.
      • List all knowledge and experience required.
      • List all personal attributes required.
      Work Conditions
      • List all work conditions that the employee must accommodate. This could include any sensory, physical, or mental requirements of the position or any special conditions of employment, such as hours.
      Process to Apply
      • Include the methods in which the organization wants to receive applications and contact information of who will receive the applications.

      Bottom Line: A truly successful job posting ferrets out those hidden stars that may be over cautious and filters out hundreds of applications from the woefully under qualified.

      The do’s and don’ts of an inclusive job ad

      DON’T overlook the power of words. Avoid phrases like “strong English language skills” as this may deter non-native English speakers from applying and a “clean-shaven” requirement can exclude candidates whose faith requires them to maintain facial hair.

      DON’T post a long requirements list. A study showed that the average jobseeker spends only 49.7 seconds reviewing a listing before deciding it's not a fit.*

      DON’T present a toxic work culture; phrases such as “work hard, play hard” can put off many candidates and play into the “bro- culture” stereotype in tech.

      Position Title: Senior Lorem Ipsum

      Salary Band: $XXX to $XXX

      Diversity is a core value at ACME Inc. We believe that diversity and inclusion is our strength, and we’re passionate about building an environment where all employees are valued and can perform at their best.

      As a … you will …

      Our ideal candidate ….

      Required Education and Experience

      • Bachelor’s degree in …
      • Minimum five (5) years …

      Required Skills

      Preferred Skills

      At ACME Inc. you will find …

      DO promote pay equity by being up front and honest about salary expectations.

      DO emphasize your organization’s commitment to diversity and an inclusive workplace by adding an equity statement.

      DO limit your requirements to “must haves” or at least showcase them first before the “nice-to-haves.”

      DO involve current employees or members of your employee resource groups when creating job descriptions to ensure that they ask for what you really need.

      DO focus on company values and criteria that are important to the job, not just what’s always been done.

      *Source: Ladders, 2013

      Before posting the job ad complete the DEI job posting validation checklist

      Does the job posting highlight your organization’s EVP

      Does the job posting avoid words that might discourage women, people of color, and other members of underrepresented groups from applying?

      Has the position description been carefully reviewed and revised to reflect current and future expectations for the position, rather than expectations informed by the persons who have previously held the job?

      Has the hiring committee eliminated any unnecessary job skills or requirements (college degree, years or type of previous experience, etc.) that might negatively impact recruitment of underrepresented groups?

      Has the hiring committee posted the job in places (job boards, websites, colleges, etc.) where applicants from underrepresented groups will be able to easily view or access it?

      Have members of the hiring committee attended job fairs or other events hosted by underrepresented groups?

      Has the hiring committee asked current employees from underrepresented groups to spread the word about the position?

      Has the hiring committee worked with the marketing team to ensure that people from diverse groups are featured in the organization’s website, publications, and social media?

      es the job description clearly demonstrate the organization’s and leadership’s commitment to DEI?

      *Source: Recruit and Retain People of Color in IT

      3.1 Review and update your job ads

      1. Download the Job Ad Template.
      2. Look online or ask HR for an example of a current job advertisement you are using.
      • If you don’t have one, you can use a job description as a starting point.
    • Review all the elements of the job ad and make sure they align with the list on the previous slide, adding or changing, as necessary. Your job ad should be no more than two pages long.
    • Using the tools on the previous two slides, review your first draft to ensure the job posting is free of language or elements that will discourage diverse candidates from applying.
    • Review your job advertisement with HR to get feedback or to use as a template going forward.
    • Input Output
      • Existing job ad or job description
      • Updated job ad
      Materials Participants
      • Job ad or job description
      • Job Ad Template
      • Hiring Managers

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      Focus on key programs and tactics to improve the effectiveness of your sourcing approach.

      Get involved with sourcing to get your job ad seen

      To meet growing expectations, organizations need to change the way they source

      Social Media

      Social media has trained candidates to expect:

      • Organizations to stay in touch and keep track of them.
      • A personalized candidate experience.
      • To understand organizational culture and a day in the life.

      While the focus on the candidate experience is important throughout the talent acquisition process, social media, technology, and values have made it a critical component of sourcing.

      Technology

      Candidates expect to be able to access job ads from all platforms.

      • Today, close to 90% of candidates use a mobile platform to job hunt (SmartRecruiters, 2022).
      • However, only 36% of organizations are optimizing their job postings for mobile. (The Undercover Recruiter, 2021)

      Job ads must be clear, concise, and easily viewed on a mobile device.

      Candidate Values

      Job candidate’s values are changing.

      • There is a growing focus on work/life balance, purpose, innovation, and career development. Organizations need to understand candidate values and highlight how the EVP aligns with these interests.

      Authenticity remains important.

      • Clearly and accurately represent your organization and its culture.

      Focus on key programs and tactics to improve the effectiveness of your sourcing approach

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      Take advantage of your current talent with an internal talent mobility program

      What is it?

      Positioning the right talent in the right place, at the right time, for the right reasons, and supporting them appropriately.

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      ITM program benefits:

      1. Retention
      2. Provide opportunities to develop professionally, whether in the current role or through promotions/lateral moves. Keep strong performers and high-potential employees committed to the organization.

      3. Close Skills Gap
      4. Address rapid change, knowledge drain due to retiring Baby Boomers, and frustration associated with time to hire or time to productivity.

      5. Cost/Time Savings
      6. Reduce spend on talent acquisition, severance, time to productivity, and onboarding.

      7. Employee Engagement
      8. Increase motivation and productivity by providing increased growth and development opportunities.

      9. EVP
      10. Align with the organization’s offering and what is important to the employees from a development perspective.

      11. Employee & Leadership Development
      12. Support and develop employees from all levels and job functions.

      Leverage social media to identify and connect with talent

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? The widely accessible electronic tools that enable anyone to publish and access information, collaborate on common efforts, and build relationships.

      Learning to use social media effectively is key to sourcing the right talent.

      • Today, 92% of organizations leverage social media for talent acquisition.
      • 80% of employers find passive candidates through social media – second only to referrals.
      • 86% percent of job seekers used social media for their most recent job search.
      (Ku, 2021)

      Benefits of social media:

      • Provides access to candidates who may not know the organization.
      • Taps extended networks.
      • Facilitates consistent communication with candidates and talent in pipelines.
      • Personalizes the candidate experience.
      • Provides access to extensive data.

      Challenges of social media:

      With the proliferation of social media and use by most organizations, social media platforms have become overcrowded. As a result:

      • Organizations are directly and very apparently competing for talent with competitors.
      • Users are bombarded with information and are tuning out.

      “It is all about how we can get someone’s attention and get them to respond. People are becoming jaded.”

      – Katrina Collier, Social Recruiting Expert, The Searchologist

      Reap the rewards of an employee referral program

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? Employees recommend qualified candidates. If the referral is hired, the referring employee typically receives some sort of reward.

      Benefits of an employee referral program:

      1. Lower Recruiting Costs
      2. 55% of organizations report that hiring a referral is less expensive that a non-referred candidate (Clutch, 2020).

      3. Decreased time to fill
      4. The average recruiting lifecycle for an employee referral is 29 days, compared with 55 days for a non referral (Betterup, 2022).

      5. Decreased turnover
      6. 46% percent of employees who were referred stay at their organization for a least one year, compared to 33% of career site hires (Betterup, 2022).

      7. Increased quality of hire
      8. High performers are more likely to refer other high performers to an organization (The University of Chicago Press, 2019).

      Avoid the Like Me Bias: Continually evaluate the diversity of candidates sourced from the employee referral program. Unless your workforce is already diverse, referrals can hinder diversity because employees tend to recommend people like themselves.

      Tap into your network of former employees

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? An alumni referral program is a formalized way to maintain ongoing relationships with former employees of the organization.

      Successful organizations use an alumni program:

      • 98% of the F500 have some sort of Alumni program (LinkedIn, 2019).

      Benefits of an alumni program:

      1. Branding
      • Alumni are regarded as credible sources of information. They can be a valuable resource for disseminating and promoting the employer brand.
    • Source of talent
      • Boomerang employees are doubly valuable as they understand the organization and also have developed skills and industry experience.
        • Recover some of the cost of turnover and cost per hire with a pool of prequalified candidates who will more quickly reach full productivity.
    • Referral potential
      • Developing a robust alumni network provides access to a larger network through referrals.
      • Alumni already know what is required to be successful in the organization so they can refer more suitable candidates.

      Make use of a campus recruiting program

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? A formalized means of attracting and hiring individuals who are about to graduate from schools, colleges, or universities.

      Almost 70% of companies are looking to employ new college graduates every year (HR Shelf, 2022).

      Campus recruitment benefits:

      • Increases employer brand awareness among talent entering the workforce.
      • Provides the opportunity to interact with large groups of potential candidates at one time.
      • Presents the opportunity to identify and connect with high-quality talent before they graduate and are actively looking for positions.
      • Offers access to a highly diverse audience.

      Info-Tech Insight

      Target schools that align with your culture and needs. Do not just focus on the most prestigious schools: they are likely more costly, have more intense competition, and may not actually provide the right talent.

      Identify opportunities to integrate non-traditional techniques

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      1. Professional industry associations
      • Tap into candidates who have the necessary competencies.

      5. Not-for-profit intermediaries

      • Partner with not-for-profits to tap into candidates in training or mentorship programs.
      • Example:
        • Year Up (General)
        • Bankwork$ (Banking)
        • Youth Build (Construction)
        • iFoster (Grocery)

      American Expresscreated a boot camp for software engineers in partnership with Year Up and Gateway Community College to increase entry-level IT hires.

      Results:

      • Annually hire 80-100 interns from Year Up.
      • Improved conversion rates: 72% of Year Up interns versus 60% of traditional interns.
      • Increased retention: 44 (Year Up) versus 18 months (traditional).
      (HBR, 2016)

      2. Special interest groups

      • Use for niche role sourcing.
      • Find highly specialized talent.
      • Drive diversity (Women in Project Management).

      6. Gamification

      • Attract curiosity and reaffirm innovation at your organization.
      • Communicate the EVP.
      3. Customers
      • Access those engaged with the organization.
      • Add the employer brand to existing messaging.

      PwC (Hungary) created Multiploy, a two-day game that allows students to virtually experience working in accounting or consulting at the organization.

      Results:

      • 78% of students said they wanted to work for PwC.
      • 92% indicated they had a more positive view of the firm.
      • Increase in the number of job applicants.
      (Zielinski, 2015)

      4. Exit interviews

      • Ask exiting employees “where should we recruit someone to replace you?”
      • Leverage their knowledge to glean insight into where to find talent.

      Partner with other organizational functions to build skills and leverage existing knowledge

      Use knowledge that already exists in the organization to improve talent sourcing capabilities.

      Marketing

      HR

      Marketing knows how to:

      • Build attention-grabbing content.
      • Use social media platforms effectively.
      • Effectively promote a brand.
      • Use creative methods to connect with people.

      HR knows how to:

      • Organize recruitment activities.
      • Identify the capabilities of various technologies available to support sourcing.
      • Solve issues that may arise along the way

      To successfully partner with other departments in your organization:

      • Acknowledge that they are busy. Like IT, they have multiple competing priorities.
      • Present your needs and prioritize them. Create a list of what you are looking for and then be willing to just pick your top need. Work with the other department to decide what needs can and cannot be met.
      • Present the business case. Emphasize how partnering is mutually beneficial. For example, illustrate to Marketing that promoting a strong brand with candidates will improve the organization’s overall reputation because often, candidates are customers.
      • Be reasonable and patient. You are asking for help, so be moderate in your expectations and flexible in working with your partner.

      Info-Tech Insight

      Encourage your team to seek out, and learn from, employees in different divisions. Training sessions with the teams may not always be possible but one-on-one chats can be just as effective and may be better received.

      5.1 Review the effectiveness of existing sourcing programs

      1. As a group review the description of each program as defined on previous slides. Ensure that everyone understands the definitions.
      2. In your workbook, look for the cell Internal Talent Mobility under the title; you will find five rows with the following
      • This program is formally structured and documented.
      • This program is consistently applied across the organization.
      • Talent is sourced this way on an ad hoc basis.
      • Our organization currently does not source talent this way.
      • There are metrics in place to assess the effectiveness of this program.
    • Ask everyone in the group if they agree with the statement for each column; once everyone has had a chance to answer each of the questions, discuss any discrepancies which exist.
    • After coming to a consensus, record the answers.
    • Repeat this process for the other four sourcing programs (social media, employee referral program, alumni network program, and campus recruiting program).
    • InputOutput
      • Existing knowledge on sourcing approach
      • Low usage sourcing methods identified for development
      MaterialsParticipants
      • Workbook
      • Hiring Managers

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      Interviews are the most often used yet poorly executed hiring tool.

      Create a high-quality interview process to improve candidate assessment

      Everyone believes they’re a great interviewer; self-assess your techniques, and “get real” to get better

      If you…

      • Believe everything the candidate says.
      • Ask mostly hypothetical questions: "What would you do in a situation where…"
      • Ask gimmicky questions: "If you were a vegetable, what vegetable would you be?"
      • Ask only traditional interview questions: "What are your top three strengths?”
      • Submit to a first impression bias.
      • Have not defined what you are looking for before the interview.
      • Ignore your gut feeling in an attempt to be objective.
      • Find yourself loving a candidate because they are just like you.
      • Use too few or too many interviewers in the process.
      • Do not ask questions to determine the motivational fit of the candidate.
      • Talk more than the interviewee.
      • Only plan and prepare for the interview immediately before it starts.

      …then stop. Use this research!

      Most interviewers are not effective, resulting in many poor hiring decisions, which is costly and counter-productive

      Most interviewers are not effective…

      • 82% of organizations don’t believe they hire highly talented people (Trost, 2022).
      • Approximately 76% of managers and HR representatives that McLean & Company interviewed agreed that the majority of interviewers are not very effective.
      • 66% of hiring managers come to regret their interview-based hiring decisions (DDI, 2021).

      …because, although everyone knows interviewing is a priority, most don’t make it one.

      • Interviewing is often considered an extra task in addition to an employee’s day-to-day responsibilities, and these other responsibilities take precedence.
      • It takes time to effectively design, prepare for, and conduct an interview.
      • Employees would rather spend this time on tasks they consider to be an immediate priority.

      Even those interviewers who are good at interviewing, may not be good enough.

      • Even a good interviewer can be fooled by a great interviewee.
      • Some interviewees talk the talk, but don’t walk the walk. They have great interviewing abilities but not the skills required to be successful in the specific position for which they are interviewing.
      • Even if the interviewer is well trained and prepared to conduct a strong interview, they can get caught up with an interviewee that seems very impressive on the surface, and end up making a bad hire.

      Preparing the Perfect Interview

      Step 5: Define decision rights

      Establish decision-making authority and veto power to mitigate post-interview conflicts over who has final say over a candidate’s status.

      Follow these steps to create a positive interview experience for all involved.

      Step 1: Define the ideal candidate profile; determine the attributes of the ideal candidate and their relative importance

      Define the attributes of the ideal candidate…

      Ideal candidate = Ability to do the job + Motivation to do the job + Fit

      Competencies

      • Education
      • Credentials
      • Technical skills
      • Career path
      • Salary expectations
      • Passion
      • Potential
      • Personality
      • Managerial style/preference

      Experiences

      • Years of service
      • Specific projects
      • Industry

      Data for these come from:

      • Interviews
      • Personality tests
      • Gut instinct or intuition

      Data for these come from:

      • Resumes
      • Interviews
      • Exercises and tests
      • References

      Caution: Evaluating for “organizational or cultural fit” can lead to interviewers falling into the trap of the “like me” bias, and excluding diverse candidates.

      …then determine the importance of the attributes.

      Non-negotiable = absolutely required for the job!

      Usually attributes that are hard to train, such as writing skills, or expensive to acquire after hire, such as higher education or specific technical skills.

      An Asset

      Usually attributes that can be trained, such as computer skills. It’s a bonus if the new hire has it.

      Nice-to-have

      Attributes that aren’t necessary for the job but beneficial. These could help in breaking final decision ties.

      Deal Breakers: Also discuss and decide on any deal breakers that would automatically exclude a candidate.

      The job description is not enough; meet with stakeholders to define and come to a consensus on the ideal candidate profile

      Definition of the Ideal Candidate

      • The Hiring Manager has a plan for the new hire and knows the criteria that will best fulfill that mandate.
      • The Executive team may have specific directives for what the ideal candidate should look like, depending on the level and critical nature of the position.
      • Industry standards, which are defined by regulatory bodies, are available for some positions. Use these to identify skills and abilities needed for the job.
      • Competitor information such as job descriptions and job reviews could provide useful data about a similar role in other organizations.
      • Exit interviews can offer insight into the most challenging aspects of the job and identify skills or abilities needed for success.
      • Current employees who hold the same or a similar position can explain the nuances of the day-to-day job and what attributes are most needed on the team.

      “The hardest work is accurately defining what kind of person is going to best perform this job. What are their virtues? If you’ve all that defined, the rest is not so tough.”

      – VP, Financial Services

      Use a scorecard to document the ideal candidate profile and help you select a superstar

      1. Download the Workbook and go to tab 6.1.
      2. Document the desired attributes for each category of assessment: Competencies, Experiences, Fit, and Motivation. You can find an Attribute Library on the next tab.
      3. Rank each attribute by level of priority: Required, Asset, or Nice-to-Have.
      4. Identify deal breakers that would automatically disqualify a candidate from moving forward.
      InputOutput
      • Job description
      • Stakeholder input
      • Ideal candidate persona
      MaterialsParticipants
      • Workbook
      • Hiring Managers

      To identify questions for screening interviews, use the Screening Interview Template

      A screening interview conducted by phone should have a set of common questions to identify qualified candidates for in-person interviews.

      The Screening Interview Template will help you develop a screening interview by providing:

      • Common screening questions that can be modified based on organizational needs and interview length.
      • Establishing an interview team.
      • A questionnaire format so that the same questions are asked of all candidates and responses can be recorded.

      Once completed, this template will help you or HR staff conduct candidate screening interviews with ease and consistency. Always do screening interviews over the phone or via video to save time and money.

      Info-Tech Insight

      Determine the goal of the screening interview – do you want to evaluate technical skills, communication skills, attitude, etc.? – and create questions based on this goal. If evaluating technical skill, have someone with technical competency conduct the interview.

      The image contains screenshots of the Screening Interview Template.

      Step 2: Choose interview types and techniques that best assess the ideal candidate attributes listed on the position scorecard

      There is no best interview type or technique for assessing candidates, but there could be a wrong one depending on the organization and job opening.

      • Understanding common interviewing techniques and types will help inform your own interviewing strategy and interview development.
      • Each interview technique and type has its own strengths and weakness and can be better suited for a particular organizational environment, type of job, or characteristic being assessed.
      The image contains a diagram to demonstrate the similarities and differences of Interview Technique and Interview Type. There is a Venn Diagram, the right circle is labelled: Interview Technique, and the right is: Interview Type. There is a double sided arrow below that has the following text: Unstructure, Semi-Structured, and Structured.

      Unstructured: A traditional method of interviewing that involves no constraints on the questions asked, no requirements for standardization, and a subjective assessment of the candidate. This format is the most prone to bias.

      Semi-Structured: A blend of structured and unstructured, where the interviewer will ask a small list of similar questions to all candidates along with some questions pertaining to the resume.

      Structured: An interview consisting of a standardized set of job-relevant questions and a scoring guide. The goal is to reduce interviewer bias and to help make an objective and valid decision about the best candidate.

      No matter which interview types or techniques you use, aim for it to be as structured as possible to increase its validity

      The validity of the interview increases as the degree of interview structure increases.

      Components of a highly structured interview include:

      1. Interview questions are derived from a job analysis (they are job related).
      2. Interview questions are standardized (all applicants are asked the same questions).
      3. Prompting, follow-up questioning, probing, and/or elaboration on questions are limited. Try to identify all prompts, follow-ups, and probes beforehand and include them in the interview guide so that all candidates get the same level of prompting and probing.
      4. Interview questions focus on behaviors or work samples rather than opinions or self-evaluations.
      5. Interviewer access to ancillary information (e.g. resumes, letters of reference, test scores, transcripts) is controlled. Sometimes limiting access to these documents can limit interviewer biases.
      6. Questions from the candidate are not allowed until after the interview. This allows the interviewer to stay on track and not go off the protocol.
      7. Each answer is rated during the interview using a rating scale tailored to the question (this is preferable to rating dimensions at the end of the interview and certainly preferable to just making an overall rating or ranking at the end).
      8. Rating scales are “anchored” with behavioral examples to illustrate scale points (e.g. examples of a “1,” “3,” or “5” answer).
      9. Total interview score is obtained by summing across scores for each of the questions.

      The more of these components your interview has, the more structured it is, and the more valid it will be.

      Step 3: Prepare interview questions to assess the attributes you are looking for in a candidate

      The purpose of interviewing is to assess, not just listen. Questions are what help you do this.

      Preparing questions in advance allows you to:

      • Match each question to a position requirement (included in your scorecard) to ensure that you assess all required attributes. Everything assessed should be job relevant!
      • Determine each question’s weighting, if applicable.
      • Give each candidate a chance to speak to all their job-relevant attributes.
      • Keep records should an unselected candidate decide to contest the decision.

      If you don’t prepare in advance:

      • You’ll be distracted thinking about what you are going to ask next and not be fully listening.
      • You likely won’t ask the same questions of all candidates, which impacts the ability to compare across candidates and doesn’t provide a fair process for everyone.
      • You likely won’t ask the questions you need to elicit the information needed to make the right decision.
      • You could ask illegal questions (see Acquire the Right Hires with Effective Interviewing for a list of questions not to ask in an interview).

      Use the Interview Question Planning Guide tab in the Candidate Interview Strategy and Planning Guide to prepare your interview questions.

      Use these tips to draft interview questions:

      • Use job analysis output, in particular the critical incident technique, to develop structured interview questions.
      • Search online or in books for example interview questions for the target position to inform interview question development. Just remember that candidates access these too, so be sure to ask for specific examples, include probing questions, and adapt or modify questions to change them.
      • Situational questions: The situation should be described in sufficient detail to allow an applicant to visualize it accurately and be followed by “what would you do?” Scoring anchors should reflect effective, typical, and ineffective behaviors.
      • Behavioral questions: Should assess a behavioral dimension (e.g. meeting deadlines) and apply to a variety of situations that share the underlying dimension (e.g. at work or school). Scoring anchors should be applicable to a variety of situations and reflect effective, typical, and ineffective behavior.

      Conduct an effective screening interview by listening to non-verbal cues and probing

      Follow these steps to conduct an effective screening interview:

      Introduce yourself and ask if now is a good time to talk. (Before calling, prepare your sales pitch on the organization and the position.)

      You want to catch candidates off guard so that they don’t have time to prepare scripted answers; however, you must be courteous to their schedule.

      Provide an overview of the position, then start asking pre-set questions. Take a lot of notes.

      It is important to provide candidates with as much information as possible about the position – they are deciding whether they are interested in the role as much as you are deciding whether they are suitable.

      Listen to how the questions are answered. Ask follow-up questions when appropriate and especially if the candidate seems to be holding something back.

      If there are long pauses or the candidate’s voice changes, there may be something they aren’t telling you that you should know.

      Be alert to inconsistencies between the resume and answers to the questions and address them.

      It’s important to get to the bottom of issues before the in-person interview. If dates, titles, responsibilities, etc. seem to be inconsistent, ask more questions.

      Ask candidates about their salary expectations.

      It’s important to ensure alignment of the salary expectations early on. If the expectations are much higher than the range, and the candidate doesn’t seem to be open to the lower range, there is no point interviewing them. This would be a waste of everyone’s time.

      Answer the applicant’s questions and conclude the interview.

      Wait until after the interview to rate the applicant.

      Don’t allow yourself to judge throughout the interview, or it could skew questions. Rate the applicant once the interview is complete.

      When you have a shortlist of candidates to invite to an in-person interview, use the Candidate Communication Template to guide you through proper phone and email communications.

      Don’t just prepare top-level interview questions; also prepare probing questions to probe to gain depth and clarity

      Use probing to drill down on what candidates say as much as possible and go beyond textbook answers.

      Question (traditional): “What would you identify as your greatest strength?”

      Answer: Ability to work on a team.

      Top-level interview questions set the stage for probing.

      Your interview script should contain the top two levels of questions in the pyramid and a few probes that you will likely need to ask. You can then drill down further depending on the candidate’s answers.

      Follow-Up Question:

      “Can you outline a particular example when you were able to exercise your teamwork skills to reach a team goal?”

      Probing questions start with asking what, when, who, why, and how, and gain insight into a candidate’s thought process, experiences, and successes.

      Probing Level 1:

      Probe around the what, how, who, when, and where. “How did you accomplish that?”

      How to develop probes? By anticipating the kinds of responses that candidates from different backgrounds or with different levels of experience are likely to give as a response to an interview question. Probes should provide a clear understanding of the situation, the behavior, and the outcome so that the response can be accurately scored. Common probes include:

      • What did you do? What was the outcome?
      • When did this take place (and how long did it take)?
      • Who was involved?
      • Were you leading or being led?
      • How did you accomplish what you did?
      • Why did you take those steps?

      Tailor probes to the candidate’s answers to evoke meaningful and insightful responses.

      Probing Level 2:

      Allow for some creativity.

      “What would you do differently if you were to do it again?”

      Conduct effective interviews and assessments

      Mitigate inherent biases of assessors by integrating formal assessments with objective anchors and clear criteria to create a more inclusive process.

      Consider leveraging behavioral interview questions in your interview to reduce bias.

      • In the past, companies were pushing the boundaries of the conventional interview, using unconventional questions to find top talent, e.g. “what color is your personality?” The logic was that the best people are the ones who don’t necessarily show perfectly on a resume, and they were intent on finding the best.
      • However, many companies have stopped using these questions after extensive statistical analysis revealed there was no correlation between candidates’ ability to answer them and their future performance on the job.
      • Asking behavioral interview questions based on the competency needs of the role is the best way to uncover if the candidates will be able to execute on the job.

      Assessments are created by people that have biases. This often means that assessments can be biased, especially with preferences towards a Western perspective. Even if the same assessments are administered, the questions will be interpreted differently by candidates with varying cultural backgrounds and lived experiences. If assessments do not account for this, it ultimately leads to favoring the answers of certain demographic groups, often ones similar to those who developed the assessment.

      Creating an interview question scorecard

      Attribute you are evaluating

      Probing questions prepared

      Area to take notes

      The image contains a screenshot of an Interview question scorecard.

      Exact question you will ask

      Place to record score

      Anchored scale with definitions of a poor, ok and great answer

      Step 4: Assemble an interview team

      HR and the direct reporting supervisor should always be part of the interview. Make a good impression with a good interview team.

      The must-haves:

      • The Future Manager should always be involved in the process. They should be comfortable with the new hire’s competencies and fit.
      • Human Resources should always be involved in the process – they maintain consistency, legality, and standardization. It’s their job to know the rules and follow them. HR may coordinate and maintain policy standards and/or join in assessing the candidate.
      • There should always be more than just one interviewer, even if it is not at the same time. This helps keep the process objective, allows for different opinions, and gives the interviewee exposure to multiple individuals in the company. But, try to limit the number of panel members to four or less.

      “At the end of the day, it’s the supervisor that has to live with the person, so any decision that does not involve the supervisor is a very flawed process.” – VP, Financial Services

      The nice-to-haves:

      • Future colleagues can offer benefits to both the interviewee and the colleague by:
        • Giving the candidate some insight into what their day-to-day job would be.
        • Relaxing the candidate; allowing for a less formal, less intimidating conversation.
        • Introducing potential teammates for a position that is highly collaborative.
        • Offering the interviewer an excellent professional development opportunity – a chance to present their understanding of what they do.
      • Executives should take part in interviewing for executive hiring, individuals that will report to an executive, or for positions that are extremely important. Executive time is scarce and expensive, so only use it when absolutely necessary.

      Record the interview team details in the Candidate Interview Strategy and Planning Guide template.

      Assign interviewers roles inside and outside the actual interview

      Define Interview Process Roles

      Who Should… Contact candidates to schedule interviews or communicate decisions?

      Who Should… Be responsible for candidate welcomes, walk-outs, and hand-offs between interviews?

      Who Should… Define and communicate each stakeholder’s role?

      Who Should… Chair the preparation and debrief meetings and play the role of the referee when trying to reach a consensus?

      Define Interview Roles

      • Set a role for each interviewer so they know what to focus on and where they fit into the process (e.g. Interviewer A will assess fit). Don’t ad hoc the process and allow everyone to interview based on their own ideas.
      • Consider interviewer qualifications and the impact of the new employee on each interviewer, when deciding the roles of each interviewer (i.e. who will interview for competency and who will interview for fit).
        • For example, managers may be most impacted by technical competencies and should be the interviewer to evaluate the candidate for technical competency.

      “Unless you’ve got roles within the panel really detailed and agreed upon, for example, who is going to take the lead on what area of questions, you end up with a situation where nobody is in charge or accountable for the final interview assessment." – VP, Financial Services

      Info-Tech Insight

      Try a Two Lens Assessment: One interviewer assesses the candidate as a project leader while another assesses them as a people leader for a question such as “Give me an example of when you exercised your leadership skills with a junior team member.”

      Step 5: Set decision rights in stone and communicate them in advance to manage stakeholder expectations and limit conflict

      All interviewers must understand their decision-making authority prior to the interview. Misunderstandings can lead to resentment and conflict.

      It is typical and acceptable that you, as the direct reporting manager, should have veto power, as do some executives.

      Veto Power

      Direct Supervisor or Manager

      Decision Makers: Must Have Consensus

      Other Stakeholders

      Direct Supervisor’s Boss

      Direct Supervisor

      Contributes Opinion

      HR Representative

      Peer

      After the preliminary interview, HR should not be involved in making the decision unless they have a solid understanding of the position.

      Peers can make an unfair assessment due to perceived competition with a candidate. Additionally, if a peer doesn’t want a candidate to be hired and the direct supervisor does hire the candidate, the peer may hold resentment against that candidate and set the team up for conflict.

      The decision should rest on those who will interact with the candidate on a daily basis and who manage the team or department that the candidate will be joining.

      The decisions being made can include whether or not to move a candidate onto the next phase of the hiring process or a final hiring decision. Deciding decision rights in advance defines accountability for an effective interview process.

      Create your interview team, assessments, and objective anchor scale

      1. Download the Behavioral Interview Question Library as a reference.
      2. On tab 9 of your workbook, document all the members of the team and their respective roles in the interview process. Fill in the decision-making authority section to ensure every team member is held accountable to their assigned tasks and understands how their input will be used.
      3. For each required attribute in the Ideal Candidate Scorecard, chose one to two questions from the library that can properly evaluate that attribute.
      4. Copy and paste the questions and probing questions into the Interview Guide Template.
      5. Create an objective anchor scale and clearly define what a poor, ok, and great answer to each question is.

      Download the Behavioral Interview Question Library

      Input Output
      • List of possible team members
      • Ideal Candidate Scorecard
      • Finalized hiring panel
      • Finalized interview and assessment process
      Materials Participants
      • IT Behavioral Interview Question Library
      • Workbook
      • Interview Guide Template
      • IT leadership team
      • IT staff members

      Conduct an effective, professional, and organized in-person interview

      Give candidates a warm, genuine greeting. Introduce them to other interviewers present. Offer a drink. Make small talk.

      “There are some real advantages to creating a comfortable climate for the candidate; the obvious respect for the individual, but people really let their guard down.”

      – HR Director, Financial Services

      Give the candidate an overview of the process, length, and what to expect of the interview. Indicate to the candidate that notes will be taken during the interview.

      If shorter than an hour, you probably aren’t probing enough or even asking the right questions. It also looks bad to candidates if the interview is over quickly.

      Start with the first question in the interview guide and make notes directly on the interview guide (written or typed) for each question.

      Take lots of notes! You think you’ll remember what was said, but you won’t. It also adds transparency and helps with documentation.

      Ask the questions in the order presented for interview consistency. Probe and clarify as needed (see next slide).

      Keep control of the interview by curtailing any irrelevant or long-winded responses.

      After all interview questions are complete, ask candidates if there was anything about their qualifications that was missed that they want to highlight.

      Lets you know they understand the job and gives them the feeling they’ve put everything on the table.

      Ask if the candidate has any questions. Respond to the questions asked.

      Answer candidate questions honestly because fit works both ways. Ensure candidates leave with a better sense of the job, expectations, and organizational culture.

      Review the compensation structure for the position and provide a realistic preview of the job and organization.

      Provide each candidate with a fair chance by maintaining a consistent interview process.

      Tell interviewees what happens next in the process, the expected time frame, and how they will be informed of the outcome. Escort them out and thank them for the interview.

      The subsequent slides provide additional detail on these eight steps to conducting an effective interview.

      Avoid these common biases and mistakes

      Common Biases

      Like-me effect: An often-unconscious preference for, and unfairly positive evaluation of, a candidate based on shared interests, personalities, and experiences, etc.

      Status effect: Overrating candidates based on the prestige of previously held positions, titles, or schools attended.

      Recency bias: Placing greater emphasis on interviews held closer to the decision-making date.

      Contrast effect: Rating candidates relative to those who precede or follow them during the interview process, rather than against previously determined data.

      Solution

      Assess candidates by using existing competency-based criteria.

      Common Mistakes

      Negative tone: Starting the interview on a negative or stressful note may derail an otherwise promising candidate.

      Poor interview management: Letting the candidate digress may leave some questions unanswered and reduce the interview value.

      Reliance of first impressions: Basing decisions on first impressions undermines the objectivity of competency-based selection.

      Failure to ask probing questions: Accepting general answers without asking follow-up questions reduces the evidentiary value of the interview.

      Solution

      Follow the structured interview process you designed and practiced.

      Ask the questions in the order presented in the interview guide, and probe and clarify as needed

      Do...

      Don’t…

      Take control of the interview by politely interrupting to clarify points or keep the interviewee on topic.

      Use probing to drill down on responses and ask for clarification. Ask who, what, when, why, and how.

      Be cognizant of confidentiality issues. Ask for a sample of work from a past position.

      Focus on knowledge or information gaps from previous interviews that need to be addressed in the interview.

      Ensure each member of a panel interview speaks in turn and the lead is given due respect to moderate.

      Be mean when probing. Intimidation actually works against you and is stressful for candidates. When you’re friendly, candidates will actually open up more.

      Interrupt or undermine other panel members. Their comments and questions are just as valid as yours are, and treating others unprofessionally gives a bad impression to the candidate.

      Ask illegal questions. Questions about things like religion, disability, and marital and family status are off limits.

      When listening to candidate responses, watch for tone, body language, and red flags

      Do...

      While listening to responses, also watch out for red and yellow flags.

      Listen to how candidates talk about their previous bosses – you want it to be mainly positive. If their discussion of past bosses reflects a strong sense of self-entitlement or a consistent theme of victimization, this could be a theme in their behavior and make them hard to work with.

      Red Flag

      A concern about something that would keep you from hiring the person.

      Yellow Flag

      A concern that needs to be addressed, but wouldn’t keep you from hiring the person.

      Pay attention to body language and tone. They can tell you a lot about candidate motivation and interest.

      Listen to what candidates want to improve. It’s an opportunity to talk about development and advancement opportunities in the organization.

      Not all candidates have red flags, but it is important to keep them in mind to identify potential issues with the candidate before they are hired.

      Don’t…

      Talk too much! You are there to listen. Candidates should do about 80% of the talking so you can adequately evaluate them. Be friendly, but ensure to spend the time allotted assessing, not chatting.

      If you talk too much, you may end up hiring a weak candidate because you didn’t perceive weaknesses or not hire a strong candidate because you didn’t identify strengths.

      What if you think you sense a red or yellow flag?

      Following the interview, immediately discuss the situation with others involved in the recruitment process or those familiar with the position, such as HR, another hiring manager, or a current employee in the role. They can help evaluate if it’s truly a matter of concern.

      Increase hiring success: Give candidates a positive perception of the organization in the interview

      Great candidates want to work at great organizations.

      When the interviewer makes a positive impression on a candidate and provides a positive impression of the organization it carries forward after they are hired.

      In addition, better candidates can be referred over the course of time due to higher quality networking.

      As much as choosing the right candidate is important to you, make sure the right candidate wants to choose you and work for your organization.

      The image contains a screenshot of a graph to demonstrate the percent of successful hires relates strongly to interviewers giving candidates a positive perception of the organization.

      Interview advice seems like common sense, but it’s often not heeded, resulting in poor interviews

      Don’t…

      Believe everything candidates say. Most candidates embellish and exaggerate to find the answers they think you want. Use probing to drill down to specifics and take them off their game.

      Ask gimmicky questions like “what color is your soul?” Responses to these questions won’t give you any information about the job. Candidates don’t like them either!

      Focus too much on the resume. If the candidate is smart, they’ve tailored it to match the job posting, so of course the person sounds perfect for the job. Read it in advance, highlight specific things you want to ask, then ignore it.

      Oversell the job or organization. Obviously you want to give candidates a positive impression, but don’t go overboard because this could lead to unhappy hires who don’t receive what you sold them. Candidates need to evaluate fit just as much as you.

      Get distracted by a candidate’s qualifications and focus only on their ability to do the job. Just because they are qualified does not mean they have the attitude or personality to fit the job or culture.

      Show emotion at any physical handicap. You can’t discriminate based on physical disability, so protect the organization by not drawing attention to it. Even if you don’t say anything, your facial expression may.

      Bring a bad day or excess baggage into the interview, or be abrupt, rushed, or uninterested in the interview. This is rude behavior and will leave a negative impression with candidates, which could impact your chances of hiring them.

      Submit to first impression bias because you’ll spend the rest of the interview trying to validate your first impression, wasting your time and the candidate’s. Remain as objective as possible and stick to the interview guide to stay focused on the task at hand.

      “To the candidate, if you are meeting person #3 and you’re hearing questions that person #1 and #2 asked, the company doesn’t look too hot or organized.” – President, Recruiting Firm

      Practice behavioral interviews

      1. In groups of at least three:
      • Assign one person to act as the manager conducting the interview, a second person to act as the candidate, and a third to observe.
      • The observer will provide feedback to the manager at the end of the role play based on the information you just learned.
      • Observers – please give feedback on the probing questions and body language.
    • Managers, select an interview question from the list your group put together during the previous exercise. Take a few minutes to think about potential probing questions you could follow up with to dig for more information.
    • Candidates, try to act like a real candidate. Please don’t make it super easy on the managers – but don’t make it impossible either!
    • Once the question has been asked and answered:
      • How did it go?
      • Were you able to get the candidate to speak in specifics rather than generalities? What tips do you have for others?
      • What didn’t go so well? Any surprises?
      • What would you do differently next time?
      • If this was a real hiring situation, would the information you got from just that one question help you make a hiring decision for the role?
    • Now switch roles and select a new interview question to use for this round. Repeat until everyone has had a chance to practice.
    • Input Output
      • Interview questions and scorecard
      • Practice interviews
      Materials Participants
      • IT Behavioral Interview Question Library
      • Workbook
      • Hiring Manager
      • Interview Panel Members

      Download the Behavioral Interview Question Library

      Record best practices, effective questions, and candidate insights for future use and current strategy

      Results and insights gained from evaluations need to be recorded and assessed to gain value from them going forward.

      • To optimize evaluation, all feedback should be forwarded to a central point so that the information can be shared with all stakeholders. HR can serve in this role.
      • Peer evaluations should be shared shortly after the interview. Immediate feedback that represents all the positive and negative responses is instructional for interviewers to consider right away.
      • HR can take a proactive approach to sharing information and analyzing and improving the interview process in order to collaborate with hiring departments for better talent management.
      • Collecting information about effective and ineffective interview questions will guide future interview revision and development efforts.

      Evaluations Can Inform Strategic Planning and Professional Development

      Strategic Planning

      • Survey data can be used to inform strategic planning initiatives in recruiting.
      • Use the information to build a case to the executive team for training, public relations initiatives, or better candidate management systems.

      Professional Development

      • Survey data from all evaluations should be used to inform future professional development initiatives.
      • Interview areas where all team members show weaknesses should be training priorities.
      • Individual weaknesses should be integrated into each professional development plan.

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Develop a Comprehensive Onboarding Plan

      Drive employee engagement and retention with a robust program that acclimates, guides, and develops new hires.

      Onboarding should pick up where candidate experience leaves off

      Do not confuse onboarding with orientation

      Onboarding ≠ Orientation

      Onboarding is more than just orientation. Orientation is typically a few days of completing paperwork, reading manuals, and learning about the company’s history, strategic goals, and culture. By contrast, onboarding is three to twelve months dedicated to welcoming, acclimating, guiding, and developing new employees – with the ideal duration reflecting the time to productivity for the role.

      A traditional orientation approach provides insufficient focus on the organizational identification, socialization, and job clarity that a new hire requires. This is a missed opportunity to build engagement, drive productivity, and increase organizational commitment. This can result in early disengagement and premature departure.

      Effective onboarding positively impacts the organization and bottom line

      Over the long term, effective onboarding has a positive impact on revenue and decreases costs.

      The benefits of onboarding:

      • Save money and frustration
        • Shorten processing time, reduce administrative costs, and improve compliance.
      • Boost revenue
        • Help new employees become productive faster – also reduce the strain on existing employees who would normally be overseeing them or covering a performance shortfall.
      • Drive engagement and reduce turnover
        • Quickly acclimate new hires to your organization’s environment, culture, and values.
      • Reinforce culture and employer brand
        • Ensure that new hires feel a connection to the organization’s culture.

      Onboarding drives new hire engagement from day one

      The image contains a graph to demonstrate the increase in overall engagement in relation to onboarding.

      When building an onboarding program, retain the core aims: acclimate, guide, and develop

      The image contains a picture of a circle with a smaller circle inside it, and a smaller circle inside that one. The smallest circle is labelled Acclimate, the medium sized circle is labelled Guide, and the biggest circle is labelled Develop.

      Help new hires feel connected to the organization by clearly articulating the mission, vision, values, and what the company does. Help them understand the business model, the industry, and who their competitors are. Help them feel connected to their new team members by providing opportunities for socialization and a support network.

      Help put new hires on the path to high performance by clearly outlining their role in the organization and how their performance will be evaluated.

      Help new hires receive the experience and training they require to become high performers by helping them build needed competencies.

      We recommend a three-to-twelve-month onboarding program, with the performance management aspect of onboarding extending out to meet the standard organizational performance management cycle.

      Info-Tech Insight

      The length of the onboarding program should align with the average time to productivity for the role(s). Consider the complexity of the role, the industry, and the level of the new hire when determining program length.

      For example, call center workers who are selling a straight-forward product may only require a three-month onboarding, while senior leaders may require a year-long program.

      Watch for signs that you aren’t effectively acclimating, guiding, and developing new hires

      Our primary and secondary research identified the following as the most commonly stated reasons why employees leave organizations prematurely. These issues will be addressed throughout the next section.

      Acclimate

      Guide

      Develop

      • Onboarding experience is misaligned from the employer’s brand.
      • Socialization and/or integration into the existing culture is left to the employee.
      • Key role expectations or role usefulness is not clearly communicated.
      • Company strategy is unclear.
      • Opportunities for advancement are unclear.
      • Coaching, counseling, and/or support from co-workers and/or management is lacking.
      • The organization fails to demonstrate that it cares about the new employee’s needs.

      “Onboarding is often seen as an entry-level HR function. It needs to rise in importance because it’s the first impression of the organization and can be much more powerful than we sometimes give it credit for. It should be a culture building and branding program.” – Doris Sims, SPHR, The Succession Consultant, and Author, Creative Onboarding Programs

      Use the onboarding tabs in the workbook to evaluate and redesign the onboarding program

      1. On tab 10, brainstorm challenges that face the organization's current onboarding program. Identify if they fall into the "acclimate," "guide," or "develop" category. Next, record the potential impact of this challenge on the overall effectiveness of the onboarding program.
      2. On tab 11, record each existing onboarding activity. Then, identify if that activity will be kept or if it should be retired. Next, document if the activity fell into the "acclimate," "guide," or "develop" category.
      3. On tab 12, document gaps that currently exist in the onboarding program. Modify the timeline along the side of the tab to ensure it reflects the timeline you have identified.
      4. On tab 13, document the activities that will occur in the new onboarding program. This should be a combination of current activities that you want to retain and new activities that will be added to address the gaps noted on tab 12. For each activity, identify if it will fall in the acclimate, guide, or develop section. Add any additional notes. Before moving on, make sure that there are no categories that have no activities (e.g. no guide activities).
      Input Output
      • Existing onboarding activities
      • Determine new onboarding activities
      • Map out onboarding responsibilities
      Materials Participants
      • Workbook
      • Hiring Managers
      • HR

      Review the administrative aspects of onboarding and determine how to address the challenges

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Some paperwork cannot be completed digitally (e.g. I-9 form in the US).

      Where possible, complete forms with digital signatures (e.g. DocuSign). Where not possible, begin the process earlier and mail required forms to employees to sign and return, or scan and email for the employee to print and return.

      Required compliance training material is not available virtually.

      Seek online training options where possible. Determine the most-critical training needs and prioritize the replication of materials in audio/video format (e.g. recorded lecture) and distribute virtually.

      Employees may not have access to their equipment immediately due to shipping or supply issues.

      Delay employee start dates until you can set them up with the proper equipment and access needed to do their job.

      New hires can’t get answers to their questions about benefits information and setup.

      Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits.

      Info-Tech Insight

      One of the biggest challenges for remote new hires is the inability to casually ask questions or have conversations without feeling like they’re interrupting. Until they have a chance to get settled, providing formal opportunities for questions can help address this.

      Review how company information is shared during onboarding and how to address the challenges

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Key company information such as organizational history, charts, or the vision, mission, and values cannot be clearly learned by employees on their own.

      Have the new hire’s manager call to walk through the important company information to provide a personal touch and allow the new hire to ask questions and get to know their new manager.

      Keeping new hires up to date on crisis communications is important, but too much information may overwhelm them or cause unnecessary stress.

      Sharing the future of the organization is a critical part of the company information stage of onboarding and the ever-changing nature of the COVID-19 crisis is informing many organizations’ future right now. Be honest but avoid over-sharing plans that may change.

      New hires can’t get answers to their questions about benefits information and setup.

      Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits.

      Review the socialization aspects of onboarding and determine how to address the challenges

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Team introductions via a team lunch or welcome event are typically done in person.

      Provide managers with a calendar of typical socialization events in the first few weeks of onboarding and provide instructions and ideas for how to schedule replacement events over videoconferencing.

      New hires may not have a point of contact for informal questions or needs if their peers aren’t around them to help.

      If it doesn’t already exist, create a virtual buddy program and provide instructions for managers to select a buddy from the new hire’s team. Explain that their role is to field informal questions about the company, team, and anything else and that they should book weekly meetings with the new hire to stay in touch.

      New hires will not have an opportunity to learn or become a part of the informal decision-making networks at the organization.

      Hiring managers should consider key network connections that new hires will need by going through their own internal network and asking other team members for recommendations.

      New hires will not be able to casually meet people around the office.

      Provide the employee with a list of key contacts for them to reach out to and book informal virtual coffee chats to introduce themselves.

      Adapt the Guide phase of onboarding to a virtual environment

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Performance management (PM) processes have been paused given the current crisis.

      Communicate to managers that new hires still need to be onboarded to the organization’s performance management process and that goals and feedback need to be introduced and the review process outlined even if it’s not currently happening.

      Goals and expectations differ or have been reprioritized during the crisis.

      Ask managers to explain the current situation at the organization and any temporary changes to goals and expectations as a result of new hires.

      Remote workers often require more-frequent feedback than is mandated in current PM processes.

      Revamp PM processes to include daily or bi-weekly touchpoints for managers to provide feedback and coaching for new hires for at least their first six months.

      Managers will not be able to monitor new hire work as effectively as usual.

      Ensure there is a formal approach for how employees will keep their managers updated on what they're working on and how it's going, for example, daily scrums or task-tracking software.

      For more information on adapting performance management to a virtual environment, see Info-Tech’s Performance Management for Emergency Work-From-Home research.

      Take an inventory of training and development in the onboarding process and select critical activities

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Categorize the different types of formal and informal training in the onboarding process into the following three categories. For departmental and individual training, speak to managers to understand what is required on a department and role basis:

      Organizational

      Departmental

      Individual

      For example:

      • Employee self-service overview
      • Health and safety/compliance training
      • Core competencies

      For example:

      • Software training (e.g. Salesforce)
      • Job shadowing to learn how to work equipment or to learn processes

      For example:

      • Mentoring
      • External courses
      • Support to work toward a certification

      In a crisis, not every training can be translated to a virtual environment in the short term. It’s also important to focus on critical learning activities versus the non-critical. Prioritize the training activities by examining the learning outcomes of each and asking:

      • What organizational training does every employee need to be a productive member of the organization?
      • What departmental or individual training do new hires need to be successful in their role?

      Lower priority or non-critical activities can be used to fill gaps in onboarding schedules or as extra activities to be completed if the new hire finds themselves with unexpected downtime to fill.

      Determine how onboarding training will be delivered virtually

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Who will facilitate virtual training sessions?

      • For large onboarding cohorts, consider live delivery via web conferencing where possible. This will create a more engaging training program and will allow new hires to interact with and ask questions of the presenter.
      • For individual new hires or small cohorts, have senior leaders or key personnel from across the organization record different trainings that are relevant for their role.
        • For example, training sessions about organizational culture can be delivered by the CEO or other senior leader, while sales training could be delivered by a sales executive.

        If there is a lack of resources, expertise, or time, outsource digital training to a content provider or through your LMS.

      What existing or free tools can be leveraged to immediately support digital training?

      • Laptops and PowerPoint to record training sessions that are typically delivered in-person
      • YouTube/Vimeo to host recorded lecture-format training
      • Company intranet to host links and files needed to complete training
      • Web conferencing software to host live training/orientation sessions (e.g. Webex)
      • LMS to host and track completion of learning content

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Adapt Your Onboarding Process to a Virtual Environment

      • Develop short-term solutions with a long-term outlook to quickly bring in new talent.

      Bibliography

      2021 Recruiter Nation Report. Survey Analysis, Jobvite, 2021. Web.

      “5 Global Stats Shaping Recruiting Trends.” The Undercover Recruiter, 2022. Web.

      Barr, Tavis, Raicho Bojilov, and Lalith Munasinghe. "Referrals and Search Efficiency: Who Learns What and When?" The University of Chicago Press, Journal of Labor Economics, vol. 37, no. 4, Oct. 2019. Web.

      “How to grow your team better, faster with an employee referral program.” Betterup, 10 Jan. 2022. Web.

      “Employee Value Proposition: How 25 Companies Define Their EVP.” Built In, 2021. Web.

      Global Leadership Forecast 2021. Survey Report, DDI World, 2021. Web.

      “Connecting Unemployed Youth with Organizations That Need Talent.” Harvard Business Review, 3 November 2016. Web.

      Ku, Daniel. “Social Recruiting: Everything You Need To Know for 2022.” PostBeyond, 26 November 2021. Web.

      Ladders Staff. “Shedding light on the job search.” Ladders, 20 May 2013. Web.

      Merin. “Campus Recruitment – Meaning, Benefits & Challenges.” HR Shelf, 1 February 2022. Web.

      Mobile Recruiting. Smart Recruiters, 2020. Accessed March 2022.

      Roddy, Seamus. “5 Employee Referral Program Strategies to Hire Top Talent.” Clutch, 22 April 2020. Web.

      Sinclair, James. “What The F*dge: That's Your Stranger Recruiting Budget?” LinkedIn, 11 November 2019. Web.

      “Ten Employer Examples of EVPs.” Workology, 2022. Web

      “The Higher Cost of a Bad Hire.” Robert Half, 15 March 2021. Accessed March 2022.

      Trost, Katy. “Hiring with a 90% Success Rate.” Katy Trost, Medium, 8 August 2022. Web.

      “Using Social Media for Talent Acquisition.” SHRM, 20 Sept. 2017. Web.

      Enable Product Delivery – Executive Leadership Workshop

      • Buy Link or Shortcode: {j2store}353|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.
      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.

      Our Advice

      Critical Insight

      • Empowered product managers and product owners are the key to ensuring your delivery teams are delivering the right value at the right time to the right stakeholders.
      • Establishing operationally aligned product families helps bridge the gap between enterprise priorities and product enhancements.
      • Leadership must be aligned to empower and support Agile values and product teams to unlock the full value realization within your organization.

      Impact and Result

      • Common understanding of product management and Agile delivery.
      • Commitment to support and empower product teams.

      Enable Product Delivery – Executive Leadership Workshop Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Enabling Product Delivery – Executive workshop to align senior leadership with their transition to product management and delivery.

      • Enabling Product Delivery – Executive Workshop Storyboard

      2. Enabling Product Delivery –Executive Workshop Outcomes.

      • Enabling Product Delivery – Executive Workshop Outcomes
      [infographic]

      Workshop: Enable Product Delivery – Executive Leadership Workshop

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understanding Your Top Challenges

      The Purpose

      Understand the drivers for your product transformation.

      Key Benefits Achieved

      Define the drivers for your transition to product-centric delivery.

      Activities

      1.1 What is driving your organization to become product focused?

      Outputs

      List of challenges and drivers

      2 Transitioning From Projects to Product-Centric Delivery

      The Purpose

      Understand the product transformation journey and differences.

      Key Benefits Achieved

      Identify the cultural, behavioral, and leadership changes needed for a successful transformation.

      Activities

      2.1 Define the differences between projects and product delivery

      Outputs

      List of differences

      3 Enterprise Agility and the Value of Change

      The Purpose

      Understand why smaller iterations increase value realization and decrease accumulated risk.

      Key Benefits Achieved

      Leverage smaller iterations to reduce time to value and accumulated risk to core operations.

      Activities

      3.1 What is business agility?

      Outputs

      Common understanding about the value of smaller iterations

      4 Defining Products and Product Management in Your Context

      The Purpose

      Establish an organizational starting definition of products.

      Key Benefits Achieved

      Tailor product management to meet the needs and vision of your organization.

      Activities

      4.1 What is a product? Who are your consumers?

      4.2 Identify enablers and blockers of product ownership

      4.3 Define a set of guiding principles for product management

      Outputs

      Product definition

      List of enablers and blockers of product ownership

      Set of guiding principles for product management

      5 Connecting Product Management to Agile Practices

      The Purpose

      Understand the relationship between product management and product delivery.

      Key Benefits Achieved

      Optimize product management to prioritize the right changes for the right people at the right time.

      Activities

      5.1 Discussions

      Outputs

      Common understanding

      6 Commit to Empowering Agile Product Teams

      The Purpose

      Personalize and commit to supporting product teams.

      Key Benefits Achieved

      Embrace leadership and cultural changes needed to empower and support teams.

      Activities

      6.1 Your management culture

      6.2 Personal Cultural Stop, Start, and Continue

      6.3 Now, Next, Later to support product owners

      Outputs

      Your management culture map

      Personal Cultural Stop, Start, and Continue list

      Now, Next, Later roadmap

      Further reading

      Enable Product Delivery – Executive Leadership Workshop

      Strengthen product management in your organization through effective executive leadership by focusing on product teams, core capabilities, and proper alignment.

      Objective of this workshop

      To develop a common understanding and foundation for product management so we, as leaders, better understand how to lead product owners, product managers, and their teams.

      Enable Product Delivery - Executive Leadership Workshop

      Learn how enterprise agility can provide lasting value to the organization

      Clarify your role in supporting your teams to deliver lasting value to stakeholders and customers

      1. Understanding Your Top Challenges
        • Define your challenges, goals, and opportunities Agile and product management will impact.
      2. Transitioning from Projects to Product-centric Delivery
        • Understand the shift from fixed delivery to continuous improvement and delivery of value.
      3. Enterprise Agility and the Value of Change
        • Organizations need to embrace change and leverage smaller delivery cycles.
      4. Defining Your "Products" and Product Management
        • Define products in your culture and how to empower product delivery teams.
      5. Connecting Product Management to Agile Practices
        • Use product ownership to drive increased ROI into your product delivery teams and lifecycles.
      6. Commit to Empowering Agile Product Teams
        • Define the actions and changes you must make for this transformation to be successful.

      Your Product Transformation Journey

      1. Make the Case for Product Delivery
        • Align your organization with the practices to deliver what matters most
      2. Enable Product Delivery – Executive Workshop
        • One-day executive workshop – align and prepare your leadership
        • Audience: Senior executives and IT leadership.
          Size: 8-16 people
          Time: 6 hours
      3. Deliver on Your Digital Product Vision
        • Enhance product backlogs, roadmapping, and strategic alignment
        • Audience: Product Owners/Mangers
          Size: 10-20 people
          Time: 3-4 days
      4. Deliver Your Digital Products at Scale
        • Scale Product Families to Align Enterprise Goals
        • Audience: Product Owners/Mangers
          Size: 10-20 people
          Time: 3-4 days
      5. Mature and Scale Product Ownership
        • Align and mature your product owners
        • Audience: Product Owners/Mangers
          Size: 8-16 people
          Time: 2-4 days

      Repeat workshops with different companies, operating units, departments, or teams as needed.

      What is a workshop?

      We WILL ENGAGE in discussions and activities:

      • Flexible, to accommodate the needs of the group.
      • Open forum for discussion and questions.
      • Share your knowledge, expertise, and experiences (roadblocks and success stories).
      • Everyone is part of the process.
      • Builds upon itself.

      This workshop will NOT be:

      • A lecture or class.
      • A monologue that never ends.
      • Technical training.
      • A presentation.
      • Us making all the decisions.

      Roles within the workshop

      We each have a role to play to make our workshop successful!

      Facilitators

      • Introduce the best practice framework used by Info-Tech.
      • Ask questions about processes, procedures, and assumptions.
      • Guide for the methodology.
      • Liaison for any other relevant Info-Tech research or services.

      Participants

      • Contribute and speak out as much as needed.
      • Provide expertise on the current processes and technology.
      • Ask questions.
      • Provide feedback.
      • Collaborate and work together to produce solutions.

      Understanding Your Top Challenges

      • Understanding Your Top Challenges
      • Transitioning From Projects to Product-Centric Delivery
      • Enterprise Agility and the Value of Change
      • Defining Your Products and Product Management
      • Connecting Product Management to Agile Practices
      • Commit to Empowering Agile Product Teams
      • Wrap-Up and Retrospective

      Executive Summary

      Your Challenge

      • Products are the lifeblood of an organization. They deliver the capabilities needed to deliver value to customers, internal users, and stakeholders.
      • The shift to becoming a product organization is intended to continually increase the value you provide to the broader organization as you grow and evolve.
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.

      Common Obstacles

      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.

      Info-Tech's Approach

      Info-Tech's approach will guide you through:

      • Understanding the top challenges driving your product initiative.
      • Improving your transitioning from projects to product-centric delivery.
      • Enhancing enterprise agility and the value of change.
      • Defining products and product management in your context.
      • Connecting product management to Agile practices.
      • Committing to empowering Agile Product teams.
      This is an image of an Info-Tech Thought Map for Accelerate Your Transition to Product Delivery
      This is an image of an Info-Tech Thought Map for Delier on your Digital Product Vision
      This is an image of an Info-Tech Thought Map for Deliver Digital Products at Scale via Enterprise Product Families.
      This is an image of an Info-Tech Thought Map for What We Mean by an Applcation Department Strategy.

      What is driving your organization to become product focused?

      30 minutes

      • Team introductions:
        • Share your name and role
        • What are the key challenges you are looking to solve around product management?
        • What blockers or challenges will we need to overcome?

      Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

      Input

      • Organizational knowledge
      • Goals and challenges

      Output

      • List of key challenges
      • List of workshop expectations
      • Parking lot items

      Transitioning From Projects to Product-Centric Delivery

      • Understanding Your Top Challenges
      • Transitioning From Projects to Product-Centric Delivery
      • Enterprise Agility and the Value of Change
      • Defining Your Products and Product Management
      • Connecting Product Management to Agile Practices
      • Commit to Empowering Agile Product Teams
      • Wrap-Up and Retrospective

      Define the differences between projects and product delivery

      30 minutes

      • Consider project delivery and product delivery.
      • Discussion:
        • What are some differences between the two?

      Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

      Input

      • Organizational knowledge
      • Internal terms and definitions

      Output

      • List of differences between projects and product delivery

      Define the differences between projects and product delivery

      15 minutes

      Project Delivery

      vs

      Product Delivery

      Point in time

      What is changed

      Method of funding changes

      Needs an owner

      Input

      • Organizational knowledge
      • Internal terms and definitions

      Output

      • List of differences between projects and product delivery

      Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

      Identify the differences between a project-centric and a product-centric organization

      Project

      Product

      Fund Projects

      Funding

      Fund Products or Teams

      Line of Business Sponsor

      Prioritization

      Product Owner

      Makes Specific Changes
      to a Product

      Product Management

      Improve Product Maturity
      and Support

      Assign People to Work

      Work Allocation

      Assign Work
      to Product Teams

      Project Manager Manages

      Capacity Management

      Team Manages Capacity

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      This is an image showing the relationship between the project lifecycle, a hybrid lifecycle, and a product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a "product-based" or "project-based" shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      While Agile and product are intertwined, they are not the same!

      Delivering products does not necessarily require an Agile mindset. However, Agile methods help facilitate the journey because product thinking is baked into them.

      This image shows the product delivery maturity process from waterfall to continuous integration and delivery.

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      This is an image adapted from Pichler, What is Product Management.

      Adapted from: Pichler, "What Is Product Management?"

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      The challenge of corporate security management

      • Buy Link or Shortcode: {j2store}41|cart{/j2store}
      • Related Products: {j2store}41|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk

      Corporate security management is a vital aspect in every modern business, regardless of business area or size. At Tymans Group we offer expert security management consulting to help your business set up proper protocols and security programs. More elaborate information about our security management consulting services and solutions can be found below.

      Corporate security management components

      You may be experiencing one or more of the following:

      • The risk goals should support business goals. Your business cannot operate without security, and security is there to conduct business safely. 
      • Security governance supports security strategy and security management. These three components form a protective arch around your business. 
      • Governance and management are like the legislative branch and the executive branch. Governance tells people what to do, and management's job is to verify that they do it.

      Our advice with regards to corporate security management

      Insight

      To have a successful information security strategy, take these three factors into account:

      • Holistic: your view must include people, processes, and technology.
      • Risk awareness: Base your strategy on the actual risk profile of your company and then add the appropriate best practices.
      • Business-aligned: When your strategic security plan demonstrates alignment with the business goals and supports it, embedding will be much more straightforward.

      Impact and results of our corporate security management approach

      • The approach of our security management consulting company helps to provide a starting point for realistic governance and realistic corporate security management.
      • We help you by implementing security governance and managing it, taking into account your company's priorities, and keeping costs to a minimum.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within the corporate security management domain have access to:

      Get up to speed

      Read up on why you should build your customized corporate information security governance and management system. Review our methodology and understand the four ways we can support you.

      Align your security objectives with your business goals

      Determine the company's risk tolerance.

      • Implement a Security Governance and Management Program – Phase 1: Align Business Goals With Security Objectives (ppt)
      • Information Security Governance and Management Business Case (ppt)
      • Information Security Steering Committee Charter (doc)
      • Information Security Steering Committee RACI Chart (doc)
      • Security Risk Register Tool (xls)

      Build a practical governance framework for your company

      Our best-of-breed security framework makes you perform a gap analysis between where you are and where you want to be (your target state). Once you know that, you can define your goals and duties.

      • Implement a Security Governance and Management Program – Phase 2: Develop an Effective Governance Framework (ppt)
      • Information Security Charter (doc)
      • Security Governance Organizational Structure Template (doc)
      • Security Policy Hierarchy Diagram (ppt)
      • Security Governance Model Facilitation Questions (ppt)
      • Information Security Policy Charter Template (doc)
      • Information Security Governance Model Tool (Visio)
      • Pdf icon 20x20
      • Information Security Governance Model Tool (PDF)

      Now that you have built it, manage your governance framework.

      There are several essential management activities that we as a security management consulting company suggest you employ.

      • Implement a Security Governance and Management Program – Phase 3: Manage Your Governance Framework (ppt)
      • Security Metrics Assessment Tool (xls)
      • Information Security Service Catalog (xls)
      • Policy Exception Tracker (xls)
      • Information Security Policy Exception Request Form (doc)
      • Security Policy Exception Approval Workflow (Visio)
      • Security Policy Exception Approval Workflow (PDF)
      • Business Goal Metrics Tracking Tool (xls)

      Book an online appointment for more advice

      We are happy to tell you more about our corporate security management solutions and help you set up fitting security objectives. As a security management consulting firm we offer solutions and advice, based on our own extensive experience, which are practical and people-orientated. Discover our services, which include data security management and incident management and book an online appointment with CEO Gert Taeymans to discuss any issues you may be facing regarding risk management or IT governance.

      cybersecurity

      Make the Case for Product Delivery

      • Buy Link or Shortcode: {j2store}184|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $41,674 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Organizations are traditionally organized to deliver initiatives in specific periods of time. This is in contention with product-centric delivery practices. This form of delivery acknowledges the reality that solutions of all shapes and sizes deliver continual and evolving business value over their lifetime.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.

      Our Advice

      Critical Insight

      • Delivering products doesn’t mean you will stop delivering projects! Product-centric delivery is intended to address the misalignment between the long-term delivery of value that organizations demand and the nature of traditional project-focused environments.

      Impact and Result

      • We will help you build a proposal deck to make the case to your stakeholders for product-centric delivery.
      • You will build this proposal deck by answering key questions about product-centric delivery so you can identify:
        • A common definition of product.
        • How this form of delivery differs from traditional project-centric approaches.
        • Key challenges and benefits.
        • The capabilities needed to effectively own products and deliver value.
        • What you are asking of stakeholders.
        • A roadmap of how to get started.

      Make the Case for Product Delivery Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for Product Delivery Deck – A guide to help align your organization on the practices to deliver what matters most.

      This project will help you define “product” for your organization, define your drivers and goals for moving to product delivery, understand the role of product ownership, lay out the case to your stakeholders, and communicate what comes next for your transition to product.

      • Make the Case for Product Delivery Storyboard

      2. Make the Case for Product Delivery Presentation Template – A template to help you capture and detail your case for product delivery.

      Build a proposal deck to help make the case to your stakeholders for product-centric delivery.

      • Make the Case for Product Delivery Presentation Template

      3. Make the Case for Product Delivery Workbook – A tool to capture the results of exercises to build your case to change your product delivery method.

      This workbook is designed to capture the results of the exercises in the Make the Case for Product Delivery Storyboard. Each worksheet corresponds to an exercise in the storyboard. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

      • Make the Case for Product Delivery Workbook
      [infographic]

      Further reading

      Make the Case for Product Delivery

      Align your organization on the practices to deliver what matters most.

      Table of Contents

      Define product

      Define your drivers and goals

      Understand the role of product ownership

      Communicate what comes next

      Make the case to your stakeholders

      Appendix: Additional research

      Appendix: Product delivery strategy communication

      Appendix: Manage stakeholder influence

      Appendix: Product owner capability details

      Executive Summary

      Your Challenge
      • Products are the lifeblood of an organization. They deliver the capabilities needed to deliver value to customers, internal users, and stakeholders.
      • Organizations are under pressure to align the value they provide with the organization’s goals and overall company vision.
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.
      Common Obstacles
      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This is in contention with product-centric delivery.
      • Product delivery acknowledges the reality that solutions of all shapes and sizes deliver continual and evolving business value over their lifetime.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.
      Info-Tech’s Approach
      • Info-Tech will enable you to build a proposal deck to make the case to your stakeholders for product-centric delivery.
      • You will build this proposal deck by answering key questions about product-centric delivery so you can identify:
        • A common definition of product.
        • How this form of delivery differs from traditional project-centric approaches.
        • Key challenges and benefits.
        • The capabilities needed to effectively own products and deliver value.
        • What you are asking of stakeholders.
        • A roadmap of how to get started.

      Info-Tech Insight

      Delivering products doesn’t mean you will stop delivering projects! Product-centric delivery is intended to address the misalignment between the long-term delivery of value that organizations demand and the nature of traditional project-focused environments.

      Many executives perceive IT as being poorly aligned with business objectives

      Info-Tech’s CIO Business Vision Survey data highlights the importance of IT initiatives in supporting the business in achieving its strategic goals.

      However, Info-Tech’s CEO-CIO Alignment Survey (2021; N=58) data indicates that CEOs perceive IT to be poorly aligned to business’ strategic goals.

      Info-Tech CEO-CIO Alignment Diagnostics, 2021 (N=58)

      40% Of CEOs believe that business goals are going unsupported by IT.

      34% Of business stakeholders are supporters of their IT departments (n=334).

      40% Of CIOs/CEOs are misaligned on the target role for IT.

      Info-Tech Insight

      Great technical solutions are not the primary driver of IT success. Focusing on delivery of digital products that align with organizational goals will produce improved outcomes and will foster an improved relationship between business and IT.

      Increase product success by involving IT, business, and customers in your product roadmaps, planning, and delivery

      Product management and delivery seek to promote improved relationships among IT, business, and customers, a critical driver for business satisfaction.

      IT

      Stock image of an IT professional.

      1

      Collaboration

      IT, business, and customers work together through all stages of the product lifecycle, from market research through the roadmapping and delivery processes and into maintenance and retirement. The goal is to ensure the risks and dependencies are realized before work is committed.

      Stakeholders, Customers, and Business

      Stock image of a business professional.

      2

      Communication

      Prioritize high-value modes of communication to break down existing silos and create common understanding and alignment across functions. This approach increases transparency and visibility across the entire product lifecycle.

      3

      Integration

      Explore methods to integrate the workflows, decision making, and toolsets among the business, IT, and customers. The goal is to become more reactive to changes in business and customer expectations and more proactive about market trends.

      Product does not mean the same thing to everyone

      Do not expect a universal definition of products.
      Every organization and industry has a different definition of what a product is. Organizations structure their people, processes, and technologies according to their definition of the products they manage. Conflicting product definitions between teams increase confusion and misalignment of product roadmaps.

      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.” (Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance) “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.” (TechTarget) “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.” (Mark Curphey)

      Organizations need a common understanding of what a product is and how it pertains to the business.

      This understanding needs to be accepted across the organization.

      “There is not a lot of guidance in the industry on how to define [products]. This is dangerous because what will happen is that product backlogs will be formed in too many areas. All that does is create dependencies and coordination across teams … and backlogs.” (Chad Beier, “How Do You Define a Product?” Scrum.org)

      Products enable the long-term and continuous delivery of value

      Diagram laying out the lifecycles and roadmaps contributing to the 'Continuous delivery of value'. Beginning with 'Project Lifecycle' in which Projects with features and services end in a Product Release that is disconnected from the continuum. Then the 'Hybrid Lifecycle' and 'Product Lifecycle' which are connected by a 'Product Roadmap' and 'Product Backlog' have Product Releases that connect to the continuum.

      Phase 1

      Build the case for product-centric delivery

      Phase 1
      1.1 Define product
      1.2 Define your drivers and goals
      1.3 Understand the role of product ownership
      1.4 Communicate what comes next
      1.5 Make the case to your stakeholders

      This phase will walk you through the following activities:

      • Define product in your context.
      • Define your drivers and goals for moving to product delivery.
      • Understand the role of product ownership.
      • Communicate what comes next for your transition to product.
      • Lay out the case to your stakeholders.

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Step 1.1

      Define product

      Activities
      • 1.1.1 Define “product” in your context
      • 1.1.2 Consider examples of what is (and is not) a product in your organization
      • 1.1.3 Identify the differences between project and product delivery

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A clear definition of product in your organization’s context.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Exercise 1.1.1 Define “product” in your context

      30-60 minutes

      Output: Your enterprise/organizational definition of products and services

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Discuss what “product” means in your organization.
      2. Create a common, enterprise-wide definition for “product.”
      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.” (Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance) “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.” (TechTarget) “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.” (Mark Curphey)

      Record the results in the Make the Case for Product-Centric Delivery Workbook.

      Example: What is a product?

      Not all organizations will define products in the same way. Take this as a general example:

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.”

      Info-Tech Insight

      A proper definition of product recognizes three key facts:

      1. Products are long-term endeavors that don’t end after the project finishes.
      2. Products are not just “apps” but can be software or services that drive the delivery of value.
      3. There is more than one stakeholder group that derives value from the product or service.
      Stock image of an open human head with gears and a city for a brain.

      How do we know what is a product?

      What isn’t a product:
      • Features (on their own)
      • Transactions
      • Unstructured data
      • One-time solutions
      • Non-repeatable processes
      • Solutions that have no users or consumers
      • People or teams
      You have a product if the given item...
      • Has end users or consumers
      • Delivers quantifiable value
      • Evolves or changes over time
      • Has predictable delivery
      • Has definable boundaries
      • Has a cost to produce and operate

      Exercise 1.1.2 Consider examples of what is (and is not) a product in your organization

      15 minutes

      Output: Examples of what is and isn’t a product in your specific context.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Leverage the definition you created in exercise 1.1.1 and the explanation on the slide What is a product?
      2. Pick examples that effectively show the difference between products and non-products and facilitate a conversation on the ones that seem to be on the line. Specific server instances, or instances of providing a service, are worthwhile examples to consider.
      3. From the list you come up with, take the top three examples and put them into the Make the Case for Product Delivery Presentation Template.
      Example:
      What isn’t a product?
      • Month-end SQL scripts to close the books
      • Support Engineer doing a password reset
      • Latest research project in R&D
      What is a product?
      • Self-service password reset portal
      • Oracle ERP installation
      • Microsoft Office 365

      Record the results in the Make the Case for Product Delivery Workbook.

      Product delivery practices should consider everything required to support it, not just what users see.

      Cross-section of an iceberg above and below water with visible product delivery practices like 'Funding', 'External Relationships', and 'Stakeholder Management' above water and internal product delivery practices like 'Product Governance', 'Business Functionality', and 'R&D' under water. There are far more processes below the water.

      Products and services share the same foundation and best practices

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. Product is used for consistency but would apply to services as well.

      Product = Service

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:
      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Exercise 1.1.3 Identify the differences between project and product delivery

      30-60 minutes

      Output: List of differences between project and product delivery

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Consider project delivery and product delivery.
      2. Discuss what some differences are between the two.
        Note: This exercise is not about identifying the advantages and disadvantages of each style of delivery. This is to identify the variation between the two.
      Theme Project Delivery (Current) Product Delivery (Future)
      Timing Defined start and end Does not end until the product is no longer needed
      Funding Funding projects Funding products and teams
      Prioritization LoB sponsors Product owner
      Capacity Management Project management Managed by product team

      Record the results in the Make the Case for Product Delivery Workbook.

      Identify the differences between a project-centric and a product-centric organization

      Project Product
      Fund projects — Funding –› Fund products or teams
      Line of business sponsor — Prioritization –› Product owner
      Makes specific changes to a product —Product management –› Improves product maturity and support
      Assignment of people to work — Work allocation –› Assignment of work to product teams
      Project manager manages — Capacity management –› Team manages capacity

      Info-Tech Insights

      • Product ownership should be one of your first areas of focus when transitioning from project to product delivery.
      • Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      Diagram laying out the lifecycles and roadmaps contributing to the 'Continuous delivery of value'. Beginning with 'Project Lifecycle' in which Projects with features and services end in a Product Release that is disconnected from the continuum. Then the 'Hybrid Lifecycle' and 'Product Lifecycle' which are connected by a 'Product Roadmap' and 'Product Backlog' have Product Releases that connect to the continuum. Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release.

      Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Step 1.2

      Define your drivers and goals

      Activities
      • 1.2.1 Understand your drivers for product-centric delivery
      • 1.2.2 Define the goals for your product-centric organization

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A clear understanding of your motivations and desired outcomes for moving to product delivery.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Exercise 1.2.1 Understand your drivers for product-centric delivery

      30-60 minutes

      Output: Organizational drivers to move to product-centric delivery.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify your pain points in the current delivery model.
      2. What is the root cause of these pain points?
      3. How will a product-centric delivery model fix the root cause (drivers)?
      Pain Points
      • Lack of ownership
      Root Causes
      • Siloed departments
      Drivers
      • Accountability

      Record the results in the Make the Case for Product Delivery Workbook.

      Exercise 1.2.2 Define the goals for your product-centric organization

      30 minutes

      Output: Goals for product-centric delivery

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Review the differences between project and product delivery from exercise 1.1.3 and the list of drivers from exercise 1.2.1.
      2. Define your goals for achieving a product-centric organization.
        Note: Your drivers may have already covered the goals. If so, review if you would like to change the drivers based on your renewed understanding of the differences between project and product delivery.
      Pain Points
      • Lack of ownership
      Root Causes
      • Siloed departments
      Drivers
      • Accountability
      Goals
      • End-to-end ownership

      Record the results in the Make the Case for Product Delivery Workbook.

      Step 1.3

      Understand the role of product ownership

      Activities
      • 1.3.1 Identify product ownership capabilities

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Product owner capabilities that you agree are critical to start your product transformation.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Accountability for the delivery of value through product ownership is not optional

      Tree of 'Enterprise Goals and Priorities' leading to 'Product' through a 'Product Family'.

      Info-Tech Insight

      People treat the assignment of accountability for products (aka product ownership) as optional. Without assigning accountability up front, your transition to product delivery will stall. Accountable individuals will be focused on the core outcome for product delivery, which is the delivery of the right value, at the right time, to the right people.

      Description of the tree levels shown in the diagram on the left. First is 'Enterprise Goals and Priorities', led by 'Executive Leadership' using the 'Enterprise Strategic Roadmap'. Second is 'Product Family', led by 'Product Manager' using the 'Product Family Roadmap'. Last is 'Product', led by the 'Product Owner' using the 'Product Roadmap' and 'Backlog' on the strategic end, and 'Releases' on the Tactical end. In the holistic context, 'Product Family is considered 'Strategic' while 'Product' is 'Tactical'.

      Recognize the different product owner perspectives

      Business
      • Customer facing, revenue generating
      Technical
      • IT systems and tools
      Operations
      • Keep the lights on processes

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Info-Tech Insight

      Recognize that product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.” (Robbin Schuurman, “Tips for Starting Product Owners”)

      Implement the Info-Tech product owner capability model

      As discussed in Build a Better Product Owner, most product owners operate with an incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization. 'Product Owner Capabilities': 'Vision', 'Leadership', 'Product Lifecycle Management', 'Value Realization'.
      Vision
      • Market Analysis
      • Business Alignment
      • Product Roadmap
      Leadership
      • Soft Skills
      • Collaboration
      • Decision Making
      Product Lifecycle Management
      • Plan
      • Build
      • Run
      Value Realization
      • KPIs
      • Financial Management
      • Business Model

      Details on product ownership capabilities can be found in the appendix.

      Exercise 1.3.1 Identify product ownership capabilities

      60 minutes

      Output: Product owner capability mapping

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Write down the capabilities product owners need to perform their duties (one per sticky note) in order to describe product ownership in your organization. Consider people, processes, and tools.
      2. Mark each capability with a plus (current capability), circle (some proficiency), or dash (missing capability).
      3. Discuss each capability and place on the appropriate quadrant.

      'Product Owner Capabilities': 'Vision', 'Leadership', 'Product Lifecycle Management', 'Value Realization'.

      Record the results in the Make the Case for Product Delivery Workbook.

      Differentiate between product owners and product managers

      Product Owner (Tactical Focus)
      • Backlog management and prioritization
      • Epic/story definition, refinement in conjunction with business stakeholders
      • Sprint planning with Scrum Master
      • Working with Scrum Master to minimize disruption to team velocity
      • Ensuring alignment between business and Scrum teams during sprints
      • Profit and loss (P&L) product analysis and monitoring
      Product Manager (Strategic Focus)
      • Product strategy, positioning, and messaging
      • Product vision and product roadmap
      • Competitive analysis and positioning
      • New product innovation/definition
      • Release timing and focus (release themes)
      • Ongoing optimization of product-related marketing and sales activities
      • P&L product analysis and monitoring

      Info-Tech Insight

      “Product owner” and “product manager” are terms that should be adapted to fit your culture and product hierarchy. These are not management relationships but rather a way to structure related products and services that touch the same end users.

      Step 1.4

      Communicate what comes next

      Activities
      • 1.4.1 How do we get started?

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A now, next, later roadmap indicating your overall next steps.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Make a plan in order to make a plan!

      Consider some of the techniques you can use to validate your strategy.

      Cyclical diagram of the 'Continuous Delivery of Value' within 'Business Value'. Surrounding attributes are 'User Centric', 'Adaptable', 'Accessible', 'Private & Secured', 'Informative & Insightful', 'Seamless Application Connection', 'Relationship & Network Building', 'Fit for Purpose'.

      Go to your backlog and prioritize the elements that need to be answered sooner rather than later.

      Possible areas of focus:

      • Regulatory requirements or questions to answer around accessibility, security, privacy.
      • Stress testing any new processes against situations that may occur.
      Learning Milestones

      The completion of a set of artifacts dedicated to validating business opportunities and hypotheses.

      Possible areas of focus:

      • Align teams on product strategy prior to build
      • Market research and analysis
      • Dedicated feedback sessions
      • Provide information on feature requirements
      Stock image of people learning.
      Sprint Zero (AKA Project-before-the-project)

      The completion of a set of key planning activities, typically the first sprint.

      Possible areas of focus:

      • Focus on technical verification to enable product development alignment
      • Sign off on architectural questions or concerns
      Stock photo of a person writing on a board of sticky notes.

      The “Now, Next, Later” roadmap

      Use this when deadlines and delivery dates are not strict. This is best suited for brainstorming a product plan when dependency mapping is not required.

      • Now
        What are you going to do now?
      • Next
        What are you going to do very soon?
      • Later
        What are you going to do in the future?
      A priority map laid out as a half rainbow with 'Now' as the inner, 'Next' as the middle, and 'Later' as the outer. Various 'Features', 'Releases', and an 'MVP' are mapped into the sections.
      (Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017)

      Exercise 1.4.1 How do we get started?

      30-60 minutes

      Output: Product transformation critical steps and basic roadmap

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify what the critical steps are for the organization to embrace product-centric delivery.
      2. Group each critical step by how soon you need to address it:
        • Now: Let’s do this ASAP.
        • Next: Sometime very soon, let’s do these things.
        • Later: Much further off in the distance, let’s consider these things.
      A priority map laid out as a half rainbow with 'Now' as the inner, 'Next' as the middle, and 'Later' as the outer. Various 'Features', 'Releases', and an 'MVP' are mapped into the sections.
      (Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017)

      Record the results in the Make the Case for Product Delivery Workbook.

      Example

      Example table for listing tasks to complete Now, Next, or Later

      Step 1.5

      Make the case to your stakeholders

      Activities
      • 1.5.1 Identify what support you need from your stakeholders
      • 1.5.2 Build your pitch for product delivery

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A deliverable that helps make the case for product delivery.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Develop a stakeholder strategy to define your product owner landscape

      Stakeholder Influence

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner is able to accomplish.

      Product teams operate within this network of stakeholders who represent different perspectives within the organization.

      See the appendix for activities and guidance on how to devise a strategy for managing stakeholders.

      Image of four puzzle pieces being put together, labelled 'Product Lifecycle', 'Project Delivery', 'Operational Support', 'and Stakeholder Management'.

      Exercise 1.5.1 Identify what support you need from your stakeholders

      30 minutes

      Output: Clear understanding of stakeholders, what they need from you, and what you need from them.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. If you don’t yet know who your stakeholders are, consider completing one or more of the stakeholder management exercises in the appendix.
      2. Identify your key stakeholders who have an interest in solution delivery.
      3. Consider their perspective on product-centric delivery. (For example: For head of support, what does solution delivery mean to them?)
      4. Identify what role each stakeholder would play in the transformation.
        • This role represents what you need from them for this transformation to product-centric delivery.
      Stakeholder
      What does solution delivery mean to them?
      What do you need from them in order to be successful?

      Record the results in the Make the Case for Product Delivery Workbook.

      Exercise 1.5.2 Build your pitch deck

      30 minutes (and up)

      Output: A completed presentation to help you make the case for product delivery.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Take the results from the Make the Case for Product Delivery Workbook and transfer them into the presentation template.
      2. Follow the instructions on each page listed in the instruction bubbles to know what results to place where.
      3. This is meant to be a template; you are welcome to add and remove slides as needed to suit your audience!

      Sample of slides from the Make the Case for Product Delivery Workbook with instruction bubbles overlaid.

      Record the results in the Make the Case for Product Delivery Workbook.

      Appendix

      Additional research to start your journey

      Related Info-Tech Research

      Product Delivery

      Deliver on Your Digital Product Vision

      • Build a product vision your organization can take from strategy through execution.

      Build a Better Product Owner

      • Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Build Your Agile Acceleration Roadmap

      • Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Implement Agile Practices That Work

      • Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      • Streamline business value delivery through the strategic adoption of DevOps practices.

      Deliver Digital Products at Scale

      • Deliver value at the scale of your organization through defining enterprise product families.

      Extend Agile Practices Beyond IT

      • Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      • Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      • Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Application Portfolio Management

      Application Portfolio Management (APM) Research Center

      • See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management for Small Enterprises

      • There is no one-size-fits-all rationalization. Tailor your framework to meet your goals.

      Streamline Application Maintenance

      • Effective maintenance ensures the long-term value of your applications.

      Build an Application Rationalization Framework

      • Manage your application portfolio to minimize risk and maximize value.

      Modernize Your Applications

      • Justify modernizing your application portfolio from both business and technical perspectives.

      Review Your Application Strategy

      • Ensure your applications enable your business strategy.

      Application Portfolio Management Foundations

      • Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Management

      • Move beyond maintenance to ensuring exceptional value from your apps.

      Optimize Applications Release Management

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Embrace Business-Managed Applications

      • Empower the business to implement their own applications with a trusted business-IT relationship.

      Related Info-Tech Research

      Value, Delivery Metrics, Estimation

      Build a Value Measurement Framework

      • Focus product delivery on business value–driven outcomes.

      Select and Use SDLC Metrics Effectively

      • Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      • Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      • Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      • Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      • Commit to achievable software releases by grounding realistic expectations

      Reduce Time to Consensus With an Accelerated Business Case

      • Expand on the financial model to give your initiative momentum.

      Optimize IT Project Intake, Approval, and Prioritization

      • Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Org Design and Performance

      Redesign Your IT Organizational Structure

      • Focus product delivery on business value–driven outcomes.

      Build a Strategic IT Workforce Plan

      • Have the right people, in the right place, at the right time.

      Implement a New IT Organizational Structure

      • Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      • Measure employee sentiment to drive IT performance

      Set Meaningful Employee Performance Measures

      • Set holistic measures to inspire employee performance.

      Master Organizational Change Management Practices

      • PMOs, if you don't know who is responsible for org change, it's you.

      Appendix

      Product delivery strategy communication

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      Diagram on how to get from product owner capabilities to 'Business Value Realization' through 'Product Roadmap' with a 'Tiered Backlog', 'Delivery Capacity and Throughput' via a 'Product Delivery Pipeline'.
      (Adapted from: Pichler, “What Is Product Management?”)

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver.
      Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Two-part diagram showing the 'Product Backlog' segmented into '1. Current: Features/ Stories', '2. Near-term: Capabilities', and '3. Future: Epics', and then the 'Product Roadmap' with the same segments placed into a timeline.

      Multiple roadmap views can communicate differently, yet tell the same truth

      Product managers and product owners have many responsibilities, and a roadmap can be a useful tool to complete those objectives through communication or organization of tasks.

      However, not all roadmaps address the correct audience and achieve those objectives. Care must be taken to align the view to the given audience.

      Pie Chart showing the surveyed most important reason for using a product roadmap. From largest to smallest are 'Communicate a strategy', 'Plan and prioritize', 'Communicate milestones and releases', 'Get consensus on product direction', and 'Manage product backlog'.
      Surveyed most important reason for using a product roadmap (Source: ProductPlan, 2018)

      Audience
      Business/ IT leaders Users/Customers Delivery teams
      Roadmap View
      Portfolio Product Technology
      Objectives
      To provide a snapshot of the portfolio and priority apps To visualize and validate product strategy To coordinate and manage teams and show dev. progress
      Artifacts
      Line items or sections of the roadmap are made up of individual apps, and an artifact represents a disposition at its highest level. Artifacts are generally grouped by various product teams and consist of strategic goals and the features that realize those goals. Artifacts are grouped by the teams who deliver that work and consist of features and technical enablers that support those features.

      Appendix

      Managing stakeholder influence

      From Build a Better Product Owner

      Step 1.3 (from Build a Better Product Owner)

      Manage Stakeholder Influence

      Activities
      • 1.3.1 Visualize interrelationships to identify key influencers
      • 1.3.2 Group your product owners into categories
      • 1.3.3 Prioritize your stakeholders
      • 1.3.4 Delegation Poker: Reach better decisions

      This step will walk you through the following activities:

      To be successful, product owners need to identify and manage all stakeholders for their products. This step will build a stakeholder map and strategy.

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Relationships among stakeholders and influencers
      • Categorization of stakeholders and influencers
      • Stakeholder and influencer prioritization
      • Better understanding of decision-making approaches and delegation
      Product Owner Foundations
      Step 1.1 Step 1.2 Step 1.3

      Develop a product owner stakeholder strategy

      Stakeholder Influence

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner is able to accomplish.

      Product owners operate within this network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without accomplishing these missing pieces, product owners will encounter obstacles, resistance, or unexpected changes.

      Image of four puzzle pieces being put together, labelled 'Product Lifecycle', 'Project Delivery', 'Operational Support', 'and Stakeholder Management'.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Legend
      Black arrow with a solid line and single direction. Black arrows indicate the direction of professional influence
      Green arrow with a dashed line and bi-directional. Dashed green arrows indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates in. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      1.3.1 Visualize interrelationships to identify key influencers

      60 minutes

      Input: List of product stakeholders

      Output: Relationships among stakeholders and influencers

      Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. List direct stakeholders for your product.
      2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        1. Use black arrows to indicate the direction of professional influence.
        2. Use dashed green arrows to indicate bidirectional, informal influence relationships.
      5. Record the results in the Build a Better Product Owner Workbook.

      Record the results in the Build a Better Product Owner Workbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps product owners categorize their stakeholders by their level or influence and ownership in the product and/or teams.

      Stakeholder prioritization map split into four quadrants along two axes, 'Influence', and 'Ownership/Interest': 'Players' (high influence, high interest); 'Mediators' (high influence, low interest); 'Noisemakers' (low influence, high interest); 'Spectators' (low influence, low interest). Source: Info-Tech Research Group

      There are four areas in the map, and the stakeholders within each area should be treated differently.
      • Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.
      • Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
      • Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.
      • Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      1.3.2 Group your product owners into categories

      30 minutes

      Input: Stakeholder map

      Output: Categorization of stakeholders and influencers

      Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify your stakeholder’s interest in and influence on your Agile implementation as high, medium, or low by rating the attributes below.
      2. Map your results to the model below to determine each stakeholder’s category.
      3. Record the results in the Build a Better Product Owner Workbook.
      Same stakeholder prioritization map as before but with example positions mapped onto it.
      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      Record the results in the Build a Better Product Owner Workbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Stakeholder prioritization table with 'Stakeholder Category' as row headers ('Player', 'Mediator', 'Noisemaker', 'Spectator') and 'Level of Support' as column headers ('Supporter', 'Evangelist', 'Neutral', 'Blocker'). Importance ratings are 'Critical', 'High', 'Medium', 'Low', and 'Irrelevant'.

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: how likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive the focus of your attention. The table to the right indicates how stakeholders are ranked.

      1.3.3 Prioritize your stakeholders

      30 minutes

      Input: Stakeholder matrix, Stakeholder prioritization

      Output: Stakeholder and influencer prioritization

      Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify the level of support of each stakeholder by answering the following question: how likely is it that your stakeholder would endorse your product?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.
      3. Record the results in the Build a Better Product Owner Workbook.
      Stakeholder Category Level of Support Prioritization
      CMO Spectator Neutral Irrelevant
      CIO Player Supporter Critical

      Record the results in the Build a Better Product Owner Workbook.

      Define strategies for engaging stakeholders by type

      Stakeholder strategy map assigning stakeholder strategies to stakeholder categories, as described in the adjacent table.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers, while ensuring the needs of the Mediators and Players are met.

      Type Quadrant Actions
      Players High influence; high interest – actively engage Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.
      Mediators High influence; low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.
      Noisemakers Low influence; high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
      Spectators Low influence; low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Appendix

      Product owner capability details

      From Build a Better Product Owner

      Develop product owner capabilities

      Capability 'Vision' with sub-capabilities 'Market Analysis, 'Business Alignment', and 'Product Roadmap'.

      Each capability has three components needed for successful product ownership.

      Definitions are on the following slides.

      Central diagram title 'Product Owner Capabilities'.

      Define the skills and activities in each component that are directly related to your product and culture.

      Capability 'Leadership' with sub-capabilities 'Soft Skills', 'Collaboration', and 'Decision Making'.
      Capability 'Product Lifecycle Management' with sub- capabilities 'Plan', 'Build', and 'Run'. Capability 'Value Realization' with sub-capabilities 'KPIs', 'Financial Management', and 'Business Model'.

      Capabilities: Vision

      Market Analysis

      • Unique solution: Identify the target users and unique value your product provides that is not currently being met.
      • Market size: Define the size of your user base, segmentation, and potential growth.
      • Competitive analysis: Determine alternative solutions, products, or threats that affect adoption, usage, and retention.

      Business Alignment

      • SWOT analysis: Complete a SWOT analysis for your end-to-end product lifecycle. Use Info-Tech’s Business SWOT Analysis Template.
      • Enterprise alignment: Align product to enterprise goals, strategies, and constraints.
      • Delivery strategy: Develop a delivery strategy to achieve value quickly and adapt to internal and external changes.

      Product Roadmap

      • Roadmap strategy: Determine the duration, detail, and structure of your roadmap to accurately communicate your vision.
      • Value prioritization: Define criteria used to evaluate and sequence demand.
      • Go to market strategy: Create organizational change management, communications, and a user implementation approach.

      Info-Tech Insight

      Data comes from many places and may still not tell the complete story.

      Capability 'Vision' with sub-capabilities 'Market Analysis, 'Business Alignment', and 'Product Roadmap'.

      “Customers are best heard through many ears.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Capabilities: Leadership

      Soft Skills

      • Communication: Maintain consistent, concise, and appropriate communication using SMART guidelines (specific, measurable, attainable, relevant, and timely).
      • Integrity: Stick to your values, principles, and decision criteria for the product to build and maintain trust with your users and teams.
      • Influence: Manage stakeholders using influence and collaboration over contract negotiation.

      Collaboration

      • Stakeholder management: Build a communications strategy for each stakeholder group, tailored to individual stakeholders.
      • Relationship management: Use every interaction point to strengthen relationships, build trust, and empower teams.
      • Team development: Promote development through stretch goals and controlled risks to build team capabilities and performance.

      Decision Making

      • Prioritized criteria: Remove personal bias by basing decisions off data analysis and criteria.
      • Continuous improvement: Balance new features with the need to ensure quality and create an environment of continuous improvement.
      • Team empowerment/negotiation: Push decisions to teams closest to the problem and solution, using Delegation Poker to guide you.

      Info-Tech Insight

      Product owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.

      Capability 'Leadership' with sub-capabilities 'Soft Skills', 'Collaboration', and 'Decision Making'.

      “Everything walks the walk. Everything talks the talk.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Capabilities: Product lifecycle management

      Plan

      • Product backlog: Follow a schedule for backlog intake, refinement, updates, and prioritization.
      • Journey map: Create an end-user journey map to guide adoption and loyalty.
      • Fit for purpose: Define expected value and intended use to ensure the product meets your end user’s needs.

      Build

      • Capacity management: Work with operations and delivery teams to ensure consistent and stable outcomes.
      • Release strategy: Build learning, release, and critical milestones into a repeatable release plan.
      • Compliance: Build policy compliance into delivery practices to ensure alignment and reduce avoidable risk (privacy, security).

      Run

      • Adoption: Focus attention on end-user adoption and proficiency to accelerate value and maximize retention.
      • Support: Build operational support and business continuity into every team.
      • Measure: Measure KPIs and validate expected value to ensure product alignment to goals and consistent product quality.

      Info-Tech Insight

      Product owners must actively manage the full lifecycle of the product.

      Capability 'Product Lifecycle Management' with sub- capabilities 'Plan', 'Build', and 'Run'.

      “Pay fantastic attention to detail. Reward, recognize, celebrate.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Capabilities: Value realization

      Key Performance Indicators (KPIs)

      • Usability and user satisfaction: Assess satisfaction through usage monitoring and end-user feedback.
      • Value validation: Directly measure performance against defined value proposition, goals, and predicted ROI.
      • Fit for purpose: Verify the product addresses the intended purpose better than other options.

      Financial Management

      • P&L: Manage each product as if it were its own business with profit and loss statements.
      • Acquisition cost/market growth: Define the cost of acquiring a new consumer, onboarding internal users, and increasing product usage.
      • User retention/market share: Verify product usage continues after adoption and solution reaches new user groups to increase value.

      Business Model

      • Defines value proposition: Dedicate your primary focus to understanding and defining the value your product will deliver.
      • Market strategy and goals: Define your acquisition, adoption, and retention plan for users.
      • Financial model: Build an end-to-end financial model and plan for the product and all related operational support.

      Info-Tech Insight

      Most organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.

      Capability 'Value Realization' with sub-capabilities 'KPIs', 'Financial Management', and 'Business Model'.

      “The competition is anyone the customer compares you with.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog refining (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product Lifecycle Management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value Realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Bibliography – Product Ownership

      A, Karen. “20 Mental Models for Product Managers.” Medium, Product Management Insider, 2 Aug. 2018. Web.

      Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

      Agile Alliance. “Product Owner.” Agile Alliance, n.d. Web.

      Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

      Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint, 2012. Web.

      Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, 2015. Web.

      Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group, 2005. Web.

      Cohn, Mike “What is a product?” Mountain Goat Software, 16 Sept. 2016, Web

      Connellan, Thomas K. Inside the Magic Kingdom. Bard Press, 1997. Print.

      Curphey, Mark, “Product Definition.” slideshare.net, 25 Feb. 2007. Web

      Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

      Fernandes, Thaisa. “Spotify Squad Framework - Part I.” Medium.com, 6 March 2017. Web.

      Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

      Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile Alliance, Agile2016, 2016. Web.

      Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” Medium.com, 9 Feb. 2018. Web.

      Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Medium.com, 23 July 2018. Web.

      Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

      Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

      Management 3.0. “Delegation Poker Product Image.” Management 3.0, n.d. Web.

      McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

      Bibliography – Product Ownership

      McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web.

      Mironov, Rich. “Scaling Up Product Manager/Owner Teams: Rich Mironov's Product Bytes.” Rich Mironov's Product Bytes, Mironov Consulting, 12 April 2014 . Web.

      Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 March 2017. Web.

      Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

      Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

      Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

      Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

      Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

      Radigan, Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

      Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

      Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

      Bibliography – Product Ownership

      Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

      Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin VOP #50, 2 Oct. 2018. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group, 2015. Web.

      Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

      Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

      Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium.com, 19 Dec. 2017. Web.

      VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      Verwijs, Christiaan. “Retrospective: Do The Team Radar.” Medium.com, 10 Feb. 2017. Web.

      “How do you define a product?” Scrum.org, 4 April 2017, Web.

      “Product Definition.” TechTarget, Sept. 2005. Web

      Bibliography – Product Roadmap

      Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

      Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

      Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

      Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012, Herzlia, Israel, 2012 IEEE International Conference on Software Science, Technology and Engineering, 12 June 2012. Web.

      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

      Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

      “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

      Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

      Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

      Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, n.d. Accessed Sept. 2018.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, Inc., 2017. Web.

      Maurya, Ash. “What is a Minimum Viable Product (MVP)?” LEANSTACK, 12 June 2017. Accessed Sept. 2018.

      Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

      Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

      “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

      Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 Oct. 2015. Accessed Sept. 2018.

      Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018

      Research Contributors and Experts

      Photo of Emily Archer, Lead Business Analyst, Enterprise Consulting, authentic digital agency.

      Emily Archer
      Lead Business Analyst,
      Enterprise Consulting, authentic digital agency

      Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

      Photo of David Berg, Founder & CTO, Strainprint Technologies Inc.

      David Berg
      Founder & CTO
      Strainprint Technologies Inc.

      David Berg is a product commercialization expert that has spent the last 20 years of his career delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world with the goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

      Research Contributors and Experts

      Blank photo template.

      Kathy Borneman
      Digital Product Owner, SunTrust Bank

      Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

      Photo of Charlie Campbell, Product Owner, Merchant e-Solutions.

      Charlie Campbell
      Product Owner, Merchant e-Solutions

      Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

      Research Contributors and Experts

      Photo of Yarrow Diamond, Sr. Director, Business Architecture, Financial Services.

      Yarrow Diamond
      Sr. Director, Business Architecture
      Financial Services

      Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

      Photo of Cari J. Faanes-Blakey, CBAP, PMI-PBA, Enterprise Business Systems Analyst, Vertex, Inc.

      Cari J. Faanes-Blakey, CBAP, PMI-PBA
      Enterprise Business Systems Analyst,
      Vertex, Inc.

      Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

      Research Contributors and Experts

      Photo of Kieran Gobey, Senior Consultant Professional Services, Blueprint Software Systems.

      Kieran Gobey
      Senior Consultant Professional Services
      Blueprint Software Systems

      Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations.

      Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

      Photo of Rupert Kainzbauer, VP Product, Digital Wallets, Paysafe Group.

      Rupert Kainzbauer
      VP Product, Digital Wallets
      Paysafe Group

      Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. Together with a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

      Research Contributors and Experts

      Photo of Saeed Khan, Founder, Transformation Labs.

      Saeed Khan
      Founder,
      Transformation Labs

      Saeed Khan has been working in high tech for 30 years in both Canada and the US and has held a number of leadership roles in Product Management over that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005.

      Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders, the only global community of senior-level product executives.

      Photo of Hoi Kun Lo, Product Owner, Nielsen.

      Hoi Kun Lo
      Product Owner
      Nielsen

      Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL, and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

      Research Contributors and Experts

      Photo of Abhishek Mathur, Sr Director, Product Management, Kasisto, Inc.

      Abhishek Mathur
      Sr Director, Product Management
      Kasisto, Inc.

      Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

      Photo of Jeff Meister, Technology Advisor and Product Leader.

      Jeff Meister
      Technology Advisor and Product Leader

      Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations.

      Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements.

      Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

      Research Contributors and Experts

      Photo of Vincent Mirabelli, Principal, Global Project Synergy Group.

      Vincent Mirabelli
      Principal,
      Global Project Synergy Group

      With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

      Photo of Oz Nazili, VP, Product & Growth, TWG.

      Oz Nazili
      VP, Product & Growth
      TWG

      Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

      Research Contributors and Experts

      Photo of Mark Pearson, Principal IT Architect, First Data Corporation.

      Mark Pearson
      Principal IT Architect
      First Data Corporation

      Mark Pearson is an executive business leader grounded in the process, data, technology, and operations of software-driven business. He knows the enterprise software landscape and is skilled in product, technology, and operations design and delivery within information technology organizations, outsourcing firms, and software product companies.

      Photo of Brenda Peshak, Product Owner, Widget Industries, LLC.

      Brenda Peshak
      Product Owner,
      Widget Industries, LLC

      Brenda Peshak is skilled in business process, analytical skills, Microsoft Office Suite, communication, and customer relationship management (CRM). She is a strong product management professional with a Master’s focused in Business Leadership (MBL) from William Penn University.

      Research Contributors and Experts

      Photo of Mike Starkey, Director of Engineering, W.W. Grainger.

      Mike Starkey
      Director of Engineering
      W.W. Grainger

      Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

      Photo of Anant Tailor, Cofounder & Head of Product, Dream Payments Corp.

      Anant Tailor
      Cofounder & Head of Product
      Dream Payments Corp.

      Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes.

      Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries.

      Anant is a Professional Engineer with a Bachelor’s degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

      Research Contributors and Experts

      Photo of Angela Weller, Scrum Master, Businessolver.

      Angela Weller
      Scrum Master, Businessolver

      Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

      Service Management

      • Buy Link or Shortcode: {j2store}46|cart{/j2store}
      • Related Products: {j2store}46|crosssells{/j2store}
      • Parent Category Name: Service Planning and Architecture
      • Parent Category Link: /service-planning-and-architecture

      The challenge

      • We have good, holistic practices, but inconsistent adoption leads to chaotic service delivery and low customer satisfaction.
      • You may have designed your IT services with little structure, formalization, or standardization.
      • That makes the management of these services more difficult and also leads to low business satisfaction.

      Continue reading

      Build a Data Classification MVP for M365

      • Buy Link or Shortcode: {j2store}67|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Applications
      • Parent Category Link: /end-user-computing-applications
      • Resources are the primary obstacle to getting a foot hold in O365 governance, whether it is funding or FTE resources.
      • Data is segmented and is difficult to analyze when you can’t see it or manage the relationships between sources.
      • Organizations expect results early and quickly and a common obstacle is that building a proper data classification framework can take more than two years and the business can't wait that long.

      Our Advice

      Critical Insight

      • Data classification is the lynchpin to ANY effective governance of O/M365 and your objective is to navigate through this easily and effectively and build a robust, secure, and viable governance model.
      • Start your journey by identifying what and where your data is and how much data you have. You need to understand what sensitive data you have and where it is stored before you can protect it or govern that data.
      • Ensure there is a high-level leader who is the champion of the governance objective.

      Impact and Result

      • Using least complex sensitivity labels in your classification are your building blocks to compliance and security in your data management schema; they are your foundational steps.

      Build a Data Classification MVP for M365 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a Data Classification MVP for M365 Deck – A guide for how to build a minimum-viable product for data classification that end users will actually use.

      Discover where your data resides, what governance helps you do, and what types of data you're classifying. Then build your data and security protection baselines for your retention policy, sensitivity labels, workload containers, and both forced and unforced policies.

      • Build a Data Classification MVP for M365 Storyboard
      [infographic]

      Further reading

      Build a Data Classification MVP for M365

      Kickstart your governance with data classification users will actually use!

      Executive Summary

      Info-Tech Insight

      • Creating an MVP gets you started in data governance
        Information protection and governance are not something you do once and then you are done. It is a constant process where you start with the basics (a minimum-viable product or MVP) and enhance your schema over time. The objective of the MVP is reducing obstacles to establishing an initial governance position, and then enabling rapid development of the solution to address a variety of real risks, including data loss prevention (DLP), data retention, legal holds, and data labeling.
      • Define your information and protection strategy
        The initial strategy is to start looking across your organization and identifying your customer data, regulatory data, and sensitive information. To have a successful data protection strategy you will include lifecycle management, risk management, data protection policies, and DLP. All key stakeholders need to be kept in the loop. Ensure you keep track of all available data and conduct a risk analysis early. Remember, data is your highest valued intangible asset.
      • Planning and resourcing are central to getting started on MVP
        A governance plan and governance decisions are your initial focus. Create a team of stakeholders that include IT and business leaders (including Legal, Finance, HR, and Risk), and ensure there is a top-level leader who is the champion of the governance objective, which is to ensure your data is safe, secure, and not prone to leakage or theft, and maintain confidentiality where it is warranted.

      Executive Summary

      Your Challenge
      • Today, the amount of data companies are gathering is growing at an explosive rate. New tools are enabling unforeseen channels and ways of collaborating.
      • Combined with increased regulatory oversight and reporting obligations, this makes the discovery and management of data a massive undertaking. IT can’t find and protect the data when the business has difficulty defining its data.
      • The challenge is to build a framework that can easily categorize and classify data yet allows for sufficient regulatory compliance and granularity to be useful. Also, to do it now because tomorrow is too late.
      Common Obstacles

      Data governance has several obstacles that impact a successful launch, especially if governing M365 is not a planned strategy. Below are some of the more common obstacles:

      • Resources are the primary obstacle to starting O365 governance, whether it is funding or people.
      • Data is segmented and is difficult to analyze when you can’t see it or manage the relationships between sources.
      • Organizations expect results early and quickly and a common obstacle is that building a "proper data classification framework” is a 2+ year project and the business can't wait that long.
      Info-Tech’s Approach
      • Start with the basics: build a minimum-viable product (MVP) to get started on the path to sustainable governance.
      • Identify what and where your data resides, how much data you have, and understand what sensitive data needs to be protected.
      • Create your team of stakeholders, including Legal, records managers, and privacy officers. Remember, they own the data and should manage it.
      • Categorization comes before classification, and discovery comes before categorization. Use easy-to-understand terms like high, medium, or low risk.

      Info-Tech Insight

      Data classification is the lynchpin to any effective governance of O/M365 and your objective is to navigate through this easily and effectively and build a robust, secure, and viable governance model. Start your journey by identifying what and where your data is and how much data do you have. You need to understand what sensitive data you have and where it is stored before you can protect or govern it. Ensure there is a high-level leader who is the champion of the governance objectives. Data classification fulfills the governance objectives of risk mitigation, governance and compliance, efficiency and optimization, and analytics.

      Questions you need to ask

      Four key questions to kick off your MVP.

      1

      Know Your Data

      Do you know where your critical and sensitive data resides and what is being done with it?

      Trying to understand where your information is can be a significant project.

      2

      Protect Your Data

      Do you have control of your data as it traverses across the organization and externally to partners?

      You want to protect information wherever it goes through encryption, etc.

      3

      Prevent Data Loss

      Are you able to detect unsafe activities that prevent sharing of sensitive information?

      Data loss prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data.

      4

      Govern Your Data

      Are you using multiple solutions (or any) to classify, label, and protect sensitive data?

      Many organizations use more than one solution to protect and govern their data, making it difficult to determine if there are any coverage gaps.

      Classification tiers

      Build your schema.

      Pyramid visualization for classification tiers. The top represents 'Simplicity', and the bottom 'Complexity' with the length of the sides at each level representing the '# of policies' and '# of labels'. At the top level is 'MVP (Minimum-Viable Product) - Confidential, Internal (Subcategory: Personal), Public'. At the middle level is 'Regulated - Highly Confidential, Confidential, Sensitive, General, Internal, Restricted, Personal, Sub-Private, Public'. And a the bottom level is 'Government (DOD) - Top Secret (TS), Secret, Confidential, Restricted, Official, Unclassified, Clearance'

      Info-Tech Insight

      Deciding on how granular you go into data classification will chiefly be governed by what industry you are in and your regulatory obligations – the more highly regulated your industry, the more classification levels you will be mandated to enforce. The more complexity you introduce into your organization, the more operational overhead both in cost and resources you will have to endure and build.

      Microsoft MIP Topology

      Microsoft Information Protection (MIP), which is Microsoft’s Data Classification Services, is the key to achieving your governance goals. Without an MVP, data classification will be overwhelming; simplifying is the first step in achieving governance.

      A diagram of multiple offerings all connected to 'MIP Data Classification Service'. Circled is 'Sensitivity Labels' with an arrow pointing back to 'MIP' at the center.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Info-Tech Insight

      Using least-complex sensitivity labels in your classification are your building blocks to compliance and security in your data management schema; they are your foundational steps.

      MVP RACI Chart

      Data governance is a "takes a whole village" kind of effort.

      Clarify who is expected to do what with a RACI chart.

      End User M365 Administrator Security/ Compliance Data Owner
      Define classification divisions R A
      Appy classification label to data – at point of creation A R
      Apply classification label to data – legacy items R A
      Map classification divisions to relevant policies R A
      Define governance objectives R A
      Backup R A
      Retention R A
      Establish minimum baseline A R

      What and where your data resides

      Data types that require classification.

      Logos for 'Microsoft', 'Office 365', and icons for each program included in that package.
      M365 Workload Containers
      Icon for MS Exchange. Icon for MS SharePoint.Icon for MS Teams. Icon for MS OneDrive. Icon for MS Project Online.
      Email
      • Attachments
      Site Collections, Sites Sites Project Databases
      Contacts Teams and Group Site Collections, Sites Libraries and Lists Sites
      Metadata Libraries and Lists Documents
      • Versions
      Libraries and Lists
      Teams Conversations Documents
      • Versions
      Metadata Documents
      • Versions
      Teams Chats Metadata Permissions
      • Internal Sharing
      • External Sharing
      Metadata
      Permissions
      • Internal Sharing
      • External Sharing
      Files Shared via Teams Chats Permissions
      • Internal Sharing
      • External Sharing

      Info-Tech Insight

      Knowing where your data resides will ensure you do not miss any applicable data that needs to be classified. These are examples of the workload containers; you may have others.

      Discover and classify on- premises files using AIP

      AIP helps you manage sensitive data prior to migrating to Office 365:
      • Use discover mode to identify and report on files containing sensitive data.
      • Use enforce mode to automatically classify, label, and protect files with sensitive data.
      Can be configured to scan:
      • SMB files
      • SharePoint Server 2016, 2013
      Stock image of a laptop uploading to the cloud with a padlock and key in front of it.
      • Map your network and find over-exposed file shares.
      • Protect files using MIP encryption.
      • Inspect the content in file repositories and discover sensitive information.
      • Classify and label file per MIP policy.
      Azure Information Protection scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data. Discover mode helps you identify and report on files containing sensitive data (Microsoft Inside Track and CIAOPS, 2022). Enforce mode automatically classifies, labels, and protects files with sensitive data.

      Info-Tech Insight

      Any asset deployed to the cloud must have approved data classification. Enforcing this policy is a must to control your data.

      Understanding governance

      Microsoft Information Governance

      Information Governance
      • Retention policies for workloads
      • Inactive and archive mailboxes

      Arrow pointing down-right

      Records Management
      • Retention labels for items
      • Disposition review

      Arrow pointing down-left

      Retention and Deletion

      ‹——— Connectors for Third-Party Data ———›

      Information governance manages your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you do not. Backup should not be used as a retention methodology since information governance is managed as a “living entity” and backup is a stored information block that is “suspended in time.” Records management uses intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization. It is for that discrete set of content that needs to be immutable.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Retention and backup policy decision

      Retention is not backup.

      Info-Tech Insight

      Retention is not backup. Retention means something different: “the content must be available for discovery and legal document production while being able to defend its provenance, chain of custody, and its deletion or destruction” (AvePoint Blog, 2021).

      Microsoft Responsibility (Microsoft Protection) Weeks to Months Customer Responsibility (DLP, Backup, Retention Policy) Months to Years
      Loss of service due to natural disaster or data center outage Loss of data due to departing employees or deactivated accounts
      Loss of service due to hardware or infrastructure failure Loss of data due to malicious insiders or hackers deleting content
      Short-term (30 days) user error with recycle bin/ version history (including OneDrive “File Restore”) Loss of data due to malware or ransomware
      Short-term (14 days) administrative error with soft- delete for groups, mailboxes, or service-led rollback Recovery from prolonged outages
      Long-term accidental deletion coverage with selective rollback

      Understand retention policy

      What are retention policies used for? Why you need them as part of your MVP?

      Do not confuse retention labels and policies with backup.

      Remember: “retention [policies are] auto-applied whereas retention label policies are only applied if the content is tagged with the associated retention label” (AvePoint Blog, 2021).

      E-discovery tool retention policies are not turned on automatically.

      Retention policies are not a backup tool – when you activate this feature you are unable to delete anyone.

      “Data retention policy tools enable a business to:

      • “Decide proactively whether to retain content, delete content, or retain and then delete the content when needed.
      • “Apply a policy to all content or just content meeting certain conditions, such as items with specific keywords or specific types of sensitive information.
      • “Apply a single policy to the entire organization or specific locations or users.
      • “Maintain discoverability of content for lawyers and auditors, while protecting it from change or access by other users. […] ‘Retention Policies’ are different than ‘Retention Label Policies’ – they do the same thing – but a retention policy is auto-applied, whereas retention label policies are only applied if the content is tagged with the associated retention label.

      “It is also important to remember that ‘Retention Label Policies’ do not move a copy of the content to the ‘Preservation Holds’ folder until the content under policy is changed next.” (Source: AvePoint Blog, 2021)

      Definitions

      Data classification is a focused term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level. In its most basic form, data classification is a means of protecting your data from unauthorized disclosure, alteration, or destruction based on how sensitive or impactful it is.

      Once data is classified, you can then create policies; sensitive data types, trainable classifiers, and sensitivity labels function as inputs to policies. Policies define behaviors, like if there will be a default label, if labeling is mandatory, what locations the label will be applied to, and under what conditions. A policy is created when you configure Microsoft 365 to publish or automatically apply sensitive information types, trainable classifiers, or labels.

      Sensitivity label policies show one or more labels to Office apps (like Outlook and Word), SharePoint sites, and Office 365 groups. Once published, users can apply the labels to protect their content.

      Data loss prevention (DLP) policies help identify and protect your organization's sensitive info (Microsoft Docs, April 2022). For example, you can set up policies to help make sure information in email and documents is not shared with the wrong people. DLP policies can use sensitive information types and retention labels to identify content containing information that might need protection.

      Retention policies and retention label policies help you keep what you want and get rid of what you do not. They also play a significant role in records management.

      Data examples for MVP classification

      • Examples of the type of data you consider to be Confidential, Internal, or Public.
      • This will help you determine what to classify and where it is.
      Internal Personal, Employment, and Job Performance Data
      • Social Security Number
      • Date of birth
      • Marital status
      • Job application data
      • Mailing address
      • Resume
      • Background checks
      • Interview notes
      • Employment contract
      • Pay rate
      • Bonuses
      • Benefits
      • Performance reviews
      • Disciplinary notes or warnings
      Confidential Information
      • Business and marketing plans
      • Company initiatives
      • Customer information and lists
      • Information relating to intellectual property
      • Invention or patent
      • Research data
      • Passwords and IT-related information
      • Information received from third parties
      • Company financial account information
      • Social Security Number
      • Payroll and personnel records
      • Health information
      • Self-restricted personal data
      • Credit card information
      Internal Data
      • Sales data
      • Website data
      • Customer information
      • Job application data
      • Financial data
      • Marketing data
      • Resource data
      Public Data
      • Press releases
      • Job descriptions
      • Marketing material intended for general public
      • Research publications

      New container sensitivity labels (MIP)

      New container sensitivity labels

      Public Private
      Privacy
      1. Membership to group is open; anyone can join
      2. “Everyone except external guest” ACL onsite; content available in search to all tenants
      1. Only owner can add members
      2. No access beyond the group membership until someone shares it or changes permissions
      Allowed Not Allowed
      External guest policy
      1. Membership to group is open; anyone can join
      2. “Everyone except external guest” ACL onsite; content available in search to all tenants
      1. Only owner can add members
      2. No access beyond the group membership until someone shares it or changes permissions

      What users will see when they create or label a Team/Group/Site

      Table of what users will see when they create or label a team/group/site highlighting 'External guest policy' and 'Privacy policy options' as referenced above.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Info-Tech Insights

      Why you need sensitivity container labels:
      • Manage privacy of Teams Sites and M365 Groups
      • Manage external user access to SPO sites and teams
      • Manage external sharing from SPO sites
      • Manage access from unmanaged devices

      Data protection and security baselines

      Data Protection Baseline

      “Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline" (Microsoft Docs, June 2022). This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance. This baseline draws elements primarily from NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) and ISO (International Organization for Standardization) as well as from FedRAMP (Federal Risk and Authorization Management Program) and GDPR (General Data Protection Regulation of the European Union).

      Security Baseline

      The final stage in M365 governance is security. You need to implement a governance policy that clearly defines storage locations for certain types of data and who has permission to access it. You need to record and track who accesses content and how they share it externally. “Part of your process should involve monitoring unusual external sharing to ensure staff only share documents that they are allowed to” (Rencore, 2021).

      Info-Tech Insights

      • Controls are already in place to set data protection policy. This assists in the MVP activities.
      • Finally, you need to set your security baseline to ensure proper permissions are in place.

      Prerequisite baseline

      Icon of crosshairs.
      Security

      MFA or SSO to access from anywhere, any device

      Banned password list

      BYOD sync with corporate network

      Icon of a group.
      Users

      Sign out inactive users automatically

      Enable guest users

      External sharing

      Block client forwarding rules

      Icon of a database.
      Resources

      Account lockout threshold

      OneDrive

      SharePoint

      Icon of gears.
      Controls

      Sensitivity labels, retention labels and policies, DLP

      Mobile application management policy

      Building baselines

      Sensitivity Profiles: Public, Internal, Confidential; Subcategory: Highly Confidential

      Microsoft 365 Collaboration Protection Profiles

      Sensitivity Public External Collaboration Internal Highly Confidential
      Description Data that is specifically prepared for public consumption Not approved for public consumption, but OK for external collaboration External collaboration highly discouraged and must be justified Data of the highest sensitivity: avoid oversharing, internal collaboration only
      Label details
      • No content marking
      • No encryption
      • Public site
      • External collaboration allowed
      • Unmanaged devices: allow full access
      • No content marking
      • No encryption
      • Private site
      • External collaboration allowed
      • Unmanaged devices: allow full access
      • Content marking
      • Encryption
      • Private site
      • External collaboration allowed but monitored
      • Unmanaged devices: limited web access
      • Content marking
      • Encryption
      • Private site
      • External collaboration disabled
      • Unmanaged devices: block access
      Teams or Site details Public Team or Site open discovery, guests are allowed Private Team or Site members are invited, guests are allowed Private Team or Site members are invited, guests are not allowed
      DLP None Warn Block

      Please Note: Global/Compliance Admins go to the 365 Groups platform, the compliance center (Purview), and Teams services (Source: Microsoft Documentation, “Microsoft Purview compliance documentation”)

      Info-Tech Insights

      • Building baseline profiles will be a part of your MVP. You will understand what type of information you are addressing and label it accordingly.
      • Sensitivity labels are a way to classify your organization's data in a way that specifies how sensitive the data is. This helps you decrease risks in sharing information that shouldn't be accessible to anyone outside your organization or department. Applying sensitivity labels allows you to protect all your data easily.

      MVP activities

      PRIMARY
      ACTIVITIES
      Define Your Governance
      The objective of the MVP is reducing barriers to establishing an initial governance position, and then enabling rapid progression of the solution to address a variety of tangible risks, including DLP, data retention, legal holds, and labeling.
      Decide on your classification labels early.

      CATEGORIZATION





      CLASSIFICATION

      MVP
      Data Discovery and Management
      AIP (Azure Information Protection) scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data.
      Baseline Setup
      Building baseline profiles will be a part of your MVP. You will understand what type of information you are addressing and label it accordingly. Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline.
      Default M365 settings
      Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline. This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance.
      SUPPORT
      ACTIVITIES
      Retention Policy
      Retention policy is auto-applied. Decide whether to retain content, delete content, or retain and then delete the content.
      Sensitivity Labels
      Automatically enforce policies on groups through labels; classify groups.
      Workload Containers
      M365: SharePoint, Teams, OneDrive, and Exchange, where your data is stored for labels and policies.
      Unforced Policies
      Written policies that are not enforceable by controls in Compliance Manager such as acceptable use policy.
      Forced Policies
      Restrict sharing controls to outside organizations. Enforce prefix or suffix to group or team names.

      ACME Company MVP for M/O365

      PRIMARY
      ACTIVITIES
      Define Your Governance


      Focus on ability to use legal hold and GDPR compliance.

      CATEGORIZATION





      CLASSIFICATION

      MVP
      Data Discovery and Management


      Three classification levels (public, internal, confidential), which are applied by the user when data is created. Same three levels are used for AIP to scan legacy sources.

      Baseline Setup


      All data must at least be classified before it is uploaded to an M/O365 cloud service.

      Default M365 settings


      Turn on templates 1 8 the letter q and the number z

      SUPPORT
      ACTIVITIES
      Retention Policy


      Retention policy is auto-applied. Decide whether to retain content, delete content, or retain and then delete the content.

      Sensitivity Labels


      Automatically enforce policies on groups through labels; classify groups.

      Workload Containers


      M365: SharePoint, Teams, OneDrive, and Exchange, where your data is stored for labels and policies.

      Unforced Policies


      Written policies that are not enforceable by controls in Compliance Manager such as acceptable use policy.

      Forced Policies


      Restrict sharing controls to outside organizations. Enforce prefix or suffix to group or team names.

      Related Blueprints

      Govern Office 365

      Office 365 is as difficult to wrangle as it is valuable. Leverage best practices to produce governance outcomes aligned with your goals.

      Map your organizational goals to the administration features available in the Office 365 console. Your governance should reflect your requirements.

      Migrate to Office 365 Now

      Jumping into an Office 365 migration project without careful thought of the risks of a cloud migration will lead to project halt and interruption. Intentionally plan in order to expose risk and to develop project foresight for a smooth migration.

      Microsoft Teams Cookbook

      Remote work calls for leveraging your Office 365 license to use Microsoft Teams – but IT is unsure about best practices for governance and permissions. Moreover, IT has few resources to help train end users with Teams best practices

      IT Governance, Risk & Compliance

      Several blueprints are available on a broader topic of governance, from Make Your IT Governance Adaptable to Improve IT Governance to Drive Business Results and Build an IT Risk Management Program.

      Bibliography

      “Best practices for sharing files and folders with unauthenticated users.” Microsoft Build, 28 April 2022. Accessed 2 April 2022.

      “Build and manage assessments in Compliance Manager.” Microsoft Docs, 15 June 2022. Web.

      “Building a modern workplace with Microsoft 365.” Microsoft Inside Track, n.d. Web.

      Crane, Robert. “June 2020 Microsoft 365 Need to Know Webinar.” CIAOPS, SlideShare, 26 June 2020. Web.

      “Data Classification: Overview, Types, and Examples.” Simplilearn, 27 Dec. 2021. Accessed 11 April 2022.

      “Data loss prevention in Exchange Online.” Microsoft Docs, 19 April 2022. Web.

      Davies, Nahla. “5 Common Data Governance Challenges (and How to Overcome Them).” Dataversity. 25 October 2021. Accessed 5 April 2022.

      “Default labels and policies to protect your data.” Microsoft Build, April 2022. Accessed 3 April 2022.

      M., Peter. "Guide: The difference between Microsoft Backup and Retention." AvePoint Blog, 9 Oct. 2021. Accessed 4 April 2022.

      Meyer, Guillaume. “Sensitivity Labels: What They Are, Why You Need Them, and How to Apply Them.” nBold, 6 October 2021. Accessed 2 April 2022.

      “Microsoft 365 guidance for security & compliance.” Microsoft, 27 April 2022. Accessed 28 April 2022.

      “Microsoft Purview compliance portal.” Microsoft, 19 April 2022. Accessed 22 April 2022.

      “Microsoft Purview compliance documentation.” Microsoft, n.d. Accessed 22 April 2022.

      “Microsoft Trust Center: Products and services that run on trust.” Microsoft, 2022. Accessed 3 April 2022.

      “Protect your sensitive data with Microsoft Purview.” Microsoft Build, April 2022. Accessed 3 April 2022.

      Zimmergren, Tobias. “4 steps to successful cloud governance in Office 365.” Rencore, 9 Sept. 2021. Accessed 5 April 2022.

      Select the Optimal Disaster Recovery Deployment Model

      • Buy Link or Shortcode: {j2store}413|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $10,247 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • DR deployment has many possibilities. It becomes overwhelming and difficult to sift through all of the options and understand what makes sense for your organization.
      • The combination of high switching costs and the pressure to move applications to cloud leaves managers overwhelmed and complacent with their current DR model.

      Our Advice

      Critical Insight

      1. Cut to the chase and evaluate the feasibility of cloud first. Gauge your organization’s current capabilities for DR in the cloud before becoming infatuated with the idea.
      2. A mixed model gives you the best of both worlds. Diversify your strategy by identifying fit for purpose and balancing the work required to maintain various models.
      3. Begin with the end in mind. Commit to mastering the selected model and leverage your vendor relationship for effective DR.

      Impact and Result

      • By efficiently eliminating models that are not suited for your organization and narrowing the scope of DR deployment possibilities, you spend more time focusing on what works rather than what doesn’t.
      • Taking a funneled approach ensures that you are not wasting time evaluating application-level considerations when organizational constraints prevent you from moving forward.
      • Comparing the total cost of ownership among candidate models helps demonstrate to the business the reason behind choosing one method over another.

      Select the Optimal Disaster Recovery Deployment Model Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build the optimal DR deployment model, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Target the relevant DR options for your organization

      Complete Phase 1 to outline your DR site requirements, review any industry or organizational constraints on your DR strategy, and zero in on relevant DR models.

      • Select the Optimal Disaster Recovery Deployment Model – Phase 1: Target Relevant DR Options for Your Organization
      • DR Decision Tree (Visio)
      • DR Decision Tree (PDF)
      • Application Assessment Tool for Cloud DR

      2. Conduct a comprehensive analysis and vet the DR vendors

      Complete Phase 2 to explore possibilities of deployment models, conduct a TCO comparison analysis, and select the best-fit model.

      • Select the Optimal Disaster Recovery Deployment Model – Phase 2: Conduct a Comprehensive Analysis and Vet the DR Vendors
      • DR Solution TCO Comparison Tool

      3. Make the case and plan your transition

      Complete Phase 3 to assess outsourcing best practices, address implementation considerations, and build an executive presentation for business stakeholders.

      • Select the Optimal Disaster Recovery Deployment Model – Phase 3: Make the Case and Plan Your Transition
      • DR Solution Executive Presentation Template
      [infographic]

      Workshop: Select the Optimal Disaster Recovery Deployment Model

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Target Relevant DR Options for Your Organization

      The Purpose

      Identify potential DR models

      Key Benefits Achieved

      Take a funneled approach and avoid getting lost among all of the DR models available

      Activities

      1.1 Define DR site requirements

      1.2 Document industry and organizational constraints

      1.3 Identify potential DR models

      Outputs

      Determine the type of site, replication, and risk mitigation initiatives required

      Rule out unfit models

      DR Decision Tree

      Application Assessment Tool for Cloud DR

      2 Conduct a Comprehensive Analysis of Appropriate Models

      The Purpose

      Explore relevant DR models

      Key Benefits Achieved

      Develop supporting evidence for the various options

      Activities

      2.1 Explore pros and cons of potential solutions

      2.2 Understand the use case for DRaaS

      2.3 Review DR model diagrams

      Outputs

      Qualitative analysis on candidate models

      Evaluate the need for DRaaS

      DR diagrams for candidate models

      3 Build the DR Solution TCO Comparison Tool

      The Purpose

      Determine best cost models

      Key Benefits Achieved

      Save money by selecting the most cost effective option to meet your DR requirements

      Activities

      3.1 Gather hardware requirements for production site

      3.2 Define capacity requirements for DR

      3.3 Compare cost across various models

      Outputs

      Populate the production summary tab in TCO tool

      Understand how much hardware will need to be on standby and how much will be procured at the time of disaster

      Find the most cost effective method

      4 Make the Case and Plan Your Transition

      The Purpose

      Build support from business stakeholders by having a clear and defendable proposal for DR

      Key Benefits Achieved

      Effective and ready DR deployment model

      Activities

      4.1 Address implementation considerations for network, capacity, and day-to-day operations

      4.2 Build presentation for business stakeholders

      Outputs

      Define implementation projects necessary for deployment and appoint staff to execute them

      PowerPoint presentation to summarize findings from the course of the project

      Enterprise Network Design Considerations

      • Buy Link or Shortcode: {j2store}502|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Network Management
      • Parent Category Link: /network-management

      Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.

      Our Advice

      Critical Insight

      The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.

      Impact and Result

      Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.

      Enterprise Network Design Considerations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Enterprise Network Design Considerations Deck – A brief deck that outlines key trusts and archetypes when considering enterprise network designs.

      This blueprint will help you:

      • Enterprise Network Design Considerations Storyboard

      2. Enterprise Network Roadmap Technology Assessment Tool – Build an infrastructure assessment in an hour.

      Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.

      • Enterprise Network Roadmap Technology Assessment Tool
      [infographic]

      Further reading

      Enterprise Network Design Considerations

      It is not just about connectivity.

      Executive Summary

      Info-Tech Insight

      Connectivity and security are tightly coupled

      Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.

      Many services are no longer within the network

      The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.

      Users are demanding an anywhere, any device access model

      Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.

      Enterprise networks are changing

      The new network reality

      The enterprise network of 2020 and beyond is changing:

      • Services are becoming more distributed.
      • The number of services provided “off network” is growing.
      • Users are more often remote.
      • Security threats are rapidly escalating.

      The above statements are all accurate for enterprise networks, though each potentially to differing levels depending on the business being supported by the network. Depending on how affected the network in question currently is and will be in the near future, there are different common network archetypes that are best able to address these concerns while delivering business value at an appropriate price point.

      High-Level Design Considerations

      1. Understand Business Needs
      2. Understand what the business needs are and where users and resources are located.

      3. Define Your Trust Model
      4. Trust is a spectrum and tied tightly to security.

      5. Align With an Archetype
      6. How will the network be deployed?

      7. Understand Available Tooling
      8. What tools are in the market to help achieve design principles?

      Understand business needs

      Mission

      Never ignore the basics. Start with revisiting the mission and vision of the business to address relevant needs.

      Users

      Identify where users will be accessing services from. Remote vs. “on net” is a design consideration now more than ever.

      Resources

      Identify required resources and their locations, on net vs. cloud.

      Controls

      Identify required controls in order to define control points and solutions.

      Define a trust model

      Trust is a spectrum

      • There is a spectrum of trust, from fully trusted to not trusted at all. Each organization must decide for their network (or each area thereof) the appropriate level of trust to assign.
      • The ease of network design and deployment is directly proportional to the trust spectrum.
      • When resources and users are outside of direct IT control, the level of appropriate trust should be examined closely.

      Implicit

      Trust everything within the network. Security is perimeter based and designed to stop external actors from entering the large trusted zone.

      Controlled

      Multiple zones of trust within the network. Segmentation is a standard practice to separate areas of higher and lower trust.

      Zero

      Verify trust. The network is set up to recognize and support the principle of least privilege where only required access is supported.

      Align with an archetype

      Archetypes are a good guide

      • Using a defined archetype as a guiding principle in network design can help clarify appropriate tools or network structures.
      • Different aspects of a network can have different archetypes where appropriate (e.g. IT vs. OT [operational technology] networks).

      Traditional

      Services are provided from within the traditional network boundaries and security is provided at the network edge.

      Hybrid

      Services are provided both externally and from within the traditional network boundaries, and security is primarily at the network edge.

      Inverted

      Services are provided primarily externally, and security is cloud centric.

      Traditional networks

      Resources within network boundaries

      Moat and castle security perimeter

      Abstract

      A traditional network is one in which there are clear boundaries defined by a security perimeter. Trust can be applied within the network boundaries as appropriate, and traffic is generally routed through internally deployed control points that may be centralized. Traditional networks commonly include large firewalls and other “big iron” security and control devices.

      Network Design Tenets

      • The full network path from resource to user is designed, deployed, and controlled by IT.
      • Users external to the network must first connect to the network to gain access to resources.
      • Security, risk, and trust controls will be implemented by internal enterprise hardware/software devices.

      Control

      In the traditional network, it is assumed that all required control points can be adequately deployed across hardware/software that is “on prem” and under the control of central IT.

      Info-Tech Insight

      With increased cloud services provided to end users, this network is now more commonly used in data centers or OT networks.

      Traditional networks

      The image contains an example of what traditional networks look like, as described in the text below.

      Defining Characteristics

      • Traffic flows in a defined path under the control of IT to and from central IT resources.
      • Due to visibility into, and the control of, the traffic between the end user and resources, IT can relatively simply implement the required security controls on owned hardware.

      Common Components

      • Traditional offices
      • Remote users/road warriors
      • Private data center/colocation space

      Hybrid networks

      Resources internal and external to network

      Network security perimeter combined with cloud protection

      Abstract

      A hybrid network is one that combines elements of a traditional network with cloud resources. As some of these resources are not fully under the control of IT and may be completely “offnet” or loosely coupled to the on-premises network, the security boundaries and control points are less likely to be centralized. Hybrid networks allow the flexibility and speed of cloud deployment without leaving behind traditional network constructs. This generally makes them expensive to secure and maintain.

      Network Design Tenets

      • The network path from resource to user may not be in IT’s locus of control.
      • Users external to the network must first connect to the network to gain access to internal resources but may directly access publicly hosted ones.
      • Security, risk, and trust controls may potentially be implemented by a mixture of internal enterprise hardware/software devices and external control points.

      Control

      The hallmark of a hybrid network is the blending of public and private resources. This blending tends to necessitate both public and private points of control that may not be homogenous.

      Info-Tech Insight

      With multiple control points to address, take care in simplifying designs while addressing all concerns to ease operational load.

      Hybrid networks

      The image contains an example of what hybrid networks look like, as described in the text below.

      Defining Characteristics

      • Traffic flows to central resources across a defined path under the control of IT.
      • Traffic to cloud assets may be partially under the control of IT.
      • For central resources, the traffic to and from the end user can have the required security controls relatively simply implemented on owned hardware.
      • For public cloud assets, IT may or may not have some control over part of the path.

      Common Components

      • Traditional offices
      • Remote users/road warriors
      • Private data center/colocation space
      • Public cloud assets (IaaS/PaaS/SaaS)

      Inverted perimeter

      Resources primarily external to the network

      Security control points are cloud centric

      Abstract

      An inverted perimeter network is one in which security and control points cover the entire workflow, on or off net, from the consumer of services through to the services themselves with zero trust. Since the control plane is designed to encompass the workflow in a secure manner, much of the underlying connectivity can be abstracted. In an extreme version of this deployment, IT would abstract end-user access, and any cloud-based or on-premises resources would be securely published through the control plane with context-aware precision access.

      Network Design Tenets

      • The network path from resource to user is abstracted and controlled by IT through services like secure access service edge (SASE).
      • Users only need internet access and appropriate credentials to gain access to resources.
      • Security, risk, and trust controls will be implemented through external cloud based services.

      Control

      An inverted network abstracts the lower-layer connectivity away and focuses on implementing a cloud-based zero trust control plane.

      Info-Tech Insight

      This model is extremely attractive for organizations that consume primarily cloud services and have a large remote work force.

      Inverted networks

      The image contains an example of what inverted networks look like, as described in the text below.

      Defining Characteristics

      • The end user does not have to be in a defined location.
      • All central resources that are to be accessed are hosted on cloud resources.
      • IT has little to no control of the path between the end user and central resources.

      Common Components

      • Traditional offices
      • Regent offices/shared workspaces
      • Remote users/road warriors
      • Public cloud assets (IaaS/PaaS/SaaS)

      Understand available tooling

      Don’t buy a hammer and go looking for nails

      • A network archetype must be defined in order to understand what tools (hardware or software) are appropriate for consideration in a network build or refresh.
      • Tools are purpose built and generally designed to solve specific problems if implemented and operated correctly. Choose the tools to align with the challenges that you are solving as opposed to choosing tools and then trying to use those purchases to overcome challenges.
      • The purchase of a tool does not allow for abdication of proper design. Tools must be chosen appropriately and integrated properly to orchestrate the best solutions. Purchasing a tool and expecting the tool to solve all your issues rarely succeeds.

      “It is essential to have good tools, but it is also essential that the tools should be used in the right way.” — Wallace D. Wattles

      Software-defined WAN (SD-WAN)

      Simplified branch office connectivity

      Archetype Value: Traditional Networks

      What It Is Not

      SD-WAN is generally not a way to slash spending by lowering WAN circuit costs. Though it is traditionally deployed across lower cost access, to minimize risk and realize the most benefits from the platform many organizations install multiple circuits with greater bandwidths at each endpoint when replacing the more costly traditional circuits. Though this maximizes the value of the technology investment, it will result in the end cost being similar to the traditional cost plus or minus a small percentage.

      What It Is

      SD-WAN is a subset of software-defined networking (SDN) designed specifically to deploy a secure, centrally managed, connectivity agnostic, overlay network connecting multiple office locations. This technology can be used to replace, work in concert with, or augment more traditional costly connectivity such as MPLS or private point to point (PtP) circuits. In addition to the secure overlay, SD-WAN usually also enables policy-based, intelligent controls, based on traffic and circuit intelligence.

      Why Use It

      You have multiple endpoint locations connected by expensive lower bandwidth traditional circuits. Your target is to increase visibility and control while controlling costs if and where possible. Ease of centralized management and the ability to more rapidly turn up new locations are attractive.

      Cloud access security broker (CASB)

      Inline policy enforcement placed between users and cloud services

      Archetype Value: Hybrid Networks

      What It Is Not

      CASBs do not provide network protection; they are designed to provide compliance and enforcement of rules. Though CASBs are designed to give visibility and control into cloud traffic, they have limits to the data that they generally ingest and utilize. A CASB does not gather or report on cloud usage details, licencing information, financial costing, or whether the cloud resource usage is aligned with the deployment purpose.

      What It Is

      A CASB is designed to establish security controls beyond a company’s environment. It is commonly deployed to augment traditional solutions to extend visibility and control into the cloud. To protect assets in the cloud, CASBs are designed to provide central policy control and apply services primarily in the areas of visibility, data security, threat protection, and compliance.

      Why Use It

      You a mixture of on-premises and cloud assets. In moving assets out to the cloud, you have lost the traditional controls that were implemented in the data center. You now need to have visibility and apply controls to the usage of these cloud assets.

      Secure access service edge (SASE)

      Convergence of security and service access in the cloud

      Archetype Value: Inverted Networks

      What It Is Not

      Though the service will consist of many service offerings, SASE is not multiple services strung together. To present the value proposed by this platform, all functionality proposed must be provided by a single platform under a “single pane of glass.” SASE is not a mature and well-established service. The market is still solidifying, and the full-service definition remains somewhat fluid.

      What It Is

      SASE exists at the intersection of network-as-a-service and network-security-as-a-service. It is a superset of many network and security cloud offerings such as CASB, secure web gateway, SD-WAN, and WAN optimization. Any services offered by a SASE provider will be cloud hosted, presented in a single stack, and controlled through a single pane of glass.

      Why Use It

      Your network is inverting, and services are provided primarily as cloud assets. In a full realization of this deployment’s value, you would abstract how and where users gain initial network access yet remain in control of the communications and data flow.

      Activity

      Understand your enterprise network options

      Activity: Network assessment in an hour

      • Learn about the Enterprise Network Roadmap Technology Assessment Tool
      • Complete the Enterprise Network Roadmap Technology Assessment Tool

      This activity involves the following participants:

      • IT strategic direction decision makers.
      • IT managers responsible for network.
      • Organizations evaluating platforms for mission critical applications.

      Outcomes of this step:

      • Completed Enterprise Network Roadmap Technology Assessment Tool

      Info-Tech Insight

      Review your design options with security and compliance in mind. Infrastructure is no longer a standalone entity and now tightly integrates with software-defined networks and security solutions.

      Build an assessment in an hour

      Learn about the Enterprise Network Roadmap Technology Assessment Tool.

      This workbook provides a high-level analysis of a technology’s readiness for adoption based on your organization’s needs.

      • The workbook then places the technology on a graph that measures both the readiness and fit for your organization. In addition, it provides warnings for specific issues and lets you know if you have considerable uncertainty in your answers.
      • At a glance you can now communicate what you are doing to help the company:
        • Grow
        • Save money
        • Reduce risk
      • Regardless of your specific audience, these are important stories to be able to tell.
      The image contains three screenshots from the Enterprise Network Roadmap Technology Assessment Tool.

      Build an assessment in an hour

      Complete the Enterprise Network Roadmap Technology Assessment Tool.

      Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.

      1. Weightings: Adjust the Weighting tab to meet organizational needs. The provided weightings for the overall solution areas are based on a generic firm; individual firms will have different needs.
      2. Data Entry: For each category, answer the questions for the technology you are considering. When you have completed the questionnaire, go to the next tab for the results.
      3. Results: The Enterprise Network Roadmap Technology Assessment Tool provides a value versus readiness assessment of your chosen technology customized to your organization.

      The image contains three screenshots from the Enterprise Network Roadmap Technology Assessment Tool. It has a screenshot for each step as described in the text above.

      Related Info-Tech Research

      Effectively Acquire Infrastructure Services

      Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.

      Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery

      There are very few IT infrastructure components you should be housing internally – outsource everything else.

      Build Your Infrastructure Roadmap

      Move beyond alignment: Put yourself in the driver’s seat for true business value.

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      Leverage your vendor sourcing process to get better results.

      Research Authors

      The image contains a photo of Scott Young.

      Scott Young, Principal Research Advisor, Info-Tech Research Group

      Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.

      The image contains a photo of Troy Cheeseman.

      Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

      Bibliography

      Ahlgren, Bengt. “Design considerations for a network of information.” ACM Digital Library, 21 Dec. 2008.

      Cox Business. “Digital transformation is here. Is your business ready to upgrade your mobile work equation?” BizJournals, 1 April 2022. Accessed April 2022.

      Elmore, Ed. “Benefits of integrating security and networking with SASE.” Tech Radar, 1 April 2022. Web.

      Greenfield, Dave. “From SD-WAN to SASE: How the WAN Evolution is Progressing.” Cato Networks, 19 May 2020. Web

      Korolov, Maria. “What is SASE? A cloud service that marries SD-WAN with security.” Network World, 7 Sept. 2020. Web.

      Korzeniowski, Paul, “CASB tools evolve to meet broader set of cloud security needs.” TechTarget, 26 July 2019. Accessed March 2022.

      Build Your IT Cost Optimization Roadmap

      • Buy Link or Shortcode: {j2store}72|cart{/j2store}
      • member rating overall impact: 8.9/10 Overall Impact
      • member rating average dollars saved: $57,297 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management

      Cost optimization is misunderstood and inadequately tackled. IT departments face:

      • Top-down budget cuts within a narrow time frame
      • Absence of adequate governance: financial, project, data, etc.
      • Long-standing bureaucratic practices slowing down progress
      • Short-term thinking

      Our Advice

      Critical Insight

      Cost optimization is not just about reducing costs. In fact, you should aim to achieve three objectives:

      • Reduce your unwarranted IT spending.
      • Optimize your cost-to-value.
      • Sustain your cost optimization.

      Impact and Result

      • Follow Info-Tech’s approach to develop a 12-month cost optimization roadmap.
      • Develop an IT cost optimization strategy based on your specific circumstances and timeline.
      • Info-Tech’s methodology helps you maintain sustainable cost optimization across IT by focusing on four levers: assets, vendors, project portfolio, and workforce.

      Build Your IT Cost Optimization Roadmap Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. IT Cost Optimization Roadmap Deck – A step-by-step methodology to achieve sustainable cost optimization and effectively communicate your strategy to stakeholders.

      This blueprint will help you understand your IT cost optimization mandate, identify your journey, assess your IT spend across four levers, develop your IT cost optimization roadmap, and craft a related communication strategy.

      • Build Your IT Cost Optimization Roadmap – Phases 1-4

      2. IT Cost Optimization Workbook – A structured tool to help you document your IT cost optimization goals and outline related initiatives to develop an effective 12-month roadmap.

      This tool guides an IT department in planning and prioritization activities to build an effective IT cost optimization strategy. The outputs include visual charts and a 12-month roadmap to showcase the implementation timelines and potential cost savings.

      • IT Cost Optimization Workbook

      3. IT Cost Optimization Roadmap Samples and Templates – A proactive journey template to help you communicate your IT cost optimization strategy to stakeholders in a clear, concise, and compelling manner.

      This presentation template uses sample data from "Acme Corp" to demonstrate an IT cost optimization strategy following a proactive journey. Use this template to document your final IT cost optimization strategy outputs, including the adopted journey, IT cost optimization goals, related key initiatives, potential cost savings, timelines, and 12-month roadmap.

      • IT Cost Optimization Roadmap Samples and Templates

      Infographic

      Workshop: Build Your IT Cost Optimization Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Your Mandate & Objectives

      The Purpose

      Determine your organization’s current context and its cost optimization objectives, IT’s corresponding cost optimization journey, and goals.

      Key Benefits Achieved

      A business-aligned set of specific IT cost optimization goals.

      Activities

      1.1 Understand your organization’s cost optimization objectives and how this impacts IT.

      1.2 Review potential cost optimization target areas based on your ITFM Benchmarking Report.

      1.3 Identify factors constraining cost optimization options.

      1.4 Set concrete IT cost optimization goals.

      1.5 Identify inputs required for decision making.

      Outputs

      IT cost optimization journey and guiding principles for making corresponding decisions

      2 Outline Initiatives for Vendors & Assets

      The Purpose

      Create a longlist of potential cost optimization initiatives focused on two cost optimization levers: assets and vendors.

      Key Benefits Achieved

      A comprehensive list of potential asset- and vendor-focused initiatives including cost savings estimates.

      Activities

      2.1 Identify a longlist of possible initiatives around asset lifecycle management, investment deferral, repurposing, etc., and vendor contract renegotiation, cancelation, etc.

      2.2 Estimate the cost savings of cost optimization initiatives.

      Outputs

      Longlist of potential vendor management and asset optimization IT cost optimization initiatives

      3 Outline Initiatives for Projects & Workforce

      The Purpose

      Create a longlist of potential cost optimization initiatives focused on two cost optimization levers: project portfolio and workforce.

      Key Benefits Achieved

      A comprehensive list of potential initiatives focused on project portfolio and workforce including cost savings estimates.

      Activities

      3.1 Identify a longlist of possible initiatives around project priorities, project backlog reduction, project intake restructuring, etc., and workforce productivity, skills, redeployment, etc.

      3.2 Estimate the cost savings of cost optimization initiatives.

      Outputs

      Longlist of possible cost optimization initiatives and their potential cost savings for project portfolio and workforce levers.

      4 Build an IT Cost Optimization Roadmap

      The Purpose

      Develop a visual IT cost optimization roadmap.

      Key Benefits Achieved

      A prioritized, business-aligned IT cost optimization roadmap

      Activities

      4.1 Assess feasibility of each initiative (effort and risk profile) given cost optimization goals.

      4.2 Prioritize cost optimization initiatives to create a final shortlist.

      4.3 Fine-tune key information about your final cost optimization initiatives and develop a cost optimization roadmap for proposal.

      Outputs

      Prioritized list of key cost optimization initiatives, descriptions, estimated impact, and roadmap.

      5 Communicate & Execute

      The Purpose

      Develop a communication plan and executive presentation.

      Key Benefits Achieved

      A boardroom-ready set of communication materials for gaining buy-in and support for your IT cost optimization roadmap.

      Activities

      5.1 Outline components of a communication plan, including approvers, stakeholders, and governance and management mechanisms to be used.

      5.2 Create an executive presentation.

      5.3 Set up review time for workshop deliverables and post-workshop activities.

      Outputs

      IT cost optimization communication plan and presentation strategy.

      IT Cost Optimization Executive Presentation

      Further reading

      Build Your IT Cost Optimization Roadmap

      Improve cost-to-value in a sustainable manner.

      Analyst Perspective

      Optimize your cost sustainably.

      Whether the industry is in an economic downturn, or your business is facing headwinds in the market, pressure to reduce spending across organizations is inevitable. When it comes to the IT organization, it is often handled as a onetime event. Cost optimization is an industry standard term, but it usually translates into cost cutting. How do you manage this challenge given the day-to-day demands placed on IT? Do you apply cost reduction equally across the IT landscape, or do you apply reductions using a targeted approach? How do you balance the business demands regarding innovation with keeping the lights on? What is the best path forward?

      While the situation isn't unique, all too often the IT organization response is too shortsighted.

      By using the Info-Tech methodology and tools, you will be able to develop an IT cost optimization roadmap based on your specific circumstances and timeline.

      A well-thought-out strategy should help you achieve three objectives:

      1. Reduce your unwarranted IT spending.
      2. Optimize your cost-to-value.
      3. Sustain your cost optimization.

      This blueprint will guide you to understand your mandate, identify your cost optimization journey (reactive, proactive, or strategic), and assess your IT spend across four levers (assets, vendors, project portfolio, and workforce).

      Finally, keep in mind that cost optimization is not a project to be completed, but an ongoing process to be exercised.

      Bilal Alberto Saab, Research Director, IT Financial Management

      Bilal Alberto Saab
      Research Director, IT Financial Management
      Info-Tech Research Group

      Executive Summary

      Cost optimization is misunderstood and inadequately tackled Common obstacles Follow Info-Tech's approach to develop a 12-month cost optimization roadmap
      • Top-down budget cut within a narrow time frame.
      • Absence of adequate governance: financial, project, data, etc.
      • Long-standing bureaucratic practices slowing down progress.
      • Short-term thinking.
      • Lack of alignment and collaboration among stakeholders: communication and relationships.
      • Absence of a clear plan and adequate process.
      • Lack of knowledge, expertise, and skill set.
      • Inadequate funding and no financial transparency.
      • Poor change management practices.

      Develop an IT cost optimization strategy based on your specific circumstances and timeline.

      Info-Tech's methodology helps you maintain sustainable cost optimization across IT by focusing on four levers:

      1. Assets
      2. Vendors
      3. Project Portfolio
      4. Workforce

      Info-Tech Insight
      Cost optimization is not just about reducing costs. In fact, you should aim to achieve three objectives: (1) reduce your unwarranted IT spending, (2) optimize your cost-to-value, and (3) sustain your cost optimization.

      Your challenge

      IT leaders are often asked to cut costs.

      • Cost management is a long-term challenge. Businesses and IT departments look to have a flexible cost structure focused on maximizing business value while maintaining the ability to adapt to market pressure. However, businesses must also be able to respond to unexpected events.
      • In times of economic downturn, many CEOs and CFOs shift their thinking from growth to value protection. This can force a round of cost cutting across all departments focused on short-term, immediate, and measurable objectives.
      • Many IT departments are then faced with the challenge of meeting cost cutting targets. No one knows exactly how markets will behave, but the effects of rising inflation and increasing interest rates, for example, can manifest very quickly.

      When crisis hits, does IT's hard-won gains around being seen as a partner to the business suddenly disappear and IT becomes just a cost center all over again?

      In times of economic slowdown or downturn, the key challenge of IT leaders is to optimize costs without jeopardizing their strategic and innovative contribution.

      Common obstacles

      The 90% of the budget you keep is more important than the 10% of the budget you cut.

      • While the business responds to fluctuating economic conditions, IT must ensure that its budget remains fully aligned with business strategy and expected business value.
      • However, in the face of sudden pressures, a common tendency is to make quick decisions without fully considering their long-term implications.
      • Avoid costly mistakes with a proactive and strategic mindset. Put in place a well-communicated cost optimization strategy rather than hastily cutting back the biggest line items in your budget.

      How can IT optimize costs to achieve a corporate impact, but not cut so deep that the organization can't take advantage of opportunities to recover and thrive?

      Know how you will strategically optimize IT costs before you are forced to cut cost aggressively in a reactive fashion.

      What is cost optimization?

      It's not just about cutting costs

      • While cost optimization may involve cutting costs, it is more about making smart spend and investment decisions.
      • At its core, cost optimization is a strategic decision-making process that sets out to minimize waste and get the most value for money.
      • Cost optimization encompasses near-term, mid-term, and long-term objectives, all of which are related and build upon one another. It is an accumulative practice, not a onetime exercise.
      • A sound cost optimization practice is inherently flexible, sustainable, and consequence-oriented with the positive goal of generating net benefit for the organization over time.

      Change your mindset ...

      An Info-Tech survey of IT staff reveals that while most agree that cost optimization is an important IT process, nearly 20% fewer of them agree that it's being managed well.

      Chart of cost optimization

      Info-Tech IT Management & Governance Diagnostic, 2022.

      A starting point for cost optimization improvement is adjusting your frame of mind. Know that it's not just about making difficult cuts - in reality, it's a creative pursuit that's about thriving in all circumstances, not just surviving.

      Slow revenue growth expectations generate urgency

      Many IT organizations will be directed to trim costs during turbulent times.

      • Cost optimization implies continuous cost management, which entails long-term strategic initiatives (i.e. organizations and their IT departments seek flexible cost structures and practices focused on maximizing business value while maintaining the ability to adapt to changes in the broader economic environment). However, organizations must also be able to respond to unexpected events.
      • During times of turmoil – poor economic outlook expected to negatively impact an organization's bottom line – CEOs and CFOs think more about survival than growth, driving cost cutting across all departments to create short-term, immediate, and measurable financial benefits.
      • In such situations, many IT departments will be hard-pressed to meet cost cutting targets at short notice. If not planned correctly, with a tunnel vision focus instead of a strategic one, you can end up hurting yourself in the not-so-distant future.

      Build Your IT Cost Optimization Roadmap

      Insight summary

      Sustain an optimal cost-to-value ratio across four levers:

      1. Assets
      2. Vendors
      3. Project Portfolio
      4. Workforce

      Cost optimization is not just about reducing costs

      In fact, you should aim to achieve three objectives:
      (1) reduce your unwarranted IT spending, (2) optimize your cost-to-value, and (3) sustain your cost optimization.

      Reduce unwarranted IT spending

      Stop the bleeding or go for quick wins
      Start by reducing waste and bad spending habits while clearly communicating your intentions to your stakeholders – get buy-in.

      Optimize cost-to-value

      Value means tradeoffs
      Pursue value but know that it will lead you to make tradeoffs between cost, performance, and risk.

      Sustain cost optimization

      Think about tomorrow: reduce, reuse, recalibrate, and repeat
      Standardize and automate your cost optimization processes around a proper governance framework. Cost optimization is not a onetime exercise.

      Info-Tech's methodology for building your IT cost optimization roadmap

      Phase 1: Understand Your Mandate & Objectives

      Know where you stand and where you're going.

      Understand your cost optimization mandate within the context of your organization's situation and direction.

      Phase 2: Outline Your Initiatives

      Evaluate many, pick a few.

      Think of all possible cost optimization initiatives across the four optimization levers (Assets, Vendors, Project Portfolio, and Workforce), but only keep the ones that best help you fulfill your goals.

      Phase 3: Develop Your Roadmap

      Keep one eye on today and the other on tomorrow.

      Prioritize cost optimization initiatives that would help you achieve your near-term objectives first, but don't forget about the medium and long term.

      Phase 4: Communicate and Execute

      Communicate and collaborate - you are not a one-person show.

      Reach out to other business units where necessary. Your success relies on getting buy-in from various stakeholders, especially when cost optimization initiatives impact them in one way or another.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      IT Cost Optimization Roadmap Samples and Templates
      Templates including an abbreviated executive presentation and a final communication presentation based on a 12-month cost optimization roadmap.

      IT Cost Optimization Workbook
      A workbook generating a 12-month cost optimization roadmap.

      Measure the value of this blueprint

      Maintain an optimal IT cost-to-organization revenue ratio.

      This blueprint will guide you to set cost optimization goals across one to three main objectives, depending on your identified journey (reactive, proactive, or strategic):

      • Reduce unwarranted IT spending.
      • Optimize cost-to value.
      • Sustain cost optimization.

      In phase 1 of this blueprint, we will help you establish your goals to satisfy your organization's needs.

      In phase 3, we will help you develop a game plan and a roadmap for achieving those metrics.

      Once you implement your 12-month roadmap, start tracking the metrics below over the next fiscal year (FY) to assess the effectiveness of undertaken measures.

      Cost Optimization Objective Key Success Metric
      Reduce unwarranted IT spending Decrease IT cost in identified key areas
      Optimize cost-to-value Decrease IT cost per IT employee
      Sustain cost optimization Decrease IT cost-to-organization revenue

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.
      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4
      Call #1:
      • Identify cost optimization scope requirements, objectives, and your specific challenges.
      • Review and assess cost optimization goals and objectives.
      Call #2:

      Review potential cost optimization initiatives for assets and vendors levers.

      Call #3:

      Assess cost optimization initiatives' cost and feasibility - for assets and vendors levers.

      Call #4:

      Review potential cost optimization initiatives for project portfolio and workforce levers.

      Call #5:

      Assess cost optimization initiatives' cost and feasibility - for project portfolio and workforce levers.

      Call #6:
      • Identify final decision criteria for cost optimization prioritization.
      • Review prioritized cost optimization initiatives and roadmap outputs.
      Call #7:
      • Review the Cost Optimization Communication Plan and IT Cost Optimization Executive Presentation.
      • Discuss next steps.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI will include multiple calls over the course of one to two months.

      IT cost analysis and optimization workshop overview

      Session 1 Session 2 Session 3 Session 4 Session 5
      Activities Understand Your Mandate and Objectives Outline Initiatives for Assets and Vendors Outline Initiatives for Projects and Workforce Develop an IT Cost Optimization Roadmap Communicate and Execute
      1.1 Understand your organization's cost optimization objectives and how this impacts IT.
      1.2 Review potential cost optimization target areas based on your IT financial management benchmarking report.
      1.3 Identify factors constraining cost optimization options.
      1.4 Set concrete IT cost optimization goals.
      1.5 Identify inputs required for decision making.
      2.1 Identify a longlist of possible initiatives around:
      1. Asset lifecycle management, investment deferral, repurposing, etc.
      2. Vendor contract renegotiation, cancelation, etc.
      2.2 Estimate the cost savings of cost optimization initiatives.
      3.1 Identify a longlist of possible initiatives around:
      1. Project priorities, project backlog reduction, project intake restructuring, etc.
      2. Workforce productivity, skills, redeployment, etc.
      3.2 Estimate the cost savings of cost optimization initiatives.
      4.1 Assess the feasibility of each initiative (effort and risk profile) given cost optimization goals.
      4.2 Prioritize cost optimization initiatives to create a final shortlist.
      4.3 Fine-tune key information about your final cost optimization initiatives and develop a cost optimization roadmap for proposal.
      5.1 Outline components of a communication plan, including approvers, stakeholders, and governance and management mechanisms to be used.
      5.2 Create an executive presentation.
      5.3 Set up review time for workshop deliverables and post-workshop activities.
      Output
      • IT cost optimization journey and guiding principles for making corresponding decisions.
      • Long list of possible cost optimization initiatives and their potential cost savings for assets and vendors levers.
      • Long list of possible cost optimization initiatives and their potential cost savings for project portfolio and workforce levers.
      • Prioritized list of key cost optimization initiatives, descriptions, estimated impact, and roadmap.
      • IT cost optimization communication plan and presentation strategy.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phase 1

      Understand Your Mandate and Objectives

      Phase 1
      Understand Your Mandate and Objectives

      Phase 2
      Outline Your Cost Optimization Initiatives

      Phase 3
      Develop Your IT Cost Optimization Roadmap

      Phase 4
      Communicate and Execute

      This phase will walk you through the following activities:

      • Business context and cost optimization journey
      • Cost constraints and parameters
      • Cost optimization goals

      This phase involves the following participants:

      • CIO/IT director
      • IT finance lead

      1.1 Gain consensus on the business context and IT cost optimization journey

      60 minutes

      • Using the questions on slide 20, conduct a brief journey assessment to ensure consensus on the direction you are planning to take.
      • Document your findings in the provided template.
      Input Output
      • Understanding business objectives and identifying your IT mandate
      • Determining the cost optimization journey: reactive, proactive, or strategic
      Materials Participants
      • Whiteboard or flip charts
      • Journey assessment template
      • CIO/IT director
      • IT finance lead

      See the next three slides for guidelines and the journey assessment questions and template.

      Distinguishing between three journeys

      By considering business objectives without forgoing your IT mandate.

      Journey Reactive Proactive Strategic
      Description
      • Business objectives are closely tied to cost reduction, forcing cost cutting across IT.
      • Typically occurs during turbulent economic times, when slow revenue growth is expected.
      • Business objectives do not include clear cost optimization initiatives but mandates IT to be fiscally conservative.
      • Typically occurs when economic turbulence is on the horizon and the organization's revenue is stable - executives only have a fiscal discipline guidance.
      • Business objectives do not include clear cost optimization initiatives.
      • Typically occurs when the overall economy is in good shape and the organization is in positive revenue growth territory.
      Main Focus
      • Quick-to-execute measures with few dependencies and concrete impact in response to business urgency and/or executive directive.
      • Enabling the organization to respond to different types and magnitudes of business change in a more planned and controlled manner.
      • Establishing an efficient, agile, sustainable, and strategically aligned cost optimization practice across all stages of the business cycle, regardless of business conditions.

      Questions to help determine your journey

      Business Objectives Business Strategy
      • What are the current business objectives?
      • Are there any stated cost-related objectives? If yes, what cost-related objectives have been stated by organizational leadership, such as cuts, areas of investment, and any targets for both?
      • Does the organization have a business strategy in place?
      • Was the business strategy reviewed or revised recently?
      • What's the business strategy focus for the next 12 months?
      • Are there any cost optimization implications within the current business strategy?
      IT Objectives IT Strategy and Mandate
      • What are your current IT objectives?
      • Are your IT objectives aligned to business objectives?
      • Do you have any IT cost-related objectives? If yes, what are your current IT cost-related objectives?
      • Are your IT cost-related objectives aligned to business objectives?
      • Do you have an IT strategy in place?
      • Is your IT strategy aligned to your organization's business strategy?
      • Do you have a cost optimization mandate? If yes, what is your cost optimization mandate?
      • What's the fiscal guidance and direction in IT?
      Journey
      Agreed-upon journey: reactive, proactive, or strategic.

      Template & Example

      Journey assessment

      Business Objectives Business Strategy
      • The founder's mission around quality persists despite ownership/leadership changes. Reliability and dependability are really important to everyone.
      • Increase visibility and interconnectivity across the supply chain.
      • Increase market share: younger markets and emerging foreign markets.
      • Economic outlook expected to negatively affect the bottom line - will need to trim and protect the core.
      • Grow Gizmo product sales by 10%.
      • Lower production cost of Gizmo product by 5%.
      IT Objectives IT Strategy and Mandate
      • IT/OT convergence, process automation, and modernization are major opportunities to better position the business for the future and introduce more agility into operations and reduce production cost.
      • Very mature and stable production processes with 100% uptime is a priority.
      • Lower IT cost related to Gizmo product.
      • There's no clear cost optimization mandate, but a fiscally conservative budget is recommended.
      Journey
      Agreed-upon journey: proactive.

      1.2 Review internal and external benchmarking reports

      60-90 minutes

      1. Review the IT spend and staffing results, summarized in your Info-Tech IT Spend & Staffing Benchmarking report.
      2. Identify areas where your IT spend is disproportionately high or low in comparison with your industry peers.
      3. Review and document any causes or rationales for high or low spend in each area identified. Do not be specific about any actual optimization targets or actions at this stage - simply make notes.
      4. Start a list of potential cost optimization initiatives to be further analyzed and investigated for feasibility at a later stage (see next slides for guidance, example, and template).
      InputOutput
      • IT Spend & Staffing Benchmarking report
      • A list of potential cost optimization focus areas
      MaterialsParticipants
      • Whiteboard or flip charts
      • Potential cost optimization initiatives list template
      • CIO/IT director
      • IT finance lead

      Info-Tech's approach

      Our IT cost model maps your IT spending and staffing according to four key views, putting IT spend in language that stakeholders across the organization can relate to.

      IT cost model maps

      Template & Example

      Potential cost optimization initiatives list

      Brainstorm and list potential cost optimization initiatives at a macro level.

      Potential Initiative Source Source Contact Notes
      Reduce application maintenance cost Internal Benchmarking Report CIO Based on current year report
      Rationalize software applications Info-Tech IT Benchmarking Report CIO Based on current year report
      Migrate key business applications to the cloud Latest iteration of the IT strategy CIO New IT strategy will be in development concurrent with cost optimization strategy development
      Align job roles to the current IT structure IT org. chart and salaries HR, CIO Based on information of the current year and will likely change in a few months (beginning of a new year)
      Renegotiate the top five vendor contracts up for renewal this year List of IT vendors Procurement office, CIO, IT infrastructure director, IT applications director, IT services manager Based on a list consolidated last week

      Want help with your IT spend transparency and benchmarking efforts?

      Let us fast-track your IT spend journey.

      The path to IT financial management maturity starts with knowing exactly where your money is going. To streamline this effort, Info-Tech offers an IT Spend & Staffing Benchmarking service that provides full transparency into where your money is going without any heavy lifting on your part.

      This unique service features:

      • A client-proven approach to meet your IT spend transparency goals.
      • Spend and staff mapping that reveals business consumption of IT.
      • Industry benchmarking to compare your spending and staffing to that of your peers.
      • Results in a fraction of the time with much less effort than going it alone.
      • Expert review of results and ongoing discussions with Info-Tech analysts.

      If you'd like Info-Tech to pave the way to IT spend transparency, contact your account manager for more information - we're happy to talk anytime.

      1.3 Identify your overarching constraints

      30 minutes

      1. Assess where spend change opportunities are currently limited or nonexistent due to organization edict or policy, industry regulatory requirements, or active contracts. Ask yourself:
        1. Where do IT spend bottlenecks exist and what are they?
        2. What IT spend objectives and practices are absolutely mandatory and nonnegotiable from both a business and an IT perspective?
        3. Are there areas where spend change is possible but would be very difficult to execute due to the stakeholders involved, governance processes, time frames, or another constraining factor?
      2. Identify where reduction or elimination of an IT service would negatively affect required service levels and business continuity or recovery.
      3. List constraints as negotiable or nonnegotiable on the template provided.
      4. Remove areas of focus from your cost optimization scope that land outside achievable parameters, and flag those that are difficult but still possible.
      InputOutput
      • Situational awareness and current state understanding
      • List of negotiable constraints to act on
      • Delimiting the cost optimization scope
      MaterialsParticipants
      • Whiteboard or flip charts
      • Constraints assessment template
      • CIO/IT director
      • IT finance lead

      See the next slides for additional guidance and a constraints assessment template.

      Acknowledge your limitations

      By recognizing your constraints, which will lead you to define your cost optimization scope.

      Constraints Organizational Legal/Regulatory Other
      What An organizational constraint is any work condition that hinders an employee's performance - be it physical, emotional, or otherwise. A legal or regulatory constraint is any law, rule, standard, or regulation - be it industry specific or otherwise - limiting the ability of any stakeholder to get the most out of a certain activity, initiative, or project. Other types of constraints affecting business units.
      Who Collaborate with your IT leaders and business partners to identify all major constraints that would affect cost optimization initiatives.
      How Discussions and information sessions to distinguish between negotiable and nonnegotiable constraints that would thwart cost optimization efforts:
      • Legal/regulatory requirements and related initiatives (past, ongoing, and planned/expected).
        Example: projects cannot be delayed, processes are difficult to simplify, etc.
      • Operational governance - organization policies, processes, methodologies, structure, etc.
        Example: adopting a waterfall model for development instead of an agile one.
      • Financial and accounting practices.
        Example: capital expenditure and operational expenditure classification.
      Challenge Degree to which you can influence certain outcomes within a set time frame:
      • Prioritize negotiating constraints where you can influence the outcome or maximize cost optimization benefits.

      We define a constraint as a restriction controlling the behavior of any of your stakeholders, hence preventing a desired outcome.

      In our context, constraints will determine your playing field: the boundaries of your cost optimization scope.

      Distinguish between constraints

      Negotiable vs. nonnegotiable to delimit your cost optimization scope.

      Distinguish between constraints

      Template & Example

      Constraints assessment

      List high-level limitations that hinder your cost optimization options.

      Nonnegotiable constraints
      Organizational Legal/Regulatory IT/Other
      Prioritization of sales/customer service activities SEC compliance/reporting mandates Production unit incident response service levels
      [Constraint] [Constraint] [Constraint]
      [Constraint] [Constraint] [Constraint]
      [Constraint] [Constraint] [Constraint]
      Negotiable constraints
      Organizational Legal/Regulatory IT/Other
      Core business operations process design Vendor contracts up for near-term renewal Current capital project commitments
      [Constraint] [Constraint] [Constraint]
      [Constraint] [Constraint] [Constraint]
      [Constraint] [Constraint] [Constraint]

      1.4 Establish overarching cost optimization goals

      60-90 minutes

      1. Establish specific IT cost optimization goals. Depending on your journey, step 1.1. You will have one to three overarching cost optimization goals, as follows:
        1. Reactive: Cost-cutting goal to reduce unwarranted IT spending.
        2. Proactive: Cost-to-value optimization goal.
        3. Strategic: Cost optimization sustainability goal.
        Consider amounts and time frames, as well as likely/suitable approaches you plan to employ to achieve these goals.
      2. Document your final cost optimization goals in the IT Cost Optimization Workbook.
      3. Revisit your goals after outlining your initiatives (phase 2) to ensure feasibility depending on your journey.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Situational awareness and current state understanding
      • Defined goals for IT cost optimization
      MaterialsParticipants
      • Whiteboard or flip charts
      • Set Cost Optimization Goals tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead

      Template & Example

      Document your overarching goals

      Excel Workbook: IT Cost Optimization – Set Optimization Goals Worksheet

      Refer to the example and guidelines below on how to document your goals based on your journey:

      Table of Overarching Goals

      Column ID Input Type Guidelines
      B Dropdown Select the appropriate journey: Reactive, Proactive, or Strategic.
      C Dropdown Select the appropriate cost optimization objective: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, Sustain Cost Optimization.
      D Formula Automatic calculation, no entry required. Reduce Unwarranted IT Spending goal is the first priority, followed by Optimize Cost-to-Value, and Sustain Cost Optimization goals, respectively.
      E Text Enter the overarching goal related to each objective.

      Complete the following fields for each goal depending on your journey in the Excel Workbook as per guidelines:

      1. Navigate to the Set Cost Optimization Goals tab.
      2. Identify your journey and objective for each goal.
      3. Document your goal(s).

      Download the IT Cost Optimization Workbook

      Template & Example

      Break down your goals per quarter

      Excel Workbook: IT Cost Optimization - Set Cost Optimization Goals Worksheet

      Refer to the example and guidelines below on how to break down your goals per quarter and track your progress:

      Table break down your goals per quarter

      Column ID Input Type Guidelines
      F, G, H, I Text Enter the target per quarter: It could be a percentage, dollar amount, or description of the breakdown, depending on the cost optimization goal and objective.

      Complete the following fields for each goal depending on your journey in the Excel Workbook as per guidelines:

      1. Navigate to the Set Cost Optimization Goals tab.
      2. Determine your target per quarter for every goal.
      3. Document your targets.

      Download the IT Cost Optimization Workbook

      1.5 Identify inputs required for decision making

      60-90 minutes

      1. Each of the optimization levers (assets, vendors, project portfolio, and workforce) will require specific and unique sources of information which you will need to collect before moving forward. Examples of important sources of information include:
        1. Latest iteration of the IT strategy.
        2. List of IT assets (hardware, software).
        3. List of IT services or IT service catalog.
        4. List of current and planned IT projects and their resourcing allocations.
        5. List of largest vendor contracts and their key details, such as their expiration/renewal date.
        6. IT department organizational chart and salaries (by role).
      2. Review and analyze each of the documents.
      3. Continue to list potential cost optimization initiatives (step 1.2) to be further analyzed and investigated for feasibility at a later stage.
      InputOutput
      • IT strategy
      • Lists of IT assets, services, and projects
      • Top vendor contracts
      • IT org. chart and salaries
      • Macrolevel list of potential cost optimization initiatives
      MaterialsParticipants
      • Potential cost optimization initiatives list template (slide 24)
      • CIO/IT director
      • IT finance lead

      Prepare all pertinent sources of information

      And start drafting your cost optimization laundry list.

      Documents Benchmarking IT Strategy Other Information Sources
      What
      • Review:
        • Your IT spend trend across several years (ideally three to five years): internal benchmarking report.
        • Your IT spend compared to industry peers: external benchmarking report.
      • Analyze your internal and external benchmarking reports across the four views: service, expense, business, and innovation.
      • Review your business aligned IT strategy to identify cost optimization related initiatives.
      • At a later stage, exploit your IT strategy to prioritize cost optimization initiatives as needed.
      • Review your IT organization chart and salaries to determine whether the IT organization structure is optimal, job descriptions are mapped to the desired structure, employee skillsets and salary scale are adequate and aligned to the job description, etc.
      • Compile and examine lists of assets, vendors, projects, and services.
      • Prepare any other information sources you deem meaningful.
      Who Collaborate with your IT leaders and business partners to:
      • Prepare the necessary reports, documents, and required sources of information.
      • Identify potential cost optimization initiatives around areas of improvement.
      How Discussions and information sessions to analyze and deep dive on raw findings.
      Challenge Time to compile and analyze reports without affecting day-to-day operations:
      • Outsource some activities such as external benchmarking to organizations like Info-Tech.
      • Get consulting support on specific reports or tasks through workshops, calls, etc.

      Phase 2

      Outline Your Cost Optimization Initiatives

      Phase 1
      Understand Your Mandate and Objectives

      Phase 2
      Outline Your Cost Optimization Initiatives

      Phase 3
      Develop Your IT Cost Optimization Roadmap

      Phase 4
      Communicate and Execute

      This phase will walk you through the following activities:

      • IT cost optimization initiatives
      • IT cost optimization workbook

      This phase involves the following participants:

      • CIO/IT director
      • IT finance lead
      • IT asset manager
      • IT infrastructure manager
      • IT vendor management lead
      • PMO lead
      • IT talent management representative
      • Other IT management

      Outline your cost optimization initiatives

      Across Info-Tech's four levers.

      Levers ASSETS VENDORS PROJECT PORTFOLI WORKFORCE
      What
      • Maintain trustworthy data to optimize cost, reduce risk, and improve services in line with business priorities and requirements:
        • Optimize cost: reallocate unused hardware and software, end unneeded service agreements, and manage renewals and audits.
        • Reduce risk: provide comprehensive asset data for security controls development and incident management - manage equipment disposal.
        • Improve IT service: support incident, problem, request, and change management with ITAM data.
      • Examine your vendor contracts and vendor management practices to optimize your expected value from every IT provider you deal with.
      • Treat vendor management as a proactive, cross-functional practice aiming to create value by improving communication, relationships, processes, performance, and ultimately reducing cost.
      • Reassess your project portfolio to maximize total value in line with business objectives and strategy.
      • Reduce resource waste with a strategic approach to project portfolio management:
        • Ensure that approved projects can be completed by aligning intake with real project capacity.
        • Minimize over-allocation of resources by allocating based on the proportion of project vs. non-project work.
        • Forecast future resource requirements by maintaining accurate resource capacity data.
      • Review your strategic workforce plan to identify cost optimization opportunities.
      • Determine capability gaps to train or develop current staff and minimize the need for severance payouts and hiring costs, while providing clear career paths to retain high performers.
      • Link workforce planning with strategic planning to ensure that you have the right people in the right positions, in the right places, at the right time, with the knowledge, skills, and attributes to deliver on strategic business goals.
      Who Collaborate with your IT leaders and business partners to:
      • Prepare the necessary reports, documents, and required sources of information.
      • Determine cost optimization initiatives across the four levers.
      How You will decide on the best course of action depending on your journey.

      Most common cost optimization challenges

      Across Info-Tech's four levers.

      Levers ASSETS VENDORS PROJECT PORTFOLI WORKFORCE
      Challenge
      • Incomplete or inaccurate data, poor processes, inadequate tools, and lack of support across the organization is leading to bad decision making while damaging value.
      • Spending on IT providers is increasing while vendor contract expected value - results, output, performance, solutions, or outcomes - is not realized.
      • Poor planning, conflicting priorities, and resource scarcity is affecting project outcomes, resulting in suboptimal value.
      • Talent shortages, lack of prioritization, and experience in managing an IT workforce is leading to higher costs and a loss in value.
      Solution
      • Develop a sustainable IT asset management (ITAM) strategy aligned with your business priorities.
      • Establish a vendor management initiative (VMI) with a solid foundation to fit your organization's culture, environment, and goals.
      • Create a coherent strategy to maximize the total value that projects deliver as a portfolio, rather than a collection of individual projects.
      • Develop a strategic workforce plan (SWP) to ensure you have the right people in place at the right time.
      Related Info-Tech Research Develop an IT Asset Management Strategy Jump-start Your Vendor Management Initiative Develop a Project Portfolio Management Strategy Build a Strategic IT Workforce Plan

      2.1 Determine your cost optimization initiatives

      8 hours

      Now that you have identified your journey and understood your constraints:

      1. Review your list of potential cost optimization initiatives and document viable ones in the IT Cost Optimization Workbook.
      2. Think of potential cost optimization initiatives within the four levers: assets, vendors, project portfolio, and workforce. The following slides will help you in this endeavor.

      Download the IT Cost Optimization Workbook

      Input Output
      • Potential cost optimization initiatives list
      • Outline Initiatives in the IT Cost Optimization Workbook
      Materials Participants
      • Whiteboard or flip charts
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Other IT management - depending on the optimization lever (Assets, Vendors, Project Portfolio, or Workforce)

      Plan your cost optimization initiatives

      Your initiatives will differ depending on your journey

      In terms of aggressiveness and objectives.

      Plan cost optimization initiatives

      Cost optimization initiatives pertaining to a reactive journey are characterized by aggressive cost reduction.

      On the other hand, cost optimization initiatives within a strategic journey can vary in aggressiveness across objectives.

      2.1.1 Identify asset optimization initiatives

      2 hours

      1. Review the IT asset management strategy if available. Compile a list of all hardware, software, and facility asset costs for delivery of IT services.
      2. Analyze hardware and software assets for opportunities to consolidate, reduce, eliminate, and/or enhance functionality/automation. Look for:
        1. Redundancy or duplication of functionality not necessary for disaster recovery or business continuity purposes.
        2. Low or no-use software.
        3. Homegrown or legacy systems with high maintenance/support burdens.
        4. Multiple, old, or unsupported versions of current-use software.
        5. Opportunities to delay hardware/software refreshes or upgrades.
        6. Cloud/outsourced options.
        7. Instances of unsanctioned shadow IT.
      3. Reassess your in-house asset management processes to see where efficiency and effectiveness could be improved overall.
      4. Document cost optimization initiatives that could be driven by asset optimization objectives in the IT Cost Optimization Workbook.

      Download the IT Cost Optimization Workbook

      InputOutput
      • IT asset management strategy
      • List of current assets including hardware, software, and facilities
      • Outline Initiatives driven by asset optimization objectives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Whiteboard or flip charts
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT asset manager
      • IT infrastructure manager
      • Other IT management

      Example

      Asset optimization

      Some examples to get you started

      Journey Reactive, Proactive, or Strategic Proactive or Strategic Strategic
      Initiatives
      • Validate the license cost of performance optimization.
      • Review the utilization of software/hardware before renewal or purchase of additional hardware or software.
      • Assess new license cost against projects to determine possibility of differing or canceling software.
      • Postpone the purchases of hardware.
      • Extend the life of hardware.
      • Consolidate and reconfigure hardware.
      • Return damaged/malfunctioning hardware under warranty.
      • Consolidate and reconfigure software.
      • Optimize software/hardware functionality.
      • Implement hardware/software standard or policy.
      • Develop an infrastructure management outsourcing strategy.
      • Optimize cloud management: review utilization, licensing, cost, etc.
      • Develop a sustainable IT asset management (ITAM) strategy aligned with your business priorities.
      • Minimize shadow IT by creating a policy and improving the service request process.
      • Develop or assess a cloud strategy for a certain service.
      No initiatives for the reactive journey. No initiatives for the reactive or proactive journeys.
      Objective Reduce Unwarranted IT Spending Optimize Cost-to-Value Sustain Cost Optimization

      Template & Example

      List your objectives and initiatives

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to input your asset optimization initiatives and related objectives:

      List your objectives and initiatives

      Column ID Input Type Guidelines
      B Formula Automatic calculation, no entry required. The ID will update once there's an input in column E.
      C Dropdown Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce.
      D Dropdown Select an initiative focus from the dropdown list - this will help you think of initiatives.
      E Text Enter your initiative.
      F Text Write a brief description per initiative, providing a cost optimization rationale.
      G Dropdown Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure).
      H Dropdown Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization.

      List your initiatives in the provided Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Enter all your initiatives driven by the asset optimization lever.
      3. Determine the cost optimization objective per initiative.

      2.1.2 Identify vendor optimization initiatives

      2 hours

      1. Revisit the IT vendor classification if available. Identify all existing vendor contracts up for renewal within the current fiscal year and create an inventory.
      2. Examine your vendor contracts to optimize your expected value from every IT provider you deal with. For each contract:
        1. Identify the business purpose/drivers.
        2. Identify the expiration/renewal date to determine time frames for action.
        3. Determine if there is an opportunity to rightsize, cancel, renegotiate costs/service levels, or postpone renewal/purchase.
        4. Identify integrations and interdependencies with other hardware and software systems to understand scope and impact of potential changes.
      3. Reassess your in-house vendor management processes to see where efficiency and effectiveness could be improved overall.
      4. Document cost optimization initiatives that could be driven by vendor optimization objectives in the IT Cost Optimization Workbook.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Vendor classification
      • Vendors contracts
      • Outline Initiatives driven by vendor optimization objectives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Whiteboard or flip charts
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT vendor management lead
      • Other IT management

      Example

      Vendor optimization

      Some examples to get you started.

      Journey Reactive, Proactive, or Strategic Proactive or Strategic Strategic
      Initiatives
      • Renegotiate and rightsize a vendor contract:
        • Cancel vendor/service/type application contract.
        • Renegotiate vendor/service/type contract.
        • Cancel vendor/service/type licenses.
        • Rationalize number of vendor/service/type licenses.
      • Consolidate vendors/resellers with similar services, products and features.
      • Implement a vendor management initiative to maximize value and minimize risk.
      • Consolidate contracts to take advantage of spending power and volume.
      • Set up custom vendor performance metrics.
      • Establish ongoing monitoring of vendor risk (financial, security, etc.).
      No initiatives for the reactive journey. No initiatives for the reactive or proactive journeys.
      Objective Reduce Unwarranted IT Spending Optimize Cost-to-Value Sustain Cost Optimization

      Template & Example

      List your objectives and initiatives

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to input your vendor optimization initiatives and related objectives:

      List your objectives and initiatives

      Column ID Input Type Guidelines
      B Formula Automatic calculation, no entry required. The ID will update once there's an input in column E.
      C Dropdown Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce.
      D Dropdown Select an initiative focus from the dropdown list - this will help you think of initiatives.
      E Text Enter your initiative.
      F Text Write a brief description per initiative, providing a cost optimization rationale.
      G Dropdown Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure).
      H Dropdown Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization.

      List your initiatives in the provided Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Enter all your initiatives driven by the vendor optimization lever.
      3. Determine the cost optimization objective per initiative.

      2.1.3 Identify project portfolio optimization initiatives

      2 hours

      1. Review the IT Project Portfolio Strategy if available, and the list of both in-flight and planned projects.
      2. Reassess your project portfolio to maximize total value in line with business objectives and strategy. For each current and pending project on the list, identify a cost optimization initiative, including:
        1. Revisiting, confirming, and documenting actual project rationale with the business in relation to strategic goals.
        2. Rescoping existing projects that are underway.
        3. Accelerating planned or existing projects that enable business cost savings or competitive advantage and revenue growth.
        4. Canceling or postponing projects that are underway or haven't started.
        5. Identifying net-new projects that enhance business capabilities or save business costs.
      3. Reassess your in-house project management and project portfolio management processes to see where efficiency and effectiveness could be improved overall.
      4. Document cost optimization initiatives that could be driven by project portfolio optimization objectives in the IT Cost Optimization Workbook.

      Download the IT Cost Optimization Workbook

      Input Output
      • Project Portfolio Management Strategy
      • List of current and pending projects
      • Outline Initiatives driven by project portfolio optimization objectives in the IT Cost Optimization Workbook
      Materials Participants
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • PMO lead
      • Other IT management

      Example

      Project portfolio optimization

      Some examples to get you started.

      Journey Reactive, Proactive, or Strategic Proactive or Strategic Strategic
      Initiatives
      • Cancel projects with no executive sponsor.
      • Cancel projects with unacceptable timelines.
      • Postpone projects where there is a more urgent need for related resources.
      • Rescope projects where a more effective business case has been identified.
      • Freeze projects where scope and resourcing are uncertain.
      • Accelerate projects that enable business cost savings or a competitive advantage with revenue growth.
      • Combine projects that are better managed by realigning project managers and coordinators.
      • Break projects into phases to front-load realized value.
      • Outsource projects with commoditized skillset requirements.
      • Reassess the technology requirements when multiple vendors are involved.
      • Reexamine project rationale with the business in relation to strategic goals.
      • Identify net-new projects that offer improved value in relation to current economics.
      • Reassess the strategic drivers for project spending in the face of shifting priorities.
      • Implement a project portfolio governance function.
      • Introduce a benefits realization discipline in relation to the benefits forecasted during project approval.
      No initiatives for the reactive journey. No initiatives for the reactive or proactive journeys.
      Objective Reduce Unwarranted IT Spending Optimize Cost-to-Value Sustain Cost Optimization

      Template & Example

      List your objectives and initiatives

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to input your project portfolio optimization initiatives and related objectives:

      List your objectives and initiatives

      Column ID Input Type Guidelines
      B Formula Automatic calculation, no entry required. The ID will update once there's an input in column E.
      C Dropdown Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce.
      D Dropdown Select an initiative focus from the dropdown list - this will help you think of initiatives.
      E Text Enter your initiative.
      F Text Write a brief description per initiative, providing a cost optimization rationale.
      G Dropdown Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure).
      H Dropdown Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization.

      List your initiatives in the provided Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Enter all your initiatives driven by the project portfolio optimization lever.
      3. Determine the cost optimization objective per initiative.

      2.1.4 Identify workforce optimization initiatives

      2 hours

      1. Review the IT department's strategic workforce plan (SWP) if available, organizational chart, and salaries by role. Do not review IT staffing in terms of named individuals who occupy a given role - focus on functions, roles, and job descriptions.
      2. Determine capability gaps:
        1. Rectify efficiency, effectiveness, and other performance issues.
        2. Train IT staff to enhance or improve skills and effectiveness.
        3. Add roles, skills, or headcount to improve effectiveness.
        4. Integrate teams to improve collaboration and reduce redundancies or break out new ones to increase focus/specialization.
        5. Redesign job roles and responsibilities.
        6. Redeploy/reassign staff to other teams.
        7. Conduct layoff (as a last resort, starting by assessing contractual employees).
      3. Document cost optimization initiatives that could be driven by workforce optimization objectives in the IT Cost Optimization Workbook.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Strategic workforce plan (SWP)
      • Organizational charts
      • Staff lists
      • Outline Initiatives driven by workforce optimization objectives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Talent management representative
      • Other IT management

      Example

      Workforce optimization

      Some examples to get you started.

      Journey Reactive, Proactive, or Strategic Proactive or Strategic Strategic
      Initiatives
      • Defer vacancy, position, or role.
      • Freeze all overnight and unessential IT staff travel.
      • Outsource project/function to free internal resources.
      • Postpone nonessential IT staff training as per training plans.
      • Suspend IT team discretionary spend.
      • Streamline workforce related to department/service (develop the process).
      • Relocate role or function from division or group to division or group.
      • Adjust framework and level assignments.
      • Promote and train employees for a certain objective.
      • Implement a strategic workforce plan (SWP) to ensure you have the right people in place, at the right time.
      • Set up a workforce performance monitoring framework or process to optimize staffing capabilities aligned with business value.
      No initiatives for the reactive journey. No initiatives for the reactive or proactive journeys.
      Objective Reduce Unwarranted IT Spending Optimize Cost-to-Value Sustain Cost Optimization

      Template & Example

      List your objectives and initiatives

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to input your workforce optimization initiatives and related objectives:

      List your objectives and initiatives

      Column ID Input Type Guidelines
      B Formula Automatic calculation, no entry required. The ID will update once there's an input in column E.
      C Dropdown Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce.
      D Dropdown Select an initiative focus from the dropdown list - this will help you think of initiatives.
      E Text Enter your initiative.
      F Text Write a brief description per initiative, providing a cost optimization rationale.
      G Dropdown Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure).
      H Dropdown Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization.

      List your initiatives in the provided Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Enter all your initiatives driven by the workforce optimization lever.
      3. Determine the cost optimization objective per initiative.

      2.2 Estimate the cost savings of cost optimization initiatives

      8 hours

      Now that you have identified your initiatives:

      1. Review your cost optimization initiatives per lever (Assets, Vendors, Project Portfolio, and Workforce).
      2. Determine whether the implementation cost of each of your initiatives is included as part of your budget.
      3. Estimate your cost savings.
      4. Document your assessment in the IT Cost Optimization Workbook.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Potential cost optimization initiatives list
      • Outline Initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Whiteboard or flip charts
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Other IT management - depending on the optimization lever (Assets, Vendors, Project Portfolio, or Workforce)

      2.2.1 Estimate the costs impacting your asset optimization initiatives

      2 hours

      1. Review each asset optimization initiative to estimate cost implications.
      2. Consider implementation cost in terms of your budget, and document it in the IT Cost Optimization Workbook (see next slides). Is the implementation cost of the underlying initiative considered in your current budget? If not, move to the next initiative. You will assess the flagged initiative independently at a later stage if deemed necessary.
      3. Estimate the current cost related to the initiative (including implementation cost), and document it in the IT Cost Optimization Workbook (see next slides). This will be the first of two inputs needed to calculate the initiative's potential cost savings.
      4. Estimate the expected cost, post initiative execution, of the underlying initiative, and document it in the IT Cost Optimization Workbook (see next slides). This will be the second and last input needed to calculate the initiative's potential cost savings.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Asset optimization initiatives
      • Cost and budget information
      • Cost estimates of asset optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT asset manager
      • IT infrastructure manager
      • Other IT management

      Template & Example

      Estimate your cost

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete cost estimates for each asset optimization initiative:

      Estimate your cost

      Column ID Input Type Guidelines
      I Dropdown Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative.
      J, K Whole Number Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative.
      L Formula Automatic calculation, no entry required. The difference between current cost and expected cost.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine if the implementation cost is considered within the budget.
      3. If yes, estimate the current cost, and expected cost of the underlying initiative.

      2.2.2 Estimate the costs impacting your vendor optimization initiatives

      2 hours

      1. Review each vendor optimization initiative to estimate cost implications.
      2. Consider implementation cost in terms of your budget, and document it in the IT Cost Optimization Workbook (see next slides). Is the implementation cost of the underlying initiative considered in your current budget? If not, move to the next initiative. You will assess the flagged initiative independently at a later stage if deemed necessary.
      3. Estimate the current cost related to the initiative (including implementation cost), and document it in the IT Cost Optimization Workbook (see next slides). This will be the first of two inputs needed to calculate the initiative's potential cost savings.
      4. Estimate the expected cost, post initiative execution, of the underlying initiative, and document it in the IT Cost Optimization Workbook (see next slides). This will be the second and last input needed to calculate the initiative's potential cost savings.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Vendor optimization initiatives
      • Cost and budget information
      • Cost estimates of vendor optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT vendor management lead
      • Other IT management

      Template & Example

      Estimate your cost

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete cost estimates for each vendor optimization initiative:

      Estimate your cost

      Column ID Input Type Guidelines
      I Dropdown Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative.
      J, K Whole Number Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative.
      L Formula Automatic calculation, no entry required. The difference between current cost and expected cost.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine if the implementation cost is considered within the budget.
      3. If yes, estimate the current cost, and expected cost of the underlying initiative.

      2.2.3 Estimate the costs impacting your project portfolio optimization initiatives

      2 hours

      1. Review each project portfolio optimization initiative to estimate cost implications.
      2. Consider implementation cost in terms of your budget, and document it in the IT Cost Optimization Workbook (see next slides). Is the implementation cost of the underlying initiative considered in your current budget? If not, move to the next initiative. You will assess the flagged initiative independently at a later stage if deemed necessary.
      3. Estimate the current cost related to the initiative (including implementation cost), and document it in the IT Cost Optimization Workbook (see next slides). This will be the first of two inputs needed to calculate the initiative's potential cost savings.
      4. Estimate the expected cost, post initiative execution, of the underlying initiative, and document it in the IT Cost Optimization Workbook (see next slides). This will be the second and last input needed to calculate the initiative's potential cost savings.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Project portfolio optimization initiatives
      • Cost and budget information
      • Cost estimates of project portfolio optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • PMO lead
      • Other IT management

      Template & Example

      Estimate your cost

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete cost estimates for each project portfolio optimization initiative:

      Estimate your cost

      Column ID Input Type Guidelines
      I Dropdown Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative.
      J, K Whole Number Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative.
      L Formula Automatic calculation, no entry required. The difference between current cost and expected cost.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine if the implementation cost is considered within the budget.
      3. If yes, estimate the current cost, and expected cost of the underlying initiative.

      2.2.4 Estimate the costs impacting your workforce optimization initiatives

      2 hours

      1. Review each workforce optimization initiative to estimate cost implications.
      2. Consider implementation cost in terms of your budget, and document it in the IT Cost Optimization Workbook (see next slides). Is the implementation cost of the underlying initiative considered in your current budget? If not, move to the next initiative. You will assess the flagged initiative independently at a later stage if deemed necessary.
      3. Estimate the current cost related to the initiative (including implementation cost), and document it in the IT Cost Optimization Workbook (see next slides). This will be the first of two inputs needed to calculate the initiative's potential cost savings.
      4. Estimate the expected cost, post initiative execution, of the underlying initiative, and document it in the IT Cost Optimization Workbook (see next slides). This will be the second and last input needed to calculate the initiative's potential cost savings.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Workforce optimization initiatives
      • Cost and budget information
      • Cost estimates of workforce optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Talent management representative
      • Other IT management

      Template & Example

      Estimate your cost

      Excel Workbook: IT Cost Optimization –i Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete cost estimates for each workforce optimization initiative:

      Estimate your cost

      Column ID Input Type Guidelines
      I Dropdown Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative.
      J, K Whole Number Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative.
      L Formula Automatic calculation, no entry required. The difference between current cost and expected cost.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine if the implementation cost is considered within the budget.
      3. If yes, estimate the current cost, and expected cost of the underlying initiative.

      Phase 3

      Develop Your IT Cost Optimization Roadmap

      Phase 1
      Understand Your Mandate and Objectives

      Phase 2
      Outline Your Cost Optimization Initiatives

      Phase 3
      Develop Your IT Cost Optimization Roadmap

      Phase 4
      Communicate and Execute

      This phase will walk you through the following activities:

      • IT cost optimization workbook
      • IT cost optimization roadmap

      This phase involves the following participants:

      • CIO/IT director
      • IT finance lead
      • IT asset manager
      • IT infrastructure manager
      • IT vendor management lead
      • PMO lead
      • IT talent management representative
      • Other IT management

      Develop your prioritized and aligned cost optimization roadmap

      The process of developing your roadmap is where you set final cost optimization priorities, conduct a final rationalization to decide what's in and what's out, and document your proposed plan of action.

      First, take a moment to consider if you missed anything. Too often, only the cost cutting elements of the cost optimization equation get attention. Remember that cost optimization also includes making smart investments. Sometimes adding and expanding is better for the business than removing or contracting.

      • Do your proposed initiatives help position the organization to recover quickly if you're dealing with a downturn or recession scenario?
      • Have you fully considered growth or innovation opportunities that will help optimize costs in the long run?

      Feasibility
      Eliminate initiatives from the longlist of potential initiatives that cannot be achieved given the cost optimization goals you determined at the beginning of this exercise.

      Priority
      Rank order the remaining initiatives according to their ability to contribute to goal attainment and dependency relationships with external constraints and one another.

      Action Plan
      Create an overarching visual roadmap that shows how you intend to achieve your cost optimization goals over the short, medium, and long-term.

      3.1 Assess the feasibility of your cost optimization initiatives

      4 hours

      Now that you have identified your initiatives across the four levers and understood the business impacts:

      1. Review each of your cost optimization initiatives and estimate the feasibility in terms of:
        1. Effort required to implement.
        2. Risk: Likelihood of failure and impact on performance.
        3. Approval rights: Within the IT or finance's accountability/domain or not.
      2. Document your assessment in the IT Cost Optimization Workbook.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Cost optimization initiatives
      • Feasibility estimates of cost optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Variables tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Other IT management - depending on the optimization lever (Assets, Vendors, Project Portfolio, or Workforce)

      3.1.1 Estimate the feasibility of your asset optimization initiatives

      1 hour

      1. Review each asset optimization initiative to estimate feasibility implications.
      2. Start by defining the effort required variables. Think in terms of how many dedicated full-time employees you would need to implement the initiative. Document your definition for each of the three variables (High, Medium, or Low) in the IT Cost Optimization Workbook (see next slides). Then, estimate the effort required to implement the related initiative. Consider complexity, scope, and resource availability, before you document it in the IT Cost Optimization Workbook (see next slides).
      3. Define your likelihood of failure variables. Think in terms of probability of failure or percent chance the underlying initiative will not succeed. Document your definition for each of the three variables (High, Medium, or Low) in the IT Cost Optimization Workbook (see next slides). Then, estimate the likelihood of failure to implement the related initiative, and document it in the IT Cost Optimization Workbook (see next slides).
      4. Consider the initiative's impact on performance. Would implementing the initiative hinder IT or business performance? If you are on a reactive journey, would it impede business recovery in any way, shape, or form? Document the impact (Positive Impact, No Impact, or Negative Impact) in the IT Cost Optimization Workbook (see next slides).
      5. Determine who is responsible for approving the initiative. Does it fall within your jurisdiction, responsibility, or accountability? If not, it would mean that it might be more difficult to implement the initiative. Document approval rights (within accountability or not within accountability) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      Input Output
      • Asset optimization initiatives
      • Feasibility estimates of asset optimization initiatives in the IT Cost Optimization Workbook
      Materials Participants
      • Define Variables tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT asset manager
      • IT infrastructure manager
      • Other IT management

      Template & Example

      Define your feasibility variables

      Excel Workbook: IT Cost Optimization – Define Variables Worksheet

      Refer to the example and guidelines below on how to define your feasibility variables for standardization purposes. You can adopt a different definition per optimization lever (Assets, Vendors, Project Portfolio, and Workforce), or maintain the same one across initiatives, depending on what makes sense for your organization:

      Define your feasibility variables

      Column ID Input Type Guidelines
      B, G Formula Automatic calculation, no entry required. The ID will populate automatically.
      C, H Text No entry required. Three variables identified: High, Medium, Low.
      D, E Whole Number Review and input the range of each effort required variable, based on the number of dedicated full-time employees needed to implement an initiative, as it works best for your organization.
      I, J Whole Number Review and input the range of each likelihood of failure variable, based on the probability of failure of an initiative, as it works best for your organization. This example should work for most organizations.

      Define your feasibility variables in the Excel Workbook as per guidelines:

      1. Navigate to the Define Variables tab.
      2. Review and enter the range of each effort required and likelihood of failure variable as you see fit for your organization.

      Template & Example

      Estimate your feasibility

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete feasibility estimates for each asset optimization initiative:

      Estimate your feasibility

      Column ID Input Type Guidelines
      M Dropdown Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability.
      N Dropdown Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative.
      O Dropdown Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey).
      P Dropdown Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not.
      Q Text Write a brief description per initiative, providing an impact rationale and identifying the approver where possible.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate effort required to implement the underlying initiative.
      3. Identify the risk of each initiative: likelihood of failure and impact on performance.
      4. Choose the adequate approval right classification for each initiative.

      3.1.2 Estimate the feasibility of your vendor optimization initiatives

      1 hour

      1. Review each vendor optimization initiative to estimate feasibility implications, along with previously defined variables (see slides 64 and 65).
      2. Consider the initiative's impact on performance. Would implementing the initiative hinder IT or business performance? If you are on a reactive journey, would it impede business recovery in any way, shape, or form? Document the impact (Positive Impact, No Impact, or Negative Impact) in the IT Cost Optimization Workbook (see next slides).
      3. Determine who is responsible for approving the initiative. Does it fall within your jurisdiction, responsibility, or accountability? If not, it would mean that it might be more difficult to implement the initiative. Document approval rights (within accountability or not within accountability) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      InputOutput
      • Vendor optimization initiatives
      • Feasibility estimates of vendor optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Variables tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT vendor management lead
      • Other IT management

      Template & Example

      Estimate your feasibility

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete feasibility estimates for each vendor optimization initiative:

      Estimate your feasibility

      Column ID Input Type Guidelines
      M Dropdown Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability.
      N Dropdown Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative.
      O Dropdown Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey).
      P Dropdown Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not.
      Q Text Write a brief description per initiative, providing an impact rationale and identifying the approver where possible.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate effort required to implement the underlying initiative.
      3. Identify the risk of each initiative: likelihood of failure and impact on performance.
      4. Choose the adequate approval right classification for each initiative.

      3.1.3 Estimate the feasibility of your project portfolio optimization initiatives

      1 hour

      1. Review each project portfolio optimization initiative to estimate feasibility implications, along with previously defined variables (see slides 64 and 65).
      2. Consider the initiative's impact on performance. Would implementing the initiative hinder IT or business performance? If you are on a reactive journey, would it impede business recovery in any way, shape, or form? Document the impact (Positive Impact, No Impact, or Negative Impact) in the IT Cost Optimization Workbook (see next slides).
      3. Determine who is responsible for approving the initiative. Does it fall within your jurisdiction, responsibility, or accountability? If not, it would mean that it might be more difficult to implement the initiative. Document approval rights (within accountability or not within accountability) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      InputOutput
      • Project portfolio optimization initiatives
      • Feasibility estimates of vendor optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Variables tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • PMO lead
      • Other IT management

      Template & Example

      Estimate your feasibility

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete feasibility estimates for each project portfolio optimization initiative:

      Estimate your feasibility

      Column ID Input Type Guidelines
      M Dropdown Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability.
      N Dropdown Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative.
      O Dropdown Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey).
      P Dropdown Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not.
      Q Text Write a brief description per initiative, providing an impact rationale and identifying the approver where possible.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate effort required to implement the underlying initiative.
      3. Identify the risk of each initiative: likelihood of failure and impact on performance.
      4. Choose the adequate approval right classification for each initiative.

      3.1.4 Estimate the feasibility of your workforce optimization initiatives

      1 hour

      1. Review each workforce optimization initiative to estimate feasibility implications, along with previously defined variables (see slides 64 and 65).
      2. Consider the initiative's impact on performance. Would implementing the initiative hinder IT or business performance? If you are on a reactive journey, would it impede business recovery in any way, shape, or form? Document the impact (Positive Impact, No Impact, or Negative Impact) in the IT Cost Optimization Workbook (see next slides).
      3. Determine who is responsible for approving the initiative. Does it fall within your jurisdiction, responsibility, or accountability? If not, it would mean that it might be more difficult to implement the initiative. Document approval rights (within accountability or not within accountability) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      InputOutput
      • Workforce optimization initiatives
      • Feasibility estimates of workforce optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Variables tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Talent management representative
      • Other IT management

      Template & Example

      Estimate your feasibility

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete feasibility estimates for each workforce optimization initiative:

      Estimate your feasibility

      Column ID Input Type Guidelines
      M Dropdown Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability.
      N Dropdown Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative.
      O Dropdown Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey).
      P Dropdown Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not.
      Q Text Write a brief description per initiative, providing an impact rationale and identifying the approver where possible.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate effort required to implement the underlying initiative.
      3. Identify the risk of each initiative: likelihood of failure and impact on performance.
      4. Choose the adequate approval right classification for each initiative.

      3.2 Prioritize cost optimization initiatives to create a final shortlist

      4 hours

      Now that you have your cost and feasibility for each cost optimization initiative:

      1. Review each of your cost optimization initiatives and estimate the time and priority by considering:
        1. Preliminary priority assessment based on your cost and feasibility input.
        2. Time frame: start and end date of each initiative.
        3. Current budget cycle: time remaining in the current budget cycle and potential cost savings in this fiscal year.
      2. Determine the final priority of the initiative and decide whether you want to include it in your 12-month roadmap.
      3. Document your assessment in the IT Cost Optimization Workbook.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Cost optimization initiatives
      • Time and priority estimates of cost optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Priority Threshold tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Other IT management - depending on the optimization lever (Assets, Vendors, Project Portfolio, or Workforce)

      3.2.1 Prioritize your asset optimization initiatives

      1 hour

      1. Review each asset optimization initiative to set the priority.
      2. Validate your cost and feasibility estimates and consider the automated evaluation, in the IT Cost Optimization Workbook, providing you with a preliminary priority based on your cost and feasibility estimates (see next slides).
      3. Revisit your overarching goals (step 1.4) as you will assess the time it will take you to complete your initiatives and prioritize accordingly.
      4. Determine your start and end date for each initiative based on your journey, objectives, and overarching goals. Consider the urgency of each initiative. Document the quarter and year for your start and end dates in the IT Cost Optimization Workbook (see next slides).
      5. Identify the time remaining in your current budget cycle after the completion of each initiative to get a cost savings estimate for the current fiscal year. Document the number of remaining quarters (0, 1, 2, 3, or 4) in the IT Cost Optimization Workbook (see next slides).
      6. Decide on the priority of each initiative (High, Medium, or Low), and document it in the IT Cost Optimization Workbook (see next slides).
      7. Revisit the priority decision after prioritizing all your initiatives and determine which ones to include in your 12-month roadmap; consider the number of initiatives you can tackle at the same time within a 12-month period. Document your final decision (Yes or No) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      InputOutput
      • Asset optimization initiatives
      • Time and priority estimates of cost optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Priority Threshold tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT asset manager
      • IT infrastructure manager
      • Other IT management

      Template & Example

      Understand your priority assessment

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each asset optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:

      Understand your priority assessment

      Column ID Input Type Guidelines
      R Formula Hidden automatic calculation, no entry required. Rank of estimate cost savings (per year) in ascending order (higher cost savings implies a higher rank).
      S Formula Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score.
      T Formula Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget.
      U, V, W Formula Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1.
      X Formula Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P).
      Y Formula Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-value (column H).
      Z Formula Hidden automatic calculation, no entry required. Preliminary priority assessment based on the Define Priority Threshold worksheet (hidden, see next slide).

      Review the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Validate cost and feasibility estimates (columns I to P previously filled - steps 2.2 and 3.1) driving the Priority Score and Preliminary Priority Assessment.

      Template & Example

      Priority threshold rationale

      Excel Workbook: IT Cost Optimization – Define Priority Threshold Worksheet

      Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the priority score and priority level:

      Priority threshold rationale

      Template & Example

      Estimate your timeline

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete timeline estimates for each asset optimization initiative:

      Estimate your timeline

      Column ID Input Type Guidelines
      AA, AC Dropdown Select the quarter(s) in which you plan to begin and complete your initiative.
      AB, AD Dropdown Select the year(s) in which you plan to begin and complete your initiative.
      AE Dropdown Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD.
      AF Formula Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L).
      AG Dropdown Select if cost savings after the implementation of the underlying initiative will be permanent or temporary.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate quarter and year to start and complete the initiative.
      3. Identify the time remaining in your current budget cycle after the completion of the initiative.

      Template & Example

      Make your final decisions

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to assign the final priority for each asset optimization initiative, and include it in your 12-month roadmap:

      Make your final decisions

      Column ID Row ID Input Type Guidelines
      AH - Dropdown Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG).
      AI - Dropdown Select whether you want to include the initiative in your 12-month roadmap (Yes or No).
      AK, AL 5 Formula Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected.
      AK, AL 6 Formula Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected)
      AK, AL 7 Formula Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected)
      • Estimated cost savings per year refer to cost savings fully realized by the end of the upcoming fiscal year, following the initiatives' implementation.
      • Estimated cost savings in the current budget cycle, refer to cost savings partially realized in the current fiscal year, after the initiatives' implementation.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the final priority of the initiative.
      3. Decide whether you want to include the initiative in your 12-month roadmap.

      3.2.2 Prioritize your vendor optimization initiatives

      1 hour

      1. Review each vendor optimization initiative to set the priority.
      2. Validate your cost and feasibility estimates and consider the automated evaluation, in the IT Cost Optimization Workbook, providing you with a preliminary priority based on your cost and feasibility estimates (see next slides).
      3. Revisit your overarching goals (step 1.4) as you will assess the time it will take you to complete your initiatives and prioritize accordingly.
      4. Determine your start and end date for each initiative based on your journey, objectives, and overarching goals. Consider the urgency of each initiative. Document the quarter and year for your start and end dates in the IT Cost Optimization Workbook (see next slides).
      5. Identify the time remaining in your current budget cycle after the completion of each initiative to get a cost savings estimate for the current fiscal year. Document the number of remaining quarters (0, 1, 2, 3, or 4) in the IT Cost Optimization Workbook (see next slides).
      6. Decide on the priority of each initiative (High, Medium, or Low), and document it in the IT Cost Optimization Workbook (see next slides).
      7. Revisit the priority decision after prioritizing all your initiatives and determine which ones to include in your 12-month roadmap; consider the number of initiatives you can tackle at the same time within a 12-month period. Document your final decision (Yes or No) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      Input Output
      • Vendor optimization initiatives
      • Time and priority estimates of cost optimization initiatives in the IT Cost Optimization Workbook
      Materials Participants
      • Define Priority Threshold tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • IT vendor management lead
      • Other IT management

      Template & Example

      Understand your priority assessment

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each vendor optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:

      Understand your priority assessment

      Column ID Input Type Guidelines
      R Formula Hidden automatic calculation, no entry required. Rank of estimate cost savings (per year) in ascending order (higher cost savings implies a higher rank).
      S Formula Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score.
      T Formula Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget.
      U, V, W Formula Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1.
      X Formula Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P).
      Y Formula Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H).
      Z Formula Hidden automatic calculation, no entry required. Preliminary priority assessment based on the Define Priority Threshold worksheet (hidden, see next slide).

      Review the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Validate cost and feasibility estimates (columns I to P previously filled - steps 2.2 and 3.1) driving the Priority Score and Preliminary Priority Assessment.

      Template & Example

      Priority Threshold Rationale

      Excel Workbook: IT Cost Optimization – Define Priority Threshold Worksheet

      Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:

      Priority Threshold Rationale

      Template & Example

      Estimate your timeline

      Excel Workbook: IT Cost Optimization – Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete timeline estimates for each vendor optimization initiative:

      Estimate your timeline

      Column ID Input Type Guidelines
      AA, AC Dropdown Select the quarter(s) in which you plan to begin and complete your initiative.
      AB, AD Dropdown Select the year(s) in which you plan to begin and complete your initiative.
      AE Dropdown Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD.
      AF Formula Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L).
      AG Dropdown Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate quarter and year to start and complete the initiative.
      3. Identify the time remaining in your current budget cycle after the completion of the initiative.

      Template & Example

      Make your final decisions

      Excel Workbook: IT Cost Optimization - Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to assign the final priority for each vendor optimization initiative, and include it in your 12-month roadmap:

      Make your final decisions

      Column ID Row ID Input Type Guidelines
      AH - Dropdown Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG).
      AI - Dropdown Select whether you want to include the initiative in your 12-month roadmap (Yes or No).
      AK, AL 5 Formula Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected.
      AK, AL 6 Formula Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected)
      AK, AL 7 Formula Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected)
      • Estimated cost savings per year refer to cost savings fully realized by the end of the upcoming fiscal year, following the initiatives' implementation.
      • Estimated cost savings in the current budget cycle, refer to cost savings partially realized in the current fiscal year, after the initiatives' implementation.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the final priority of the initiative.
      3. Decide whether you want to include the initiative in your 12-month roadmap.

      3.2.3 Prioritize your project portfolio optimization initiatives

      1 hour

      1. Review each project portfolio optimization initiative to set the priority.
      2. Validate your cost and feasibility estimates and consider the automated evaluation, in the IT Cost Optimization Workbook, providing you with a preliminary priority based on your cost and feasibility estimates (see next slides).
      3. Revisit your overarching goals (step 1.4) as you will assess the time it will take you to complete your initiatives and prioritize accordingly.
      4. Determine your start and end date for each initiative based on your journey, objectives, and overarching goals. Consider the urgency of each initiative. Document the quarter and year for your start and end dates in the IT Cost Optimization Workbook (see next slides).
      5. Identify the time remaining in your current budget cycle after the completion of each initiative to get a cost savings estimate for the current fiscal year. Document the number of remaining quarters (0, 1, 2, 3, or 4) in the IT Cost Optimization Workbook (see next slides).
      6. Decide on the priority of each initiative (High, Medium, or Low), and document it in the IT Cost Optimization Workbook (see next slides).
      7. Revisit the priority decision after prioritizing all your initiatives and determine which ones to include in your 12-month roadmap; consider the number of initiatives you can tackle at the same time within a 12-month period. Document your final decision (Yes or No) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      InputOutput
      • Project portfolio optimization initiatives
      • Time and priority estimates of cost optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Priority Threshold tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • PMO lead
      • Other IT management

      Template & Example

      Understand your priority assessment

      Excel Workbook: IT Cost Optimization - Outline Initiatives Worksheet

      Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each project portfolio optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:

      Understand your priority assessment

      Column ID Input Type Guidelines
      R Formula Hidden automatic calculation, no entry required. Rank of Estimate Cost Savings (per year) in ascending order (higher cost savings implies a higher rank).
      S Formula Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score.
      T Formula Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget.
      U, V, W Formula Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1.
      X Formula Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P).
      Y Formula Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H).
      Z Formula Hidden automatic calculation, no entry required. Preliminary Priority Assessment based on the Define Priority Threshold worksheet (hidden, see next slide).

      Review the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Validate cost and feasibility estimates (columns I to P previously filled - steps 2.2 and 3.1) driving the Priority Score and Preliminary Priority Assessment.

      Template & Example

      Priority Threshold Rationale

      Excel Workbook: IT Cost Optimization - Define Priority Threshold Worksheet

      Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:

      Priority threshold rationale

      Template & Example

      Estimate your timeline

      Excel Workbook: IT Cost Optimization - Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete timeline estimates for each project portfolio optimization initiative:

      Estimate your timeline

      Column ID Input Type Guidelines
      AA, AC Dropdown Select the quarter(s) in which you plan to begin and complete your initiative.
      AB, AD Dropdown Select the year(s) in which you plan to begin and complete your initiative.
      AE Dropdown Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD.
      AF Formula Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L).
      AG Dropdown Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate quarter and year to start and complete the initiative.
      3. Identify the time remaining in your current budget cycle after the completion of the initiative.

      Template & Example

      Make your final decisions

      Excel Workbook: IT Cost Optimization - Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to assign the final priority for each project portfolio optimization initiative and include it in your 12-month roadmap:

      Make your final decisions

      Column ID Row ID Input Type Guidelines
      AH - Dropdown Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG).
      AI - Dropdown Select whether you want to include the initiative in your 12-month roadmap (Yes or No).
      AK, AL 5 Formula Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected.
      AK, AL 6 Formula Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected)
      AK, AL 7 Formula Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected)
      • Estimated cost savings per year refer to cost savings fully realized by the end of the upcoming fiscal year, following the initiatives' implementation.
      • Estimated cost savings in the current budget cycle, refer to cost savings partially realized in the current fiscal year, after the initiatives' implementation.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the final priority of the initiative.
      3. Decide whether you want to include the initiative in your 12-month roadmap.

      3.2.4 Prioritize your workforce optimization initiatives

      1 hour

      1. Review each workforce optimization initiative to set the priority.
      2. Validate your cost and feasibility estimates and consider the automated evaluation, in the IT Cost Optimization Workbook, providing you with a preliminary priority based on your cost and feasibility estimates (see next slides).
      3. Revisit your overarching goals (step 1.4) as you will assess the time it will take you to complete your initiatives and prioritize accordingly.
      4. Determine your start and end date for each initiative based on your journey, objectives, and overarching goals. Consider the urgency of each initiative. Document the quarter and year for your start and end dates in the IT Cost Optimization Workbook (see next slides).
      5. Identify the time remaining in your current budget cycle after the completion of each initiative to get a cost savings estimate for the current fiscal year. Document the number of remaining quarters (0, 1, 2, 3, or 4) in the IT Cost Optimization Workbook (see next slides).
      6. Decide on the priority of each initiative (High, Medium, or Low), and document it in the IT Cost Optimization Workbook (see next slides).
      7. Revisit the priority decision after prioritizing all your initiatives and determine which ones to include in your 12-month roadmap; consider the number of initiatives you can tackle at the same time within a 12-month period. Document your final decision (Yes or No) in the IT Cost Optimization Workbook (see next slides).

      Download the IT Cost Optimization Workbook

      InputOutput
      • Workforce optimization initiatives
      • Time and priority estimates of cost optimization initiatives in the IT Cost Optimization Workbook
      MaterialsParticipants
      • Define Priority Threshold tab in the IT Cost Optimization Workbook
      • Outline Initiatives tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT finance lead
      • Talent management representative
      • Other IT management

      Template & Example

      Understand your priority assessment

      Excel Workbook: IT Cost Optimization - Outline Initiatives Worksheet

      Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each workforce optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:

      Understand your priority assessment

      Column ID Input Type Guidelines
      R Formula Hidden automatic calculation, no entry required. Rank of Estimate Cost Savings (per year) in ascending order (higher cost savings implies a higher rank).
      S Formula Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score.
      T Formula Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget.
      U, V, W Formula Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1.
      X Formula Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P).
      Y Formula Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H).
      Z Formula Hidden automatic calculation, no entry required. Preliminary Priority Assessment based on the Define Priority Threshold worksheet (hidden, see next slide).

      Review the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Validate cost and feasibility estimates (columns I to P previously filled - steps 2.2 and 3.1) driving the Priority Score and Preliminary Priority Assessment.

      Template & Example

      Priority Threshold Rationale

      Excel Workbook: IT Cost Optimization - Define Priority Threshold

      Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:

      Priority Threshold Rationale

      Template & Example

      Estimate your timeline

      Excel Workbook: IT Cost Optimization - Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to complete timeline estimates for each workforce optimization initiative:

      Estimate your timeline

      Column ID Input Type Guidelines
      AA, AC Dropdown Select the quarter(s) in which you plan to begin and complete your initiative.
      AB, AD Dropdown Select the year(s) in which you plan to begin and complete your initiative.
      AE Dropdown Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD.
      AF Formula Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L).
      AG Dropdown Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the appropriate quarter and year to start and complete the initiative.
      3. Identify the time remaining in your current budget cycle after the completion of the initiative.

      Template & Example

      Make your final decisions

      Excel Workbook: IT Cost Optimization - Outline Initiatives Worksheet

      Refer to the example and guidelines below on how to assign the final priority for each workforce optimization initiative, and include it in your 12-month roadmap:

      Make your final decisions

      Column ID Row ID Input Type Guidelines
      AH - Dropdown Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG).
      AI - Dropdown Select whether you want to include the initiative in your 12-month roadmap (Yes or No).
      AK, AL 5 Formula Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected.
      AK, AL 6 Formula Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected)
      AK, AL 7 Formula Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected)
      • Estimated cost savings per year refer to cost savings fully realized by the end of the upcoming fiscal year, following the initiatives' implementation.
      • Estimated cost savings in the current budget cycle, refer to cost savings partially realized in the current fiscal year, after the initiatives' implementation.

      Complete the following fields for each initiative in the Excel Workbook as per guidelines:

      1. Navigate to the Outline Initiatives tab.
      2. Determine the final priority of the initiative.
      3. Decide whether you want to include the initiative in your 12-month roadmap.

      3.3 Develop your cost optimization roadmap

      1 hour

      1. Conduct a final evaluation of your timeline, priority decision, and initiatives you wish to include in your 12-month roadmap. Do they make sense, are they achievable, and do they all contribute individually and collectively to reaching your cost optimization goals?
      2. Review your 12-month roadmap outputs in the IT Cost Optimization Workbook (see next slides).
      3. Make adjustments to your 12-month roadmap by adding or removing initiatives as you deem necessary (step 3.2).
      4. Document your final roadmap - including initiatives and relative time frames for execution - in the IT Cost Optimization Roadmap templates provided (see slide 97). The 12-month roadmap outputs from the IT Cost Optimization Workbook (see next slide) can facilitate this task.

      Download the IT Cost Optimization Workbook

      Input Output
      • Outline Initiatives tab in the IT Cost Optimization Workbook, output from previous steps
      • IT Cost Optimization Roadmap
      Materials Participants
      • Outline Initiatives Charts tab in the IT Cost Optimization Workbook
      • Diagram Results tab in the IT Cost Optimization Workbook
      • List Results tab in the IT Cost Optimization Workbook
      • Timeline Result tab in the IT Cost Optimization Workbook
      • CIO/IT director
      • IT financial lead
      • Other IT management

      Template & Example

      Potential Cost Savings Per Year

      Excel Workbook: IT Cost Optimization - Outline Initiatives Charts Worksheet

      Refer to the example below on charts depicting different views of estimated cost savings per year across the four optimization levers (Assets, Vendors, Project Portfolio, and Workforce) that could help you in your assessment and decision making.

      Potential cost savings per year

      From the Excel Workbook, after completing your potential initiatives and filling all related entries in the Outline Initiatives tab:

      1. Navigate to the Outline Initiatives Charts tab.
      2. Review each of the charts.
      3. Navigate back to the Outline Initiatives tab to examine, drill down, and amend individual initiative entries or final decisions as you deem necessary.

      Template & Example

      12-month Roadmap Outputs

      Excel Workbook: IT Cost Optimization - Diagram Results, List Results, and Timeline Result Worksheets

      Refer to the example below depicting different roadmap output that could help you in presentations, assessment, and decision making.

      12-month Roadmap Outputs

      From the Excel Workbook:

      1. Navigate to the Diagram Results tab. This bubble diagram represent cost optimization initiatives by objective where each bubble size is determined by its estimated cost saving per year.
      2. Navigate to the List Results tab. You will find a list of the cost optimizations initiatives you've chosen to include in your roadmap and related charts.
      3. Navigate to the Timeline Result tab. This Gantt chart is a timeline view of the cost optimizations initiatives you've chosen to include in your roadmap.

      Download the IT Cost Optimization Workbook

      IT cost optimization roadmap

      Phase 4

      Communicate and Execute

      Phase 1
      Understand Your Mandate and Objectives

      Phase 2
      Outline Your Cost Optimization Initiatives

      Phase 3
      Develop Your IT Cost Optimization Roadmap

      Phase 4
      Communicate and Execute

      This phase will walk you through the following activities:

      • Cost optimization communication plan
      • Cost optimization executive presentation

      This phase involves the following participants:

      • CIO/IT director
      • IT finance lead
      • PMO lead
      • Other IT management

      Build Your IT Cost Optimization Roadmap

      4.1 Build the communication plan

      45 to 60 minutes

      1. Use the Cost Optimization Communication Plan templates and guidance on the following slides.
      2. Complete the template to develop your communication plan for your cost optimization proposal and initiatives. At a minimum, it should include:
        1. Steps for preparing and presenting your proposal to decision-makers, sponsors, and other stakeholders, including named presenters and points of contact in IT.
        2. Checkpoints for communication throughout the execution of each initiative and the cost optimization roadmap overall, including target audiences, accountabilities, modes and methods of communication, type/scope of information to be communicated at each checkpoint, and any decision/approval steps.

      Download the IT Cost Optimization Workbook

      InputOutput
      • Cost optimization roadmap
      • Completed draft of the Cost Optimization Communication Plan
      MaterialsParticipants
      • IT Cost Optimization Workbook
      • IT Cost Optimization Roadmap
      • Info-Tech's Cost Optimization Communication Plan template
      • CIO/IT director
      • IT financial lead
      • Other IT management

      Understand a communication strategy's purpose

      Put as much effort into developing your communication strategy as you would into planning and executing the cost optimization initiatives themselves. Don't skip this part.

      Your communication strategy has two major components ...

      1. A tactical plan for how and when you'll communicate with stakeholders about your proposals, activities, and progress toward meeting cost optimization goals.
      2. An executive or board presentation that outlines your final proposed cost optimization initiatives, their respective business cases, and resources/support required with the goal of gaining approval to execute.

      Your communication strategy will need to ...

      • Provide answers to the "What's in it for me?" question from all impacted stakeholders.
      • Roles, responsibilities, and accountabilities before, during, and after initiatives are completed.
      • Descriptions and high-level information about dates, deliverables, and impacts of the specific changes being made.

      You will also develop more detailed operational and project plans for each initiative. IT will use these plans to manage and track the execution of individual initiatives when the time comes.

      Template & Example

      Document the overall what and why of your planned communications

      Component Purpose Context Key Messages Intended Outcomes
      Definition Description of the topic and why you're communicating with this specific audience right now. Background information about the broader situation and how you got to where you are today. The main points you want your target audience to hear/read, absorb, and remember. What you hope you and your audience will get at the end of the communication or effort.
      Our Language
      • IT is proposing an organization-wide array of initiatives in order to reduce IT costs. We are seeking your approval and support to carry out these initiatives.
      • [Purpose]
      • The economy is in active downturn and may become a full recession.
      • IT is anticipating mandatory cost reductions and has opted to take a proactive position.
      • We used an analytical framework to look at all areas of the organization to identify and prioritize IT cost-reduction opportunities.
      • [Context]
      • IT is being proactive.
      • IT is sensitive to the business.
      • IT needs your support.
      • IT is committed to keeping you informed at every step.
      • IT wants to position the organization for rapid recovery when the economy improves.
      • [Message]
      • Buy-in, approval, and ongoing support for cost optimization initiatives proposed.
      • Update on the status of specific initiatives, including what's happened, progress, and what's coming next.
      • [Outcome]

      Template & Example

      Next, note the who, how, and when of your communication plan

      Stakeholder/Approver Initiatives Impact Format Time frame Messenger
      CEO
      • Reduce number of Minitab licenses
      • Defer hiring of new data architecture position
      • Cancel VR simulation project
      Indefinitely delays current strategic projects Monthly meeting discussion Last Wednesday of every month starting Oct. 26, FY1 CIO, IT data analytics project lead, IT VR project lead
      IT Steering Committee
      • Adjust service level framework and level assignments
      • Postpone purchases for network modernization
      • Postpone workstation/laptop upgrades for non-production functions
      • Outsource data analytics project
      Nearly all of these initiatives are enterprise-wide or affect multiple departments. Varying direct and indirect impacts will need to be independently communicated for each initiative if approved by the ITS.

      Formal presentation at quarterly ITS meetings

      Monthly progress updates via email bulletin

      Approval presentation: Oct. 31, FY1

      Quarterly updates: Jan. 31, Apr. 28, and Jul. 28, FY2

      CIO, IT service director, IT infrastructure director, IT data analytics project lead
      VP of Sales
      • Pause Salesforce view redesign project
      Delays new sales tool efficiency improvement. Meeting discussion Nov. FY1 CIO, IT Salesforce view redesign project lead
      [Name/Title/Group]
      • [Initiative]
      • [Initiative]
      [Impact statement] [Format] [Date/Period] [Name/Title]
      [Name/Title/Group]
      • [Initiative]
      • [Initiative]
      [Impact statement] [Format] [Date/Period] [Name/Title]
      [Name/Title/Group]
      • [Initiative]
      • [Initiative]
      [Impact statement] [Format] [Date/Period] [Name/Title]

      4.2 Build the executive presentation

      45-60 minutes

      1. Download Info-Tech's IT Cost Optimization Roadmap Samples and Templates.
      2. Update the content with the outputs of your cost optimization roadmap and data/graph elements from the IT Cost Optimization Workbook. Refer to your organization's standards and norms for executive-level presentations and adapt accordingly.

      Download IT Cost Optimization Roadmap Samples and Templates

      Input Output
      • IT Cost Optimization Roadmap
      • IT Cost Optimization Workbook
      • Completed draft of the IT Cost Optimization Executive Presentation
      Materials Participants
      • IT Cost Optimization Workbook
      • IT Cost Optimization Roadmap Samples and Templates
      • CIO/IT directors
      • IT financial lead
      • Other IT management

      Summary of Accomplishment

      Congratulations! You now have an IT cost optimization strategy and a communication plan.

      Throughout this blueprint, you have:

      1. Identified your IT mandate and cost optimization journey.
      2. Outlined your initiatives across the four levers (assets, vendors, project portfolio, and workforce).
      3. Put together a 12-month IT cost optimization roadmap.
      4. Developed a communication strategy and crafted an executive presentation - your initial step to communicate and discuss IT cost optimization initiatives with your key stakeholders.

      What's next?

      Communicate with your stakeholders, then follow your internal project policies and procedures to get the necessary approvals as required. Once obtained, you can start the execution and implementation of your IT cost optimization strategy.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com
      1-888-670-8889

      Research Contributors and Experts

      Jennifer Perrier, Principal Research Director, IT Financial Management

      Jennifer Perrier
      Principal Research Director, IT Financial Management
      Info-Tech Research Group

      Jack Hakimian, Senior Vice President, Research Development

      Jack Hakimian
      Senior Vice President, Research Development
      Info-Tech Research Group

      Graham Price, Senior Executive Counselor, Executive Services

      Graham Price
      Senior Executive Counselor, Executive Services
      Info-Tech Research Group

      Travis Duncan, Research Director, Project & Portfolio Management

      Travis Duncan
      Research Director, Project & Portfolio Management
      Info-Tech Research Group

      Dave Kish, Practice Lead, IT Financial Management

      Dave Kish
      Practice Lead, IT Financial Management
      Info-Tech Research Group

      Baird Miller, PhD, Senior Executive Advisor, Executive Services

      Baird Miller, PhD
      Senior Executive Advisor, Executive Services
      Info-Tech Research Group

      Other Research Contributors and Experts

      Monica Braun
      Research Director, IT Financial Management
      Info-Tech Research Group

      Sandi Conrad
      Principal Advisory Director, Infrastructure & Operations
      Info-Tech Research Group

      Phil Bode
      Principal Advisory Director, Vendor Management
      Info-Tech Research Group

      Donna Glidden
      Advisory Director, Vendor Management
      Info-Tech Research Group

      Barry Cousins
      Distinguished Analyst & Research Fellow
      Info-Tech Research Group

      Andrew Sharp
      Research Director, Infrastructure & Operations Practice
      Info-Tech Research Group

      Frank Sewell
      Advisory Director, Vendor Management
      Info-Tech Research Group

      Related Info-Tech Research

      Achieve IT Spend & Staffing Transparency
      Most CIOs, CFOs, and business function leaders don't enjoy a shared vocabulary when it comes to talking about technology spend. As a result, truly meaningful conversations about where and how to spend technology funds in support of business goals are rare. Enable these important conversations by transparently mapping your IT spend data against four key stakeholder views.

      Reduce Shadow IT With a Service Request Catalog
      As the business gets more innovative to solve its problems, IT finds itself in reactive mode, dealing with software bloat, managing surprise SaaS renewals, and having to integrate products that they didn't know were purchased. To solve this, IT needs to focus on service and visibility to counter Shadow IT.

      Bibliography

      "A Short Guide to Structured Cost Reduction." National Audit Office, 18 June 2010. Web.

      "IT Cost Savings: A Guide to Application Rationalization." LeanIX, 2021. Web.

      Jouravlev, Roman. "Service Financial Management: ITIL 4 Practice Guide." Axelos, 30 April 2020. Web.

      Leinwand, Paul, and Vinay Couto. "How to Cut Costs More Strategically." Harvard Business Review, March 2017. Web.

      "Role & Influence of the Technology Decision-Maker 2022." Foundry, 2022. Web.

      "State of the CIO 2022." CIO, 2022. Web.

      "The Definitive Guide to IT Cost Optimization." LeanIX, n.d. Web.

      "Understand the Principles of Cost Optimization." Google Cloud, n.d. Web.

      Spread Best Practices With an Agile Center of Excellence

      • Buy Link or Shortcode: {j2store}152|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $97,499 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your organization is looking to create consistency across all Agile teams to drive greater business results and alignment.
      • You are seeking to organically grow Agile capabilities within the organization through a set of support structures and facilitated through shared learning and capabilities.

      Our Advice

      Critical Insight

      • Social capital can be an enabler, but also a barrier. People can only manage a finite number of relationships; ensure that the connections the Center of Excellence (CoE) facilitates are purposeful.
      • Don’t over govern. Empowerment is critical to enable improvements; set boundaries and let teams work inside them with autonomy.
      • Legitimize through listening. A CoE will not be leveraged unless it aligns with the needs of its users. Invest the time to align with the functional expectations of your Agile teams.

      Impact and Result

      • Create a set of service offerings aligned with both corporate objectives and the functional expectations of its customers to ensure broad support and utility of the invested resources.
      • Understand some of the cultural and processual challenges you will face when forming a center of excellence, and address them using Info-Tech’s Agile adoption model.

      Spread Best Practices With an Agile Center of Excellence Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build an Agile Center of Excellence, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Strategically align the Center of Excellence

      Create strategic alignment between the CoE and the organization’s goals, objectives, and vision.

      • Spread Best Practices With an Agile Center of Excellence – Phase 1: Strategically Align the Center of Excellence

      2. Standardize the Center of Excellence’s service offerings

      Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization.

      • Spread Best Practices With an Agile Center of Excellence – Phase 2: Standardize the Center of Excellence’s Service Offerings

      3. Operate the Center of Excellence

      Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change.

      • Spread Best Practices With an Agile Center of Excellence – Phase 3: Operationalize Your Agile Center of Excellence
      • ACE Satisfaction Survey
      • CoE Maturity Diagnostic Tool
      • ACE Benefits Tracking Tool
      • ACE Communications Deck
      [infographic]

      Workshop: Spread Best Practices With an Agile Center of Excellence

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Determine Vision of CoE

      The Purpose

      Create strategic alignment between the CoE and the organization’s goals, objectives, and vision.

      Understand how your key stakeholders will impact the longevity of your CoE.

      Determine your CoE structure and staff.

      Key Benefits Achieved

      Top-down alignment with strategic aims of the organization.

      A set of high-level use cases to form the CoE’s service offerings around.

      Visualization of key stakeholders, with their current and desired power and involvement documented.

      Activities

      1.1 Identify and prioritize organizational business objectives.

      1.2 Form use cases for the points of alignment between your Agile Center of Excellence (ACE) and business objectives.

      1.3 Prioritize your ACE stakeholders.

      Outputs

      Prioritized business objectives

      Business-aligned use cases to form CoE’s service offerings

      Stakeholder map of key influencers

      2 Define Service Offerings of CoE

      The Purpose

      Document the functional expectations of the Agile teams.

      Refine your business-aligned use cases with your collected data to achieve both business and functional alignment.

      Create a capability map that visualizes and prioritizes your key service offerings.

      Key Benefits Achieved

      Understanding of some of the identified concerns, pain points, and potential opportunities from your stakeholders.

      Refined use cases that define the service offerings the CoE provides to its customers.

      Prioritization for the creation of service offerings with a capability map.

      Activities

      2.1 Classified pains and opportunities.

      2.2 Refine your use cases to identify your ACE functions and services.

      2.3 Visualize your ACE functions and service offerings with a capability map.

      Outputs

      Classified pains and opportunities

      Refined use cases based on pains and opportunities identified during ACE requirements gathering

      ACE Capability Map

      3 Define Engagement Plans

      The Purpose

      Align service offerings with an Agile adoption model so that teams have a structured way to build their skills.

      Standardize the way your organization will interact with the Center of Excellence to ensure consistency in best practices.

      Key Benefits Achieved

      Mechanisms put in place for continual improvement and personal development for your Agile teams.

      Interaction with the CoE is standardized via engagement plans to ensure consistency in best practices and predictability for resourcing purposes.

      Activities

      3.1 Further categorize your use cases within the Agile adoption model.

      3.2 Create an engagement plan for each level of adoption.

      Outputs

      Adoption-aligned service offerings

      Role-based engagement plans

      4 Define Metrics and Plan Communications

      The Purpose

      Develop a set of metrics for the CoE to monitor business-aligned outcomes with.

      Key Benefits Achieved

      The foundations of continuous improvement are established with a robust set of Agile metrics.

      Activities

      4.1 Define metrics that align with your Agile business objectives.

      4.2 Define target ACE performance metrics.

      4.3 Define Agile adoption metrics.

      4.4 Assess the interaction and communication points of your Agile team.

      4.5 Create a communication plan for change.

      Outputs

      Business objective-aligned metrics

      CoE performance metrics

      Agile adoption metrics

      Assessment of organizational design

      CoE communication plan

      Further reading

      Spread Best Practices With an Agile Center of Excellence

      Achieve ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      ANALYST PERSPECTIVE

      "Inconsistent processes and practices used across Agile teams is frequently cited as a challenge to adopting and scaling Agile within organizations. (VersionOne’s 13th Annual State of Agile Report [N=1,319]) Creating an Agile Center of Excellence (ACE) is a popular way to try to impose structure and improve performance. However, simply establishing an ACE does not guarantee you will be successful with Agile. When setting up an ACE you must: Define ACE services based on identified stakeholder needs. Staff the ACE with respected, “hands on” people, who deliver identifiable value to your Agile teams. Continuously evolve ACE service offerings to maximize stakeholder satisfaction and value delivered."

      Alex Ciraco, Research Director, Applications Practice Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • A CIO who is looking for a way to optimize their Agile capabilities and ensure ongoing alignment with business objectives.
      • An applications director who is looking for mechanisms to inject continuous improvement into organization-wide Agile practices.

      This Research Will Help You:

      • Align your Agile support structure with business objectives and the functional expectations of its users.
      • Standardize the ways in which Agile teams develop and learn to create consistency in purpose and execution.
      • Track and communicate successes to ensure the long-term viability of an Agile Center of Excellence (ACE).

      This Research Will Also Assist

      • Project managers who are tasked with managing Agile projects.
      • Application development managers who are struggling with establishing consistency, transparency, and collaboration across their teams.

      This Research Will Help Them:

      • Provide service offerings to their team members that will help them personally and collectively to develop desired skills.
      • Provide oversight and transparency into Agile projects and outcomes through ongoing monitoring.

      Executive summary

      Situation

      • Your organization has had some success with Agile, but needs to drive consistency across Agile teams for better business results and alignment.
      • You are seeking to organically grow Agile capabilities within the organization through a set of support services and facilitated through shared learning and capabilities.

      Complication

      • Organizational constraints, culture clash, and lack of continuous top-down support are hampering your Agile growth and maturity.
      • Attempts to create consistency across Agile teams and processes fail to account for the expectations of users and stakeholders, leaving them detached from projects and creating resistance.

      Resolution

      • Align the service offerings of your ACE with both corporate objectives and the functional expectations of its stakeholders to ensure broad support and utilization of the invested resources.
      • Understand some of the culture and process challenges you will face when forming an ACE, and address them using Info-Tech’s Agile adoption journey model.
      • Track the progress of the ACE and your Agile teams. Use this data to find root causes for issues, and ideate to implement solutions for challenges as they arise over time.
      • Effectively define and propagate improvements to your Agile teams in order to drive business-valued results.
      • Communicate progress to interested stakeholders to ensure long-term viability of the Center of Excellence (CoE).

      Info-Tech Insight

      1. Define ACE services based on stakeholder needs.Don’t assume you know what your stakeholders need without talking to them.
      2. Staff the ACE strategically. Choose those who are thought leaders and proven change agents.
      3. Continuously improve based on metrics and feedback.Constantly monitor how your ACE is performing and adjust to feedback.

      Info-Tech’s Agile Journey related Blueprints

      1. Stabilize

      Implement Agile Practices That Work

      Begin your Agile transformation with a comprehensive readiness assessment and a pilot project to adopt Agile development practices and behaviors that fit.

      2. Sustain

      YOU ARE HERE

      Spread Best Practices with an Agile Center of Excellence

      Form an ACE to support Agile development at all levels of the organization with thought leadership, strategic development support & process innovation.

      3. Scale

      Enable Organization-Wide Collaboration by Scaling Agile

      Extend the benefits of your Agile pilot project into your organization by strategically scaling Agile initiatives that will meet stakeholders’ needs.

      4. Satisfy

      Transition to Product Delivery Introduce product-centric delivery practices to drive greater benefits and better delivery outcomes.

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      2.1 Define an adoption plan for Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives

      Supporting Capabilities and Practices

      Modernize Your SDLC

      Remodel the stages of your lifecycle to standardize your definition of a successful product.

      Build a Strong Foundation for Quality

      Instill quality assurance practices and principles in each stage of your software development lifecycle.

      Implement DevOps Practices That Work

      Fix, deploy, and support applications quicker though development and operations collaboration.

      What is an Agile Center of Excellence?

      NOTE: Organizational change is hard and prone to failure. Determine your organization’s level of readiness for Agile transformation (and recommended actions) by completing Info-Tech’s Agile Transformation Readiness Tool.

      An ACE amplifies good practices that have been successfully employed within your organization, effectively allowing you to extend the benefits obtained from your Agile pilot(s) to a wider audience.

      From the viewpoint of the business, members of the ACE provide expertise and insights to the entire organization in order to facilitate Agile transformation and ensure standard application of Agile good practices.

      From the viewpoint of your Agile teams, it provides a community of individuals that share experiences and lessons learned, propagate new ideas, and raise questions or concerns so that delivering business value is always top of mind.

      An ACE provides the following:

      1. A mechanism to gather thought leadership to maximize the accessibility and reach of your Agile investment.
      2. A mechanism to share innovations and ideas to facilitate knowledge transfer and ensure broadly applicable innovations do not go to waste.
      3. Strategic alignment to ensure that Agile practices are driving value towards business objectives.
      4. Purposeful good practices to ensure that the service offerings provided align with expectations of both your Agile practitioners and stakeholders.

      SIDEBAR: What is a Community of Practice? (And how does it differ from a CoE?)

      Some organizations prefer Communities of Practice (CoP) to Centers of Excellence (CoE). CoPs are different from CoEs:

      A CoP is an affiliation of people who share a common practice and who have a desire to further the practice itself … and of course to share knowledge, refine best practices, and introduce standards. CoPs are defined by their domain of interest, but the membership is a social structure comprised of volunteer practitioners

      – Wenger, E., R. A. McDermott, et al. (2002) Cultivating communities of practice: A guide to managing knowledge, Harvard Business Press.

      CoPs differ from a CoE mainly in that they tend to have no geographical boundaries, they hold no hierarchical power within a firm, and they definitely can never have structure determined by the company. However, one of the most obvious and telling differences lies in the stated motive of members – CoPs exist because they have active practitioner members who are passionate about a specific practice, and the goals of a CoP are to refine and improve their chosen domain of practice – and the members provide discretionary effort that is not paid for by the employer

      – Matthew Loxton (June 1, 2011) CoP vs CoE – What’s the difference, and Why Should You Care?, Wordpress.com

      What to know about CoPs:

      1. Less formal than a CoE
        • Loosely organized by volunteer practitioners who are interested in advancing the practice.
      2. Not the Authoritative Voice
        • Stakeholders engage the CoP voluntarily, and are not bound by them.
      3. Not funded by Organization
        • CoP members are typically volunteers who provide support in addition to their daily responsibilities.
      4. Not covered in this Blueprint
        • In depth analysis on CoPs is outside the scope of this Blueprint.

      What does an ACE do? Six main functions derived from Info-Tech’s CLAIM+G Framework

      1. Learning
      • Provide training and development and enable engagement based on identified interaction points to foster organizational growth.
    • Tooling
      • Promote the use of standardized tooling to improve efficiency and consistency throughout the organization.
    • Supporting
      • Enable your Agile teams to access subject-matter expertise by facilitating knowledge transfer and documenting good practices.
    • Governing
      • Create operational boundaries for Agile teams, and monitor their progress and ability to meet business objectives within these boundaries.
    • Monitoring
      • Demonstrate the value the CoE is providing through effective metric setting and ongoing monitoring of Agile’s effectiveness.
    • Guiding
      • Provide guidance, methodology, and knowledge for teams to leverage to effectively meet organizational business objectives.
    • Many organizations encounter challenges to scaling Agile

      Tackle the following barriers to Agile adoption with a business-aligned ACE.

      List based on reported impediments from VersionOne’s 13th Annual State of Agile Report (N=1,319)

      1. Organizational culture at odds with Agile values
      • The ACE identifies and measures the value of Agile to build support from senior business leaders for shifting the organizational culture and achieving tangible business benefits.
    • General organizational resistance to change
      • Resistance comes from a lack of trust. Optimized value delivery from Info-Tech’s Agile adoption model will build the necessary social capital to drive cultural change.
    • Inadequate management support and sponsorship
      • Establishing an ACE will require senior management support and sponsorship. Its formation sends a strong signal to the organizational leadership that Agile is here to stay.
    • Lack of skills/experience with Agile methods
      • The ACE provides a vehicle to absorb external training into an internal development program so that Agile capabilities can be grown organically within the organization.
    • Inconsistent processes and practices across teams
      • The ACE provides support to individual Agile teams and will guide them to adopt consistent processes and practices which have a proven track record in the organization.
    • Insufficient training and education
      • The ACE will assist teams with obtaining the Agile skills training they need to be effective in the organization, and support a culture of continuous learning.
    • Overcome your Agile scaling challenges with a business aligned ACE

      An ACE drives consistency and transparency without sacrificing the ability to innovate. It can build on the success of your Agile pilot(s) by encouraging practices known to work in your organization.

      Support Agile Teams

      Provide services designed to inject evolving good practices into workflows and remove impediments or roadblocks from your Agile team’s ability to deliver value.

      Maintain Business Alignment

      Maintain alignment with corporate objectives without impeding business agility in the long term. The ACE functions as an interface layer so that changing expectations can be adapted without negatively impacting Agile teams.

      Facilitate Learning Events

      Avoid the risk of innovation and subject-matter expertise being lost or siloed by facilitating knowledge transfer and fostering a continuous learning environment.

      Govern Improvements

      Set baselines, monitor metrics, and run retrospectives to help govern process improvements and ensure that Agile teams are delivering expected benefits.

      Shift Culture

      Instill Agile thinking and behavior into the organization. The ACE must encourage innovation and be an effective agent for change.

      Use your ACE to go from “doing” Agile to “being” Agile

      Organizations that do Agile without embracing the changes in behavior will not reap the benefits.

      Doing what was done before

      • Processes and Tools
      • Comprehensive Documentation
      • Contract Negotiation
      • Following a Plan

      Being Prescriptive

      Going through the motions

      • Uses SCRUM and tools such as Jira
      • Plans multiple sprints in detail
      • Talks to stakeholders once in a release
      • Works off a fixed scope BRD

      Doing Agile

      Living the principles

      • Individuals and Interactions
      • Working Software
      • Customer Collaboration
      • Responding to Change

      Being Agile

      “(‘Doing Agile’ is) just some rituals but without significant change to support the real Agile approach as end-to-end, business integration, value focus, and team empowerment.” - Arie van Bennekum

      Establishing a CoE does not guarantee success

      Simply establishing a Center of Excellence for any discipline does not guarantee its success:

      The 2019 State of DevOps Report found that organizations which had established DevOps CoEs underperformed compared to organizations which adopted other approaches for driving DevOps transformation. (Accelerate State of DevOps Report 2019 [N=~1,000])

      Still, Agile Centers of Excellence can and do successfully drive Agile adoption in organizations. So what sets the successful examples apart from the others? Here’s what some have to say:

      The ACE must be staffed with qualified people with delivery experience! … [It is] effectively a consulting practice, that can evolve and continuously improve its services … These services are collectively about ‘enablement’ as an output, more than pure training … and above all, the ability to empirically measure the progress” – Paul Blaney, TD Bank

      “When leaders haven’t themselves understood and adopted Agile approaches, they may try to scale up Agile the way they have attacked other change initiatives: through top-down plans and directives. The track record is better when they behave like an Agile team. That means viewing various parts of the organization as their customers.” – HBR, “Agile at Scale”

      “the Agile CoE… is truly meant to be measured by the success of all the other groups, not their own…[it] is meant to be serving the teams and helping them improve, not by telling them what to do, but rather by listening, understanding and helping them adapt.” - Bart Gerardi, PMI

      The CoE must also avoid becoming static, as it’s crucial the team can adjust as quickly as business and customer needs change, and evolve the technology as necessary to remain competitive.” – Forbes, “RPA CoE (what you need to know)”

      "The best CoEs are formed from thought leaders and change agents within the CoE domain. They are the process and team innovators who will influence your CoE roadmap and success. Select individuals who feel passionate about Agile." – Hans Eckman, InfoTech

      To be successful with your ACE, do the following…

      Info-Tech Insight

      Simply establishing an Agile Center of Excellence does not guarantee its success. When setting up your ACE, optimize its impact on the organization by doing the following 3 things:

      1. Define ACE services based on stakeholder needs. Be sure to broadly survey your stakeholders and identify the ACE functions and services which will best meet their needs. ACE services must clearly deliver business value to the organization and the Agile teams it supports.
      2. Staff the ACE strategically. Select ACE team members who have real world, hands-on delivery experience, and are well respected by the Agile teams they will serve. Where possible, select internal thought leaders in your organization who have the credibility needed to effect positive change.
      3. Continuously improve ACE services based on metrics and feedback. The value your ACE brings to the organization must be clear and measurable, and do not assume that your functions and services will remain static. You must regularly monitor both your metrics and feedback from your Agile teams, and adjust ACE behavior to improve/maximize these over time.

      Spread Best Practices With an Agile Center of Excellence

      This blueprint will walk you through the steps needed to build the foundations for operational excellence within an Agile Center of Excellence.

      Phase 1 - Strategically Align the CoE

      Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.

      Phase 2 - Standardize the CoEs Service Offerings

      Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.

      Phase 3 - Operate the CoE

      Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.

      Info-Tech’s Practice Adoption Journey

      Use Info-Tech’s Practice Adoption Journey model to establish your ACE. Building social capital (stakeholders’ trust in your ability to deliver positive outcomes) incrementally is vital to ensure that everyone is aligned to new mindsets and culture as your Agile practices scale.

      Trust & Competency ↓

      DEFINE

      Begin to document your development workflow or value chain, implement a tracking system for KPIs, and start gathering metrics and reporting them transparently to the appropriate stakeholders.

      ITERATE

      Use collected metrics and retrospectives to stabilize team performance by reducing areas of variability in your workflow and increasing the consistency at which targets are met.

      COLLABORATE

      Use information to support changes and adopt appropriate practices to make incremental improvements to the existing environment.

      EMPOWER

      Drive behavioral and cultural changes that will empower teams to be accountable for their own success and learning.

      INNOVATE

      Use your built-up trust and support practice innovation, driving the definition and adoption of new practices.

      Align your ACE with your organization’s strategy

      This research set will assist you with aligning your ACEs services to the objectives of the business in order to justify the resources and funding required by your Agile program.

      Business Objectives → Alignment ←ACE Functions

      Business justification to continue to fund a Center of Excellence can be a challenge, especially with traditional thinking and rigid stakeholders. Hit the ground running and show value to your key influencers through business alignment and metrics that will ensure that the ACE is worth continuous investment.

      Alignment leads to competitive advantage

      The pace of change in customer expectations, competitive landscapes, and business strategy is continuously increasing. It is critical to develop a method to facilitate ongoing alignment to shifting business and development expectations seamlessly and ensure that your Agile teams are able to deliver expected business value.

      Use Info-Tech’s CoE Operating Model to define the service offerings of your ACE

      Understand where your inputs and outputs lie to create an accessible set of service offerings for your Agile teams.

      The image shows a graphic of the COE Operating Model, showing the inputs and outputs, including Other CoEs (at top); Stakeholder Needs (at left); Metrics and Feedback (at bottom); and ACE Functions and Services (at right)

      Continuously improve the ACE to ensure long-term viability

      Improvement involves the continuous evaluation of the performance of your teams, using well-defined metrics and reasonable benchmarks that are supplemented by analogies and root-cause analysis in retrospectives.

      Monitor

      Monitor your metrics to ensure desired benefits are being realized. The ACE is responsible for ensuring that expected Agile benefits are achievable and on track. Monitor against your defined baselines to create transparency and accountability for desired outcomes.

      Iterate

      Run retrospectives to drive improvements and fixes into Agile projects and processes. Metrics falling short of expectations must be diagnosed and their root causes found, and fixes need to be communicated and injected back into the larger organization.

      Define

      Define metrics and set targets that align with the goals of the ACE. These metrics represent the ACEs expected value to the organization and must be measured against on a regular basis to demonstrate value to your key stakeholders.

      Beware the common risks of implementing your ACE

      Culture clash between Agile teams and larger organization

      Agile leverages empowered teams, meritocracy, and broad collaboration for success, but typical organizations are siloed and hierarchical with top down decision making. There needs to be a plan to enable a smooth transition from the current state towards the Agile target state.

      Persistence of tribal knowledge

      Agile relies on easy and open knowledge sharing, but organizational knowledge can sit in siloes. Employees may also try to protect their expertise for job security. It is important to foster knowledge sharing to ensure that critical know-how is accessible and doesn’t leave the organization with the individual.

      Rigid management structures

      Rigidity in how managers operate (performance reviews, human resource management, etc.) can result in cultural rejection of Agile. People need to be assessed on how they enable their teams rather than as individual contributors. This can help ensure that they are given sufficient opportunities to succeed. More support and less strict governance is key.

      Breakdown due to distributed teams

      When face-to-face interactions are challenging, ensure that you invest in the right communication technologies and remove cultural and process impediments to facilitate organization-wide collaboration. Alternative approaches like using documentation or email will not provide the same experience and value as a face-to-face conversation.

      The State of Maine used an ACE to foster positive cultural change

      CASE STUDY

      Industry - Government

      Source - Cathy Novak, Agile Government Leadership

      The State of Maine’s Agile Center of Excellence

      “The Agile CoE in the State of Maine is completely focused on the discipline of the methodology. Every person who works with Agile, or wants to work with Agile, belongs to the CoE. Every member of the CoE tells the same story, approaches the methodology the same way, and uses the same tools. The CoE also functions as an Agile research lab, experimenting with different standards and tools.

      The usual tools of project management – mission, goals, roles, and a high-level definition of done – can be found in Maine’s Agile CoE. For story mapping, teams use sticky notes on a large wall or whiteboard. Demonstrating progress this way provides for positive team dynamics and a psychological bang. The State of Maine uses a project management framework that serves as its single source of truth. Everyone knows what’s going on at all times and understands the purpose of what they are doing. The Agile team is continually looking for components that can be reused across other agencies and programs.”

      Results:

      • Realized positive culture change, leading to more collaborative and supportive teams.
      • Increased visibility of Agile benefits across functional groups.
      • Standardized methodology across Agile teams and increased innovation and experimentation with new standards and tools.
      • Improved traceability of projects.
      • Increased visibility and ability to determine root causes of problems and right the course when outcomes are not meeting expectations.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Spread Best Practices With an Agile Center of Excellence – project overview

      1. Strategically align the Center of Excellence 2. Standardize the CoEs service offerings 3. Operate the Center of Excellence
      Best-Practice Toolkit

      1.1 Determine the vision of your ACE.

      1.2 Define the service offerings of your ACE.

      2.1 Define an adoption plan for your Agile teams.

      2.2 Create an ACE engagement plan.

      2.3 Define metrics to measure success.

      3.1 Optimize the success of your ACE.

      3.2 Plan change to enhance your Agile initiatives.

      3.3 Conduct ongoing retrospectives of your ACE.

      Guided Implementations
      • Align your ACE with the business.
      • Align your ACE with its users.
      • Dissect the key attributes of Agile adoption.
      • Form engagement plans for your Agile teams.
      • Discuss effective ACE metrics.
      • Conduct a baseline assessment of your Agile environment.
      • Interface ACE with your change management function.
      • Build a communications deck for key stakeholders.
      Onsite Workshop Module 1: Strategically align the ACE Module 2: Standardize the offerings of the ACE Module 3: Prepare for organizational change
      Phase 1 Outcome: Create strategic alignment between the CoE and organizational goals.

      Phase 2 Outcome: Build engagement plans and key performance indicators based on a standardized Agile adoption plan.

      Phase 3 Outcome: Operate the CoEs monitoring function, identify improvements, and manage the change needed to continuously improve.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Module 1 Workshop Module 2 Workshop Module 3 Workshop Module 4
      Activities

      Determine vision of CoE

      1.1 Identify and prioritize organizational business objectives.

      1.2 Form use cases for the points of alignment between your ACE and business objectives.

      1.3 Prioritize your ACE stakeholders.

      Define service offerings of CoE

      2.1 Form a solution matrix to organize your pain points and opportunities.

      2.2 Refine your use cases to identify your ACE functions and services.

      2.3 Visualize your ACE functions and service offerings with a capability map.

      Define engagement plans

      3.1 Further categorize your use cases within the Agile adoption model.

      3.2 Create an engagement plan for each level of adoption.

      Define metrics and plan communications

      4.1 Define metrics that align with your Agile business objectives.

      4.2 Define target ACE performance metrics.

      4.3 Define Agile adoption metrics.

      4.4 Assess the interaction and communication points of your Agile team.

      4.5 Create a communication plan for change.

      Deliverables
      1. Prioritized business objectives
      2. Business-aligned use cases to form CoEs service offerings
      3. Prioritized list of stakeholders
      1. Classified pains and opportunities
      2. Refined use cases based on pains and opportunities identified during ACE requirements gathering
      3. ACE capability map
      1. Adoption-aligned service offerings
      2. Role-specific engagement plans
      1. Business objective-aligned metrics
      2. ACE performance metrics
      3. Agile adoption metrics
      4. Assessment of organization design
      5. ACE Communication Plan

      Phase 1

      Strategically Align the Center of Excellence

      Spread Best Practices With an Agile Center of Excellence

      Begin by strategically aligning your Center of Excellence

      The first step to creating a high-functioning ACE is to create alignment and consensus amongst your key stakeholders regarding its purpose. Engage in a set of activities to drill down into the organization’s goals and objectives in order to create a set of high-level use cases that will evolve into the service offerings of the ACE.

      Phase 1 - Strategically Align the CoE

      Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.

      Phase 2 - Standardize the CoEs Service Offerings

      Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.

      Phase 3 - Operate the CoE

      Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Strategically align the ACE

      Proposed Time to Completion (in weeks): 1

      Step 1.1: Determine the vision of your ACE

      Start with an analyst kick off call:

      • Align your ACE with the business.

      Then complete these activities…

      1.1.1 Optional: Baseline your ACE maturity.

      1.1.2 Identify and prioritize organizational business objectives.

      1.1.3 Form use cases for the points of alignment between your ACE and business objectives.

      1.1.4 Prioritize your ACE stakeholders.

      1.1.5 Select a centralized or decentralized model for your ACE.

      1.1.6 Staff your ACE strategically.

      Step 1.2: Define the service offerings of your ACE

      Start with an analyst kick off call:

      • Align your ACE with its users.

      Then complete these activities…

      1.2.1 Form the Center of Excellence.

      1.2.2 Gather and document your existing Agile practices for the CoE.

      1.2.3 Interview stakeholders to align ACE requirements with functional expectations.

      1.2.4 Form a solution matrix to organize your pain points and opportunities.

      1.2.5 Refine your use cases to identify your ACE functions and services.

      1.2.6 Visualize your ACE functions and service offerings with a capability map.

      Phase 1 Results & Insights:

      • Aligning your ACE with the functional expectations of its users is just as critical as aligning with the business. Invest the time to understand how the ACE fits at all levels of the organization to ensure its highest effectiveness.

      Phase 1, Step 1: Determine the vision of your ACE

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Activities:

      1.1.1 Optional: Baseline your ACE maturity.

      1.1.2 Identify and prioritize organizational business objectives.

      1.1.3 Form use cases for the points of alignment between your ACE and business objectives.

      1.1.4 Prioritize your ACE stakeholders.

      1.1.5 Select a centralized or decentralized model for your ACE.

      1.1.6 Staff your ACE strategically.

      Outcomes:

      • Gather your leadership to position the ACE and align it with business priorities.
      • Form a set of high-level use cases for services that will support the enablement of business priorities.
      • Map the stakeholders of the ACE to visualize expected influence and current support levels for your initiative.

      What does an ACE do? Six main functions derived from Info-Tech’s CLAIM+G Framework

      1. Learning
      • Provide training and development and enable engagement based on identified interaction points to foster organizational growth.
    • Tooling
      • Promote the use of standardized tooling to improve efficiency and consistency throughout the organization.
    • Supporting
      • Enable your Agile teams to access subject-matter expertise by facilitating knowledge transfer and documenting good practices.
    • Governing
      • Create operational boundaries for Agile teams, and monitor their progress and ability to meet business objectives within these boundaries.
    • Monitoring
      • Demonstrate the value the CoE is providing through effective metric setting and ongoing monitoring of Agile’s effectiveness.
    • Guiding
      • Provide guidance, methodology, and knowledge for teams to leverage to effectively meet organizational business objectives.
    • OPTIONAL: If you have an existing ACE, use Info-Tech’s CoE Maturity Diagnostic Tool to baseline current practices

      1.1.1 Existing CoE Maturity Assessment

      Purpose

      If you already have established an ACE, use Info-Tech’s CoE Maturity Diagnostic Tool to baseline its current maturity level (this will act as a baseline for comparison after you complete this Blueprint). Assessing your ACEs maturity lets you know where you currently are, and where to look for improvements.

      Steps

      1. Download the CoE Maturity Diagnostic Tool to assess the maturity of your ACE.
      2. Complete the assessment tool with all members of your ACE team to determine your current Maturity score.
      3. Document the results in the ACE Communications Deck.

      Document results in the ACE Communications Deck.

      INFO-TECH DELIVERABLE

      The image is a screen capture of the CoE Maturity Diagnostic Tool

      Download the CoE Maturity Diagnostic Tool.

      Get your Agile leadership together and position the ACE

      Stakeholder Role Why they are essential players
      CIO/ Head of IT Program sponsor: Champion and set the tone for the Agile program. Critical in gaining and maintaining buy-in and momentum for the spread of Agile service offerings. The head of IT has insight and influence to drive buy-in from executive stakeholders and ensure the long-term viability of the ACE.
      Applications Director Program executor: Responsible for the formation of the CoE and will ensure the viability of the initial CoE objectives, use cases, and service offerings. Having a coordinator who is responsible for collating performance data, tracking results, and building data-driven action plans is essential to ensuring continuous success.
      Agile Subject-Matter Experts Program contributor: Provide information on the viability of Agile practices and help build capabilities on existing best practices. Agile’s success relies on adoption. Leverage the insights of people who have implemented and evangelized Agile within your organization to build on top of a working foundation.
      Functional Group Experts Program contributor: Provide information on the functional group’s typical processes and how Agile can achieve expected benefits. Agile’s primary function is to drive value to the business – it needs to align with the expected capabilities of existing functional groups in order to enhance them for the better.

      Align your ACE with your organization’s strategy

      This research set will assist you with aligning your ACEs services to the objectives of the business in order to justify the resources and funding required by your Agile program.

      Business Objectives → Alignment ←ACE Functions

      Business justification to continue to fund a Center of Excellence can be a challenge, especially with traditional thinking and rigid stakeholders. Hit the ground running and show value to your key influencers through business alignment and metrics that will ensure that the ACE is worth continuous investment.

      Alignment leads to competitive advantage

      The pace of change in customer expectations, competitive landscapes, and business strategy is continuously increasing. It is critical to develop a method to facilitate ongoing alignment to shifting business and development expectations seamlessly and ensure that your Agile teams are able to deliver expected business value.

      Activity: Identify and prioritize organizational business objectives

      1.1.2 2 Hours

      Input

      • Organizational business objectives

      Output

      • Prioritized business objectives

      Materials

      • Whiteboard
      • Markers

      Participants

      • Agile leadership group
      1. List the primary high-level business objectives that your organization aims to achieve over the course of the following year (focusing on those that ACE can impact/support).
      2. Prioritize these business objectives while considering the following:
      • Criticality of completion: How critical is the initiative in enabling the business to achieve its goals?
      • Transformational impact: To what degree is the foundational structure of the business affected by the initiative (rationale: Agile can support impact on transformational issues)?
    • Document the hypothesized role of Agile in supporting these business objectives. Take the top three prioritized objectives forward for the establishment of your ACE. While in future years or iterations you can inject more offerings, it is important to target your service offerings to specific critical business objectives to gain buy-in for long-term viability of the CoE.
    • Sample Business Objectives:

      • Increase customer satisfaction.
      • Reduce time-to-market of product releases.
      • Foster a strong organizational culture.
      • Innovate new feature sets to differentiate product. Increase utilization rates of services.
      • Reduce product delivery costs.
      • Effectively integrate teams from a merger.
      • Offer more training programs for personal development.
      • Undergo a digital transformation.

      Understand potential hurdles when attempting to align with business objectives

      While there is tremendous pressure to align IT functions and the business due to the accelerating pace of change and technology innovation, you need to be aware that there are limitations in achieving this goal. Keep these challenges at the top of mind as you bring together your stakeholders to position the service offerings of your ACE. It is beneficial to make your stakeholders self-aware of these biases as well, so they come to the table with an open mind and are willing to find common ground.

      The search for total alignment

      There are a plethora of moving pieces within an organization and total alignment is not a plausible outcome.

      The aim of a group should not be to achieve total alignment, but rather reframe and consider ways to ensure that stakeholders are content with the ways they interact and that misalignment does not occur due to transparency or communication issues.

      “The business” implies unity

      While it may seem like the business is one unified body, the reality is that the business can include individuals or groups (CEO, CFO, IT, etc.) with conflicting priorities. While there are shared business goals, these entities may all have competing visions of how to achieve them. Alignment means compromise and agreement more than it means accommodating all competing views.

      Cost vs. reputation

      There is a political component to alignment, and sometimes individual aspirations can impede collective gain.

      While the business side may be concerned with cost, those on the IT side of things can be concerned with taking on career-defining projects to bolster their own credentials. This conflict can lead to serious breakdowns in alignment.

      Panera Bread used Agile to adapt to changing business needs

      CASE STUDY

      Industry Food Services

      Source Scott Ambler and Associates, Case Study

      Challenge

      Being in an industry with high competition, Panera Bread needed to improve its ability to quickly deliver desired features to end customers and adapt to changing business demands from high internal growth.

      Solution

      Panera Bread engaged in an Agile transformation through a mixture of Agile coaching and workshops, absorbing best practices from these engagements to drive Agile delivery frameworks across the enterprise.

      Results

      Adopting Agile delivery practices resulted in increased frequency of solution delivery, improving the relationship between IT and the business. Business satisfaction increased both with the development process and the outcomes from delivery.

      The transparency that was needed to achieve alignment to rapidly changing business needs resulted in improved communication and broad-scale reduced risk for the organization.

      "Agile delivery changed perception entirely by building a level of transparency and accountability into not just our software development projects, but also in our everyday working relationships with our business stakeholders. The credibility gains this has provided our IT team has been immeasurable and immediate."

      – Mike Nettles, VP IT Process and Architecture, Panera Bread

      Use Info-Tech’s CoE Operating Model to define the service offerings of your ACE

      Understand where your inputs and outputs lie to create an accessible set of service offerings for your Agile teams.

      Functional Input

      • Application Development
      • Project Management
      • CIO
      • Enterprise Architecture
      • Data Management
      • Security
      • Infrastructure & Operations
      • Who else?

      The image shows a graphic of the COE Operating Model, showing the inputs and outputs, including Other CoEs (at top); Stakeholder Needs (at left); Metrics and Feedback (at bottom); and ACE Functions and Services (at right)

      Input arrows represent functional group needs, feedback from Agile teams, and collaboration with other CoEs and CoPs

      Output arrows represent the services the CoE delivers and the benefits realized across the organization.

      ACE Operating Model: Governance & Metrics

      Governance & Metrics involves enabling success through the management of the ACEs resources and services, and ensuring that organizational structures evolve in concert with Agile growth and maturity. Your focus should be on governing, measuring, implementing, and empowering improvements.

      Effective governance will function to ensure the long-term effectiveness and viability of your ACE. Changes and improvements will happen continuously and you need a way to decide which to adopt as best practices.

      "Organizations have lengthy policies and procedures (e.g. code deployment, systems design, how requirements are gathered in a traditional setting) that need to be addressed when starting to implement an Agile Center of Excellence. Legacy ideas that end up having legacy policy are the ones that are going to create bottlenecks, waste resources, and disrupt your progress." – Doug Birgfeld, Senior Partner, Agile Wave

      Governance & Metrics

      • Manage organizational Agile standards, policies, and procedures.
      • Define organizational boundaries based on regulatory, compliance, and cultural requirements.
      • Ensure ongoing alignment of service offerings with business objectives.
      • Adapt organizational change management policies to reflect Agile practices.
      • CoE governance functions include:
        • Policy Management
        • Change Management
        • Risk Management
        • Stakeholder Management
        • Metrics/Feedback Monitoring

      ACE Operating Model: Services

      Services refers to the ability to deliver resourcing, guidance, and assistance across all Agile teams. By creating a set of shared services, you enable broad access to specialized resources, knowledge, and insights that will effectively scale to more teams and departments as Agile matures in your organization.

      A Services model:

      • Supports the organization by standardizing and centralizing service offerings, ensuring consistency of service delivery and accessibility across functional groups.
      • Provides a mechanism for efficient knowledge transfer and on-demand support.
      • Helps to drive productivity and project efficiencies through the organization by disseminating best practices.

      Services

      • Provide reference, support, and re-assurance to implement and adapt organizational best practices.
      • Interface relevant parties and facilitate knowledge transfer through shared learning and communities of practice.
      • Enable agreed-upon service levels through standardized support structures.
      • Shared services functions include:
        • Engagement Planning
        • Knowledge Management
        • Subject-Matter Expertise
        • Agile Team Evaluation

      ACE Operating Model: Technology

      Technology refers to a broad range of supporting tools to enable employees to complete their day-to-day tasks and effectively report on their outcomes. The key to technological support is to strike the right balance between flexibility and control based on your organization's internal and external constraints (policy, equipment, people, regulatory, etc.).

      "We sometimes forget the obvious truth that technology provides no value of its own; it is the application of technology to business opportunities that produces return on investment." – Robert McDowell, Author, In Search of Business Value

      Technology

      • Provide common software tools to enable alignment to organizational best practices.
      • Enable access to locally desired tools while considering organizational, technical, and scaling constraints.
      • Enable communication with a technical subject matter expert (SME).
      • Enable reporting consistency through training and maintenance of reporting mechanisms.
      • Technology functions can include:
        • Vendor Management
        • Application Support
        • Tooling Standards
        • Tooling Use Cases

      ACE Operating Model: Staff

      Staff is all about empowerment. The ACE should support and facilitate the sharing of ideas and knowledge sharing. Create processes and spaces where people are encouraged to come together, learn from, and share with each other. This setting will bring up new ideas to enhance productivity and efficiency in day-to-day activities while maintaining alignment with business objectives.

      "An Agile CoE is legitimized by its ability to create a space where people can come together, share, and learn from one another. By empowering teams to grow by themselves and then re-connect with each other you allow the creativity of your employees to flow back into the CoE." – Anonymous, Founder, Agile consultancy group

      Staff

      • Develop and provide training and day-to-day coaching that are aligned with organizational engagement and growth plans.
      • Include workflow change management to assist traditional roles with accommodating Agile practices.
      • Support the facilitation of knowledge transfer from localized Agile teams into other areas of the organization.
      • Achieve team buy-in and engagement with ACE services and capabilities. Provide a forum for collaboration and innovation.
      • People functions can include:
        • Onboarding
        • Coaching
        • Learning Facilitation

      Form use cases to align your ACE with business objectives

      What is a use case?

      A use case tells a story about how a system will be used to achieve a goal from the perspective of a user of that system. The people or other systems that interact with the use case are called “actors.” Use cases describe what a system must be able to do, not how it will do it.

      How does a use case play a role in building your ACE?

      Use cases are used to guide design by allowing you to highlight the intended function of a service provided by the Center of Excellence while maintaining a business focus. Jumping too quickly to a solution without fully understanding user and business needs leads to the loss of stakeholder buy-in and the Centers of Excellence rejection by teams.

      Hypothesized ACE user needs →Use Case←Business objective

      Activity: Form use cases for the points of alignment between your ACE and business objectives

      1.1.3 2 Hours

      Input

      • Prioritized business objectives
      • ACE functions

      Output

      • ACE use cases

      Materials

      • Whiteboard
      • Markers

      Participants

      • Agile leadership group
      1. Using your prioritized business objectives and the six functions of a CoE, create high-level use cases for each point of alignment that describe how the Center of Excellence will better facilitate the realization of that business objective.
      2. For each use case, define the following:
        • Name: Generalized title for the use case.
        • Description: A high-level description of the expected CoE action.
      AGILE CENTER OF EXCELLENCE FUNCTIONS:
      Guiding Learning Tooling Supporting Governing Monitoring
      BUSINESS OBJECTIVES Reduce time-to-market of product releases
      Reduce product delivery costs
      Effectively integrate teams from a merger

      Activity: Form use cases for the points of alignment between your ACE and business objectives (continued)

      1.1.3 2 Hours

      The image shows the Reduce time-to-market of product releases row from the table in the previous section, filled in with sample information.

      Your goal should be to keep these as high level and generally applicable as possible as they provide an initial framework to further develop your service offerings. Begin to talk about the ways in which the ACE can support the realization of your business objectives and what those interactions may look like to customers of the ACE.

      Involve all relevant stakeholders to discuss the organizational goals and objectives of your ACE

      Avoid the rifts in stakeholder representation by ensuring you involve the relevant parties. Without representation and buy-in from all interested parties, your ACE may omit and fail to meet long-term organizational goals.

      By ensuring every group receives representation, your service offerings will speak for the broad organization and in turn meet the needs of the organization as a whole.

      • Business Units: Any functional groups that will be expected to engage with the ACE in order to achieve their business objectives.
      • Team Leads: Representation from the internal Agile community who is aware of the backgrounds, capabilities, and environments of their respective Agile teams.
      • Executive Sponsors: Those expected to evangelize and set the tone and direction for the ACE within the executive ranks of the organization. These roles are critical in gaining buy-in and maintaining momentum for ACE initiatives.

      Organization

      • ACE
        • Executive Sponsors
        • Team Leads
        • Business Units

      Activity: Prioritize your ACE stakeholders

      1.1.4 1 Hour

      Input

      • Prioritized business objectives

      Output

      • Prioritized list of stakeholders

      Materials

      • Whiteboard
      • Markers

      Participants

      • Agile leadership group
      1. Using your prioritized business objectives, brainstorm, as a group, the potential list of stakeholders (representatives from business units, team leads, and executive sponsors) that would need to be involved in setting the tone and direction of your ACE.
      2. Evaluate each stakeholder in terms of power, involvement, impact, and support.
      • Power: How much influence does the stakeholder have? Enough to drive the CoE forward or into the ground?
      • Involvement: How interested is the stakeholder? How involved is the stakeholder in the project already?
      • Impact: To what degree will the stakeholder be impacted? Will this significantly change how they do their job?
      • Support: Is the stakeholder a supporter of the project? Neutral? A resister?
    • Map each stakeholder to an area on the power map on the next slide based on his or her level of power and involvement.
    • Vary the size of the circle to distinguish stakeholders that are highly impacted by the ACE from those who are not. Color each circle to show each stakeholder’s estimated or gauged level of support for the project.
    • Prioritize your ACE stakeholders (continued)

      1.1.4 1 Hour

      The image shows a matrix on the left, and a legend on the right. The matrix is labelled with Involvement at the bottom, and Power on the left side, and has the upper left quadrant labelled Keep Satisfied, the upper right quadrant labelled Key players, the lower right quadrant labelled Keep informed, and the lower left quadrant labelled Minimal effort.

      Should your ACE be Centralized or Decentralized?

      An ACE can be organized differently depending on your organization’s specific needs and culture.

      The SAFe Model:©

      “For smaller enterprises, a single centralized [ACE] can balance speed with economies of scale. However, in larger enterprises—typically those with more than 500 – 1,000 practitioners—it’s useful to consider employing either a decentralized model or a hub-and-spoke model.”

      The image shows 3 models: centralized, represented by a single large circle; decentralized, represented by 5 smaller circles; and hub-and-spoke, represented by a central circle, connected to 5 surrounding circles.

      © Scaled Agile, Inc.

      The Spotify Model:

      Spotify avoids using an ACE and instead spreads agile practices using Squads, Tribes, Chapters, Guilds, etc.

      It can be a challenging model to adopt because it is constantly changing, and must be fundamentally supported by your organization’s culture. (Linders, Ben. “Don't Copy the Spotify Model.” InfoQ.com. 6 Oct. 2016.)

      Detailed analysis of The Spotify Model is out of scope for this Blueprint.

      The image shows the Spotify model, with two sections, each labelled Tribe, and members from within each Tribe gathered together in a section labelled Guild.

      Activity: Select a Centralized or Decentralized ACE Model

      1.1.5 30 minutes

      Input

      • Prioritized business objectives
      • Use Cases
      • Organization qualities

      Output

      • Centralized or decentralized ACE model

      Materials

      • Whiteboard
      • Markers

      Participants

      • Agile leadership group
      1. Using your prioritized business objectives, your ACE use cases, your organization size, structure, and culture, brainstorm the relative pros and cons of a centralized vs decentralized ACE model.
      2. Consider this: to improve understanding and acceptance, ask participants who prefer a centralized model to brainstorm the pros and cons of a decentralized model, and vice-versa.
      3. Collectively decide whether your ACE should be centralized, decentralized or hub-and-spoke and document it.
      Centralized ACE Decentralized ACE
      Pros Cons Pros Cons
      Centralize Vs De-centralize Considerations Prioritized Business Objectives
      • Neutral (objectives don’t favor either model)
      • Neutral (objectives don’t favor either model)
      ACE Use Cases
      • Neutral (use cases don’t favor either model)
      • Neutral (use cases don’t favor either model)
      Organization Size
      • Org. is small enough for centralized ACE
      • Overkill for a small org. like ours
      Organization Structure
      • All development done in one location
      • Not all locations do development
      Organization Culture
      • All development done in one location
      • Decentralized ACE may have yield more buy-in

      SELECTED MODEL: Centralized ACE

      Activity: Staff your ACE strategically

      1.1.6 1 Hour

      Input

      • List of potential ACE staff

      Output

      • Rated list of ACE staff

      Materials

      • Whiteboard
      • Markers

      Participants

      • Agile leadership group
      1. Identify your list of potential ACE staff (this may be a combination of full time and contract staff).
      2. Add/modify/delete the rating criteria to meet your specific needs.
      3. Discuss and adjust the relative weightings of the rating criteria to best suit your organization’s needs.
      4. Rate each potential staff member and compare results to determine the best suited staff for your ACE.
      Candidate: Jane Doe
      Rating Criteria Criteria Weighting Candidate's Score (1-5)
      Candidate has strong theoretical knowledge of Agile. 8% 4
      Candidate has strong hands on experience with Agile. 18% 5
      Candidate has strong hands on experience with Agile. 10% 4
      Candidate is highly respected by the Agile teams. 18% 5
      Candidate is seen as a thought leader in the organization. 18% 5
      Candidate is seen as a change agent in the organization. 18% 5
      Candidate has strong desire to be member of ACE staff. 10% 3
      Total Weighted Score 4.6

      Phase 1, Step 2: Define the service offerings of your ACE

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Activities:

      1.2.1 Form the Center of Excellence.

      1.2.2 Gather and document your existing Agile practices for the CoE.

      1.2.3 Interview stakeholders to align ACE requirements with functional expectations.

      1.2.4 Form a solution matrix to organize your pain points and opportunities.

      1.2.5 Refine your use cases to identify your ACE functions and services.

      1.2.6 Visualize your ACE functions and service offerings with a capability map.

      Outcomes:

      • Collect data regarding the functional expectations of the Agile teams.
      • Refine your business-aligned use cases with your collected data to achieve both business and functional alignment.
      • Create a capability map that visualizes and prioritizes your key service offerings.

      Structure your ACE with representation from all of your key stakeholders

      Now that you have a prioritized list of stakeholders, use their influence to position the ACE to ensure maximum representation with minimal bottlenecks.

      By operating within a group of your key players, you can legitimize your Center of Excellence by propagating the needs and interests of those who interface and evangelize the CoE within the larger organization.

      The group of key stakeholders will extend the business alignment you achieved earlier by refining your service offerings to meet the needs of the ACEs customers. Multiple representations at the table will generate a wide arrangement of valuable insights and perspectives.

      Info-Tech Insight

      While holistic representation is necessary, ensure that the list is not too comprehensive and will not lead to progress roadblocks. The goal is to ensure that all factors relevant to the organization are represented; too many conflicting opinions may create an obstruction moving forward.

      ACE

      • Executive Sponsors
      • Team Leads
      • Business Units

      Determine how you will fund your ACE

      Choose the ACE funding model which is most aligned to your current system based on the scenarios provided below. Both models will offer the necessary support to ensure the success of your Agile program going forward.

      Funding Model Funding Scenario I Funding Scenario II
      Funded by the CIO Funded by the CIO office and a stated item within the general IT budget. Charged back to supported functional groups with all costs allocated to each functional group’s budget.
      Funded by the PMO Charged back to supported functional groups with all costs allocated to each functional group’s budget. Charged back to supported functional groups with all costs allocated to each functional group’s budget.

      Info-Tech Insight

      Your funding model may add additional key influencers into the mix. After you choose your funding model, ensure that you review your stakeholder map and add anyone who will have a direct impact in the viability and stability of your ACE.

      Determine how you will govern your ACE

      An Agile Center of Excellence is unique in the way you must govern the actions of its customers. Enable “flexible governance” to ensure that Agile teams have the ability to locally optimize and innovate while still operating within expected boundaries.

      ACE Governing Body

      ↑ Agile Team → ACE ← Agile Team ↑

      Who should take on the governance role?

      The governing body can be the existing executive or standing committees, or a newly formed committee involving your key ACE influencers and stakeholders.

      Flexible governance means that your ACE set boundaries based on your cultural, regulatory, and compliance requirements, and your governance group monitors your Agile teams’ adherence to these boundaries.

      Governing Body Responsibilities

      • Review and approve ACE strategy annually and ensure that it is aligned with current business strategy.
      • Provide detailed quality information for board members.
      • Ensure that the ACE is adequately resourced and that the organization has the capacity to deliver the service offerings.
      • Assure that the ACE is delivering benefits and achieving targets.
      • Assure that the record keeping and reporting systems are capable of providing the information needed to properly assess the quality of service.

      Modify your resourcing strategy based on organizational need

      Your Agile Center of Excellence can be organized either in a dedicated or a virtual configuration, depending on your company’s organizational structure and complexity.

      There is no right answer to how your Center of Excellence should be resourced. Consider your existing organizational structure and culture, the quality of relationships between functional groups, and the typical budgetary factors that would weigh on choosing between a virtual and dedicated CoE structure.

      COE Advantages Disadvantages
      Virtual
      • No change in organization structure required, just additional task delegation to your Agile manager or program manager.
      • Less effort and cost to implement.
      • Investment in quality is proportional to return.
      • Resources are shared between practice areas, and initiatives will take longer to implement.
      • Development and enhancement of best practices can become difficult without a centralized knowledge repository.
      Dedicated
      • Demonstrates a commitment to the ACEs long-term existence.
      • Allows for dedicated maintenance of best practices.
      • Clear lines of accountability for Agile processes.
      • Ability to develop highly skilled employees as their responsibilities are not shared.
      • Requires dedicated resources that can in turn be more costly.
      • Requires strong relationships with the functional groups that interface with the ACE.

      Staffing the ACE: Understand virtual versus dedicated ACE organizational models

      Virtual CoE

      The image shows an organizational chart titled Virtual CoE, with Head of IT at the top, then PMO and CoE Lead/Apps Director at the next level. The chart shows that there is crossover between the CoE Lead's reports, and the PMO's, indicated through dotted lines that connect them.

      • Responsibilities for CoE are split and distributed throughout departments on a part-time basis.
      • CoE members from the PMO report to apps director who also functions as the CoE lead on a part-time basis.

      The image shows a organizational chart titled Dedicated CoE, with all CoE members under the CoE.

      • Requires re-organization and dedicated full-time staff to run the CoE with clear lines of responsibility and accountability.
      • Hiring or developing highly skilled employees who have a sole function to facilitate and monitor quality best practices within the IT department may be necessary.

      Activity: Form the Center of Excellence

      1.2.1 1 Hour

      Input

      • N/A

      Output

      • ACE governance and resourcing plan

      Materials

      • Whiteboard

      Participants

      • Agile leadership group
      1. As a group, discuss if there is an existing body that would be able to govern the Center of Excellence. This body will monitor progress on an ongoing basis and assess any change requests that would impact the CoEs operation or goals.
      • List current governing bodies that are closely aligned with your current Agile environment and determine if the group could take on additional responsibilities.
      • Alternatively, identify individuals who could form a new ACE governing body.
    • Using the results of Exercise 1.1.6 in Step 1, select the individuals who will participate in the Center of Excellence. As a rough rule of thumb for sizing, an ACE staffed with 3-5 people can support 8-12 Agile Teams.
    • Document results in the ACE Communications Deck.

      Leverage your existing Agile practices and SMEs when establishing the ACE

      The synergy between Agile and CoE relies on its ability to build on existing best practices. Agile cannot grow without a solid foundation. ACE gives you the way to disseminate these practices and facilitate knowledge transfer from a centralized sharing environment. As part of defining your service offerings, engage with stakeholders across the organization to evaluate what is already documented so that it can be accommodated in the ACE.

      Documentation

      • Are there any existing templates that can be leveraged (e.g. resource planning, sprint planning)?
      • Are there any existing process documents that can be leveraged (e.g. SIPOC, program frameworks)?
      • Are there any existing standards documents the CoE can incorporate (e.g. policies, procedures, guidelines)?

      SMEs

      • Interview existing subject-matter experts that can give you an idea of your current pains and opportunities.
      • You already have feedback from those in your workshop group, so think about the rest of the organization:
        • Agile practitioners
        • Business stakeholders
        • Operations
        • Any other parties not represented in the workshop group

      Metrics

      • What are the current metrics being used to measure the success of Agile teams?
      • What metrics are currently being used to measure the completion of business objectives?
      • What tools or mediums are currently used for recording and communicating metrics?

      Info-Tech Insight

      When considering existing practices, it is important to evaluate the level of adherence to these practices. If they have been efficiently utilized, injecting them into ACE becomes an obvious decision. If they have been underutilized, however, it is important to understand why this occurred and discuss how you can drive higher adherence.

      Examples of existing documents to leverage

      People

      • Agile onboarding planning documents
      • Agile training documents
      • Organizational Agile manifesto
      • Team performance metrics dashboard
      • Stakeholder engagement and communication plan
      • Development team engagement plan
      • Organizational design and structure
      • Roles and responsibilities chart (i.e. RACI)
      • Compensation plan Resourcing plan

      Process

      • Tailored Scrum process
      • Requirements gathering process
      • Quality stage-gate checklist (including definitions of ready and done)
      • Business requirements document
      • Use case document
      • Business process diagrams
      • Entity relationship diagrams
      • Data flow diagrams
      • Solution or system architecture
      • Application documentation for deployment
      • Organizational and user change management plan
      • Disaster recovery and rollback process
      • Test case templates

      Technology

      • Code review policies and procedures
      • Systems design policies
      • Build, test, deploy, and rollback scripts
      • Coding guidelines
      • Data governance and management policies
      • Data definition and glossary
      • Request for proposals (RFPs)
      • Development tool standards and licensing agreements
      • Permission to development, testing, staging, and production environments
      • Application, system, and data integration policies

      Build upon the lessons learned from your Agile pilots

      The success of your Center of Excellence relies on the ability to build sound best practices within your organization’s context. Use your previous lessons learned and growing pains as shared knowledge of past Agile implementations within the ACE.

      Implement Agile Practices That Work

      Draw on the experiences of your initial pilot where you learned how to adapt the Agile manifesto and practices to your specific context. These lessons will help onboard new teams to Agile since they will likely experience some of the same challenges.

      Download

      Documents for review include:

      • Tailored Scrum Process
      • Agile Pilot Metrics
      • Info-Tech’s Agile Pilot Playbook

      Enable Organization-Wide Collaboration by Scaling Agile

      Draw on previous scaling Agile experiences to help understand how to interface, facilitate, and orchestrate cross-functional teams and stakeholders for large and complex projects. These lessons will help your ACE teams develop collaboration and problem-solving techniques involving roles with different priorities and lines of thinking.

      Download

      Documents for review include:

      • Agile Program Framework
      • Agile Pilot Program Metrics
      • Scaled Agile Development Process
      • Info-Tech’s Scaling Agile Playbook

      Activity: Gather and document your existing Agile practices for the CoE

      1.2.2 Variable time commitment based on current documentation state

      Input

      • Existing practices

      Output

      • Practices categorized within operating model

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • ACE team
      1. Compile a list of existing practices that will be shared by the Center of Excellence. Consider any documents, templates, or tools that are used regularly by Agile teams.
      2. Evaluate the level of adherence to use of the practices (whether the practice is complied with regularly or not) with a high, medium, or low. Low compliance will need a root-cause analysis to understand why and how to remedy the situation.
      3. Determine the best fit for each practice under the ACE operational model.
      Name Type Adherence Level CoE Best Fit Source
      1 Tailored Scrum process Process High Shared Services Internal Wiki
      2
      3

      Activity: Interview stakeholders to understand the ACE functional expectations

      1.2.3 30-60 Minutes per interview

      Interview Stakeholders (from both Agile teams and functional areas) on their needs from the ACE. Ensure you capture both pain points and opportunities. Capture these as either Common Agile needs or Functional needs. Document using the tables below:

      Common Agile Needs
      Common Agile Needs
      • Each Agile Team interprets Agile differently
      • Need common approach to Agile with a proven track record within the organization
      • Making sure all Team members have a good understanding of Agile
      • Common set of tool(s) with a proven track record, along with a strong understanding of how to use the tool(s) efficiently and effectively
      • Help troubleshooting process related questions
      • Assistance with addressing the individual short comings of each Agile Team
      • Determining what sort of help each Agile Team needs most
      • Better understanding of the role played by Scrum Master and associated good practices
      • When and how do security/privacy/regulatory requirements get incorporated into Agile projects
      Functional Needs Ent Arch Needs
      • How do we ensure Ent Arch has insight and influence on Agile software design
      • Better understanding of Agile process
      • How to measure compliance with reference architectures

      PMO Needs

      • Better understanding of Agile process
      • Understanding role of PM in Agile
      • Project status reports that determine current level of project risk
      • How does project governance apply on Agile projects
      • What deliverables/artifacts are produced by Agile projects and when are they completed

      Operations Needs

      • Alignment on approaches for doing releases
      • Impact of Agile on change management and support desk processes
      • How and when will installation and operation instructions be available in Agile

      Activity: Form a solution matrix to organize your pain points and opportunities

      1.2.4 Half day

      Input

      • Identified requirements

      Output

      • Classified pains and opportunities

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • ACE team
      1. Review the listed pain points from the data gathering process. Sort the pain points on sticky notes into technology, governance, people, and shared services.
      2. Consider opportunities under each defining element based on the identified business requirements.
      3. Document your findings.
      4. Discuss the results with the project team and prioritize the opportunities.
        • Where do the most pains occur?
        • What opportunities exist to alleviate pains?
      Governance Shared Services Technology People
      Pain Points
      Opportunities

      Document results in the ACE Communications Deck.

      Activity: Refine your use cases to identify your ACE functions and services

      1.2.5 1 Hour

      Input

      • Use cases from activity 1.1.2

      Output

      • Refined use cases based on data collection

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • ACE team
      1. Refine your initial use cases for the points of alignment between your ACE and business objectives using your classified pain points and opportunities.
      2. Add use cases to address newly realized pain points.
      3. Determine the functions and services the CoE can offer to address the identified requirements.
      4. Evaluate the outputs in the form of realized benefits and extracted inefficiencies.

      Possible ACE use cases:

      • Policy Management
      • Change Management
      • Risk Management
      • Stakeholder Management
      • Engagement Planning
      • Knowledge Management
      • Subject-Matter Expertise
      • Agile Team Evaluation
      • Operations Support
      • Onboarding
      • Coaching
      • Learning Facilitation
      • Communications Training
      • Vendor Management
      • Application Support
      • Tooling Standards

      Document results in the ACE Communications Deck.

      Activity: Visualize your ACE functions and service offerings with a capability map

      1.2.6 1 Hour

      Input

      • Use cases from activity 1.2.4

      Output

      • ACE capability map

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • ACE team
      1. Review the refined and categorized list of service offerings.
      2. Determine how these new capabilities will add, remove, or enhance your existing service and capabilities.
      3. Categorize the capabilities into the following groups:
      • Governance and Metrics
      • Services
      • Staff
      • Technology
    • Label the estimated impact of the service offering based on your business priorities for the year. This will guide your strategy for implementing your Agile Center of Excellence moving forward.
    • Document results in the ACE Communications Deck.

      Activity: Visualize your ACE functions and service offerings with a capability map (continued)

      Governance

      Policy Management (Medium Potential)

      Change Management (High Potential)

      Risk Management (High Potential)

      Stakeholder Management (High Potential)

      Metrics/Feedback Monitoring (High Potential)

      Shared Services

      Engagement Planning (High Potential)

      Knowledge Management (High Potential)

      Subject-Matter Expertise (High Potential)

      Agile Team Evaluation (High Potential)

      Operations Support (High Potential)

      People

      Onboarding (Medium Potential)

      Coaching (High Potential)

      Learning Facilitation (High Potential)

      Internal Certification Program (Low Potential)

      Communications Training (Medium Potential)

      Technology

      Vendor Management (Medium Potential)

      Application Support (Low Potential)

      Tooling Standards (High Potential)

      Checkpoint: Are you ready to standardize your CoEs service offerings?

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Self-Auditing Guidelines

      • Have you identified and prioritized the key business objectives for the upcoming year that the ACE will align with?
      • Do you have a high-level set of use cases for points of alignment between your ACE and business objectives?
      • Have you mapped your stakeholders and identified the key players that will have an influence over the future success of your ACE?
      • Have you identified how your organization will fund, resource, and govern the ACE?
      • Have you collected data to understand the functional expectations of the users the ACE is intended to serve?
      • Have you refined your use cases to align with both business objectives and functional expectations?

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.2 Identify and prioritize organizational business objectives

      Our analyst team will help you organize and prioritize your business objectives for the year in order to ensure that the service offerings the ACE offers are delivering consistent business value.

      1.1.3 Form use cases for the points of alignment between your ACE and business objectives

      Our analyst team will help you turn your prioritized business objectives into a set of high-level use cases that will provide the foundation for defining user-aligned services.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.1.4 Prioritize your ACE stakeholders

      Our analysts will walk you through an exercise of mapping and prioritizing your Centers of Excellence stakeholders based on impact and power within so you can ensure appropriate presentation of interests within the organization.

      1.2.4 Form a solution matrix to organize your pain points and opportunities

      Our analyst team will help you solidify the direction of your Center of Excellence by overlaying your identified needs, pain points, and potential opportunities in a matrix guided by Info-Tech’s CoE operating model.

      1.2.5 Refine your use cases to identify your ACE functions and services

      Our analyst team will help you further refine your business-aligned use cases with the functional expectations from your Agile teams and stakeholders, ensuring the ACEs long-term utility.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.2.6 Visualize your ACE functions and service offerings with a capability map

      Our analysts will walk you through creating your Agile Centers of Excellence capability map and help you to prioritize which service offerings are critical to the success of your Agile teams in meeting their objectives.

      Phase 2

      Standardize the Centers of Excellence Service Offerings

      Spread Best Practices With an Agile Center of Excellence

      The ACE needs to ensure consistency in service delivery

      Now that you have aligned the CoE to the business and functional expectations, you need to ensure its service offerings are consistently accessible. To effectively ensure accessibility and delegation of shared services in an efficient way, the CoE needs to have a consistent framework to deliver its services.

      Phase 1 - Strategically Align the CoE

      Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.

      Phase 2 - Standardize the CoEs Service Offerings

      Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.

      Phase 3 - Operate the CoE

      Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Standardize the CoEs Service Offerings

      Proposed Time to Completion (in weeks): 2

      Step 2.1: Define an adoption plan for your Agile teams

      Start with an analyst kick off call:

      • Dissect the key attributes of Agile adoption.

      Then complete these activities…

      2.1.1 Further categorize your use cases within the Agile adoption model.

      Step 2.2: Create an ACE engagement plan

      Start with an analyst kick off call:

      • Form engagement plans for your Agile teams.

      Then complete these activities…

      2.2.1 Create an engagement plan for each level of adoption.

      Step 2.3: Define metrics to measure success

      Finalize phase deliverable:

      • Discuss effective ACE metrics.

      Then complete these activities…

      2.3.1 Collect existing team-level metrics.

      2.3.2 Define metrics that align with your Agile business objectives.

      2.3.3 Define target ACE performance metrics.

      2.3.4 Define Agile adoption metrics.

      2.3.5 Consolidate metrics for stakeholder impact.

      2.3.6 Use Info-Tech’s ACE Benefits Tracking Tool to monitor, evaluate, refine, and ensure continued business value.

      Phase 2 Results & Insights:

      • Standardizing your service offerings allows you to have direct influence on the dissemination of best practices.

      Phase 2, Step 1: Define an adoption plan for your Agile teams

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Activities:

      2.1.1 Further categorize your use cases within the Agile adoption model.

      Outcomes:

      • Refine your previously determined use cases within the Agile adoption model to ensure that teams can be assisted at any level of Agile adoption.
      • Understand the key attributes of Agile adoption and how they impact success.

      Understand the implementation challenges that the ACE may face

      Culture clash between ACE and larger organization

      It is important to carefully consider the compatibility between the current organizational culture and Agile moving forward. Agile compels empowered teams, meritocracy, and broad collaboration for success; while typical organizational structures are siloed and hierarchical and decisions are delegated from the top down.

      This is not to say that the culture of the ACE has to match the larger organizational culture; part of the overarching aim of the ACE is to evolve the current organizational culture for the better. The point is to ensure you enable a smooth transition with sufficient management support and a team of Agile champions.

      The changing role of middle management

      Very similar to the culture clash challenge, cultural rigidity in how middle managers operate (performance review, human resource management, etc.) can cause cultural rejection. They need to become enablers for high performance and give their teams the sufficient tools, skills, and opportunities to succeed and excel.

      What impedes Agile adoption?

      Based on a global survey of Agile practitioners (N=1,319)*:

      52% Organizational culture at odds with agile values

      44% Inadequate management support and sponsorship

      48% General organization resistance to change

      *Respondents were able to make multiple selections

      (13th Annual State of Agile Report, VersionOne, 2019)

      Build competency and trust through a structured Agile adoption plan

      The reality of cultural incompatibility between Agile and traditional organization structures necessitates a structured adoption plan. Systematically build competency so teams can consistently achieve project success and solidify trust in your teams’ ability to meet business needs with Agile.

      By incrementally gaining the trust of management as you build up your Agile capabilities, you enable a smooth cultural transition to an environment where teams are empowered, adapt quickly to changing needs, and are trusted to innovate and make successes out of their failures.

      Optimized value delivery occurs when there is a direct relationship between competency and trust. There will be unrealized value when competency or trust outweigh the other. That value loss increases as either dimension of adoption continues to grow faster than the other.

      The image shows a graph with Competency on the x-axis and Trust on the y-axis. There are 3 sections: Level 1, Level 2, and Level 3, in subsequently larger arches in the background of the graph. The graph shows two diagonal arrows, the bottom one labelled Current Value Delivery and the top one labelled Optimized Value Delivery. The space between the two arrows is labelled Value Loss.

      Use Info-Tech’s Practice Adoption Optimization Model to systematically increase your teams’ ability to deliver

      Using Info-Tech’s Practice adoption optimization model will ensure you incrementally build competency and trust to optimize your value delivery.

      Agile adoption at its core, is about building social capital. Your level of trust with key influencers increases as you continuously enhance your capabilities, enabling the necessary cultural changes away from traditional organizational structures.

      Trust & Competency ↓

      DEFINE

      Begin to document your development workflow or value chain, implement a tracking system for KPIs, and start gathering metrics and reporting them transparently to the appropriate stakeholders.

      ITERATE

      Use collected metrics and retrospectives to stabilize team performance by reducing areas of variability in your workflow and increasing the consistency at which targets are met.

      COLLABORATE

      Use information to support changes and adopt appropriate practices to make incremental improvements to the existing environment.

      EMPOWER

      Drive behavioral and cultural changes that will empower teams to be accountable for their own success and learning.

      INNOVATE

      Use your built-up trust and support practice innovation, driving the definition and adoption of new practices.

      Review these key attributes of Agile adoption

      Agile adoption is unique to every organization. Consider these key attributes within your own organizational context when thinking about levels of Agile adoption.

      Adoption Attributes

      Team Organization

      Considers the degree to which teams are able to self-organize based on internal organizational structures (hierarchy vs. meritocracy) and inter-team capabilities.

      Team Coordination

      Considers the degree to which teams can coordinate, both within and across functions.

      Business Alignment

      Considers the degree to which teams can understand and/or map to business objectives.

      Coaching

      Considers what kind of coaching/training is offered and how accessible the training is.

      Empowerment

      Considers the degree to which teams are able and capable to address project, process, and technical challenges without significant burden from process controls and bureaucracy.

      Failure Tolerance

      Considers the degree to which stakeholders are risk tolerant and if teams are capable of turning failures into learning outcomes.

      Why are these important?

      These key attributes function as qualities or characteristics that, when improved, will successively increase the degree to which the business trusts your Agile teams’ ability to meet their objectives.

      Systematically improving these attributes as you graduate levels of the adoption model allows the business to acclimatize to the increased capability the Agile team is offering, and the risk of culture clash with the larger organization decreases.

      Start to consider at what level of adoption each of your service offerings become useful. This will allow you to standardize the way your Agile teams interact with the CoE.

      Activity: Further categorize your use cases within the Agile adoption model

      2.1.1 1.5 Hours

      Input

      • List of service offerings

      Output

      • Service offerings categorized within adoption model

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Team
      1. Gather the list of your categorized use cases.
      2. Based on Info-Tech’s Agile adoption model, categorize which use cases would be useful to help the Agile team graduate to the next level of adoption.
        • Conceptualize: Begin to document your workflow or value chain, implement a tracking system for KPIs, and gather metrics and report them transparently to the appropriate stakeholders.
        • Iterate: Use collected metrics to stabilize team performance by reducing areas of variability in your workflow and increasing the consistency at which targets are met.
        • Collaborate: Use information to drive changes and adopt appropriate Agile practices to make incremental improvements to the existing environment.
        • Empower: Drive behavioral and cultural changes that will empower teams to be accountable for their own successes given the appropriate resources.
        • Innovate: Use your built-up trust to begin to make calculated risks and innovate more, driving new best practices into the CoE.

      The same service offering could be offered at different levels of adoption. In these cases, you will need to re-visit the use case and differentiate how the service (if at all) will be delivered at different levels of adoption.

      1. Use this opportunity to brainstorm alternative or new use cases for any gaps identified. It is the CoEs goal to assist teams at every level of adoption to meet their business objectives. Use a different colored sticky note for these so you can re-visit and map out their inputs, outputs, metrics, etc.

      Activity: Further categorize your use cases within the Agile adoption model (continued)

      2.1.1 1.5 Hours

      Input

      • List of service offerings

      Output

      • Service offerings categorized within adoption model

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Team

      Example:

      Service Offerings
      Level 5: Innovate
      Level 4: Empower
      Level 3: Collaborate Coaching -- Communications Training
      Level 2: Iterate Tooling Standards
      Level 1: Conceptualize

      Learning Facilitation

      Draw on the service offerings identified in activity 1.2.4

      Phase 2, Step 2: Create an ACE engagement plan

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Activities:

      2.2.1 Create an engagement plan for each level of adoption.

      Outcomes:

      • Understand the importance of aligning with the functional expectations of your ACE customers.
      • Understand the relationship between engagement and continuous improvement.
      • Create an engagement plan for each level of adoption to standardize the way customers interact with the ACE.

      Enable Agile teams to interface with ACE service offerings to meet their business objectives

      A Center of Excellence aligned with your service offerings is only valuable if your CoEs customers can effectively access those services. At this stage, you have invested in ensuring that your CoE aligns to your business objectives and that your service offerings align to its customers. Now you need to ensure that these services are accessible in the day-to-day operation of your Agile teams.

      Engagement Process → Service Offering

      Use backwards induction from your delivery method to the service offering. This is an effective method to determine the optimal engagement action for the CoE, as it considers the end customer as the driver for best action for every possible situation.

      Info-Tech Insight

      Your engagement process should be largely informed by your ACE users. Teams have constraints as well as in-the-trenches concerns and issues. If your service offerings don’t account for these, it can lead to rejection of the culture you are trying to inspire.

      Show the way, do not dictate

      Do not fix problems for your Agile teams, give them the tools and knowledge to fix the problems themselves.

      Facilitate learning to drive success

      A primary function of your ACE is to transfer knowledge to Agile teams to increase their capability to achieve desired outcomes.

      While this can take the form of coaching, training sessions, libraries, and wikis, a critical component of ACE is creating interactions where individuals from Agile teams can come together and share their knowledge.

      Ideas come from different experiences. By creating communities of practice (CoP) around topics that the ACE is tasked with supporting (e.g. Agile business analysts), you foster social learning and decrease the likelihood that change will result in some sort of cultural rejection.

      Consider whether creating CoPs would be beneficial in your organization’s context.

      "Communities of practice are a practical way to frame the task of managing knowledge. They provide a concrete organizational infrastructure for realizing the dream of a learning organization." – Etienne Wenger, Digital Habitats: Stewarding technology for communities

      A lack of top-down support will result in your ACE being underutilized

      Top-down support is critical to validate the CoE to its customers and ensure they feel compelled to engage with its services. Relevancy is a real concern for the long-term viability of a CoE and championing its use from a position of authority will legitimize its function and deter its fading from relevancy of day-to-day use for Agile teams.

      Although you are aligning your engagement processes to the customers of your Agile Center of Excellence, you still need your key influencers to champion its lasting organizational relevancy. Don’t let your employees think the ACE is just a coordinating body or a committee that is convenient but non-essential – make sure they know that it drives their own personal growth and makes everyone better as a collective.

      "Even if a CoE is positioned to meet a real organizational need, without some measure of top-down support, it faces an uphill battle to remain relevant and avoid becoming simply one more committee in the eyes of the wider organization. Support from the highest levels of the organization help fight the tendency of the larger organization to view the CoE as a committee with no teeth and tip the scales toward relevancy for the CoE." – Joe Shepley, VP and Practice Lead, Doculabs

      Info-Tech Insight

      Stimulate top-down support with internal certifications. This allows your employees to gain accreditation while at the same time encouraging top-down support and creating a compliance check for the continual delivery and acknowledgement of your evolving best practices.

      Ensure that best practices and lessons learned are injected back into the ACE

      For your employees to continuously improve, so must the Center of Excellence. Ensure the ACE has the appropriate mechanisms to absorb and disseminate best practices that emerge from knowledge transfer facilitation events.

      Facilitated Learning Session →Was the localized adaption well received by others in similar roles? →Document Localized Adaptation →Is there broad applicability and benefit to the proposed innovation? →CoE Absorbs as Best Practice

      Continuous improvement starts with the CoE

      While facilitating knowledge transfer is key, it is even more important that the Center of Excellence can take localized adaptations from Agile teams and standardize them as best practices when well received. If an individual were to leave without sharing their knowledge, the CoE and the larger organization will lose that knowledge and potential innovation opportunities.

      Experience matters

      To organically grow your ACE and be cost effective, you want your teams to continuously improve and to share that knowledge. As individual team members develop and climb the adoption model, they should participate as coaches and champions for less experienced groups so that their knowledge is reaching the widest audience possible.

      Case study: Agile learning at Spotify

      CASE STUDY

      Industry Digital Media

      Source Henrik Kniberg & Anders Ivarsson, 2012

      Methods of Agile learning at Spotify

      Spotify has continuously introduced innovative techniques to facilitate learning and ensure that that knowledge gets injected back into the organization. Some examples are the following:

      • Hack days: Self-organizing teams, referred to as squads, come together, try new ideas, and share them with their co-workers. This facilitates a way to stay up to date with new tools and techniques and land new product innovations.
      • Coaching: Every squad has access to an Agile coach to help inject best practices into their workflow – coaches run retrospectives, sprint planning meetings, facilitate one-on-one coaching, etc.
      • Tribes: Collections of squads that hold regular gatherings to show the rest of the tribe what they’ve been working on so others can learn from what they are doing.
      • Chapters: People with similar skills within a tribe come together to discuss their area of expertise and their specific challenges.
      • Guilds: A wide-reaching community of interest where members from different tribes can come together to share knowledge, tools, and codes, and practice (e.g. a tester guild, an Agile coaching guild).

      The image shows the Spotify model, with two sections, each labelled Tribe, and members from within each Tribe gathered together in a section labelled Guild.

      "As an example of guild work, we recently had a ‘Web Guild Unconference,’ an open space event where all web developers at Spotify gathered up in Stockholm to discuss challenges and solutions within their field."

      Activity: Create an engagement plan for each level of adoption

      2.2.1 30 Minutes per role

      Input

      • Categorized use cases

      Output

      • Role-based engagement plans

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Team
      1. On the top bar, define the role you are developing the engagement plan for. This will give you the ability to standardize service delivery across all individuals in similar roles.
      2. Import your categorized service offerings for each level of adoption that you think are applicable to the given role.
      3. Using backwards induction, determine the engagement processes that will ensure that those service offerings are accessible and fit the day-to-day operations of the role.
      4. Fill in the template available on the next slide with each role’s engagement plan.

      Document results in the ACE Communications Deck.

      Example engagement plan: Developer

      2.2.1 30 Minutes per role

      Role: Developer
      Level 1 Level 2 Level 3 Level 4 Level 5
      Service Offering
      1. Onboarding
      2. Coaching
      3. Learning Facilitation
      1. Tooling Standards
      2. Learning Facilitation
      1. Communications Training
      2. Learning Facilitation
      1. Subject-Matter Expertise
      2. Coaching
      1. Knowledge Management
      Engagement Process
      1. Based on service request or need identified by dev. manager.
      2. Based on service request or need identified by dev. manager.
      3. Weekly mandatory community of practice meetings.
      1. When determined to have graduated to level 2, receive standard Agile tooling standards training.
      2. Weekly mandatory community of practice meetings.
      1. When determined to have graduated to level 3, receive standard Agile communications training.
      2. Weekly mandatory community of practice meetings
      1. Peer-based training on how to effectively self-organize.
      2. Based on service request or need identified by dev. manager.
      1. Review captured key learnings from last and have CoE review KPIs related to any area changed.

      Example engagement plan: Tester

      2.2.1 30 Minutes per role

      Role: Tester
      Level 1Level 2Level 3Level 4Level 5
      Service Offering
      1. Onboarding
      2. Coaching
      1. Product Training
      2. Communications Training
      1. Communications Training
      2. Learning Facilitation
      1. Subject-Matter Expertise
      2. Coaching
      1. Tooling Standards
      2. Training
      3. Coaching
      Engagement Process
      1. Based on service request or need identified by dev. manager.
      1. Weekly mandatory community of practice meetings.
      2. Provide training on effective methods for communicating with development teams based on organizational best practices.
      1. When determined to have graduated to level 3, receive standard training based on organizational testing best practices. Weekly mandatory community of practice meetings.
      1. Peer-to-peer training with level 5 certified coach.
      2. Based on service request or need identified by dev. manager. .
      1. Periodic updates of organizational tooling standards based on community of practice results.
      2. Automation training.
      3. Provide coaching to level 1 developers on a rotating basis to develop facilitation skills.

      Example engagement plan: Product Owner

      2.2.1 30 Minutes per role

      Role: Product Owner
      Level 1 Level 2 Level 3 Level 4 Level 5
      Service Offering
      1. Onboarding
      2. Coaching
      1. Coaching
      2. Learning Facilitation
      1. Coaching
      2. Communications Training
      3. Learning Facilitation
      1. Coaching
      2. Learning Facilitation
      1. Coaching
      2. Learning Facilitation
      Engagement Process
      1. Provide onboarding materials for Agile product owners.
      2. Provide bi-weekly reviews and subsequent guidance at the end of retrospective processes.
      1. Provide monthly reviews and subsequent guidance based on retrospective results.
      2. Bi-weekly mandatory community of practice meetings
      1. When determined to have graduated to level 3, receive standard training based on organizational testing best practices.
      2. Bi-weekly mandatory community of practice meetings.
      1. Provide monthly reviews and subsequent guidance based on retrospective results.
      2. Bi-weekly mandatory community of practice meetings
      1. Provide quarterly reviews and subsequent guidance based on retrospective results.
      2. Bi-weekly mandatory community of practice meetings

      Phase 2, Step 3: Define metrics to measure success

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Activities:

      2.3.1 Define existing team-level metrics.

      2.3.2 Define metrics that align with your Agile business objectives.

      2.3.3 Define target ACE performance metrics.

      2.3.4 Define Agile adoption metrics.

      2.3.5 Consolidate your metrics for stakeholder impact.

      2.3.6 Use Info-Tech’s ACE Benefits Tracking Tool to monitor, evaluate, refine, and ensure continued business value.

      Outcomes:

      • Understand the importance of aligning with the functional expectations of your ACE customers.
      • Understand the relationship between engagement and continuous improvement.
      • Create an engagement plan for each level of adoption to standardize the way customers interact with the ACE.

      Craft metrics that will measure the success of your Agile teams

      Quantify measures that demonstrate the effectiveness of your ACE by establishing distinct metrics for each of your service offerings. This will ensure that you have full transparency over the outputs of your CoE and that your service offerings maintain relevance and are utilized.

      Questions to Ask

      1. What are leading indicators of improvements that directly affect the mandate of the CoE?
      2. How do you measure process efficiency and effectiveness?

      Creating meaningful metrics

      Specific

      Measureable

      Achievable

      Realistic

      Time-bound

      Follow the SMART framework when developing metrics for each service offering.

      Adhering to this methodology is a key component of the lean management methodology. This framework will help you avoid establishing general metrics that aren’t relevant.

      "It’s not about telling people what they are doing wrong. It’s about constantly steering everyone on the team in the direction of success, and never letting any individual compromise the progress of the team toward success." – Mary Poppendieck, qtd. in “Questioning Servant Leadership”

      For important advice on how to avoid the many risks associated with metrics, refer to Info-Tech’s Select and Use SDLC Metrics Effectively.

      Ensure your metrics are addressing criteria from different levels of stakeholders and enterprise context

      There will be a degree of overlap between the metrics from your business objectives, service offerings, and existing Agile teams. This is a positive thing. If a metric can speak to multiple benefits it is that much more powerful in commuting successes to your key stakeholders.

      Existing metrics

      Business objective metrics

      Service offering metrics

      Agile adoption metrics

      Finding points of overlap means that you have multiple stakeholders with a vested interest in the positive trend of a specific metric. These consolidated metrics will be fundamental for your CoE as they will help build consensus through communicating the success of the ACE in a common language for a diverse audience.

      Activity: Define existing team-level metrics

      2.3.1 1 Hour

      Input

      • Current metrics

      Output

      • Service offerings categorized within adoption model

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Team
      1. Gather any metrics related documentation that you collected during your requirements gathering in Phase 1.
      2. Collect team-level metrics for your existing Agile teams:
        • Examine outputs from any feedback mechanisms you have (satisfaction surveys, emails, existing SLAs, burndown charts, resourcing costs, licensing costs per sprint, etc.).
        • Look at historical trends and figures when available. Be careful of frequent anomalies as these may indicate a root cause that needs to be addressed.
        • Explore the definition of specific metrics across different functional teams to ensure consistency of measurement and reporting.
      Team Objective Expected Benefits Metrics
      Improve productivity
      • Improve transparency with business decisions
      • Team burndown and velocity
      • Number of releases per milestone
      Increase team morale and motivation
      • Teams are engaged and motivated to develop new opportunities to deliver more value quicker.
      • Team satisfaction with Agile environment
      • Degree of engagement in ceremonies
      Improve transparency with business decisions
      • Teams are engaged and motivated to develop new opportunities to deliver more value quicker.
      • Stakeholder satisfaction with completed product
      • Number of revisions to products in demonstrations

      Activity: Define metrics that align with your Agile business objectives

      2.3.2 1 Hour

      Input

      • Organizational business objectives from Phase 1

      Output

      • Metrics aligned to organizational business objectives

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • ACE
      1. List the business objectives that you determined in 1.1.2.
      2. Create a shortlist of expected benefits from those business objectives. These will help to drive metrics that align with the intended purpose of completing those business objectives, and affirm they are aligned to realizable benefits.
      3. Define metrics that speak to the benefits of your business objectives. While engaging in this process, ensure to document the collection method for each metrics.
      Business Objectives Expected Benefits Metrics
      Decrease time-to-market of product releases
      • Faster feedback from customers.
      • Increased customer satisfaction.
      • Competitive advantage.
      Decrease time-to-market of product releases
      • Alignment to organizational best practices.
      • Improved team productivity.
      • Greater collaboration across functional teams.
      • Policy and practice adherence and acknowledgement
      • Number of requests for ACE services
      • Number of suggestions to improve Agile best practices and ACE operations

      Activity: Define target ACE performance metrics

      2.3.3 1 Hour

      Input

      • Service offerings
      • Satisfaction surveys
      • Usage rates

      Output

      • CoE performance metrics

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • ACE
      1. Define metrics to measure the success of each of your service offerings.
      2. Create a shortlist of expected benefits from those business objectives. These will help to drive metrics that align with the intended purpose of those service offerings, and affirm they are aligned to realizable benefits.
      3. Define metrics that speak to the benefits of your service offerings.
      4. Compare these to your team performance metrics.
      Service Offering Expected Benefits Metrics
      Knowledge management
      • Comprehensive knowledgebase that accommodates various company products and office locations.
      • Easily accessible resources.
      • Number of practices extracted from ACE and utilized
      • Frequency of updates to knowledgebase
      Tooling standards
      • Tools adhere to company policies, security guidelines, and regulations.
      • Improved support of tools and technologies.
      • Tools integrate and function well with enterprise systems.
      • Number of teams and functional groups using standardized tools
      • Number of supported standardized tools
      • Number of new tools added to the standards list
      • Number of tools removed from standards list

      Activity: Define Agile adoption metrics

      2.3.4 1 Hour

      Input

      • Agile adoption model

      Output

      • Agile adoption metrics
      1. Define metrics to measure the success of each of your service offerings.
      2. Create a shortlist of expected benefits from those business objectives. These will help to drive metrics that align with the intended purpose of those service offerings, and affirm they are aligned to realizable benefits.
      3. Define metrics that speak to the benefits of your service offerings.
      4. It is possible that you will need to adjust these metrics after baselines are established when you begin to operate the ACE. Keep this in mind moving forward.
      Adoption attributes Expected Benefits Metrics
      Team organization
      • Acquisition of the appropriate roles and skills to successfully deliver products.
      • Degree of flexibility to adjust team compositions on a per project basis
      Team coordination
      • Ability to successfully undertake large and complex projects involving multiple functional groups.
      • Number of ceremonies involving teams across functional groups
      Business alignment
      • Increased delivery of business value from process optimizations.
      • Number of business-objective metrics surpassing targets
      Coaching
      • Teams are regularly trained with new and better best practices.
      • Number of coaching and training requests
      Empowerment
      • Teams can easily and quickly modify processes to improve productivity without following a formal, rigorous process.
      • Number of implemented changes from team retrospectives
      Failure tolerance
      • Stakeholders trust teams will adjust when failures occur during a project.
      • Degree of stakeholder trust to address project issues quickly and effectively

      Activity: Consolidate your metrics for stakeholder impact

      2.3.5 30 Minutes

      Input

      • New and existing Agile metrics

      Output

      • Consolidated Agile metrics

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • ACE
      1. Take all the metrics defined from the previous activities and compare them as a group.
      2. If there are overlapping metrics that are measuring similar outcomes or providing similar benefits, see if there is a way to merge them together so that a single metric can report outcomes to multiple stakeholders. This reduces the amount of resources invested in metrics gathering and helps to show consensus or alignment between multiple stakeholder interests.
      3. Compare these to your existing Agile metrics, and explore ways to consolidate existing metrics that are established with some of your new metrics. Established metrics are trusted and if they can be continued it can be viewed as beneficial from a consensus and consistency perspective to your stakeholders.

      Activity: Use Info-Tech’s ACE Benefits Tracking Tool to monitor, evaluate, refine, and ensure continued business value

      2.3.6 1 Hour

      Purpose

      The CoE governance team can use this tool to take ownership of the project’s benefits, track progress, and act on any necessary changes to address gaps. In the long term, it can be used to identify whether the team is ahead, on track, or lagging in terms of benefits realization.

      Steps

      1. Enter your identified metrics from the following activities into the ACE Benefits Tracking Tool.
      2. Input your baselines from your data collection (Phase 3) and a goal value for each metric.
      3. Document the results at key intervals as defined by the tool.
      4. Use the summary report to identify metrics that are not tracking well for root cause analysis and communicate with key stakeholders the outcomes of your Agile Center of Excellence based on your communication schedule from Phase 3, Step 3.

      INFO-TECH DELIVERABLE

      Download the ACE Benefits Tracking Tool.

      Checkpoint: Are you ready to operate your ACE?

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Self Auditing Guidelines

      • Have you categorized your ACE service offerings within Info-Tech’s Agile adoption model?
      • Have you formalized engagement plans to standardize the access to your service offerings?
      • Do you understand the function of learning events and their criticality to the function of the ACE?
      • Do you understand the key attributes of Agile adoption and how social capital leads to optimized value delivery?
      • Have you defined metrics for different goals (adoption, effective service offerings, business objectives) of the ACE?
      • Do your defined metrics align to the SMART framework?

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.1 Further categorize your use cases within the Agile adoption model

      Our analyst team will help you categorize the Centers of Excellence service offerings within Info-Tech’s Agile adoption model to help standardize the way your organization engages with the Center of Excellence.

      2.2.1 Create an engagement plan for each level of adoption

      Our analyst team will help you structure engagement plans for each role within your Agile environment to provide a standardized pathway to personal development and consistency in practice.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      2.3.2 Define metrics that align with your Agile business objectives

      Our analysts will walk you through defining a set of metrics that align with your Agile business objectives identified in Phase 1 of the blueprint so the CoEs monitoring function can ensure ongoing alignment during operation.

      2.3.3 Define target ACE performance metrics

      Our analysts will walk you through defining a set of metrics that monitors how successful the ACE has been at providing its services so that business and IT stakeholders can ensure the effectiveness of the ACE.

      2.3.4 Define Agile adoption metrics

      Our analyst team will help you through defining a set of metrics that aligns with your organization’s fit of the Agile adoption model in order to provide a mechanism to track the progress of Agile teams maturing in capability and organizational trust.

      Phase 3

      Operationalize Your Agile Center of Excellence

      Spread Best Practices With an Agile Center of Excellence

      Operate your ACE to drive optimized value from your Agile teams

      The final step is to engage in monitoring of your metrics program to identify areas for improvement. Using metrics as a driver for operating your ACE will allow you to identify and effectively manage needed change, as well as provide you with the data necessary to promote outcomes to your stakeholders to ensure the long-term viability of the ACE within your organization.

      Phase 1 - Strategically Align the CoE

      Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.

      Phase 2 - Standardize the CoEs Service Offerings

      Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.

      Phase 3 - Operate the CoE

      Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Operate the CoE

      Proposed Time to Completion (in weeks): Variable depending on communication plan

      Step 3.1: Optimize the success of your ACE

      Start with an analyst kick off call:

      • Conduct a baseline assessment of your Agile environment.

      Then complete these activities…

      3.1.1 Use Info-Tech’s ACE Satisfaction Survey to help establish your baseline.

      3.1.2 Use Info-Tech’s CoE Maturity Diagnostic Tool to measure the maturity level of your ACE.

      3.1.3 Prioritize ACE actions by monitoring your metrics.

      Step 3.2: Plan change to enhance your Agile initiatives

      Start with an analyst kick off call:

      • Interface with the ACE with your change management function.

      Then complete these activities…

      3.2.1 Assess the interaction and communication points of your Agile teams.

      3.2.2 Determine the root cause of each metric falling short of expectations.

      3.2.3 Brainstorm solutions to identified issues.

      3.2.4 Review your metrics program.

      3.2.5 Create a communication plan for change.

      Step 3.3: Conduct ongoing retrospectives of your ACE

      Finalize phase deliverable:

      • Build a communications deck for key stakeholders.

      Then complete these activities…

      3.3.1 Use the outputs from your metrics tracking tool to communicate progress.

      3.3.2 Summarize adjustments in areas where the ACE fell short.

      3.3.3 Review the effectiveness of your service offerings.

      3.3.4 Evaluate your ACE Maturity.

      3.3.5 Use Info-Tech’s ACE Communications Deck to deliver your outcomes to the key stakeholders.

      Phase 3 Results & Insights:

      Inject improvements into your Agile environment with operational excellence. Plan changes and communicate them effectively, monitor outcomes on a regular basis, and keep stakeholders in the loop to ensure that their interests are being looked after to ensure long-term viability of the CoE.

      Phase 3, Step 1: Optimize the success of your ACE

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Tools:

      3.1.1 Use Info-Tech’s ACE Satisfaction Survey to help establish your baseline.

      3.1.2 Use Info-Tech’s CoE Maturity Diagnostic Tool to measure the maturity level of your ACE.

      3.1.3 Prioritize ACE actions by monitoring your metrics.

      Outcomes:

      • Conduct a baseline assessment of your ACE to measure against using a variety of data sources, including interviews, satisfaction surveys, and historical data.
      • Use the Benefits Tracking Tool to start monitoring the outcomes of the ACE and to keep track of trends.

      Ensure the CoE is able to collect the necessary data to measure success

      Establish your collection process to ensure that the CoE has the necessary resources to collect metrics and monitor progress, that there is alignment on what data sources are to be used when collecting data, and that you know which stakeholder is interested in the outcomes of that metric.

      Responsibility

      • Does the CoE have enough manpower to collect the metrics and monitor them?
      • If automated through technology, is it clear who is responsible for its function?

      Source of metric

      • Is the method of data collection standardized so that multiple people could collect the data in the same way?

      Impacted stakeholder

      • Do you know which stakeholder is interested in this metric?
      • How often should the interested stakeholder be informed of progress?

      Intended function

      • What is the expected benefit of increasing this metric?
      • What does the metric intend to communicate to the stakeholder?

      Conduct a baseline assessment of your ACE to measure success

      Establishing the baseline performance of the ACE allows you to have a reasonable understanding of the impact it is having on meeting business objectives. Use user satisfaction surveys, stakeholder interviews, and any current metrics to establish a concept of how you are performing now. Setting new metrics can be a difficult task so it is important to collect as much current data as possible. After the metrics have been established and monitored for a period of time, you can revisit the targets you have set to ensure they are realistic and usable.

      Without a baseline, you cannot effectively:

      • Establish reasonable target metrics that reflect the performance of your Center of Excellence.
      • Identify, diagnose, and resolve any data that deviates from expected outcomes.
      • Measure ongoing business satisfaction given the level of service.

      Info-Tech Insight

      Invest the needed time to baseline your activities. These data points are critical to diagnose successes and failures of the CoE moving forward, and you will need them to be able to refine your service offerings as business conditions or user expectations change. While it may seem like something you can breeze past, the investment is critical.

      Use a variety of sources to get the best picture of your current state; a combination of methods provides the richest insight

      Interviews

      What to do:

      • Conduct interviews (or focus groups) with key influencers and Agile team members.

      Benefits:

      • Data comes from key business decision makers.
      • Identify what is top of mind for your top-level stakeholders.
      • Ask follow-up questions for detail.

      Challenges:

      • This will only provide a very high-level view.
      • Interviewer biases may skew the results.

      Surveys

      What to do:

      • Distribute an Agile-specific stakeholder satisfaction survey. The survey should be specific to identify factors of your current environment.

      Benefits:

      • Every end user/business stakeholder will be able to provide feedback.
      • The survey will be simple to develop and distribute.

      Challenges:

      • Response rates can be low if stakeholders do not understand the value in their opinions.

      Historical Data

      What to do:

      • Collect and analyze existing Agile data such as past retrospectives, Agile team metrics, etc.

      Benefits:

      • Get a full overview of current service offerings, past issues, and current service delivery.
      • Allows you to get an objective view of what is really going on within your Agile teams.

      Challenges:

      • Requires a significant time investment and analytical skills to analyze the data and generate insights on business satisfaction and needs.

      Use Info-Tech’s ACE Satisfaction Survey to help establish your baseline

      3.1.1 Baseline satisfaction survey

      Purpose

      Conduct a user satisfaction survey prior to setting your baseline for your ACE. This will include high-level questions addressing your overall Agile environment and questions addressing teams’ current satisfaction with their processes and technology.

      Steps

      1. Modify the satisfaction survey template to suit your organization and the service offerings you have defined for the Agile Center of Excellence.
      2. Distribute the satisfaction survey to any users who are expected to interface with the ACE.
      3. Document the results and communicate them with the relevant key stakeholders.
      4. Combine these results with historical data points (if available) and stakeholder interviews to get a holistic picture of your current state.

      INFO-TECH DELIVERABLE

      Download the ACE Satisfaction Survey.

      Use Info-Tech’s CoE Maturity Diagnostic Tool to measure the maturity level of your ACE

      3.1.2 CoE maturity assessment

      Purpose

      Assessing your ACEs maturity lets you know where they currently are and what to track to get them to the next step. This will help ensure your ACE is following good practices and has the appropriate mechanisms in place to serve your stakeholders.

      Steps

      1. Download the CoE Maturity Diagnostic Tool to assess the maturity of your ACE.
      2. Complete the assessment tool with all members of your ACE team to determine your maturity score.
      3. Document the results and communicate them with the relevant key stakeholders.
      4. Combine these results with historical data points (if available) and stakeholder interviews to get a holistic picture of your ACE maturity level.

      Document results in the ACE Communications Deck.

      INFO-TECH DELIVERABLE

      Download the CoE Maturity Diagnostic Tool.

      Activity: Prioritize ACE actions by monitoring your metrics

      3.1.3 Variable time commitment

      Input

      • Metrics from ACE Benefits Tracking Tool

      Output

      • Prioritized actions for the ACE

      Materials

      • ACE Benefits Tracking Tool

      Participants

      • ACE team
      1. Review your ACE Benefits Tracking Tool periodically (at the end of sprint cycles, quarterly, etc.) and document metrics that are trending or actively falling short of goals or expectations.
      2. Take the documented list and have the ACE staff consider what actions or decisions can be prioritized to help mend the identified gaps. Look for any trends that could potentially speak to a larger problem or a specific aspect of the ACE or the organizational Agile environment that is not functioning as expected.
      3. Take the opportunity to review metrics that are also tracking above expected value to see if there are any lessons learned that can be extended to other ACE service offerings (e.g. effective engagement or communication strategies) so that the organization can start to learn what is effective and what is not based on their internal struggles and challenges. Spreading successes is just as important as identifying challenges in a CoE model.

      Phase 3, Step 2: Plan change to enhance your Agile initiatives

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Activities:

      3.2.1 Assess the interaction and communication points of your Agile teams.

      3.2.2 Determine the root cause of each metric falling short of expectations.

      3.2.3 Brainstorm solutions to identified issues

      3.2.4 Review your metrics program.

      3.2.5 Create a communication plan for change.

      Outcomes:

      • Understand how your existing change management process interfaces with the Center of Excellence.
      • Identify issues and ideate solutions to metrics falling short of expectations.
      • Create a communication plan to prepare groups for any necessary change.

      Manage the adaptation of teams as they adopt Agile capabilities

      As Agile spreads, be cognizant of your cultural tolerance to change and its ability to deliver on such change. Change will happen more frequently and continuously, and there may be conceptual (change tolerance) or capability (delivery tolerance) roadblocks along the way that will need to be addressed.

      The Agile adoption model will help to graduate both the tolerance to change and tolerance to deliver over time. As your level of competency to deliver change increases, organizational tolerance to change, especially amongst management, will increase as well. Remember that optimized value delivery comes from this careful balance of aptitude and trust.

      Tolerance to change

      Tolerance to change refers to the conceptual capacity of your people to consume and adopt change. Change tolerance may become a barrier to success because teams might be too engrained with current structures and processes and find any changes too disruptive and uncomfortable.

      Tolerance to deliver

      Tolerance to deliver refers to the capability to deliver on expected change. While teams may be tolerant, they may not have the necessary capacity, skills, or resources to deliver the necessary changes successfully. The ACE can help solve this problem with training and coaching, or possibly by obtaining outside help where necessary.

      Understand how the ACE interfaces with your current change management process

      As the ACE absorbs best practices and identifies areas for improvement, a change management process should be established to address the implementation and sustainability of change without introducing significant disruptions and costs.

      To manage a continuously changing environment, your ACE will need to align and coordinate with organizational change management processes. This process should be capable of evaluating and incorporating multiple change initiatives continuously.

      Desired changes will need to be validated, and localized adaptations will need to be disseminated to the larger organization, and current state policy and procedures will need to be amended as the adoption of Agile spreads and capabilities increase.

      The goal here is to have the ACE governance group identify and interface with parties relevant to successfully implementing any specific change.

      INFO-TECH RELATED RESEARCH:

      Strategy and Leadership: Optimize Change Management

      Optimize your stakeholder management process to identify, prioritize, and effectively manage key stakeholders.

      Where should your Agile change requests come from?

      Changes to the services, structure, or engagement model of your ACE can be triggered from various sources in your organization. You will see that proposed changes may be requested with the best intentions; however, the potential impacts they may have to other areas of the organization can be significant. Consult all sources of ACE change requests to obtain a consensus that your change requests will not deteriorate the ACEs performance and use.

      ACE Governance

      • Sources of ACE Change Requests
        • ACE Policies/Stakeholders
          • Triggers for Change:
            • Changes in business and functional group objectives.
            • Dependencies and legacy policies and procedures.
        • ACE Customers
          • Triggers for Change:
            • Retrospectives and post-mortems.
            • Poor fit of best practices to projects.
        • Metrics
          • Triggers for Change:
            • Performance falling short of expectations.
            • Lack of alignment with changing objectives.
        • Tools and Technologies
          • Triggers for Change:
            • New or enhanced tools and technologies.
            • Changes in development and technology standards.

      Note: Each source of ACE change requests may require a different change management process to evaluate and implement the change.

      Activity: Assess the interaction and communication points of your Agile teams

      3.2.1 1.5 Hours

      Input

      • Understanding of team and organization structure

      Output

      • Current assessment of organizational design

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Development team
      1. Identify everyone who is directly or indirectly involved in projects completed by Agile teams. This can include those that are:
      • Informed of a project’s progress.
      • Expected to interface with the Agile team for solution delivery (e.g. DevOps).
      • Impacted by the success of the delivered solutions.
      • Responsible for the removal of impediments faced by the Agile team.
    • Indicate how each role interacts with the others and how frequently these interactions occur for a typical project. Do this by drawing a diagram on a whiteboard using labelled arrows to indicate types and frequency of interactions.
    • Identify the possible communication, collaboration, and alignment challenges the team will face when working with other groups.
    • Agile Team n
      Group Type of Interaction Potential challenges
      Operations
      • Release management
      • Past challenges transitioning to DevOps.
      • Communication barrier as an impediment.
      PMO
      • Planning
      • Product owner not located with team in organization.
      • PMO still primarily waterfall; need Agile training/coaching

      Activity: Determine the root cause of each metric falling short of expectations

      3.2.2 30 Minutes per metric

      Input

      • Metrics from Benefits Tracking Tool

      Output

      • Root causes to issues

      Materials

      • Whiteboard
      • Markers

      Participants

      • ACE team
      1. Take each metric from the ACE Benefits Tracking Tool that is lagging behind or has missed expectations and conduct an analysis of why it is performing that way.
      2. Conduct individual webbing sessions to clarify the issues. The goal is to drive out the reasons why these issues are present or why scaling Agile may introduce additional challenges.
      3. Share and discuss these findings with the entire team.

      Example:

      • Lack of best-practice documentation
        • Why?
          • Knowledge siloed within teams
          • No centralized repository for best practices
            • Why?
              • No mechanisms to share between teams
                • Why? Root causes
                  • Teams are not sharing localized adaptations
                  • CoE is not effectively monitoring team communications
              • Access issues at team level to wiki
                • Why? Root causes
                  • Administration issues with best-practice wiki
                  • Lack of ACE visibility into wiki access

      Activity: Brainstorm solutions to identified issues

      3.2.3 30 Minutes per metric

      Input

      • Root causes of issues

      Output

      • Fixes and solutions to scaling Agile issues

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Development team
      1. Using the results from your root-cause analysis, brainstorm potential solutions to the identified problems. Frame your brainstorming within the following perspectives: people, process, and technology. Map these solutions using the matrix below.
      2. Synthesize your ideas to create a consolidated list of initiatives.
        1. Highlight the solutions that can address multiple issues.
        2. Collaborate on how solutions can be consolidated into a single initiative.
      3. Write your synthesized solutions on sticky notes.
      SOLUTION CATEGORY
      People Process Technology
      ISSUES Poor face-to-face communication
      Lack of best-practice documentation

      Engage those teams affected by change early to ensure they are prepared

      Strategically managing change is an essential component to ensure that the ACE achieves its desired function. If the change that comes with adopting Agile best practices is going to impact other functions and change their expected workflows, ensure they are well prepared and the benefits for said changes are clearly communicated to them.

      Necessary change may be identified proactively (dependency assessments, system integrity, SME indicates need, etc.) or reactively (through retrospectives, discussions, completing root-cause analyses, etc.), but both types need to be handled the same way – through proper planning and communication with the affected parties.

      Plan any necessary change

      Understand the points where other groups will be affected by the adoption of Agile practices and recognize the potential challenges they may face. Plan changes to accommodate interactions between these groups without roadblocks or impediments.

      Communicate the change

      Structure a communication plan based on your identified challenges and proposed changes so that groups are well prepared to make the necessary adjustments to accommodate Agile workflows.

      Review and modify your metrics and baselines to ensure they are achievable in changing environments

      Consider the possible limitations that will exist from environmental complexities when measuring your Agile teams. Dependencies and legacy policies and procedures that pose a bottleneck to desired outcomes will need to be changed before teams can be measured justifiably. Take the time to ensure the metrics you crafted earlier are plausible in your current environment and there is not a need for transitional metrics.

      Are your metrics achievable?

      Specific

      Measureable

      Achievable

      • Adopting Agile is a journey, not just a destination. Ensure that the metrics a team is measured against reflect expectations for the team’s current level of Agile adoption and consider external dependencies that may limit their ability to achieve intended results.

      Realistic

      Time-bound

      Info-Tech Insight

      Use metrics as diagnostics, not as motivation. Teams will find ways to meet metrics they are measured by making sacrifices and taking unneeded risk to do so. To avoid dysfunction in your monitoring, use metrics as analytical tools to inform decision making, not as a yardstick for judgement.

      Activity: Review your metrics program

      3.2.4 Variable time commitment

      Input

      • Identified gaps
      • Agile team interaction points

      Output

      • ACE baselines
      • Past measurements

      Materials

      • ACE Benefits Tracking Tool

      Participants

      • ACE
      1. Now that you have identified gaps in your current state, see if those will have any impact on the achievability of your current metrics program.
      2. Review your root-cause analyses and brainstormed solutions, and hypothesize whether or not they will have any downstream impact to goal attainment. It is possible that there is no impact, but as cross-functional collaboration increases, the likelihood that groups will act as bottlenecks or impediments to expected performance will increase.
      3. Consider how any changes will impact the interaction points between teams based on the results from activity 3.2.1: Assess the interaction and communication points of your Agile teams. If there are too many negative impacts it may be a sign to re-consider the hypothesized solution to the problem and consider alternatives.
      4. In any cases where a metric has been altered, adjust its goal measurement to reflect its changes in the ACE Benefits Tracking Tool.

      Case study: Agile change at the GSA

      CASE STUDY

      Industry Government

      Source Navin Vembar, Agile Government Leadership

      Challenge

      The GSA is tasked with completed management of the Integrated Award Environment (IAE).

      • The IAE manages ten federal information technology systems that enable registering, searching, and applying for federal awards, as well as tracking them.
      • The IAE also manages the Federal Service Desk.

      The IAE staff had to find a way to break down the problem of modernization into manageable chunks that would demonstrate progress, but also had to be sure to capture a wide variety of user needs with the ability to respond to those needs throughout development.

      Had to work out the logistics of executing Agile change within the GSA, an agency that relies heavily on telework. In the case of modernization, they had a product owner in Florida while the development team was spread across the metro Washington, DC area.

      Solution

      Agile provided the ability to build incremental successes that allowed teams successful releases and built enthusiasm around the potential of adopting Agile practices offered.

      • GSA put in place an organization framework that allowed for planning of change at the portfolio level to enable the change necessary to allow for teams to execute tasks at the project level.
      • A four-year plan with incremental integration points allowed for larger changes on a quarterly basis while maintaining a bi-weekly sprint cycle.
      • They adopted IBM’s RTC tool for a Scrum board and on Adobe Connect for daily Scrum sessions to ensure transparency and effectiveness of outcomes across their collocated teams.

      Create a clear, concise communication plan

      Communication is key to avoid surprises and lost productivity created by the implementation of changes.

      User groups and the business need to be given sufficient notice of an impending change. Be concise, be comprehensive, and ensure that the message is reaching the right audience so that no one is blindsided and unable to deliver what is needed. This will allow them to make appropriate plans to accept the change, minimizing the impact of the change on productivity.

      Key Aspects of a Communication Plan

      • The method of communication (email, meetings, workshops, etc.).
      • The delivery strategy (who will deliver the message?).
      • The communication responsibility structure.
      • The communication frequency.
      • A feedback mechanism that allows you to review the effectiveness of your plan.
      • The message that you need to present.

      Communicating change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • What are we trying to achieve?
      • How often will we be updated?

      (Cornelius & Associates, The Qualities of Leadership: Leading Change)

      Apply the following principles to enhance the clarity of your message

      1. Be Consistent
      • "This is important because..."
        • The core message must be consistent regardless of audience, channel, or medium.
        • Test your communication and obtain feedback before delivering your message.
        • A lack of consistency can be perceived as deception.
    • Be Clear
      • "This means..."
        • Say what you mean and mean what you say.
        • Choice of language is important.
        • Don’t use jargon.
    • Be Relevant
      • "This affects you because..."
        • Talk about what matters to the audience.
        • Talk about what matters to the change initiative.
        • Tailor the details of the message to each audience’s specific concerns.
        • Communicate truthfully; do not make false promises or hide bad news.
    • Be Concise
      • "In summary..."
        • Keep communication short and to the point so key messages are not lost in the noise.
    • Activity: Create a communication plan for change

      3.2.5 1.5 Hours

      Input

      • Desired messages
      • Stakeholder list

      Output

      • Communication plan

      Materials

      • Whiteboard
      • Markers

      Participants

      • CoE
      1. Define the audience(s) for your communications. Consider who needs to be the audience of your different communication events and how it will impact them.
      2. Identify who the messenger will be to deliver the message.
      3. Identify your communication methods. Decide on the methods you will use to deliver each communication event. Your delivery method may vary depending on the audience it is targeting.
      4. Establish a timeline for communication releases. Set dates for your communication events. This can be recurring (weekly, monthly, etc.) or one-time events.
      5. Determine what the content of the message must include. Use the guidelines on the following slide to ensure the message is concise and impactful.

      Note: It is important to establish a feedback mechanism to ensure that the communication has been effective in communicating the change to the intended audiences. This can be incorporated into your ACE satisfaction surveys.

      Audience Messenger Format Timing Message
      Operations Development team Email
      • Monthly (major release)
      • Ad hoc (minor release and fixes)
      Build ready for release
      Key stakeholders CIO Meeting
      • Monthly unless dictated otherwise
      Updates on outcomes from past two sprint cycles

      Phase 3, Step 3: Conduct ongoing retrospectives of your ACE

      Phase 1

      1.1 Determine the vision of your ACE

      1.2 Define the service offerings of your ACE

      Phase 2

      2.1 Define an adoption plan for your Agile teams

      2.2 Create an ACE engagement plan

      2.3 Define metrics to measure success

      Phase 3

      3.1 Optimize the success of your ACE

      3.2 Plan change to enhance your Agile initiatives

      3.3 Conduct ongoing retrospectives of your ACE

      Activities/Tools:

      3.3.1 Use the outputs from your metrics tracking tool to communicate progress.

      3.3.2 Summarize adjustments in areas where the ACE fell short.

      3.3.3 Re-conduct satisfaction surveys and compare against your baseline.

      3.3.4 Use Info-Tech’s CoE Maturity Diagnostic Tool to baseline current practices

      3.3.5 Use Info-Tech’s ACE Communications Deck to deliver your outcomes to the key stakeholders.

      Outcomes:

      • Conduct a retrospective of your ACE to enable the continuous improvement of your Agile program.
      • Structure a communications deck to communicate with stakeholders the outcomes from introducing the ACE to the organization.

      Reflect on your ACEs performance to lead the way to enterprise agility

      After functioning for a period of time, it is imperative to review the function of your ACE to ensure its continual alignment and see in what ways it can improve.

      At the end of the year, take the time to deliberately review and discuss:

      1. The effectiveness and use of your ACEs service offerings.
      2. What went well or wrong during the ACEs operation.
      3. What can be done differently to improve reach, usability, and effectiveness.
      4. Bring together Agile teams and discuss the processes they follow and inquire about suggestions for improvement.

      What is involved?

      • Use your metrics program to diagnose areas of issue and success. The diagnostic value of your metrics can help lead conversations with your Agile teams when attempting to inquire about suggestions for improvement.
      • Leverage your satisfaction surveys from the creation of your ACE and compare them against satisfaction surveys run after a year of operation. What are the lessons learned between then and now?
      • While it is primarily conducted by the ACE team, keep in mind it is a collaborative function and should involve all members, including Agile teams, product owners, Scrum masters, etc.

      Communicating with your key influencers is vital to ensure long-term operation of the ACE

      To ensure the long-term viability of your ACE and that your key influencers will continue funding, you need to demonstrate the ROI the Center of Excellence has provided.

      The overlying purpose of your ACE is to effectively align your Agile teams with corporate objectives. This means that there have to be communicable benefits that point to the effort and resources invested being valuable to the organization. Re-visit your prioritized stakeholder list and get ready to show them the impact the ACE has had on business outcomes.

      Communication with stakeholders is the primary method of building and developing a lasting relationship. Correct messaging can build bridges and tear down barriers, as well as soften opposition and bolster support.

      This section will help you to prepare an effective communication piece that summarizes the metrics stakeholders are interested in, as well as some success stories or benefits that are not communicable through metrics to provide extra context to ongoing successes of the ACE.

      INFO-TECH RELATED RESEARCH:

      Strategy and Leadership: Manage Stakeholder Relations

      Optimize your stakeholder management process to identify, prioritize, and effectively manage key stakeholders.

      Involve key stakeholders in your retrospectives to justify the funding for your ACE

      Those who fund the ACE have a large influence on the long-term success of your ACE. If you have not yet involved your stakeholders, you need to re-visit your organizational funding model for the ACE and ensure that your key stakeholders include the key decision makers for your funding. While they may have varying levels of interest and desires for granularity of data reporting, they need to at least be informed on a high level and kept as champions of the ACE so that there are no roadblocks to the long-term viability of this program.

      Keep this in mind as the ACE begins to demonstrate success, as it is not uncommon to have additional members added to your funding model as your service scales, especially in the chargeback models.

      As new key influencers are included, the ACEs governing group must ensure that collective interests may align and that more priorities don’t lead to derailment.

      The image shows a matrix. The matrix is labelled with Involvement at the bottom, and Power on the left side, and has the upper left quadrant labelled Keep Satisfied, the upper right quadrant labelled Key players, the lower right quadrant labelled Keep informed, and the lower left quadrant labelled Minimal effort. In the matric, there are several roles shown, with roles such as CFO, Apps Director, Funding Group, and CIO highlighted in the Key players section.

      Use the outputs from your metrics tracking tool to communicate progress

      3.3.1 1 Hour

      Use the ACE Benefits Tracking Tool to track the progress of your Agile environment to monitor whether or not the ACE is having a positive impact on the business’ ability to meet its objectives. The outputs will allow you to communicate incremental benefits that have been realized and point towards positive trends that will ensure the long-term buy-in of your key influencers.

      For communication purposes, use this tool to:

      • Re-visit who the impacted or interested stakeholders are so you can tailor your communications to be as impactful as possible for each key influencer of the ACE.

      The image shows a screen capture of the Agile CoE Metrics Tracking sheet.

      • Collate the benefits of the current projects undertaken by the Center of Excellence to give an overall recap of the ACEs impact.

      The image is a screen capture of the Summary Report sheet.

      Communicate where the ACE fell short

      Part of communicating the effectiveness of your ACE is to demonstrate that it is able to remedy projects and processes when they fall short of expectations and brainstorm solutions that effectively address these challenges. Take the opportunity to summarize where results were not as expected, and the ways in which the ACE used its influence or services to drive a positive outcome from a problem diagnosis. Stakeholders do not want a sugar-coated story – they want to see tangible results based on real scenarios.

      Summarizing failures will demonstrate to key influencers that:

      • You are not cherry-picking positive metrics to report and that the ACE faced challenges that it was able to overcome to drive positive business outcomes.
      • You are being transparent with the successes and challenges faced by the ACE, fostering increased trust within your stakeholders regarding the capabilities of Agile.
      • Resolution mechanisms are working as intended, successfully building failure tolerance and trust in change management policies and procedures.

      Activity: Summarize adjustments in areas where the ACE fell short

      3.3.2 15 Minutes per metric

      Input

      • Diagnosed problems from tracking tool
      • Root-cause analyses

      Output

      • Summary of change management successes

      Materials

      • Whiteboard
      • Markers

      Participants

      • ACE
      1. Create a list of items from the ACE Benefits Tracking Tool that fell short of expectations or set goals.
      2. For each point, create a brief synopsis of the root-cause analysis completed and summarize the brainstormed solution and its success in remedying the issue. If this process is not complete, create a to-date summary of any progress.
      3. Choose two to three pointed success stories from this list that will communicate broad success to your set of stakeholders.
      Name of metric that fell short
      Baseline measurement 65% of users satisfied with ACE services.
      Goal measurement 80% of users satisfied with ACE services.
      Actual measurement 70% of users satisfied with ACE services.
      Results of root-cause analysis Onboarding was not extensive enough; teams were unaware of some of the services offered, rendering them unsatisfied.
      Proposed solution Revamp onboarding process to include capability map of service offered.
      Summary of success TBD

      Re-conduct surveys with the ACE Satisfaction Survey to review the effectiveness of your service offerings

      3.3.3 Re-conduct satisfaction surveys and compare against your baseline

      Purpose

      This satisfaction survey will give you a template to follow to monitor the effectiveness of your ACEs defined service offerings. The goal is to understand what worked, and what did not, so you can add, retract, or modify service offerings where necessary.

      Steps

      1. Re-use the satisfaction survey to measure the effectiveness of the service offerings. Add questions regarding specific service offerings where necessary.
      2. Cross-analyze your satisfaction survey with metrics tied to your service offerings to help understand the root cause of the issues.
      3. Use the root-cause analysis exercises from step 3.2 to find the root causes of issues.
      4. Create a set of recommendations to add, amend, or improve any existing service offerings.

      INFO-TECH DELIVERABLE

      Download the ACE Satisfaction Survey.

      Use Info-Tech’s CoE Maturity Diagnostic Tool to baseline current practices

      3.3.4 ACE Maturity Assessment

      Purpose

      Assess your ACEs maturity by using Info-Tech’s CoE Maturity Diagnostic Tool. Assessing your ACEs maturity lets you know where you currently are, and where to look for improvements. Note that your optimal Maturity Level will depend on organizational specifics (e.g. a small organization with a handful of Agile Teams can be less mature than a large organization with hundreds of Agile Teams).

      Steps

      1. Download the CoE Maturity Diagnostic Tool to assess the maturity of your ACE.
      2. Complete the assessment tool with all members of your ACE team to determine your current Maturity score.
      3. Document the results in the ACE Communications Deck.

      Document results in the ACE Communications Deck.

      INFO-TECH DELIVERABLE

      Download the CoE Maturity Diagnostic Tool.

      Use Info-Tech’s ACE Communications Deck to deliver your outcomes to the key stakeholders

      3.3.5 Structure communications to each of your key stakeholders

      Purpose

      The ACE Communications Deck will give you a template to follow to effectively communicate with your stakeholders and ensure the long-term viability of your Agile Center of Excellence. Fill in the slides as instructed and provide each stakeholder with a targeted view of the successes of the ACE.

      Steps

      1. Determine who your target audience is for the Communications Deck – you may desire to create one for each of your key stakeholders as they may have different sets of interests.
      2. Fill out the ACE Communications Deck with the suggested inputs from the exercises you have completed during this research set.
      3. Review communications with members of the ACE to ensure that there are no communicable benefits that have been missed or omitted in the deck.

      INFO-TECH DELIVERABLE

      Download the ACE Communications Deck.

      Summary of accomplishment

      Knowledge Gained

      • An understanding of social capital as the key driver for organizational Agile success, and how it optimizes the value delivery of your Agile teams.
      • Importance of flexible governance to balance the benefits of localized adaptation and centralized control.
      • Alignment of service offerings with both business objectives and functional expectations as critical to ensuring long-term engagement with service offerings.

      Processes Optimized

      • Knowledge management and transfer of Agile best practices to new or existing Agile teams.
      • Optimization of service offerings for Agile teams based on organizational culture and objectives.
      • Change request optimization via interfacing ACE functions with existing change management processes.
      • Communication planning to ensure transparency during cross-functional collaboration.

      Deliverables Completed

      • A set of service offerings offered by the Center of Excellence that are aligned with the business, Agile teams, and related stakeholders.
      • Engagement plans for Agile team members based on a standardized adoption model to access the ACEs service offerings.
      • A suite of Agile metrics to measure effectiveness of Agile teams, the ACE itself, and its ability to deliver positive outcomes.
      • A communications plan to help create cross-functional transparency over pending changes as Agile spreads.
      • A communications deck to communicate Agile goals, actions, and outcomes to key stakeholders to ensure long-term viability of the CoE.

      Research contributors and experts

      Paul Blaney, Technology Delivery Executive, Thought Leader and passionate Agile Advocate

      Paul has been an Agile practitioner since the manifesto emerged some 20 years ago, applying and refining his views through real life experience at several organizations from startups to large enterprises. He has recently completed the successful build out of the inaugural Agile Delivery Centre of Excellence at TD bank in Toronto.

      John Munro, President Scrum Masters Inc.

      John Munro is the President of Scrum Masters Inc., a software optimization professional services firm using Agile, Scrum, and Lean to help North American firms “up skill” their software delivery people and processes. Scrum Masters’ unique, highly collaborative “Master Mind” consulting model leverages Agile/Lean experts on a biweekly basis to solve clients’ technical and process challenges.

      Doug Birgfeld, Senior Partner Agile Wave

      Doug has been a leader in building great teams, Agile project management, and business process innovation for over 20 years. As Senior Partner and Chief Evangelist at Agile Wave, his mission is to educate and to learn from all those who care about effective government delivery, nationally.

      Related Info-Tech research

      Implement Agile Practices That Work

      Agile is a cultural shift. Don't just do Agile, be Agile.

      Enable Organization-Wide Collaboration by Scaling Agile

      Execute a disciplined approach to rolling out Agile methods in the organization.

      Improve Application Development Throughput

      Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.

      Implement DevOps Practices That Work

      Accelerate software deployment through Dev and Ops collaboration.

      Related Info-Tech research (continued)

      Maximize the Benefits from Enterprise Applications with a Center of Excellence

      Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.

      Drive Efficiency and Agility with a Fit-for-Purpose Quality Management Program

      Be proactive; it costs exponentially more to fix a problem the longer it goes unnoticed.

      Optimize the Change Management Process

      Right-size your change management process.

      Improve Requirements Gathering

      Back to basics: great products are built on great requirements.

      Bibliography

      Ambler, Scott. “Agile Requirements Change Management.” Agile Modeling. Scott Amber + Associates, 2014. Web. 12 Apr. 2016.

      Ambler, Scott. “Center of Excellence (CoEs).” Disciplined Agile 2.0: A Process Decision Framework for Enterprise I.T. Scott Amber + Associates. Web. 01 Apr. 2016.

      Ambler, Scott. “Transforming From Traditional to Disciplined Agile Delivery.” Case Study: Disciplined Agile Delivery Adoption. Scott Amber + Associates, 2013. Web.

      Beers, Rick. “IT – Business Alignment Why We Stumble and the Path Forward.” Oracle Corporation, July 2013. Web.

      Cornelius & Associates. “The Qualities of Leadership: Leading Change.” Cornelius & Associates, n.d. Web.

      Craig, William et al. “Generalized Criteria and Evaluation Method for Center of Excellence: A Preliminary Report.” Carnegie Mellon University Research Showcase @ CMU – Software Engineering Institute. Dec. 2009. Web. 20 Apr. 2016.

      Forsgren, Dr. Nicole et al (2019), Accelerate: State of DevOps 2019, Google, https://services.google.com/fh/files/misc/state-of-devops-2019.pdf

      Gerardi, Bart (2017), Agile Centers of Excellence, PMI Projectmanagement.com, https://www.projectmanagement.com/articles/405819/Agile-Centers-of-Excellence

      Gerardi, Bart (2017), Champions of Agile Adoption, PMI Projectmanagement.com, https://www.projectmanagement.com/articles/418151/Champions-of-Agile-Adoption

      Gerardi, Bart (2017), The Roles of an Agile COE, PMI Projectmanagement.com, https://www.projectmanagement.com/articles/413346/The-Roles-of-an-Agile-COE

      Hohl, P. et al. “Back to the future: origins and directions of the ‘Agile Manifesto’ – views of the originators.” Journal of Software Engineering Research and Development, vol. 6, no. 15, 2018. https://link.springer.com/article/10.1186/s40411-0...

      Kaltenecker, Sigi and Hundermark, Peter. “What Are Self-Organising Teams?” InfoQ. 18 July 2014. Web. 14 Apr. 2016.

      Kniberg, Henrik and Anderson Ivarsson. “Scaling Agile @ Spotify with Tribes, Squads, Chapters & Guilds.” Oct. 2012. Web. 30 Apr. 2016.

      Kumar, Alok et al. “Enterprise Agile Adoption: Challenges and Considerations.” Scrum Alliance. 30 Oct. 2014. Web. 30 May 2016.

      Levison, Mark. “Questioning Servant Leadership.” InfoQ, 4 Sept. 2008. Web. https://www.infoq.com/news/2008/09/servant_leadership/

      Linders, Ben. “Don't Copy the Spotify Model.” InfoQ.com. 6 Oct. 2016.

      Loxton, Matthew (June 1, 2011), CoP vs CoE – What’s the difference, and Why Should You Care?, Wordpress.com

      McDowell, Robert, and Bill Simon. In Search of Business Value: Ensuring a Return on Your Technology Investment. SelectBooks, 2010

      Novak, Cathy. “Case Study: Agile Government and the State of Maine.” Agile Government Leadership, n.d. Web.

      Pal, Nirmal and Daniel Pantaleo. “Services are the Language and Building Blocks of an Agile Enterprise.” The Agile Enterprise: Reinventing your Organization for Success in an On-Demand World. 6 Dec. 2015. Springer Science & Business Media.

      Rigby, Darrell K. et al (2018), Agile at Scale, Harvard Business Review, https://hbr.org/2018/05/agile-at-scale

      Scaledagileframework.com, Create a Lean-Agile Center of Excellence, Scaled Agile, Inc, https://www.scaledagileframework.com/lace/

      Shepley, Joe. “8 reasons COEs fail (Part 2).” Agile Ramblings, 22 Feb. 2010. https://joeshepley.com/2010/02/22/8-reasons-coes-fail-part-2/

      Stafford, Jan. “How upper management misconceptions foster Agile failures.” TechTarget. Web. 07 Mar. 2016.

      Taulli, Tom (2020), RPA Center Of Excellence (CoE): What You Need To Know For Success, Forbes.com, https://www.forbes.com/sites/tomtaulli/2020/01/25/rpa-center-of-excellence-coe-what-you-need-to-know-for-success/#24364620287a

      Telang, Mukta. “The CMMI Agile Adoption Model.” ScrumAlliance. 29 May 2015. Web. 15 Apr. 2016.

      VersionOne. “13th Annual State of Agile Report.” VersionOne. 2019. Web.

      Vembar, Navin. “Case Study: Agile Government and the General Services Administration (Integrated Award Environment).” Agile Government Leadership, n.d. Web.

      Wenger, E., R. A. McDermott, et al. (2002), Cultivating communities of practice: A guide to managing knowledge, Harvard Business Press.

      Wenger, E., White, N., Smith, J.D. Digital Habitats; Stewarding Technology for Communities. Cpsquare (2009).

      Excel Through COVID-19 With a Focused Business Architecture

      • Buy Link or Shortcode: {j2store}604|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • Business architecture, including value stream and business capability models, is the tool you need to reposition your organization for post-COVID-19 success.
      • Your business architecture model represents your strategic business components. It guides the development of all other architectures to enable new and improved business function.
      • Evaluating your current business architecture, or indeed rebuilding it, creates a foundation for facilitated discussions and target state alignment between IT and the senior C-suite.
      • New projects and initiatives during COVID-19 must evolve business architecture so that your front-line workers and your customers are supported through the resolution of the pandemic. Specifically, your projects and initiatives must be directly traced to evolving your architecture.
      • Business architecture anchors downstream architectural iterations and initiatives. Measure business capability enablement results directly from projects and initiatives using a business architecture model.

      Our Advice

      Critical Insight

      • Focus on your most disruptive, game-changing innovations that have been on the backburner for some time. Here you will find the ingredients for post-pandemic success.

      Impact and Result

      • Craft your business architecture model, aligned to the current climate, to refocus on your highest priority goals and increase your chances of post-COVID-19 excellence.

      Excel Through COVID-19 With a Focused Business Architecture Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create minimum viable business architecture

      Create your minimum viable business architecture.

      • Excel Through COVID-19 With a Focused Business Architecture Storyboard
      • Excel Through COVID-19 With a Focused Business Architecture – Healthcare
      • Excel Through COVID-19 With a Focused Business Architecture – Higher Education
      • Excel Through COVID-19 With a Focused Business Architecture – Manufacturing
      • Business Capability Modeling

      2. Identify COVID-19 critical capabilities for your industry

      If there are a handful of capabilities that your business needs to focus on right now, what are they?

      3. Brainstorm COVID-19 business opportunities

      Identify business opportunities.

      4. Enrich capability model with COVID-19 opportunities

      Enrich your capability model.

      [infographic]

      Reduce Shadow IT With a Service Request Catalog

      • Buy Link or Shortcode: {j2store}302|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $129,999 Average $ Saved
      • member rating average days saved: 35 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management
      • Shadow IT: The IT team is regularly surprised to discover new products within the organization, often when following up on help desk tickets or requests for renewals from business users or vendors.
      • Renewal Management: The contracts and asset teams need to be aware of upcoming renewals and have adequate time to review renewals.
      • Over-purchasing: Contracts may be renewed without a clear picture of usage, potentially renewing unused applications.

      Our Advice

      Critical Insight

      There is a direct correlation between service delivery dissatisfaction and increases in shadow IT. Whether the goal is to reduce shadow IT or gain control, improved customer service and fast delivery are key to making lasting changes.

      Impact and Result

      Our blueprint will help you design a service that draws the business to use it. If it is easier for them to buy from IT than it is to find their own supplier, they will use IT.

      A heavy focus on customer service, design optimization, and automation will provide a means for the business to get what they need, when they need it, and provide visibility to IT and security to protect organizational interests.

      This blueprint will help you:

      • Design the request service
      • Design the request catalog
      • Build the request catalog
      • Market the service

      Reduce Shadow IT With a Service Request Catalog Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Reduce Shadow IT With a Service Request Catalog – A step-by-step document that walks you through creation of a request service management program.

      Use this blueprint to create a service request management program that provides immediate value.

      • Reduce Shadow IT With a Service Request Catalog Storyboard

      2. Nonstandard Request Assessment – A template for documenting requirements for vetting and onboarding new applications.

      Use this template to define what information is needed to vet and onboard applications into the IT environment.

      • Nonstandard Request Assessment

      3. Service Request Workflows – A library of workflows used as a starting point for creating and fulfilling requests for applications and equipment.

      Use this library of workflows as a starting point for creating and fulfilling requests for applications and equipment in a service catalog.

      • Service Request Workflows

      4. Application Portfolio – A template to organize applications requested by the business and identify which items are published in the catalog.

      Use this template as a starting point to create an application portfolio and request catalog.

      • Application Portfolio

      5. Reduce Shadow IT With a Service Request Catalog Communications Template – A presentation and communications plan to announce changes to the service and introduce a catalog.

      Use this template to create a presentation and communications plan for launching the new service and service request catalog.

      • Reduce Shadow IT with a Service Request Catalog Communications Template
      [infographic]

      Workshop: Reduce Shadow IT With a Service Request Catalog

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Design the Service

      The Purpose

      Collaborate with the business to determine service model.

      Collaborate with IT teams to build non-standard assessment process.

      Key Benefits Achieved

      Designed a service for service requests, including new product intake.

      Activities

      1.1 Identify challenges and obstacles.

      1.2 Complete customer journey map.

      1.3 Design process for nonstandard assessments.

      Outputs

      Nonstandard process.

      2 Design the Catalog

      The Purpose

      Design the service request catalog management process.

      Key Benefits Achieved

      Ensure the catalog is kept current and is integrated with IT service catalog if applicable.

      Activities

      2.1 Determine what will be listed in the catalog.

      2.2 Determine process to build and maintain the catalog, including roles, responsibilities, and workflows.

      2.3 Define success and determine metrics.

      Outputs

      Catalog scope.

      Catalog design and maintenance plan.

      Defined success metrics

      3 Build and Market the Catalog

      The Purpose

      Determine catalog contents and how requests will be fulfilled.

      Key Benefits Achieved

      Catalog framework and service level agreements will be defined.

      Create communications documents.

      Activities

      3.1 Determine how catalog items will be displayed.

      3.2 Complete application categories for catalog.

      3.3 Create deployment categories and SLAs.

      3.4 Design catalog forms and deployment workflows.

      3.5 Create roadmap.

      3.6 Create communications plan.

      Outputs

      Catalog workflows and SLAs.

      Roadmap.

      Communications deck.

      4 Breakout Groups – Working Sessions

      The Purpose

      Create an applications portfolio.

      Prepare to populate the catalog.

      Key Benefits Achieved

      Portfolio and catalog contents created.

      Activities

      4.1 Using existing application inventory, add applications to portfolio and categorize.

      4.2 Determine which applications should be in the catalog.

      4.3 Determine which applications are packaged and can be easily deployed.

      Outputs

      Application Portfolio.

      List of catalog items.

      Further reading

      Reduce Shadow IT With a Service Request Catalog

      Foster business partnerships with sourcing-as-a-service.

      Analyst Perspective

      Improve the request management process to reduce shadow IT.

      In July 2022, Ivanti conducted a study on the state of the digital employee experience, surveying 10,000 office workers, IT professionals, and C-suite executives. Results of this study indicated that 49% of employees are frustrated by their tools, and 26% of employees were considering quitting their jobs due to unsuitable tech. 42% spent their own money to gain technology to improve their productivity. Despite this, only 21% of IT leaders prioritized user experience when selecting new tools.

      Any organization’s workers are expected to be productive and contribute to operational improvements or customer experience. Yet those workers don’t always have the tools needed to do the job. One option is to give the business greater control, allowing them to choose and acquire the solutions that will make them more productive. Info-Tech's blueprint Embrace Business-Managed Applications takes you down this path.

      However, if the business doesn’t want to manage applications, but just wants have access to better ones, IT is positioned to provide services for application and equipment sourcing that will improve the employee experience while ensuring applications and equipment are fully managed by the asset, service, and security teams.

      Improving the request management and deployment practice can give the business what they need without forcing them to manage license agreements, renewals, and warranties.

      Photo of Sandi Conrad

      Sandi Conrad
      ITIL Managing Professional
      Principal Research Director, IT Infrastructure & Operations,
      Info-Tech Research Group

      Your challenge

      This research is designed to help organizations that are looking to improve request management processes and reduce shadow IT.

      Shadow IT: The IT team is regularly surprised to discover new products within the organization, often when following up on help desk tickets or requests for renewals from business users or vendors.

      Renewal management: The contracts and asset teams need to be aware of upcoming renewals and have adequate time to review renewals.

      Over-purchasing and over-spending: Contracts may be renewed without a clear picture of utilization, potentially renewing unused applications. Applications or equipment may be purchased at retail price where corporate, government, or educational discounts exist.

      Info-Tech Insight

      To increase the visibility of the IT environment, IT needs to transform the request management process to create a service that makes it easier for the business to access the tools they need rather than seeking them outside of the organization.

      609
      Average number of SaaS applications in large enterprises

      40%
      On average, only 60% of provisioned SaaS licenses are used, with the remaining 40% unused.

      — Source: Zylo, SaaS Trends for IT Leaders, 2022

      Common obstacles

      Too many layers of approvals and a lack of IT workers makes it difficult to rethink service request fulfillment.

      Delays: The business may not be getting the applications they need from IT to do their jobs or must wait too long to get the applications approved.

      Denials: Without IT’s support, the business is finding alternative options, including SaaS applications, as they can be bought and used without IT’s input or knowledge.

      Threats: Applications that have not been vetted by security or installed without their knowledge may present additional threats to the organization.

      Access: Self-serve isn’t mature enough to support an applications catalog.

      A diagram that shows the number of SaaS applications being acquired outside of IT is increasing year over year, and that business units are driving the majority of SaaS spend.

      8: average number of applications entering the organization every 30 days

      — Source: Zylo, SaaS Trends for Procurement, 2022

      Info-Tech’s approach

      Improve the request management process to create sourcing-as-a-service for the business.

      • Improve customer service
      • Reduce shadow IT
      • Gain control in a way that keeps the business happy

      1. Design the service

      Collaborate with the business

      Identify the challenges and obstacles

      Gain consensus on priorities

      Design the service

      2. Design the catalog

      Determine catalog scope

      Create a process to build and maintain the catalog

      Define metrics for the request management process

      3. Build the catalog

      Determine descriptions for catalog items

      Create definitions for license types, workflows, and SLAs

      Create application portfolio

      Design catalog forms and workflows

      4. Market the service

      Create a roadmap

      Determine messaging

      Build a communications plan

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Communications Presentation

      Photo of Communications Presentation

      Application Portfolio

      Photo of Application Portfolio

      Visio Library

      Photo of Visio Library

      Nonstandard Request Assessment

      Photo of Nonstandard Request Assessment

      Create a request management process and service catalog to improve delivery of technology to the business

      Build Your Enterprise Innovation Program

      • Buy Link or Shortcode: {j2store}104|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $100,000 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • You don’t know where to start when it comes to building an innovation program for your organization.
      • You need to create a culture of innovation in your business, department, or team.
      • Past innovation efforts have been met with resistance and cynicism.
      • You don’t know what processes you need to support business-led innovation.

      Our Advice

      Critical Insight

      Innovation is about people, not ideas or processes. Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and taking smart risks are most likely to see the benefits of innovation.

      Impact and Result

      • Outperform your peers by 30% by adopting an innovative approach to your business.
      • Move quickly to launch your innovation practice and beat the competition.
      • Develop the skills and capabilities you need to sustain innovation over the long term.

      Build Your Enterprise Innovation Program Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build Your Enterprise Innovation Program Storyboard – A step-by-step process to create the innovation culture, processes, and tools you need for business-led innovation.

      This storyboard includes three phases and nine activities that will help you define your purpose, align your people, and build your practice.

      • Build Your Enterprise Innovation Program – Phases 1-3

      2. Innovation Program Template – An executive communication deck summarizing the outputs from this research.

      Use this template in conjunction with the activities in the main storyboard to create and communicate your innovation program. This template uses sample data from a fictional retailer, Acme Corp, to illustrate an ideal innovation program summary.

      • Innovation Program Template

      3. Job Description – Chief Innovation Officer

      This job description can be used to hire your Chief Innovation Officer. There are many other job descriptions available on the Info-Tech website and referenced within the storyboard.

      • Chief Innovation Officer

      4. Innovation Ideation Session Template – Use this template to facilitate innovation sessions with the business.

      Use this framework to facilitate an ideation session with members of the business. Instructions for how to customize the information and facilitate each section is included within the deck.

      • Innovation Ideation Session Template

      5. Initiative Prioritization Workbook – Use this spreadsheet template to easily and transparently prioritize initiatives for pilot.

      This spreadsheet provides an analytical and transparent method to prioritize initiatives based on weighted criteria relevant to your business.

      • Initiative Prioritization Workbook

      Infographic

      Workshop: Build Your Enterprise Innovation Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your Ambitions

      The Purpose

      Define your innovation ambitions.

      Key Benefits Achieved

      Gain a better understanding of why you are innovating and what your organization will gain from an innovation program.

      Activities

      1.1 Understand your innovation mandate.

      1.2 Define your innovation ambitions.

      1.3 Determine value proposition & metrics.

      Outputs

      Complete the "Our purpose" section of the Innovation Program Template

      Complete "Vision and guiding principles" section

      Complete "Scope and value proposition" section

      Success metrics

      2 Align Your People

      The Purpose

      Build a culture, operating model, and team that support innovation.

      Key Benefits Achieved

      Develop a plan to address culture gaps and identify and implement your operating model.

      Activities

      2.1 Foster a culture of innovation.

      2.2 Define your operating model.

      Outputs

      Complete "Building an innovative culture" section

      Complete "Operating model" section

      3 Develop Your Capabilities

      The Purpose

      Create the capability to facilitate innovation.

      Key Benefits Achieved

      Create a resourcing plan and prioritization templates to make your innovation program successful.

      Activities

      3.1 Build core innovation capabilities.

      3.2 Develop prioritization criteria.

      Outputs

      Team structure and resourcing requirements

      Prioritization spreadsheet template

      4 Build Your Program

      The Purpose

      Finalize your program and complete the final deliverable.

      Key Benefits Achieved

      Walk away with a complete plan for your innovation program.

      Activities

      4.1 Define your methodology to pilot projects.

      4.2 Conduct a program retrospective.

      Outputs

      Complete "Operating model" section in the template

      Notable wins and goals

      Further reading

      Build Your Enterprise Innovation Program

      Transform your business by adopting the culture and practices that drive innovation.

      Analyst Perspective

      Innovation is not about ideas, it's about people.

      Many organizations stumble when implementing innovation programs. Innovation is challenging to get right, and even more challenging to sustain over the long term.

      One of the common stumbling blocks we see comes from organizations focusing more on the ideas and the process than on the culture and the people needed to make innovation a way of life. However, the most successful innovators are the ones which have adopted a culture of innovation and reinforce innovative behaviors across their organization. Organizational cultures which promote growth mindset, trust, collaboration, learning, and a willingness to fail are much more likely to produce successful innovators.

      This research is not just about culture, but culture is the starting point for innovation. My hope is that organizations will go beyond the processes and methodologies laid out here and use this research to dramatically improve their organization's performance.

      Kim Rodriguez

      Kim Osborne Rodriguez
      Research Director, CIO Advisory
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      As a leader in your organization, you need to:

      • Understand your organization's innovation goals.
      • Create an innovation program or structure.
      • Develop a culture of innovation across your team or organization.
      • Demonstrate an ability to innovate and grow the business.

      Common Obstacles

      In the past, you might have experienced one or more of the following:

      • Innovation initiatives lose momentum.
      • Cynicism and distrust hamper innovation.
      • Innovation efforts are unfocused or don't provide the anticipated value.
      • Bureaucracy has created a bottleneck that stifles innovation.

      Info-Tech's Approach

      This blueprint will help you:

      • Understand the different types of innovation.
      • Develop a clear vision, scope, and focus.
      • Create organizational culture and behaviors aligned with your innovation ambitions.
      • Adopt an operational model and methodologies best suited for your culture, goals, and budget.
      • Successfully run a pilot program.

      Info-Tech Insight

      There is no single right way to approach innovation. Begin with an understanding of your innovation ambitions, your existing culture, and the resources available to you, then adopt the innovation operating model that is best suited to your situation.

      Note: This research is written for the individual who is leading the development of the innovation. This role is referred to as the Chief Innovation Officer (CINO) throughout this research but could be the CIO, CTO, IT director, or another business leader.

      Why is innovation so challenging?

      Most organizations want to be innovative, but very few succeed.

      • Bureaucracy slows innovation: Innovation requires speed – it is important to fail fast and early so you can iterate to improve the final solution. Small, agile organizations like startups tend to be more risk tolerant and can move more quickly to iterate on new ideas compared to larger organizations.
      • Change is uncomfortable: Most people are profoundly uncomfortable with failure, risk, and unknowns – three critical components of innovation. Humans are wired to think efficiently rather than innovatively, which leads to confirmation bias and lack of ingenuity.
      • You will likely fail: Innovation initiatives rarely succeed on the first try – Harvard Business Review estimates between 70% and 90% of innovation efforts fail. Organizations which are more tolerant of failure tend to be significantly more innovative than those which are not (Review of Financial Studies, 2014).

      Based on a survey of global innovation trends and practices:

      75%

      Three-quarters of companies say innovation is a top-three priority.
      Source: BCG, 2021

      30%

      But only 30% of executives say their organizations are doing it well.
      Source: BCG, 2019

      The biggest obstacles to innovation are cultural

      The biggest obstacles to innovation in large companies

      Based on a survey of 270 business leaders.
      Source: Harvard Business Review, 2018

      A bar graph from the Harvard Business Review

      The most common challenges business leaders experience relate to people and culture. Success is based on people, not ideas.

      Politics, turf wars, and a lack of alignment: territorial departments, competition for resources, and unclear roles are holding back the innovation efforts of 55% of respondents.

      FIX IT
      Senior leadership needs to be clear on the innovation goals and how business units are expected to contribute to them.

      Cultural issues: many large companies have a culture that rewards operational excellence and disincentivizes risk. A history of failed innovation attempts may result in significant resistance to new change efforts.

      FIX IT
      Cultural change takes time. Ensure you are rewarding collaboration and risk-taking, and hire people with fresh new perspectives.

      Inability to act on signals crucial to the future of the business: only 18% of respondents indicated their organization was unaware of disruptions, but 42% said they struggled with acting on leading indicators of change.

      FIX IT
      Build the ability to quickly run pilots or partner with startups and incubators to test out new ideas without lengthy review and approval processes.
      Source: Harvard Business Review, 2018

      Build Your Enterprise Innovation Program

      Define your purpose, assess your culture, and build a practice that delivers true innovation.

      An image summarizing how to define your purpose, align your people, and Build your Practice.
      1 Source: Boston Consulting Group, 2021
      2 Source: Boston Consulting Group, 2019
      3 Source: Harvard Business Review, 2018

      Use this research to outperform your peers

      A seven-year review showed that the most innovative companies outperformed the market by upwards of 30%.

      A line graph showing the Normalized Market Capitalization for 2020.

      Innovators are defined as companies that were listed on Fast Company World's 50 Most Innovative Companies for 2+ years.

      Innovation is critical to business success.

      A 25-year study by Business Development Canada and Statistics Canada showed that innovation was more important to business success than management, human resources, marketing, or finance.

      Executive brief case study

      INDUSTRY: Healthcare
      SOURCE: Interview

      Culture is critical

      This Info-Tech member is a nonprofit, community-based mental health organization located in the US. It serves about 25,000 patients per year in community, school, and clinic settings.

      This organization takes its innovation culture very seriously and has developed methodologies to assess individual and team innovation readiness as well as innovation types, which it uses to determine everyone's role in the innovation process. These assessments look at knowledge of and trust in the organization, its innovation profile, and its openness to change. Innovation enthusiasts are involved early in the process when it's important to dream big, while more pragmatic perspectives are incorporated later to improve the final solution.

      Results

      The organization has developed many innovative approaches to delivering healthcare. Notably, they have reimagined patient scheduling and reduced wait times to the extent that some patients can be seen the same day. They are also working to improve access to mental health care despite a shortage of professionals.

      Developing an Innovative Culture

      • Innovation Readiness Assessment
      • Coaching Specific to Innovation Profile
      • Innovation Enthusiasts Involved Early
      • Innovation Pragmatists Involved Later
      • High Success Rate of Innovation

      Define innovation roles and responsibilities

      A table showing key innovation roles and responsibilities.

      Info-Tech's methodology for building your enterprise innovation program

      1. Define Your Purpose

      2. Align Your People

      3. Build Your Practice

      Phase Steps

      1. Understand your mandate
      2. Define your innovation ambitions
      3. Determine value proposition and metrics
      1. Foster a culture of innovation
      2. Define your operating model
      3. Build core innovation capabilities
      1. Build your ideation and prioritization methodologies
      2. Define your pilot project methodology
      3. Conduct a program retrospective

      Phase Outcomes

      Understand where the mandate for innovation comes from, and what the drivers are for pursuing innovation. Define what innovation means to your organization, and set the vision, mission, and guiding principles. Articulate the value proposition and key metrics for measuring success.

      Understand what it takes to build an innovative culture, and what types of innovation structure are most suited to your innovation goals. Define an innovation methodology and build your core innovation capabilities and team.

      Gather ideas and understand how to assess and prioritize initiatives based on standardized metrics. Develop criteria for tracking and measuring the success of pilot projects and conduct a program retrospective.

      Innovation program taxonomy

      This research uses the following common terms:

      Innovation Operating Model
      The operating model describes how the innovation program delivers value to the organization, including how the program is structured, the steps from idea generation to enterprise launch, and the methodologies used.
      Examples: Innovation Hub, Grassroots Innovation.

      Innovation Methodology
      Methodologies describe the ways the operating model is carried out, and the approaches used in the innovation practice.
      Examples: Design Thinking, Weighted Criteria Scoring

      Chief Innovation Officer
      This research is written for the person or team leading the innovation program – this might be a CINO, CIO, or other leader in the organization.

      Innovation Team
      The innovation team may vary depending on the operating model, but generally consists of the individuals involved in facilitating innovation across the organization. This may be, but does not have to be, a dedicated innovation department.

      Innovation Program
      The program for generating ideas, running pilot projects, and building a business case to implement across the enterprise.

      Pilot Project
      A way of testing and validating a specific concept in the real world through a minimum viable product or small-scale implementation. The pilot projects are part of the overall pilot program.

      Insight summary

      Innovation is about people, not ideas or processes
      Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and the ability to take smart risk are most likely to see the benefits of innovation.

      Very few are doing innovation well
      Only 30% of companies consider themselves innovative, and there's a good reason: innovation involves unknowns, risk, and failure – three situations that people and organizations typically do their best to avoid. Counter this by removing the barriers to innovation.

      Culture is the greatest barrier to innovation
      In a survey of 270 business leaders, the top three most common obstacles were politics, turf wars, and alignment; culture issues; and inability to act on signals crucial to the business (Harvard Business Review, 2018). If you don't have a supportive culture, your ability to innovate will be significantly reduced.

      Innovation is a means to an end
      It is not the end itself. Don't get caught up in innovation for the sake of innovation – make sure you are getting the benefits from your investments. Measurable success factors are critical for maintaining the long-term success of your innovation engine.

      Tackle wicked problems
      Innovative approaches are better at solving complex problems than traditional practices. Organizations that prioritize innovation during a crisis tend to outperform their peers by over 30% and improve their market position (McKinsey, 2020).

      Innovate or die
      Innovation is critical to business growth. A 25-year study showed that innovation was more important to business success than management, human resources, marketing, or finance (Statistics Canada, 2006).

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Sample Job Descriptions and Organization Charts

      Determine the skills, knowledge, and structure you need to make innovation happen.

      Sample Job Descriptions and Organization Charts

      Ideation Session Template

      Facilitate an ideation session with your staff to identify areas for innovation.

      Ideation Session Template

      Initiative Prioritization Workbook

      Evaluate ideas to identify those which are most likely to provide value.

      Prioritization Workbook

      Key deliverable:

      Enterprise Innovation Program Summary

      Communicate how you plan to innovate with a report summarizing the outputs from this research.

      Enterprise Innovation Program Summary

      Measure the value of this research

      US businesses spend over half a trillion dollars on innovation annually. What are they getting for it?

      • The top innovators(1) typically spend 5-15% of their budgets on innovation (including R&D).
      • This research helps organizations develop a successful innovation program, which delivers value to the organization in the form of new products, services, and methods.
      • Leverage this research to:
        • Get your innovation program off the ground quickly.
        • Increase internal knowledge and expertise.
        • Generate buy-in and excitement about innovation.
        • Develop the skills and capabilities you need to drive innovation over the long term.
        • Validate your innovation concept.
        • Streamline and integrate innovation across the organization.

      (1) based on BCG's 50 Most Innovative Companies 2022

      30%

      The most innovative companies outperform the market by 30%.
      Source: McKinsey & Company, 2020

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided implementation

      What does a typical guided implementation (GI) on this topic look like?

      Phase 0 Phase 1 Phase 2 Phase 3 Finish

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Understand your mandate.
      (Activity 1.1)

      Call #3: Innovation vision, guiding principles, value proposition, and scope.
      (Activities 1.2 and 1.3)

      Call #4: Foster a culture of innovation. (Activity 2.1)

      Call #5: Define your methodology. (Activity 2.2)

      Call #6: Build core innovation capabilities. (Activity 2.3)

      Call #7: Build your ideation and pilot programs. (Activities 3.1 and 3.2)

      Call #8: Identify success metrics and notable wins. (Activity 3.3)

      Call #9: Summarize results and plan next steps.

      A GI is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of three to six months.

      Workshop overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Session 1 Session 2 Session 3 Session 4

      Wrap Up

      Activities

      Define Your Ambitions

      Align Your People

      Develop Your Capabilities

      Build Your Program

      Next Steps and
      Wrap Up (offsite)

      1. Understand your innovation mandate (complete activity prior to workshop)
      2. Define your innovation ambitions
      3. Determine value proposition and metrics
      1. Foster a culture of innovation
      2. Define your operating model
      1. Build core innovation capabilities
      2. Develop prioritization criteria
      1. Define your methodology to pilot projects
      2. Conduct a program retrospective
      1. Complete in-progress deliverables from previous four days
      2. Set up review time for workshop deliverables and to discuss next steps

      Deliverables

      1. Our purpose
      2. Message from the CEO
      3. Vision and guiding principles
      4. Scope and value proposition
      5. Success metrics
      1. Building an innovative culture
      2. Operating model
      1. Core capabilities and structure
      2. Idea evaluation prioritization criteria
      1. Program retrospective
      2. Notable wins
      3. Executive summary
      4. Next steps
      1. Completed enterprise innovation program
      2. An engaged and inspired team

      Phase 1: Define Your Purpose

      Develop a better understanding of the drivers for innovation and what success looks like.

      Purpose

      People

      Practice

      1. Understand your mandate
      2. Define your innovation ambitions
      3. Determine value proposition and metrics
      1. Foster a culture of innovation
      2. Define your operating model
      3. Build core innovation capabilities
      1. Build your ideation and prioritization methodologies
      2. Define your pilot project methodology
      3. Conduct a program retrospective

      This phase will walk you through the following activities:

      • Understand your innovation mandate, including its drivers, scope, and focus.
      • Define what innovation means to your organization.
      • Develop an innovation vision and guiding principles.
      • Articulate the value proposition and proposed metrics for evaluating program success.

      This phase involves the following participants:

      • CINO
      • Business executives

      Case study

      INDUSTRY: Transportation
      SOURCE: Interview

      ArcBest
      ArcBest is a multibillion-dollar shipping and logistics company which leverages innovative technologies to provide reliable and integrated services to its customers.

      An Innovative Culture Starts at the Top
      ArcBest's innovative culture has buy-in and support from the highest level of the company. Michael Newcity, ArcBest's CEO, is dedicated to finding better ways of serving their customers and supports innovation across the company by dedicating funding and resources toward piloting and scaling new initiatives.
      Having a clear purpose and mandate for innovation at all levels of the organization has resulted in extensive grassroots innovation and the development of a formalized innovation program.

      Results
      ArcBest has a legacy of innovation, going back to its early days when it developed a business intelligence solution before anything else existed on the market. It continues to innovate today and is now partnering with start-ups to further expand its innovation capabilities.

      "We don't micromanage or process-manage incremental innovation. We hire really smart people who are inspired to create new things and we let them run – let them create – and we celebrate it.
      Our dedication to innovation comes from the top – I am both the President and the Chief Innovation Officer, and innovation is one of my top priorities."

      Michael Newcity

      Michael Newcity
      President and Chief Innovation Officer ArcBest

      1.1 Understand your innovation mandate

      Before you can act, you need to understand the following:

      • Where is the drive for innovation coming from?
        The source of your mandate dictates the scope of your innovation practice – in general, innovating outside the scope of your mandate (i.e. trying to innovate on products when you don't have buy-in from the product team) will not be successful.
      • What is meant by "innovation"?
        There are many different definitions for innovation. Before pursuing innovation at your organization, you need to understand how it is defined. Use the definition in this section as a starting point, and craft your own definition of innovation.
      • What kind of innovation are you targeting?
        Innovation can be internal or external, emergent or deliberate, and incremental or radically transformative. Understanding what kind of innovation you want is the starting point for your innovation practice.

      The source of your mandate dictates the scope of your influence

      You can only influence what you can control.

      Unless your mandate comes from the CEO or Board of Directors, driving enterprise-wide innovation is very difficult. If you do not have buy-in from senior business leaders, use lighthouse projects and a smaller innovation practice to prove the value of innovation before taking on enterprise innovation.

      In order to execute on a mandate to build innovation, you don't just need buy-in. You need support in the form of resources and funding, as well as strong leadership who can influence culture and the authority to change policies and practices that inhibit innovation.

      For more resources on building relationships in your organization, refer to Info-Tech's Become a Transformational CIO blueprint.

      What is "innovation"?

      Innovation is often easier to recognize than define.

      Align on a useful definition of innovation for your organization before you embark on a journey of becoming more innovative.

      Innovation is the practice of developing new methods, products or services which provide value to an organization.

      Practice
      This does not have to be a formal process – innovation is a means to an end, not the end itself.

      New
      What does "new" mean to you?

      • New application of an existing method
      • Developing a completely original product
      • Adopting a service from another industry

      Value
      What does value mean to you? Look to your business strategy to understand what goals the organization is trying to achieve, then determine how "value" will be measured.

      Info-Tech Insight

      Some innovations are incremental, while some are radically transformative. Decide what kind of innovation you want to cultivate before developing your strategy.

      We can categorize innovation in three ways

      Evaluate your goals with respect to innovation: focus, strategy, and potential to transform.

      Focus: Where will you innovate?

      Focus

      Strategy: To what extent will you guide innovation efforts?

      Strategy

      Potential: How radical will your innovations be?

      Potential

      What are your ambitions?

      1. Develop a better understanding of what type of innovation you are trying to achieve by plotting out your goals on the categories on the left.
      2. All categories are independent of one another, so your goals may fall anywhere on the scales for each category.
      3. Understanding your innovation ambitions helps establish the operating model best suited for your innovation practice.
      4. In general, innovation which is more external, deliberate, and radical tends to be more centralized.

      Activity 1.1 Understand your innovation mandate

      1 hour

      1. Schedule a 30-minute discussion with the person (i.e. CEO) or group (i.e. Board of Directors) ultimately requesting the shift toward innovation. If there is no external party, then conduct this assessment yourself.
      2. Facilitate a discussion that addresses the following questions:
      • What is meant by "innovation"?
      • What are they hoping to achieve through innovation?
      • What is the innovation scope? Are any areas off-limits (i.e. org structure, new products, certain markets)?
      • What is the budget (i.e. people, money) they are willing to commit to innovation?
      • What type of innovation are they pursuing?
      1. Record this information and complete the "Our Purpose" section of the Innovation Program Template.

      Download the Innovation Program Template.

      Input

      • Knowledge of the key decision maker/sponsor for innovation

      Output

      • Understanding of the mandate for innovation, including definition, value, scope, budget, and type of innovation

      Materials

      • Innovation Program Template

      Participants

      • CINO
      • CEO, CTO, or Board of Directors (whoever is requesting/sponsoring the pursuit of innovation)

      1.2 Define your innovation ambitions

      Articulate your future state through a vision and guiding principles.

      • Vision and purpose make up the foundation on which all other design aspects will be based. These aspects should not be taken lightly, but rather they should be the force that aligns everyone to work toward a common outcome. It is incumbent on leaders to make them part of the DNA of the organization – to drive organization, structure, culture, and talent strategy.
      • Your vision statement is a future-focused statement that summarizes what you hope to achieve. It should be inspirational, ambitious, and concise.
      • Your guiding principles outline the guardrails for your innovation practice. What will your focus be? How will you approach innovation? What is off-limits?
      • Define the scope and focus for your innovation efforts. This includes what you can innovate on and what is off limits.

      Your vision statement is your North Star

      Articulate an ambitious, inspirational, and concise vision statement for your innovation efforts.

      A strong vision statement:

      • Is future-focused and outlines what you want to become and what you want to achieve.
      • Provides focus and direction.
      • Is ambitious, focused, and concise.
      • Answers: What problems are we solving? Who and what are we changing?

      Examples:

      • "We create radical new technologies to solve some of the world's hardest problems." – Google X, the Moonshot Factory
      • "To be the most innovative enterprise in the world." – 3M
      • "To use our imagination to bring happiness to millions of people." – Disney

      "Good business leaders create a vision, articulate the vision, passionately own the vision, and relentlessly drive it to completion." – Jack Welch, Former Chairman and CEO of GE

      Your guiding principles are the guardrails for creativity

      Strong guiding principles give your team the freedom and direction to innovate.

      Strong guiding principles:

      • Focus on the approach, i.e. how things are done, as opposed to what needs to be done.
      • Are specific to the organization.
      • Inform and direct decision making with actionable statements. Avoid truisms, general statements, and observations.
      • Are long-lasting and based on values, not solutions.
      • Are succinct and easily digestible.
      • Can be measured and verified.
      • Answers: How do we approach innovation? What are our core values

      Craft your guiding principles using these examples

      Encourage experimentation and risk-taking
      Innovation often requires trying new things, even if they might fail. We encourage experimentation and learn from failure, so that new ideas can be tested and refined.

      Foster collaboration and cross-functional teams
      Innovation often comes from the intersection of different perspectives and skill sets.

      Customer-centric
      Focus on creating value for the end user. This means understanding their needs and pain points, and using that knowledge to develop new methods, products, or services.

      Embrace diversity and inclusivity
      Innovation comes from a variety of perspectives, backgrounds, and experiences. We actively seek out and encourage diversity and inclusivity among our team members.

      Foster a culture of learning and continuous improvement
      Innovation requires continuous learning, development, and growth. We facilitate a culture that encourages learning and development, and that seeks feedback and uses it to improve.

      Flexible and adaptable
      We adapt to changes in the market, customer needs, and new technologies, so that it can continue to innovate and create value over time.

      Data-driven
      We use performance metrics and data to guide our innovation efforts.

      Transparency
      We are open and transparent in our processes and let the business needs guide our innovation efforts. We do not lead innovation, we facilitate it.

      Activity 1.2 Craft your vision statement and guiding principles

      1-2 hours

      1. Gather your innovation team and key program sponsors. Review the guidelines for creating vision statements and guiding principles, as well as your mandate and focus for innovation.
      2. As a group, discuss what you hope to achieve through your innovation efforts.
      3. Separately, have each person write down their ideas for a vision statement. Bring the group back together and share ideas. Group the concepts together and construct a single statement which outlines your aspirational vision.
      4. As a group, review the example guiding principles.
      5. Separately, have each person write down three to five guiding principles. Bring the group back together and share ideas. Group similar concepts together and consolidate duplicate ideas. From this list, construct six to eight guiding principles.
      6. Document your vision and guiding principles in the appropriate sections of the Innovation Program Template.

      Input

      • Understanding of your innovation mandate
      • Business vision, mission, and values
      • Sample vision statements and guiding principles

      Output

      • Vision statement
      • Guiding principles

      Materials

      • In person: Whiteboard/flip charts, sticky notes, pens, and notepads
      • Virtual: Consider using a shared document, virtual whiteboard, or online facilitation tool like MURAL
      • Innovation Program Template

      Participants

      • CINO
      • Innovation sponsors
      • Business leaders
      • Innovation team

      1.3 Determine your value proposition and metrics

      Justify the existence of the innovation program with a strong value proposition.

      • The value proposition for developing an innovation program will be different for each organization, depending on what the organization hopes to achieve. Consider your mandate for innovation as well as the type of innovation you are pursuing when crafting the value proposition.
      • Some of the reasons organizations may pursue innovation:
        • Business growth: Respond to market disruption; create new customers; take advantage of opportunities.
        • Branding: Create market differentiation; increase customer satisfaction and retention; adapt to customer needs.
        • Profitability: Improve products, services, or operations to increase competitiveness and profitability; develop more efficient processes.
        • Culture: Foster a culture of creativity and experimentation within the organization, encouraging employees to think outside the box.
        • Positive impact: Address social challenges such as poverty and climate change.

      Develop a strong value proposition for your innovation program

      Demonstrate the value to the business.

      A strong value proposition not only articulates the value that the business will derive from the innovation program but also provides a clear focus, helps to communicate the innovation goals, and ultimately drives the success of the program.

      Focus
      Prioritize and focus innovation efforts to create solutions that provide real value to the organization

      Communicate
      Communicate the mandate and benefits of innovation in a clear and compelling way and inspire people to think differently

      Measure Success
      Measure the success of your program by evaluating outcomes based on the value proposition

      Track appropriate success metrics for your innovation program

      Your success metrics should link back to your organizational goals and your innovation program's value proposition.

      Revenue Growth: Increase in revenue generated by new products or services.

      Market Share: Percentage of total market that the business captures as a result of innovation.

      Customer Satisfaction: Reviews, customer surveys, or willingness to recommend the company.

      Employee Engagement: Engagement surveys, performance, employee retention, or turnover.

      Innovation Output: The number of new products, services, or processes that have been developed.

      Return on Investment: Financial return on the resources invested in the innovation process.

      Social Impact: Number of people positively impacted, net reduction in emissions, etc.

      Time to Launch: The time it takes for a new product or service to go from idea to launch.

      Info-Tech Insight

      The total impact of innovation is often intangible and extremely difficult to capture in performance metrics. Focus on developing a few key metrics rather than trying to capture the full value of innovation.

      How much does innovation cost?

      Company Industry Revenue(2)
      (USD billions)
      R&D Spend
      (USD billions)
      R&D Spend
      (% of revenue)
      Apple Technology $394.30 $26.25 6.70%
      Microsoft Technology $203.10 $25.54 12.50%
      Amazon.com Retail $502.20 $67.71 13.40%
      Alphabet Technology $282.10 $37.94 13.40%
      Tesla Manufacturing $74.90 $3.01 4.00%
      Samsung Technology $244.39 (2021)(3) $19.0 (2021) 7.90%
      Moderna Pharmaceuticals $23.39 $2.73 11.70%
      Huawei Technology $99.9 (2021)4 Not reported -
      Sony Technology $83.80 Not reported -
      IBM Technology $60.50 $1.61 2.70%
      Meta Software $118.10 $32.61 27.60%
      Nike Commercial goods $49.10 Not reported -
      Walmart Retail $600.10 Not reported -
      Dell Technology $105.30 $2.60 2.50%
      Nvidia Technology $28.60 $6.85 23.90%


      The top innovators(1) in the world spend 5% to 15% of their revenue on innovation.

      Innovation requires a dedicated investment of time, money, and resources in order to be successful. The most innovative companies, based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, spend significant portions of their revenue on research and development.

      Note: This data uses research and development as a proxy for innovation spending, which may overestimate the total spend on what this research considers true innovation.

      (1) Based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, 2022
      (2) Macrotrends, based on the 12 months ending Sept 30, 2022
      (3) Statista
      (4) CNBC, 2022

      Activity 1.3 Develop your value proposition and performance metrics

      1 hour

      1. Review your mandate and vision statement. Write down your innovation goals and desired outcomes from pursuing innovation, prioritize the desired outcomes, and select the top five.
      2. For each desired outcome, develop one to two metrics which could be used to track its success. Some outcomes are difficult to track, so get creative when it comes to developing metrics. If you get stuck, think about what would differentiate a great outcome from an unsuccessful one.
      3. Once you have developed a list of three to five key metrics, read over the list and ensure that the metrics you have developed don't negatively influence your innovation. For example, a metric of the number of successful launches may drive people toward launching before a product is ready.
      4. For each metric, develop a goal. For example, you may target 1% revenue growth over the next fiscal year or 20% energy use reduction.
      5. Document your value proposition and key performance metrics in the appropriate sections of the Innovation Program Template.

      Input

      • Understanding of your innovation mandate
      • Vision statement

      Output

      • Value proposition
      • Performance metrics

      Materials

      • Innovation Program Template

      Participants

      • CINO

      Phase 2: Align Your People

      Create a culture that fosters innovative behaviors and puts processes in place to support them.

      Purpose

      People

      Practice

      1. Understand your mandate
      2. Define your innovation ambitions
      3. Determine value proposition and metrics
      1. Foster a culture of innovation
      2. Define your operating model
      3. Build core innovation capabilities
      1. Build your ideation and prioritization methodologies
      2. Define your pilot project methodology
      3. Conduct a program retrospective

      This phase will walk you through the following activities:

      • Understand the key aspects of innovative cultures, and the behaviors associated with innovation.
      • Assess your culture and identify gaps.
      • Define your innovation operating model based on your organizational culture and the focus for innovation.
      • Build your core innovation capabilities, including an innovation core team (if required based on your operating model).

      This phase involves the following participants:

      • CINO
      • Innovation team

      2.1 Foster a culture of innovation

      Culture is the most important driver of innovation – and the most challenging to get right.

      • Fostering a culture of innovation requires a broad approach which considers the perspectives of individuals, teams, leadership, and the overall organization.
      • If you do not have support from leadership, it is very difficult to change organizational culture. It may be more effective to start with an innovation pilot or lighthouse project in order to gain support before addressing your culture.
      • Rather than looking to change outcomes, focus on the behaviors which lead to innovation – such as growth mindset and willingness to fail. If these aren't in place, your ability to innovate will be limited.
      • This section focuses on the specific behaviors associated with increased innovation. For additional resources on implementing these changes, refer to Info-Tech's other research:

      Info-Tech's Fix Your IT Culture can help you promote innovative behaviors

      Refer to Improve IT Team Effectiveness to address team challenges

      Build a culture of innovation

      Focus on behaviors, not outcomes.

      The following behaviors and key indicators either stifle or foster innovation.

      Stifles Innovation Key Indicators Fosters Innovation Key Indicators
      Fixed mindset "It is what it is" Growth mindset "I wonder if there's a better way"
      Performance focused "It's working fine" Learning focused "What can we learn from this?"
      Fear of reprisal "I'll get in trouble" Psychological safety "I can disagree"
      Apathy "We've always done it this way" Curiosity "I wonder what would happen if…"
      Cynicism "It will never work" Trust "You have good judgement"
      Punishing failure "Who did this?" Willingness to fail "It's okay to make mistakes"
      Individualism "How does this benefit me?" Collaboration "How does this benefit us?"
      Homogeneity "We never disagree" Diversity and inclusion "We appreciate different views"
      Excessive bureaucracy "We need approval" Autonomy "I can do this"
      Risk avoidance "We can't try that" Appropriate risk-taking "How can we do this safely?"

      Ensure you are not inadvertently stifling innovation.
      Review the following to ensure that the desired behaviors are promoted:

      • Hiring practices
      • Performance evaluation metrics
      • Rewards and incentives
      • Corporate policies
      • Governance structures
      • Leadership behavior

      Case study

      INDUSTRY: Commercial Real Estate and Retail
      SOURCE: Interview

      How not to approach innovation.

      This anonymous national organization owned commercial properties across the country and had the goal of becoming the most innovative real estate and retail company in the market.

      The organization pursued innovation in the digital solutions space across its commercial and retail properties. Within this space, there were significant differences in risk tolerance across teams, which resulted in the more risk-tolerant teams excluding the risk-averse members from discussions in order to circumvent corporate policies on risk tolerance. This resulted in an adversarial and siloed culture where each group believed they knew better than the other, and the more risk-averse teams felt like they were policing the actions of the risk-tolerant group.

      Results

      Morale plummeted, and many of the organization's top people left. Unfortunately, one of the solutions did not meet regulatory requirements, and the company faced negative media coverage and legal action. There was significant reputational damage as a result.

      Lessons Learned

      Considering differences in risk tolerance and risk appetite is critical when pursuing innovation. While everyone doesn't have to agree, leadership needs to understand the different perspectives and ensure that no one party is dominating the conversation over the others. An understanding of corporate risk tolerance and risk appetite is necessary to drive innovation.

      All perspectives have a place in innovation. More risk tolerant perspectives should be involved early in the ideas-generation phase, and risk-averse perspectives should be considered later when ideas are being refined.

      Speed should not override safety or circumvent corporate policies.

      Understand your risk tolerance and risk appetite

      Evaluate and align the appetite for risk.

      • It is important to understand the organization's risk tolerance as well as the desire for risk. Consider the following risk categories when investigating the organization's views on risk:
        • Financial risk: the potential for financial or property loss.
        • Operational risk: the potential for disruptions to operations.
        • Reputational risk: the potential for negative impact to brand or reputation.
        • Compliance risk: the potential for loss due to non-compliance with laws and regulations.
      • Greater risk tolerance typically enables greater innovation. Understand the varying levels of risk tolerance across your organization, and how these differences might impact innovation efforts.

      An arrow showing the directions of risk tolerance.

      It is more important to match the level of risk tolerance to the degree of innovation required. Not all innovation needs to be (or can feasibly be) disruptive.
      Many factors impact risk tolerance including:

      • Regulation
      • Organization size
      • Country
      • Industry
      • Personal experience
      • Type of risk

      Use Info-Tech's Security Risk Management research to better understand risk tolerance

      Activity 2.1 Assess your innovation culture

      1-3 hours

      1. Review the behaviors which support and stifle innovation and give each behavior a score from 1 (stifling innovation) to 5 (fostering innovation). Any behaviors which fall below a 4 on this scale should be prioritized in your efforts to create an innovative culture.
      2. Review the following policies and practices to determine how they may be contributing to the behaviors you see in your organization:
        1. Hiring practices
        2. Performance evaluation metrics
        3. Rewards, recognition, and incentives
        4. Corporate policies
        5. Governance structures
        6. Leadership behavior
      3. Identify three concrete actions you can take to correct any behaviors which are stifling innovation. Examples might be revising a policy which punishes failure or changing performance incentives to reward appropriate risk taking.
      4. Summarize your findings in the appropriate section of the Innovation Program Template.

      Input

      • Innovation behaviors

      Output

      • Understanding of your organization's culture
      • Concrete actions you can take to promote innovation

      Materials

      • List of innovative behaviors
      • Relevant policies and documents to review
      • Innovation Program Template

      Participants

      • CINO

      2.2 Define your innovation model

      Set up your innovation practice for success using proven models and methodologies.

      • There are many ways to approach innovation, from highly distributed forms where it's just part of everyone's job to very centralized and arm's-length innovation hubs or even outsourced innovation via startups. You can combine different approaches to create your own approach.
      • You may or may not have a formal innovation team, but if you do, their role is to facilitate innovation – not lead it. Innovation is most effective when it is led by the business.
      • There are many tools and methodologies you can use to facilitate innovation. Choose the one (or combination) that best suits your needs.

      Select the right model

      There is no one right way to pursue innovation, but some methods are better than others for specific situations and goals. Consider your existing culture, your innovation goals, and your budget when selecting the right methodology for your innovation.

      Model Description Advantages Disadvantages Good when…
      Grassroots Innovation Innovation is the responsibility of everyone, and there is no centralized innovation team. Ideas are piloted and scaled by the person/team which produces it.
      • Can be used in any organization or team
      • Can support low or high degree of structure
      • Low funding requirement
      • Requires a strong innovation culture
      • Often does not produce results since people don't have time to focus on innovation
      • Innovation culture is strong
      • Funding is limited
      • Goal is internal, incremental innovation
      Community of Practice Innovation is led by a cross-divisional Community of Practice (CoP) which includes representation from across the business. Champions consult with their practice areas and bring ideas forward.
      • Bringing people together can help stimulate and share ideas
      • Low funding requirement
      • Able to support many types of innovation
      • Some people may feel left out if they can't be involved
      • May not produce results if people are too busy to dedicate time to innovate
      • Innovation culture is present
      • Funding is limited
      • Goal is incremental or disruptive innovation
      Innovation Enablement
      *Most often recommended*
      A dedicated innovation team with funding set aside to support pilots with a high degree of autonomy, with the role of facilitating business-led innovation.
      • Most flexible of all options
      • Supports business-led innovation
      • Can deliver results quickly
      • Can enable a higher degree of innovation
      • Requires dedicated staff and funding
      • Innovation culture is present
      • Funding is available
      • Goal is internal or external, incremental or radical innovation
      Center of Excellence Dedicated team responsible for leading innovation on behalf of the organization. Generally, has business relationship managers who gather ideas and liaise with the business.
      • Can deliver results quickly
      • Can offer a fresh perspective
      • Can enable a higher degree of innovation
      • Requires dedicated staff and funding
      • Is typically separate from the business
      • Results may not align with the business needs or have adequate input
      • Innovation culture is weak
      • Funding is significant
      • Goal is external, disruptive innovation
      Innovation Hub An arm's length innovation team is responsible for all or much of the innovation and may not interact much with the core business.
      • Can deliver results quickly
      • Can be extremely innovative
      • Expensive
      • Results may not align with the business needs or have adequate/any input
      • Innovation culture is weak
      • Funding is very significant
      • Goal is external, radical innovation
      Outsourced Innovation Innovation is outsourced to an external organization which is not linked to the primary organization. This can take the form of working with or investing in startups.
      • Can lead to more innovative ideas than internal innovation
      • Investments can become a diverse revenue stream if startups are successful
      • Innovation does not rely on culture
      • Higher risk of failure
      • Less control over goals or focus
      • Results may not align with the business needs or have any input from users
      • Innovation does not rely on culture
      • Funding is significant
      • Goal is external or internal, radical innovation

      Use the right methodologies to support different stages of your innovation process

      A chart showing methodologies to support different stages of the integration process.

      Adapted from Niklaus Gerber via Medium, 2022

      Methodologies are most useful when they are aligned with the goals of the innovation organization.

      For example, design thinking tends to be excellent for earlier innovation planning, while Agile can allow for faster implementation and launch of initiatives later in the process.

      Consider combining two or more methodologies to create a custom approach that best suits your organization's capabilities and goals.

      Sample methodologies

      A robust innovation methodology ensures that the process for developing, prioritizing, selecting, implementing, and measuring initiatives is aligned with the results you are hoping to achieve.

      Different types of problems (drivers for innovation) may necessitate different methodologies, or a combination of methodologies.

      Hackathon: An event which brings people together to solve a well-defined problem.

      Design Thinking: Creative approach that focuses on understanding the needs of users.

      Lean Startup: Emphasizes rapid experimentation in order to validate business hypotheses.

      Design Sprint: Five-day process for answering business questions via design, prototyping, and testing.

      Agile: Iterative design process that emphasizes project management and retrospectives.

      Three Horizons: Framework that looks at opportunities on three different time horizons.

      Innovation Ambition Matrix: Helps organizations categorize projects as part of the core offering, an adjacent offering, or completely new.

      Global Innovation Management: A process of identifying, developing and implementing new ideas, products, services, or processes using alternative thinking.

      Blue Ocean Strategy: A methodology that helps organizations identify untapped market space and create new markets via unique value propositions.

      Activity 2.2 Design your innovation model

      1-2 hours

      1. Think about the following factors which influence the design of your innovation practice:
        1. Existing organizational culture
        2. Available funding to support innovation
        3. Type of innovation you are targeting
      2. Review the innovation approaches, and identify which approach is most suitable for your situation. Note why this approach was selected.
      3. Review the innovation methodologies and research those of interest. Select two to five methodologies to use for your innovation practice.
      4. Document your decisions in the Innovation Program Template.

      Input

      • Understanding of your mandate and existing culture

      Output

      • Innovation approach
      • Selected methodologies

      Materials

      • Innovation Program Template

      Participants

      • CINO
      • Innovation team

      2.3 Build your core innovation capabilities

      Develop the skills, knowledge, and experience to facilitate successful innovation.

      • Depending on the approach you selected in step 2.2, you may or may not require a dedicated innovation team. If you do, use the job descriptions and sample organization charts to build it. If not, focus on developing key capabilities which are needed to facilitate innovation.
      • Diversity is key for successful innovation – ensure your team (formal or otherwise) includes diverse perspectives and backgrounds.
      • Use your guiding principles when hiring and training your team.
      • Focus on three core roles: evangelists, enablers, and experts.

      Focus on three key roles when building your innovation team

      Types of roles will depend on the purpose and size of the innovation team.

      You don't need to grow them all internally. Consider partnering with vendors and other organizations to build capabilities.

      Evangelists

      Visionaries who inspire, support, and facilitate innovation across the business. Their responsibilities are to drive the culture of innovation.

      Key skills and knowledge:

      • Strong communication skills
      • Relationship-building
      • Consensus-building
      • Collaboration
      • Growth mindset

      Sample titles:

      • CINO
      • Chief Transformation Officer
      • Chief Digital Officer
      • Innovation Lead
      • Business Relationship Manager

      Enablers

      Translate ideas into tangible business initiatives, including assisting with business cases and developing performance metrics.

      Key skills and knowledge:

      • Critical thinking skills
      • Business knowledge
      • Facilitation skills
      • Consensus-building
      • Relationship-building

      Sample titles:

      • Product Owner
      • Design Thinking Lead
      • Data Scientist
      • Business Analyst
      • Human Factors Engineer
      • Digital Marketing Specialist

      Experts

      Provide expertise in product design, delivery and management, and responsible for supporting and executing on pilot projects.

      Key skills and knowledge:

      • Project management skills
      • Technical expertise
      • Familiarity with emerging technologies
      • Analytical skills
      • Problem-solving skills

      Sample titles:

      • Product Manager
      • Scrum Master/Agile Coach
      • Product Engineer/DevOps
      • Product Designer
      • Emerging tech experts

      Sample innovation team structure (large enterprise)

      Visualize the whole value delivery process end-to-end to help identify the types of roles, resources, and capabilities required. These capabilities can be sourced internally (i.e. grow and hire internally) or through collaboration with centers of excellence, commercial partners, etc.

      A flow chart of a sample innovation team structure.

      Streamline your process by downloading Info-Tech's job description templates:

      Activity 2.3 Build your innovation team

      2-3 hours

      1. Review your work from the previous activities as well as the organizational structure and the job description templates.
      2. Start a list with two columns: currently have and needed. Start listing some of the key roles and capabilities from earlier in this step, categorizing them appropriately.
      3. If you are using an organizational structure for your innovation process, start to frame out the structure and roles for your team.
      4. Develop a list of roles you need to hire, and the key capabilities you need from candidates. Using the job descriptions, write job postings for each role.
      5. Record your work in the appropriate section of the Innovation Program Template.

      Input

      • Previous work
      • Info-Tech job description templates

      Output

      • List of capabilities required
      • Org chart
      • Job postings for required roles

      Materials

      • Note-taking capability
      • Innovation Program Template

      Participants

      • CINO

      Related Info-Tech Research

      Fix Your IT Culture

      • Promote psychological safety and growth mindset within your organization.
      • Develop the organizational behaviors that lead to innovation.

      Improve IT Team Effectiveness

      • Address behaviors, processes, and cultural factors which impact team effectiveness.
      • Grow the team's ability to address challenges and navigate volatile, uncertain, complex and ambiguous environments.

      Master Organizational Change Management Practices

      • Transformation and change are increasingly becoming the new normal. While this normality may help make people more open to change in general, specific changes still need to be planned, communicated, and managed. Agility and continuous improvement are good but can degenerate into volatility if change isn't managed properly.

      Phase 3: Build Your Practice

      Define your innovation process, streamline pilot projects, and scale for success.

      Purpose

      People

      Practice

      1. Understand your mandate
      2. Define your innovation ambitions
      3. Determine value proposition and metrics
      1. Foster a culture of innovation
      2. Define your operating model
      3. Build core innovation capabilities
      1. Build your ideation and prioritization methodologies
      2. Define your pilot project methodology
      3. Conduct a program retrospective

      This phase will walk you through the following activities:

      • Build the methodologies needed to elicit ideas from the business.
      • Develop criteria to evaluate and prioritize ideas for piloting.
      • Define your pilot program methodologies and processes, including criteria to assess and compare the success of pilot projects.
      • Conduct an end-of-year program retrospective to evaluate the success of your innovation program.

      This phase involves the following participants:

      • CINO
      • Innovation team

      Case study

      INDUSTRY: Government
      SOURCE: Interview

      Confidential US government agency

      The business applications group at this government agency strongly believes that innovation is key to progress and has instituted a formal innovation program as part of their agile operations. The group uses a Scaled Agile Framework (SAFe) with 2-week sprints and a 12-week program cycle.

      To support innovation across the business unit, the last sprint of each cycle is dedicated toward innovation and teams do not commit to any other during these two weeks. At the end of each innovation sprint, ideas are presented to leadership and the valuable ones were either implemented initially or were given time in the next cycle of sprints for further development. This has resulted in a more innovative culture across the practice.

      Results

      There have been several successful innovations since this process began. Notably, the agency had previously purchased a robotic process automation platform which was only being used for a few specific applications. One team used their innovation sprint to expand the use cases for this solution and save nearly 10,000 hours of effort.

      Standard 12-week Program Cycle
      An image of a standard 12-week program

      Design your innovation operating model to maximize value and learning opportunities

      Pilots are an iterative process which brings together innovators and business teams to test and evaluate ideas.

      Your operating model should include several steps including ideation, validation, evaluation and prioritization, piloting, and a retrospective which follows the pilot. Use the example on this slide when designing your own innovation operating model.

      An image of the design process for innovation operation model.

      3.1 Build your ideation and prioritization methodologies

      Engage the business to generate ideas, then prioritize based on value to the business.

      • There are many ways of generating ideas, from informal discussion to formal ideation sessions or submission forms. Whatever you decide to use, make sure that you're getting the right information to evaluate ideas for prioritization.
      • Use quantitative and qualitative metrics to evaluate ideas generated during the ideation process.
        • Quantitative metrics might include potential return on investment (ROI) or effort and resources required to implement.
        • Qualitative metrics might include alignment with the organizational strategy or the level of risk associated with the idea.

      Engage the business to generate ideas

      There are many ways of generating innovative ideas. Pick the methods that best suit your organization and goals.

      Design Thinking
      A structured approach that encourages participants to think creatively about the needs of the end user.

      An image including the following words: Empathize, Define; Ideate; Test.

      Ideation Workshop
      A formal session that is used to understand a problem then generate potential solutions. Workshops can incorporate the other methodologies (such as brainstorming, design thinking, or mind mapping) to generate ideas.

      • Define the problem
      • Generate ideas
      • Capture ideas
      • Evaluate and prioritize
      • Assign next steps

      Crowdsourcing
      An informal method of gathering ideas from a large group of people. This can be a great way to generate many ideas but may lack focus.

      Value Proposition Canvas
      A visual tool which helps to identify customer (or user) needs and design products and services that meet those needs.

      an image of the Value Proposition Canvas

      Evaluate ideas and focus on those with the greatest value

      Evaluation should be transparent and use both quantitative and qualitative metrics. The exact metrics used will depend on your organization and goals.

      It is important to include qualitative metrics as these dimensions are better suited to evaluating highly innovative ideas and can capture important criteria like alignment with overall strategy and feasibility.

      Develop 5 to 10 criteria that you can use to evaluate and prioritize ideas. Some criteria may be a pass/fail (for example, minimum ROI) and some may be comparative.

      Evaluate
      The first step is to evaluate ideas to determine if they meet the minimum criteria. This might include quantitative criteria like ROI as well as qualitative criteria like strategic alignment and feasibility.

      Prioritize
      Ideas that pass the initial evaluation should be prioritized based on additional criteria which might include quantitative criteria such as potential market size and cost to implement, and qualitative criteria such as risk, impact, and creativity.

      Quantitative Metrics

      Quantitative metrics are objective and easily comparable between initiatives, providing a transparent and data-driven process for evaluation and prioritization.
      Examples:

      • Potential market size
      • ROI
      • Net present value
      • Payback period
      • Number of users impacted
      • Customer acquisition cost
      • Customer lifetime value
      • Breakeven analysis
      • Effort required to implement
      • Cost to implement

      Qualitative Metrics

      Qualitative metrics are less easily comparable but are equally important when it comes to evaluating ideas. These should be developed based on your organization strategy and innovation goals.
      Examples:

      • Strategy alignment
      • Impact on users
      • Uncertainty and risk
      • Innovation potential
      • Culture impact
      • Feasibility
      • Creativity and originality
      • Type of innovation

      Activity 3.1 Develop prioritization metrics

      1-3 hours

      1. Review your mandate, purpose, innovation goals and the sample prioritization and evaluation metrics.
      2. Write down a list of your goals and their associated metrics, then prioritize which are the most important.
      3. Determine which metrics will be used to evaluate ideas before they move on to the prioritization stage, and which metrics will be used to compare initiatives in order to determine which will receive further investment.
      4. For each evaluation metric, determine the minimum threshold required for an idea to move forward. For each prioritization metric identify the definition and how it will be evaluated. Qualitative metrics may require more precise definitions than quantitative metrics.
      5. Enter your metrics into the Initiative Prioritization Template.

      Input

      • Innovation mandate
      • Innovation goals
      • Sample metrics

      Output

      • Evaluation and prioritization metrics for ideas

      Materials

      • Whiteboard/Flip charts
      • Innovation Program Template

      Participants

      • Innovation leader

      Download the Initiative Prioritization Template

      3.2 Build your program to pilot initiatives

      Test and refine ideas through real-world pilot projects.

      • The purpose of your pilot is to test and refine ideas in the real world. In order to compare pilot projects, it's important to track key performance indicators throughout the pilot. Measurements should be useful and comparable.
      • Innovation facilitators are responsible for supporting pilot projects, including designing the pilot, setting up metrics, tracking outcomes, and facilitating retrospectives.
      • Pilots generally follow an Agile methodology where ideas may be refined as the pilot proceeds, and the process iterates until either the idea is discarded or it has been refined into an initiative which can be scaled.
      • Expect that most pilots will fail the first time, and many will fail completely. This is not a loss; lessons learned from the retrospective can be used to improve the process and later pilots.

      Use pilot projects to test and refine initiatives before scaling to the rest of the organization

      "Learning is as powerful as the outcome." – Brett Trelfa, CIO, Arkansas Blue Cross

      1. Clearly define the goals and objectives of the pilot project. Goals and objectives ensure that the pilot stays on track and can be measured.
      2. Your pilot group should include a variety of participants with diverse perspectives and skill sets, in order to gather unique insights.
      3. Continuously track the progress of the pilot project. Regularly identify areas of improvement and implement changes as necessary to refine ideas.
      4. Regularly elicit feedback from participants and iterate in order to improve the final innovation. Not all pilots will be successful, but every failure can help refine future solutions.
      5. Consider scalability. If the pilot project is successful, it should be scalable and the lessons learned should be implemented in the larger organization.

      Sample pilot metrics

      Metrics are used to validate and test pilot projects to ensure they deliver value. This is an important step before scaling to the rest of the organization.

      Adoption: How many end users have adopted the pilot solution?

      Utilization: Is the solution getting utilized?

      Support Requests: How many support requests have there been since the pilot was initiated?

      Value: Is the pilot delivering on the value that it proposed? For example, time savings.

      Feasibility: Has the feasibility of the solution changed since it was first proposed?

      Satisfaction: Focus groups or surveys can provide feedback on user/customer satisfaction.

      A/B Testing: Compare different methods, products or services.

      Info-Tech Insight

      Ensure standard core metrics are used across all pilot projects so that outcomes can be compared. Additional metrics may be used to refine and test hypotheses through the pilot process.

      Activity 3.2 Build your program to pilot initiatives

      1-2 hours

      1. Gather the innovation team and review your mandate, purpose, goals, and the sample innovation operating model and metrics.
      2. As a group, brainstorm the steps needed from idea generation to business case. Use sticky notes if in person, or a collaboration tool if remote.
      3. Determine the metrics that will be used to evaluate ideas at each decision step (for example, prior to piloting). Outline what the different decisions might be (for example, proceed, refine or discard) and what happens as a result of each decision.
      4. Document your final steps and metrics in the Innovation Program Template.

      Input

      • Innovation mandate
      • Innovation goals
      • Sample metrics

      Output

      • Pilot project methodology
      • Pilot project metrics

      Materials

      • Innovation Program Template
      • Sticky notes (in person) or digital collaboration tool (if remote)

      Participants

      • Innovation leader
      • Innovation team

      3.3 Conduct a program retrospective

      Generate value from your successful pilots by scaling ideas across the organization.

      • The final step in the innovation process is to scale ideas to the enterprise in order to realize the full potential.
      • Keeping track of notable wins is important for showing the value of the innovation program. Track performance of initiatives that come out of the innovation program, including their financial, cultural, market, and brand impacts.
      • Track the success of the innovation program itself by evaluating the number of ideas generated, the number of pilots run and the success of the pilots. Keep in mind that many failed pilots is not a failure of the program if the lessons learned were valuable.
      • Complete an innovation program retrospective every 6 to 12 months in order to adjust and make any changes if necessary to improve your process.

      Retrospectives should be objective, constructive, and action-oriented

      A retrospective is a review of your innovation program with the aim of identifying lessons learned, areas for improvement, and opportunities for growth.

      During a retrospective, the team will reflect on past experiences and use that information to inform future decision making and improve outcomes.

      The goal of a retrospective is to learn from the past and use that knowledge to improve in the future.

      Objective

      Ensure that the retrospective is based on facts and objective data, rather than personal opinions or biases.

      Constructive

      Ensure that the retrospective is a positive and constructive experience, with a focus on finding solutions rather than dwelling on problems.

      Action-Oriented

      The retrospective should result in a clear action plan with specific steps to improve future initiatives.

      Activity 3.3 Conduct a program retrospective

      1-2 hours

      1. Post a large piece of paper on the wall with a timeline from the last year. Include dates and a few key events, but not much more. Have participants place sticky notes in the spots to describe notable wins or milestones that they were proud of. This can be done as part of a formal meeting or asynchronously outside of meetings.
      2. Bring the innovation team together and review the poster with notable wins. Do any themes emerge? How does the team feel the program is doing? Are there any changes needed?
      3. Consider the metrics you use to track your innovation program success. Did the scaled projects meet their targets? Is there anything that could be refined about the innovation process?
      4. Evaluate the outcomes of your innovation program. Did it meet the targets set for it? Did the goals and innovation ambitions come to fruition?
      5. Complete this step every 6 to 12 months to assess the success of your program.
      6. Complete the "Notable Wins" section of the Innovation Program Template.

      Input

      • Innovation mandate
      • Innovation goals
      • Sample metrics

      Output

      • Notable wins
      • Action items for refining the innovation process

      Materials

      • Innovation Program Template
      • Sticky notes (in person) or digital collaboration tool (if remote)

      Participants

      • CIO
      • Innovation team
      • Others who have participated in the innovation process

      Related Info-Tech Research

      Adopt Design Thinking in Your Organization

      • A user's perspective while interacting with the products and services is very different from the organization's internal perspective while implementing and provisioning those. A design-based organization balances the two perspectives to drive user-satisfaction over end-to-end journeys.

      Prototype With an Innovation Design Sprint

      • Build and test a prototype in four days using Info-Tech's Innovation Design Sprint Methodology.
      • Create an environment for co-creation between IT and the business.

      Fund Innovation With a Minimum Viable Business Case

      • Our approach guides you through effectively designing a solution, de-risking a project through impact reduction techniques, building and pitching the case for your project, and applying the business case as a mechanism to ensure that benefits are realized.

      Summary of Accomplishment

      Congratulations on launching your innovation program!

      You have now completed your innovation strategy, covering the following topics:

      • Executive Summary
      • Our Purpose
      • Scope and Value Proposition
      • Guiding Principles
      • Building an Innovative Culture
      • Program Structure
      • Success Metrics
      • Notable Wins

      If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Related Info-Tech Research

      Accelerate Digital Transformation With a Digital Factory

      • Understand the foundations of good design: purpose, organizational support, and leadership.
      • Understand the design of the operating model: structure and organization, management practices, culture, environment, teams, technology platforms, and meaningful metrics and KPIs.

      Sustain and Grow the Maturity of Innovation in Your Enterprise

      • Unlock your innovation potential by looking at your innovation projects on both a macro and micro level.
      • Innovation capacity is directly linked with creativity; allow your employees' creativity to flourish using Info-Tech's positive innovation techniques.

      Define Your Digital Business Strategy

      • Design a strategy that applies innovation to your business model, streamline and transform processes, and make use of technologies to enhance interactions with customers and employees.
      • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

      Research Contributors and Experts

      Kim Osborne Rodriguez

      Kim Osborne Rodriguez
      Research Director, CIO Advisory
      Info-Tech Research Group

      Kim is a professional engineer and Registered Communications Distribution Designer with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects.
      Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.

      Joanne Lee

      Joanne Lee
      Principal Research Director, CIO Advisory
      Info-Tech Research Group

      Joanne is an executive with over 25 years of experience in digital technology and management consulting across both public and private entities from solution delivery to organizational redesign across Canada and globally.
      Prior to joining Info-Tech Research Group, Joanne was a management consultant within KPMG's CIO management consulting services and the Western Canadas Digital Health Practice lead. She has held several executive roles in the industry with the most recent position as Chief Program Officer for a large $450M EHR implementation. Her expertise spans cloud strategy, organizational design, data and analytics, governance, process redesign, transformation, and PPM. She is passionate about connecting people, concepts, and capital.
      Joanne holds a Master's in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.

      Jack Hakimian

      Jack Hakimian
      Senior Vice President
      Info-Tech Research Group

      Jack has more than 25 years of technology and management consulting experience. He has served multi-billion-dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.
      He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master's degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.

      Michael Tweedie

      Michael Tweedie
      Practice Lead, CIO Strategy
      Info-Tech Research Group

      Mike Tweedie brings over 25 years as a technology executive. He's led several large transformation projects across core infrastructure, application, and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.
      Mike holds a Bachelor's degree in Architecture from Ryerson University.

      Mike Schembri

      Mike Schembri
      Senior Executive Advisor
      Info-Tech Research Group

      Mike is the former CIO of Fuji Xerox Australia and has 20+ years' experience serving IT and wider business leadership roles. Mike has led technical and broader business service operations teams to value and growth successfully in organizations ranging from small tech startups through global IT vendors, professional service firms, and manufacturers.
      Mike has passion for strategy and leadership and loves working with individuals/teams and seeing them grow.

      John Leidl

      John Leidl
      Senior Director, Member Services
      Info-Tech Research Group

      With over 35 years of IT experience, including senior-level VP Technology and CTO leadership positions, John has a breadth of knowledge in technology innovation, business alignment, IT operations, and business transformation. John's experience extends from start-ups to corporate enterprise and spans higher education, financial services, digital marketing, and arts/entertainment.

      Joe Riley

      Joe Riley
      Senior Workshop Director
      Info-Tech Research Group

      Joe ensures our members get the most value out of their Info-Tech memberships by scoping client needs, current state and desired business outcomes, and then drawing upon his extensive experience, certifications, and degrees (MBA, MS Ops/Org Mgt, BS Eng/Sci, ITIL, PMP, Security+, etc.) to facilitate our client's achievement of desired and aspirational business outcomes. A true advocate of ITSM, Joe approaches technology and technology practices as a tool and enabler of people, core business, and competitive advantage activities.

      Denis Goulet

      Denis Goulet
      Senior Workshop Director
      Info-Tech Research Group

      Denis is a transformational leader and experienced strategist who has worked with 100+ organizations to develop their digital, technology, and governance strategies.
      He has held positions as CIO, Chief Administrative Office (City Manager), General Manager, Vice President of Engineering, and Management Consultant, specializing in enterprise and technology strategy.

      Cole Cioran

      Cole Cioran
      Managing Partner
      Info-Tech Research Group

      I knew I wanted to build great applications that would delight their users. I did that over and over. Along the way I also discovered that it takes great teams to deliver great applications. Technology only solves problems when people, processes, and organizations change as well. This helped me go from writing software to advising some of the largest organizations in the world on how to how to build a digital delivery umbrella of Product, Agile, and DevOps and create exceptional products and services powered by technology.

      Carlene McCubbin

      Carlene McCubbin
      Research Lead, CIO Practice
      Info-Tech Research Group

      During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.
      Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management.

      Isabelle Hertanto

      Isabelle Hertanto
      Principal Research Director
      Info-Tech Research Group

      Isabelle Hertanto has over 15 years of experience delivering specialized IT services to the security and intelligence community. As a former federal officer for Public Safety Canada, Isabelle trained and led teams on data exploitation and digital surveillance operations in support of Canadian national security investigations. Since transitioning into the private sector, Isabelle has held senior management and consulting roles across a variety of industry sectors, including retail, construction, energy, healthcare, and the broader Canadian public sector.

      Hans Eckman

      Hans Eckman
      Principal Research Director
      Info-Tech Research Group

      Hans Eckman is a business transformation leader helping organizations connect business strategy and innovation to operational excellence. He supports Info-Tech members in SDLC optimization, Agile and DevOps implementation, CoE/CoP creation, innovation program development, application delivery, and leadership development. Hans is based out of Atlanta, Georgia.

      Valence Howden

      Valence Howden
      Principal Research Director
      Info-Tech Research Group

      With 30 years of IT experience in the public and private sector, Valence has developed experience in many Information Management and Technology domains, with a particular focus in the areas of Service Management, Enterprise and IT Governance, Development and Execution of Strategy, Risk Management, Metrics Design and Process Design, and Implementation and Improvement. Prior to joining Info-Tech, he served in technical and client-facing roles at Bell Canada and CGI Group Inc., as well as managing the design, integration, and implementation of services and processes in the Ontario Public Sector.

      Clayton Gillett

      Clayton Gillett
      Managing Partner
      Info-Tech Research Group

      Clayton Gillett is a Managing Partner for Info-Tech, providing technology management advisory services to healthcare clients. Clayton joined Info-Tech with more than 28 years of experience in health care information technology. He has held senior IT leadership roles at Group Health Cooperative of Puget Sound and OCHIN, as well as advisory or consulting roles at ECG Management Consultants and Gartner.

      Donna Bales

      Donna Bales
      Principal Research Director
      Info-Tech Research Group

      Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multi-stakeholder industry initiatives.

      Igor Ikonnikov

      Igor Ikonnikov
      Research Director
      Info-Tech Research Group

      Igor Ikonnikov is a Research and Advisory Director in the Data and Analytics practice. Igor has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.
      Igor has an MBA from the Ted Rogers School of Management (Toronto, Canada) with a specialization in Management of Technology and Innovation.

      Research Contributors and Experts

      Michael Newcity

      Michael Newcity
      Chief Innovation Officer
      ArcBest

      Kevin Yoder

      Kevin Yoder
      Vice President, Innovation
      ArcBest

      Gary Boyd

      Gary Boyd
      Vice President, Information Systems & Digital Transformation
      Arkansas Blue Cross and Blue Shield

      Brett Trelfa

      Brett Trelfa
      Chief Information Officer
      Arkansas Blue Cross and Blue Shield

      Kristen Wilson-Jones

      Kristen Wilson-Jones
      Chief Technology & Product Officer
      Medcurio

      Note: additional contributors did not wish to be identified

      Bibliography

      Altringer, Beth. "A New Model for Innovation in Big Companies" Harvard Business Review. 19 Nov. 2013. Accessed 30 Jan. 2023. https://hbr.org/2013/11/a-new-model-for-innovation-in-big-companies
      Arpajian, Scott. "Five Reasons Why Innovation Fails" Forbes Magazine. 4 June 2019. Accessed 31 Jan. 2023. https://www.forbes.com/sites/forbestechcouncil/2019/06/04/five-reasons-why-innovation-fails/?sh=234e618914c6
      Baldwin, John & Gellatly, Guy. "Innovation Capabilities: The Knowledge Capital Behind the Survival and Growth of Firms" Statistics Canada. Sept. 2006. Accessed 30 Jan. 2023. https://www.bdc.ca/fr/documents/other/innovation_capabilities_en.pdf
      Bar Am, Jordan et al. "Innovation in a Crisis: Why it is More Critical Than Ever" McKinsey & Company, 17 June 2020. Accessed 12 Jan. 2023. <https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/innovation-in-a-crisis-why-it-is-more-critical-than-ever >
      Boston Consulting Group, "Most Innovative Companies 2021" BCG, April 2021. Accessed 30 Jan. 2023. https://web-assets.bcg.com/d5/ef/ea7099b64b89860fd1aa3ec4ff34/bcg-most-innovative-companies-2021-apr-2021-r.pdf
      Boston Consulting Group, "Most Innovative Companies 2022" BGC, 15 Sept. 2022. Accessed 6 Feb. 2023. https://www.bcg.com/en-ca/publications/2022/innovation-in-climate-and-sustainability-will-lead-to-green-growth
      Christensen, Clayton M. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press, 2016.
      Gerber, Niklaus. "What is innovation? A beginner's guide into different models, terminologies and methodologies" Medium. 20 Sept 2022. Accessed 7 Feb. 2023. https://world.hey.com/niklaus/what-is-innovation-a-beginner-s-guide-into-different-models-terminologies-and-methodologies-dd4a3147
      Google X, Homepage. Accessed 6 Feb. 2023. https://x.company/
      Harnoss, Johann D. & Baeza, Ramón. "Overcoming the Four Big Barriers to Innovation Success" Boston Consulting Group, 24 Sept. 2019. Accessed 30 Jan 2023. https://www.bcg.com/en-ca/publications/2019/overcoming-four-big-barriers-to-innovation-success
      Jaruzelski, Barry et al. "Global Innovation 1000 Study" Pricewaterhouse Cooper, 30 Oct. 2018. Accessed 13 Jan. 2023. <https://www.strategyand.pwc.com/gx/en/insights/innovation1000.html>
      Kharpal, Arjun. "Huawei posts first-ever yearly revenue decline as U.S. sanctions continue to bite, but profit surges" CNBC. 28 March 2022. Accessed 7 Feb. 2023. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html
      Kirsner, Scott. "The Biggest Obstacles to Innovation in Large Companies" Harvard Business Review, 30 July 2018. Accessed 12 Jan. 2023. <https://hbr.org/2018/07/the-biggest-obstacles-to-innovation-in-large-companies>
      Macrotrends. "Apple Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AAPL/apple/revenue
      Macrotrends. "Microsoft Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MSFT/microsoft/revenue
      Macrotrends. "Amazon Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
      Macrotrends. "Alphabet Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/GOOG/alphabet/revenue
      Macrotrends. "Tesla Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/TSLA/tesla/revenue
      Macrotrends. "Moderna Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MRNA/moderna/revenue
      Macrotrends. "Sony Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/SONY/sony/revenue
      Macrotrends. "IBM Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/IBM/ibm/revenue
      Macrotrends. "Meta Platforms Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/META/meta-platforms/revenue
      Macrotrends. "NIKE Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NKE/nike/revenue
      Macrotrends. "Walmart Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/WMT/walmart/revenue
      Macrotrends. "Dell Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/DELL/dell/revenue
      Macrotrends. "NVIDIA Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NVDA/nvidia/revenue
      Sloan, Paul. "How to Develop a Vision for Innovation" Innovation Management, 10 Aug. 2009. Accessed 7 Feb. 2023. https://innovationmanagement.se/2009/08/10/how-to-develop-a-vision-for-innovation/
      Statista. "Samsung Electronics' global revenue from 2005 to 2021" Statista. Accessed 7 Feb. 2023. https://www.statista.com/statistics/236607/global-revenue-of-samsung-electronics-since-2005/
      Tichy, Noel & Ram Charan. "Speed, Simplicity, Self-Confidence: An Interview with Jack Welch" Harvard Business Review, 2 March 2020. Accessed 7 Feb. 2023. https://hbr.org/1989/09/speed-simplicity-self-confidence-an-interview-with-jack-welch
      Weick, Karl and Kathleen Sutcliffe. Managing the Unexpected: Sustained Performance in a Complex World, Third Edition. John Wiley & Sons, 2015.
      Xuan Tian, Tracy Yue Wang, Tolerance for Failure and Corporate Innovation, The Review of Financial Studies, Volume 27, Issue 1, 2014, Pages 211–255, Accessed https://doi.org/10.1093/rfs/hhr130

      Application Portfolio Management Foundations

      • Buy Link or Shortcode: {j2store}172|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $54,542 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy

      Organizations consider application oversight a low priority and app portfolio knowledge is poor:

      • No dedicated or centralized effort to manage the app portfolio means no single source of truth is available to support informed decision making.
      • Organizations acquire more applications over time, creating redundancy, waste, and the need for additional support.
      • Organizations are more vulnerable to changing markets. Flexibility and growth are compromised when applications are unadaptable or cannot scale.

      Our Advice

      Critical Insight

      • You cannot outsource application strategy.
      • Modern software options have lessened the need for organizations to have robust in-house application management capabilities. But your applications’ future and governance of the portfolio still require centralized oversight to ensure the best overall return on investment.
      • Application portfolio management is the mechanism to ensure that the applications in your enterprise are delivering value and support for your value streams and business capabilities. Understanding value, satisfaction, technical health, and total cost of ownership are critical to digital transformation, modernization, and roadmaps.

      Impact and Result

      Build an APM program that is actionable and fit for size:

      • Understand your current state, needs, and goals for your application portfolio management.
      • Create an application and platform inventory that is built for better decision making.
      • Rationalize your apps with business priorities and communicate risk in operational terms.
      • Create a roadmap that improves communication between those who own, manage, and support your applications.

      Application Portfolio Management Foundations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Application Portfolio Management Foundations Deck – A guide that helps you establish your core application inventory, simplified rationalization, redundancy comparison, and modernization roadmap.

      Enterprises have more applications than they need and rarely apply oversight to monitor the health, cost, and relative value of applications to ensure efficiency and minimal risk. This blueprint will help you build a streamlined application portfolio management process.

      • Application Portfolio Management Foundations – Phases 1-4

      2. Application Portfolio Management Diagnostic Tool – A tool that assesses your current application portfolio.

      Visibility into your application portfolio and APM practices will help inform and guide your next steps.

      • Application Portfolio Management Diagnostic Tool

      3. Application Portfolio Management Foundations Playbook – A template that builds your application portfolio management playbook.

      Capture your APM roles and responsibilities and build a repeatable process.

      • Application Portfolio Management Foundations Playbook

      4. Application Portfolio Management Snapshot and Foundations Tool – A tool that stores application information and allows you to execute rationalization and build a portfolio roadmap.

      This tool is the central hub for the activities within Application Portfolio Management Foundations.

      • Application Portfolio Management Snapshot and Foundations Tool
      [infographic]

      Workshop: Application Portfolio Management Foundations

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Your Foundations

      The Purpose

      Work with key corporate stakeholders to come to a shared understanding of the benefits and aspects of application portfolio management.

      Key Benefits Achieved

      Establish the goals of APM.

      Set the scope of APM responsibilities.

      Establish business priorities for the application portfolio.

      Activities

      1.1 Define goals and metrics.

      1.2 Define application categories.

      1.3 Determine steps and roles.

      1.4 Weight value drivers.

      Outputs

      Set short- and long-term goals and metrics.

      Set the scope for applications.

      Set the scope for the APM process.

      Defined business value drivers.

      2 Improve Your Inventory

      The Purpose

      Gather information on your applications to build a detailed inventory and identify areas of redundancy.

      Key Benefits Achieved

      Populated inventory based on your and your team’s current knowledge.

      Understanding of outstanding data and a plan to collect it.

      Activities

      2.1 Populate inventory.

      2.2 Assign business capabilities.

      2.3 Review outstanding data.

      Outputs

      Initial application inventory

      List of areas of redundancy

      Plan to collect outstanding data

      3 Gather Application Information

      The Purpose

      Work with the application subject matter experts to collect and compile data points and determine the appropriate disposition for your apps.

      Key Benefits Achieved

      Dispositions for individual applications

      Application rationalization framework

      Activities

      3.1 Assess business value.

      3.2 Assess end-user perspective.

      3.3 Assess TCO.

      3.4 Assess technical health.

      3.5 Assess redundancies.

      3.6 Determine dispositions.

      Outputs

      Business value score for individual applications

      End-user satisfaction scores for individual applications

      TCO score for individual applications

      Technical health scores for individual applications

      Feature-level assessment of redundant applications

      Assigned dispositions for individual applications

      4 Gather, Assess, and Select Dispositions

      The Purpose

      Work with application delivery specialists to determine the strategic plans for your apps and place these in your portfolio roadmap.

      Key Benefits Achieved

      Prioritized initiatives

      Initial application portfolio roadmap

      Ongoing structure of APM

      Activities

      4.1 Prioritize initiatives

      4.2 Populate roadmap.

      4.3 Determine ongoing APM cadence.

      4.4 Build APM action plan.

      Outputs

      Prioritized new potential initiatives.

      Built an initial portfolio roadmap.

      Established an ongoing cadence of APM activities.

      Built an action plan to complete APM activities.

      Further reading

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Analyst Perspective

      You can’t outsource accountability.

      Many lack visibility into their overall application portfolio, focusing instead on individual projects or application development. Inevitably, application sprawl creates process and data disparities, redundant applications, and duplication of resources and stands as a significant barrier to business agility and responsiveness. The shift from strategic investment to application maintenance creates an unnecessary constraint on innovation and value delivery.

      With the rise and convenience of SAAS solutions, IT has an increasing need to discover and support all applications in the organization. Unmanaged and unsanctioned applications can lead to increased reputational risk. What you don’t know WILL hurt you.

      You can outsource development, you can even outsource maintenance, but you cannot outsource accountability for the portfolio. Organizations need a holistic dashboard of application performance and dispositions to help guide and inform planning and investment discussions. Application portfolio management (APM) can’t tell you why something is broken or how to fix it, but it is an important tool to determine if an application’s value and performance are up to your standards and can help meet your future goals.

      The image contains a picture of Hans Eckman.

      Hans Eckman
      Principal Research Director
      Info-Tech Research Group


      Is this research right for you?

      Research Navigation

      Managing your application portfolio is essential regardless of its size or whether your software is purchased or developed in house. Each organization must have some degree of application portfolio management to ensure that applications deliver value efficiently and that their risk or gradual decline in technical health is appropriately limited.

      Your APM goals

      If this describes your primary goal(s)

      • We are building a business case to determine where and if APM is needed now.
      • We want to understand how well supported are our business capabilities, departments, or core functions by our current applications.
      • We want to start our APM program with our core or critical applications.
      • We want to build our APM inventory for less than 150 applications (division, department, operating unit, government, small enterprise, etc.).
      • We want to start simple with a quick win for our 150 most important applications.
      • We want to start with an APM pilot before committing to an enterprise APM program.
      • We need to rationalize potentially redundant and underperforming applications to determine which to keep, replace, or retire.
      • We want to start enterprise APM, with up to 150 critical applications.
      • We want to collect and analyze detailed information about our applications.
      • We need tools to help us calculate total cost of ownership (TCO) and value.
      • We want to customize our APM journey and rationalization.
      • We want to build a formal communication strategy for our APM program.

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • Organizations consider application oversight a low priority and app portfolio knowledge is poor.
      • No dedicated or centralized effort to manage the app portfolio means no single source of truth is available to support informed decision making.
      • Organizations acquire more applications over time, creating redundancy, waste, and the need for additional support.
      • Organizations are more vulnerable to changing markets. Flexibility and growth are compromised when applications are unadaptable or cannot scale.
      • APM implies taking a holistic approach and compiling multiple priorities and perspectives.
      • Organizations have limited time to act strategically or proactively and need to be succinct.
      • Uncertainties on business value prevent IT from successfully advising software decision making.
      • IT knows its technical debt but struggles to get the business to act on technical risks.
      • Attempts at exposing these problems rarely gain buy-in and discourage the push for improvement.
      • Think low priority over no priority.
      • Integrate these tasks into your mixed workload.
      • Create an inventory built for better decision making.
      • Rationalize your apps in accordance with business priorities and communicate risks on their terms.
      • Create a roadmap that improves communication between those who own, manage, and support an application.
      • Build your APM process fit for size.

      Info-Tech Insight: You can’t outsource strategy.

      Modern software options have decreased the need for organizations to have robust in-house application management capabilities. Your applications’ future and governance of the portfolio still require a centralized IT oversight to ensure the best return on investment.

      The top IT challenges for SE come from app management

      #1 challenge small enterprise owners face in their use of technology:

      Taking appropriate security precautions

      24%

      The costs of needed upgrades to technology

      17%

      The time it takes to fix problems

      17%

      The cost of maintaining technology

      14%

      Lack of expertise

      9%

      Breaks in service

      7%
      Source: National Small Business Association, 2019

      Having more applications than an organization needs means unnecessarily high costs and additional burden on the teams who support the applications. Especially in the case of small enterprises, this is added pressure the IT team cannot afford.

      A poorly maintained portfolio will eventually hurt the business more than it hurts IT.

      Legacy systems, complex environments, or anything that leads to a portfolio that can’t adapt to changing business needs will eventually become a barrier to business growth and accomplishing objectives. Often the blame is put on the IT department.

      56%

      of small businesses cited inflexible technology as a barrier to growth

      Source: Salesforce as quoted by Tech Republic, 2019

      A hidden and inefficient application portfolio is the root cause of so many pains experienced by both IT and the business.

      • Demand/Capacity Imbalance
      • Overspending
      • Security and Business Continuity Risk
      • Delays in Delivery
      • Barriers to Growth

      APM comes at a justified cost

      The image contains a screenshot of a graph to demonstrate APM and the costs.

      The benefits of APM

      APM identifies areas where you can reduce core spending and reinvest in innovation initiatives.

      Other benefits can include:

      • Fewer redundancies
      • Less risk
      • Less complexity
      • Improved processes
      • Flexibility
      • Scalability

      APM allows you to better understand and set the direction of your portfolio

      Application Inventory

      The artifact that documents and informs the business of your application portfolio.

      Application Rationalization

      The process of collecting information and assessing your applications to determine recommended dispositions.

      Application Alignment

      The process of revealing application information through interviewing stakeholders and aligning to business capabilities.

      Application Roadmap

      The artifact that showcases the strategic directions for your applications over a given timeline.

      Application Portfolio Management (APM):

      The ongoing practice of:

      • Providing visibility into applications across the organization.
      • Recommending corrections or enhancements to decision makers.
      • Aligning delivery teams on priority.
      • Showcasing the direction of applications to stakeholders.

      Create a balanced approach to value delivery

      Enterprise Agility and Value Realization

      Product Lifecycle Management

      Align your product and service improvement and execution to enterprise strategy and value realization in three key areas: defining your products and services, aligning product/service owners, and developing your product vision.

      Product Delivery Lifecycle (Agile DevOps)

      Enhance business agility by leveraging an Agile mindset and continuously improving your delivery throughput, quality, value realization, and adaptive governance.

      Application Portfolio Management

      Transform your application portfolio into a cohesive service catalog aligned to your business capabilities by discovering, rationalizing, and modernizing your applications while improving application maintenance, management, and reuse.

      The image contains a screenshot of a Thought Model on the Application Department Strategy.


      The image contains a screenshot of a Thought Model on Accelerate Your Transition to Product Delivery.

      Every organization experiences some degree of application sprawl

      The image contains a screenshot of images to demonstrate application sprawl.

      Causes of Sprawl

      • Poor Lifecycle Management
      • Turnover & Lack of Knowledge Transfer
      • Siloed Business Units & Decentralized IT
      • Business-Managed IT
      • (Shadow IT)
      • Mergers & Acquisitions

      Problems With Sprawl

      • Redundancy and Inefficient Spending
      • Disparate Apps & Data
      • Obsolescence
      • Difficulties in Prioritizing Support
      • Barriers to Change & Growth

      Application Sprawl:

      Inefficiencies within your application portfolio are created by the gradual and non-strategic accumulation of applications.

      You have more apps than you need.

      Only 34% of software is rated as both IMPORTANT and EFFECTIVE by users.

      Source: Info-Tech’s CIO Business Vision

      Build your APM journey map

      The image contains screenshots of diagrams that reviews building your APM journey map.

      Application rationalization provides insight

      Directionless portfolio of applications

      Info-Tech’s Five Lens Model

      Assigned dispositions for individual apps

      The image contains a screenshot of an example of directionless portfolio of applications.

      Application Alignment

      Business Value

      Technical Health

      End-User Perspective

      Total Cost of Ownership (TCO)

      Maintain: Keep the application but adjust its support structure.

      Modernize: Create a new initiative to address an inadequacy.

      Consolidate: Create a new initiative to reduce duplicate functionality.

      Retire: Phase out the application.

      Disposition: The intended strategic direction or implied course of action for an application.

      How well do your apps support your core functions and teams?

      How well are your apps aligned to value delivery?

      Do your apps meet all IT quality standards and policies?

      How well do your apps meet your end users’ needs?

      What is the relative cost of ownership and operation of your apps?

      Application rationalization requires the collection of several data points that represent these perspectives and act as the criteria for determining a disposition for each of your applications.

      APM is an iterative and evergreen process

      APM provides oversight and awareness of your application portfolio’s performance and support for your business operations and value delivery to all users and customers.

      Determine Scope and categories Build your list of applications and capabilities Score each application based on your values Determine outcomes based on app scoring and support for capabilities

      1. Lay Your Foundations

      1.1 Assess the state of your current application portfolio.

      1.2 Determine narrative.

      1.3 Define goals and metrics.

      1.4 Define application categories.

      1.5 Determine APM steps and roles (SIPOC).

      2. Improve Your Inventory

      2.1 Populate your inventory.

      2.2 Align to business capabilities.

      *Repeat

      3. Rationalize Your Apps

      3.1 Assess business value.

      3.2 Assess technical health.

      3.3 Assess end-user perspective.

      3.4 Assess total cost of ownership.

      *Repeat

      4. Populate Your Roadmap

      4.1 Review APM Snapshot results.

      4.2 Review APM Foundations results.

      4.3 Determine dispositions.

      4.4 Assess redundancies (optional).

      4.5 Determine dispositions for redundant applications (optional).

      4.6 Prioritize initiatives.

      4.7 Determine ongoing cadence.

      *Repeat

      Repeat according to APM cadence and application changes

      Executive Brief Case Study

      INDUSTRY: Retail

      SOURCE: Deloitte, 2017

      Supermarket Company

      The grocer was a smaller organization for the supermarket industry with a relatively low IT budget. While its portfolio consisted of a dozen applications, the organization still found it difficult to react to an evolving industry due to inflexible and overly complex legacy systems.

      The IT manager found himself in a scenario where he knew the applications well but had little awareness of the business processes they supported. Application maintenance was purely in keeping things operational, with little consideration for a future business strategy.

      As the business demanded more responsiveness to changes, the IT team needed to be able to react more efficiently and effectively while still securing the continuity of the business.

      The IT manager found success by introducing APM and gaining a better understanding of the business use and future needs for the applications. The organization started small but then increased the scope over time to produce and develop techniques to aid the business in meeting strategic goals with applications.

      Results

      The IT manager gained credibility and trust within the organization. The organization was able to build a plan to move away from the legacy systems and create a portfolio more responsive to the dynamic needs of an evolving marketplace.

      The application portfolio management initiative included the following components:

      Train teams and stakeholders on APM

      Model the core business processes

      Collect application inventory

      Assign APM responsibilities

      Start small, then grow

      Info-Tech’s application portfolio management methodology

      1. Lay Your Foundations

      2. Improve Your Inventory

      3. Rationalize Your Apps

      4. Populate Your Roadmap

      Phase Activities

      1.1 Assess your current application portfolio

      1.2 Determine narrative

      1.3 Define goals and metrics

      1.4 Define application categories

      1.5 Determine APM steps and roles

      2.1 Populate your inventory

      2.2 Align to business capabilities

      3.1 Assess business value

      3.2 Assess technical health

      3.3 Assess end-user perspective

      3.4 Assess total cost of ownership

      4.1 Review APM Snapshot results

      4.2 Review APM Foundations results

      4.3 Determine dispositions

      4.4 Assess redundancies (optional)

      4.5 Determine dispositions for redundant applications (optional)

      4.6 Prioritize initiatives

      4.7 Determine ongoing APM cadence

      Phase Outcomes

      Work with the appropriate management stakeholders to:

      • Extract key business priorities.
      • Set your goals.
      • Define scope of APM effort.

      Gather information on your own understanding of your applications to build a detailed inventory and identify areas of redundancy.

      Work with application subject matter experts to collect and compile data points and determine the appropriate disposition for your apps.

      Work with application delivery specialists to determine the strategic plans for your apps and place these in your portfolio roadmap.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Application Portfolio Management Foundations Playbook

      Application Portfolio Management Snapshot and Foundations Tool

      This template allows you to capture your APM roles and responsibilities and build a repeatable process.

      This tool stores all relevant application information and allows you to assess your capability support, execute rationalization, and build a portfolio roadmap.

      The image contains screenshots of the Application Portfolio Management Foundations Playbook. The image contains screenshots of the Application Portfolio Management Snapshot and Foundations Tool.

      Key deliverable:

      Blueprint Storyboard

      This is the PowerPoint document you are viewing now. Follow this guide to understand APM, learn how to use the tools, and build a repeatable APM process that will be captured in your playbook.

      The image contains a screenshot of the blueprint storyboard.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI for on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4

      Call #1: Establish goals and foundations for your APM practice.

      Call #2:

      Initiate inventory and determine data requirements.

      Call #3:

      Initiate rationalization with group of applications.

      Call #4:

      Review result of first iteration and perform retrospective.

      Call #5:

      Initiate your roadmap and determine your ongoing APM practice.

      Note: The Guided Implementation will focus on a subset or group of applications depending on the state of your current APM inventory and available time. The goal is to use this first group to build your APM process and models to support your ongoing discovery, rationalization, and modernization efforts.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our right-sized best practices in your organization. A typical GI, using our materials, is 3 to 6 calls over the course of 1 to 3 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      1. Lay Your Foundations

      2. Improve Your Inventory

      3. Rationalize Your Apps

      4. Populate Your Roadmap

      Post Workshop Steps

      Activities

      1.1 Assess your current
      application portfolio

      1.2 Determine narrative

      1.3 Define goals and metrics

      1.4 Define application categories

      1.5 Determine APM steps and roles

      2.1 Populate your inventory

      2.2 Align to business capabilities

      3.1 Assess business value

      3.2 Assess technical health

      3.3 Assess end-user perspective

      3.4 Assess total cost of ownership

      4.1 Review APM Snapshot results

      4.2 Review APM Foundations results

      4.3 Determine dispositions

      4.4 Assess redundancies (optional)

      4.5 Determine dispositions for redundant applications (optional)

      4.6 Prioritize initiatives

      4.7 Determine ongoing APM cadence

      • Complete in-progress deliverables from the previous four days.
      • Set up review time for workshop deliverables and to discuss the next steps.

      Outcomes

      Work with the appropriate management stakeholders to:

      1. Extract key business priorities
      2. Set your goals
      3. Agree on key terms and set the scope for your APM effort

      Work with your applications team to:

      1. Build a detailed inventory
      2. Identify areas of redundancy

      Work with the SMEs for a subset of applications to:

      1. Define your rationalization criteria, descriptions, and scoring
      2. Evaluate each application using rationalization criteria

      Work with application delivery specialists to:

      1. Determine the appropriate disposition for your apps
      2. Build an initial application portfolio roadmap
      3. Establish an ongoing cadence of APM activities

      Info-Tech analysts complete:

      1. Workshop report
      2. APM Snapshot and Foundations Toolset
      3. Action plan

      Note: The workshop will focus on a subset or group of applications depending on the state of your current APM inventory and available time. The goal is to use this first group to build your APM process and models to support your ongoing discovery, rationalization, and modernization efforts.

      Workshop Options

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Outcomes

      1-Day Snapshot

      3-Day Snapshot and Foundations (Key Apps)

      4-Day Snapshot and Foundations (Pilot Area)

      APM Snapshot

      • Align applications to business capabilities
      • Evaluate application support for business capabilities

      APM Foundations

      • Define your APM program and cadence
      • Rationalize applications using weighted criteria
      • Define application dispositions
      • Build an application roadmap aligned to initiatives

      Establish APM practice with a small sample set of apps and capabilities.

      Establish APM practice with a pilot group of apps and capabilities.

      Blueprint Pre-Step: Get the right stakeholders to the right exercises

      The image contains four steps and demonstrates who should be handling each exercise. 1. Lay Your Foundations, is to be handled by the APM Lead/Owner and the Key Corporate Stakeholders. 2. Improve Your Inventory, is to be handled by the APM Lead/Owner and the Applications Subject Matter Experts. 3. Rationalize Your Apps, is to be handled by the APM Lead/Owner, the Applications Subject Matter Experts, and the Delivery Leads. 4. Populate Your Roadmap, is to be handled by the APM Lead/Owner, the Key Corporate Stakeholders, and the Delivery Leads.

      APM Lead/Owner (Recommended)

      ☐ Applications Lead or the individual responsible for application portfolio management, along with any applications team members, if available

      Key Corporate Stakeholders

      Depending on size and structure, participants could include:

      ☐ Head of IT (CIO, CTO, IT Director, or IT Manager)

      ☐ Head of shared services (CFO, COO, VP HR, etc.)

      ☐ Compliance Officer, Steering Committee

      ☐ Company owner or CEO

      Application Subject Matter Experts

      Individuals who have familiarity with a specific subset of applications

      ☐ Business owners (product owners, Head of Business Function, power users)

      ☐ Support owners (Operations Manager, IT Technician)

      Delivery Leads

      ☐ Development Managers

      ☐ Solution Architects

      ☐ Project Managers

      Understand your APM tools and outcomes

      1.Diagnostic The image contains a screenshot of the diagnostic APM tool.

      5. Foundations: Chart

      The image contains a screenshot of the Foundations: Chart APM tool.

      2. Data Journey

      The image contains a screenshot of the data journey APM tool.

      6. App Comparison

      The image contains a screenshot of the App Comparison APM tool.

      3. Snapshot

      The image contains a screenshot of the snapshot APM tool.

      7. Roadmap

      The image contains a screenshot of the Roadmap APM tool.

      4. Foundations: Results

      The image contains a screenshot of the Foundations: Results APM Tool.

      Examples and explanations of these tools are located on the following slides and within the phases where they occur.

      Assess your current application portfolio with Info-Tech’s APM Diagnostic Tool

      The image contains a screenshot of the APM Diagnostic Tool.

      One of the primary purposes of application portfolio management is to get what we know and need to know on paper so we can share a common vision and understanding of our portfolio. This enables better discussions and decisions with your application owners and stakeholders.

      APM worksheet data journey map

      The image contains a screenshot of the APM worksheet data journey map.

      Interpreting your APM Snapshot results

      The image contains a screenshot of the APM snapshots results.

      Interpreting your APM Foundations results

      The image contains a screenshot of the APM Foundations results.

      Interpreting your APM Foundations chart

      The image contains a screenshot of the APM Foundations chart.

      Compare application groups

      Group comparison can be used for more than just redundant/overlapping applications.

      The image contains a screenshot of images that demonstrate comparing application groups.

      Apply Info-Tech’s 6 R’s Rationalization Disposition Model

      The image contains a screenshot of Info-Tech's 6 R's Rationalization Disposition Model.

      Disposition

      Description

      Reward

      Prioritize new features or enhancement requests and openly welcome the expansion of these applications as new requests are presented.

      Refresh

      Address the poor end-user satisfaction with a prioritized project. Consult with users to determine if UX issues require improvement to address satisfaction.

      Refocus

      Determine the root cause of the low value. Refocus, retrain, or refresh the UX to improve value. If there is no value found, aim to "keep the lights on" until the app can be decommissioned.

      Replace

      Replace or rebuild the application as technical and user issues are putting important business capabilities at risk. Decommission application alongside replacement.

      Remediate

      Address the poor technical health or risk with a prioritized project. Further consult with development and technical teams to determine if migration or refactoring is suited to address the technical issue.

      Retire

      Cancel any requested features and enhancements. Schedule the proper decommission and transfer end users to a new or alternative system if necessary.

      TCO, compared relatively to business value, helps determine the practicality of a disposition and the urgency of any call to action. Application alignment is factored in when assessing redundancies and has a separate set of dispositions.

      Populate roadmap example

      The image contains an example of the populate roadmap.

      ARE YOU READY TO GET STARTED?

      Phase 1

      Lay Your Foundations

      Phase 1

      1.1 Assess Your Current Application Portfolio

      1.2 Determine Narrative

      1.3 Define Goals and Metrics

      1.4 Define Application Categories

      1.5 Determine APM Steps and Roles

      Phase 2

      2.1 Populate Your Inventory

      2.2 Align to Business Capabilities

      Phase 3

      3.1 Assess Business Value

      3.2 Assess Technical Health

      3.3 Assess End-User Perspective

      3.4 Assess Total Cost of Ownership

      Phase 4

      4.1 Review APM Snapshot Results

      4.2 Review APM Foundations Results

      4.3 Determine Dispositions

      4.4 Assess Redundancies (Optional)

      4.5 Determine Dispositions for Redundant Applications (Optional)

      4.6 Prioritize Initiatives

      4.7 Determine Ongoing APM Cadence

      This phase involves the following participants:

      Applications Lead

      Key Corporate Stakeholders

      Additional Resources

      APM supports many goals

      Building an APM process requires a proper understanding of the underlying business goals and objectives of your organization’s strategy. Effectively identifying these drivers is paramount to gaining buy-in and the approval for any changes you plan to make to your application portfolio.

      After identifying these goals, you will need to ensure they are built into the foundations of your APM process.

      “What is most critical?” but also “What must come first?”

      Discover

      Improve

      Transform

      Collect Inventory

      Uncover Shadow IT

      Uncover Redundancies

      Anticipate Upgrades

      Predict Retirement

      Reduce Cost

      Increase Efficiency

      Reduce Applications

      Eliminate Redundancy

      Limit Risk

      Improve Architecture

      Modernize

      Enable Scalability

      Drive Business Growth

      Improve UX

      Assess your current application portfolio with Info-Tech’s APM Diagnostic Tool

      The image contains a screenshot of the APM Diagnostic Tool.

      One of the primary purposes of application portfolio management is to get what we know and need to know on paper so we can share a common vision and understanding of our portfolio. This enables better discussions and decisions with your application owners and stakeholders.

      1.1 Assess your current application portfolio with Info-Tech’s diagnostic tool

      Estimated time: 1 hour

      1. This tool provides visibility into your application portfolio and APM practices.
      2. Based on your assessment, you should gain a better understanding of whether the appropriate next steps are in application discovery, rationalization, or roadmapping.
      3. Complete the “Data Entry” worksheet in the Application Portfolio Management Diagnostic Tool (Excel).
      4. Review the “Results” worksheet to help inform and guide your next steps.

      Download the Application Portfolio Management Diagnostic Tool

      Input Output
      • Current APM program
      • Application landscape
      • APM current-state assessment
      Materials Participants
      • Application Portfolio Management Diagnostic Tool
      • Applications Lead

      1.1 Understanding the diagnostic results

      • Managed Apps are your known knowns and most of your portfolio.
      • Unmanaged and Unsanctioned Apps are known but have unknown risks and compliance. Bring these under IT support.
      • Unknown Apps are high risk and noncompliant. Prioritize these based on risk, cost, and use.
      The image contains a screenshot of the diagnostic APM tool.
      • APM is more than an inventory and assessment. A strong APM program provides ongoing visibility and insights to drive application improvement and value delivery.
      • Use your Sprawl Factors to identify process and organizational gaps that may need to be addressed.
      • Your APM inventory is only as good as the information in it. Use this chart to identify gaps and develop a path to define missing information.
      • APM is an iterative process. Use this state assessment to determine where to focus most of your current effort.

      Understand potential motivations for APM

      The value of APM is defined by how the information will be used to drive better decisions.

      Portfolio Governance

      Transformative Initiatives

      Event-Driven Rationalization

      Improves:

      • Spending efficiency
      • Risk
      • Retirement of aged and low-value applications
      • Business enablement

      Impact on your rationalization framework:

      • Less urgent
      • As rigorous as appropriate
      • Apply in-depth analysis as needed

      Enables:

      • Data migration or harmonization
      • Legacy modernization
      • Infrastructure/cloud migration
      • Standardizing platforms
      • Shift to cloud and SAAS

      Impact on your rationalization framework:

      • Time sensitive
      • Scope on impacted areas
      • Need to determine specific dispositions
      • Outcomes need to include detailed and actionable steps

      Responds to:

      • Mergers and acquisitions
      • Regulatory and compliance change
      • New applications
      • Application retirement by vendors
      • Changes in business operations
      • Security risks and BC/DR

      Impact on your rationalization framework:

      • Time constrained
      • Lots of discovery work
      • Primary focus on duplication
      • Increased process and system understanding

      Different motivations will influence the appropriate approach to and urgency of APM or, specifically, rationalizing the portfolio. When rationalizing is directly related to enabling or in response to a broader initiative, you will need to create a more structured approach with a formal budget and resources.

      1.2 Determine narrative

      Estimated time: 30 minutes-2 hours

      1. Open the “Narrative” tab in the APM Snapshot and Foundations Tool.
      2. Start by listing your prevailing IT pain points with the application portfolio. These will be the issues experienced predominantly by the IT team and not necessarily by the stakeholders. Be sure to distinguish pain points from their root causes.
      3. Determine an equivalent business pain point for each IT pain point. This should be how the problem manifests itself to business stakeholders and should include potential risks to the organization is exposed to.
      4. Determine the business goal for each business pain point. Ideally, these are established organizational goals that key decision-makers will recognize. These goals should address the business pain points you have documented.
      5. Determine the technical objective for each business goal. These speak to the general corrections or enhancements to the portfolio required to accomplish the business goals.
      6. Use the “Narrative - Matrix” worksheet to group items into themes if needed.

      Record the results in the APM Snapshot and Foundations Tool

      Input Output
      • Familiarity with application landscape
      • Organizational context and strategic artifacts
      • Narrative for application portfolio transformation
      Materials Participants
      • APM Snapshot and Foundations Tool
      • Application Portfolio Manager

      Connect your pains to what the business cares about to find the most effective narrative

      Root Cause

      IT Pain Points

      Business Pain Points

      Business Goals

      Narrative

      Technical Objectives

      Sprawl

      Shadow IT/decentralized oversight

      Neglect over time

      Poor delivery processes

      Back-End Complexity

      Disparate Data/Apps

      Poor Architectural Fit

      Redundancy

      Maintenance Demand/
      Resource Drain

      Low Maintainability

      Technical Debt

      Legacy, Aging, or Expiring Apps

      Security Vulnerabilities

      Unsatisfied Customers

      Hurdles to Growth/Change

      Poor Business Analytics

      Process Inefficiency

      Software Costs

      Business Continuity Risk

      Data Privacy Risk

      Data/IP Theft Risk

      Poor User Experience

      Low-Value Apps

      Scalability

      Flexibility/Agility

      Data-Driven Insights

      M&A Transition

      Business Unit Consolidation/ Centralization

      Process Improvement

      Process Modernization

      Cost Reduction

      Stability

      Customer Protection

      Security

      Employee Enablement

      Business Enablement

      Innovation

      Create Strategic Alignment

      Identify specific business capabilities that are incompatible with strategic initiatives.

      Reduce Application Intensity

      Highlight the capabilities that are encumbered due to functional overlaps and complexity.

      Reduce Software Costs

      Specific business capabilities come at an unnecessarily or disproportionately high cost.

      Mitigate Business Continuity Risk

      Specific business capabilities are at risk of interruption or stoppages due to unresolved back-end issues.

      Mitigate Security Risk

      Specific business capabilities are at risk due to unmitigated security vulnerabilities or breaches.

      Increase Satisfaction Applications

      Specific business capabilities are not achieving their optimal business value.

      Platform Standardization

      Platform Standardization Consolidation

      Data Harmonization

      Removal/Consolidation of Redundant Applications

      Legacy Modernization

      Application Upgrades

      Removal of Low-Value Applications

      1.3 Define goals and metrics

      Estimated time: 1 hour

      1. Determine the motivations behind APM. You may want to collect and review any of the organization’s strategic documents that provide additional context on previously established goals.
      2. With the appropriate stakeholders, discuss the goals of APM. Try to label your goals as either:
        1. Short term: Refers to immediate goals used to represent the progress of APM activities. Likely these goals are more IT-oriented
        2. Long term: Refers to broader and more distant goals more related to the impact of APM. These goals tend to be more business-oriented.
      3. To help clearly define your goals, discuss appropriate metrics for each goal. Often these metrics can be expressed as:
        1. Leading indicators: Metrics used to gauge the success of your short-term goals and the progress of APM activities.
        2. Lagging indicators: Metrics used to gauge the success of your long-term goals.

      Record the results in the APM Snapshot and Foundations Tool

      Input Output
      • Overarching organizational strategy
      • IT strategy
      • Defined goals and metrics for APM
      Materials Participants
      • Whiteboard
      • Markers
      • APM Snapshot and Foundations Tool
      • Applications Lead
      • Key Corporate Stakeholders

      1.3 Define goals and metrics: Example

      Goals

      Metric

      Target

      Short Term

      Improve ability to inform the business

      Leading Indicators

      • Application inventory with all data fields completed
      • Applications with recommended dispositions
      • 80% of portfolio

      Improve ownership of applications

      • Applications with an assigned business and technical owner
      • 80% of portfolio

      Reduce costs of portfolio

      • TCO of full application portfolio
      • The number of recovered/avoided software licenses from retired apps
      • Reduce by 5%
      • $50,000

      Long Term

      Migrate platform

      Lagging Indicators

      • Migrate all applications
      • Total value change in on-premises apps switched to SaaS
      • 100% of applications
      • Increase 50%

      Improve overall satisfaction with portfolio

      • End-user satisfaction rating
      • Increase 25%

      Become more customer-centric

      • Increased sales
      • Increased customer experience
      • Increase 35%

      “Application” doesn’t have the same meaning to everyone

      The image contains a picture of Martin Fowler.

      Code: A body of code that's seen by developers as a single unit.

      Functionality: A group of functionality that business customers see as a single unit.

      Funding: An initiative that those with the money see as a single budget.

      ?: What else?

      “Essentially applications are social constructions.

      Source: Martin Fowler

      APM focuses on business applications.

      “Software used by business users to perform a business function.”

      – ServiceNow, 2020

      Unfortunately, that definition is still quite vague.

      You must set boundaries and scope for “application”

      1. Many individual items can be considered applications on their own or components within or associated with an application.

      2. Different categories of applications may be out of scope or handled differently within the activities and artifacts of APM.

      Different categories of applications may be out of scope or handled differently within the activities and artifacts of APM.

      • Interface
      • Software Component
      • Supporting Software
      • Platform
      • Presentation Layer
      • Middleware
      • Micro Service
      • Database
      • UI
      • API
      • Data Access/ Transfer/Load
      • Operating System

      Apps can be categorized by generic categories

      • Enterprise Applications
      • Unique Function-Specific Applications
      • Productivity Tools
      • Customer-Facing Applications
      • Mobile Applications

      Apps can be categorized by bought vs. built or install types

      • Custom
      • On-Prem
      • Off the Shelf
      • SaaS
      • Hybrid
      • End-User-Built Tools

      Apps can be categorized by the application family

      • Parent Application
      • Child Application
      • Package
      • Module
      • Suite
      • Component (Functional)

      Apps can be categorized by the group managing them

      • IT-Managed Applications
      • Business-Managed Applications (Shadow IT)
      • Partner/External Applications

      Apps can be categorized by tiers

      • Mission Critical
      • Tier 2
      • Tier 3

      Set boundaries on what is an application or the individual unit that you’re making business decisions on. Also, determine which categories of applications are in scope and how they will be included in the activities and artifacts of APM. Use your product families defined in Deliver Digital Products at Scale to help define your application categories, groups, and boundaries.

      1.4 Define application categories

      Estimated time: 1 hour

      1. Review the items listed on the previous slide and consider what categories provide the best initial grouping to help organize your rationalization and dispositions. Update the category list to match your application groupings.
      2. Identify the additional categories you need to manage in your application portfolio.
      3. For each category, establish or modify a description or definition and provide examples that exist in your current portfolio.
      4. For each category, answer:
        1. Will these be documented in the application inventory?
        2. Will these be included in application rationalization? Think about if this item will be assigned a TCO, value score, and, ultimately, a disposition.
        3. Will these be listed in the application portfolio roadmap?
      5. If you completed Deliver Digital Products at Scale, use your product families to help define your application categories.

      Record the results in the APM Snapshot and Foundations Tool

      InputOutput
      • Working list of applications
      • Definitions and guidelines for which application categories are in scope for APM
      MaterialsParticipants
      • Whiteboard and markers
      • APM Snapshot and Foundations Tool
      • Applications Lead
      • Key Corporate Stakeholders

      1.4 APM worksheet data journey map

      The image contains a screenshot of the APM worksheet data journey map.

      1.4 Define application categories: Example

      Category

      Definition/Description

      Examples

      Documented in your application inventory?

      Included in application rationalization?

      Listed in your application portfolio roadmap?

      Business Application

      End-user facing applications that directly enable specific business functions. This includes enterprise-wide and business-function-specific applications. Separate modules will be considered a business application when appropriate.

      ERP system, CRM software, accounting software

      Yes

      Yes. Unless currently in dev. TCO of the parent application will be divided among child apps.

      Yes

      Software Components

      Back-end solutions are self-contained units that support business functions.

      ETL, middleware, operating systems

      No. Documentation in CMDB. These will be listed as a dependency in the application inventory.

      No. These will be linked to a business app and included in TCO estimates and tech health assessments.

      No

      Productivity Tools

      End-user-facing applications that enable standard communication of general document creation.

      MS Word, MS Excel, corporate email

      Yes

      No

      Yes

      End-User- Built Microsoft Tools

      Single instances of a Microsoft tool that the business has grown dependent on.

      Payroll Excel tool, Access databases

      No. Documentation in Business Tool Glossary.

      No No

      Partner Applications

      Partners or third-party applications that the business has grown dependent on but are internally owned or managed.

      Supplier’s ERP portal, government portal

      No No

      Yes

      Shadow IT

      Business-managed applications.

      Downloaded tools

      Yes

      Yes. However, just from a redundancy perspective.

      Yes

      The roles in APM rarely exist; you need to adapt

      Application Portfolio Manager

      • Responsible for the health and evolution of the application portfolio.
      • Facilitates the rationalization process.
      • Compiles and assesses application information and recommends and supports key decisions regarding the direction of the applications.
      • This is rarely a dedicated role even in large enterprises. For small enterprises, this should be an IT employee at a manager level – an IT manager or operations manager.

      Business Owner

      • Responsible for managing individual applications on a functional level and approves and prioritizes projects.
      • Provides business process or functional subject matter expertise for the assessment of applications.
      • For small enterprises, this role is rarely defined, but the responsibility should exist. Consider the head of a business unit or a process owner as the owner of the application.

      Support Owner

      • Responsible for the maintenance and management of individual applications.
      • Provides technical information and subject matter expertise for the assessment of an application.
      • For small enterprises, this would be those responsible for maintaining the application and those responsible for its initial implementation. Often support responsibilities are external, and this role will be more of a vendor manager.

      Project Portfolio Manager

      • Responsible for intake, planning, and coordinating the resources that deliver any changes.
      • The body that consumes the results of rationalization and begins planning any required action or project.
      • For small enterprises, the approval process can come from a steering committee but it is often less formal. Often a smaller group of project managers facilitates planning and coordination and works closely with the delivery leads.

      Corner-of-the-Desk Approach

      • No one is explicitly dedicated to building a strategy or APM practices.
      • Information is collected whenever the applications team has time available.
      • Benefits are pushed out and the value is lost.

      Dedicated Approach

      • The initiative is given a budget and formal agenda.
      • Roles and responsibilities are assigned to team members.

      The high-level steps of APM present some questions you need to answer

      Build Inventory

      Create the full list of applications and capture all necessary attributes.

      • Who will build the inventory?
      • Do you know all your applications (Shadow IT)?
      • Do you know your applications’ functionality?
      • Do you know where your applications overlap?
      • Who do you need to consult with to fill in the gaps?
      • Who will provide specific application information?

      Collect & Compile

      Engage with appropriate SMEs and collect necessary data points for rationalization.

      • Who will collect and compile the data points for rationalization?
      • What are the specific data points?
      • Are some of the data points currently documented?
      • Who will provide specific data points on technical health, cost, performance, and business value?
      • Who will determine what business value is?

      Assess & Recommend

      Apply rationalization framework and toolset to determine dispositions.

      • Who will apply a rationalization tool or decision-making framework to generate dispositions for the applications?
      • Who will modify the tool or framework to ensure results align to the goals of the organization?
      • Who will define any actions or projects that result from the rationalization? And who needs to be consulted to assess the feasibility of any potential project?

      Validate & Roadmap

      Present dispositions for validation and communicate any decisions or direction for applications.

      • Who will present the recommended disposition, corrective action, or new project to the appropriate decision maker?
      • Who is the appropriate decision maker for application changes or project approval?
      • What format is recommended (idea, proposal, business case) and what extra analysis is required?
      • Who needs to be consulted regarding the potential changes?

      1.5 Determine APM steps and roles (SIPOC)

      Estimated time: 1-2 hours

      1. Begin by comparing Info-Tech’s list of common APM roles to the roles that exist in your organization with respect to application management and ownership.
      2. There are four high-level steps for APM: build inventory, collect & compile, assess & recommend, and validate & roadmap. Apply the SIPOC (Supplier, Input, Process, Output, Customer) model by completing the following for each step:
        1. In the Process column, modify the description, if necessary. Identify who is responsible for performing the step.
        2. In the Inputs column, modify the list of inputs.
        3. In the Suppliers column, identify who must be included to provide the inputs.
        4. In the Outputs column, modify the list of outputs.
        5. In the Customers column, identify who consumes the outputs.
      3. (Optional) Outline how the results of APM will be consumed. For example, project intake or execution, data or platform migration, application or product management, or whichever is appropriate.

      Record the results in the APM Snapshot and Foundations Tool

      Input Output
      • Existing function and roles regarding application delivery, management, and ownership
      • Scope of APM
      • Responsibilities assigned to your roles
      Materials Participants
      • Whiteboard and markers
      • “Supporting Activities – SIPOC” worksheet in the APM Snapshot and Foundations Tool
      • Applications Lead
      • Key Corporate Stakeholders

      1.5 Determine steps and roles

      Suppliers

      Inputs

      Process

      Outputs

      Customers

      • Applications Manager
      • Operations Manager
      • Business Owners
      • IT Team
      • List of applications
      • Application attributes
      • Business capabilities

      Build Inventory

      Create the full list of applications and capture all necessary attributes.

      Resp: Applications Manager & IT team member

      • Application inventory
      • Identified redundancies
      • Whole organization
      • Applications SMEs
      • Business Owners
      • Support Owners & Team
      • End Users
      • Application inventory
      • Existing documentation
      • Additional collection methods
      • Knowledge of business value, cost, and performance for each application

      Collect & Compile

      Engage with appropriate SMEs and collect necessary data points for rationalization.

      Resp: IT team member

      • Data points of business value, cost, and performance for each application
      • Applications Manager
      • Applications Manager
      • Defined application rationalization framework and toolset
      • Data points of business value, cost, and performance for each application

      Assess & Recommend

      Apply rationalization framework and toolset to determine dispositions.

      Resp: Applications Manager

      • Assigned disposition for each application
      • New project ideas for applications
      • Business Owners
      • Steering Committee
      • Business Owners
      • Steering Committee
      • Assigned disposition for each application
      • New project ideas for applications
      • Awareness of goals and priorities
      • Awareness of existing projects and resources capacity

      Validate & Roadmap

      Present dispositions for validation and communicate any decisions or direction for applications.

      Resp: Applications Manager

      • Application portfolio roadmap
      • Confirmed disposition for each application
      • Project request submission
      • Whole organization
      • Applications Manager
      • Solutions Engineer
      • Business Owner
      • Project request submission
      • Estimated cost
      • Estimated value or ROI

      Project Intake

      Build business case for project request.

      Resp: Project Manager

      • Approved project
      • Steering Committee

      Planning your APM modernization journey steps

      Discovery Rationalization Disposition Roadmap

      Enter your pilot inventory.

      • Optional Snapshot: Populate your desired snapshot grouping lists (departments, functions, groups, capabilities, etc.).

      Score your pilot apps to refine your rationalization criteria and scoring.

      • Score 3 to 9 apps to adjust and get comfortable with the scoring.
      • Validate scoring with the remaining apps in your pilot group. Refine and finalize the criteria and scoring descriptions.
      • Optional Snapshot: Use the Group Alignment Matrix to match your grouping list to select which apps support each grouping item.

      Determine recommended disposition for each application.

      • Review and adjust the disposition recommendations on the “Disposition Options” worksheet and set your pass/fail threshold.
      • Review your apps on the “App Rationalization Results” worksheet. Update (override) the recommended disposition and priority if needed.

      Populate your application roadmap.

      • Indicate programs, projects, initiatives, or releases that are planned for each app.
      • Update the priority based on the initiative.
      • Use the visual roadmap to show high-level delivery phases.

      Phase 2

      Improve Your Inventory

      Phase 1

      1.1 Assess Your Current Application Portfolio

      1.2 Determine Narrative

      1.3 Define Goals and Metrics

      1.4 Define Application Categories

      1.5 Determine APM Steps and Roles

      Phase 2

      2.1 Populate Your Inventory

      2.2 Align to Business Capabilities

      Phase 3

      3.1 Assess Business Value

      3.2 Assess Technical Health

      3.3 Assess End-User Perspective

      3.4 Assess Total Cost of Ownership

      Phase 4

      4.1 Review APM Snapshot Results

      4.2 Review APM Foundations Results

      4.3 Determine Dispositions

      4.4 Assess Redundancies (Optional)

      4.5 Determine Dispositions for Redundant Applications (Optional)

      4.6 Prioritize Initiatives

      4.7 Determine Ongoing APM Cadence

      This phase involves the following participants:

      • Applications Lead
      • Applications Team

      Additional Resources

      Document Your Business Architecture

      Industry Reference Architectures

      Application Capability Template

      Pre-step: Collect your applications

      1. Consult with your IT team and leverage any existing documentation to gather an initial list of your applications.
      2. Build an initial working list of applications. This is just meant to be a starting point. Aim to include any new applications in procurement, implementation, or development.
      3. The rationalization and roadmapping phases are best completed when iteratively focusing on manageable groups of applications. Group your applications into subsets based on shared subject matter experts. Likely this will mean grouping applications by business units.
      4. Select a subset to be the first group of applications that will undergo the activities of rationalization and roadmapping to refine your APM processes, scoring, and disposition selection.

      Info-Tech Best Practice

      The more information you plan to capture, the larger the time and effort, especially as you move along toward advanced and strategic items. Capture the information most aligned to your objectives to make the most of your investment.

      If you completed Deliver Digital Products at Scale, use your product families and products to help define your applications.

      Learn more about automated application discovery:
      High Application Satisfaction Starts With Discovering Your Application Inventory

      Discover your applications

      The image contains a screenshot of examples of applications that support APM.

      2.1 Populate your inventory

      Estimated time: 1-4 hours per group

      1. Review Info-Tech’s list of application inventory attributes.
      2. Open the “Application Inventory Details” tab of the APM Snapshot and Foundations Tool. Modify, add, or omit attributes.
      3. For each application, populate your prioritized data fields or any fields you know at the time of discovery. You will complete all the fields in future iterations.
      4. Complete this the best you can based on your team’s familiarity and any readily available documentation related to these applications.
      5. Use the drop-down list to select Enabling, Redundant/Overlapping, and Dependent apps. This will be used to help determine dispositions and comparisons.
      6. Highlight missing information or placeholder values that need to be verified.

      Record the results in the APM Snapshot and Foundations Tool

      Input Output
      • Working list of applications
      • Determined attributes for inventory
      • Populated inventory
      Materials Participants
      • APM Snapshot and Foundations Tool
      • Applications Lead
      • Any Applications Team Members

      2.1 APM worksheet data journey map

      The image contains a screenshot of the APM worksheet data journey map.

      Why is the business capability so important?

      For the purposes of an inventory, business capabilities help all stakeholders gain a sense of the functionality the application provides.

      However, the true value of business capability comes with rationalization.

      Upon linking all the organization’s applications to a standardized and consistent set of business capabilities, you can then group your applications based on similar, complementary, or overlapping functionality. In other words, find your redundancies and consolidation opportunities.

      Important Consideration

      Defining business capabilities and determining the full extent of redundancy is a challenging undertaking and often is a larger effort than APM all together.

      Business capabilities should be defined according to the unique functions and language of your organization, at varying levels of granularity, and ideally including target-state capabilities that identify gaps in the future strategy.

      This blueprint provides a simplified and generic list for the purpose of categorizing similar functionality. We strongly encourage exploring Document Your Business Architecture to help in the business capability defining process, especially when visibility into your portfolio and knowledge of redundancies is poor.

      The image contains a screenshot of the business capability scenarios.

      For a more detailed capability mapping, use the Application Portfolio Snapshot and the worksheets in your current workbook.

      What is a business capability map?

      The image contains a screenshot of a business capability map.

      A business capability map (BCM) is an abstraction of business operations that helps describe what the enterprise does to achieve its vision, mission, and goals. Business capabilities are the building blocks of the enterprise. They are typically defined at varying levels of granularity and include target-state capabilities that identify gaps in the future strategy. These are the people, process, and tool units that deliver value to your teams and customers.

      Info-Tech’s Industry Coverage and Reference Architectures give you a head start on producing a BCM fit for your organization. The visual to the left is an example of a reference architecture for the retail industry.

      These are the foundational piece for our Application Portfolio Snapshot. By linking capabilities to your supporting applications, you can better visualize how the portfolio supports the organization at a single glance. More specifically, you can highlight how issues with the portfolio are impacting capability delivery.

      Reminder: Best practices imply that business capabilities are methodologically defined by business stakeholders and business architects to capture the unique functions and language of your organization.

      The approach laid out in this service is about applying minimal time and effort to make the case for proper investment into the best practices, which can include creating a tailored BCM. Start with a good enough example to produce a useful visual and generate a positive conversation toward resourcing and analyses.

      We strongly encourage exploring Document Your Business Architecture and the Application Portfolio Snapshot to understand the thorough methods and tactics for BCM.

      Why perform a high-level application alignment before rationalization?

      Having to address redundancy complicates the application rationalization process. There is no doubt that assessing applications in isolation is much easier and allows you to arrive at dispositions for your applications in a timelier manner.

      Rationalization has two basic steps: first, collect and compile information, and second, analyze that information and determine a disposition for each application. When you don’t have redundancy, you can analyze an application and determine a disposition in isolation. When you do have redundancies, you need to collect information for multiple applications, likely across departments or lines of business, then perform a comparative analysis.

      Most likely your approach will fall somewhere between the examples below and require a hybrid approach.

      Benefits of a high-level application alignment:

      • Review the degree of redundancy across your portfolio.
      • Understand the priority areas for rationalization and the sequence of information collection.

      The image contains a screenshot of a timeline of rationalization effort.

      2.2 Align apps to capabilities and functions

      Estimated time: 1-4 hours per grouping

      The APM tool provides up to three different grouping comparisons to assess how well your applications are supporting your enterprise. Although business capabilities are important, identify your organizational perspectives to determine how well your portfolio supports these functions, departments, or value streams. Each grouping should be a consistent category, type, or arrangement of applications.

      1. Enter the business capabilities, from either your own BCM or the Info-Tech reference architectures, into the Business Capability column under Grouping 1.
      2. Open the “Group 1 Alignment Matrix” worksheet in the APM Snapshot and Foundations Tool.
      3. For each application’s row, enter an “X” in the column of a capability that the application supports.
      4. Optionally, repeat these steps under Grouping 2 and 3 for each value stream, department, function, or business unit where you’d like to assess application support. Note: To use Grouping 3, unhide the columns on the “Application and Group Lists” worksheet and unhide the worksheet “Grouping 3 Alignment Matrix.”

      Record the results in the APM Snapshot and Foundations Tool

      InputOutput
      • Application inventory
      • List of business capabilities, Info-Tech Reference Architecture capabilities, departments, functions, divisions, or value streams for grouping comparison
      • Assigned business capabilities to applications
      MaterialsParticipants
      • Whiteboard and markers
      • APM Snapshot and Foundations Tool
      • Applications Lead
      • Any Applications Team Members

      2.2 APM worksheet data journey map

      The image contains a screenshot of the APM worksheet data journey map.

      2.2 Aligning applications to groups example

      Alignment Matrix: Identify applications supporting each capability or function.

      Capability, Department, or Function 1

      Capability, Department, or Function 2

      Capability, Department, or Function 3

      Capability, Department, or Function 4

      Capability, Department, or Function 5

      Capability, Department, or Function 6

      Application A

      x

      Application B

      x

      Application C

      x

      Application D

      x

      Application E

      x x

      Application F

      x

      Application G

      x

      Application H

      x

      Application I

      x

      Application J

      x

      In this example:

      BC 1 is supported by App A

      BC 2 is supported by App B

      BC 3 is supported by Apps C & D

      BCs 4 & 5 are supported by App E

      BC 6 is supported by Apps F-G. BC 6 shows an example of potential redundancy and portfolio complexity.

      The APM tool supports three different Snapshot groupings. Repeat this exercise for each grouping.

      Align application to capabilities – tool view

      The image contains screenshots of the align application to capabilities - tool view

      Phase 3

      Rationalize Your Applications

      Phase 1

      1.1 Assess Your Current Application Portfolio

      1.2 Determine Narrative

      1.3 Define Goals and Metrics

      1.4 Define Application Categories

      1.5 Determine APM Steps and Roles

      Phase 2

      2.1 Populate Your Inventory

      2.2 Align to Business Capabilities

      Phase 3

      3.1 Assess Business Value

      3.2 Assess Technical Health

      3.3 Assess End-User Perspective

      3.4 Assess Total Cost of Ownership

      Phase 4

      4.1 Review APM Snapshot Results

      4.2 Review APM Foundations Results

      4.3 Determine Dispositions

      4.4 Assess Redundancies (Optional)

      4.5 Determine Dispositions for Redundant Applications (Optional)

      4.6 Prioritize Initiatives

      4.7 Determine Ongoing APM Cadence

      This phase involves the following participants:

      • Applications Lead
      • Application SMEs

      Additional Resources

      Phase pre-step: Sequence rationalization assessments appropriately

      Use the APM Snapshot results to determine APM iterations

      • Application rationalization requires an iterative approach.
      • Review your application types and alignment from Phase 2 to begin to identify areas of overlapping or redundant applications.
      • Sequence the activities of Phase 3 based on whether you have a:
        • Redundant Portfolio
          • Use the APM Snapshot to prioritize analysis by grouping.
          • Complete the application functional analysis.
          • Use the “Application Comparison” worksheet to aid your comparison of application subsets.
          • Update application dispositions and roadmap initiatives.
        • Non-Redundant Portfolio
          • Use the APM Snapshot to prioritize analysis by grouping.
          • Update application dispositions and roadmap initiatives.

      The image contains a screenshot of a timeline of rationalization effort.

      Phase pre-step: Are the right stakeholders present?

      Make sure you have the right people at the table from the beginning.

      • Application rationalization requires specific stakeholders to provide specific data points.
      • Ensure your application subsets are grouped by shared subject matter experts. Ideally, these are grouped by business units.
      • For each subset, identify the appropriate SMEs for the five areas of rationalization criteria.
      • Communicate and schedule interviews with groups of stakeholders. Inform them of additional information sources to have readily available.
      • (Optional) This phase’s activities follow the clockwise sequence of the diagram to the right. Reorder the sequence of activities based on overlaps of availability in subject matter expertise.

      Application

      Rationalization

      Additional Information Sources

      Ideal Stakeholders

      • KPIs

      Business Value

      • Business Application/Product Owners
      • Business Unit/ Process Owners
      • Survey Results

      End User

      • Business Application/ Product Owners
      • Key/Power Users
      • End Users
      • General Ledger
      • Service Desk
      • Vendor Contracts

      TCO

      • Operations/Maintenance Manager
      • Vendor Managers
      • Finance & Acct.
      • Service Desk
      • ALM Tools

      Technical Health

      • Operations/ Maintenance Manager
      • Solution Architect
      • Security Manager
      • Dev. Manager
      • Capability Maps
      • Process Maps

      Application Alignment

      • Business Unit/ Process Owners

      Rationalize your applications

      The image contains screenshots of diagrams that reviews building your APM journey map.

      One of the principal goals of application rationalization is determining dispositions

      Disposition: The intended strategic direction or course of action for an application.

      Directionless portfolio of applications

      Assigned dispositions for individual apps

      High-level examples:

      The image contains a screenshot of an image that demonstrates a directionless portfolio of applications.

      Maintain: Keep the application but adjust its support structure.

      The image contains screenshots of a few images taken from the directionless application to demonstrate the text above.

      Modernize: Create a new project to address an inadequacy.

      The image contains screenshots of a few images taken from the directionless application to demonstrate the text above.

      Consolidate: Create a new project to reduce duplicate functionality.

      The image contains screenshots of a few images taken from the directionless application to demonstrate the text above.

      Retire: Phase out the application.

      The image contains screenshots of a few images taken from the directionless application to demonstrate the text above.

      Application rationalization provides insight

      Directionless portfolio of applications

      Info-Tech’s Five Lens Model

      Assigned dispositions for individual apps

      The image contains a screenshot of an example of directionless portfolio of applications.

      Application Alignment

      Business Value

      Technical Health

      End-User Perspective

      Total Cost of Ownership (TCO)

      Maintain: Keep the application but adjust its support structure.

      Modernize: Create a new initiative to address an inadequacy.

      Consolidate: Create a new initiative to reduce duplicate functionality.

      Retire: Phase out the application.

      Disposition: The intended strategic direction or implied course of action for an application.

      How well do your apps support your core functions and teams?

      How well are your apps aligned to value delivery?

      Do your apps meet all IT quality standards and policies?

      How well do your apps meet your end users’ needs?

      What is the relative cost of ownership and operation of your apps?

      Application rationalization requires the collection of several data points that represent these perspectives and act as the criteria for determining a disposition for each of your applications.

      Disposition: The intended strategic direction or implied course of action for an application.

      3.1-3.4 APM worksheet data journey map

      The image contains a screenshot of the APM worksheet data journey map.

      Assessing application business value

      The Business Business Value of Applications IT
      Keepers of the organization’s mission, vision, and value statements that define IT success. The business maintains the overall ownership and evaluation of the applications. Technical subject matter experts of the applications they deliver and maintain. Each IT function works together to ensure quality applications are delivered to stakeholder expectations.

      First, the authorities on business value need to define and weigh their value drivers that describe the priorities of the organization.

      This will then allow the applications team to apply a consistent, objective, and strategically aligned evaluation of applications across the organization.

      In this context…business value is the value of the business outcome that the application produces and how effective the application is at producing that outcome.

      Business value IS NOT the user’s experience or satisfaction with the application.

      Review the value drivers of your applications

      The image contains a screenshot of a the business value matrix.

      Financial vs. Human Benefits

      Financial benefits refer to the degree to which the value source can be measured through monetary metrics and are often quite tangible.

      Human benefits refer to how an application can deliver value through a user’s experience.

      Inward vs. Outward Orientation

      Inward orientation refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.

      Outward orientation refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Increased Revenue

      Reduced Costs

      Enhanced Services

      Reach Customers

      Application functions that are specifically related to the impact on your organization’s ability to generate revenue and deliver value to your customers.

      Reduction of overhead. The ways in which an application limits the operational costs of business functions.

      Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      Application functions that enable and improve the interaction with customers or produce market information and insights.

      3.1 Assess business value

      Estimated time: 1 -4 hours

      1. Review Info-Tech’s four quadrants of business value: increase revenue/value, reduce costs, enhance services, and reach customers. Edit your value drivers, description, and scoring on the “Rationalization Inputs” worksheet. For each value driver, update the key indicators specific to your organization’s priorities. When editing the scoring descriptions, keep only the one you are using.
      2. (Optional) Add an additional value driver if your organization has distinct value drivers (e.g. compliance, sustainability, innovation, and growth).
      3. For each application, score on a scale of 0 to 5 how impactful the application is for each value driver. Use the indicators set in Phase 1 to guide your scoring.
      4. For each value driver, adjust the criteria weighting to match its relative importance to the organization. Start with a balanced or low weighting. Adjust the weights to ensure that the category score matches your relative values and priorities.

      Record the results in the APM Snapshot and Foundations Tool

      InputOutput
      • Knowledge of organizational priorities
      • (Optional) Existing mission, vision, and value statements
      • Scoring scheme for assessing business value
      MaterialsParticipants
      • Whiteboard and markers
      • APM Snapshot and Foundations Tool
      • Applications Lead
      • Key Corporate Stakeholders

      3.1 Weigh value drivers: Example

      The image contains a screenshot example of the weigh value drivers.

      For additional support in implementing a balanced value framework, refer to Build a Value Measurement Framework.

      Understand the back end and technical health of your applications

      Technical health identifies the extent of technology risk to the organization.

      MAINTAINABILITY (RAS)

      RAS refers to an app’s reliability, availability, and serviceability. How often, how long, and how difficult is it for your resources to keep an app functioning, and what are the resulting continuity risks? This can include root causes of maintenance challenges.

      SECURITY

      Applications should be aligned and compliant with ALL security policies. Are there vulnerabilities or is there a history of security incidents? Remember that threats are often internal and non-malicious.

      ADAPTABILITY

      How easily can the app be enhanced or scaled to meet changes in business needs? Does the app fit within the business strategy?

      INTEROPERABILITY

      The degree to which an app is integrated with current systems. Apps require comprehensive technical planning and oversight to ensure they connect within the greater application architecture. Does the app fit within your enterprise architecture strategy?

      BUSINESS CONTINUITY/DISASTER RECOVERY

      The degree to which the application is compatible with business continuity/disaster recovery (BC/DR) policies and plans that are routinely tested and verified.

      Unfortunately, the business only cares about what they can see or experience. Rationalization is your opportunity to get risk on the business’ radar and gain buy-in for the necessary action.

      3.2 Assess technical health

      Estimated time: 1-4 hours

      1. Review Info-Tech’s suggested technical health criteria. Edit your criteria, descriptions, and scoring on the “Rationalization Inputs” worksheet. For each criterion, update the key indicators specific to your organization’s priorities.
      2. For each application, score on a scale of 1 to 5 on how impactful the application is for each criterion.
      3. For each criterion, adjust the weighting to match its relative importance to the organization. Start with a balanced or low weighting. Adjust the weights to ensure that the category score matches your relative values and priorities.
      InputOutput
      • Familiarity of technical health perspective for applications within this subset
      • Maintenance history, architectural models
      • Technical health scores for each application
      MaterialsParticipants
      • APM Snapshot and Foundations Tool
      • Technical SMEs
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      End users provide valuable perspective

      Your end users are your best means of determining front-end issues.

      Data Quality

      To what degree do the end users find the data quality sufficient to perform their role and achieve their desired outcome?

      Effectiveness

      To what degree do the end users find the application effective for performing their role and desired outcome?

      Usability

      To what degree do the end users find the application reliable and easy to use to achieve their desired outcome?

      Satisfaction

      To what degree are end users satisfied with the features of this application?

      What else matters to you?

      Tune your criteria to match your values and priorities.

      Info-Tech Best Practice

      When facing large user groups, do not make assumptions or use lengthy methods of collecting information. Use Info-Tech’s Application Portfolio Assessment to collect data by surveying your end users’ perspectives.

      3.3 Assess end-user perspective

      Estimated time: 1-4 hours

      1. Review Info-Tech’s suggested end-user perspective criteria. Edit your criteria, descriptions and scoring on the “Rationalization Inputs” worksheet. For each criterion, update the key indicators specific to your organization’s priorities.
      2. For each application, score on a scale of 1 to 5 on how impactful the application is for each criterion.
      3. For each criterion, adjust the weighting to match its relative importance to the organization. Start with a balanced or low weighting. Adjust the weights to ensure that the category score matches your relative values and priorities.
      InputOutput
      • Familiarity of end user’s perspective for applications within this subset
      • User satisfaction scores for each application
      MaterialsParticipants
      • APM Snapshot and Foundations Tool
      • Business Owners, Key Users
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      Consider the spectrum of application cost

      An application’s cost extends past a vendor’s fee and even the application itself.

      LICENSING AND SUBSCRIPTIONS: Your recurring payments to a vendor.

      Many commercial off-the-shelf applications require a license on a per-user basis. Review contracts and determine costs by looking at per-user or fixed rates charged by the vendor.

      MAINTENANCE COSTS: Your internal spending to maintain an app.

      These are the additional costs to maintain an application such as support agreements, annual maintenance fees, or additional software or hosting expenses.

      INDIRECT COSTS: Miscellaneous expenses necessary for an app’s continued use.

      Expenses like end-user training, developer education, and admin are often neglected, but they are very real costs organizations pay regularly.

      RETURN ON INVESTMENT: Perceived value of the application related to its TCO.

      Some of our most valuable applications are the most expensive. ROI is an optional criterion to account for the value and importance of the application.

      Info-Tech Best Practice

      The TCO assessment is one area where what you are considering the ”application” matters quite a bit. An application’s peripherals or software components need to be considered in your estimates. For additional help calculating TCO, use the Application TCO Calculator from Build a Rationalization Framework.

      3.4 Assess total cost of ownership

      Estimated time: 1-4 hours

      1. Review Info-Tech’s suggested TCO criteria. Edit your criteria, descriptions, and scoring on the “Rationalization Inputs” worksheet. For each criterion, update the key indicators specific to your organization’s priorities.
      2. For each application, score on a scale of 1 to 5 on how impactful the application is for each criterion.
      3. For each criterion, adjust the weighting to match its relative importance to the organization. Start with a balanced or low weighting. Adjust the weights to ensure that the category score matches your relative values and priorities.
      InputOutput
      • Familiarity with the TCO for applications within this subset
      • Vendor contracts, maintenance history
      • TCO scores for each application
      MaterialsParticipants
      • APM Snapshot and Foundations Tool
      • Business Owners, Vendor Managers, Operations Managers
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      Phase 4

      Populate Your Roadmap

      Phase 1

      1.1 Assess Your Current Application Portfolio

      1.2 Determine Narrative

      1.3 Define Goals and Metrics

      1.4 Define Application Categories

      1.5 Determine APM Steps and Roles

      Phase 2

      2.1 Populate Your Inventory

      2.2 Align to Business Capabilities

      Phase 3

      3.1 Assess Business Value

      3.2 Assess Technical Health

      3.3 Assess End-User Perspective

      3.4 Assess Total Cost of Ownership

      Phase 4

      4.1 Review APM Snapshot Results

      4.2 Review APM Foundations Results

      4.3 Determine Dispositions

      4.4 Assess Redundancies (Optional)

      4.5 Determine Dispositions for Redundant Applications (Optional)

      4.6 Prioritize Initiatives

      4.7 Determine Ongoing APM Cadence

      his phase involves the following participants:

      • Applications Lead
      • Delivery Leads

      Additional Resources

      Review your APM Snapshot

      The image contains a screenshot of examples of applications that support APM.

      4.1 Review your APM Snapshot results

      Estimated time: 1-2 hours

      1. The APM Snapshot provides a dashboard to support your APM program’s focus and as an input to demand planning. Unhide the “Group 3” worksheet if you completed the alignment matrix.
      2. For each grouping area, review the results to determine underperforming areas. Use this information to prioritize your application root cause analysis and demand planning. Use the key on the following slide to guide your analysis.
      3. Analysis guidance:
        1. Start with the quartile grouping to find areas scoring in Remediate or Critical Need and focus follow-up actions on these areas.
        2. Use the lens/category heat map to determine which lenses are underperforming. Use this to then look up the individual app scores supporting that group to identify application issues.
        3. Use the “Application Comparison” worksheet to select and compare applications for the group to make your review and comparison easier.
        4. Work with teams in the group to provide root cause analysis for low scores.
        5. Build a plan to address any apps not supported by IT.
      InputOutput
      • Application list
      • Application to Group mapping
      • Rationalization scores
      • Awareness of application support for each grouping

      Materials

      Participants
      • APM Snapshot and Foundations Tool
      • Business Owners
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      Interpreting your APM Snapshot

      The image contains a screenshot of the APM Snapshot with guides on how to interpret it.

      4.1 APM worksheet data journey map

      The image contains a screenshot of the AMP worksheet data journey map.

      Review your APM rationalization results

      The image contains a screenshot of examples of applications that support APM.

      4.2 Review your APM Foundations results

      Estimated time: 1-2 hours

      The APM Foundations Results dashboard (“App Rationalization Results” worksheet) provides a detailed summary of your relative app scoring to serve as input to demand planning.

      1. For each grouping, review the results to determine underperforming app support. Use this information to prioritize your application root cause analysis using the individual criteria scores on the “Rationalization Inputs” worksheet.
      2. Use guidance on the following example slides to understand each area of the results.
      3. Any applications marked as N/A for evaluation will display N/A on the results worksheet and will not be displayed in the chart. You can still enter dispositions.
      4. Use the column filters to compare a subset of applications or use the “App Comparison” worksheet to maintain an ongoing view by grouping, redundancy, or category.
      5. Any applications marked as N/A for evaluation will display N/A on the results worksheet and will not be displayed in the chart. You can still enter dispositions.
      InputOutput
      • Application list
      • Rationalization scores
      • Application awareness
      MaterialsParticipants
      • APM Snapshot and Foundations Tool
      • Business Owners
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      4.2 APM worksheet data journey map

      The image contains a screenshot of the AMP worksheet data journey map.

      Interpreting your APM Foundations results

      The image contains a screenshot of the APM Foundations results.

      Interpreting your APM Foundations chart

      The image contains a screenshot of the APM Foundations chart.

      Modernize your applications

      The image contains a screenshot of examples of applications that support APM.

      Apply Info-Tech’s 6 R’s Rationalization Disposition Model

      The image contains a screenshot of Info-Tech's 6 R's Rationalization Disposition Model.

      Disposition

      Description

      Reward

      Prioritize new features or enhancement requests and openly welcome the expansion of these applications as new requests are presented.

      Refresh

      Address the poor end-user satisfaction with a prioritized project. Consult with users to determine if UX issues require improvement to address satisfaction.

      Refocus

      Determine the root cause of the low value. Refocus, retrain, or refresh the UX to improve value. If there is no value found, aim to "keep the lights on" until the app can be decommissioned.

      Replace

      Replace or rebuild the application as technical and user issues are putting important business capabilities at risk. Decommission application alongside replacement.

      Remediate

      Address the poor technical health or risk with a prioritized project. Further consult with development and technical teams to determine if migration or refactoring is suited to address the technical issue.

      Retire

      Cancel any requested features and enhancements. Schedule the proper decommission and transfer end users to a new or alternative system if necessary.

      TCO, compared relatively to business value, helps determine the practicality of a disposition and the urgency of any call to action. Application alignment is factored in when assessing redundancies and has a separate set of dispositions.

      4.3 Determine dispositions

      Estimated time: 1-4 hours

      1. The Recommended Disposition and Priority fields are prepopulated from your scoring thresholds and options on the “Disposition Options” worksheet. You can update any individual application disposition or priority using the drop-down menu and it will populate your selection on the “Roadmap” worksheet.
      2. Question if that disposition is appropriate. Be sure to consider:
        1. TCO – cost should come into play for any decisions.
        2. Alignment to strategic goals set for the overarching organizational, IT, technology (infrastructure), or application portfolio.
        3. Existing organizational priorities or funded initiatives impacting the app.
      3. Some dispositions may imply a call to action, new project, or initiative. Ideate and/or discuss with the team any potential initiatives. You can use different dispositions and priorities on the “App Rationalization Results” and “Roadmap” worksheets.
      4. Note: Modify the list of dispositions on the “Disposition Options” worksheet as appropriate for your rationalization initiative. Any modifications to the Disposition column will be automatically updated in the “App Rationalization Results” and “Roadmap” worksheets.
      InputOutput
      • Rationalization results
      • Assigned dispositions for applications
      MaterialsParticipants
      • APM Snapshot and Foundations Tool
      • Business Owners
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      4.3 APM worksheet data journey map

      The image contains a screenshot of the worksheet data journey map.

      Redundancies require a different analysis and set of dispositions

      Solving application redundancy is a lot more complicated than simply keeping one application and eliminating the others.

      First, you need to understand the extent of the redundancy. The applications may support the same capability, but do they offer the same functions? Determine which apps offer which functions within a capability. This means you cannot accurately arrive at a disposition until you have evaluated all applications.

      Next, you need to isolate the preferred system. This is completed by comparing the same data points collected for rationalization and the application alignment analysis. Cost and coverage of all necessary functions become the more important factors in this decision-making process.

      Lastly, for the non-preferred redundant applications you need to determine: What will you do with the users? What will you do with the data? And what can you do with the functionality (can the actual coding be merged onto a common platform)?

      Disposition

      Description & Additional Analysis

      Call to Action (Priority)

      Keep & Absorb

      Higher value, health satisfaction, and cost than alternatives

      These are the preferred apps to be kept. However, additional efforts are still required to migrate new users and data and potentially configure the app to new processes.

      Application or Process Initiative

      (Moderate)

      Shift & Retire

      Lower value, health satisfaction, and cost than alternatives

      These apps will be decommissioned alongside efforts to migrate users and data to the preferred system.

      *Confirm there are no unique and necessary features.

      Process Initiative & Decommission

      (Moderate)

      Merge

      Lower value, health satisfaction, and cost than alternatives but still has some necessary unique features

      These apps will be merged with the preferred system onto a common platform.

      *Determine the unique and necessary features.

      *Determine if the multiple applications are compatible for consolidation.

      Application Initiative

      (Moderate)

      Compare groups of applications

      The image contains a screenshot of examples of applications that support APM.

      4.4 Assess redundancies (optional)

      Estimated rime: 1 hour per group

      This exercise is best performed after aligning business capabilities to applications across the portfolio and identifying your areas of redundancy. At this stage, this is still an information collection exercise, and it will not yield a consolidation-based disposition until applied to all relevant applications. Lastly, this exercise may still be at too high a level to outline the full details of redundancy, but it is still vital information to collect and a starting point to determine which areas require more concentrated analysis.

      1. Determine which areas of redundancy or comparisons are desired. Duplicate the “App Comparison” worksheet for each grouping or comparison.
      2. Extend the comparison to better identify redundancy.
        1. For each area of redundancy, identify the high-level features. Aim to limit the features to ten, grouping smaller features if necessary. SoftwareReviews can be a resource for identifying common features.
        2. Label features using the MoSCoW model: must have, should have, could have, will not have.
        3. For each application, identify which features they support. You can use the grouping alignment matrix as a template for feature alignment comparison. Duplicate the worksheet, unlock it, and replace the grouping cell references with your list of features.
      Input Output
      • Areas of redundancy
      • Familiarity with features for applications within this subset
      • Feature-level review of application redundancy
      Materials Participants
      • Whiteboard and markers
      • APM Snapshot and Foundations Tool
      • Business Owners
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      4.4 Assess redundancies (optional)

      Account Management

      Call Management

      Order/Transaction Processing

      Contract Management

      Lead/Opportunity Management

      Forecasting/Planning

      Customer Surveying

      Email Synchronization

      M M M M S S C W

      CRM 1

      CRM 2

      CRM 3

      4.5 Determine dispositions for redundant applications (optional)

      Estimated time: 1 hour per group

      1. Based on the feature-level assessment, determine if you can omit applications if they don’t truly overlap with other applications.
      2. Make a copy of the “App Comparison” worksheet and select the applications you want to compare based on your functional analysis.
      3. Determine the preferred application(s). Use the diagram to inform your decision. This may be the application closest to the top right (strong health and value). However, less expensive options or any options that provide a more complete set of features may be preferable.
      4. Open the “App Rationalization Results” worksheet. Update your disposition for each application.
      5. Use these updated dispositions to determine a call to action, new project, or initiative. Ideate and/or discuss with the team any potential initiatives. Update your roadmap with these initiatives in the next step.
      InputOutput
      • Feature-level review of application redundancy
      • Redundancy comparison
      • Assigned dispositions for redundant applications
      MaterialsParticipants
      • APM Snapshot and Foundations Tool
      • Business Owners
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      Compare application groups

      Group comparison can be used for more than just redundant/overlapping applications.

      The image contains a screenshot of images that demonstrate comparing application groups.

      Roadmaps are used for different purposes

      Roadmaps are used for different communication purposes and at varying points in your application delivery practice. Some use a roadmap to showcase strategy and act as a feedback mechanism that allows stakeholders to validate any changes (process 1). Others may use it to illustrate and communicate approved and granular elements of a change to an application to inform appropriate stakeholders of what to anticipate (process 2).

      Select Dispositions & Identify New Initiatives

      Add to Roadmap

      Validate Direction

      Plan Project

      Execute Project

      Select Dispositions & Identify New Initiatives

      • Project Proposal
      • Feasibility/ Estimation
      • Impact Assessment
      • Business Case
      • Initial Design

      Approve Project

      Add to Roadmap

      Execute Project

      The steps between selecting a disposition and executing on any resulting project will vary based on the organization’s project intake standards (or lack thereof).

      This blueprint focuses on building a strategic portfolio roadmap prior to any in-depth assessments related to initiative/project intake, approval, and prioritization. For in-depth support related to intake, approval, prioritization, or planning, review the following resources.

      The image contains a screenshot of the Deliver on your Digital Product Vision blueprint. The image contains a screenshot of the Deliver Digital Products at Scale blueprint.

      Determine what makes it onto the roadmap

      A roadmap should not be limited to what is approved or committed to. A roadmap should be used to present the items that need to happen and begin the discussion of how or if this can be put into place. However, not every idea should make the cut and end up in front of key stakeholders.

      The image contains a screenshot of steps to be taken to determine what makes it onto the roadmap.

      4.6 Prioritize initiatives

      Estimated time: 1-4 hours

      1. This is a high-level assessment to provide a sense of feasibility, practicality, and priority as well as an estimated timeline of a given initiative. Do not get lost in granular estimations. Use this as an input to your demand planning process.
      2. Enter the specific name or type of initiative.
        1. Process Initiative: Any project or effort focused on process improvements without technical modification to an app (e.g. user migration, change in SLA, new training program). Write the application and initiative name on a blue sticky note.
        2. App Initiative: Any project or effort involving technical modification to an app (e.g. refactoring, platform migration, feature addition or upgrade). Write the application and initiative name on a yellow sticky note.
        3. Decommission Initiative: Any project and related efforts to remove an app (e.g. migrating data, removal from server). Write the application and initiative name on a red sticky note.
      3. Prioritize the initiative to aid in demand planning. This is prepopulated from your selected application disposition, but you can set a different priority for the initiative here.
      4. Select the Initiative Phase in the timeline to show the intended schedule and sequencing of the initiative.
      Input Output
      • Assigned dispositions
      • Rationalization results
      • Prioritized initiatives
      Materials Participants
      • Whiteboard and markers
      • APM Snapshot and Foundations Tool
      • Delivery Leads
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      4.6 APM worksheet data journey map

      The image contains a screenshot of the worksheet data journey map.

      Populate roadmap example

      The image contains an example of the populate roadmap.

      Create a recurring update plan

      • Application inventories become stale before you know it. Build steps in your procurement process to capture the appropriate information on new applications. Also, build in checkpoints to revisit your inventory regularly to assess the accuracy of inventory data.
      • Rationalization is not one and done; it must occur with an appropriate cadence.
        • Business priorities change, which will impact the current and future value of your apps.
        • Now more than ever, user expectations evolve rapidly.
        • Application sprawl likely won’t stop, so neither will shadow IT and redundancies.
        • Obsolescence, growing technical debt, changing security threats, or shifting technology strategies are all inevitable, as is the gradual decline of an app’s health or technical fit.
      • An application’s disposition changes quicker than you think, and rationalization requires a structured cadence. You need to plan to minimize the need for repeated efforts. Conversely, many use preceding iterations to increase the analysis (e.g. more thorough TCO projections or more granular capability-application alignment).
      • Portfolio roadmaps require a cadence for both updates and presentations to stakeholders. Updates are often completed semiannually or quarterly to gauge the business adjustments that affect the timeline of the domain-specific applications. The presentation of a roadmap should be completed alongside meetings or gatherings of key decision makers.
      • M&A or other restructuring events will prompt the need to address all the above.

      The image contains a screenshot of chart to help determine frequency of updating your roadmap.

      Build your APM maturity by taking the right steps at the right time

      The image contains a diagram to demonstrate the steps taken to build APM maturity.

      Info-Tech’s Build an Application Rationalization Framework provides additional TCO and value tools to help build out your portfolio strategy.

      APM is an iterative and evergreen process

      APM provides oversight and awareness of your application portfolio’s performance and support for your business operations and value delivery to all users and customers.

      Determine scope and categories Build your list of applications and capabilities Score each application based on your values Determine outcomes based on app scoring and support for capabilities

      1. Lay Your Foundations

      • 1.1 Assess the state of your current application portfolio
      • 1.2 Determine narrative
      • 1.3 Define goals and metrics
      • 1.4 Define application categories
      • 1.5 Determine APM steps and roles (SIPOC)

      2. Improve Your Inventory

      • 2.1 Populate your inventory
      • 2.2 Align to business capabilities

      3. Rationalize Your Apps

      • 3.1 Assess business value
      • 3.2 Assess technical health
      • 3.3 Assess end-user perspective
      • 3.4 Assess total cost of ownership

      4. Populate Your Roadmap

      • 4.1 Review APM Snapshot results
      • 4.2 Review APM Foundations results
      • 4.3 Determine dispositions
      • 4.4 Assess redundancies (Optional)
      • 4.5 Determine dispositions for redundant applications (Optional)
      • 4.6 Prioritize initiatives
      • 4.7 Ongoing APM cadence

      Repeat according to APM cadence and application changes

      4.7 Ongoing APM cadence

      Estimated time: 1-2 hours

      1. Determine how frequently you will update or present the artifacts of your APM practice: Application Inventory, Rationalization, Disposition, and Roadmap.
      2. For each artifact, determine the:
        1. Owner: Who is accountable for the artifact and the data or information within the artifact and will be responsible for or delegate the responsibility of updating or presenting the artifact to the appropriate audience?
        2. Update Cadence: How frequently will you update the artifact? Include what regularly scheduled meetings this activity will be within.
        3. Update Scope: Describe what activities will be performed to keep the artifact up to date. The goal here is to minimize the need for a full set of activities laid out within the blueprint. Optional: How will you expand the thoroughness of your analysis?
        4. Audience: Who is the audience for the artifact or assessment results?
        5. Presentation Cadence: How frequently and when will you review the artifact with the audience?
      InputOutput
      • Initial experience with APM
      • Strategic meetings schedule
      • Ongoing cadence for APM activities
      MaterialsParticipants
      • Whiteboard and markers
      • APM Snapshot and Foundations Tool
      • Applications Lead
      • Any Applications Team Members

      Record the results in the APM Snapshot and Foundations Tool

      4.7 Ongoing APM cadence

      Artifact

      Owner

      Update Cadence

      Update Scope

      Audience

      Presentation Cadence

      Inventory

      Greg Dawson

      • As new applications are acquired
      • Annual review
      • Add new application data points (this is added to implementation standards)
      • Review inventory and perform a data health check
      • Validate with app’s SME
      • Whole organization
      • Always available on team site

      Rationalization Tool

      Judy Ng

      • Annual update
      • Revisit value driver weights
      • Survey end users
      • Interview support owners
      • Interview business owners
      • Update TCO based on change in operational costs; expand thoroughness of cost estimates
      • Rescore applications
      • Business owners of applications
      • IT leaders
      • Annually alongside yearly strategy meeting

      Portfolio Roadmap

      Judy Ng

      • Monthly update alongside project updates
      • Shift the timeline of the roadmap to current day 1
      • Carry over project updates and timeline changes
      • Validate with PMs and business owners
      • Steering Committee
      • Business owners of applications
      • IT leaders
      • Quarterly alongside Steering Committee meetings
      • Upon request

      Appendices

      • Additional support slides
      • Bibliography

      The APM tool provides a single source of truth and global data sharing

      The table shows where source data is used to support different aspects of APM discovery, rationalization, and modernization.

      Worksheet Data Mapping

      Application and Capability List

      Group Alignment Matrix (1-3)

      Rationalization Inputs

      Group 1-3 Results

      Application Inventory Details

      App Rationalization Results

      Roadmap

      App Redundancy Comparison

      Application and Capability List

      App list, Groupings

      App list

      App list, Groupings

      App list, Categories

      App list, Categories

      App list

      App list

      Groups 1-3 Alignment Matrix

      App to Group Tracing

      Application Categories

      Category
      drop-down

      Category

      Category

      Rationalization Inputs

      Lens Scores (weighted input to Group score)

      Lens Scores (weighted input)

      Disposition Options

      Disposition list, Priorities list, Recommended Disposition and Priority

      Lens Scores (weighted input)

      App Rationalization Results

      Disposition

      Common application inventory attributes

      Attribute Description Common Collection Method
      Name Organization’s terminology used for the application. Auto-discovery tools will provide names for the applications they reveal. However, this may not be the organizational nomenclature. You may adapt the names by leveraging pre-existing documentation and internal knowledge or by consulting business users.
      ID Unique identifiers assigned to the application (e.g. app number). Typically an identification system developed by the application portfolio manager.
      Description A brief description of the application, often referencing core capabilities. Typically completed by leveraging pre-existing documentation and internal knowledge or by consulting business users.
      Business Units A list of all business units, departments, or user groups. Consultation, surveys, or interviews with business unit representatives. However, this doesn’t always expose hidden applications. Application-capability mapping is the most effective way to determine all the business units/user groups of an app.
      Business Capabilities A list of business capabilities the application is intended to enable. Application capability mapping completed via interviews with business unit representatives.
      Criticality A high-level grading of the importance of the application to the business, typically used for support prioritization purposes (i.e. critical, high, medium, low). Typically the criticality rating is determined by a committee representing IT and business leaders.
      Ownership The individual accountable for various aspect of the application (e.g. product owner, product manager, application support, data owner); typically includes contact information and alternatives. If application ownership is an established accountability in your organization, typically consulting appropriate business stakeholders will reveal this information. Otherwise, application capability mapping can be an effective means of identifying who that owner should be.
      Application SMEs Any relevant subject matter experts who can speak to various aspects of the application (e.g. business process owners, development managers, data architects, data stewards, application architects, enterprise architects). Technical SMEs should be known within an IT department, but shadow IT apps may require interviews with the business unit. Application capability mapping will determine the identity of those key users/business process SMEs.
      Type An indication of whether the application was developed in-house, commercial off-the-shelf, or a hybrid option. Consultation, surveys, or interviews with product owners or development managers.
      Active Status An indication of whether the application is currently active, out of commission, in repair, etc. Consultation, surveys, or interviews with product owners or operation managers.

      Common application inventory attributes

      Attribute Description Common Collection Method
      Vendor Information Identification of the vendor from whom the software was procured. May include additional items such as the vendor’s contact information. Consultation with business SMEs, end users, or procurement teams, or review of vendor contracts or license agreements.
      Links to Other Documentation Pertinent information regarding the other relevant documentation of the application (e.g. SLA, vendor contracts, data use policies, disaster recovery plan). Typically includes links to documents. Consultation with product owners, service providers, or SMEs, or review of vendor contracts or license agreements.
      Number of Users The current number of users for the application. This can be based on license information but will often require some estimation. Can include additional items of quantities at different levels of access (e.g. admin, key users, power users). Consultation, surveys, or interviews with product owners or appropriate business SMEs or review of vendor contracts or license agreements. Auto-discovery tools can reveal this information.
      Software Dependencies List of other applications or operating components required to run the application. Consultation with application architects and any architectural tools or documentation. This information can begin to reveal itself through application capability mapping.
      Hardware Dependencies Identification of any hardware or infrastructure components required to run the application (i.e. databases, platform). Consultation with infrastructure or enterprise architects and any architectural tools or documentation. This information can begin to reveal itself through application capability mapping.
      Development Language Coding language used for the application. Consultation, surveys, or interviews with development managers or appropriate technical SMEs.
      Platform A framework of services that application programs rely on for standard operations. Consultation, surveys, or interviews with infrastructure or development managers.
      Lifecycle Stage Where an application is within the birth, growth, mature, end-of-life lifecycle. Consultation with business owners and technical SMEs.
      Scheduled Updates Any major or minor updates related to the application, including the release date. Consultation with business owners and vendor managers.
      Planned or In-Flight Projects Any projects related to the application, including estimated project timeline. Consultation with business owners and project managers.

      Bibliography

      ”2019 Technology & Small Business Survey.” National Small Business Association (NSBA), n.d. Accessed 1 April 2020.
      “Application Rationalization – Essential Part of the Process for Modernization and Operational Efficiency.” Flexera, 2015. Web.
      “Applications Rationalization during M&A: Standardize, Streamline, Simplify.” Deloitte Consulting, 2016. Web.
      Bowling, Alan. “Clearer Visibility of Product Roadmaps Improves IT Planning.” ComputerWeekly.com, 1 Nov. 2010. Web.
      Brown, Alex. “Calculating Business Value.” Agile 2014 Orlando, 13 July 2014. Scrum Inc. 2014. Web.
      Brown, Roger. “Defining Business Value.” Scrum Gathering San Diego 2017. Agile Coach Journal. Web.
      “Business Application Definition.” Microsoft Docs, 18 July 2012. Web.
      “Connecting Small Businesses in the US.” Deloitte Consulting, 2017. Accessed 1 April. 2020.
      Craveiro, João. “Marty meets Martin: connecting the two triads of Product Management.” Product Coalition, 18 Nov. 2017. Web.
      Curtis, Bill. “The Business Value of Application Internal Quality.” CAST, 6 April 2009. Web.
      Fleet, Neville, Joan Lasselle, and Paul Zimmerman. “Using a Balance Scorecard to Measure the Productivity and Value of Technical Documentation Organizations.” CIDM, April 2008. Web.
      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Web.
      Harris, Michael. “Measuring the Business Value of IT.” David Consulting Group, 2007. Web.
      “How Application Rationalization Contributes to the Bottom Line.” LeanIX, 2017. Web.
      Jayanthi, Aruna. “Application Landscape Report 2014.” Capgemini, 4 March 2014. Web.
      Lankhorst, Marc., et al. “Architecture-Based IT Valuation.” Via Nova Architectura, 31 March 2010. Web.
      “Management of business application.” ServiceNow, Jan.2020. Accessed 1 April 2020.
      Mauboussin, Michael J. “The True Measures of Success.” HBR, Oct. 2012. Web.
      Neogi, Sombit., et al. “Next Generation Application Portfolio Rationalization.” TATA, 2011. Web.
      Riverbed. “Measuring the Business Impact of IT Through Application Performance.” CIO Summits, 2015. Web.
      Rouse, Margaret. “Application Rationalization.” TechTarget, March 2016. Web.
      Van Ramshorst, E.A. “Application Portfolio Management from an Enterprise Architecture Perspective.” Universiteit Utrecht, July 2013.
      “What is a Balanced Scorecard?” Intrafocus, n.d. Web.
      Whitney, Lance. “SMBs share their biggest constraints and great challenges.” Tech Republic, 6 May 2019. Web.

      Take a Realistic Approach to Disaster Recovery Testing

      • Buy Link or Shortcode: {j2store}414|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity

      You have made significant investments in availability and disaster recovery – but your ability to recover hasn’t been tested in years. Testing will:

      • Improve your DR capabilities.
      • Identify required changes to planning documentation and procedures.
      • Validate DR capabilities for interested customers and auditors.

      Our Advice

      Critical Insight

      • If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience.
      • Focus on identifying gaps and risks, and addressing them, before a real disaster hits.
      • Take a realistic, iterative approach to resilience testing that starts with small, low-risk tests and builds on lessons learned.

      Impact and Result

      • Identify testing scenarios and scope that can deliver value to your organization.
      • Create practical test plans with Info-Tech’s template.
      • Demonstrate value from testing to gain buy-in for additional tests.

      Take a Realistic Approach to Disaster Recovery Testing Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take a Realistic Approach to Disaster Recovery Testing Storyboard – A guide to establishing a right-sized approach to DR testing that delivers durable value to your organization.

      Use this research to understand the different types of tests, prioritize and plan tests for your organization, review the results, and establish a cadence for testing.

      • Take a Realistic Approach to Disaster Recovery Testing Storyboard

      2. Disaster Recovery Test Plan Template – A template to document your organization's DR test plan.

      Use this template to document scope and goals, participants, key pre-test milestones, the test-day schedule, and your findings from the testing exercise.

      • Disaster Recovery Test Plan Template

      3. Disaster Recovery Testing Program Summary – A template to outline your organization's DR testing program.

      Identify the tests you will run over the next year and the expertise, governance, process, and funding required to support testing.

      • Disaster Recovery Testing Program Summary

      [infographic]

       

      Further reading

      Take a Realistic Approach to Disaster Recovery Testing

      Reduce costly downtime with a right-sized testing program that improves IT resilience.

      Analyst Perspective

      Reduce costly downtime with a right-sized testing program that improves IT resilience.

      Andrew Sharp

      Most businesses make significant investments in disaster recovery and technology resilience. Redundant sites and systems, monitoring, intrusion prevention, backups, training, documentation: it all costs time and money.

      But does this investment deliver expected value? Specifically, can you deliver service continuity in a way that meets business requirements?

      You can’t know the answer without regularly testing recovery processes and systems. And more than just validation, testing helps you deliver service continuity by finding and addressing gaps in your plans and training your staff on recovery procedures.

      Use the insights, tools, and templates in this research to create a streamlined and effective resilience testing program that helps validate recovery capabilities and enhance service reliability, availability, and continuity.

      Andrew Sharp

      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      You have made significant investments in availability and disaster recovery (DR) – but your ability to recover hasn’t been tested in years. Testing will:

      • Improve your DR capabilities.
      • Identify required changes to planning documentation and procedures.
      • Validate DR capabilities for interested customers and auditors.

      Common Obstacles

      Despite the value testing can offer, actually executing on DR tests is difficult because:

      • Testing is often an IT-driven initiative, and it can be difficult to secure business buy-in to redirect resources away from other urgent projects or accept risks that come with testing.
      • Previous tests have been overly complex and challenging to coordinate and leave a hangover so bad that no one wants to do them again.

      Info-Tech's Approach

      Take a realistic approach to resilience testing by starting with small, low-risk tests, then iterating with the lessons you’ve learned:

      • Identify testing scenarios and scope that can deliver value to your organization.
      • Create practical test plans with Info-Tech’s template.
      • Get buy-in for regular DR testing from key stakeholders with a testing program summary.

      Info-Tech Insight

      If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience. Focus on identifying gaps and risks so you can address them before a real disaster hits.

      Process and Outputs

      This research is accompanied by templates to help you achieve your goals faster.

      1 - Establish the business rationale for DR testing.
      2 - Review a range of options for testing.
      3 - Prioritize tests that are most valuable to your business.
      4 - Create a disaster recovery test plan.
      5 - Establish a Test Program to support a regular testing cycle.

      Outputs:

      DR Test Plan
      DR Testing Program Summary

      Example Orange Activity slide.
      Orange activity slides like the one on the left provide directions to help you make key decisions.

      Key Deliverable:

      Disaster Recovery Test Plan Template

      Build a plan for your first disaster recovery test.

      This document provides a complete example you can use to quickly build your own plan, including goals, milestones, participants, the test-day schedule, and findings from the after-action review.

      Why test?

      Testing helps you avoid costly downtime

      • In a disaster scenario, speed matters. Immediately after an outage, the impact on the organization is small, but impact increases rapidly the longer the outage continues.
      • A quick and reliable response and recovery can protect the organization from significant losses.
      • A DRP testing and maintenance program helps ensure you’re ready to recover when you need to, rather than figuring it out as you go.

      “Routine testing is vital to survive a disaster… that’s when muscle memory sets in. If you don’t test your DR plan it falls [in importance], and you never see how routine changes impact it.”

      – Jennifer Goshorn
      Chief Administrative Officer
      Gunderson Dettmer LLP

      Info-Tech members estimated even one day of system downtime could lead to significant revenue losses. Estimated loss of revenue over 24 hours. Core Infrastructure has the highest potential for lost revenue.

      Average estimated potential loss* in thousands of USD due to a 24-hour outage (N=41)

      *Data aggregated from 41 business impact analyses (BIAs) conducted with Info-Tech advisory assistance. BIAs evaluate potential revenue loss due to a full day of system downtime, at the worst possible time.

      Run tests to enhance disaster recovery plans

      Testing improves organizational resilience

      • Identify and address gaps in your plans before a real disaster strikes.
      • Cross-train staff on systems recovery.
      • Go beyond testing technology to test recovery processes.
      • Establish a culture that centers resilience in everyday decision-making.

      Testing keeps DR documentation ready for action

      • Update documentation ahead of tests to prepare for the testing exercise.
      • Update documentation after testing to incorporate any lessons learned.

      Testing validates that investments in resilience deliver value

      • Confirm your organization can meet defined recovery time objectives (RTOs) and recovery point objectives (RPOs).
      • Provide proof of testing for auditors, prospective customers, and insurance applications

      Overcome testing challenges

      Despite the value of effective recovery testing, most IT organizations struggle to test recovery plans

      Common challenges

      • Key resources don’t have time for testing exercises.
      • You don’t have the technology to support live recovery testing.
      • Tests are done ad hoc and lessons learned are lost.
      • A lack of business support for test exercises as the value isn’t understood.
      • Tests are always artificially simple because RTOs and RPOs must be met to satisfy customer or auditor inquiries

      Overcome challenges with a realistic approach:

      • Start small with tabletop and recovery tests for specific systems.
      • Include recovery tests in operational tasks (e.g. restore systems when you have a maintenance window).
      • Create testing plans for larger testing exercises.
      • Build on successful tests to streamline testing exercises in the future.
      • Don’t make testing a pass-fail exercise. Focus on identifying gaps and risks so you can address them before a real disaster hits.

      Go beyond traditional testing

      Different test techniques help validate recovery against different threats

      • There are many threats to service continuity, including ransomware, severe weather events, geopolitical conflict, legacy systems, staff turnover, and day-to-day outages caused by human error, software updates, hardware failures, or network outages.
      • At its core, disaster recovery planning is about recovery. A plan for service recovery will help you mitigate against many threats at once. The testing approaches on the right will help you validate different aspects of that recovery process.
      • This research will provide an overview of the approaches outlined on the right and help you prioritize tests that are most valuable to your organization.
      Different test techniques for disaster recover training: System Failover tests, tabletop exercises, ransomware recovery tests, etc.

      00 Identify a working group

      30 minutes

      Identify a group of participants who can fill the following roles and inform the discussions around testing in this research. A single person could fill multiple roles and some roles could be filled by multiple people. Many participants will be drawn from the larger DRP team.

      Roles and expectations for Disaster Recovery Planning. DRP sponsor, Testing coordinator, System testers, business liaisons, executive team.

      Input

      • Organizational context

      Output

      • A list of key participants for test planning and execution

      Participants

      • Typically, start by identifying the sponsor and coordinator and have them identify the other members of the working group.

      Start by updating your disaster recovery plan (DRP)

      Use Info-Tech’s Create a Right-Sized Disaster Recovery Plan research to identify recovery objectives based on business impact and outline recovery processes. Both are tremendously valuable inputs to your test plans.

      Overall Business Continuity Plan

      IT Disaster Recovery Plan

      A plan to restore IT services (e.g. applications and infrastructure) following a disruption. A DRP:

      • Identifies critical applications and dependencies.
      • Defines appropriate recovery objectives based on a business impact analysis (BIA).
      • Creates a step-by-step incident response plan.

      BCP for Each Business Unit

      A set of plans to resume business processes for each business unit. A business continuity plan (BCP) is also sometimes called a continuity of operations plan (COOP).

      BCPs are created and owned by each business unit, and creating a BCP requires deep involvement from the leadership of each business unit.

      Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization.

      Crisis Management Plan

      A plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage.

      Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage.

      01 Confirm: why test at all?

      15-30 minutes

      Identify the value recovery testing for your organization. Use language appropriate for a nontechnical audience. Start with the list below and add, modify, or delete bullet points to reflect your own organization.

       

      Drivers for testing – Examples:

       

      • Improve service continuity.
      • Identify and address gaps in recovery plans before a real disaster strikes.
      • Cross-train staff on systems recovery to minimize single points of failure.
      • Identify how we coordinate across teams during a major systems outage.
      • Exercise both recovery processes and technology.
      • Support a culture that centers system resilience in everyday decision-making.
      • Keep recovery documentation up-to-date and ready for action.
      • Confirm that our stated recovery objectives can be met.
      • Provide proof of testing for auditors, prospective customers, and insurance applications.
      • We require proof of testing to pass audits and renew cybersecurity insurance.

      Info-Tech Insight

      Time-strapped technical staff will sometimes push back on planning and testing, objecting that the team will “figure it out” in a disaster. But the question isn’t whether recovery is possible – it’s whether the recovery aligns with business needs. If your plan is to “MacGyver” a solution on the fly, you can’t know if it’s the right solution for your organization.

      Input

      • Business drivers and context for testing

      Output

      • Specific goals that are driving testing

      Participants

      • DR sponsor
      • Test coordinator

      Think about what and how you test

      Different layers of the stack to test: Network, Authentication, compute and storage, visualization platforms, database services, middleware, app servers, web servers.

      Find gaps and risks with tabletop testing

      Tabletop planning had the greatest impact on meeting recovery objectives (RTOs/RPOs).

      In a tabletop planning exercise, the team walks through a disaster scenario to outline the recovery workflow, and risks or gaps that could disrupt that workflow.

      Tabletops are particularly effective because:

      • It enables you to play out a wider range of scenarios than technology-based testing (e.g. full-scale, parallel) due to cost and complexity factors.
      • It is non-intrusive, so it can be executed more easily than other testing methodologies.
      • The exercise translates into recovery documentation: you create a workflow as you go.
      • A major site or service recovery scenario will review all aspects of the recovery process and create the backbone of your recovery plan.

      02 Run a tabletop exercise

      2 hours

      Tabletop testing is part of our core DRP methodology, Create a Right-Sized Disaster Recovery Plan. This exercise can be run using cue cards, sticky notes, or on a whiteboard; many of our facilitators find building the workflow directly in flowchart software to be very effective.

      Use our Recovery Workflow Template as a starting point.

      Some tips for running your first tabletop exercise:

      Do

      • Review the complete workflow from notification all the way to user acceptance testing.
      • Keep focused; stay on task and on time.
      • Revisit each step and record gaps and risks (and known solutions, but don’t dwell on this).
      • Revise and improve the plan with task owners.

      Don't

      • Get weighed down by tools.
      • Try to find solutions to every gap/risk as you go. Save in-depth research/discussion for later.
      • Document the details right away – stick to the high-level plan for the first exercise.
      1. Ahead of the exercise, decide on a scenario, identify participants, and book a meeting time.
        • For your first walkthrough of a DR scenario, we often recommend a scenario that considers a site failure requiring failover to a DR site.
        • For the first exercise, focus on technical aspects of recovery before bringing in members of the business. The technical team may need space to discuss the appropriate steps in the recovery process before you bring in business liaisons to discuss user acceptance testing (UAT).
        • A complete failover considers all systems, the viability of your second site, and can help identify parts of the process that require additional exercises.
      2. Review the scenario with participants. Then, discuss and document the recovery process, starting with initial notification of an event.
        • Record steps in the process on white cards or boxes.
        • On yellow and red cards, document gaps and risks in people process and technology requirements.
      3. Once you’ve walked through the process, return to the start.
        • Record the time required to complete each step. Consider identifying who is responsible for key steps. Identify any additional gaps and risks.
      4. Clean up and record the results of the workflow. Save a copy with your DRP documentation.

      Input

      • Expert knowledge on systems recovery

      Output

      • Recovery workflow, including gaps and risks

      Participants

      • Test coordinator
      • Technical SMEs

      Move from tabletop testing to functional exercises

      See how your plans fare in the real world

      In live exercises, some portion of your recovery plans are executed in a way that mimics a real recovery scenario. Some advantages of live testing:

      • See how standby systems behave. A tabletop exercise can miss small issues that can make or break the recovery process. For example, connectivity or integration issues on a new subnet might be difficult to predict prior to actually running services in that environment.
      • Hands-on practice: Familiarize the team with the steps, commands, and interfaces of your recovery toolset.
      • Manage the pressure of the DR scenario: Nothing’s quite like the real thing, but a live exercise may be the closest your team can get to a disaster situation without experiencing it firsthand.

      Examples of live exercises

      Boot and smoke test Turn on a standby system and confirm it boots up correctly.
      Restore and validate data Restore data or servers from backup. Confirm data integrity.
      Parallel testing Send familiar transactions to production and standby systems. Confirm both systems produce the same result.
      Failover systems Shut down the production system and use the standby system in production.

      Run local tests ahead of releases

      Think small

      Most unacceptable downtime is caused by localized issues, such as hardware or software failures, rather than widespread destructive events. Regular local testing can help validate the recovery plan for local issues and improve overall service continuity.

      Make local testing a standard step in maintenance work and new deployments to embed resilience considerations in day-to-day activities. Run the same tests in both your primary and your DR environment.

      Some examples of localized tests:

      • Review backup logs and check for errors.
      • Restore files or whole systems from backup.
      • Run application-based tests as part of release management, including unit, regression, and performance tests.
        • Ensure application tests are run for both the primary and DR environment.
        • For a deep-dive on application testing, see Info-Tech’s research Automate Testing to Get More Done.

      Info-Tech Insight

      Local tests will vary between different services, and local test design is usually best left to the system SMEs. At the same time, centralize reporting to understand where tests are being done.

      Investigate whether your IT Service Management or ticketing system can create recurring tasks or work orders to schedule, document, and track test exercises. Tasks can be pre-populated with checklists and documentation to support the test and provide a record of completed tests to support oversight and reporting.

      Have the business validate recovery

      If your business doesn’t think a system’s recovered, it’s not recovered.

      User acceptance testing (UAT) after system recovery is a key step in the recovery process. Like any step in the process, there’s value in testing it before it actually needs to be done. Assign responsibility for building UATs to the person who will be responsible for executing them.

      An acceptance test script might look something like the checklist below.

      • Does the application open?
      • Does the interface look right?
      • Do you see any unusual notifications or warnings?
      • Can you conduct a key transaction with dummy data?
      • Can you run key reports?

      “I cannot stress how important it is to assign ownership of responsibilities in a test; this is the only way to truly mitigate against issues in a test.”

      – Robert Nardella
      IT Service Management
      Certified z/OS Mainframe Professional

      Info-Tech Insight

      Build test scripts and test transactions ahead of time to minimize the amount of new work required during a recovery scenario.

      Beyond the Basics: Full Failover Testing

      • A failover test – a full failover of your production environment to a secondary environment – is what many IT and businesspeople think about when they think of disaster recovery testing.
      • A full test can validate previous local or tabletop tests, identify additional gaps and risks, and provide hands-on training experience with recovery processes and technologies.
      • Setting a date for failover testing can also inject some urgency into otherwise low-priority (but high importance) disaster recovery planning and documentation exercises, which need to be completed prior to the test.
      • Despite these benefits, full failover tests carry significant risk and require a great deal of effort and cost. Typically, only businesses that already have an active-active environment capable of supporting in-scope production systems are able to run a full environment failover.
      • This is especially true the first time you test. While in theory a DR plan should be ready to go at any time, there will be documents to update, gaps to address, and risks to mitigate before you go ahead with the test.

      Full Failover Testing

      What you get:

      • Provide hands-on experience with recovery processes and technology.
      • Confirm that site failover works in practice as you assumed in tabletop or local testing exercises.
      • Identify critical gaps you might have missed without a full failover test.

      What you need:

      • An active-active secondary site, with sufficient standby equipment, data, and licensed standby software to support production.
      • A completed tabletop exercise and documented recovery workflow.
      • A documented test plan, backout plan, and formal sign-off.
      • An off-hours downtime window.
      • Time from technical SMEs and business resources, both for creating the plan and executing the test.

      Beyond the Basics: Site Reliability Engineering

      • Site reliability engineering (SRE) is an application of skills and approaches from software engineering to improve system resilience.
      • SRE is focused on “availability, latency, performance, efficiency, change management, monitoring, emergency response, and capacity planning” across a set portfolio of services (Sloss, 2017).
      • In many organizations, SRE is implemented as a team that supports separate applications teams.
      • Applications must have defined and granular resilience requirements, translated into service objectives. The SRE team and applications teams will work together to meet these objectives.
      • Site reliability engineers (the folks that do SRE, and often also abbreviated as SREs) are expected to build solutions and processes to ensure services remain stable and performant, not just respond when they fail. For example, Google allows their SREs to spend just half their time on incident response, with the rest of their time focused on development and automation tasks.

      Site Reliability Testing

      What you get:

      • Improved reliability and reduced frequency and impact of downtime.
      • Increased use of automation to address problems before they cause an incident.
      • Granular resilience objectives.

      What you need:

      • Systems running on software-defined infrastructure.
      • Specialized skills in programming, infrastructure-as-code.
      • Business & product owners able to define and fund acceptable and appropriate resilience objectives.
      • Technical experts able to translate product requirements into technical design requirements.

      Beyond the Basics: Chaos Engineering

      • Chaos engineering, a term and approach first popularized by the team at Netflix, aims to improve the resilience of particularly large and distributed systems by simulating system failures and evaluating performance against a baseline.
      • Experiments simulate a variety of real-world events that could cause outages (e.g. network slowdowns or server failures). Experiments run continuously, and the recommendation is to run them in production where feasible while minimizing the impact on customers.
      • Tools to help you run chaos testing exist, including open-source toolkits like Chaos Monkey or Mangle and paid software as a service (SaaS) solutions like Gremlin.
      • Deciding whether the long-term benefits of tests that can degrade production are worth the potential risk of system slowdowns or outages is a business or product decision. Technical considerations aside, if the business owner of a particular system doesn’t see the value of continuous testing outweighing the introduced risk, this approach to testing isn’t going to happen.

      Chaos Engineering

      What you get:

      • Confidence that systems can weather volatile and unpredictable conditions in a production environment.
      • An embedded resilience culture.

      What you need:

      • High-maturity IT incident, monitoring and event practices.
      • Standby/resilient systems to minimize downtime impact.
      • Business buy-in for introducing risk into the production environment.
      • Specialized skills to identify, develop, and run tests that degrade production performance in a controlled way.
      • Budget and time to act on issues identified through testing.

      Beyond the Basics: Security Event Simulations

      • Ransomware is driving demands for proof of recovery testing from customers, executives, auditors, and insurance companies. Systems recovery is part of ransomware recovery, but recovering from a breach includes detection, analysis, containment, and eradication of the attack vector before systems recovery can begin.
      • Beyond technical recovery, internal legal and communications teams will have a role, as will your insurance provider, consultants specialized in ransomware recovery, or professional ransom negotiators.
      • A tabletop exercise focused on ransomware incident response is a key first step. You can find Info-Tech’s methodology for a ransomware tabletop in Phase 3 of Build Resilience Against Ransomware Attacks.
      • Live testing approaches can offer hands-on experience and further insight into how your systems are vulnerable to malware. A variety of open source and proprietary tools can simulate ransomware and help you identify problems, though it’s important to understand the limitations of different simulators (Allon, 2022).
      • A “red team” exercise simulates an adversarial attack against your processes and systems. A specialized penetration tester will often take on the role of the red team and provide a report of identified gaps and risks after the engagement.

      Security Event Simulation

      What you get:

      • Hands-on experience managing and recovering from a ransomware attack in a controlled environment.
      • A better understanding of gaps in your response process.

      What you need:

      • A completed ransomware tabletop exercise and mature security incident response processes.
      • For Ransomware Simulators: An air-gapped sandbox environment hosting a copy of your production systems and security tools, and time from your technical SMEs.
      • For Red Team Exercises: A trusted provider, scope for your testing plans, and time from your security incident response team.

      Prioritize tests by asking these three questions

      1. Will the scope of this test deliver sufficient value?

      • Yes, these are critical systems with low tolerance for downtime or data loss.
      • Yes, major changes or new systems require validation of DR capabilities.
      • Yes, there’s high probability of an outage, or recent experience of an outage.
      • •Yes, we have audit requirements or customer demands for testing.

      2. Are we ready for this test?

      • Yes, recovery plans and recovery objectives are documented.
      • Yes, key technical and business resources have time to commit to testing exercises.
      • Yes, technology is currently able to support proposed tests.

      3. Is it easy to do?

      • Yes, effort required to complete the test is low (i.e. minimal work, few participants).
      • Yes, the risks related to testing are low.
      • Yes, it won’t cost much.

      Info-Tech Insight

      More complex, challenging, risky, or costly tests, such as full failover tests, can deliver value. But do the high-value, low-effort stuff first!

      03 Brainstorm and prioritize test ideas

      30-60 minutes

      Even if you have an idea of what you need to test and how you want to run those tests, this brainstorming exercise can generate useful ideas for testing that might otherwise have been missed.

        1. Review the slides above to develop ideas on how and what you want to test. These slides may be enough to kickstart a brainstorming process. Don’t debate or discount ideas at this point. Write down these ideas in a space where all participants can see them (e.g. whiteboard or shared screen).

      The next steps will help you prioritize the list – if needed – to tests that are highest value and lowest effort.

      1. Discuss where you have the greatest need to test. Assign a score of 0 – 3 for each test, with a score of 3 being high-need and a score of zero being low-need. Consider whether:
        • These applications have a low tolerance for downtime.
        • There’s a high chance of an outage, or recent experience with an outage.
        • There’s a need to train or cross-train staff on recovery for the system(s) in question.
        • Major changes require a review or validation of DR capabilities.
        • Audit requirements or customer/executive demands can be met via testing.
      2. Discuss which tests will require the least effort to complete – where readiness is high and tests are easier to do. Assign a score between 0 and 3 for each test, with a score of 3 being least effort and a score of 0 being high effort. Consider whether:
        • Recovery plans and recovery objectives are documented for these systems.
        • Technical experts are available to work on testing exercises.
        • For active testing, standby/sandbox systems are available and capable of supporting proposed tests.
        • The effort required to complete the test is low (e.g. minimal new work, few participants).
        • The risks related to testing are low.
        • You will need to secure additional funding.
      3. Sum together the assigned scores for each test. Higher scores should be the highest priority, but of course use your judgement to validate the results and select one or two tests to execute in the coming year.

      “There are different levels of testing and it is very progressive. I do not recommend my clients to do anything, unless they do it in a progressive fashion. Don’t try to do a live failover test with your users, right out of the box.”

      – Steve Tower
      Principal Consultant
      Prompta Consulting Group

      Input

      • Organizational and technical context

      Output

      • Prioritize list of DR testing ideas

      Participants

      • DR sponsor
      • Test coordinator

      04 Build a test plan

      3-5 days

      Building a test plan helps the test run smoothly and can uncover issues with the underlying DRP as you dig into the details.

      The test coordinator will own the plan document but will rely on the sponsor to confirm scope and goals, technical SMEs to develop system recovery plans, and business liaisons to create UAT scripts.

      Download Info-Tech’s Disaster Recovery Test Plan Template. Use the structure of the template to build your own document, deleting example data as you go. Consider saving a separate copy of this document as an example and working from a second copy.

      Key sections of the document include:

      • Goals, scenario, and scope of the test.
      • Assumptions, constraints, risks, and mitigation strategies.
      • Test participants.
      • Key pre-test milestones, and test-day schedule.
      • After-action review.

      Download the Disaster Recovery Test Plan Template

      Input

      • Scope
      • High-level goals

      Output

      • Test plan, including goals, scope, key milestones, risks and mitigations, and test-day schedule

      Participants

      • Test coordinator develops the plan with support from:
        • Technical SMEs
        • Business liaisons
        • DR sponsor

      05 Run an after-action review

      30-60 minutes

      Take time after test exercises – especially large-scale tests with many participants – to consider what went well, what didn’t, and where you can improve future testing exercises. Track lessons learned and next steps at the bottom of your test plan.

      1. Start with a short (5-10 minute) debrief of the test and allow participants to ask questions. Confirm:
        • Did we meet the goals we set for the exercise, including RTOs and RPOs?
        • What was done well? What issues, gaps, and risks were identified?
      2. Work through variations of the following questions:
        • Was the test plan effective, and was the test well organized?
        • Was the documentation effective? Where did we follow the plan as documented, and where did we deviate from the plan?
        • Was our communication/collaboration during the test effective?
        • Have gaps and issues found during the test been reported to the testing coordinator? Could some of the issues uncovered apply more broadly to other IT services as well?
        • What could we test next, based on what was discovered?
        • Are there other tools or approaches that could be useful?

      Input

      • Insights and experience from a recent testing exercise

      Output

      • Identified gaps and risks, and action items to address them
      • Ideas to improve future test exercises

      Participants

      • Test coordinator develops the plan with support from:
        • Test coordinator
        • Test participants

      Follow a testing cycle

      All tests are expected to drive actions to improve resilience, as appropriate. Experience from previous tests will be applied to future testing exercises.

      The testing cycle: 1. Plan a test, 2. Run test, 3. Take action.

      Use your experience to simplify testing

      The fifth testing exercise should be easier than the first

      Outputs and lessons learned from testing should help you run future tests.

      • With past experience under their belt, participants should have a better understanding of their role, and of their peers’ roles, and the goal of the exercise.
      • Facilitators will be more comfortable facilitating the exercise, and everyone should be more confident in the steps required to recover their systems.
      • Gather feedback from participants through after-action reviews to identify what worked and what didn’t.
      • Documentation from previous tests can provide a template for future tests.
      • Gaps identified in previous tests can provide ideas for future tests.

      Experience, lessons learned, improved process, new test targets, repeat.

      Info-Tech Insight

      Testing should get easier over time. But if you’re easily passing every test, it’s a sign that you’re ready to run more challenging tests.

      06 Create a test program summary

      2-4 hours

      Regular testing allows you to build on prior tests and helps keep plans current despite changes to your environment.

      Keeping a regular testing schedule requires expertise, a process to coordinate your efforts, and a level of governance to provide oversight and ensure testing continues to deliver value. Create a call to action using Info-Tech’s Disaster Recovery Testing Program Summary Template.

      The result is a summary document that:

      • Identifies key takeaways and testing goals
      • Presents key elements of the testing program
      • Outlines the testing cycle
      • Lists expected milestones for the next year
      • Identifies participants
      • Recommends next steps

      “It is extremely important in the early stages of development to concentrate the focus on actual recoverability and data protection, enhancing these capabilities over time into a fully matured program that can truly test the recovery, and not simply focusing on the testing process itself.”

      – Joe Starzyk
      Senior Business Development Executive
      IBM Global Services

      Research Contributors and Experts

      • Bernard A. Jones, Business Continuity & Disaster Recovery Expert
      • Robert Nardella, IT Service Management, Certified z/OS Mainframe Professional
      • Larry Liss, Chief Technology Officer, Blank Rome LLP
      • Jennifer Goshorn, Chief Administrative and Chief Compliance Officer, Gunderson Dettmer LLP
      • Paul Kirvan, FBCI, CISA, Independent IT Consultant/Auditor, Paul Kirvan Associates
      • Steve Tower, Principal Consultant, Prompta Consulting Group
      • Joe Starzyk, Senior Business Development Executive, IBM Global Services
      • Thomas Bronack, Enterprise Resiliency and Corporate Certification Consultant, DCAG
      • Paul S. Randal, CEO & Owner, SQLskills.com
      • Tom Baumgartner, Disaster Recovery Analyst, Catholic Health

      Bibliography

      Alton, Yoni. “Ransomware simulators – reality or a bluff?” Palo Alto Blog, 2 May 2022. Accessed 31 Jan 2023.
      https://www.paloaltonetworks.com/blog/security-operations/ransomware-simulators-reality-or-a-bluff/

      Brathwaite, Shimon. “How to Test your Business Continuity and Disaster Recovery Plan,” Security Made Simple, 13 Nov 2022. Accessed 31 Jan 2023.
      https://www.securitymadesimple.org/cybersecurity-blog/how-to-test-your-business-continuity-and-disaster-recovery-plan

      The Business Continuity Institute. Good Practice Guidelines: 2018 Edition. The Business Continuity Institute, 2017.

      Emigh, Jacqueline. “Disaster Recovery Testing: Ensuring Your DR Plan Works,” Enterprise Storage Forum, 28 May 2019. Accessed 31 Jan 2023.
      Disaster Recovery Testing: Ensuring Your DR Plan Works | Enterprise Storage Forum

      Gardner, Dana. "Case Study: Strategic Approach to Disaster Recovery and Data Lifecycle Management Pays off for Australia's SAI Global." ZDNet. BriefingsDirect, 26 Apr 2012. Accessed 31 Jan 2023.
      http://www.zdnet.com/article/case-study-strategic-approach-to-disaster-recovery-and-data-lifecycle-management-pays-off-for-australias-sai-global/.

      IBM. “Section 11. Testing the Disaster Recovery Plan.” IBM, 2 Aug 2021. Accessed 31 Jan 2023. Section 11. Testing the disaster recovery plan - IBM Documentation Lutkevich, Ben and Alexander Gillis. “Chaos Engineering”. TechTarget, Jun 2021. Accessed 31 Jan 2023.
      https://www.techtarget.com/searchitoperations/definition/chaos-engineering

      Monperrus, Martin. “Principles of Antifragility.” Arxiv Forum, 7 June 2017. Accessed 31 Jan 2023.
      https://arxiv.org/ftp/arxiv/papers/1404/1404.3056.pdf

      “Principles of Chaos Engineering.” Principles of Chaos Engineering, 2019 March. Accessed 31 Jan 2023.
      https://principlesofchaos.org/

      Sloss, Benjamin Treynor. “Introduction.” Site Reliability Engineering. Ed. Betsy Beyer. O’Reilly Media, 2017. Accessed 31 Jan 2023.
      https://sre.google/sre-book/introduction/

      Acquire the Right Hires with Effective Interviewing

      • Buy Link or Shortcode: {j2store}576|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $15,749 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select
      • Scope: Acquiring the best talent relies heavily on an effective interviewing process, which involves the strategic preparation of stakeholders, including interviewers. Asking the most effective questions will draw out the most appropriate information to best assess the candidate. Evaluating the interview process and recording best practices will inspire continuous interviewing improvement within the organization.
      • Challenge: The majority of organizations do not have a solid interviewing process in place, and most interviewers are not practiced at interviewing. This results in many poor hiring decisions, costing the organization in many ways. Upsizing is on the horizon, the competition for good talent is escalating, and distinguishing between a good interviewee and a good candidate fit for a position is becoming more difficult.
      • Pain/Risk: Although properly preparing for and conducting an interview requires additional time on the part of HR, the hiring manager, and all interviewers involved, the long-term benefits of an effective interview process positively affect the organization’s bottom line and company morale.

      Our Advice

      Critical Insight

      • Most interviewers are not as good as they think they are, resulting in many poor hiring decisions. A poor hire can cost an organization up to 15 times the position’s annual salary, as well as hurt employee morale.
      • The Human Resources department needs to take responsibility for an effective interview process, but the business needs to take responsibility for developing its new hire needs, and assessing the candidates using the best questions and the most effective interview types and techniques.
      • All individuals with a stake in the interview process need to invest sufficient time to help define the ideal candidate, understand their roles and decision rights in the process, and prepare individually to interview effectively.
      • There are hundreds of different interview types, techniques, and tools for an organization to use, but the most practiced and most effective is behavioral interviewing.
      • There is no right interview type and technique. Each hiring scenario needs to be evaluated to pick the appropriate type and technique that should be practiced, and the right questions that should be asked.

      Impact and Result

      • Gain insight into and understand the need for a strong interview process.
      • Strategize and plan your organization’s interview process, including how to make up an ideal candidate profile, who should be involved in the process, and how to effectively match interview types, techniques, and questions to assess the ideal candidate attributes.
      • Understand various hiring scenarios, and how an interview process may be modified to reflect your organization’s scenario.
      • Learn about the most common interview types and techniques, when they are appropriate to use, and best practices around using them effectively.
      • Evaluate your interview process and yourself as an interviewer to better inform future candidate interviewing strategy.

      Acquire the Right Hires with Effective Interviewing Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Implement an effective interview and continuous improvement process

      Acquire the right hire.

      • Storyboard: Acquire the Right Hires with Effective Interviewing

      2. Document all aspects of your interview strategy and plan with stakeholders

      Ensure an effective and seamless interview process.

      • Candidate Interview Strategy and Planning Guide

      3. Recognize common interviewing errors and study best practices to address these errors

      Be an effective interviewer.

      • Screening Interview Template
      • Interview Guide Template
      • Supplement: Quick Fixes to Common Interview Errors
      • Pre-interview Guide for Interviewers
      • Candidate Communication Template
      [infographic]

      Understand and Apply Internet-of-Things Use Cases to Drive Organizational Success

      • Buy Link or Shortcode: {j2store}535|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • The Internet of Things (IoT) is a rapidly proliferating technology – connected devices have experienced unabated growth over the last ten years.
      • The business wants to capitalize on the IoT and move the needle forward for proactive customer service and operational efficiency.
      • Moreover, IT wants to maintain its reputation as forward-thinking, and the business wants to be innovative.

      Our Advice

      Critical Insight

      • Leverage Info-Tech’s comprehensive three-phase approach to IoT projects: understand the fundamentals of IoT capabilities, assess where the IoT will drive value within the organization, and present findings to stakeholders.
      • Conduct a foundational IoT discussion with stakeholders to level set expectations about the technology’s capabilities.
      • Determine your organization’s approach to the IoT in terms of both hardware and software.
      • Determine which use case your organization fits into: three of the use cases highlighted in this report include predictive customer service, smart offices, and supply chain applications.

      Impact and Result

      • Our methodology addresses the possible issues by using a case-study approach to demonstrate the “Art of the Possible” for the IoT.
      • With an understanding of the IoT, it is possible to find applicable use cases for this emerging technology and get a leg up on competitors.

      Understand and Apply Internet-of-Things Use Cases to Drive Organizational Success Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why your organization should care about the IoT’s potential to transform the service and the workplace, and how Info-Tech will support you as you identify and build your IoT use cases.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand core IoT use cases

      Analyze the scope of the IoT and the three most prominent enterprise use cases.

      • Understand and Apply Internet-of-Things Use Cases to Drive Organizational Success – Phase 1: Understand Core IoT Use Cases

      2. Build the business case for IoT applications

      Develop and prioritize use cases for the IoT using Info-Tech’s IoT Initiative Framework.

      • Understand and Apply Internet-of-Things Use Cases to Drive Organizational Success – Phase 2: Build the Business Case for IoT Initiatives

      3. Present IoT initiatives to stakeholders

      Present the IoT initiative to stakeholders and understand the way forward for the IoT initiative.

      • Understand and Apply Internet-of-Things Use Cases to Drive Organizational Success – Phase 3: Present IoT Initiatives to Stakeholders
      • Internet of Things Stakeholder Presentation Template
      [infographic]